Analysis
-
max time kernel
51s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
15-06-2022 04:46
Static task
static1
Behavioral task
behavioral1
Sample
2aaf46b89e19e0d67865ed96a16114882b57ff48541b3cf4b611949bd5f241c3.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
2aaf46b89e19e0d67865ed96a16114882b57ff48541b3cf4b611949bd5f241c3.exe
Resource
win10v2004-20220414-en
General
-
Target
2aaf46b89e19e0d67865ed96a16114882b57ff48541b3cf4b611949bd5f241c3.exe
-
Size
361KB
-
MD5
89fcd562f34d2b8aac582c852c85b2ae
-
SHA1
bf816e7b9be16330f8fd74585ba81821d5b76626
-
SHA256
2aaf46b89e19e0d67865ed96a16114882b57ff48541b3cf4b611949bd5f241c3
-
SHA512
83b10cbecbb7ffd96b1000e36818ae3cefdfa76cc67e68e43bdc0ad661665f816940e5c6d470c641c48255fb9de7d0905392cc2e5aaeaa7eb18fb6ee995cdb14
Malware Config
Extracted
gozi_ifsb
1010
diuolirt.at
deopliazae.at
nifredao.com
filokiyurt.at
-
exe_type
worker
-
server_id
12
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
Authsvcs.exepid process 1476 Authsvcs.exe -
Deletes itself 1 IoCs
Processes:
Authsvcs.exepid process 1476 Authsvcs.exe -
Loads dropped DLL 1 IoCs
Processes:
cmd.exepid process 1324 cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
2aaf46b89e19e0d67865ed96a16114882b57ff48541b3cf4b611949bd5f241c3.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows\CurrentVersion\Run\catsmifw = "C:\\Users\\Admin\\AppData\\Roaming\\cfgbmime\\Authsvcs.exe" 2aaf46b89e19e0d67865ed96a16114882b57ff48541b3cf4b611949bd5f241c3.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
Authsvcs.exesvchost.exedescription pid process target process PID 1476 set thread context of 844 1476 Authsvcs.exe svchost.exe PID 844 set thread context of 1384 844 svchost.exe Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
Authsvcs.exeExplorer.EXEpid process 1476 Authsvcs.exe 1384 Explorer.EXE -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
Authsvcs.exesvchost.exepid process 1476 Authsvcs.exe 844 svchost.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
Explorer.EXEpid process 1384 Explorer.EXE 1384 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
Explorer.EXEpid process 1384 Explorer.EXE 1384 Explorer.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Explorer.EXEpid process 1384 Explorer.EXE -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
2aaf46b89e19e0d67865ed96a16114882b57ff48541b3cf4b611949bd5f241c3.execmd.execmd.exeAuthsvcs.exesvchost.exedescription pid process target process PID 776 wrote to memory of 1528 776 2aaf46b89e19e0d67865ed96a16114882b57ff48541b3cf4b611949bd5f241c3.exe cmd.exe PID 776 wrote to memory of 1528 776 2aaf46b89e19e0d67865ed96a16114882b57ff48541b3cf4b611949bd5f241c3.exe cmd.exe PID 776 wrote to memory of 1528 776 2aaf46b89e19e0d67865ed96a16114882b57ff48541b3cf4b611949bd5f241c3.exe cmd.exe PID 776 wrote to memory of 1528 776 2aaf46b89e19e0d67865ed96a16114882b57ff48541b3cf4b611949bd5f241c3.exe cmd.exe PID 1528 wrote to memory of 1324 1528 cmd.exe cmd.exe PID 1528 wrote to memory of 1324 1528 cmd.exe cmd.exe PID 1528 wrote to memory of 1324 1528 cmd.exe cmd.exe PID 1528 wrote to memory of 1324 1528 cmd.exe cmd.exe PID 1324 wrote to memory of 1476 1324 cmd.exe Authsvcs.exe PID 1324 wrote to memory of 1476 1324 cmd.exe Authsvcs.exe PID 1324 wrote to memory of 1476 1324 cmd.exe Authsvcs.exe PID 1324 wrote to memory of 1476 1324 cmd.exe Authsvcs.exe PID 1476 wrote to memory of 844 1476 Authsvcs.exe svchost.exe PID 1476 wrote to memory of 844 1476 Authsvcs.exe svchost.exe PID 1476 wrote to memory of 844 1476 Authsvcs.exe svchost.exe PID 1476 wrote to memory of 844 1476 Authsvcs.exe svchost.exe PID 1476 wrote to memory of 844 1476 Authsvcs.exe svchost.exe PID 1476 wrote to memory of 844 1476 Authsvcs.exe svchost.exe PID 1476 wrote to memory of 844 1476 Authsvcs.exe svchost.exe PID 844 wrote to memory of 1384 844 svchost.exe Explorer.EXE PID 844 wrote to memory of 1384 844 svchost.exe Explorer.EXE PID 844 wrote to memory of 1384 844 svchost.exe Explorer.EXE
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\2aaf46b89e19e0d67865ed96a16114882b57ff48541b3cf4b611949bd5f241c3.exe"C:\Users\Admin\AppData\Local\Temp\2aaf46b89e19e0d67865ed96a16114882b57ff48541b3cf4b611949bd5f241c3.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\AFC2\57E1.bat" "C:\Users\Admin\AppData\Roaming\cfgbmime\Authsvcs.exe" "C:\Users\Admin\AppData\Local\Temp\2AAF46~1.EXE""3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd /C ""C:\Users\Admin\AppData\Roaming\cfgbmime\Authsvcs.exe" "C:\Users\Admin\AppData\Local\Temp\2AAF46~1.EXE""4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\cfgbmime\Authsvcs.exe"C:\Users\Admin\AppData\Roaming\cfgbmime\Authsvcs.exe" "C:\Users\Admin\AppData\Local\Temp\2AAF46~1.EXE"5⤵
- Executes dropped EXE
- Deletes itself
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe6⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\AFC2\57E1.batFilesize
108B
MD56987703761ccd59c116c16686acfd5e1
SHA1eb1b94e6566cf49a1d639ec4f63bd465b6609a78
SHA256840da0362fadd0319bacf9f21f0640e833284d9f1d6f114d02655cf32872ae70
SHA512e69d4dec27340abfd0ff034b16de770f0d00c9c216730d2bb0813df7fd4d4b85e10e117a10b5d8a9821c0f5ba15e992e3c5c90b613c4a9e81a639114b7806d80
-
C:\Users\Admin\AppData\Roaming\cfgbmime\Authsvcs.exeFilesize
361KB
MD589fcd562f34d2b8aac582c852c85b2ae
SHA1bf816e7b9be16330f8fd74585ba81821d5b76626
SHA2562aaf46b89e19e0d67865ed96a16114882b57ff48541b3cf4b611949bd5f241c3
SHA51283b10cbecbb7ffd96b1000e36818ae3cefdfa76cc67e68e43bdc0ad661665f816940e5c6d470c641c48255fb9de7d0905392cc2e5aaeaa7eb18fb6ee995cdb14
-
C:\Users\Admin\AppData\Roaming\cfgbmime\Authsvcs.exeFilesize
361KB
MD589fcd562f34d2b8aac582c852c85b2ae
SHA1bf816e7b9be16330f8fd74585ba81821d5b76626
SHA2562aaf46b89e19e0d67865ed96a16114882b57ff48541b3cf4b611949bd5f241c3
SHA51283b10cbecbb7ffd96b1000e36818ae3cefdfa76cc67e68e43bdc0ad661665f816940e5c6d470c641c48255fb9de7d0905392cc2e5aaeaa7eb18fb6ee995cdb14
-
\Users\Admin\AppData\Roaming\cfgbmime\Authsvcs.exeFilesize
361KB
MD589fcd562f34d2b8aac582c852c85b2ae
SHA1bf816e7b9be16330f8fd74585ba81821d5b76626
SHA2562aaf46b89e19e0d67865ed96a16114882b57ff48541b3cf4b611949bd5f241c3
SHA51283b10cbecbb7ffd96b1000e36818ae3cefdfa76cc67e68e43bdc0ad661665f816940e5c6d470c641c48255fb9de7d0905392cc2e5aaeaa7eb18fb6ee995cdb14
-
memory/776-55-0x0000000000400000-0x000000000045D000-memory.dmpFilesize
372KB
-
memory/776-57-0x0000000000230000-0x0000000000260000-memory.dmpFilesize
192KB
-
memory/776-54-0x00000000753B1000-0x00000000753B3000-memory.dmpFilesize
8KB
-
memory/844-69-0x0000000000000000-mapping.dmp
-
memory/844-70-0x00000000003C0000-0x0000000000435000-memory.dmpFilesize
468KB
-
memory/844-71-0x00000000003C0000-0x0000000000435000-memory.dmpFilesize
468KB
-
memory/1324-60-0x0000000000000000-mapping.dmp
-
memory/1384-72-0x0000000002420000-0x0000000002495000-memory.dmpFilesize
468KB
-
memory/1384-73-0x0000000002420000-0x0000000002495000-memory.dmpFilesize
468KB
-
memory/1476-63-0x0000000000000000-mapping.dmp
-
memory/1476-66-0x0000000000400000-0x000000000045D000-memory.dmpFilesize
372KB
-
memory/1476-68-0x00000000001C0000-0x00000000001F0000-memory.dmpFilesize
192KB
-
memory/1528-58-0x0000000000000000-mapping.dmp