Analysis

  • max time kernel
    151s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    24-05-2022 22:53

General

  • Target

    87fac03c6f2c2c9ddfe14ec528eb66235d28ac72ec72f5d10501c6cca65db6b7.exe

  • Size

    908KB

  • MD5

    2846edf91567a56a7015c1035a331ec6

  • SHA1

    5036a534c041fae0a5b89170a96118ed8df9fb8f

  • SHA256

    87fac03c6f2c2c9ddfe14ec528eb66235d28ac72ec72f5d10501c6cca65db6b7

  • SHA512

    76c9ce26d405d41c4579d94498982d75dc43d40f607dfe8b2ef52019ec6370c2f3b1ffa8266f6433758f306e27963f18fb5ac7f9dd34e12986d8a36c66e5a94e

Malware Config

Extracted

Family

gozi_rm3

Attributes
  • build

    300854

Extracted

Family

gozi_rm3

Botnet

202004141

C2

https://devicelease.xyz

Attributes
  • build

    300854

  • dga_base_url

    constitution.org/usdeclar.txt

  • dga_crc

    0x4eb7d2ca

  • dga_season

    10

  • dga_tlds

    com

    ru

    org

  • exe_type

    loader

  • server_id

    12

  • url_path

    index.htm

rsa_pubkey.plain
serpent.plain

Signatures

  • Gozi RM3

    A heavily modified version of Gozi using RM3 loader.

  • Modifies Internet Explorer settings 1 TTPs 61 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\87fac03c6f2c2c9ddfe14ec528eb66235d28ac72ec72f5d10501c6cca65db6b7.exe
    "C:\Users\Admin\AppData\Local\Temp\87fac03c6f2c2c9ddfe14ec528eb66235d28ac72ec72f5d10501c6cca65db6b7.exe"
    1⤵
      PID:1036
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2016
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2016 CREDAT:275457 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1692
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2016 CREDAT:472073 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1436
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:884
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:884 CREDAT:275457 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1748

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\020AIIFC.txt

      Filesize

      604B

      MD5

      771c4e39c493158b24d7422963c3fafd

      SHA1

      a8c4fae9f4167f3c8c406c6d16e15c748869c342

      SHA256

      b9386a1d3c4770af324b54beee1ded5b8eb4e4ddcb8fc79dc9097eac2181865a

      SHA512

      5dd92ed05b2145bf12db5f62cc26ce4d0782c19e54d031cd8b1898e74f402dccb6ff1a4f06bfa21c13bf5d45c8a1aa4465e8e875294161b1a4740f0a07aa9b05

    • memory/1036-54-0x0000000075941000-0x0000000075943000-memory.dmp

      Filesize

      8KB

    • memory/1036-56-0x0000000000400000-0x00000000004E5000-memory.dmp

      Filesize

      916KB

    • memory/1036-55-0x00000000001B0000-0x00000000001BC000-memory.dmp

      Filesize

      48KB

    • memory/1036-57-0x00000000003C0000-0x00000000003D1000-memory.dmp

      Filesize

      68KB