Analysis
-
max time kernel
53s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
02-06-2022 18:14
Static task
static1
Behavioral task
behavioral1
Sample
14c677290ebe1bf2be247eb076e2a702d1bc713d6ae249b1f00c78762c8b6549.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
14c677290ebe1bf2be247eb076e2a702d1bc713d6ae249b1f00c78762c8b6549.exe
Resource
win10v2004-20220414-en
General
-
Target
14c677290ebe1bf2be247eb076e2a702d1bc713d6ae249b1f00c78762c8b6549.exe
-
Size
507KB
-
MD5
acae0628b7df86f2257e76c064adc63c
-
SHA1
0ad10d85a70187745849d38551e6cb197f067d19
-
SHA256
14c677290ebe1bf2be247eb076e2a702d1bc713d6ae249b1f00c78762c8b6549
-
SHA512
a81035177ebded54a1b54061f84da06fe42ee56fb2f07e0a1c7cc39eb109b83c1ef196034bba743b1eca47e7a6b78866327f5f3c5fbfd93c084735c7d8332027
Malware Config
Extracted
gozi_ifsb
-
build
214963
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
DDOIdMgr.exepid process 2016 DDOIdMgr.exe -
Deletes itself 1 IoCs
Processes:
DDOIdMgr.exepid process 2016 DDOIdMgr.exe -
Loads dropped DLL 1 IoCs
Processes:
cmd.exepid process 1916 cmd.exe -
Unexpected DNS network traffic destination 3 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
Processes:
description ioc Destination IP 208.67.222.222 Destination IP 208.67.222.222 Destination IP 208.67.222.222 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
14c677290ebe1bf2be247eb076e2a702d1bc713d6ae249b1f00c78762c8b6549.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows\CurrentVersion\Run\auth8thk = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Datadler\\DDOIdMgr.exe" 14c677290ebe1bf2be247eb076e2a702d1bc713d6ae249b1f00c78762c8b6549.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
DDOIdMgr.exesvchost.exedescription pid process target process PID 2016 set thread context of 2020 2016 DDOIdMgr.exe svchost.exe PID 2020 set thread context of 1344 2020 svchost.exe Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
DDOIdMgr.exeExplorer.EXEpid process 2016 DDOIdMgr.exe 1344 Explorer.EXE -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
DDOIdMgr.exesvchost.exepid process 2016 DDOIdMgr.exe 2020 svchost.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
Explorer.EXEpid process 1344 Explorer.EXE 1344 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
Explorer.EXEpid process 1344 Explorer.EXE 1344 Explorer.EXE -
Suspicious use of WriteProcessMemory 31 IoCs
Processes:
14c677290ebe1bf2be247eb076e2a702d1bc713d6ae249b1f00c78762c8b6549.execmd.execmd.exeDDOIdMgr.exesvchost.exeExplorer.EXEcmd.exedescription pid process target process PID 800 wrote to memory of 1500 800 14c677290ebe1bf2be247eb076e2a702d1bc713d6ae249b1f00c78762c8b6549.exe cmd.exe PID 800 wrote to memory of 1500 800 14c677290ebe1bf2be247eb076e2a702d1bc713d6ae249b1f00c78762c8b6549.exe cmd.exe PID 800 wrote to memory of 1500 800 14c677290ebe1bf2be247eb076e2a702d1bc713d6ae249b1f00c78762c8b6549.exe cmd.exe PID 800 wrote to memory of 1500 800 14c677290ebe1bf2be247eb076e2a702d1bc713d6ae249b1f00c78762c8b6549.exe cmd.exe PID 1500 wrote to memory of 1916 1500 cmd.exe cmd.exe PID 1500 wrote to memory of 1916 1500 cmd.exe cmd.exe PID 1500 wrote to memory of 1916 1500 cmd.exe cmd.exe PID 1500 wrote to memory of 1916 1500 cmd.exe cmd.exe PID 1916 wrote to memory of 2016 1916 cmd.exe DDOIdMgr.exe PID 1916 wrote to memory of 2016 1916 cmd.exe DDOIdMgr.exe PID 1916 wrote to memory of 2016 1916 cmd.exe DDOIdMgr.exe PID 1916 wrote to memory of 2016 1916 cmd.exe DDOIdMgr.exe PID 2016 wrote to memory of 2020 2016 DDOIdMgr.exe svchost.exe PID 2016 wrote to memory of 2020 2016 DDOIdMgr.exe svchost.exe PID 2016 wrote to memory of 2020 2016 DDOIdMgr.exe svchost.exe PID 2016 wrote to memory of 2020 2016 DDOIdMgr.exe svchost.exe PID 2016 wrote to memory of 2020 2016 DDOIdMgr.exe svchost.exe PID 2016 wrote to memory of 2020 2016 DDOIdMgr.exe svchost.exe PID 2016 wrote to memory of 2020 2016 DDOIdMgr.exe svchost.exe PID 2020 wrote to memory of 1344 2020 svchost.exe Explorer.EXE PID 2020 wrote to memory of 1344 2020 svchost.exe Explorer.EXE PID 2020 wrote to memory of 1344 2020 svchost.exe Explorer.EXE PID 1344 wrote to memory of 1732 1344 Explorer.EXE cmd.exe PID 1344 wrote to memory of 1732 1344 Explorer.EXE cmd.exe PID 1344 wrote to memory of 1732 1344 Explorer.EXE cmd.exe PID 1732 wrote to memory of 1472 1732 cmd.exe nslookup.exe PID 1732 wrote to memory of 1472 1732 cmd.exe nslookup.exe PID 1732 wrote to memory of 1472 1732 cmd.exe nslookup.exe PID 1344 wrote to memory of 828 1344 Explorer.EXE cmd.exe PID 1344 wrote to memory of 828 1344 Explorer.EXE cmd.exe PID 1344 wrote to memory of 828 1344 Explorer.EXE cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Users\Admin\AppData\Local\Temp\14c677290ebe1bf2be247eb076e2a702d1bc713d6ae249b1f00c78762c8b6549.exe"C:\Users\Admin\AppData\Local\Temp\14c677290ebe1bf2be247eb076e2a702d1bc713d6ae249b1f00c78762c8b6549.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:800 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\5953\F25.bat" "C:\Users\Admin\AppData\Roaming\MICROS~1\Datadler\DDOIdMgr.exe" "C:\Users\Admin\AppData\Local\Temp\14C677~1.EXE""3⤵
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Windows\SysWOW64\cmd.execmd /C ""C:\Users\Admin\AppData\Roaming\MICROS~1\Datadler\DDOIdMgr.exe" "C:\Users\Admin\AppData\Local\Temp\14C677~1.EXE""4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Users\Admin\AppData\Roaming\MICROS~1\Datadler\DDOIdMgr.exe"C:\Users\Admin\AppData\Roaming\MICROS~1\Datadler\DDOIdMgr.exe" "C:\Users\Admin\AppData\Local\Temp\14C677~1.EXE"5⤵
- Executes dropped EXE
- Deletes itself
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe6⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2020
-
-
-
-
-
-
C:\Windows\system32\cmd.execmd /C "nslookup myip.opendns.com resolver1.opendns.com > C:\Users\Admin\AppData\Local\Temp\C4E4.bi1"2⤵
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\system32\nslookup.exenslookup myip.opendns.com resolver1.opendns.com3⤵PID:1472
-
-
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\C4E4.bi1"2⤵PID:828
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
108B
MD53c422cca0209857d00ea25fd1cbd3ff9
SHA185e36a57db65448968bd4a246ef15b8081f58356
SHA2561d85f288fc19f2f9d4c962e2f70a2708f2d45d81d96e1fc6d9d9ba932f483236
SHA512677d6ff6aa1a49af8d43872cbda25e8e79da6b148845ad60951ccac21c188b617d7b6e17a466f4c2ed8610548db69b36d35309ede44e269c9dc331d412458de8
-
Filesize
118B
MD54f6429322fdfd711b81d8824b25fcd9c
SHA1f7f917b64dd43b620bacd21f134d430d3c406aec
SHA256d22c844d015c874bbdbeb12b73ef54585cbd435c28f50d536fb4ace26d859ed8
SHA512e661f8d79b031a4a043a388ec17d82b5092859ac1d0ce6668a082feecf1da5665837ad1ef984751c7be174bbb6c1012f45d9f550d5cf65dc8b0e6cddcbdb0816
-
Filesize
118B
MD54f6429322fdfd711b81d8824b25fcd9c
SHA1f7f917b64dd43b620bacd21f134d430d3c406aec
SHA256d22c844d015c874bbdbeb12b73ef54585cbd435c28f50d536fb4ace26d859ed8
SHA512e661f8d79b031a4a043a388ec17d82b5092859ac1d0ce6668a082feecf1da5665837ad1ef984751c7be174bbb6c1012f45d9f550d5cf65dc8b0e6cddcbdb0816
-
Filesize
507KB
MD5acae0628b7df86f2257e76c064adc63c
SHA10ad10d85a70187745849d38551e6cb197f067d19
SHA25614c677290ebe1bf2be247eb076e2a702d1bc713d6ae249b1f00c78762c8b6549
SHA512a81035177ebded54a1b54061f84da06fe42ee56fb2f07e0a1c7cc39eb109b83c1ef196034bba743b1eca47e7a6b78866327f5f3c5fbfd93c084735c7d8332027
-
Filesize
507KB
MD5acae0628b7df86f2257e76c064adc63c
SHA10ad10d85a70187745849d38551e6cb197f067d19
SHA25614c677290ebe1bf2be247eb076e2a702d1bc713d6ae249b1f00c78762c8b6549
SHA512a81035177ebded54a1b54061f84da06fe42ee56fb2f07e0a1c7cc39eb109b83c1ef196034bba743b1eca47e7a6b78866327f5f3c5fbfd93c084735c7d8332027
-
Filesize
507KB
MD5acae0628b7df86f2257e76c064adc63c
SHA10ad10d85a70187745849d38551e6cb197f067d19
SHA25614c677290ebe1bf2be247eb076e2a702d1bc713d6ae249b1f00c78762c8b6549
SHA512a81035177ebded54a1b54061f84da06fe42ee56fb2f07e0a1c7cc39eb109b83c1ef196034bba743b1eca47e7a6b78866327f5f3c5fbfd93c084735c7d8332027