Analysis

  • max time kernel
    146s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    24-05-2022 22:54

General

  • Target

    33f02815a25172b12a516e72ea50eb8ca40630bd74f63941020848888cbe1ea8.exe

  • Size

    462KB

  • MD5

    dad32a0cd14d8b4244a9df1cc9c82185

  • SHA1

    6a00cf1e4026a7403eaf5ca328b63c417308c4df

  • SHA256

    33f02815a25172b12a516e72ea50eb8ca40630bd74f63941020848888cbe1ea8

  • SHA512

    c54d2495e0e65b6bd45f2407ef2fc9ae7a63884b362eaba0ce67023f6dce8be3ef97448f34ed1be09e5e9713f03d4d8e2b4719d2158df1b9891df0f6f1c72c8b

Malware Config

Extracted

Family

gozi_rm3

Attributes
  • build

    300898

Extracted

Family

gozi_rm3

Botnet

89820235

C2

https://exeupay.xyz

Attributes
  • build

    300898

  • exe_type

    loader

  • server_id

    12

  • url_path

    index.htm

rsa_pubkey.plain
serpent.plain

Signatures

  • Gozi RM3

    A heavily modified version of Gozi using RM3 loader.

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SetWindowsHookEx 16 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\33f02815a25172b12a516e72ea50eb8ca40630bd74f63941020848888cbe1ea8.exe
    "C:\Users\Admin\AppData\Local\Temp\33f02815a25172b12a516e72ea50eb8ca40630bd74f63941020848888cbe1ea8.exe"
    1⤵
      PID:976
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1724
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1724 CREDAT:275457 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1184
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1724 CREDAT:472075 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:992
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1484
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1484 CREDAT:275457 /prefetch:2
        2⤵
        • Suspicious use of SetWindowsHookEx
        PID:1988
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1948
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1948 CREDAT:275457 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:760

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/976-54-0x00000000752D1000-0x00000000752D3000-memory.dmp

      Filesize

      8KB

    • memory/976-55-0x0000000000220000-0x0000000000248000-memory.dmp

      Filesize

      160KB

    • memory/976-56-0x0000000000400000-0x0000000000474000-memory.dmp

      Filesize

      464KB

    • memory/976-57-0x0000000000280000-0x0000000000296000-memory.dmp

      Filesize

      88KB