Analysis

  • max time kernel
    147s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20220331-en
  • submitted
    07-04-2022 14:56

General

  • Target

    crypted_loader_dll_64Donat_5.dll

  • Size

    151KB

  • MD5

    55ab2f304f8c2da30aeee7713a95064d

  • SHA1

    aae939cf3995905399e427097fc90c5b62f3d4c3

  • SHA256

    41ae907a2bb73794bb2cff40b429e62305847a3e1a95f188b596f1cf925c4547

  • SHA512

    08bbf78b4154f725399055dfb8a4338ce873297af847a5e30c8b6708e44feeae071fbf7efff9ff2c0b397fdffec5ca52a9591f742092a8f50287e54ce89307d3

Score
10/10

Malware Config

Extracted

Family

gozi_rm3

Attributes
  • build

    300994

rsa_pubkey.base64

Signatures

  • Gozi RM3

    A heavily modified version of Gozi using RM3 loader.

  • Uses Tor communications 1 TTPs

    Malware can proxy its traffic through Tor for more anonymity.

  • Drops file in System32 directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 47 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 11 IoCs
  • Suspicious use of SetWindowsHookEx 44 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1268
      • C:\Windows\system32\regsvr32.exe
        regsvr32 /s C:\Users\Admin\AppData\Local\Temp\crypted_loader_dll_64Donat_5.dll
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:696
        • C:\Windows\SysWOW64\regsvr32.exe
          /s C:\Users\Admin\AppData\Local\Temp\crypted_loader_dll_64Donat_5.dll
          3⤵
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          PID:1228
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /c start /min forfiles /c "cmd /k @path -ec aQBlAHgAIAAoAGcAcAAgACcASABLAEMAVQA6AFwAUwBvAGYAdAB3AGEAcgBlAFwAQwB1AHIAcAByAG8AYwBlAHMAcwAnACkALgBUAA== & exit" /p C:\Windows\system32 /s /m po*l.e*e
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1344
        • C:\Windows\system32\forfiles.exe
          forfiles /c "cmd /k @path -ec aQBlAHgAIAAoAGcAcAAgACcASABLAEMAVQA6AFwAUwBvAGYAdAB3AGEAcgBlAFwAQwB1AHIAcAByAG8AYwBlAHMAcwAnACkALgBUAA== & exit" /p C:\Windows\system32 /s /m po*l.e*e
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:756
          • C:\Windows\system32\cmd.exe
            /k "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" -ec aQBlAHgAIAAoAGcAcAAgACcASABLAEMAVQA6AFwAUwBvAGYAdAB3AGEAcgBlAFwAQwB1AHIAcAByAG8AYwBlAHMAcwAnACkALgBUAA== & exit
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:1304
            • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
              C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe -ec aQBlAHgAIAAoAGcAcAAgACcASABLAEMAVQA6AFwAUwBvAGYAdAB3AGEAcgBlAFwAQwB1AHIAcAByAG8AYwBlAHMAcwAnACkALgBUAA==
              5⤵
              • Drops file in System32 directory
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious behavior: MapViewOfSection
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1676
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -E JwBwAGEAcgBhAG0AKAAkAGgAcgBoAGMAZQB3AGQAYQB4AGUAKQA7AFsAUwB5AHMAdABlAG0ALgBDAG8AbgB2AGUAcgB0AF0AOgA6AEYAcgBvAG0AQgBhAHMAZQA2ADQAUwB0AHIAaQBuAGcAKAAkAGgAcgBoAGMAZQB3AGQAYQB4AGUAKQAnAA==
                6⤵
                • Drops file in System32 directory
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:1388
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -E JwBwAGEAcgBhAG0AKAAkAGQAZgBvAG0AaABlAGwAcwBvAGgAKQA7AFsAUwB5AHMAdABlAG0ALgBUAGUAeAB0AC4ARQBuAGMAbwBkAGkAbgBnAF0AOgA6AEEAUwBDAEkASQAuAEcAZQB0AFMAdAByAGkAbgBnACgAJABkAGYAbwBtAGgAZQBsAHMAbwBoACkAJwA=
                6⤵
                • Drops file in System32 directory
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:1584
              • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe
                "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\wrqorzcf.cmdline"
                6⤵
                • Suspicious use of WriteProcessMemory
                PID:2084
                • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                  C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESDD95.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCDD84.tmp"
                  7⤵
                    PID:2104
                • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe
                  "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\lrh239up.cmdline"
                  6⤵
                  • Suspicious use of WriteProcessMemory
                  PID:2132
                  • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                    C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESDE6F.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCDE6E.tmp"
                    7⤵
                      PID:2152
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
          1⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1184
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1184 CREDAT:275457 /prefetch:2
            2⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:816
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1184 CREDAT:799749 /prefetch:2
            2⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:1904

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751

          Filesize

          717B

          MD5

          54e9306f95f32e50ccd58af19753d929

          SHA1

          eab9457321f34d4dcf7d4a0ac83edc9131bf7c57

          SHA256

          45f94dceb18a8f738a26da09ce4558995a4fe02b971882e8116fc9b59813bb72

          SHA512

          8711a4d866f21cdf4d4e6131ec4cfaf6821d0d22b90946be8b5a09ab868af0270a89bc326f03b858f0361a83c11a1531b894dfd1945e4812ba429a7558791f4f

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751

          Filesize

          192B

          MD5

          e9eff8181a2c18ac1e0643de7532591f

          SHA1

          235713e272682aafccd6f7c4c50123c1b1212c90

          SHA256

          0e298d43926a127dd7a0b3446bed214d7136f8f8acd2643d2737009b179ea8df

          SHA512

          ea59024bed458cb0c3908293caa99fbb42e22de3730e448e6867b90abb91e7e736379965ccffacb412ae73d5a3b9785d34c1f3f91b046fd4ee0a3d065cf40c98

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          f1ff3f9f87b6d94a9a9b990f7ec996bf

          SHA1

          781e99b4b0541739114312cda9ee486085363547

          SHA256

          133d11ed1bfc657aeadb44abc4b1df5bc11abe30a92c9c9c0dcb4bef08c048be

          SHA512

          70fbf1f9abdd224beb353d7e26130eab8d35876e33d08e6732ba83a0fc3ab9014d5f02f3935d71453068f70e63a204881dcb2cab72756e75be19cb2d3981847f

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\9a0npr3\imagestore.dat

          Filesize

          4KB

          MD5

          dd86bafc8fb2b69dd5a2a9ac3952bfc4

          SHA1

          42a8bdeea49748a58253d3284e4ef801d68675df

          SHA256

          e06886726cf0749085f8604ad6b497daaf546f76bbb5128a719a5191c6780d3b

          SHA512

          93dcfe6655a0876c6603247d0137926678909bb7a80abddb9ec470cdb2774ac9a4e24d80b5a8b6eb627eb1777c293a3d029915e12091614045ba8fdcf90c37b6

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XKL01CLS\favicon[1].ico

          Filesize

          318B

          MD5

          a976d227e5d1dcf62f5f7e623211dd1b

          SHA1

          a2a9dc1abdd3d888484678663928cb024c359ee6

          SHA256

          66332859bd8e3441a019e073a318b62a47014ba244121301034b510dc7532271

          SHA512

          6754d545f2ce095cfa1fa7ca9e3223f89e37726ee7e541ebcf3e209e18b2602f3be8677598cb30d697327a63de032c11dbf8ef7ad7889a79c488a21044c1cb3f

        • C:\Users\Admin\AppData\Local\Temp\RESDD95.tmp

          Filesize

          1KB

          MD5

          d6ccc458b80321e7d00586f4aed6c024

          SHA1

          37777ddede1651484e34d553ba05823f7860d9cf

          SHA256

          a7c0f91cb5fc873f1975f1d4e5f690ddca4685d93e790ebdd9e0f2993887f936

          SHA512

          b8136400dc49bba9ceb0ddb40b061a85d77294c4cf4820abbd9e4b58115f991a401326c919d014caeb807a6805e1a913001a1e453f0467d5dce7b9513366f6c2

        • C:\Users\Admin\AppData\Local\Temp\RESDE6F.tmp

          Filesize

          1KB

          MD5

          ec87857eef8cb72e837d05ef284fc6bd

          SHA1

          8c34e609fd20bdda4b942bf7ed8368e7b1ef7968

          SHA256

          36fb77778ef8cba4e5c5a314294e3f4d72b13c8d9bb446f8e80ad0315d4a8bf4

          SHA512

          d5f3f63f542c05bd9857d8bf2ccd949c67b763606f3627b63ed899190e980f07ce77ed569ad8a65f920a1ba54d72085d383b4256235b273380ec112d3909eeff

        • C:\Users\Admin\AppData\Local\Temp\lrh239up.dll

          Filesize

          3KB

          MD5

          2facd74d5a86290a053fa8841b026165

          SHA1

          dd671ba76165322566afaf7d33750d7d025b8c58

          SHA256

          fbc7a914136b162ce0686e9f148cb785e8faff93e00067acd8fd0cd1f7bc80b9

          SHA512

          91769f3281cdf0a5117c4210cd3bd761dbf915cd9e27e41c2e5ded1c47eb167f9200c380a806cbe21177d3a6c13eaabeec6f3d5c4535f7e84c9b49bb043beec8

        • C:\Users\Admin\AppData\Local\Temp\lrh239up.pdb

          Filesize

          7KB

          MD5

          dc317a34ba05958172f6f48ed7ba3e2c

          SHA1

          af65c7db01a602c0018c8879318eed22703a3ddd

          SHA256

          3020972c365ef50bb03f49a6080e7d3f590f34f5f7a2dbd6026fc6a587bb5a32

          SHA512

          70fa8a582026b1e6052fdbbb278e0bec2e6aa31cf49e4fb09761555889401df18e264bc1c0a00f210f9fd7fee333415cbda8119c7552e2b4d5c8211167c57c38

        • C:\Users\Admin\AppData\Local\Temp\wrqorzcf.dll

          Filesize

          3KB

          MD5

          1283b3c450217d48dfc45e7562a8e507

          SHA1

          560444ea231b50ce79fab156fbcbb6a0a3927e69

          SHA256

          e32172d4b690f625a133ecdc9e99526e5588d95c44d7e9b55cd7af25a7dc1bc4

          SHA512

          0f7f192dbb93e088cb89d2d931d6eb9f62b0fad7e3a767f7623ebac59aa6a2bfa8d349d17f32242db0d16e43e70c5c7adf61f352b48638ce2ba01b05a5523176

        • C:\Users\Admin\AppData\Local\Temp\wrqorzcf.pdb

          Filesize

          7KB

          MD5

          d595166d56c38d85a9e3650985bfb381

          SHA1

          a86f764aaae721012af8984335055ecb5597e969

          SHA256

          820ae6e9ec4f264e413e9791d4bea77579a033d800001be1ccf7d3a68d935c4b

          SHA512

          6ee6caa3fa7aa6c98278d6749d93947550ed96f93e06137b1289b7688c860043806c438dae27b383300f1d7966e9401c551d6813fe7c2889c5c1dbf5ae116fc0

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

          Filesize

          7KB

          MD5

          3a036af2e6a202b3ac01106ebef2b3d1

          SHA1

          3d3ff4b87a08562e4112a724f79e6941ffb54b5e

          SHA256

          5a10e8c12d3279842accfa6a4d938a132b374b6b6ef533ca645d07942585d0d1

          SHA512

          1cee48c4d454fbed0de5f474ece270173e279e9e1c0869c065af368e5b467b9c9493fff4c721007fc7db04bdcd1de467b0db4d834c0b479ac382ac79e88cd0c0

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

          Filesize

          7KB

          MD5

          3a036af2e6a202b3ac01106ebef2b3d1

          SHA1

          3d3ff4b87a08562e4112a724f79e6941ffb54b5e

          SHA256

          5a10e8c12d3279842accfa6a4d938a132b374b6b6ef533ca645d07942585d0d1

          SHA512

          1cee48c4d454fbed0de5f474ece270173e279e9e1c0869c065af368e5b467b9c9493fff4c721007fc7db04bdcd1de467b0db4d834c0b479ac382ac79e88cd0c0

        • \??\c:\Users\Admin\AppData\Local\Temp\CSCDD84.tmp

          Filesize

          652B

          MD5

          b2301ce610e5ed5890f848fd30d8a681

          SHA1

          a6eb31113a5dbdcf588e83c3b67ced03708c3e5e

          SHA256

          5b4937b0d214c7978ed6a9248b0a7c2a8ef59e1359d20b8e347be9b8c3fe0741

          SHA512

          d73e10e03c856b1f365c80279c30378b4e0d7ec07d4aaf0b0ebeefb9a07b2de5406f781fa214ec75fd4a9a8706b4a8380f9129928dc1522ee5f6238dada07e6a

        • \??\c:\Users\Admin\AppData\Local\Temp\CSCDE6E.tmp

          Filesize

          652B

          MD5

          5d9fb6cb80f9a16486b47cf84c4b5e99

          SHA1

          76574ebd3cf05bce34260d4c659d908c00f47e25

          SHA256

          4e4ae5cb521386ccd9b827b5d84205fb7bae86bc46bd3684f585a985f0b8f7bc

          SHA512

          862594370ffe6d87ddc7c0b089437cec707d42c743d979ce85103da5080004199f2db5fc025a45dcb7bac3dae88dc22d456f3a75845c273a11ce216a82a62633

        • \??\c:\Users\Admin\AppData\Local\Temp\lrh239up.0.cs

          Filesize

          416B

          MD5

          e991aa9d35bfffc8f1e0d5dcf4c95ed1

          SHA1

          02d81b5b8cfd7b25d4fa0dab40d6ce6db3129501

          SHA256

          2598df56dcfc916eb9ae7b571c67d2feb92740843e36caccf9df705c03145265

          SHA512

          e0205253f43832674a3ea5dbe376e82fe0a59722ca10bed0184ff8fa298111957437db32aefb725b8c525f62aa8c7bc14922fa665ec9ced0d465d91837da126b

        • \??\c:\Users\Admin\AppData\Local\Temp\lrh239up.cmdline

          Filesize

          309B

          MD5

          4356015d347b77a232e9ba5df56d977c

          SHA1

          da67bf2bbe731a64bfa059b06eee89dbea3ffa32

          SHA256

          cd42d47c83f5a475544dfb4cdecc00c375a858f8ef31edf839d2f4d18103f820

          SHA512

          1a3a46183f529137deb15ca96f65119a88d6b4b8f9b570a34b2eb49c36540eb5bc0006a61eb190adcc920dbdd35d54138a9afdc6fbce944e5a7f013dd11a4d44

        • \??\c:\Users\Admin\AppData\Local\Temp\wrqorzcf.0.cs

          Filesize

          417B

          MD5

          cdc42ce046de74fa8cb97234640cfcc5

          SHA1

          8a6aa5bda682fbb11bc974d752408593aec799cc

          SHA256

          7fca4a3b3889149b375ce11cd1614298a244c05e3dd5fa343be56986aaa675c5

          SHA512

          c2663ca8817dc7a375c06cfc4adb529ab61b098663a550feba5dabe8b9c6269a5e878419d5198cb463b9c6b4d5acb504587ffd5721eab568068a7e9d45d55d13

        • \??\c:\Users\Admin\AppData\Local\Temp\wrqorzcf.cmdline

          Filesize

          309B

          MD5

          8fc1084907c6026bb0c3c0f3182eb319

          SHA1

          e3a888cb5454557520a2a46ce679f1b3ff5c95c9

          SHA256

          f24325fdb1a1d1a03c066ef21a951c49c2f90240825f8efc07206b6017adb0f2

          SHA512

          07ce1b5a2e0c1a11cddc8c5c103e1522619bcee5149b5899510d5c9e6ebcd5bc5eb1b5ffa54d65d0354258c410681ef0627824f241ef083e01333ba7ed0cf471

        • memory/696-54-0x000007FEFC4E1000-0x000007FEFC4E3000-memory.dmp

          Filesize

          8KB

        • memory/1228-115-0x0000000000480000-0x000000000049A000-memory.dmp

          Filesize

          104KB

        • memory/1228-68-0x0000000000480000-0x0000000000482000-memory.dmp

          Filesize

          8KB

        • memory/1228-62-0x00000000001E0000-0x00000000001F0000-memory.dmp

          Filesize

          64KB

        • memory/1228-57-0x0000000010000000-0x000000001000F000-memory.dmp

          Filesize

          60KB

        • memory/1228-56-0x0000000076E21000-0x0000000076E23000-memory.dmp

          Filesize

          8KB

        • memory/1388-89-0x00000000024BB000-0x00000000024DA000-memory.dmp

          Filesize

          124KB

        • memory/1388-86-0x000007FEF3F70000-0x000007FEF4ACD000-memory.dmp

          Filesize

          11.4MB

        • memory/1388-87-0x000000001B760000-0x000000001BA5F000-memory.dmp

          Filesize

          3.0MB

        • memory/1388-88-0x00000000024B4000-0x00000000024B7000-memory.dmp

          Filesize

          12KB

        • memory/1584-93-0x000007FEF3F70000-0x000007FEF4ACD000-memory.dmp

          Filesize

          11.4MB

        • memory/1584-95-0x0000000002762000-0x0000000002764000-memory.dmp

          Filesize

          8KB

        • memory/1584-94-0x0000000002760000-0x0000000002762000-memory.dmp

          Filesize

          8KB

        • memory/1584-96-0x0000000002764000-0x0000000002767000-memory.dmp

          Filesize

          12KB

        • memory/1584-97-0x000000000276B000-0x000000000278A000-memory.dmp

          Filesize

          124KB

        • memory/1676-80-0x00000000025A2000-0x00000000025A4000-memory.dmp

          Filesize

          8KB

        • memory/1676-81-0x00000000025A4000-0x00000000025A7000-memory.dmp

          Filesize

          12KB

        • memory/1676-82-0x00000000025AB000-0x00000000025CA000-memory.dmp

          Filesize

          124KB

        • memory/1676-79-0x00000000025A0000-0x00000000025A2000-memory.dmp

          Filesize

          8KB

        • memory/1676-78-0x000007FEF3F70000-0x000007FEF4ACD000-memory.dmp

          Filesize

          11.4MB

        • memory/1676-114-0x000000001B660000-0x000000001B673000-memory.dmp

          Filesize

          76KB