Analysis
-
max time kernel
149s -
max time network
146s -
platform
windows7_x64 -
resource
win7-en-20211014 -
submitted
02-11-2021 06:18
Static task
static1
Behavioral task
behavioral1
Sample
1c359f210df80175b3fe8205db122f9380bbf4fcf2eabfc10c98a32d79e21c44.dll.exe
Resource
win7-en-20211014
windows7_x64
0 signatures
0 seconds
General
-
Target
1c359f210df80175b3fe8205db122f9380bbf4fcf2eabfc10c98a32d79e21c44.dll.exe
-
Size
1.8MB
-
MD5
dc5e63f80e1adc0ca0e130be0d6a08c4
-
SHA1
8ee4915518f67171eaabc5a9464faf3588d29c87
-
SHA256
1c359f210df80175b3fe8205db122f9380bbf4fcf2eabfc10c98a32d79e21c44
-
SHA512
6abaf1c379948302fe164e2a99e57aa26d936202a8250c6e116e72e8dbd93919ddf37832a0fdc11da008aa40f7b38f1c7d95b072ee7175addb4a1e4b611a0858
Malware Config
Extracted
Family
gozi_rm3
Attributes
-
build
300848
Extracted
Family
gozi_rm3
Botnet
8483
C2
https://votboo.xyz
Attributes
-
build
300848
-
dga_base_url
constitution.org/usdeclar.txt
-
dga_crc
0x4eb7d2ca
-
dga_season
10
-
dga_tlds
com
ru
org
-
exe_type
loader
-
server_id
12
-
url_path
index.htm
rsa_pubkey.plain
serpent.plain
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 605d307db9cfd701 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AD7E0B31-3BAC-11EC-AF99-4AC5DC9B600B} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "342602326" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005bf5749d3a275447873d564a46cb193600000000020000000000106600000001000020000000cb03377764b5df5deb3cc2d2626bccf7e32eaa423cc600b89954b307dad748be000000000e80000000020000200000008d285c74f315580526b7a456cc848fc61f6e49c274c159f6b5677beb0d434fe4200000006a41dd8f4899682c0fc092712b2b1f229b932aa7906b8338054886450f74d38d4000000040fff22e869fd7cd6649bc07392c88277e6198941e39eea89061a9712022edbc15212ba7bfa0d574e349131e39dc2ead54eb75081cbbeef6b89082264ed92e8a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 1292 iexplore.exe 1292 iexplore.exe 1292 iexplore.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1292 iexplore.exe 1292 iexplore.exe 1172 IEXPLORE.EXE 1172 IEXPLORE.EXE 1292 iexplore.exe 1292 iexplore.exe 668 IEXPLORE.EXE 668 IEXPLORE.EXE 1292 iexplore.exe 1292 iexplore.exe 1180 IEXPLORE.EXE 1180 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1292 wrote to memory of 1172 1292 iexplore.exe 31 PID 1292 wrote to memory of 1172 1292 iexplore.exe 31 PID 1292 wrote to memory of 1172 1292 iexplore.exe 31 PID 1292 wrote to memory of 1172 1292 iexplore.exe 31 PID 1292 wrote to memory of 668 1292 iexplore.exe 33 PID 1292 wrote to memory of 668 1292 iexplore.exe 33 PID 1292 wrote to memory of 668 1292 iexplore.exe 33 PID 1292 wrote to memory of 668 1292 iexplore.exe 33 PID 1292 wrote to memory of 1180 1292 iexplore.exe 34 PID 1292 wrote to memory of 1180 1292 iexplore.exe 34 PID 1292 wrote to memory of 1180 1292 iexplore.exe 34 PID 1292 wrote to memory of 1180 1292 iexplore.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\1c359f210df80175b3fe8205db122f9380bbf4fcf2eabfc10c98a32d79e21c44.dll.exe"C:\Users\Admin\AppData\Local\Temp\1c359f210df80175b3fe8205db122f9380bbf4fcf2eabfc10c98a32d79e21c44.dll.exe"1⤵PID:1240
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1292 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1172
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1292 CREDAT:406537 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:668
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1292 CREDAT:1979400 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1180
-