Analysis

  • max time kernel
    126s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    24-05-2022 22:54

General

  • Target

    0854b6f605b87e6943533f40a6feef85f2cc158dce81eaf124e2987e40193fe2.exe

  • Size

    461KB

  • MD5

    d3b3bed750480738d9eca81ee29be228

  • SHA1

    668285875eff29ccd992c3c7b7efd279892b11db

  • SHA256

    0854b6f605b87e6943533f40a6feef85f2cc158dce81eaf124e2987e40193fe2

  • SHA512

    59055eae641fb8980c022a2b1b69c32c3656e42ed779afda089308be048362f40bdbbc1471120492da4933af08ca4d0c8c8d788ccb53fd6578d46673c0e6eea5

Malware Config

Extracted

Family

gozi_rm3

Attributes
  • build

    300898

  • exe_type

    loader

Extracted

Family

gozi_rm3

Botnet

89820235

C2

https://exeupay.xyz

Attributes
  • build

    300898

  • exe_type

    loader

  • server_id

    12

  • url_path

    index.htm

rsa_pubkey.plain
serpent.plain

Signatures

  • Gozi RM3

    A heavily modified version of Gozi using RM3 loader.

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0854b6f605b87e6943533f40a6feef85f2cc158dce81eaf124e2987e40193fe2.exe
    "C:\Users\Admin\AppData\Local\Temp\0854b6f605b87e6943533f40a6feef85f2cc158dce81eaf124e2987e40193fe2.exe"
    1⤵
      PID:2428
    • C:\Program Files (x86)\Internet Explorer\ielowutil.exe
      "C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding
      1⤵
        PID:2040
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
        1⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3392
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3392 CREDAT:17410 /prefetch:2
          2⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:3720
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3392 CREDAT:82952 /prefetch:2
          2⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1040
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
        1⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4320
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4320 CREDAT:17410 /prefetch:2
          2⤵
            PID:1868
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
          1⤵
            PID:4816
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4816 CREDAT:17410 /prefetch:2
              2⤵
                PID:4760

            Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

              Filesize

              471B

              MD5

              3c94b790a4d3d3813b9804b360811c02

              SHA1

              9b42bca99be723330c45b22abb0698f77ef8077a

              SHA256

              7bc88a561babff736195edc916e12556d4a870e9dc94e649adff7d6859468d93

              SHA512

              594410b019fde2552e456bf87934eab332c73d5a1c73c3fac27886bb2c8f2b2c174acb0fa5f67b40a4b41339cff713b239eab680c6dd7aab00aacaf8e38538b8

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

              Filesize

              434B

              MD5

              b79b93bb893ccd3dfa380155112943e1

              SHA1

              4cd17a9ff981b98fc217f5c6de94356f539b03f7

              SHA256

              5bd529cd93eaeb21b0897a122f89541b5a6ac968cb82d3562bc26eea24f415fa

              SHA512

              08e151a50da27aaa4918665e1347b2e97e04ed6d4e09d190a980c5bb60b97137745e3c2f041da62c7e284219692c73ab53472b2b3a4afd5e5bed510ba8bcb645

            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\28c8b86deab549a1.customDestinations-ms

              Filesize

              3KB

              MD5

              1dd3a913d637ed2e10c2f55bc356d180

              SHA1

              d2543825151cfb6f8b602d8a9959aa9c8d7b32d0

              SHA256

              96e5722d94362a4146ed39a17d96a733dbb9c809523d3f1bafaec1deea4618b7

              SHA512

              96b782dfd0b9845e9c77805bb1ce6559a246fd1cb37d355d1a3bba3b4dff9b9cc7070fea3101f7ad19429fc460d3edd5ee3d593f194db99bdae45dcd1a547f72

            • memory/2428-130-0x0000000000630000-0x0000000000646000-memory.dmp

              Filesize

              88KB

            • memory/2428-137-0x0000000000400000-0x0000000000474000-memory.dmp

              Filesize

              464KB

            • memory/2428-136-0x00000000005D0000-0x00000000005F8000-memory.dmp

              Filesize

              160KB