Analysis

  • max time kernel
    4294210s
  • max time network
    167s
  • platform
    windows7_x64
  • resource
    win7-20220311-en
  • submitted
    26-03-2022 11:19

General

  • Target

    499003153524e1135ea8356ffc9b42b95f7d7568c6e729b18a1b1c472b17e05f.exe

  • Size

    908KB

  • MD5

    5a9a4e7d8474ef277c242c56fb26d932

  • SHA1

    fd5167807a8cd38637bc1448c9da50f176234ba8

  • SHA256

    499003153524e1135ea8356ffc9b42b95f7d7568c6e729b18a1b1c472b17e05f

  • SHA512

    84abf50244ddc722e097b2cd56cb759b73f401a6dd049cfc80e4cf06ff0e1966627b8782fe03dcde64eaac7dee88c59f210350127118b6b7caa83881d2479e45

Malware Config

Extracted

Family

gozi_rm3

Attributes
  • build

    300854

  • exe_type

    loader

Extracted

Family

gozi_rm3

Botnet

202004141

C2

https://devicelease.xyz

Attributes
  • build

    300854

  • dga_base_url

    constitution.org/usdeclar.txt

  • dga_crc

    0x4eb7d2ca

  • dga_season

    10

  • dga_tlds

    com

    ru

    org

  • exe_type

    loader

  • server_id

    12

  • url_path

    index.htm

rsa_pubkey.plain
serpent.plain

Signatures

  • Gozi RM3

    A heavily modified version of Gozi using RM3 loader.

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of SetWindowsHookEx 24 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\499003153524e1135ea8356ffc9b42b95f7d7568c6e729b18a1b1c472b17e05f.exe
    "C:\Users\Admin\AppData\Local\Temp\499003153524e1135ea8356ffc9b42b95f7d7568c6e729b18a1b1c472b17e05f.exe"
    1⤵
      PID:1392
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:968
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:968 CREDAT:275457 /prefetch:2
        2⤵
        • Suspicious use of SetWindowsHookEx
        PID:1112
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:968 CREDAT:275466 /prefetch:2
        2⤵
        • Suspicious use of SetWindowsHookEx
        PID:1972
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1564
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1564 CREDAT:275457 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1528
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1080
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1080 CREDAT:275457 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1208
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2028
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2028 CREDAT:275457 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2044

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\28c8b86deab549a1.customDestinations-ms

      Filesize

      3KB

      MD5

      e4443076de71d07e615ed77e5f34d670

      SHA1

      770d95cfb4f52be5d722ee5178138d7021be3ac3

      SHA256

      507a9e28cc527177574369a32638a87b21a00f75663eeab3cca08a470286b3fe

      SHA512

      f68a3335c3f3817063ca7141a360c19c1037633fdffb297e1247a5acf8c8dd82edda16f61616baf71081925f5e608dcc7972e47b97c7e4cef01aa9a69740417f

    • memory/1392-54-0x0000000075471000-0x0000000075473000-memory.dmp

      Filesize

      8KB

    • memory/1392-55-0x00000000003C0000-0x00000000003D1000-memory.dmp

      Filesize

      68KB

    • memory/1392-61-0x00000000001B0000-0x00000000001BC000-memory.dmp

      Filesize

      48KB

    • memory/1392-62-0x0000000000400000-0x00000000004E5000-memory.dmp

      Filesize

      916KB

    • memory/1392-63-0x0000000000540000-0x0000000000542000-memory.dmp

      Filesize

      8KB