Analysis

  • max time kernel
    160s
  • max time network
    178s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    09-06-2022 08:47

General

  • Target

    1506235ef20de5e302756790a06e84aba843ef488af220956041a154a0901e98.exe

  • Size

    493KB

  • MD5

    6c7e410f44893d5274d311126f2c70f6

  • SHA1

    f057ffd3ef87238b2a99df772832a9468cbe5d68

  • SHA256

    1506235ef20de5e302756790a06e84aba843ef488af220956041a154a0901e98

  • SHA512

    f248792d2a9ebfb978c5acf8512849c77d0776707be5a568a0cafc00b212dcee6c67de161fa292575b26a82f14c7253be454d9e68f21f0425c41c7f460772a38

Malware Config

Extracted

Family

gozi_ifsb

Botnet

1010

C2

diuolirt.at

deopliazae.at

nifredao.com

filokiyurt.at

Attributes
  • exe_type

    worker

  • server_id

    12

rsa_pubkey.plain
serpent.plain

Signatures

  • Gozi, Gozi IFSB

    Gozi ISFB is a well-known and widely distributed banking trojan.

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1506235ef20de5e302756790a06e84aba843ef488af220956041a154a0901e98.exe
    "C:\Users\Admin\AppData\Local\Temp\1506235ef20de5e302756790a06e84aba843ef488af220956041a154a0901e98.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2584
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\F1D6\F8EB.bat" "C:\Users\Admin\AppData\Roaming\Azurives\apprispl.exe" "C:\Users\Admin\AppData\Local\Temp\150623~1.EXE""
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2616
      • C:\Windows\SysWOW64\cmd.exe
        cmd /C ""C:\Users\Admin\AppData\Roaming\Azurives\apprispl.exe" "C:\Users\Admin\AppData\Local\Temp\150623~1.EXE""
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4348
        • C:\Users\Admin\AppData\Roaming\Azurives\apprispl.exe
          "C:\Users\Admin\AppData\Roaming\Azurives\apprispl.exe" "C:\Users\Admin\AppData\Local\Temp\150623~1.EXE"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:5060
          • C:\Windows\system32\svchost.exe
            C:\Windows\system32\svchost.exe
            5⤵
              PID:4672
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 5060 -s 564
              5⤵
              • Program crash
              PID:1956
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 5060 -ip 5060
      1⤵
        PID:4744

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\F1D6\F8EB.bat
        Filesize

        112B

        MD5

        db5fb7d09659981c1945f86389fb289f

        SHA1

        2e85f35267a4c9744454a990adc916a910168147

        SHA256

        48970963d97f3d409eff3c24efdf879ef7d47e6859ff58d17b25487e9768f4be

        SHA512

        c08ff741dc944a28bc79a0ac58701daa2a0f2c79e0ec6e8748240926afa8984889f0c951c7cfb24a03013292d51e1f27087bdb0722b2aed4b242c64cc4300681

      • C:\Users\Admin\AppData\Roaming\Azurives\apprispl.exe
        Filesize

        493KB

        MD5

        6c7e410f44893d5274d311126f2c70f6

        SHA1

        f057ffd3ef87238b2a99df772832a9468cbe5d68

        SHA256

        1506235ef20de5e302756790a06e84aba843ef488af220956041a154a0901e98

        SHA512

        f248792d2a9ebfb978c5acf8512849c77d0776707be5a568a0cafc00b212dcee6c67de161fa292575b26a82f14c7253be454d9e68f21f0425c41c7f460772a38

      • C:\Users\Admin\AppData\Roaming\Azurives\apprispl.exe
        Filesize

        493KB

        MD5

        6c7e410f44893d5274d311126f2c70f6

        SHA1

        f057ffd3ef87238b2a99df772832a9468cbe5d68

        SHA256

        1506235ef20de5e302756790a06e84aba843ef488af220956041a154a0901e98

        SHA512

        f248792d2a9ebfb978c5acf8512849c77d0776707be5a568a0cafc00b212dcee6c67de161fa292575b26a82f14c7253be454d9e68f21f0425c41c7f460772a38

      • memory/2584-130-0x0000000000400000-0x000000000047E000-memory.dmp
        Filesize

        504KB

      • memory/2584-132-0x0000000002200000-0x0000000002230000-memory.dmp
        Filesize

        192KB

      • memory/2616-133-0x0000000000000000-mapping.dmp
      • memory/4348-135-0x0000000000000000-mapping.dmp
      • memory/5060-136-0x0000000000000000-mapping.dmp
      • memory/5060-139-0x0000000000400000-0x000000000047E000-memory.dmp
        Filesize

        504KB

      • memory/5060-141-0x00000000005D0000-0x0000000000600000-memory.dmp
        Filesize

        192KB