Analysis
-
max time kernel
160s -
max time network
178s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
09-06-2022 08:47
Static task
static1
Behavioral task
behavioral1
Sample
1506235ef20de5e302756790a06e84aba843ef488af220956041a154a0901e98.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
1506235ef20de5e302756790a06e84aba843ef488af220956041a154a0901e98.exe
Resource
win10v2004-20220414-en
General
-
Target
1506235ef20de5e302756790a06e84aba843ef488af220956041a154a0901e98.exe
-
Size
493KB
-
MD5
6c7e410f44893d5274d311126f2c70f6
-
SHA1
f057ffd3ef87238b2a99df772832a9468cbe5d68
-
SHA256
1506235ef20de5e302756790a06e84aba843ef488af220956041a154a0901e98
-
SHA512
f248792d2a9ebfb978c5acf8512849c77d0776707be5a568a0cafc00b212dcee6c67de161fa292575b26a82f14c7253be454d9e68f21f0425c41c7f460772a38
Malware Config
Extracted
gozi_ifsb
1010
diuolirt.at
deopliazae.at
nifredao.com
filokiyurt.at
-
exe_type
worker
-
server_id
12
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
apprispl.exepid process 5060 apprispl.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
1506235ef20de5e302756790a06e84aba843ef488af220956041a154a0901e98.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation 1506235ef20de5e302756790a06e84aba843ef488af220956041a154a0901e98.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
1506235ef20de5e302756790a06e84aba843ef488af220956041a154a0901e98.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\capigSup = "C:\\Users\\Admin\\AppData\\Roaming\\Azurives\\apprispl.exe" 1506235ef20de5e302756790a06e84aba843ef488af220956041a154a0901e98.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1956 5060 WerFault.exe apprispl.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
apprispl.exepid process 5060 apprispl.exe 5060 apprispl.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
1506235ef20de5e302756790a06e84aba843ef488af220956041a154a0901e98.execmd.execmd.exeapprispl.exedescription pid process target process PID 2584 wrote to memory of 2616 2584 1506235ef20de5e302756790a06e84aba843ef488af220956041a154a0901e98.exe cmd.exe PID 2584 wrote to memory of 2616 2584 1506235ef20de5e302756790a06e84aba843ef488af220956041a154a0901e98.exe cmd.exe PID 2584 wrote to memory of 2616 2584 1506235ef20de5e302756790a06e84aba843ef488af220956041a154a0901e98.exe cmd.exe PID 2616 wrote to memory of 4348 2616 cmd.exe cmd.exe PID 2616 wrote to memory of 4348 2616 cmd.exe cmd.exe PID 2616 wrote to memory of 4348 2616 cmd.exe cmd.exe PID 4348 wrote to memory of 5060 4348 cmd.exe apprispl.exe PID 4348 wrote to memory of 5060 4348 cmd.exe apprispl.exe PID 4348 wrote to memory of 5060 4348 cmd.exe apprispl.exe PID 5060 wrote to memory of 4672 5060 apprispl.exe svchost.exe PID 5060 wrote to memory of 4672 5060 apprispl.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1506235ef20de5e302756790a06e84aba843ef488af220956041a154a0901e98.exe"C:\Users\Admin\AppData\Local\Temp\1506235ef20de5e302756790a06e84aba843ef488af220956041a154a0901e98.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\F1D6\F8EB.bat" "C:\Users\Admin\AppData\Roaming\Azurives\apprispl.exe" "C:\Users\Admin\AppData\Local\Temp\150623~1.EXE""2⤵
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\SysWOW64\cmd.execmd /C ""C:\Users\Admin\AppData\Roaming\Azurives\apprispl.exe" "C:\Users\Admin\AppData\Local\Temp\150623~1.EXE""3⤵
- Suspicious use of WriteProcessMemory
PID:4348 -
C:\Users\Admin\AppData\Roaming\Azurives\apprispl.exe"C:\Users\Admin\AppData\Roaming\Azurives\apprispl.exe" "C:\Users\Admin\AppData\Local\Temp\150623~1.EXE"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe5⤵PID:4672
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5060 -s 5645⤵
- Program crash
PID:1956
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 5060 -ip 50601⤵PID:4744
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
112B
MD5db5fb7d09659981c1945f86389fb289f
SHA12e85f35267a4c9744454a990adc916a910168147
SHA25648970963d97f3d409eff3c24efdf879ef7d47e6859ff58d17b25487e9768f4be
SHA512c08ff741dc944a28bc79a0ac58701daa2a0f2c79e0ec6e8748240926afa8984889f0c951c7cfb24a03013292d51e1f27087bdb0722b2aed4b242c64cc4300681
-
Filesize
493KB
MD56c7e410f44893d5274d311126f2c70f6
SHA1f057ffd3ef87238b2a99df772832a9468cbe5d68
SHA2561506235ef20de5e302756790a06e84aba843ef488af220956041a154a0901e98
SHA512f248792d2a9ebfb978c5acf8512849c77d0776707be5a568a0cafc00b212dcee6c67de161fa292575b26a82f14c7253be454d9e68f21f0425c41c7f460772a38
-
Filesize
493KB
MD56c7e410f44893d5274d311126f2c70f6
SHA1f057ffd3ef87238b2a99df772832a9468cbe5d68
SHA2561506235ef20de5e302756790a06e84aba843ef488af220956041a154a0901e98
SHA512f248792d2a9ebfb978c5acf8512849c77d0776707be5a568a0cafc00b212dcee6c67de161fa292575b26a82f14c7253be454d9e68f21f0425c41c7f460772a38