Analysis

  • max time kernel
    119s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    01-02-2022 08:55

General

  • Target

    e655f1afb49be062cded5683df9292ff4cd602ad5d6f648dddd8778af13c44e2.exe

  • Size

    142KB

  • MD5

    43e346d3b7f7122ea578e988ee20cc6b

  • SHA1

    62aec92a3b5f2f11da0fe34a4f47fda72d46d4a6

  • SHA256

    e655f1afb49be062cded5683df9292ff4cd602ad5d6f648dddd8778af13c44e2

  • SHA512

    22e08ea29e440c6b6bf5ef50b8b9d07ea550d74444e59a491076b50c1fdc949fb925cc3ed73dd53721bd3180be9cb6a57755431146f15079dd2de79a1e6f4ee5

Malware Config

Extracted

Family

gozi_ifsb

Botnet

5500

C2

df1.kamalak.at/wpx

api3.lamanak.at/wpx

Attributes
  • build

    250143

  • dga_base_url

    constitution.org/usdeclar.txt

  • dga_crc

    0x4eb7d2ca

  • dga_season

    10

  • dga_tlds

    com

    ru

    org

  • exe_type

    loader

  • server_id

    120

rsa_pubkey.plain
serpent.plain

Signatures

  • Gozi, Gozi IFSB

    Gozi ISFB is a well-known and widely distributed banking trojan.

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e655f1afb49be062cded5683df9292ff4cd602ad5d6f648dddd8778af13c44e2.exe
    "C:\Users\Admin\AppData\Local\Temp\e655f1afb49be062cded5683df9292ff4cd602ad5d6f648dddd8778af13c44e2.exe"
    1⤵
      PID:1464
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1368
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1368 CREDAT:275457 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:428
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1228
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1228 CREDAT:275457 /prefetch:2
        2⤵
        • Suspicious use of SetWindowsHookEx
        PID:1952
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:296
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:296 CREDAT:275457 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:744

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1464-55-0x0000000075F81000-0x0000000075F83000-memory.dmp
      Filesize

      8KB

    • memory/1464-56-0x0000000000870000-0x0000000000872000-memory.dmp
      Filesize

      8KB

    • memory/1464-58-0x0000000000360000-0x0000000000361000-memory.dmp
      Filesize

      4KB

    • memory/1464-57-0x0000000000400000-0x0000000000435000-memory.dmp
      Filesize

      212KB

    • memory/1464-59-0x00000000003B0000-0x00000000003C0000-memory.dmp
      Filesize

      64KB