Analysis

  • max time kernel
    139s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220331-en
  • submitted
    07-04-2022 15:48

General

  • Target

    41ae907a2bb73794bb2cff40b429e62305847a3e1a95f188b596f1cf925c4547.dll

  • Size

    151KB

  • MD5

    55ab2f304f8c2da30aeee7713a95064d

  • SHA1

    aae939cf3995905399e427097fc90c5b62f3d4c3

  • SHA256

    41ae907a2bb73794bb2cff40b429e62305847a3e1a95f188b596f1cf925c4547

  • SHA512

    08bbf78b4154f725399055dfb8a4338ce873297af847a5e30c8b6708e44feeae071fbf7efff9ff2c0b397fdffec5ca52a9591f742092a8f50287e54ce89307d3

Score
10/10

Malware Config

Extracted

Family

gozi_rm3

Attributes
  • build

    300994

rsa_pubkey.base64

Signatures

  • Gozi RM3

    A heavily modified version of Gozi using RM3 loader.

  • Uses Tor communications 1 TTPs

    Malware can proxy its traffic through Tor for more anonymity.

  • Modifies Internet Explorer settings 1 TTPs 23 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:764
      • C:\Windows\system32\regsvr32.exe
        regsvr32 /s C:\Users\Admin\AppData\Local\Temp\41ae907a2bb73794bb2cff40b429e62305847a3e1a95f188b596f1cf925c4547.dll
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1320
        • C:\Windows\SysWOW64\regsvr32.exe
          /s C:\Users\Admin\AppData\Local\Temp\41ae907a2bb73794bb2cff40b429e62305847a3e1a95f188b596f1cf925c4547.dll
          3⤵
            PID:3612
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe" /c start /min forfiles /c "cmd /k @path -ec aQBlAHgAIAAoAGcAcAAgACcASABLAEMAVQA6AFwAUwBvAGYAdAB3AGEAcgBlAFwARQB4AHAAbABvAHIAZQByAG0AYQBnACcAKQAuAEEA & exit" /p C:\Windows\system32 /s /m po*l.e*e
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:676
          • C:\Windows\system32\forfiles.exe
            forfiles /c "cmd /k @path -ec aQBlAHgAIAAoAGcAcAAgACcASABLAEMAVQA6AFwAUwBvAGYAdAB3AGEAcgBlAFwARQB4AHAAbABvAHIAZQByAG0AYQBnACcAKQAuAEEA & exit" /p C:\Windows\system32 /s /m po*l.e*e
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:4848
            • C:\Windows\system32\cmd.exe
              /k "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" -ec aQBlAHgAIAAoAGcAcAAgACcASABLAEMAVQA6AFwAUwBvAGYAdAB3AGEAcgBlAFwARQB4AHAAbABvAHIAZQByAG0AYQBnACcAKQAuAEEA & exit
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:4188
              • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe -ec aQBlAHgAIAAoAGcAcAAgACcASABLAEMAVQA6AFwAUwBvAGYAdAB3AGEAcgBlAFwARQB4AHAAbABvAHIAZQByAG0AYQBnACcAKQAuAEEA
                5⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious behavior: MapViewOfSection
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:2252
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -E JwBwAGEAcgBhAG0AKAAkAGgAcgBoAGMAZQB3AGQAYQB4AGUAKQA7AFsAUwB5AHMAdABlAG0ALgBDAG8AbgB2AGUAcgB0AF0AOgA6AEYAcgBvAG0AQgBhAHMAZQA2ADQAUwB0AHIAaQBuAGcAKAAkAGgAcgBoAGMAZQB3AGQAYQB4AGUAKQAnAA==
                  6⤵
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2696
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -E JwBwAGEAcgBhAG0AKAAkAGQAZgBvAG0AaABlAGwAcwBvAGgAKQA7AFsAUwB5AHMAdABlAG0ALgBUAGUAeAB0AC4ARQBuAGMAbwBkAGkAbgBnAF0AOgA6AEEAUwBDAEkASQAuAEcAZQB0AFMAdAByAGkAbgBnACgAJABkAGYAbwBtAGgAZQBsAHMAbwBoACkAJwA=
                  6⤵
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4412
                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                  "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\d03vevg5\d03vevg5.cmdline"
                  6⤵
                  • Suspicious use of WriteProcessMemory
                  PID:4068
                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES202A.tmp" "c:\Users\Admin\AppData\Local\Temp\d03vevg5\CSCA73307D8A01944BA82F927DE9549C2C8.TMP"
                    7⤵
                      PID:2828
                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                    "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\uqfdpqml\uqfdpqml.cmdline"
                    6⤵
                    • Suspicious use of WriteProcessMemory
                    PID:908
                    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                      C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES2153.tmp" "c:\Users\Admin\AppData\Local\Temp\uqfdpqml\CSC9DFE7933581941C7B199A314FD8FF5.TMP"
                      7⤵
                        PID:2952
            • C:\Windows\system32\iexpress.exe
              iexpress.exe /n /q /m C:\Users\Admin\AppData\Local\Temp\4CF6.bin
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:1256
              • C:\Windows\system32\makecab.exe
                C:\Windows\system32\makecab.exe /f "C:\Users\Admin\~Arclogic.DDF"
                3⤵
                  PID:3544
            • C:\Program Files (x86)\Internet Explorer\ielowutil.exe
              "C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding
              1⤵
                PID:1800
              • C:\Program Files\Internet Explorer\iexplore.exe
                "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
                1⤵
                • Modifies Internet Explorer settings
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SetWindowsHookEx
                • Suspicious use of WriteProcessMemory
                PID:3892
                • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                  "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3892 CREDAT:17410 /prefetch:2
                  2⤵
                  • Modifies Internet Explorer settings
                  • Suspicious use of SetWindowsHookEx
                  PID:3204
                • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                  "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3892 CREDAT:82948 /prefetch:2
                  2⤵
                  • Modifies Internet Explorer settings
                  • Suspicious use of SetWindowsHookEx
                  PID:1968

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                Filesize

                2KB

                MD5

                d85ba6ff808d9e5444a4b369f5bc2730

                SHA1

                31aa9d96590fff6981b315e0b391b575e4c0804a

                SHA256

                84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

                SHA512

                8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

              • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\1mvpbnk\imagestore.dat

                Filesize

                430B

                MD5

                bf7a0352a6c0ea0a020a52562bcf8269

                SHA1

                f09d769ab50bbf0d30f2a2bc79d34e4049dcd0a1

                SHA256

                8b81db90bf8d1a80f041929340b687c87e6dc105f0c6d95bd1b78b03d6a4aa5c

                SHA512

                9eb8790ecd2662360417a732498d4e22d417cd1ff60d6f0eaa2b9b2a912b8d97ca87cefed62a5ebf4ca5a5303b108af203b2e75cb0959e4107202818f09e0c39

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                Filesize

                64B

                MD5

                feadc4e1a70c13480ef147aca0c47bc0

                SHA1

                d7a5084c93842a290b24dacec0cd3904c2266819

                SHA256

                5b4f1fe7ba74b245b6368dbe4ceffa438f14eef08ba270e9a13c57505c7717ac

                SHA512

                c9681a19c773891808fefa9445cea598d118c83bba89530a51ab993adbff39bce72b43f8e99d0c68e4a44f7e0f4c8ec128641c45cd557a8e1215721d5d992a23

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                Filesize

                1KB

                MD5

                3613f4d620a55c8844fa5dc2af72aaa6

                SHA1

                338c9acd3b47e1966eeb9bd77eaff0e1da09fe9e

                SHA256

                52d6fafd5d1d6b3ba7d86c578e58dd38b2226866687fc4dcdf67eb1de2171e8f

                SHA512

                1bbd9a544bb7dae3155cc85eccbeaf2634c4eb8339a2aee3d3bf3bc15426681e2fc073ed352a8f2100ac273a09fd784933ec9d8195cb3f8bf36b6d58072e7b8c

              • C:\Users\Admin\AppData\Local\Temp\RES202A.tmp

                Filesize

                1KB

                MD5

                5188425299a0c48f31ddd592c695ba80

                SHA1

                d1e01178cd2082ddbb162906159e773dd227cb89

                SHA256

                16fd0850cc480f363e782b99e0e63ee892bcd5f5b22ac40b245b4030ff9112c5

                SHA512

                77d788dd33518eb376e47e2ccef52efe49562a3728e9b23bd066d47621878a4ec57565f5c3c2925ae2a6a129bb12d9e4540d7b9afa0cb247f6c493f510cebc67

              • C:\Users\Admin\AppData\Local\Temp\RES2153.tmp

                Filesize

                1KB

                MD5

                251512ce26b176cd31a69416bbfb6604

                SHA1

                599214bbdd6709e8bf7e35bd7c6398fe3f7d44cb

                SHA256

                153538a79181abae1806b501c1fa8ebbd052c73fab43b24c0f314202b6666188

                SHA512

                1bccc8fdd579e5779f651ef8ead98e52297bfa5b92a2558b3d07ae8b43a3c2cc3be3c8ac3436a3dab5a88f6f3d06fb063d72576a5669a138470cd48217075e3b

              • C:\Users\Admin\AppData\Local\Temp\d03vevg5\d03vevg5.dll

                Filesize

                3KB

                MD5

                71bf9664992ad6c1caa016c0d3b03734

                SHA1

                624901f2fa63471481375aee35e0292dc8a0ba50

                SHA256

                c682f74f1a7e6eb4921f3963c18387ea55254c2051aea8449d0f3e14b58d6a32

                SHA512

                30d095665dd2cd43b4c3072d4243819e5375661a880f90c229d1625beaac66d2508b2fc4dc5f8d52ad04497eeeb53684cefdb46474b0effcc0d239373a113f12

              • C:\Users\Admin\AppData\Local\Temp\uqfdpqml\uqfdpqml.dll

                Filesize

                3KB

                MD5

                87a1b6f6d5c9754e8572a77c33efbca0

                SHA1

                ab82bb78a7685dd9845e39a26db4ab8c7d84068d

                SHA256

                5dacc9aba77a7f666fc8b73423bcbf30398d901f8958d1f9c6a7617af94464ad

                SHA512

                aa586d162eb63eba4afbffe86cb3e5b52d26301570488fb7014dcd25a43cd23493fae399bb2bf3df956b330480d7236254d1efd69e1fc003b87f1f6512c17db1

              • C:\Users\Admin\~Arclogic.CAB

                Filesize

                135B

                MD5

                74f10dc5fa3196b0fcfaa80ffd2698cc

                SHA1

                ba46760b60f61fc3b98846606b51165383103502

                SHA256

                1312f939487b0f25ce0a07e42e58bbd27e6d1ba422d6c0d0b665e24ca56dda1f

                SHA512

                cae4e4b3ee48e56e98268f420502df48573d70a669fe4d3cfe874c3fe7b242acd8a25ee16012e04308eeaec63872f4c46498932374c5b64d10099ed2a9570230

              • C:\Users\Admin\~Arclogic.DDF

                Filesize

                770B

                MD5

                7c910557b942b0ed9e33794b6a18366a

                SHA1

                6b84d6d5ad34c43f9869f68fb3896b17605fa020

                SHA256

                e93178cd9401c6f70629e81d478e76092e28a5f8fec147da281f3f506163c850

                SHA512

                8b64335ba2811c45b444a8f0751270f84b8b9a029ca642a672f3458eafba8271fe85b91ec4c9d233268da7c6036ed9e61fac538839dd943af95beb00106dbe8b

              • C:\Users\Admin\~Arclogic.RPT

                Filesize

                283B

                MD5

                86b3749d0ddecc24d2e62905af84b2fe

                SHA1

                3c3700884f0b93f4ed7de0a29a1de1046276f339

                SHA256

                f6c3d1580109a16d9fbd90c8822a8e5b1bfbb25134a09ad82d182fbffa613190

                SHA512

                099cbc20ffbeabb090fc89577823058e18b8f218f329ae0dddb484717b8e3403dfb65e079e7d787b59685f565361a9c2944a38cf46a34eb07f43fadbc1a458da

              • C:\Users\Admin\~Arclogic_LAYOUT.INF

                Filesize

                966B

                MD5

                9fbe525f54c9b6b5c15cee1aab2e2f91

                SHA1

                7cbe5f3a1735afb9948f162d51a9b7756eb55a44

                SHA256

                ec9dfedcd52d815bf454fe003cb8d1d12bc2a2be8b11ffc60243f162d7387e03

                SHA512

                5f740a7428df4c209544b765703a7a3f1bce15d93e9cec4b135a3ac9c8c5dfcbc9407f1ae5d7791fb2fbdc6f63356a3cf4a88d38a755a2cbacb49f3fe2621efc

              • \??\c:\Users\Admin\AppData\Local\Temp\d03vevg5\CSCA73307D8A01944BA82F927DE9549C2C8.TMP

                Filesize

                652B

                MD5

                afbf7661842db0b0c2a210e18c0b8acd

                SHA1

                5ff214e89db3ca27dc1010ae0288c56ae8565a19

                SHA256

                4b4e596c1cdac48c3fb181c171066e49180920f6c195fee8e93a14a36ed34bdd

                SHA512

                fcfb22e8368a179324935e07082298e7754f215d1dbd77e7fc5dbca8eda8ec83e8c1d8eb608693342f2408e9edbba9c344a499900ae95f0f7795a87e15d88c69

              • \??\c:\Users\Admin\AppData\Local\Temp\d03vevg5\d03vevg5.0.cs

                Filesize

                417B

                MD5

                cdc42ce046de74fa8cb97234640cfcc5

                SHA1

                8a6aa5bda682fbb11bc974d752408593aec799cc

                SHA256

                7fca4a3b3889149b375ce11cd1614298a244c05e3dd5fa343be56986aaa675c5

                SHA512

                c2663ca8817dc7a375c06cfc4adb529ab61b098663a550feba5dabe8b9c6269a5e878419d5198cb463b9c6b4d5acb504587ffd5721eab568068a7e9d45d55d13

              • \??\c:\Users\Admin\AppData\Local\Temp\d03vevg5\d03vevg5.cmdline

                Filesize

                369B

                MD5

                6b7faef1c1c1b5ca06225f8e09bdb800

                SHA1

                fdd85b49428ed74f45079eb42918769355c2f8e4

                SHA256

                4fed52d1c06a436e1e10343f011a865bd574b12f5f46ae65e37cfc515545493d

                SHA512

                25b0d7c61bdef04ec13e6a7f46bcc32a6b97d20a05a59262cbbf510f3be77fe907de350fb61f1c8f332b0c0c1c2c805aa3c5293e10f4581251aafb0928613d54

              • \??\c:\Users\Admin\AppData\Local\Temp\uqfdpqml\CSC9DFE7933581941C7B199A314FD8FF5.TMP

                Filesize

                652B

                MD5

                2fbe0a972523428f861fe603472ca828

                SHA1

                73e2922762235566f5f819d55d72ae03d37c321a

                SHA256

                e319dd039f3b9d26a50a3aa9ce4cc18a1743844c97f8c95768799e09e2e9a23d

                SHA512

                eb037433acc113498c3f9a63b4560a439eae0c5316435fedf5bccf7fe98b690cdd4f21c796f1179372b72476941e215eb04365bdda954c7bbaffb8b545b30ab3

              • \??\c:\Users\Admin\AppData\Local\Temp\uqfdpqml\uqfdpqml.0.cs

                Filesize

                416B

                MD5

                e991aa9d35bfffc8f1e0d5dcf4c95ed1

                SHA1

                02d81b5b8cfd7b25d4fa0dab40d6ce6db3129501

                SHA256

                2598df56dcfc916eb9ae7b571c67d2feb92740843e36caccf9df705c03145265

                SHA512

                e0205253f43832674a3ea5dbe376e82fe0a59722ca10bed0184ff8fa298111957437db32aefb725b8c525f62aa8c7bc14922fa665ec9ced0d465d91837da126b

              • \??\c:\Users\Admin\AppData\Local\Temp\uqfdpqml\uqfdpqml.cmdline

                Filesize

                369B

                MD5

                d76413b042b2cb049ad17cd25d4c9ff8

                SHA1

                ebbdfb36417f4ca1b1f17b4d2597a03a3965ec0a

                SHA256

                f8b4acddbe968871f33b12b1bd432bbbcfded1b67f70e5d59a8db3e737819031

                SHA512

                ceb7c763c1bb676ca90f520ac93b35bf96403107bced7bb410f17772f80043dd950b6c4fc0d08840a56e885022ba23b7e1a3c220a9edda4965192909b06183a6

              • memory/2252-143-0x000002760BC50000-0x000002760BD0D000-memory.dmp

                Filesize

                756KB

              • memory/2252-144-0x000002760BC50000-0x000002760BD0D000-memory.dmp

                Filesize

                756KB

              • memory/2252-168-0x00000276265E0000-0x00000276265F3000-memory.dmp

                Filesize

                76KB

              • memory/2252-140-0x0000027626260000-0x0000027626282000-memory.dmp

                Filesize

                136KB

              • memory/2252-141-0x00007FF9429B0000-0x00007FF943471000-memory.dmp

                Filesize

                10.8MB

              • memory/2252-142-0x000002760BC50000-0x000002760BD0D000-memory.dmp

                Filesize

                756KB

              • memory/2696-148-0x000001AAF1D83000-0x000001AAF1D85000-memory.dmp

                Filesize

                8KB

              • memory/2696-147-0x000001AAF1D80000-0x000001AAF1D82000-memory.dmp

                Filesize

                8KB

              • memory/2696-149-0x000001AAF1D86000-0x000001AAF1D88000-memory.dmp

                Filesize

                8KB

              • memory/2696-146-0x00007FF9429B0000-0x00007FF943471000-memory.dmp

                Filesize

                10.8MB

              • memory/3612-130-0x0000000001280000-0x0000000001290000-memory.dmp

                Filesize

                64KB

              • memory/3612-125-0x0000000010000000-0x000000001000F000-memory.dmp

                Filesize

                60KB

              • memory/4412-153-0x00007FF9429B0000-0x00007FF943471000-memory.dmp

                Filesize

                10.8MB