Analysis
-
max time kernel
54s -
max time network
98s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
08-06-2022 23:21
Static task
static1
Behavioral task
behavioral1
Sample
16c2bfc8a95cd2996a5169d3fe441f6a8ac0d8fcf4c5562b6de6e68dac3ae35f.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
16c2bfc8a95cd2996a5169d3fe441f6a8ac0d8fcf4c5562b6de6e68dac3ae35f.exe
Resource
win10v2004-20220414-en
General
-
Target
16c2bfc8a95cd2996a5169d3fe441f6a8ac0d8fcf4c5562b6de6e68dac3ae35f.exe
-
Size
493KB
-
MD5
7e12831b97ad63445fc0e9173b98b4b0
-
SHA1
36adafaafea6740027beef8d8f6d762ede47203d
-
SHA256
16c2bfc8a95cd2996a5169d3fe441f6a8ac0d8fcf4c5562b6de6e68dac3ae35f
-
SHA512
44d6f4d58712f45838627cc8bde00e63b52d9c2bc9bc45ffa6963725f6b26ab307e61d40c469bc10a657d84137e62ad8ee861744f0208ba0bdef9d8f2bd97f9f
Malware Config
Extracted
gozi_ifsb
-
build
214963
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
DDOIdMgr.exepid process 1768 DDOIdMgr.exe -
Deletes itself 1 IoCs
Processes:
DDOIdMgr.exepid process 1768 DDOIdMgr.exe -
Loads dropped DLL 1 IoCs
Processes:
cmd.exepid process 1468 cmd.exe -
Unexpected DNS network traffic destination 3 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
Processes:
description ioc Destination IP 208.67.222.222 Destination IP 208.67.222.222 Destination IP 208.67.222.222 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
16c2bfc8a95cd2996a5169d3fe441f6a8ac0d8fcf4c5562b6de6e68dac3ae35f.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows\CurrentVersion\Run\auth8thk = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Datadler\\DDOIdMgr.exe" 16c2bfc8a95cd2996a5169d3fe441f6a8ac0d8fcf4c5562b6de6e68dac3ae35f.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
DDOIdMgr.exesvchost.exedescription pid process target process PID 1768 set thread context of 1224 1768 DDOIdMgr.exe svchost.exe PID 1224 set thread context of 1424 1224 svchost.exe Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
DDOIdMgr.exeExplorer.EXEpid process 1768 DDOIdMgr.exe 1424 Explorer.EXE -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
DDOIdMgr.exesvchost.exepid process 1768 DDOIdMgr.exe 1224 svchost.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
Explorer.EXEpid process 1424 Explorer.EXE 1424 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
Explorer.EXEpid process 1424 Explorer.EXE 1424 Explorer.EXE -
Suspicious use of WriteProcessMemory 31 IoCs
Processes:
16c2bfc8a95cd2996a5169d3fe441f6a8ac0d8fcf4c5562b6de6e68dac3ae35f.execmd.execmd.exeDDOIdMgr.exesvchost.exeExplorer.EXEcmd.exedescription pid process target process PID 988 wrote to memory of 2040 988 16c2bfc8a95cd2996a5169d3fe441f6a8ac0d8fcf4c5562b6de6e68dac3ae35f.exe cmd.exe PID 988 wrote to memory of 2040 988 16c2bfc8a95cd2996a5169d3fe441f6a8ac0d8fcf4c5562b6de6e68dac3ae35f.exe cmd.exe PID 988 wrote to memory of 2040 988 16c2bfc8a95cd2996a5169d3fe441f6a8ac0d8fcf4c5562b6de6e68dac3ae35f.exe cmd.exe PID 988 wrote to memory of 2040 988 16c2bfc8a95cd2996a5169d3fe441f6a8ac0d8fcf4c5562b6de6e68dac3ae35f.exe cmd.exe PID 2040 wrote to memory of 1468 2040 cmd.exe cmd.exe PID 2040 wrote to memory of 1468 2040 cmd.exe cmd.exe PID 2040 wrote to memory of 1468 2040 cmd.exe cmd.exe PID 2040 wrote to memory of 1468 2040 cmd.exe cmd.exe PID 1468 wrote to memory of 1768 1468 cmd.exe DDOIdMgr.exe PID 1468 wrote to memory of 1768 1468 cmd.exe DDOIdMgr.exe PID 1468 wrote to memory of 1768 1468 cmd.exe DDOIdMgr.exe PID 1468 wrote to memory of 1768 1468 cmd.exe DDOIdMgr.exe PID 1768 wrote to memory of 1224 1768 DDOIdMgr.exe svchost.exe PID 1768 wrote to memory of 1224 1768 DDOIdMgr.exe svchost.exe PID 1768 wrote to memory of 1224 1768 DDOIdMgr.exe svchost.exe PID 1768 wrote to memory of 1224 1768 DDOIdMgr.exe svchost.exe PID 1768 wrote to memory of 1224 1768 DDOIdMgr.exe svchost.exe PID 1768 wrote to memory of 1224 1768 DDOIdMgr.exe svchost.exe PID 1768 wrote to memory of 1224 1768 DDOIdMgr.exe svchost.exe PID 1224 wrote to memory of 1424 1224 svchost.exe Explorer.EXE PID 1224 wrote to memory of 1424 1224 svchost.exe Explorer.EXE PID 1224 wrote to memory of 1424 1224 svchost.exe Explorer.EXE PID 1424 wrote to memory of 1168 1424 Explorer.EXE cmd.exe PID 1424 wrote to memory of 1168 1424 Explorer.EXE cmd.exe PID 1424 wrote to memory of 1168 1424 Explorer.EXE cmd.exe PID 1168 wrote to memory of 1552 1168 cmd.exe nslookup.exe PID 1168 wrote to memory of 1552 1168 cmd.exe nslookup.exe PID 1168 wrote to memory of 1552 1168 cmd.exe nslookup.exe PID 1424 wrote to memory of 1532 1424 Explorer.EXE cmd.exe PID 1424 wrote to memory of 1532 1424 Explorer.EXE cmd.exe PID 1424 wrote to memory of 1532 1424 Explorer.EXE cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Users\Admin\AppData\Local\Temp\16c2bfc8a95cd2996a5169d3fe441f6a8ac0d8fcf4c5562b6de6e68dac3ae35f.exe"C:\Users\Admin\AppData\Local\Temp\16c2bfc8a95cd2996a5169d3fe441f6a8ac0d8fcf4c5562b6de6e68dac3ae35f.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:988 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\BD9D\2998.bat" "C:\Users\Admin\AppData\Roaming\MICROS~1\Datadler\DDOIdMgr.exe" "C:\Users\Admin\AppData\Local\Temp\16C2BF~1.EXE""3⤵
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\SysWOW64\cmd.execmd /C ""C:\Users\Admin\AppData\Roaming\MICROS~1\Datadler\DDOIdMgr.exe" "C:\Users\Admin\AppData\Local\Temp\16C2BF~1.EXE""4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Users\Admin\AppData\Roaming\MICROS~1\Datadler\DDOIdMgr.exe"C:\Users\Admin\AppData\Roaming\MICROS~1\Datadler\DDOIdMgr.exe" "C:\Users\Admin\AppData\Local\Temp\16C2BF~1.EXE"5⤵
- Executes dropped EXE
- Deletes itself
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe6⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1224
-
-
-
-
-
-
C:\Windows\system32\cmd.execmd /C "nslookup myip.opendns.com resolver1.opendns.com > C:\Users\Admin\AppData\Local\Temp\ED4C.bi1"2⤵
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Windows\system32\nslookup.exenslookup myip.opendns.com resolver1.opendns.com3⤵PID:1552
-
-
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\ED4C.bi1"2⤵PID:1532
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
108B
MD5979462ca4338ae961c3b67831130c704
SHA1ac79e5f101a7fe684089056dde698a55b3917e07
SHA2565312fb503999e773c3296901b9161c4716d34fa886a02290a331d8cec6d4c7dc
SHA512ed78c6e920dcf8b341d0ee1083d945b33c9a031e3a117c3d59c2ddd43c20a53cfe7adf170aa6b97fc80b97f824b0d4f75481c7b8d813606571320074b1e8fcbf
-
Filesize
118B
MD54f6429322fdfd711b81d8824b25fcd9c
SHA1f7f917b64dd43b620bacd21f134d430d3c406aec
SHA256d22c844d015c874bbdbeb12b73ef54585cbd435c28f50d536fb4ace26d859ed8
SHA512e661f8d79b031a4a043a388ec17d82b5092859ac1d0ce6668a082feecf1da5665837ad1ef984751c7be174bbb6c1012f45d9f550d5cf65dc8b0e6cddcbdb0816
-
Filesize
118B
MD54f6429322fdfd711b81d8824b25fcd9c
SHA1f7f917b64dd43b620bacd21f134d430d3c406aec
SHA256d22c844d015c874bbdbeb12b73ef54585cbd435c28f50d536fb4ace26d859ed8
SHA512e661f8d79b031a4a043a388ec17d82b5092859ac1d0ce6668a082feecf1da5665837ad1ef984751c7be174bbb6c1012f45d9f550d5cf65dc8b0e6cddcbdb0816
-
Filesize
493KB
MD57e12831b97ad63445fc0e9173b98b4b0
SHA136adafaafea6740027beef8d8f6d762ede47203d
SHA25616c2bfc8a95cd2996a5169d3fe441f6a8ac0d8fcf4c5562b6de6e68dac3ae35f
SHA51244d6f4d58712f45838627cc8bde00e63b52d9c2bc9bc45ffa6963725f6b26ab307e61d40c469bc10a657d84137e62ad8ee861744f0208ba0bdef9d8f2bd97f9f
-
Filesize
493KB
MD57e12831b97ad63445fc0e9173b98b4b0
SHA136adafaafea6740027beef8d8f6d762ede47203d
SHA25616c2bfc8a95cd2996a5169d3fe441f6a8ac0d8fcf4c5562b6de6e68dac3ae35f
SHA51244d6f4d58712f45838627cc8bde00e63b52d9c2bc9bc45ffa6963725f6b26ab307e61d40c469bc10a657d84137e62ad8ee861744f0208ba0bdef9d8f2bd97f9f
-
Filesize
493KB
MD57e12831b97ad63445fc0e9173b98b4b0
SHA136adafaafea6740027beef8d8f6d762ede47203d
SHA25616c2bfc8a95cd2996a5169d3fe441f6a8ac0d8fcf4c5562b6de6e68dac3ae35f
SHA51244d6f4d58712f45838627cc8bde00e63b52d9c2bc9bc45ffa6963725f6b26ab307e61d40c469bc10a657d84137e62ad8ee861744f0208ba0bdef9d8f2bd97f9f