Analysis Overview
SHA256
54ea3470b7b6a4653c7253a874118971b842c3d38dcca7f65f3ec4446b63dff9
Threat Level: Known bad
The file 54ea3470b7b6a4653c7253a874118971b842c3d38dcca7f65f3ec4446b63dff9 was found to be: Known bad.
Malicious Activity Summary
Gozi, Gozi IFSB
Program crash
Suspicious use of WriteProcessMemory
MITRE ATT&CK
Analysis: static1
Detonation Overview
Reported
2022-03-19 08:58
Signatures
Analysis: behavioral1
Detonation Overview
Submitted
2022-03-19 08:58
Reported
2022-03-19 09:23
Platform
win7-20220311-en
Max time kernel
4294181s
Max time network
135s
Command Line
Signatures
Gozi, Gozi IFSB
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 572 wrote to memory of 596 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 572 wrote to memory of 596 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 572 wrote to memory of 596 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 572 wrote to memory of 596 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 572 wrote to memory of 596 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 572 wrote to memory of 596 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 572 wrote to memory of 596 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\54ea3470b7b6a4653c7253a874118971b842c3d38dcca7f65f3ec4446b63dff9.dll,#1
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\54ea3470b7b6a4653c7253a874118971b842c3d38dcca7f65f3ec4446b63dff9.dll,#1
Network
Files
memory/596-54-0x0000000075561000-0x0000000075563000-memory.dmp
memory/596-56-0x0000000000130000-0x000000000013F000-memory.dmp
memory/596-55-0x0000000000130000-0x000000000013F000-memory.dmp
memory/596-57-0x0000000000190000-0x00000000001CD000-memory.dmp
memory/596-58-0x0000000000130000-0x000000000013F000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2022-03-19 08:58
Reported
2022-03-19 09:23
Platform
win10v2004-en-20220113
Max time kernel
94s
Max time network
169s
Command Line
Signatures
Gozi, Gozi IFSB
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Windows\SysWOW64\rundll32.exe |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 4920 wrote to memory of 4304 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 4920 wrote to memory of 4304 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 4920 wrote to memory of 4304 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\54ea3470b7b6a4653c7253a874118971b842c3d38dcca7f65f3ec4446b63dff9.dll,#1
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\54ea3470b7b6a4653c7253a874118971b842c3d38dcca7f65f3ec4446b63dff9.dll,#1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4304 -ip 4304
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 4304 -s 620
Network
| Country | Destination | Domain | Proto |
| NL | 104.110.191.133:80 | tcp |
Files
memory/4304-130-0x0000000002740000-0x000000000277D000-memory.dmp
memory/4304-131-0x0000000000BE0000-0x0000000000BEF000-memory.dmp