Analysis

  • max time kernel
    117s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    19-02-2022 21:45

General

  • Target

    a3c243afceb1fb38f25ae81816891d7d7c11ae76e80a43f31d2ceb9833f2f3df.exe

  • Size

    619KB

  • MD5

    a4a24a3daed6b4673884187b131c968b

  • SHA1

    b20661090b7305239d75209bac8d2179f648dcaa

  • SHA256

    a3c243afceb1fb38f25ae81816891d7d7c11ae76e80a43f31d2ceb9833f2f3df

  • SHA512

    3f49b3876921b41483b907066c9f1f6a61d3fe759219c2db8cb048473b94ba52ab064fcc7c4615da2e1b8056dedc93bf22ed865ff4df442e5ba5c43b1c6082dc

Malware Config

Extracted

Family

gootkit

Botnet

260319

C2

sillikogermin.com

feferturietan.com

manjuorlidnqo.com

chechelderpos.com

kalamindridro.com

Attributes
  • vendor_id

    260319

Signatures

  • Gootkit

    Gootkit is a banking trojan, where large parts are written in node.JS.

  • Deletes itself 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 8 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a3c243afceb1fb38f25ae81816891d7d7c11ae76e80a43f31d2ceb9833f2f3df.exe
    "C:\Users\Admin\AppData\Local\Temp\a3c243afceb1fb38f25ae81816891d7d7c11ae76e80a43f31d2ceb9833f2f3df.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:288
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\259396777.bat" "C:\Users\Admin\AppData\Local\Temp\a3c243afceb1fb38f25ae81816891d7d7c11ae76e80a43f31d2ceb9833f2f3df.exe""
      2⤵
      • Deletes itself
      • Suspicious use of WriteProcessMemory
      PID:664
      • C:\Windows\SysWOW64\attrib.exe
        attrib -r -s -h "C:\Users\Admin\AppData\Local\Temp\a3c243afceb1fb38f25ae81816891d7d7c11ae76e80a43f31d2ceb9833f2f3df.exe"
        3⤵
        • Views/modifies file attributes
        PID:276

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\259396777.bat

    MD5

    0e84a9b5fc7c9ff1e845aac9c30edac7

    SHA1

    6865c12cf70e38dec800e6d6ff85ecf40c96120f

    SHA256

    0a7b3d4daefe32fc65ff9969e2b702e4c174da951b617a84b3db3ac74c1443cd

    SHA512

    d70e821d178ecede717ce3edb5bcf9c6d34dfb7048695dc7bdf8b727521762cdc049e2534efa2734c7bc58395225640b11bb13d60788c9b0d06e9cff5008540e

  • memory/288-54-0x0000000075D61000-0x0000000075D63000-memory.dmp

    Filesize

    8KB

  • memory/288-55-0x0000000000E40000-0x0000000000E6C000-memory.dmp

    Filesize

    176KB

  • memory/288-56-0x0000000000E40000-0x0000000000EEE000-memory.dmp

    Filesize

    696KB

  • memory/288-58-0x0000000000090000-0x0000000000091000-memory.dmp

    Filesize

    4KB

  • memory/288-57-0x0000000000EB3000-0x0000000000EB8000-memory.dmp

    Filesize

    20KB