Malware Analysis Report

2025-08-06 04:27

Sample ID 220319-1wyg4safc9
Target a3860a3ec9d70ab45e93698d6806eec7607b1cfe8fbcb00ae12c256216d0e0ea
SHA256 a3860a3ec9d70ab45e93698d6806eec7607b1cfe8fbcb00ae12c256216d0e0ea
Tags
gozi_ifsb banker trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V6

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

a3860a3ec9d70ab45e93698d6806eec7607b1cfe8fbcb00ae12c256216d0e0ea

Threat Level: Known bad

The file a3860a3ec9d70ab45e93698d6806eec7607b1cfe8fbcb00ae12c256216d0e0ea was found to be: Known bad.

Malicious Activity Summary

gozi_ifsb banker trojan

Gozi, Gozi IFSB

Suspicious use of SetThreadContext

Program crash

Enumerates system info in registry

Suspicious behavior: MapViewOfSection

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2022-03-19 22:00

Signatures

N/A

Analysis: behavioral2

Detonation Overview

Submitted

2022-03-19 22:00

Reported

2022-03-20 08:52

Platform

win10v2004-en-20220113

Max time kernel

145s

Max time network

158s

Command Line

"C:\Users\Admin\AppData\Local\Temp\a3860a3ec9d70ab45e93698d6806eec7607b1cfe8fbcb00ae12c256216d0e0ea.exe"

Signatures

Gozi, Gozi IFSB

banker trojan gozi_ifsb

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 1160 set thread context of 2304 N/A C:\Users\Admin\AppData\Local\Temp\a3860a3ec9d70ab45e93698d6806eec7607b1cfe8fbcb00ae12c256216d0e0ea.exe C:\Windows\system32\tracert.exe

Enumerates system info in registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier C:\Users\Admin\AppData\Local\Temp\a3860a3ec9d70ab45e93698d6806eec7607b1cfe8fbcb00ae12c256216d0e0ea.exe N/A

Suspicious behavior: MapViewOfSection

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\a3860a3ec9d70ab45e93698d6806eec7607b1cfe8fbcb00ae12c256216d0e0ea.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\a3860a3ec9d70ab45e93698d6806eec7607b1cfe8fbcb00ae12c256216d0e0ea.exe

"C:\Users\Admin\AppData\Local\Temp\a3860a3ec9d70ab45e93698d6806eec7607b1cfe8fbcb00ae12c256216d0e0ea.exe"

C:\Windows\system32\tracert.exe

"C:\Windows\system32\tracert.exe"

Network

Country Destination Domain Proto
DE 46.20.33.219:443 tcp
NL 8.248.5.254:80 tcp
NL 8.248.5.254:80 tcp
DE 46.20.33.219:443 tcp
DE 46.20.33.219:443 tcp
DE 46.20.33.219:443 tcp
DE 46.20.33.219:443 tcp
DE 46.20.33.219:443 tcp
DE 46.20.33.219:443 tcp

Files

memory/1160-130-0x0000000000400000-0x0000000000478000-memory.dmp

memory/1160-131-0x0000000001050000-0x0000000001087000-memory.dmp

memory/2304-132-0x0000000000CF0000-0x0000000000CF1000-memory.dmp

memory/2304-133-0x0000000000C50000-0x0000000000CED000-memory.dmp

Analysis: behavioral1

Detonation Overview

Submitted

2022-03-19 22:00

Reported

2022-03-20 08:52

Platform

win7-20220311-en

Max time kernel

4294178s

Max time network

126s

Command Line

"C:\Users\Admin\AppData\Local\Temp\a3860a3ec9d70ab45e93698d6806eec7607b1cfe8fbcb00ae12c256216d0e0ea.exe"

Signatures

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 304 set thread context of 976 N/A C:\Users\Admin\AppData\Local\Temp\a3860a3ec9d70ab45e93698d6806eec7607b1cfe8fbcb00ae12c256216d0e0ea.exe C:\Windows\system32\tracert.exe

Program crash

Description Indicator Process Target
N/A N/A C:\Windows\system32\WerFault.exe C:\Windows\system32\tracert.exe

Enumerates system info in registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier C:\Users\Admin\AppData\Local\Temp\a3860a3ec9d70ab45e93698d6806eec7607b1cfe8fbcb00ae12c256216d0e0ea.exe N/A

Suspicious behavior: MapViewOfSection

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\a3860a3ec9d70ab45e93698d6806eec7607b1cfe8fbcb00ae12c256216d0e0ea.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 304 wrote to memory of 976 N/A C:\Users\Admin\AppData\Local\Temp\a3860a3ec9d70ab45e93698d6806eec7607b1cfe8fbcb00ae12c256216d0e0ea.exe C:\Windows\system32\tracert.exe
PID 304 wrote to memory of 976 N/A C:\Users\Admin\AppData\Local\Temp\a3860a3ec9d70ab45e93698d6806eec7607b1cfe8fbcb00ae12c256216d0e0ea.exe C:\Windows\system32\tracert.exe
PID 304 wrote to memory of 976 N/A C:\Users\Admin\AppData\Local\Temp\a3860a3ec9d70ab45e93698d6806eec7607b1cfe8fbcb00ae12c256216d0e0ea.exe C:\Windows\system32\tracert.exe
PID 304 wrote to memory of 976 N/A C:\Users\Admin\AppData\Local\Temp\a3860a3ec9d70ab45e93698d6806eec7607b1cfe8fbcb00ae12c256216d0e0ea.exe C:\Windows\system32\tracert.exe
PID 304 wrote to memory of 976 N/A C:\Users\Admin\AppData\Local\Temp\a3860a3ec9d70ab45e93698d6806eec7607b1cfe8fbcb00ae12c256216d0e0ea.exe C:\Windows\system32\tracert.exe
PID 304 wrote to memory of 976 N/A C:\Users\Admin\AppData\Local\Temp\a3860a3ec9d70ab45e93698d6806eec7607b1cfe8fbcb00ae12c256216d0e0ea.exe C:\Windows\system32\tracert.exe
PID 976 wrote to memory of 1472 N/A C:\Windows\system32\tracert.exe C:\Windows\system32\WerFault.exe
PID 976 wrote to memory of 1472 N/A C:\Windows\system32\tracert.exe C:\Windows\system32\WerFault.exe
PID 976 wrote to memory of 1472 N/A C:\Windows\system32\tracert.exe C:\Windows\system32\WerFault.exe
PID 304 wrote to memory of 976 N/A C:\Users\Admin\AppData\Local\Temp\a3860a3ec9d70ab45e93698d6806eec7607b1cfe8fbcb00ae12c256216d0e0ea.exe C:\Windows\system32\tracert.exe

Processes

C:\Users\Admin\AppData\Local\Temp\a3860a3ec9d70ab45e93698d6806eec7607b1cfe8fbcb00ae12c256216d0e0ea.exe

"C:\Users\Admin\AppData\Local\Temp\a3860a3ec9d70ab45e93698d6806eec7607b1cfe8fbcb00ae12c256216d0e0ea.exe"

C:\Windows\system32\tracert.exe

"C:\Windows\system32\tracert.exe"

C:\Windows\system32\WerFault.exe

C:\Windows\system32\WerFault.exe -u -p 976 -s 68

Network

N/A

Files

memory/304-54-0x0000000075DF1000-0x0000000075DF3000-memory.dmp

memory/976-55-0x0000000000180000-0x0000000000181000-memory.dmp

memory/304-57-0x0000000000400000-0x0000000000478000-memory.dmp

memory/304-58-0x0000000000B30000-0x0000000000B67000-memory.dmp