Analysis
-
max time kernel
151s -
max time network
180s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
19-04-2022 03:09
Behavioral task
behavioral1
Sample
1097b8ae90021f52c731afcc24fe8e70b113be4b9f8b4a517bf79fc8cf6493dc.dll
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
1097b8ae90021f52c731afcc24fe8e70b113be4b9f8b4a517bf79fc8cf6493dc.dll
Resource
win10v2004-20220310-en
General
-
Target
1097b8ae90021f52c731afcc24fe8e70b113be4b9f8b4a517bf79fc8cf6493dc.dll
-
Size
179KB
-
MD5
d399683c62c53c0566c69788e0118577
-
SHA1
c2077a951294db1d81e9dcfa2efaf59f97811f1f
-
SHA256
1097b8ae90021f52c731afcc24fe8e70b113be4b9f8b4a517bf79fc8cf6493dc
-
SHA512
9e3feea1538bb86295f692eae3b9da12b99eb65f094d11ee5367e89d6933cb61c5e09854e5858fdaf1032ec439a74582975565501a8c3eefbefb8ea034dbc13b
Malware Config
Extracted
gozi_rm3
-
build
300930
Extracted
gozi_rm3
93020441
https://topactioncam.xyz
-
build
300930
-
dga_base_url
constitution.org/usdeclar.txt
-
dga_crc
0x4eb7d2ca
-
dga_season
10
-
dga_tlds
com
ru
org
-
exe_type
loader
-
non_target_locale
RU
-
server_id
12
-
url_path
index.htm
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{65029051-BFC8-11EC-AF28-5AC3572C4626} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{94B11B51-BFC8-11EC-AF28-5AC3572C4626} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8442FDB1-BFC8-11EC-AF28-5AC3572C4626} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000358f16e0538341458b70f68dad1eafd4000000000200000000001066000000010000200000001831cf6be9a19a1d80fac2d2c6e28d8c70cc341d7dd4910787dabcf7d098f3c0000000000e80000000020000200000004fe055e268e435de67ab0d95c30622e8dcdec834d804f51a307268d2b0ddbecf20000000effd610f7adb5b52a450e809ad874ccf4867b9ce0d8cb645e8f76378cc64783c40000000836278f7cc676797acb084105693fff3676c4aba63de3971d0bd61c7ac0a03b16fc4b82d6d5bc397e4d794d8dfb7d24bac396bb88bc83068ffe16fac6cdcdc24 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 405e5644d553d801 iexplore.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
pid Process 892 iexplore.exe 1520 iexplore.exe 1552 iexplore.exe 1280 iexplore.exe 1928 iexplore.exe -
Suspicious use of SetWindowsHookEx 20 IoCs
pid Process 892 iexplore.exe 892 iexplore.exe 908 IEXPLORE.EXE 908 IEXPLORE.EXE 1520 iexplore.exe 1520 iexplore.exe 1608 IEXPLORE.EXE 1608 IEXPLORE.EXE 1552 iexplore.exe 1552 iexplore.exe 1820 IEXPLORE.EXE 1820 IEXPLORE.EXE 1280 iexplore.exe 1280 iexplore.exe 1460 IEXPLORE.EXE 1460 IEXPLORE.EXE 1928 iexplore.exe 1928 iexplore.exe 1924 IEXPLORE.EXE 1924 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 1356 wrote to memory of 1760 1356 rundll32.exe 28 PID 1356 wrote to memory of 1760 1356 rundll32.exe 28 PID 1356 wrote to memory of 1760 1356 rundll32.exe 28 PID 1356 wrote to memory of 1760 1356 rundll32.exe 28 PID 1356 wrote to memory of 1760 1356 rundll32.exe 28 PID 1356 wrote to memory of 1760 1356 rundll32.exe 28 PID 1356 wrote to memory of 1760 1356 rundll32.exe 28 PID 892 wrote to memory of 908 892 iexplore.exe 34 PID 892 wrote to memory of 908 892 iexplore.exe 34 PID 892 wrote to memory of 908 892 iexplore.exe 34 PID 892 wrote to memory of 908 892 iexplore.exe 34 PID 1520 wrote to memory of 1608 1520 iexplore.exe 37 PID 1520 wrote to memory of 1608 1520 iexplore.exe 37 PID 1520 wrote to memory of 1608 1520 iexplore.exe 37 PID 1520 wrote to memory of 1608 1520 iexplore.exe 37 PID 1552 wrote to memory of 1820 1552 iexplore.exe 39 PID 1552 wrote to memory of 1820 1552 iexplore.exe 39 PID 1552 wrote to memory of 1820 1552 iexplore.exe 39 PID 1552 wrote to memory of 1820 1552 iexplore.exe 39 PID 1280 wrote to memory of 1460 1280 iexplore.exe 41 PID 1280 wrote to memory of 1460 1280 iexplore.exe 41 PID 1280 wrote to memory of 1460 1280 iexplore.exe 41 PID 1280 wrote to memory of 1460 1280 iexplore.exe 41 PID 1928 wrote to memory of 1924 1928 iexplore.exe 43 PID 1928 wrote to memory of 1924 1928 iexplore.exe 43 PID 1928 wrote to memory of 1924 1928 iexplore.exe 43 PID 1928 wrote to memory of 1924 1928 iexplore.exe 43
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1097b8ae90021f52c731afcc24fe8e70b113be4b9f8b4a517bf79fc8cf6493dc.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1097b8ae90021f52c731afcc24fe8e70b113be4b9f8b4a517bf79fc8cf6493dc.dll,#12⤵PID:1760
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:892 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:892 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:908
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1520 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1608
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1552 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1820
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1280 CREDAT:275457 /prefetch:22⤵
- Suspicious use of SetWindowsHookEx
PID:1460
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1928 CREDAT:275457 /prefetch:22⤵
- Suspicious use of SetWindowsHookEx
PID:1924
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD52aeb925c008b7c4dae5d45f7d19be0b4
SHA14882717d427930145881e7e0b34b4da2388b1194
SHA256abc2ba6d49a0656bfa52a02809ea7560398e806ad72905dbd7d9ce92837beff4
SHA512ed5b601266a9ef02131ba3c137ba220a1cd45a5b61cb7ebf5c2e00fedf528f687020d18b8f842c77ad2963426a7952e68c4a86f8d3c2686c8468a38717b23315
-
Filesize
4KB
MD52aeb925c008b7c4dae5d45f7d19be0b4
SHA14882717d427930145881e7e0b34b4da2388b1194
SHA256abc2ba6d49a0656bfa52a02809ea7560398e806ad72905dbd7d9ce92837beff4
SHA512ed5b601266a9ef02131ba3c137ba220a1cd45a5b61cb7ebf5c2e00fedf528f687020d18b8f842c77ad2963426a7952e68c4a86f8d3c2686c8468a38717b23315
-
Filesize
4KB
MD52aeb925c008b7c4dae5d45f7d19be0b4
SHA14882717d427930145881e7e0b34b4da2388b1194
SHA256abc2ba6d49a0656bfa52a02809ea7560398e806ad72905dbd7d9ce92837beff4
SHA512ed5b601266a9ef02131ba3c137ba220a1cd45a5b61cb7ebf5c2e00fedf528f687020d18b8f842c77ad2963426a7952e68c4a86f8d3c2686c8468a38717b23315
-
Filesize
4KB
MD52aeb925c008b7c4dae5d45f7d19be0b4
SHA14882717d427930145881e7e0b34b4da2388b1194
SHA256abc2ba6d49a0656bfa52a02809ea7560398e806ad72905dbd7d9ce92837beff4
SHA512ed5b601266a9ef02131ba3c137ba220a1cd45a5b61cb7ebf5c2e00fedf528f687020d18b8f842c77ad2963426a7952e68c4a86f8d3c2686c8468a38717b23315