Analysis
-
max time kernel
47s -
max time network
51s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
23-06-2022 10:44
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
tmp.exe
-
Size
225KB
-
MD5
4d0774579b6e4be41c687982347b5a41
-
SHA1
4359e5993bbce3794d0fc1a51a147d2b6b67d7bb
-
SHA256
7ae2c953f8142f668650d11f0bc7f042e249ee8456b2255f71a51a84ca94c756
-
SHA512
ee4177f6624cb932f5e5c5cad0c27eabdb9ed7250e8133d177561c79c82bcba43d3d781db2af85d06fb7899f23158e94abb3b143f62ac971234ef617cd784a28
Malware Config
Extracted
Family
gozi_ifsb
Botnet
1500
C2
apghn.msn.com
188.126.76.221
Attributes
-
base_path
/budweiser/
-
build
250235
-
exe_type
loader
-
extension
.bbu
-
server_id
50
rsa_pubkey.plain
aes.plain
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
tmp.exedescription pid process target process PID 1836 set thread context of 1980 1836 tmp.exe AppLaunch.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 856 1836 WerFault.exe tmp.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
tmp.exedescription pid process target process PID 1836 wrote to memory of 1980 1836 tmp.exe AppLaunch.exe PID 1836 wrote to memory of 1980 1836 tmp.exe AppLaunch.exe PID 1836 wrote to memory of 1980 1836 tmp.exe AppLaunch.exe PID 1836 wrote to memory of 1980 1836 tmp.exe AppLaunch.exe PID 1836 wrote to memory of 1980 1836 tmp.exe AppLaunch.exe PID 1836 wrote to memory of 1980 1836 tmp.exe AppLaunch.exe PID 1836 wrote to memory of 1980 1836 tmp.exe AppLaunch.exe PID 1836 wrote to memory of 1980 1836 tmp.exe AppLaunch.exe PID 1836 wrote to memory of 1980 1836 tmp.exe AppLaunch.exe PID 1836 wrote to memory of 856 1836 tmp.exe WerFault.exe PID 1836 wrote to memory of 856 1836 tmp.exe WerFault.exe PID 1836 wrote to memory of 856 1836 tmp.exe WerFault.exe PID 1836 wrote to memory of 856 1836 tmp.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:1980
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1836 -s 1122⤵
- Program crash
PID:856