Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20220331-en
  • submitted
    07-04-2022 23:51

General

  • Target

    yA0A.tmp.dll

  • Size

    151KB

  • MD5

    55ab2f304f8c2da30aeee7713a95064d

  • SHA1

    aae939cf3995905399e427097fc90c5b62f3d4c3

  • SHA256

    41ae907a2bb73794bb2cff40b429e62305847a3e1a95f188b596f1cf925c4547

  • SHA512

    08bbf78b4154f725399055dfb8a4338ce873297af847a5e30c8b6708e44feeae071fbf7efff9ff2c0b397fdffec5ca52a9591f742092a8f50287e54ce89307d3

Score
10/10

Malware Config

Extracted

Family

gozi_rm3

Attributes
  • build

    300994

rsa_pubkey.base64
rsa_pubkey.plain

Signatures

  • Gozi RM3

    A heavily modified version of Gozi using RM3 loader.

  • Uses Tor communications 1 TTPs

    Malware can proxy its traffic through Tor for more anonymity.

  • Drops file in System32 directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 52 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 11 IoCs
  • Suspicious use of SetWindowsHookEx 44 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1276
      • C:\Windows\system32\regsvr32.exe
        regsvr32 /s C:\Users\Admin\AppData\Local\Temp\yA0A.tmp.dll
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1332
        • C:\Windows\SysWOW64\regsvr32.exe
          /s C:\Users\Admin\AppData\Local\Temp\yA0A.tmp.dll
          3⤵
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          PID:1892
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /c start /min forfiles /c "cmd /k @path -ec aQBlAHgAIAAoAGcAcAAgACcASABLAEMAVQA6AFwAUwBvAGYAdAB3AGEAcgBlAFwAVwBlAGIAZgBhAGwAcwBlACcAKQAuAEMA & exit" /p C:\Windows\system32 /s /m po*l.e*e
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1616
        • C:\Windows\system32\forfiles.exe
          forfiles /c "cmd /k @path -ec aQBlAHgAIAAoAGcAcAAgACcASABLAEMAVQA6AFwAUwBvAGYAdAB3AGEAcgBlAFwAVwBlAGIAZgBhAGwAcwBlACcAKQAuAEMA & exit" /p C:\Windows\system32 /s /m po*l.e*e
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:752
          • C:\Windows\system32\cmd.exe
            /k "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" -ec aQBlAHgAIAAoAGcAcAAgACcASABLAEMAVQA6AFwAUwBvAGYAdAB3AGEAcgBlAFwAVwBlAGIAZgBhAGwAcwBlACcAKQAuAEMA & exit
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:1120
            • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
              C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe -ec aQBlAHgAIAAoAGcAcAAgACcASABLAEMAVQA6AFwAUwBvAGYAdAB3AGEAcgBlAFwAVwBlAGIAZgBhAGwAcwBlACcAKQAuAEMA
              5⤵
              • Drops file in System32 directory
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious behavior: MapViewOfSection
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1760
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -E JwBwAGEAcgBhAG0AKAAkAGgAcgBoAGMAZQB3AGQAYQB4AGUAKQA7AFsAUwB5AHMAdABlAG0ALgBDAG8AbgB2AGUAcgB0AF0AOgA6AEYAcgBvAG0AQgBhAHMAZQA2ADQAUwB0AHIAaQBuAGcAKAAkAGgAcgBoAGMAZQB3AGQAYQB4AGUAKQAnAA==
                6⤵
                • Drops file in System32 directory
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:1832
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -E JwBwAGEAcgBhAG0AKAAkAGQAZgBvAG0AaABlAGwAcwBvAGgAKQA7AFsAUwB5AHMAdABlAG0ALgBUAGUAeAB0AC4ARQBuAGMAbwBkAGkAbgBnAF0AOgA6AEEAUwBDAEkASQAuAEcAZQB0AFMAdAByAGkAbgBnACgAJABkAGYAbwBtAGgAZQBsAHMAbwBoACkAJwA=
                6⤵
                • Drops file in System32 directory
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:684
              • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe
                "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\lsvqthto.cmdline"
                6⤵
                • Suspicious use of WriteProcessMemory
                PID:1692
                • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                  C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB4A1.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCB4A0.tmp"
                  7⤵
                    PID:1988
                • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe
                  "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\x8ffoutc.cmdline"
                  6⤵
                  • Suspicious use of WriteProcessMemory
                  PID:1628
                  • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                    C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB58B.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCB58A.tmp"
                    7⤵
                      PID:840
          • C:\Windows\syswow64\svchost.exe
            C:\Windows\syswow64\svchost.exe
            2⤵
              PID:1888
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
            1⤵
            • Modifies Internet Explorer settings
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:1324
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1324 CREDAT:275457 /prefetch:2
              2⤵
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:1532
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1324 CREDAT:734213 /prefetch:2
              2⤵
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:556

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751

            Filesize

            717B

            MD5

            54e9306f95f32e50ccd58af19753d929

            SHA1

            eab9457321f34d4dcf7d4a0ac83edc9131bf7c57

            SHA256

            45f94dceb18a8f738a26da09ce4558995a4fe02b971882e8116fc9b59813bb72

            SHA512

            8711a4d866f21cdf4d4e6131ec4cfaf6821d0d22b90946be8b5a09ab868af0270a89bc326f03b858f0361a83c11a1531b894dfd1945e4812ba429a7558791f4f

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751

            Filesize

            192B

            MD5

            86639ca1732318e4e3f4687c99e30d27

            SHA1

            67e38504fd5981b7e81cfa051bde2d83d4289a7e

            SHA256

            0c8bf2cb7e70e7ff6f33a345944d539dfed8efc5647bafcdb5b5d47ce4cdca2a

            SHA512

            6dc6417ddc274bb4c6b97ad732dbde319726c870055c2808de5d6bf2909fa2b1c95efa2ef4e530a2cd3186952e76a7e3e35498cd00fb3f6974dab5869dfb5409

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            344B

            MD5

            9f1356ab87ef13cc04694f088dc2738b

            SHA1

            61614758cb27f90706217081e8ba48a458505a4c

            SHA256

            8803656bf00c1dc130380756042aa8174a478d4fc2e908c95a1fb91a4fa744ba

            SHA512

            fb522ed965e1d210ab86c0d2af61869fb9f0c5bc9d1b31508411037511974d11bbfa0e67fecfbd4558bf7dcd2ae84e677a1142f956832bb6bffe4d6018be5f87

          • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\b1rou5u\imagestore.dat

            Filesize

            4KB

            MD5

            3f27383712d9c1d902e3792eb1b88d37

            SHA1

            13b091cc8d2a2d9e7577be27bad3fc12825e0de1

            SHA256

            79b7b5ca178642f9818fecab80ac7ccf71dccf8268129c9dd93843dc03cb3a0e

            SHA512

            f7261643eb5bad4a384abf87d01545f6cabebecfd5e1fed75161aecee8721c89127d520a6e3c3f7cec7715fe043157bfae40cbcb40b0b92991ee2b03f27415de

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZR09IT6C\favicon[1].ico

            Filesize

            318B

            MD5

            a976d227e5d1dcf62f5f7e623211dd1b

            SHA1

            a2a9dc1abdd3d888484678663928cb024c359ee6

            SHA256

            66332859bd8e3441a019e073a318b62a47014ba244121301034b510dc7532271

            SHA512

            6754d545f2ce095cfa1fa7ca9e3223f89e37726ee7e541ebcf3e209e18b2602f3be8677598cb30d697327a63de032c11dbf8ef7ad7889a79c488a21044c1cb3f

          • C:\Users\Admin\AppData\Local\Temp\RESB4A1.tmp

            Filesize

            1KB

            MD5

            6e809017c9feb74940b8efc8013f7f93

            SHA1

            bf3861d7049ec3ae535e8f76f49904b6c54a157e

            SHA256

            873b325f85a34b84c77c6c3635cbc5bf5f08b3a648b4298fffbede5864b345e8

            SHA512

            d25f82569859da50a222d0ac835bd439ba5c4daf464857f8508bc73492655ab71743c86398a3532951d0aaca4fd897fa161a66b905f2172df2458f74322956dd

          • C:\Users\Admin\AppData\Local\Temp\RESB58B.tmp

            Filesize

            1KB

            MD5

            75003e0ea989234d20dc0ad558f25aad

            SHA1

            6ec49e68bdec0532d299f72dc9d21c5fbf0eaf48

            SHA256

            b05a55e809b46eef86b0a222370415a8cfe7ce3c3eb6bff7f1a95196dc8ad994

            SHA512

            98fbbcc67dbde77c9d859d8ff5d997a21dda2ff016cdc9db661abf0f0b02e5cd2b2ec0d78d36ece9726b0ee21b38f1c5e563c979ae2d5a61d414c2ce9b9a861c

          • C:\Users\Admin\AppData\Local\Temp\lsvqthto.dll

            Filesize

            3KB

            MD5

            26d01e05313d2bcd8241a3ed8cc249d8

            SHA1

            82121b36592acdc09f0f9043c2b809d0b8dfb26c

            SHA256

            a109322c5aade0ea51eb597c1adb83c66ff84de10ecf7ea2e5a63ceb5cc5d760

            SHA512

            f5f6f9e21533ef4bd214a49047dbbfda412d593a797ade3f6c03c6b74143a96df2fb9a015f2e8aecea1ebf9f3200e0be98f7a8666073fd18ea63bfd6775c181b

          • C:\Users\Admin\AppData\Local\Temp\lsvqthto.pdb

            Filesize

            7KB

            MD5

            ab9c14ebbe52f60a76837a8a91c7363f

            SHA1

            75cc69d896e3cec12551e5af938a3692c1125a05

            SHA256

            cddb308636c66752045b8e65d2a6d5879db9bdba81fc9ecf9c71f14dc15a5260

            SHA512

            c3fc713a56f24ddfcaf31a6b16b68050541f250d0978b109f76deadcc368d6e28ce60353b0adf4eb868bf3ce43eb3c5427e00b5c33e331f4633bb345555262d1

          • C:\Users\Admin\AppData\Local\Temp\x8ffoutc.dll

            Filesize

            3KB

            MD5

            6c053d422f4640854474f88020fbbca4

            SHA1

            8c5ef0037c401e2d84a3cbf375b4eacba3abfd05

            SHA256

            197b2a19a85f565dfb7bb168e2ceb0a83316efa8914efe34a4afc5e4337732ab

            SHA512

            7b4d212e342fac4e3f77871e9b00b27965f0973dbc6c5ec5761d9830a66723ede92e41b5ee3d5d335a424d8b7affe7fd6fcd1b60ca2085482cf9776e8376f2d9

          • C:\Users\Admin\AppData\Local\Temp\x8ffoutc.pdb

            Filesize

            7KB

            MD5

            075d11b5380531ba8942a3edd3fd9d44

            SHA1

            2a64a63971e2f598e385cfeffae9e81724a57f04

            SHA256

            cb5dac7993b237ac8cad6e63600a9eeb19275b8437f94fe3bef5ccc2f21d5eb4

            SHA512

            7718356a65e3a486adb80661cca9224ead08b1766afe3265f9edd6252fa4516438e3b46449850de23385e356ae18a049c890a3e8d8d65d20c271e72c360fe2cb

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

            Filesize

            7KB

            MD5

            ba19ae91e057f2636fef53299ad2ad20

            SHA1

            5151133d8b1097d6aa144f1a4fafd67547e7ccce

            SHA256

            3dc59fa1906386d88897186cf33e0f7675f6b0e92ef2ef4574b238c229d40d03

            SHA512

            eed2717cc30c4a4c1ecaab4f3202ff27918950d1bd10a9bbd47b491543d14be247ddfac3499c1cac4b4ed823cc7d4be79fef5d8526cc00521cecb2ccd2a522a0

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

            Filesize

            7KB

            MD5

            ba19ae91e057f2636fef53299ad2ad20

            SHA1

            5151133d8b1097d6aa144f1a4fafd67547e7ccce

            SHA256

            3dc59fa1906386d88897186cf33e0f7675f6b0e92ef2ef4574b238c229d40d03

            SHA512

            eed2717cc30c4a4c1ecaab4f3202ff27918950d1bd10a9bbd47b491543d14be247ddfac3499c1cac4b4ed823cc7d4be79fef5d8526cc00521cecb2ccd2a522a0

          • \??\c:\Users\Admin\AppData\Local\Temp\CSCB4A0.tmp

            Filesize

            652B

            MD5

            46942d4718f9aee8c8f89cb651a28d25

            SHA1

            4727f97aac63f179c24f2d207f6114dd2f5d9460

            SHA256

            46b7fb78e241ab420c8d3bc0e4ddb4ea4e5b8574c13897774d6eb5bb8eedfde1

            SHA512

            8181a89d8e8bfc20a07c64648c653be44ffc95eb5691f1f85a31b85337375b7cb5a9f01f78e8ea99aa30f9202a4fe5c6ddae8e5ee3f202c32165fcaf467edf6d

          • \??\c:\Users\Admin\AppData\Local\Temp\CSCB58A.tmp

            Filesize

            652B

            MD5

            f33e30b3c718c44223795ea772f588d2

            SHA1

            703f1fe77d4b351be8e48318ac86ad160579c2b5

            SHA256

            84f32fc3441c4a9f7eb0f4602cdb2136e41d440b18c77ff14c8b188b64a5d31f

            SHA512

            c6d22a4ff3e8de40467a150ef706ecb071a9841ad26d55334ab309c57b987467e934b31f446caf625870939b6305f24e3af0b70110c89a3c301a4c41566e1d30

          • \??\c:\Users\Admin\AppData\Local\Temp\lsvqthto.0.cs

            Filesize

            417B

            MD5

            cdc42ce046de74fa8cb97234640cfcc5

            SHA1

            8a6aa5bda682fbb11bc974d752408593aec799cc

            SHA256

            7fca4a3b3889149b375ce11cd1614298a244c05e3dd5fa343be56986aaa675c5

            SHA512

            c2663ca8817dc7a375c06cfc4adb529ab61b098663a550feba5dabe8b9c6269a5e878419d5198cb463b9c6b4d5acb504587ffd5721eab568068a7e9d45d55d13

          • \??\c:\Users\Admin\AppData\Local\Temp\lsvqthto.cmdline

            Filesize

            309B

            MD5

            1d57853085dad197f806104c94477fad

            SHA1

            208742621d45c7aa3836c2f89312908107351371

            SHA256

            8c99483d20120d711b11c108fe9df9c67fd81a99a2a2ab3b0b6dee48c95cec2a

            SHA512

            50fdf500da0c77c309a39ea0f72ff7a526e1ed92aa5ad5201c34d4609a972d99c868b74d2d9ee60ab4569af55c06d8c5850f46116dc393da0e034fc3ccd3dba7

          • \??\c:\Users\Admin\AppData\Local\Temp\x8ffoutc.0.cs

            Filesize

            416B

            MD5

            e991aa9d35bfffc8f1e0d5dcf4c95ed1

            SHA1

            02d81b5b8cfd7b25d4fa0dab40d6ce6db3129501

            SHA256

            2598df56dcfc916eb9ae7b571c67d2feb92740843e36caccf9df705c03145265

            SHA512

            e0205253f43832674a3ea5dbe376e82fe0a59722ca10bed0184ff8fa298111957437db32aefb725b8c525f62aa8c7bc14922fa665ec9ced0d465d91837da126b

          • \??\c:\Users\Admin\AppData\Local\Temp\x8ffoutc.cmdline

            Filesize

            309B

            MD5

            c91c9d5198be86a2d241304c47e7e92e

            SHA1

            be703bd1610949076ad709a763469003a206f1ce

            SHA256

            18ad2486be8151b5bebf9461429e570d6144a515989b926ab2118e7902cd09ab

            SHA512

            fa39dc12380ae3a4e62af8af3f2bc7a492689cf632a0fe16eeb1f479c64ba044aabd4bf31f9dfdbd3bc638c816484919b73376e83967f73f7a71643c65b7391e

          • memory/684-96-0x0000000001E6B000-0x0000000001E8A000-memory.dmp

            Filesize

            124KB

          • memory/684-95-0x0000000001E64000-0x0000000001E67000-memory.dmp

            Filesize

            12KB

          • memory/684-94-0x000007FEF3080000-0x000007FEF3BDD000-memory.dmp

            Filesize

            11.4MB

          • memory/1332-54-0x000007FEFB771000-0x000007FEFB773000-memory.dmp

            Filesize

            8KB

          • memory/1692-100-0x00000000021C0000-0x00000000021C2000-memory.dmp

            Filesize

            8KB

          • memory/1760-80-0x00000000024F0000-0x00000000024F2000-memory.dmp

            Filesize

            8KB

          • memory/1760-114-0x0000000002900000-0x0000000002913000-memory.dmp

            Filesize

            76KB

          • memory/1760-87-0x00000000024FB000-0x000000000251A000-memory.dmp

            Filesize

            124KB

          • memory/1760-79-0x000000001B810000-0x000000001BB0F000-memory.dmp

            Filesize

            3.0MB

          • memory/1760-78-0x000007FEF3080000-0x000007FEF3BDD000-memory.dmp

            Filesize

            11.4MB

          • memory/1760-82-0x00000000024F4000-0x00000000024F7000-memory.dmp

            Filesize

            12KB

          • memory/1760-81-0x00000000024F2000-0x00000000024F4000-memory.dmp

            Filesize

            8KB

          • memory/1832-90-0x0000000002370000-0x00000000023F0000-memory.dmp

            Filesize

            512KB

          • memory/1832-86-0x000007FEF3080000-0x000007FEF3BDD000-memory.dmp

            Filesize

            11.4MB

          • memory/1832-88-0x0000000002370000-0x00000000023F0000-memory.dmp

            Filesize

            512KB

          • memory/1832-89-0x0000000002370000-0x00000000023F0000-memory.dmp

            Filesize

            512KB

          • memory/1892-68-0x0000000000240000-0x0000000000242000-memory.dmp

            Filesize

            8KB

          • memory/1892-62-0x00000000001D0000-0x00000000001E0000-memory.dmp

            Filesize

            64KB

          • memory/1892-57-0x0000000010000000-0x000000001000F000-memory.dmp

            Filesize

            60KB

          • memory/1892-56-0x0000000075D51000-0x0000000075D53000-memory.dmp

            Filesize

            8KB

          • memory/1892-115-0x0000000000260000-0x000000000027A000-memory.dmp

            Filesize

            104KB