Analysis
-
max time kernel
151s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
25-06-2022 03:55
Static task
static1
Behavioral task
behavioral1
Sample
3a6c4a466f072c8fb1b98dad22a2d66b9433261f515fafb21427755b5bd1d666.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
3a6c4a466f072c8fb1b98dad22a2d66b9433261f515fafb21427755b5bd1d666.exe
Resource
win10v2004-20220414-en
General
-
Target
3a6c4a466f072c8fb1b98dad22a2d66b9433261f515fafb21427755b5bd1d666.exe
-
Size
388KB
-
MD5
44e4017f47dce2d2925124bb2116166c
-
SHA1
f5efde405de07ca60afe67ee6f5e53538195fd23
-
SHA256
3a6c4a466f072c8fb1b98dad22a2d66b9433261f515fafb21427755b5bd1d666
-
SHA512
be68a64aee0a1d5241012d5cde84432274d08217628ab65e131e842e29c33b382ff5c3b4d390cf4a493b4304ae6ba06f1547e02eb22099b27a85135553cf2a75
Malware Config
Extracted
gozi_ifsb
1010
diuolirt.at
deopliazae.at
nifredao.com
filokiyurt.at
-
exe_type
worker
-
server_id
12
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
authuthz.exepid process 964 authuthz.exe -
Deletes itself 1 IoCs
Processes:
authuthz.exepid process 964 authuthz.exe -
Loads dropped DLL 2 IoCs
Processes:
cmd.exepid process 2012 cmd.exe 2012 cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
3a6c4a466f072c8fb1b98dad22a2d66b9433261f515fafb21427755b5bd1d666.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows\CurrentVersion\Run\aecaCore = "C:\\Users\\Admin\\AppData\\Roaming\\clictall\\authuthz.exe" 3a6c4a466f072c8fb1b98dad22a2d66b9433261f515fafb21427755b5bd1d666.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
authuthz.exesvchost.exedescription pid process target process PID 964 set thread context of 1604 964 authuthz.exe svchost.exe PID 1604 set thread context of 1280 1604 svchost.exe Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
authuthz.exeExplorer.EXEpid process 964 authuthz.exe 1280 Explorer.EXE -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
authuthz.exesvchost.exepid process 964 authuthz.exe 1604 svchost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Explorer.EXEdescription pid process Token: SeShutdownPrivilege 1280 Explorer.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
Explorer.EXEpid process 1280 Explorer.EXE 1280 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
Explorer.EXEpid process 1280 Explorer.EXE 1280 Explorer.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Explorer.EXEpid process 1280 Explorer.EXE -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
3a6c4a466f072c8fb1b98dad22a2d66b9433261f515fafb21427755b5bd1d666.execmd.execmd.exeauthuthz.exesvchost.exedescription pid process target process PID 2032 wrote to memory of 1972 2032 3a6c4a466f072c8fb1b98dad22a2d66b9433261f515fafb21427755b5bd1d666.exe cmd.exe PID 2032 wrote to memory of 1972 2032 3a6c4a466f072c8fb1b98dad22a2d66b9433261f515fafb21427755b5bd1d666.exe cmd.exe PID 2032 wrote to memory of 1972 2032 3a6c4a466f072c8fb1b98dad22a2d66b9433261f515fafb21427755b5bd1d666.exe cmd.exe PID 2032 wrote to memory of 1972 2032 3a6c4a466f072c8fb1b98dad22a2d66b9433261f515fafb21427755b5bd1d666.exe cmd.exe PID 1972 wrote to memory of 2012 1972 cmd.exe cmd.exe PID 1972 wrote to memory of 2012 1972 cmd.exe cmd.exe PID 1972 wrote to memory of 2012 1972 cmd.exe cmd.exe PID 1972 wrote to memory of 2012 1972 cmd.exe cmd.exe PID 2012 wrote to memory of 964 2012 cmd.exe authuthz.exe PID 2012 wrote to memory of 964 2012 cmd.exe authuthz.exe PID 2012 wrote to memory of 964 2012 cmd.exe authuthz.exe PID 2012 wrote to memory of 964 2012 cmd.exe authuthz.exe PID 964 wrote to memory of 1604 964 authuthz.exe svchost.exe PID 964 wrote to memory of 1604 964 authuthz.exe svchost.exe PID 964 wrote to memory of 1604 964 authuthz.exe svchost.exe PID 964 wrote to memory of 1604 964 authuthz.exe svchost.exe PID 964 wrote to memory of 1604 964 authuthz.exe svchost.exe PID 964 wrote to memory of 1604 964 authuthz.exe svchost.exe PID 964 wrote to memory of 1604 964 authuthz.exe svchost.exe PID 1604 wrote to memory of 1280 1604 svchost.exe Explorer.EXE PID 1604 wrote to memory of 1280 1604 svchost.exe Explorer.EXE PID 1604 wrote to memory of 1280 1604 svchost.exe Explorer.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\3a6c4a466f072c8fb1b98dad22a2d66b9433261f515fafb21427755b5bd1d666.exe"C:\Users\Admin\AppData\Local\Temp\3a6c4a466f072c8fb1b98dad22a2d66b9433261f515fafb21427755b5bd1d666.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\480A\20.bat" "C:\Users\Admin\AppData\Roaming\clictall\authuthz.exe" "C:\Users\Admin\AppData\Local\Temp\3A6C4A~1.EXE""2⤵
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\SysWOW64\cmd.execmd /C ""C:\Users\Admin\AppData\Roaming\clictall\authuthz.exe" "C:\Users\Admin\AppData\Local\Temp\3A6C4A~1.EXE""3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Users\Admin\AppData\Roaming\clictall\authuthz.exe"C:\Users\Admin\AppData\Roaming\clictall\authuthz.exe" "C:\Users\Admin\AppData\Local\Temp\3A6C4A~1.EXE"4⤵
- Executes dropped EXE
- Deletes itself
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe5⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1604
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1280
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
108B
MD52ad842a9dbd8f230a2ef743aa0a52df5
SHA1b788a3032c0f9636ba3c5c705c5a6df3b60c480d
SHA256fe2e467c562da54321718a89d895afa11aac616244821dfffaa098b15075e9b0
SHA512f7c596bc5991e0f5ac8857ff08545dc8e54f035e9b6d3c5205bd61955523be21f28cbb2de0640df636724d72a00b908bb7970a962176f7e03df8092effa45a1c
-
Filesize
388KB
MD544e4017f47dce2d2925124bb2116166c
SHA1f5efde405de07ca60afe67ee6f5e53538195fd23
SHA2563a6c4a466f072c8fb1b98dad22a2d66b9433261f515fafb21427755b5bd1d666
SHA512be68a64aee0a1d5241012d5cde84432274d08217628ab65e131e842e29c33b382ff5c3b4d390cf4a493b4304ae6ba06f1547e02eb22099b27a85135553cf2a75
-
Filesize
388KB
MD544e4017f47dce2d2925124bb2116166c
SHA1f5efde405de07ca60afe67ee6f5e53538195fd23
SHA2563a6c4a466f072c8fb1b98dad22a2d66b9433261f515fafb21427755b5bd1d666
SHA512be68a64aee0a1d5241012d5cde84432274d08217628ab65e131e842e29c33b382ff5c3b4d390cf4a493b4304ae6ba06f1547e02eb22099b27a85135553cf2a75
-
Filesize
388KB
MD544e4017f47dce2d2925124bb2116166c
SHA1f5efde405de07ca60afe67ee6f5e53538195fd23
SHA2563a6c4a466f072c8fb1b98dad22a2d66b9433261f515fafb21427755b5bd1d666
SHA512be68a64aee0a1d5241012d5cde84432274d08217628ab65e131e842e29c33b382ff5c3b4d390cf4a493b4304ae6ba06f1547e02eb22099b27a85135553cf2a75
-
Filesize
388KB
MD544e4017f47dce2d2925124bb2116166c
SHA1f5efde405de07ca60afe67ee6f5e53538195fd23
SHA2563a6c4a466f072c8fb1b98dad22a2d66b9433261f515fafb21427755b5bd1d666
SHA512be68a64aee0a1d5241012d5cde84432274d08217628ab65e131e842e29c33b382ff5c3b4d390cf4a493b4304ae6ba06f1547e02eb22099b27a85135553cf2a75