Analysis

  • max time kernel
    151s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    25-06-2022 03:55

General

  • Target

    3a6c4a466f072c8fb1b98dad22a2d66b9433261f515fafb21427755b5bd1d666.exe

  • Size

    388KB

  • MD5

    44e4017f47dce2d2925124bb2116166c

  • SHA1

    f5efde405de07ca60afe67ee6f5e53538195fd23

  • SHA256

    3a6c4a466f072c8fb1b98dad22a2d66b9433261f515fafb21427755b5bd1d666

  • SHA512

    be68a64aee0a1d5241012d5cde84432274d08217628ab65e131e842e29c33b382ff5c3b4d390cf4a493b4304ae6ba06f1547e02eb22099b27a85135553cf2a75

Malware Config

Extracted

Family

gozi_ifsb

Botnet

1010

C2

diuolirt.at

deopliazae.at

nifredao.com

filokiyurt.at

Attributes
  • exe_type

    worker

  • server_id

    12

rsa_pubkey.plain
serpent.plain

Signatures

  • Gozi, Gozi IFSB

    Gozi ISFB is a well-known and widely distributed banking trojan.

  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3a6c4a466f072c8fb1b98dad22a2d66b9433261f515fafb21427755b5bd1d666.exe
    "C:\Users\Admin\AppData\Local\Temp\3a6c4a466f072c8fb1b98dad22a2d66b9433261f515fafb21427755b5bd1d666.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2032
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\480A\20.bat" "C:\Users\Admin\AppData\Roaming\clictall\authuthz.exe" "C:\Users\Admin\AppData\Local\Temp\3A6C4A~1.EXE""
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1972
      • C:\Windows\SysWOW64\cmd.exe
        cmd /C ""C:\Users\Admin\AppData\Roaming\clictall\authuthz.exe" "C:\Users\Admin\AppData\Local\Temp\3A6C4A~1.EXE""
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2012
        • C:\Users\Admin\AppData\Roaming\clictall\authuthz.exe
          "C:\Users\Admin\AppData\Roaming\clictall\authuthz.exe" "C:\Users\Admin\AppData\Local\Temp\3A6C4A~1.EXE"
          4⤵
          • Executes dropped EXE
          • Deletes itself
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          PID:964
          • C:\Windows\system32\svchost.exe
            C:\Windows\system32\svchost.exe
            5⤵
            • Suspicious use of SetThreadContext
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of WriteProcessMemory
            PID:1604
  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:1280

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\480A\20.bat

    Filesize

    108B

    MD5

    2ad842a9dbd8f230a2ef743aa0a52df5

    SHA1

    b788a3032c0f9636ba3c5c705c5a6df3b60c480d

    SHA256

    fe2e467c562da54321718a89d895afa11aac616244821dfffaa098b15075e9b0

    SHA512

    f7c596bc5991e0f5ac8857ff08545dc8e54f035e9b6d3c5205bd61955523be21f28cbb2de0640df636724d72a00b908bb7970a962176f7e03df8092effa45a1c

  • C:\Users\Admin\AppData\Roaming\clictall\authuthz.exe

    Filesize

    388KB

    MD5

    44e4017f47dce2d2925124bb2116166c

    SHA1

    f5efde405de07ca60afe67ee6f5e53538195fd23

    SHA256

    3a6c4a466f072c8fb1b98dad22a2d66b9433261f515fafb21427755b5bd1d666

    SHA512

    be68a64aee0a1d5241012d5cde84432274d08217628ab65e131e842e29c33b382ff5c3b4d390cf4a493b4304ae6ba06f1547e02eb22099b27a85135553cf2a75

  • C:\Users\Admin\AppData\Roaming\clictall\authuthz.exe

    Filesize

    388KB

    MD5

    44e4017f47dce2d2925124bb2116166c

    SHA1

    f5efde405de07ca60afe67ee6f5e53538195fd23

    SHA256

    3a6c4a466f072c8fb1b98dad22a2d66b9433261f515fafb21427755b5bd1d666

    SHA512

    be68a64aee0a1d5241012d5cde84432274d08217628ab65e131e842e29c33b382ff5c3b4d390cf4a493b4304ae6ba06f1547e02eb22099b27a85135553cf2a75

  • \Users\Admin\AppData\Roaming\clictall\authuthz.exe

    Filesize

    388KB

    MD5

    44e4017f47dce2d2925124bb2116166c

    SHA1

    f5efde405de07ca60afe67ee6f5e53538195fd23

    SHA256

    3a6c4a466f072c8fb1b98dad22a2d66b9433261f515fafb21427755b5bd1d666

    SHA512

    be68a64aee0a1d5241012d5cde84432274d08217628ab65e131e842e29c33b382ff5c3b4d390cf4a493b4304ae6ba06f1547e02eb22099b27a85135553cf2a75

  • \Users\Admin\AppData\Roaming\clictall\authuthz.exe

    Filesize

    388KB

    MD5

    44e4017f47dce2d2925124bb2116166c

    SHA1

    f5efde405de07ca60afe67ee6f5e53538195fd23

    SHA256

    3a6c4a466f072c8fb1b98dad22a2d66b9433261f515fafb21427755b5bd1d666

    SHA512

    be68a64aee0a1d5241012d5cde84432274d08217628ab65e131e842e29c33b382ff5c3b4d390cf4a493b4304ae6ba06f1547e02eb22099b27a85135553cf2a75

  • memory/964-64-0x0000000000000000-mapping.dmp

  • memory/964-67-0x0000000000400000-0x0000000000463000-memory.dmp

    Filesize

    396KB

  • memory/1280-72-0x00000000029D0000-0x0000000002A45000-memory.dmp

    Filesize

    468KB

  • memory/1280-73-0x00000000029D0000-0x0000000002A45000-memory.dmp

    Filesize

    468KB

  • memory/1604-69-0x0000000000000000-mapping.dmp

  • memory/1604-70-0x0000000000370000-0x00000000003E5000-memory.dmp

    Filesize

    468KB

  • memory/1604-71-0x0000000000370000-0x00000000003E5000-memory.dmp

    Filesize

    468KB

  • memory/1972-58-0x0000000000000000-mapping.dmp

  • memory/2012-60-0x0000000000000000-mapping.dmp

  • memory/2032-57-0x0000000000220000-0x0000000000250000-memory.dmp

    Filesize

    192KB

  • memory/2032-54-0x0000000075FC1000-0x0000000075FC3000-memory.dmp

    Filesize

    8KB

  • memory/2032-55-0x0000000000400000-0x0000000000463000-memory.dmp

    Filesize

    396KB