Malware Analysis Report

2025-08-05 13:07

Sample ID 220323-fyq6lacbhr
Target readme.exe
SHA256 42a1d2a7885898c85524a6b18550a9e01b86e5ad1c33af845b6ae1450ef69bfe
Tags
gozi_ifsb 7627 banker trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

42a1d2a7885898c85524a6b18550a9e01b86e5ad1c33af845b6ae1450ef69bfe

Threat Level: Known bad

The file readme.exe was found to be: Known bad.

Malicious Activity Summary

gozi_ifsb 7627 banker trojan

Gozi, Gozi IFSB

Suspicious use of WriteProcessMemory

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2022-03-23 05:17

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2022-03-23 05:17

Reported

2022-03-23 05:19

Platform

win7-20220310-en

Max time kernel

4294179s

Max time network

120s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\readme.dll,#1

Signatures

Gozi, Gozi IFSB

banker trojan gozi_ifsb

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1996 wrote to memory of 1976 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 1996 wrote to memory of 1976 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 1996 wrote to memory of 1976 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 1996 wrote to memory of 1976 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 1996 wrote to memory of 1976 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 1996 wrote to memory of 1976 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 1996 wrote to memory of 1976 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\readme.dll,#1

C:\Windows\SysWOW64\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\readme.dll,#1

Network

N/A

Files

memory/1976-54-0x0000000000000000-mapping.dmp

memory/1976-55-0x0000000075041000-0x0000000075043000-memory.dmp

memory/1976-56-0x0000000000110000-0x000000000011E000-memory.dmp

memory/1976-57-0x0000000000110000-0x000000000011E000-memory.dmp

memory/1976-59-0x0000000000110000-0x000000000011E000-memory.dmp

memory/1976-58-0x0000000000110000-0x000000000011E000-memory.dmp

memory/1976-60-0x00000000000F0000-0x00000000000FC000-memory.dmp

memory/1976-61-0x0000000000110000-0x000000000011E000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2022-03-23 05:17

Reported

2022-03-23 05:19

Platform

win10v2004-en-20220113

Max time kernel

145s

Max time network

148s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\readme.dll,#1

Signatures

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1032 wrote to memory of 2108 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 1032 wrote to memory of 2108 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 1032 wrote to memory of 2108 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\readme.dll,#1

C:\Windows\SysWOW64\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\readme.dll,#1

Network

Country Destination Domain Proto
NL 8.248.5.254:80 tcp
NL 8.248.5.254:80 tcp

Files

memory/2108-130-0x0000000000000000-mapping.dmp

memory/2108-131-0x0000000002080000-0x0000000002128000-memory.dmp