Analysis

  • max time kernel
    145s
  • max time network
    186s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    02-05-2022 15:39

General

  • Target

    2b4a1e90e4b691cd320e26cbf167c987a72dd8df3fc4260873c92b0f3ffb2d43.exe

  • Size

    462KB

  • MD5

    b211ecffe6b2c724df0318a1c95672c6

  • SHA1

    d2b87d0586de7dabe031d2f16e69a0855fdf07c4

  • SHA256

    2b4a1e90e4b691cd320e26cbf167c987a72dd8df3fc4260873c92b0f3ffb2d43

  • SHA512

    64fa3c56f23fb38887973fae3b2040df1c389789f2acb23235aa196f0186c88c1cf3cc1ddc55926e0e101865aee93068a969b24fbd3d8b9989b9c9763af7cd0f

Malware Config

Extracted

Family

gozi_rm3

Attributes
  • build

    300898

Extracted

Family

gozi_rm3

Botnet

89820235

C2

https://exeupay.xyz

Attributes
  • build

    300898

  • exe_type

    loader

  • server_id

    12

  • url_path

    index.htm

rsa_pubkey.plain
serpent.plain

Signatures

  • Gozi RM3

    A heavily modified version of Gozi using RM3 loader.

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SetWindowsHookEx 16 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2b4a1e90e4b691cd320e26cbf167c987a72dd8df3fc4260873c92b0f3ffb2d43.exe
    "C:\Users\Admin\AppData\Local\Temp\2b4a1e90e4b691cd320e26cbf167c987a72dd8df3fc4260873c92b0f3ffb2d43.exe"
    1⤵
      PID:2532
    • C:\Program Files (x86)\Internet Explorer\ielowutil.exe
      "C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding
      1⤵
        PID:4456
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
        1⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4528
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4528 CREDAT:17410 /prefetch:2
          2⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:4520
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4528 CREDAT:82950 /prefetch:2
          2⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:212
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4528 CREDAT:17416 /prefetch:2
          2⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:4236
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
        1⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3452
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3452 CREDAT:17410 /prefetch:2
          2⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:4816

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

        Filesize

        471B

        MD5

        0c86bf02fe6962a29a4874c45505cfc1

        SHA1

        3f4a2d3c0d936af0c3b4b19f3ff7327d8b011a41

        SHA256

        ed234e2f9d2e12aedc0930860a169129ee0256f5710be997efbf11bce7409626

        SHA512

        caff37c0d8fd2f841a108a37cd752ae426f1c9e7958b901a7ab67b70be4c327f38b288156e52493688c7e67432d0b98bf95b1a0be39e0abd79d3fe8e74487561

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

        Filesize

        434B

        MD5

        799c8d2de1ad351166318c0912176c4a

        SHA1

        800729bb215e4b818fbf77f6e7d6e2e1e07488bb

        SHA256

        1a52b687ffa5d4e90a0b78eaf8bf9040070d40dc15fe0bb11c7fe083a9690271

        SHA512

        44a1cce3902081f71af974f4a6dd0b4f9f778df31421990d798c95ba7c33b58690ca4241a2781c22ceaef574a80bdf90b9cea98d11b2f2633fb6797de8a69e49

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\28c8b86deab549a1.customDestinations-ms

        Filesize

        3KB

        MD5

        1c8c8c72a5a8eedfded147080d0a3e84

        SHA1

        c4e7ac8481f35bb88f28752e413a97ddc09d7e87

        SHA256

        bae90514bda73e38dd4fe963670d7a5a0e7e18231e275770e5f70de80b0327a3

        SHA512

        ec1114b9cea1ab5486cef0be119de86123096ff2bf20f4e311a3feb24ee1be954ea2ff4a5ddfcade7679d04a7e7179381016125eb4e6a67f1bff973f28203e93

      • memory/2532-130-0x00000000021C0000-0x00000000021E8000-memory.dmp

        Filesize

        160KB

      • memory/2532-131-0x0000000000400000-0x0000000000474000-memory.dmp

        Filesize

        464KB

      • memory/2532-132-0x0000000002220000-0x0000000002236000-memory.dmp

        Filesize

        88KB