Malware Analysis Report

2025-08-06 04:28

Sample ID 220321-j41trsacf8
Target e452ff5c5820666acd2ed6e4f428cd1c6d6bcbcb717899452bdbf0a714457dc3
SHA256 e452ff5c5820666acd2ed6e4f428cd1c6d6bcbcb717899452bdbf0a714457dc3
Tags
gozi_ifsb 7613 banker trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

e452ff5c5820666acd2ed6e4f428cd1c6d6bcbcb717899452bdbf0a714457dc3

Threat Level: Known bad

The file e452ff5c5820666acd2ed6e4f428cd1c6d6bcbcb717899452bdbf0a714457dc3 was found to be: Known bad.

Malicious Activity Summary

gozi_ifsb 7613 banker trojan

Gozi, Gozi IFSB

Drops file in Windows directory

Suspicious use of WriteProcessMemory

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2022-03-21 08:14

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2022-03-21 08:14

Reported

2022-03-21 08:16

Platform

win7-20220310-en

Max time kernel

4294180s

Max time network

127s

Command Line

regsvr32 /s C:\Users\Admin\AppData\Local\Temp\e452ff5c5820666acd2ed6e4f428cd1c6d6bcbcb717899452bdbf0a714457dc3.dll

Signatures

Gozi, Gozi IFSB

banker trojan gozi_ifsb

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1752 wrote to memory of 1764 N/A C:\Windows\system32\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe
PID 1752 wrote to memory of 1764 N/A C:\Windows\system32\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe
PID 1752 wrote to memory of 1764 N/A C:\Windows\system32\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe
PID 1752 wrote to memory of 1764 N/A C:\Windows\system32\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe
PID 1752 wrote to memory of 1764 N/A C:\Windows\system32\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe
PID 1752 wrote to memory of 1764 N/A C:\Windows\system32\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe
PID 1752 wrote to memory of 1764 N/A C:\Windows\system32\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe

Processes

C:\Windows\system32\regsvr32.exe

regsvr32 /s C:\Users\Admin\AppData\Local\Temp\e452ff5c5820666acd2ed6e4f428cd1c6d6bcbcb717899452bdbf0a714457dc3.dll

C:\Windows\SysWOW64\regsvr32.exe

/s C:\Users\Admin\AppData\Local\Temp\e452ff5c5820666acd2ed6e4f428cd1c6d6bcbcb717899452bdbf0a714457dc3.dll

Network

N/A

Files

memory/1752-54-0x000007FEFC511000-0x000007FEFC513000-memory.dmp

memory/1764-55-0x0000000076AE1000-0x0000000076AE3000-memory.dmp

memory/1764-56-0x0000000000220000-0x0000000000257000-memory.dmp

memory/1764-57-0x0000000074CD0000-0x0000000074F7B000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2022-03-21 08:14

Reported

2022-03-21 08:17

Platform

win10v2004-20220310-en

Max time kernel

163s

Max time network

167s

Command Line

regsvr32 /s C:\Users\Admin\AppData\Local\Temp\e452ff5c5820666acd2ed6e4f428cd1c6d6bcbcb717899452bdbf0a714457dc3.dll

Signatures

Gozi, Gozi IFSB

banker trojan gozi_ifsb

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\SoftwareDistribution\Download\9d6172fa1dc41a48846593219fc6519f\Cmn5TH6S2lFFnfMN8MLr2EoNUIAGzQo2UUjHGMEC99A= C:\Windows\System32\svchost.exe N/A
File opened for modification C:\Windows\SoftwareDistribution\Download\7752a73587b3362d505a041fe7f69ecd\BITC49A.tmp C:\Windows\System32\svchost.exe N/A
File opened for modification C:\Windows\SoftwareDistribution\Download\17087e6e4710e63df4fcd8834f70bc99\a3f602ea4d534d006919a2613d91f9506b383314 C:\Windows\System32\svchost.exe N/A
File opened for modification C:\Windows\SoftwareDistribution\Download\ca4af4339884f7018bf988ecac7702ff\BITC18B.tmp C:\Windows\System32\svchost.exe N/A
File opened for modification C:\Windows\SoftwareDistribution\Download\ca4af4339884f7018bf988ecac7702ff\612ad442b8740f4c57b8c84e6bf465ba4699118c C:\Windows\System32\svchost.exe N/A
File opened for modification C:\Windows\SoftwareDistribution\Download\ca4af4339884f7018bf988ecac7702ff\BITCF98.tmp C:\Windows\System32\svchost.exe N/A
File opened for modification C:\Windows\SoftwareDistribution\Download\7752a73587b3362d505a041fe7f69ecd\BITC5B4.tmp C:\Windows\System32\svchost.exe N/A
File opened for modification C:\Windows\SoftwareDistribution\Download\9d6172fa1dc41a48846593219fc6519f\BITD2D9.tmp C:\Windows\System32\svchost.exe N/A
File opened for modification C:\Windows\SoftwareDistribution\Download\9d6172fa1dc41a48846593219fc6519f\BITD471.tmp C:\Windows\System32\svchost.exe N/A
File opened for modification C:\Windows\SoftwareDistribution\Download\d60cb501610b6a66743c55eade3ef996\BITD4C0.tmp C:\Windows\System32\svchost.exe N/A
File opened for modification C:\Windows\SoftwareDistribution\Download\7752a73587b3362d505a041fe7f69ecd\F2WKV54ysEMEW9U+EfiUeJcNcgfNL4pMC5NmE0a3mAg= C:\Windows\System32\svchost.exe N/A
File opened for modification C:\Windows\SoftwareDistribution\Download\d60cb501610b6a66743c55eade3ef996\CsA9z1\SlUHUPO8bKnA\BITB0C0.tmp C:\Windows\System32\svchost.exe N/A
File opened for modification C:\Windows\SoftwareDistribution\Download\ca4af4339884f7018bf988ecac7702ff\BITC218.tmp C:\Windows\System32\svchost.exe N/A
File opened for modification C:\Windows\SoftwareDistribution\Download\7752a73587b3362d505a041fe7f69ecd\BITE045.tmp C:\Windows\System32\svchost.exe N/A
File opened for modification C:\Windows\SoftwareDistribution\Download\d60cb501610b6a66743c55eade3ef996\BITB219.tmp C:\Windows\System32\svchost.exe N/A
File opened for modification C:\Windows\SoftwareDistribution\Download\ca4af4339884f7018bf988ecac7702ff\BITD016.tmp C:\Windows\System32\svchost.exe N/A
File opened for modification C:\Windows\SoftwareDistribution\Download\17087e6e4710e63df4fcd8834f70bc99\pj5OoD7hJ+dBGy+3XOjLT8WsuYwervv\LZOCjtiHKk8= C:\Windows\System32\svchost.exe N/A
File opened for modification C:\Windows\SoftwareDistribution\Download\17087e6e4710e63df4fcd8834f70bc99\pj5OoD7hJ+dBGy+3XOjLT8WsuYwervv\BIT3E7C.tmp C:\Windows\System32\svchost.exe N/A
File opened for modification C:\Windows\SoftwareDistribution\Download\17087e6e4710e63df4fcd8834f70bc99\BIT3F48.tmp C:\Windows\System32\svchost.exe N/A
File opened for modification C:\Windows\SoftwareDistribution\Download\ca4af4339884f7018bf988ecac7702ff\9+dL4Puh6FM8puPxsBEX86BMeGqpuC0b7gf2fD9DLLo= C:\Windows\System32\svchost.exe N/A
File opened for modification C:\Windows\SoftwareDistribution\Download\d60cb501610b6a66743c55eade3ef996\CsA9z1\SlUHUPO8bKnA\BITD403.tmp C:\Windows\System32\svchost.exe N/A
File opened for modification C:\Windows\SoftwareDistribution\Download\d60cb501610b6a66743c55eade3ef996\CsA9z1\SlUHUPO8bKnA\5ondRmJ90JlkPETuN535TWk= C:\Windows\System32\svchost.exe N/A
File opened for modification C:\Windows\SoftwareDistribution\Download\9d6172fa1dc41a48846593219fc6519f\e1a85885fd4453165061351651289cce8f8590c4 C:\Windows\System32\svchost.exe N/A
File opened for modification C:\Windows\SoftwareDistribution\Download\17087e6e4710e63df4fcd8834f70bc99\pj5OoD7hJ+dBGy+3XOjLT8WsuYwervv\BIT1063.tmp C:\Windows\System32\svchost.exe N/A
File opened for modification C:\Windows\SoftwareDistribution\Download\7752a73587b3362d505a041fe7f69ecd\af66e12c1bb9d8519da21259d0fcd88c247cb4f1 C:\Windows\System32\svchost.exe N/A
File opened for modification C:\Windows\SoftwareDistribution\Download\7752a73587b3362d505a041fe7f69ecd\BITDFC7.tmp C:\Windows\System32\svchost.exe N/A
File opened for modification C:\Windows\SoftwareDistribution\Download\d60cb501610b6a66743c55eade3ef996\f3535a3b47819a04c6d5ee18905493be086e801e C:\Windows\System32\svchost.exe N/A
File opened for modification C:\Windows\SoftwareDistribution\Download\17087e6e4710e63df4fcd8834f70bc99\BIT1110.tmp C:\Windows\System32\svchost.exe N/A
File opened for modification C:\Windows\SoftwareDistribution\Download\9d6172fa1dc41a48846593219fc6519f\BIT3487.tmp C:\Windows\System32\svchost.exe N/A
File opened for modification C:\Windows\SoftwareDistribution\Download\9d6172fa1dc41a48846593219fc6519f\BIT3592.tmp C:\Windows\System32\svchost.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3868 wrote to memory of 3564 N/A C:\Windows\system32\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe
PID 3868 wrote to memory of 3564 N/A C:\Windows\system32\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe
PID 3868 wrote to memory of 3564 N/A C:\Windows\system32\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe

Processes

C:\Windows\system32\regsvr32.exe

regsvr32 /s C:\Users\Admin\AppData\Local\Temp\e452ff5c5820666acd2ed6e4f428cd1c6d6bcbcb717899452bdbf0a714457dc3.dll

C:\Windows\SysWOW64\regsvr32.exe

/s C:\Users\Admin\AppData\Local\Temp\e452ff5c5820666acd2ed6e4f428cd1c6d6bcbcb717899452bdbf0a714457dc3.dll

C:\Windows\System32\svchost.exe

C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k appmodel -p -s camsvc

Network

Country Destination Domain Proto
US 93.184.220.29:80 tcp
US 8.8.8.8:53 licensing.mp.microsoft.com udp
US 20.96.63.25:443 licensing.mp.microsoft.com tcp
US 8.8.8.8:53 storesdk.dsx.mp.microsoft.com udp
NL 104.80.225.205:443 storesdk.dsx.mp.microsoft.com tcp
NL 8.238.21.254:80 tcp
US 8.8.8.8:53 licensing.mp.microsoft.com udp
US 20.223.25.224:443 licensing.mp.microsoft.com tcp
US 20.223.25.224:443 licensing.mp.microsoft.com tcp
US 20.223.25.224:443 licensing.mp.microsoft.com tcp
US 8.8.8.8:53 store-images.s-microsoft.com udp
NL 104.123.41.133:80 store-images.s-microsoft.com tcp
NL 104.123.41.133:80 store-images.s-microsoft.com tcp
NL 104.123.41.133:80 store-images.s-microsoft.com tcp
US 8.8.8.8:53 licensing.mp.microsoft.com udp
US 20.96.63.25:443 licensing.mp.microsoft.com tcp
NL 104.123.41.133:80 store-images.s-microsoft.com tcp
NL 104.123.41.133:80 store-images.s-microsoft.com tcp
US 8.8.8.8:53 tsfe.trafficshaping.dsp.mp.microsoft.com udp
IE 20.54.110.119:443 tsfe.trafficshaping.dsp.mp.microsoft.com tcp
US 8.8.8.8:53 dl.delivery.mp.microsoft.com udp
NL 87.248.202.1:80 dl.delivery.mp.microsoft.com tcp
NL 87.248.202.1:80 dl.delivery.mp.microsoft.com tcp
NL 87.248.202.1:80 dl.delivery.mp.microsoft.com tcp
NL 87.248.202.1:80 dl.delivery.mp.microsoft.com tcp
US 8.8.8.8:53 tlu.dl.delivery.mp.microsoft.com udp
US 209.197.3.8:80 tlu.dl.delivery.mp.microsoft.com tcp
US 209.197.3.8:80 tlu.dl.delivery.mp.microsoft.com tcp
US 209.197.3.8:80 tlu.dl.delivery.mp.microsoft.com tcp
US 209.197.3.8:80 tlu.dl.delivery.mp.microsoft.com tcp
US 8.8.8.8:53 11.tlu.dl.delivery.mp.microsoft.com udp
US 93.184.221.240:80 11.tlu.dl.delivery.mp.microsoft.com tcp
US 20.96.63.25:443 licensing.mp.microsoft.com tcp
IE 20.54.110.119:443 tsfe.trafficshaping.dsp.mp.microsoft.com tcp
US 8.8.8.8:53 dl.delivery.mp.microsoft.com udp
NL 87.248.202.1:80 dl.delivery.mp.microsoft.com tcp
NL 87.248.202.1:80 dl.delivery.mp.microsoft.com tcp
US 209.197.3.8:80 tlu.dl.delivery.mp.microsoft.com tcp
US 209.197.3.8:80 tlu.dl.delivery.mp.microsoft.com tcp
US 8.8.8.8:53 dl.delivery.mp.microsoft.com udp
US 209.197.3.8:80 dl.delivery.mp.microsoft.com tcp
US 209.197.3.8:80 dl.delivery.mp.microsoft.com tcp
US 209.197.3.8:80 dl.delivery.mp.microsoft.com tcp
US 209.197.3.8:80 dl.delivery.mp.microsoft.com tcp
US 8.8.8.8:53 2.tlu.dl.delivery.mp.microsoft.com udp
NL 23.50.56.104:80 2.tlu.dl.delivery.mp.microsoft.com tcp
US 209.197.3.8:80 dl.delivery.mp.microsoft.com tcp
US 209.197.3.8:80 dl.delivery.mp.microsoft.com tcp
US 209.197.3.8:80 dl.delivery.mp.microsoft.com tcp
US 209.197.3.8:80 dl.delivery.mp.microsoft.com tcp
US 13.107.21.200:443 tcp
US 8.8.8.8:53 dl.delivery.mp.microsoft.com udp
US 13.107.4.50:80 dl.delivery.mp.microsoft.com tcp
US 13.107.4.50:80 dl.delivery.mp.microsoft.com tcp
US 8.8.8.8:53 tlu.dl.delivery.mp.microsoft.com udp
US 209.197.3.8:80 tlu.dl.delivery.mp.microsoft.com tcp
US 209.197.3.8:80 tlu.dl.delivery.mp.microsoft.com tcp
US 13.107.4.50:80 dl.delivery.mp.microsoft.com tcp
US 13.107.4.50:80 dl.delivery.mp.microsoft.com tcp
US 209.197.3.8:80 tlu.dl.delivery.mp.microsoft.com tcp
US 209.197.3.8:80 tlu.dl.delivery.mp.microsoft.com tcp
US 13.107.4.50:80 dl.delivery.mp.microsoft.com tcp
US 13.107.4.50:80 dl.delivery.mp.microsoft.com tcp
US 209.197.3.8:80 tlu.dl.delivery.mp.microsoft.com tcp
US 209.197.3.8:80 tlu.dl.delivery.mp.microsoft.com tcp
US 13.107.4.50:80 dl.delivery.mp.microsoft.com tcp
US 13.107.4.50:80 dl.delivery.mp.microsoft.com tcp
US 209.197.3.8:80 tlu.dl.delivery.mp.microsoft.com tcp
US 209.197.3.8:80 tlu.dl.delivery.mp.microsoft.com tcp
US 8.8.8.8:53 dl.delivery.mp.microsoft.com udp
US 209.197.3.8:80 dl.delivery.mp.microsoft.com tcp
US 209.197.3.8:80 dl.delivery.mp.microsoft.com tcp
US 209.197.3.8:80 dl.delivery.mp.microsoft.com tcp
US 209.197.3.8:80 dl.delivery.mp.microsoft.com tcp

Files

memory/3564-134-0x0000000001420000-0x0000000001457000-memory.dmp

memory/3564-135-0x0000000075140000-0x00000000753EB000-memory.dmp

memory/3856-136-0x0000025646950000-0x0000025646960000-memory.dmp

memory/3856-137-0x0000025647360000-0x0000025647370000-memory.dmp

memory/3856-138-0x00000256498D0000-0x00000256498D4000-memory.dmp

memory/3856-139-0x0000025649C50000-0x0000025649C54000-memory.dmp

memory/3856-140-0x0000025649C50000-0x0000025649C54000-memory.dmp

memory/3856-141-0x0000025649C80000-0x0000025649C84000-memory.dmp

memory/3856-142-0x0000025649960000-0x0000025649961000-memory.dmp

memory/3856-143-0x0000025649D80000-0x0000025649D84000-memory.dmp

memory/3856-144-0x0000025649D80000-0x0000025649D84000-memory.dmp

memory/3856-145-0x0000025649DB0000-0x0000025649DB4000-memory.dmp