Analysis
-
max time kernel
51s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
07-06-2022 03:46
Static task
static1
Behavioral task
behavioral1
Sample
1d63b5ce77d19d8522c2fec8776170851701ac3e983687dc61f94324307fa67a.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
1d63b5ce77d19d8522c2fec8776170851701ac3e983687dc61f94324307fa67a.exe
Resource
win10v2004-20220414-en
General
-
Target
1d63b5ce77d19d8522c2fec8776170851701ac3e983687dc61f94324307fa67a.exe
-
Size
388KB
-
MD5
0bb4c690fe90c499275a1b268b5ff0eb
-
SHA1
4308d202a1f308db17e6a5b1eda83aa18aa45ece
-
SHA256
1d63b5ce77d19d8522c2fec8776170851701ac3e983687dc61f94324307fa67a
-
SHA512
9b01f020cc2899eb10353072359d343e6b81df1fbea6f6f2d5b138c039a1d9b160da814aaf194fae9561c35550724b1623b086282846d31da9b8dfb89fe83074
Malware Config
Extracted
gozi_ifsb
1010
diuolirt.at
deopliazae.at
nifredao.com
filokiyurt.at
-
exe_type
worker
-
server_id
12
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
ACCTient.exepid process 2000 ACCTient.exe -
Deletes itself 1 IoCs
Processes:
ACCTient.exepid process 2000 ACCTient.exe -
Loads dropped DLL 2 IoCs
Processes:
cmd.exepid process 1980 cmd.exe 1980 cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
1d63b5ce77d19d8522c2fec8776170851701ac3e983687dc61f94324307fa67a.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows\CurrentVersion\Run\Audiedit = "C:\\Users\\Admin\\AppData\\Roaming\\bitsmuid\\ACCTient.exe" 1d63b5ce77d19d8522c2fec8776170851701ac3e983687dc61f94324307fa67a.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
ACCTient.exesvchost.exedescription pid process target process PID 2000 set thread context of 1948 2000 ACCTient.exe svchost.exe PID 1948 set thread context of 1396 1948 svchost.exe Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
ACCTient.exeExplorer.EXEpid process 2000 ACCTient.exe 1396 Explorer.EXE -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
ACCTient.exesvchost.exepid process 2000 ACCTient.exe 1948 svchost.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
Explorer.EXEpid process 1396 Explorer.EXE 1396 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
Explorer.EXEpid process 1396 Explorer.EXE 1396 Explorer.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Explorer.EXEpid process 1396 Explorer.EXE -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
1d63b5ce77d19d8522c2fec8776170851701ac3e983687dc61f94324307fa67a.execmd.execmd.exeACCTient.exesvchost.exedescription pid process target process PID 784 wrote to memory of 2016 784 1d63b5ce77d19d8522c2fec8776170851701ac3e983687dc61f94324307fa67a.exe cmd.exe PID 784 wrote to memory of 2016 784 1d63b5ce77d19d8522c2fec8776170851701ac3e983687dc61f94324307fa67a.exe cmd.exe PID 784 wrote to memory of 2016 784 1d63b5ce77d19d8522c2fec8776170851701ac3e983687dc61f94324307fa67a.exe cmd.exe PID 784 wrote to memory of 2016 784 1d63b5ce77d19d8522c2fec8776170851701ac3e983687dc61f94324307fa67a.exe cmd.exe PID 2016 wrote to memory of 1980 2016 cmd.exe cmd.exe PID 2016 wrote to memory of 1980 2016 cmd.exe cmd.exe PID 2016 wrote to memory of 1980 2016 cmd.exe cmd.exe PID 2016 wrote to memory of 1980 2016 cmd.exe cmd.exe PID 1980 wrote to memory of 2000 1980 cmd.exe ACCTient.exe PID 1980 wrote to memory of 2000 1980 cmd.exe ACCTient.exe PID 1980 wrote to memory of 2000 1980 cmd.exe ACCTient.exe PID 1980 wrote to memory of 2000 1980 cmd.exe ACCTient.exe PID 2000 wrote to memory of 1948 2000 ACCTient.exe svchost.exe PID 2000 wrote to memory of 1948 2000 ACCTient.exe svchost.exe PID 2000 wrote to memory of 1948 2000 ACCTient.exe svchost.exe PID 2000 wrote to memory of 1948 2000 ACCTient.exe svchost.exe PID 2000 wrote to memory of 1948 2000 ACCTient.exe svchost.exe PID 2000 wrote to memory of 1948 2000 ACCTient.exe svchost.exe PID 2000 wrote to memory of 1948 2000 ACCTient.exe svchost.exe PID 1948 wrote to memory of 1396 1948 svchost.exe Explorer.EXE PID 1948 wrote to memory of 1396 1948 svchost.exe Explorer.EXE PID 1948 wrote to memory of 1396 1948 svchost.exe Explorer.EXE
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\1d63b5ce77d19d8522c2fec8776170851701ac3e983687dc61f94324307fa67a.exe"C:\Users\Admin\AppData\Local\Temp\1d63b5ce77d19d8522c2fec8776170851701ac3e983687dc61f94324307fa67a.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\8C2C\23.bat" "C:\Users\Admin\AppData\Roaming\bitsmuid\ACCTient.exe" "C:\Users\Admin\AppData\Local\Temp\1D63B5~1.EXE""3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd /C ""C:\Users\Admin\AppData\Roaming\bitsmuid\ACCTient.exe" "C:\Users\Admin\AppData\Local\Temp\1D63B5~1.EXE""4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\bitsmuid\ACCTient.exe"C:\Users\Admin\AppData\Roaming\bitsmuid\ACCTient.exe" "C:\Users\Admin\AppData\Local\Temp\1D63B5~1.EXE"5⤵
- Executes dropped EXE
- Deletes itself
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe6⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\8C2C\23.batFilesize
108B
MD54c1a57592f597a511e6f1fdc7c136e10
SHA1c943ddbaf4fb32215855144c1939ac796a2e08fb
SHA256cea9a1bd0293bb12da36d85d405fa767aa47542822ddd681b92339a0c401550e
SHA5123e74d762d062a4032281a31efecb2ca2bb92c0f95884925e9981ef93f01197111fe6cb8346354de1c48e7f194f0be693a9ba81dea916f12d8bf3cff24970bb3b
-
C:\Users\Admin\AppData\Roaming\bitsmuid\ACCTient.exeFilesize
388KB
MD50bb4c690fe90c499275a1b268b5ff0eb
SHA14308d202a1f308db17e6a5b1eda83aa18aa45ece
SHA2561d63b5ce77d19d8522c2fec8776170851701ac3e983687dc61f94324307fa67a
SHA5129b01f020cc2899eb10353072359d343e6b81df1fbea6f6f2d5b138c039a1d9b160da814aaf194fae9561c35550724b1623b086282846d31da9b8dfb89fe83074
-
C:\Users\Admin\AppData\Roaming\bitsmuid\ACCTient.exeFilesize
388KB
MD50bb4c690fe90c499275a1b268b5ff0eb
SHA14308d202a1f308db17e6a5b1eda83aa18aa45ece
SHA2561d63b5ce77d19d8522c2fec8776170851701ac3e983687dc61f94324307fa67a
SHA5129b01f020cc2899eb10353072359d343e6b81df1fbea6f6f2d5b138c039a1d9b160da814aaf194fae9561c35550724b1623b086282846d31da9b8dfb89fe83074
-
\Users\Admin\AppData\Roaming\bitsmuid\ACCTient.exeFilesize
388KB
MD50bb4c690fe90c499275a1b268b5ff0eb
SHA14308d202a1f308db17e6a5b1eda83aa18aa45ece
SHA2561d63b5ce77d19d8522c2fec8776170851701ac3e983687dc61f94324307fa67a
SHA5129b01f020cc2899eb10353072359d343e6b81df1fbea6f6f2d5b138c039a1d9b160da814aaf194fae9561c35550724b1623b086282846d31da9b8dfb89fe83074
-
\Users\Admin\AppData\Roaming\bitsmuid\ACCTient.exeFilesize
388KB
MD50bb4c690fe90c499275a1b268b5ff0eb
SHA14308d202a1f308db17e6a5b1eda83aa18aa45ece
SHA2561d63b5ce77d19d8522c2fec8776170851701ac3e983687dc61f94324307fa67a
SHA5129b01f020cc2899eb10353072359d343e6b81df1fbea6f6f2d5b138c039a1d9b160da814aaf194fae9561c35550724b1623b086282846d31da9b8dfb89fe83074
-
memory/784-55-0x0000000000400000-0x0000000000463000-memory.dmpFilesize
396KB
-
memory/784-57-0x0000000000220000-0x0000000000250000-memory.dmpFilesize
192KB
-
memory/784-54-0x0000000076391000-0x0000000076393000-memory.dmpFilesize
8KB
-
memory/1396-72-0x0000000002990000-0x0000000002A05000-memory.dmpFilesize
468KB
-
memory/1396-73-0x0000000002990000-0x0000000002A05000-memory.dmpFilesize
468KB
-
memory/1948-70-0x0000000000000000-mapping.dmp
-
memory/1948-71-0x0000000000430000-0x00000000004A5000-memory.dmpFilesize
468KB
-
memory/1980-60-0x0000000000000000-mapping.dmp
-
memory/2000-64-0x0000000000000000-mapping.dmp
-
memory/2000-67-0x0000000000400000-0x0000000000463000-memory.dmpFilesize
396KB
-
memory/2000-69-0x00000000003A0000-0x00000000003D0000-memory.dmpFilesize
192KB
-
memory/2016-58-0x0000000000000000-mapping.dmp