Analysis Overview
SHA256
e452ff5c5820666acd2ed6e4f428cd1c6d6bcbcb717899452bdbf0a714457dc3
Threat Level: Known bad
The file e452ff5c5820666acd2ed6e4f428cd1c6d6bcbcb717899452bdbf0a714457dc3 was found to be: Known bad.
Malicious Activity Summary
Gozi, Gozi IFSB
Drops file in Windows directory
Suspicious use of WriteProcessMemory
MITRE ATT&CK
Analysis: static1
Detonation Overview
Reported
2022-03-21 08:14
Signatures
Analysis: behavioral1
Detonation Overview
Submitted
2022-03-21 08:14
Reported
2022-03-21 08:16
Platform
win7-20220310-en
Max time kernel
4294180s
Max time network
127s
Command Line
Signatures
Gozi, Gozi IFSB
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 1752 wrote to memory of 1764 | N/A | C:\Windows\system32\regsvr32.exe | C:\Windows\SysWOW64\regsvr32.exe |
| PID 1752 wrote to memory of 1764 | N/A | C:\Windows\system32\regsvr32.exe | C:\Windows\SysWOW64\regsvr32.exe |
| PID 1752 wrote to memory of 1764 | N/A | C:\Windows\system32\regsvr32.exe | C:\Windows\SysWOW64\regsvr32.exe |
| PID 1752 wrote to memory of 1764 | N/A | C:\Windows\system32\regsvr32.exe | C:\Windows\SysWOW64\regsvr32.exe |
| PID 1752 wrote to memory of 1764 | N/A | C:\Windows\system32\regsvr32.exe | C:\Windows\SysWOW64\regsvr32.exe |
| PID 1752 wrote to memory of 1764 | N/A | C:\Windows\system32\regsvr32.exe | C:\Windows\SysWOW64\regsvr32.exe |
| PID 1752 wrote to memory of 1764 | N/A | C:\Windows\system32\regsvr32.exe | C:\Windows\SysWOW64\regsvr32.exe |
Processes
C:\Windows\system32\regsvr32.exe
regsvr32 /s C:\Users\Admin\AppData\Local\Temp\e452ff5c5820666acd2ed6e4f428cd1c6d6bcbcb717899452bdbf0a714457dc3.dll
C:\Windows\SysWOW64\regsvr32.exe
/s C:\Users\Admin\AppData\Local\Temp\e452ff5c5820666acd2ed6e4f428cd1c6d6bcbcb717899452bdbf0a714457dc3.dll
Network
Files
memory/1752-54-0x000007FEFC511000-0x000007FEFC513000-memory.dmp
memory/1764-55-0x0000000076AE1000-0x0000000076AE3000-memory.dmp
memory/1764-56-0x0000000000220000-0x0000000000257000-memory.dmp
memory/1764-57-0x0000000074CD0000-0x0000000074F7B000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2022-03-21 08:14
Reported
2022-03-21 08:17
Platform
win10v2004-20220310-en
Max time kernel
163s
Max time network
167s
Command Line
Signatures
Gozi, Gozi IFSB
Drops file in Windows directory
| Description | Indicator | Process | Target |
| File opened for modification | C:\Windows\SoftwareDistribution\Download\9d6172fa1dc41a48846593219fc6519f\Cmn5TH6S2lFFnfMN8MLr2EoNUIAGzQo2UUjHGMEC99A= | C:\Windows\System32\svchost.exe | N/A |
| File opened for modification | C:\Windows\SoftwareDistribution\Download\7752a73587b3362d505a041fe7f69ecd\BITC49A.tmp | C:\Windows\System32\svchost.exe | N/A |
| File opened for modification | C:\Windows\SoftwareDistribution\Download\17087e6e4710e63df4fcd8834f70bc99\a3f602ea4d534d006919a2613d91f9506b383314 | C:\Windows\System32\svchost.exe | N/A |
| File opened for modification | C:\Windows\SoftwareDistribution\Download\ca4af4339884f7018bf988ecac7702ff\BITC18B.tmp | C:\Windows\System32\svchost.exe | N/A |
| File opened for modification | C:\Windows\SoftwareDistribution\Download\ca4af4339884f7018bf988ecac7702ff\612ad442b8740f4c57b8c84e6bf465ba4699118c | C:\Windows\System32\svchost.exe | N/A |
| File opened for modification | C:\Windows\SoftwareDistribution\Download\ca4af4339884f7018bf988ecac7702ff\BITCF98.tmp | C:\Windows\System32\svchost.exe | N/A |
| File opened for modification | C:\Windows\SoftwareDistribution\Download\7752a73587b3362d505a041fe7f69ecd\BITC5B4.tmp | C:\Windows\System32\svchost.exe | N/A |
| File opened for modification | C:\Windows\SoftwareDistribution\Download\9d6172fa1dc41a48846593219fc6519f\BITD2D9.tmp | C:\Windows\System32\svchost.exe | N/A |
| File opened for modification | C:\Windows\SoftwareDistribution\Download\9d6172fa1dc41a48846593219fc6519f\BITD471.tmp | C:\Windows\System32\svchost.exe | N/A |
| File opened for modification | C:\Windows\SoftwareDistribution\Download\d60cb501610b6a66743c55eade3ef996\BITD4C0.tmp | C:\Windows\System32\svchost.exe | N/A |
| File opened for modification | C:\Windows\SoftwareDistribution\Download\7752a73587b3362d505a041fe7f69ecd\F2WKV54ysEMEW9U+EfiUeJcNcgfNL4pMC5NmE0a3mAg= | C:\Windows\System32\svchost.exe | N/A |
| File opened for modification | C:\Windows\SoftwareDistribution\Download\d60cb501610b6a66743c55eade3ef996\CsA9z1\SlUHUPO8bKnA\BITB0C0.tmp | C:\Windows\System32\svchost.exe | N/A |
| File opened for modification | C:\Windows\SoftwareDistribution\Download\ca4af4339884f7018bf988ecac7702ff\BITC218.tmp | C:\Windows\System32\svchost.exe | N/A |
| File opened for modification | C:\Windows\SoftwareDistribution\Download\7752a73587b3362d505a041fe7f69ecd\BITE045.tmp | C:\Windows\System32\svchost.exe | N/A |
| File opened for modification | C:\Windows\SoftwareDistribution\Download\d60cb501610b6a66743c55eade3ef996\BITB219.tmp | C:\Windows\System32\svchost.exe | N/A |
| File opened for modification | C:\Windows\SoftwareDistribution\Download\ca4af4339884f7018bf988ecac7702ff\BITD016.tmp | C:\Windows\System32\svchost.exe | N/A |
| File opened for modification | C:\Windows\SoftwareDistribution\Download\17087e6e4710e63df4fcd8834f70bc99\pj5OoD7hJ+dBGy+3XOjLT8WsuYwervv\LZOCjtiHKk8= | C:\Windows\System32\svchost.exe | N/A |
| File opened for modification | C:\Windows\SoftwareDistribution\Download\17087e6e4710e63df4fcd8834f70bc99\pj5OoD7hJ+dBGy+3XOjLT8WsuYwervv\BIT3E7C.tmp | C:\Windows\System32\svchost.exe | N/A |
| File opened for modification | C:\Windows\SoftwareDistribution\Download\17087e6e4710e63df4fcd8834f70bc99\BIT3F48.tmp | C:\Windows\System32\svchost.exe | N/A |
| File opened for modification | C:\Windows\SoftwareDistribution\Download\ca4af4339884f7018bf988ecac7702ff\9+dL4Puh6FM8puPxsBEX86BMeGqpuC0b7gf2fD9DLLo= | C:\Windows\System32\svchost.exe | N/A |
| File opened for modification | C:\Windows\SoftwareDistribution\Download\d60cb501610b6a66743c55eade3ef996\CsA9z1\SlUHUPO8bKnA\BITD403.tmp | C:\Windows\System32\svchost.exe | N/A |
| File opened for modification | C:\Windows\SoftwareDistribution\Download\d60cb501610b6a66743c55eade3ef996\CsA9z1\SlUHUPO8bKnA\5ondRmJ90JlkPETuN535TWk= | C:\Windows\System32\svchost.exe | N/A |
| File opened for modification | C:\Windows\SoftwareDistribution\Download\9d6172fa1dc41a48846593219fc6519f\e1a85885fd4453165061351651289cce8f8590c4 | C:\Windows\System32\svchost.exe | N/A |
| File opened for modification | C:\Windows\SoftwareDistribution\Download\17087e6e4710e63df4fcd8834f70bc99\pj5OoD7hJ+dBGy+3XOjLT8WsuYwervv\BIT1063.tmp | C:\Windows\System32\svchost.exe | N/A |
| File opened for modification | C:\Windows\SoftwareDistribution\Download\7752a73587b3362d505a041fe7f69ecd\af66e12c1bb9d8519da21259d0fcd88c247cb4f1 | C:\Windows\System32\svchost.exe | N/A |
| File opened for modification | C:\Windows\SoftwareDistribution\Download\7752a73587b3362d505a041fe7f69ecd\BITDFC7.tmp | C:\Windows\System32\svchost.exe | N/A |
| File opened for modification | C:\Windows\SoftwareDistribution\Download\d60cb501610b6a66743c55eade3ef996\f3535a3b47819a04c6d5ee18905493be086e801e | C:\Windows\System32\svchost.exe | N/A |
| File opened for modification | C:\Windows\SoftwareDistribution\Download\17087e6e4710e63df4fcd8834f70bc99\BIT1110.tmp | C:\Windows\System32\svchost.exe | N/A |
| File opened for modification | C:\Windows\SoftwareDistribution\Download\9d6172fa1dc41a48846593219fc6519f\BIT3487.tmp | C:\Windows\System32\svchost.exe | N/A |
| File opened for modification | C:\Windows\SoftwareDistribution\Download\9d6172fa1dc41a48846593219fc6519f\BIT3592.tmp | C:\Windows\System32\svchost.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 3868 wrote to memory of 3564 | N/A | C:\Windows\system32\regsvr32.exe | C:\Windows\SysWOW64\regsvr32.exe |
| PID 3868 wrote to memory of 3564 | N/A | C:\Windows\system32\regsvr32.exe | C:\Windows\SysWOW64\regsvr32.exe |
| PID 3868 wrote to memory of 3564 | N/A | C:\Windows\system32\regsvr32.exe | C:\Windows\SysWOW64\regsvr32.exe |
Processes
C:\Windows\system32\regsvr32.exe
regsvr32 /s C:\Users\Admin\AppData\Local\Temp\e452ff5c5820666acd2ed6e4f428cd1c6d6bcbcb717899452bdbf0a714457dc3.dll
C:\Windows\SysWOW64\regsvr32.exe
/s C:\Users\Admin\AppData\Local\Temp\e452ff5c5820666acd2ed6e4f428cd1c6d6bcbcb717899452bdbf0a714457dc3.dll
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
C:\Windows\system32\svchost.exe
C:\Windows\system32\svchost.exe -k appmodel -p -s camsvc
Network
| Country | Destination | Domain | Proto |
| US | 93.184.220.29:80 | tcp | |
| US | 8.8.8.8:53 | licensing.mp.microsoft.com | udp |
| US | 20.96.63.25:443 | licensing.mp.microsoft.com | tcp |
| US | 8.8.8.8:53 | storesdk.dsx.mp.microsoft.com | udp |
| NL | 104.80.225.205:443 | storesdk.dsx.mp.microsoft.com | tcp |
| NL | 8.238.21.254:80 | tcp | |
| US | 8.8.8.8:53 | licensing.mp.microsoft.com | udp |
| US | 20.223.25.224:443 | licensing.mp.microsoft.com | tcp |
| US | 20.223.25.224:443 | licensing.mp.microsoft.com | tcp |
| US | 20.223.25.224:443 | licensing.mp.microsoft.com | tcp |
| US | 8.8.8.8:53 | store-images.s-microsoft.com | udp |
| NL | 104.123.41.133:80 | store-images.s-microsoft.com | tcp |
| NL | 104.123.41.133:80 | store-images.s-microsoft.com | tcp |
| NL | 104.123.41.133:80 | store-images.s-microsoft.com | tcp |
| US | 8.8.8.8:53 | licensing.mp.microsoft.com | udp |
| US | 20.96.63.25:443 | licensing.mp.microsoft.com | tcp |
| NL | 104.123.41.133:80 | store-images.s-microsoft.com | tcp |
| NL | 104.123.41.133:80 | store-images.s-microsoft.com | tcp |
| US | 8.8.8.8:53 | tsfe.trafficshaping.dsp.mp.microsoft.com | udp |
| IE | 20.54.110.119:443 | tsfe.trafficshaping.dsp.mp.microsoft.com | tcp |
| US | 8.8.8.8:53 | dl.delivery.mp.microsoft.com | udp |
| NL | 87.248.202.1:80 | dl.delivery.mp.microsoft.com | tcp |
| NL | 87.248.202.1:80 | dl.delivery.mp.microsoft.com | tcp |
| NL | 87.248.202.1:80 | dl.delivery.mp.microsoft.com | tcp |
| NL | 87.248.202.1:80 | dl.delivery.mp.microsoft.com | tcp |
| US | 8.8.8.8:53 | tlu.dl.delivery.mp.microsoft.com | udp |
| US | 209.197.3.8:80 | tlu.dl.delivery.mp.microsoft.com | tcp |
| US | 209.197.3.8:80 | tlu.dl.delivery.mp.microsoft.com | tcp |
| US | 209.197.3.8:80 | tlu.dl.delivery.mp.microsoft.com | tcp |
| US | 209.197.3.8:80 | tlu.dl.delivery.mp.microsoft.com | tcp |
| US | 8.8.8.8:53 | 11.tlu.dl.delivery.mp.microsoft.com | udp |
| US | 93.184.221.240:80 | 11.tlu.dl.delivery.mp.microsoft.com | tcp |
| US | 20.96.63.25:443 | licensing.mp.microsoft.com | tcp |
| IE | 20.54.110.119:443 | tsfe.trafficshaping.dsp.mp.microsoft.com | tcp |
| US | 8.8.8.8:53 | dl.delivery.mp.microsoft.com | udp |
| NL | 87.248.202.1:80 | dl.delivery.mp.microsoft.com | tcp |
| NL | 87.248.202.1:80 | dl.delivery.mp.microsoft.com | tcp |
| US | 209.197.3.8:80 | tlu.dl.delivery.mp.microsoft.com | tcp |
| US | 209.197.3.8:80 | tlu.dl.delivery.mp.microsoft.com | tcp |
| US | 8.8.8.8:53 | dl.delivery.mp.microsoft.com | udp |
| US | 209.197.3.8:80 | dl.delivery.mp.microsoft.com | tcp |
| US | 209.197.3.8:80 | dl.delivery.mp.microsoft.com | tcp |
| US | 209.197.3.8:80 | dl.delivery.mp.microsoft.com | tcp |
| US | 209.197.3.8:80 | dl.delivery.mp.microsoft.com | tcp |
| US | 8.8.8.8:53 | 2.tlu.dl.delivery.mp.microsoft.com | udp |
| NL | 23.50.56.104:80 | 2.tlu.dl.delivery.mp.microsoft.com | tcp |
| US | 209.197.3.8:80 | dl.delivery.mp.microsoft.com | tcp |
| US | 209.197.3.8:80 | dl.delivery.mp.microsoft.com | tcp |
| US | 209.197.3.8:80 | dl.delivery.mp.microsoft.com | tcp |
| US | 209.197.3.8:80 | dl.delivery.mp.microsoft.com | tcp |
| US | 13.107.21.200:443 | tcp | |
| US | 8.8.8.8:53 | dl.delivery.mp.microsoft.com | udp |
| US | 13.107.4.50:80 | dl.delivery.mp.microsoft.com | tcp |
| US | 13.107.4.50:80 | dl.delivery.mp.microsoft.com | tcp |
| US | 8.8.8.8:53 | tlu.dl.delivery.mp.microsoft.com | udp |
| US | 209.197.3.8:80 | tlu.dl.delivery.mp.microsoft.com | tcp |
| US | 209.197.3.8:80 | tlu.dl.delivery.mp.microsoft.com | tcp |
| US | 13.107.4.50:80 | dl.delivery.mp.microsoft.com | tcp |
| US | 13.107.4.50:80 | dl.delivery.mp.microsoft.com | tcp |
| US | 209.197.3.8:80 | tlu.dl.delivery.mp.microsoft.com | tcp |
| US | 209.197.3.8:80 | tlu.dl.delivery.mp.microsoft.com | tcp |
| US | 13.107.4.50:80 | dl.delivery.mp.microsoft.com | tcp |
| US | 13.107.4.50:80 | dl.delivery.mp.microsoft.com | tcp |
| US | 209.197.3.8:80 | tlu.dl.delivery.mp.microsoft.com | tcp |
| US | 209.197.3.8:80 | tlu.dl.delivery.mp.microsoft.com | tcp |
| US | 13.107.4.50:80 | dl.delivery.mp.microsoft.com | tcp |
| US | 13.107.4.50:80 | dl.delivery.mp.microsoft.com | tcp |
| US | 209.197.3.8:80 | tlu.dl.delivery.mp.microsoft.com | tcp |
| US | 209.197.3.8:80 | tlu.dl.delivery.mp.microsoft.com | tcp |
| US | 8.8.8.8:53 | dl.delivery.mp.microsoft.com | udp |
| US | 209.197.3.8:80 | dl.delivery.mp.microsoft.com | tcp |
| US | 209.197.3.8:80 | dl.delivery.mp.microsoft.com | tcp |
| US | 209.197.3.8:80 | dl.delivery.mp.microsoft.com | tcp |
| US | 209.197.3.8:80 | dl.delivery.mp.microsoft.com | tcp |
Files
memory/3564-134-0x0000000001420000-0x0000000001457000-memory.dmp
memory/3564-135-0x0000000075140000-0x00000000753EB000-memory.dmp
memory/3856-136-0x0000025646950000-0x0000025646960000-memory.dmp
memory/3856-137-0x0000025647360000-0x0000025647370000-memory.dmp
memory/3856-138-0x00000256498D0000-0x00000256498D4000-memory.dmp
memory/3856-139-0x0000025649C50000-0x0000025649C54000-memory.dmp
memory/3856-140-0x0000025649C50000-0x0000025649C54000-memory.dmp
memory/3856-141-0x0000025649C80000-0x0000025649C84000-memory.dmp
memory/3856-142-0x0000025649960000-0x0000025649961000-memory.dmp
memory/3856-143-0x0000025649D80000-0x0000025649D84000-memory.dmp
memory/3856-144-0x0000025649D80000-0x0000025649D84000-memory.dmp
memory/3856-145-0x0000025649DB0000-0x0000025649DB4000-memory.dmp