Analysis
-
max time kernel
145s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
20-06-2022 04:54
Static task
static1
Behavioral task
behavioral1
Sample
32d3b5ff596448c89026df81699d0b360c8eb754e1cb9876cfdace71d8b6aeb2.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
32d3b5ff596448c89026df81699d0b360c8eb754e1cb9876cfdace71d8b6aeb2.exe
Resource
win10v2004-20220414-en
General
-
Target
32d3b5ff596448c89026df81699d0b360c8eb754e1cb9876cfdace71d8b6aeb2.exe
-
Size
474KB
-
MD5
34edc1d95226bd29e8e9072da1855f28
-
SHA1
c68352f6607134fb0b5686263397deda8f434cb0
-
SHA256
32d3b5ff596448c89026df81699d0b360c8eb754e1cb9876cfdace71d8b6aeb2
-
SHA512
5c754c3f81eca1a948932c1aba2ce414ca4dfc5c2af3dfba74d2ec084b11b068e0e302ba80a71b01caa3fad3119b04fe57453502ae03f4da13df1e1ed93c5047
Malware Config
Extracted
gozi_ifsb
1010
diuolirt.at
deopliazae.at
nifredao.com
filokiyurt.at
-
exe_type
worker
-
server_id
12
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
Audirvps.exepid process 2580 Audirvps.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
32d3b5ff596448c89026df81699d0b360c8eb754e1cb9876cfdace71d8b6aeb2.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation 32d3b5ff596448c89026df81699d0b360c8eb754e1cb9876cfdace71d8b6aeb2.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
32d3b5ff596448c89026df81699d0b360c8eb754e1cb9876cfdace71d8b6aeb2.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Clipmlua = "C:\\Users\\Admin\\AppData\\Roaming\\AppMtngc\\Audirvps.exe" 32d3b5ff596448c89026df81699d0b360c8eb754e1cb9876cfdace71d8b6aeb2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3280 2580 WerFault.exe Audirvps.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
Audirvps.exepid process 2580 Audirvps.exe 2580 Audirvps.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
32d3b5ff596448c89026df81699d0b360c8eb754e1cb9876cfdace71d8b6aeb2.execmd.execmd.exeAudirvps.exedescription pid process target process PID 1456 wrote to memory of 2040 1456 32d3b5ff596448c89026df81699d0b360c8eb754e1cb9876cfdace71d8b6aeb2.exe cmd.exe PID 1456 wrote to memory of 2040 1456 32d3b5ff596448c89026df81699d0b360c8eb754e1cb9876cfdace71d8b6aeb2.exe cmd.exe PID 1456 wrote to memory of 2040 1456 32d3b5ff596448c89026df81699d0b360c8eb754e1cb9876cfdace71d8b6aeb2.exe cmd.exe PID 2040 wrote to memory of 4004 2040 cmd.exe cmd.exe PID 2040 wrote to memory of 4004 2040 cmd.exe cmd.exe PID 2040 wrote to memory of 4004 2040 cmd.exe cmd.exe PID 4004 wrote to memory of 2580 4004 cmd.exe Audirvps.exe PID 4004 wrote to memory of 2580 4004 cmd.exe Audirvps.exe PID 4004 wrote to memory of 2580 4004 cmd.exe Audirvps.exe PID 2580 wrote to memory of 4896 2580 Audirvps.exe svchost.exe PID 2580 wrote to memory of 4896 2580 Audirvps.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\32d3b5ff596448c89026df81699d0b360c8eb754e1cb9876cfdace71d8b6aeb2.exe"C:\Users\Admin\AppData\Local\Temp\32d3b5ff596448c89026df81699d0b360c8eb754e1cb9876cfdace71d8b6aeb2.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\738\839C.bat" "C:\Users\Admin\AppData\Roaming\AppMtngc\Audirvps.exe" "C:\Users\Admin\AppData\Local\Temp\32D3B5~1.EXE""2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd /C ""C:\Users\Admin\AppData\Roaming\AppMtngc\Audirvps.exe" "C:\Users\Admin\AppData\Local\Temp\32D3B5~1.EXE""3⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\AppMtngc\Audirvps.exe"C:\Users\Admin\AppData\Roaming\AppMtngc\Audirvps.exe" "C:\Users\Admin\AppData\Local\Temp\32D3B5~1.EXE"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe5⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2580 -s 5725⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 2580 -ip 25801⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\738\839C.batFilesize
112B
MD5aad552cdaafbdaeb4c849d1c2fa18052
SHA15c416a3789df373fb7257556f95a94b15569a736
SHA2565fda6bd6f786f540d8db34a0d9ac33e70e05e8bfff7db6348f64596a4cd14efd
SHA512bc8860c455e5cf6de86a9ace1ce85a80f510cdac65626f5f22793fbe69607c72cdecbfc3701b19ec60b595783e2220e3afd3f1e17dcecbc368054372737b0f15
-
C:\Users\Admin\AppData\Roaming\AppMtngc\Audirvps.exeFilesize
474KB
MD534edc1d95226bd29e8e9072da1855f28
SHA1c68352f6607134fb0b5686263397deda8f434cb0
SHA25632d3b5ff596448c89026df81699d0b360c8eb754e1cb9876cfdace71d8b6aeb2
SHA5125c754c3f81eca1a948932c1aba2ce414ca4dfc5c2af3dfba74d2ec084b11b068e0e302ba80a71b01caa3fad3119b04fe57453502ae03f4da13df1e1ed93c5047
-
C:\Users\Admin\AppData\Roaming\AppMtngc\Audirvps.exeFilesize
474KB
MD534edc1d95226bd29e8e9072da1855f28
SHA1c68352f6607134fb0b5686263397deda8f434cb0
SHA25632d3b5ff596448c89026df81699d0b360c8eb754e1cb9876cfdace71d8b6aeb2
SHA5125c754c3f81eca1a948932c1aba2ce414ca4dfc5c2af3dfba74d2ec084b11b068e0e302ba80a71b01caa3fad3119b04fe57453502ae03f4da13df1e1ed93c5047
-
memory/1456-131-0x00000000021C0000-0x00000000021F0000-memory.dmpFilesize
192KB
-
memory/1456-130-0x0000000000400000-0x0000000000479000-memory.dmpFilesize
484KB
-
memory/1456-134-0x00000000021C0000-0x00000000021F0000-memory.dmpFilesize
192KB
-
memory/2040-133-0x0000000000000000-mapping.dmp
-
memory/2580-137-0x0000000000000000-mapping.dmp
-
memory/2580-140-0x0000000000400000-0x0000000000479000-memory.dmpFilesize
484KB
-
memory/2580-142-0x00000000020A0000-0x00000000020D0000-memory.dmpFilesize
192KB
-
memory/4004-136-0x0000000000000000-mapping.dmp