Analysis

  • max time kernel
    4294211s
  • max time network
    158s
  • platform
    windows7_x64
  • resource
    win7-20220310-en
  • submitted
    15-03-2022 14:05

General

  • Target

    520636dbbdc33d8dbdf1b14f043b46f8.exe

  • Size

    252KB

  • MD5

    520636dbbdc33d8dbdf1b14f043b46f8

  • SHA1

    20eec5615c4ecca3603f889bccf975c855fa7a07

  • SHA256

    bd8aa280646a2b601ccbd5cec125d51646624d34005eb7db56da6b70fda821cb

  • SHA512

    fc3869cf9a917b21e16f2f7150dbf78227c4e52a4f73a3b572555f38b2ae51358f32d0af7e08dc944529a1ed931f4cd09c694a92ad6b5680de58c4a2149077b6

Score
10/10

Malware Config

Extracted

Family

gozi_rm3

Attributes
  • build

    300994

Signatures

  • Gozi RM3

    A heavily modified version of Gozi using RM3 loader.

  • Deletes itself 1 IoCs
  • Uses Tor communications 1 TTPs

    Malware can proxy its traffic through Tor for more anonymity.

  • Drops file in System32 directory 3 IoCs
  • Delays execution with timeout.exe 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 51 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 11 IoCs
  • Suspicious use of SetWindowsHookEx 44 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1264
      • C:\Users\Admin\AppData\Local\Temp\520636dbbdc33d8dbdf1b14f043b46f8.exe
        "C:\Users\Admin\AppData\Local\Temp\520636dbbdc33d8dbdf1b14f043b46f8.exe"
        2⤵
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:1992
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /c start /min forfiles /c "cmd /k @path -ec aQBlAHgAIAAoAGcAcAAgACcASABLAEMAVQA6AFwAUwBvAGYAdAB3AGEAcgBlAFwATQBvAGQAZQBhAHIAYwBoAGkAdgBlACcAKQAuAFMA & exit" /p C:\Windows\system32 /s /m po*l.e*e
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1736
        • C:\Windows\system32\forfiles.exe
          forfiles /c "cmd /k @path -ec aQBlAHgAIAAoAGcAcAAgACcASABLAEMAVQA6AFwAUwBvAGYAdAB3AGEAcgBlAFwATQBvAGQAZQBhAHIAYwBoAGkAdgBlACcAKQAuAFMA & exit" /p C:\Windows\system32 /s /m po*l.e*e
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1356
          • C:\Windows\system32\cmd.exe
            /k "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" -ec aQBlAHgAIAAoAGcAcAAgACcASABLAEMAVQA6AFwAUwBvAGYAdAB3AGEAcgBlAFwATQBvAGQAZQBhAHIAYwBoAGkAdgBlACcAKQAuAFMA & exit
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:756
            • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
              C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe -ec aQBlAHgAIAAoAGcAcAAgACcASABLAEMAVQA6AFwAUwBvAGYAdAB3AGEAcgBlAFwATQBvAGQAZQBhAHIAYwBoAGkAdgBlACcAKQAuAFMA
              5⤵
              • Drops file in System32 directory
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious behavior: MapViewOfSection
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1912
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -E JwBwAGEAcgBhAG0AKAAkAG8AdgB0AHMAbAB5ACkAOwBbAFMAeQBzAHQAZQBtAC4AQwBvAG4AdgBlAHIAdABdADoAOgBGAHIAbwBtAEIAYQBzAGUANgA0AFMAdAByAGkAbgBnACgAJABvAHYAdABzAGwAeQApACcA
                6⤵
                • Drops file in System32 directory
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:1404
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -E JwBwAGEAcgBhAG0AKAAkAHAAYgBmAG0AYwBnAHQAcwB1AGYAbQApADsAWwBTAHkAcwB0AGUAbQAuAFQAZQB4AHQALgBFAG4AYwBvAGQAaQBuAGcAXQA6ADoAQQBTAEMASQBJAC4ARwBlAHQAUwB0AHIAaQBuAGcAKAAkAHAAYgBmAG0AYwBnAHQAcwB1AGYAbQApACcA
                6⤵
                • Drops file in System32 directory
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:592
              • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe
                "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\osypmjrv.cmdline"
                6⤵
                • Suspicious use of WriteProcessMemory
                PID:1932
                • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                  C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA842.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCA841.tmp"
                  7⤵
                    PID:1076
                • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe
                  "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\oza3_e8q.cmdline"
                  6⤵
                  • Suspicious use of WriteProcessMemory
                  PID:1948
                  • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                    C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA91C.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCA91B.tmp"
                    7⤵
                      PID:1524
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /C timeout /t 5 && del "C:\USERS\ADMIN\APPDATA\LOCAL\TEMP\520636DBBDC33D8DBDF1B14F043B46F8.EXE"
            2⤵
            • Deletes itself
            • Suspicious use of WriteProcessMemory
            PID:1788
            • C:\Windows\system32\timeout.exe
              timeout /t 5
              3⤵
              • Delays execution with timeout.exe
              PID:1636
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
          1⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1936
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1936 CREDAT:275457 /prefetch:2
            2⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:1012
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1936 CREDAT:996356 /prefetch:2
            2⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:984

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/592-97-0x000000000297B000-0x000000000299A000-memory.dmp

          Filesize

          124KB

        • memory/592-96-0x000000001B750000-0x000000001BA4F000-memory.dmp

          Filesize

          3.0MB

        • memory/592-95-0x0000000002974000-0x0000000002977000-memory.dmp

          Filesize

          12KB

        • memory/592-94-0x0000000002972000-0x0000000002974000-memory.dmp

          Filesize

          8KB

        • memory/592-93-0x000007FEF50D0000-0x000007FEF5A6D000-memory.dmp

          Filesize

          9.6MB

        • memory/592-91-0x000007FEF50D0000-0x000007FEF5A6D000-memory.dmp

          Filesize

          9.6MB

        • memory/592-92-0x0000000002970000-0x0000000002972000-memory.dmp

          Filesize

          8KB

        • memory/592-90-0x000007FEF2C60000-0x000007FEF37BD000-memory.dmp

          Filesize

          11.4MB

        • memory/1264-110-0x0000000002AD0000-0x0000000002AE5000-memory.dmp

          Filesize

          84KB

        • memory/1264-633-0x0000000002640000-0x0000000002655000-memory.dmp

          Filesize

          84KB

        • memory/1404-84-0x000007FEF50D0000-0x000007FEF5A6D000-memory.dmp

          Filesize

          9.6MB

        • memory/1404-80-0x000007FEF2C60000-0x000007FEF37BD000-memory.dmp

          Filesize

          11.4MB

        • memory/1404-86-0x0000000002302000-0x0000000002304000-memory.dmp

          Filesize

          8KB

        • memory/1404-85-0x000000000230B000-0x000000000232A000-memory.dmp

          Filesize

          124KB

        • memory/1404-87-0x0000000002304000-0x0000000002307000-memory.dmp

          Filesize

          12KB

        • memory/1404-83-0x0000000002300000-0x0000000002302000-memory.dmp

          Filesize

          8KB

        • memory/1404-82-0x000007FEF50D0000-0x000007FEF5A6D000-memory.dmp

          Filesize

          9.6MB

        • memory/1912-76-0x0000000002834000-0x0000000002837000-memory.dmp

          Filesize

          12KB

        • memory/1912-73-0x000007FEF50D0000-0x000007FEF5A6D000-memory.dmp

          Filesize

          9.6MB

        • memory/1912-109-0x0000000002910000-0x0000000002923000-memory.dmp

          Filesize

          76KB

        • memory/1912-72-0x000007FEF2C60000-0x000007FEF37BD000-memory.dmp

          Filesize

          11.4MB

        • memory/1912-71-0x000007FEFB7F1000-0x000007FEFB7F3000-memory.dmp

          Filesize

          8KB

        • memory/1912-81-0x000000000283B000-0x000000000285A000-memory.dmp

          Filesize

          124KB

        • memory/1912-75-0x0000000002832000-0x0000000002834000-memory.dmp

          Filesize

          8KB

        • memory/1912-74-0x0000000002830000-0x0000000002832000-memory.dmp

          Filesize

          8KB

        • memory/1932-100-0x00000000022F0000-0x00000000022F2000-memory.dmp

          Filesize

          8KB

        • memory/1992-54-0x000000000040E000-0x0000000000419000-memory.dmp

          Filesize

          44KB

        • memory/1992-65-0x0000000000260000-0x0000000000262000-memory.dmp

          Filesize

          8KB

        • memory/1992-64-0x0000000001000000-0x000000000106F000-memory.dmp

          Filesize

          444KB

        • memory/1992-58-0x0000000000230000-0x0000000000240000-memory.dmp

          Filesize

          64KB

        • memory/1992-57-0x0000000075041000-0x0000000075043000-memory.dmp

          Filesize

          8KB

        • memory/1992-77-0x0000000000260000-0x000000000027A000-memory.dmp

          Filesize

          104KB

        • memory/1992-56-0x0000000000220000-0x000000000022C000-memory.dmp

          Filesize

          48KB

        • memory/1992-55-0x000000000040E000-0x0000000000419000-memory.dmp

          Filesize

          44KB