Analysis
-
max time kernel
139s -
max time network
172s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
25-06-2022 03:55
Static task
static1
Behavioral task
behavioral1
Sample
3a6c4a466f072c8fb1b98dad22a2d66b9433261f515fafb21427755b5bd1d666.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
3a6c4a466f072c8fb1b98dad22a2d66b9433261f515fafb21427755b5bd1d666.exe
Resource
win10v2004-20220414-en
General
-
Target
3a6c4a466f072c8fb1b98dad22a2d66b9433261f515fafb21427755b5bd1d666.exe
-
Size
388KB
-
MD5
44e4017f47dce2d2925124bb2116166c
-
SHA1
f5efde405de07ca60afe67ee6f5e53538195fd23
-
SHA256
3a6c4a466f072c8fb1b98dad22a2d66b9433261f515fafb21427755b5bd1d666
-
SHA512
be68a64aee0a1d5241012d5cde84432274d08217628ab65e131e842e29c33b382ff5c3b4d390cf4a493b4304ae6ba06f1547e02eb22099b27a85135553cf2a75
Malware Config
Extracted
gozi_ifsb
1010
diuolirt.at
deopliazae.at
nifredao.com
filokiyurt.at
-
exe_type
worker
-
server_id
12
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
apprispl.exepid process 3112 apprispl.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
3a6c4a466f072c8fb1b98dad22a2d66b9433261f515fafb21427755b5bd1d666.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation 3a6c4a466f072c8fb1b98dad22a2d66b9433261f515fafb21427755b5bd1d666.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
3a6c4a466f072c8fb1b98dad22a2d66b9433261f515fafb21427755b5bd1d666.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\capigSup = "C:\\Users\\Admin\\AppData\\Roaming\\Azurives\\apprispl.exe" 3a6c4a466f072c8fb1b98dad22a2d66b9433261f515fafb21427755b5bd1d666.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2668 3112 WerFault.exe apprispl.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
apprispl.exepid process 3112 apprispl.exe 3112 apprispl.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
3a6c4a466f072c8fb1b98dad22a2d66b9433261f515fafb21427755b5bd1d666.execmd.execmd.exeapprispl.exedescription pid process target process PID 3700 wrote to memory of 1676 3700 3a6c4a466f072c8fb1b98dad22a2d66b9433261f515fafb21427755b5bd1d666.exe cmd.exe PID 3700 wrote to memory of 1676 3700 3a6c4a466f072c8fb1b98dad22a2d66b9433261f515fafb21427755b5bd1d666.exe cmd.exe PID 3700 wrote to memory of 1676 3700 3a6c4a466f072c8fb1b98dad22a2d66b9433261f515fafb21427755b5bd1d666.exe cmd.exe PID 1676 wrote to memory of 5012 1676 cmd.exe cmd.exe PID 1676 wrote to memory of 5012 1676 cmd.exe cmd.exe PID 1676 wrote to memory of 5012 1676 cmd.exe cmd.exe PID 5012 wrote to memory of 3112 5012 cmd.exe apprispl.exe PID 5012 wrote to memory of 3112 5012 cmd.exe apprispl.exe PID 5012 wrote to memory of 3112 5012 cmd.exe apprispl.exe PID 3112 wrote to memory of 4604 3112 apprispl.exe svchost.exe PID 3112 wrote to memory of 4604 3112 apprispl.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3a6c4a466f072c8fb1b98dad22a2d66b9433261f515fafb21427755b5bd1d666.exe"C:\Users\Admin\AppData\Local\Temp\3a6c4a466f072c8fb1b98dad22a2d66b9433261f515fafb21427755b5bd1d666.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3700 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\CD0\10.bat" "C:\Users\Admin\AppData\Roaming\Azurives\apprispl.exe" "C:\Users\Admin\AppData\Local\Temp\3A6C4A~1.EXE""2⤵
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Windows\SysWOW64\cmd.execmd /C ""C:\Users\Admin\AppData\Roaming\Azurives\apprispl.exe" "C:\Users\Admin\AppData\Local\Temp\3A6C4A~1.EXE""3⤵
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Users\Admin\AppData\Roaming\Azurives\apprispl.exe"C:\Users\Admin\AppData\Roaming\Azurives\apprispl.exe" "C:\Users\Admin\AppData\Local\Temp\3A6C4A~1.EXE"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3112 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe5⤵PID:4604
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3112 -s 5845⤵
- Program crash
PID:2668
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3112 -ip 31121⤵PID:4532
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
112B
MD506216667dabb2cf15d477d710abf8cbc
SHA1d12ee50603d0fbfee32544e61d9d1787e2bdd2ce
SHA2563976f4b4445fa1561239bfb67466cc2a12f5564e1de4f38a29642f4307f4ca8d
SHA512fb7d0180b02b11fecbb86ed4f40236933426e7e34bd2b73145a37969a30e607f5e7b80ac4460b342da1d637cb3503f03b226ea16d56a598188b49fe53dff502e
-
Filesize
388KB
MD544e4017f47dce2d2925124bb2116166c
SHA1f5efde405de07ca60afe67ee6f5e53538195fd23
SHA2563a6c4a466f072c8fb1b98dad22a2d66b9433261f515fafb21427755b5bd1d666
SHA512be68a64aee0a1d5241012d5cde84432274d08217628ab65e131e842e29c33b382ff5c3b4d390cf4a493b4304ae6ba06f1547e02eb22099b27a85135553cf2a75
-
Filesize
388KB
MD544e4017f47dce2d2925124bb2116166c
SHA1f5efde405de07ca60afe67ee6f5e53538195fd23
SHA2563a6c4a466f072c8fb1b98dad22a2d66b9433261f515fafb21427755b5bd1d666
SHA512be68a64aee0a1d5241012d5cde84432274d08217628ab65e131e842e29c33b382ff5c3b4d390cf4a493b4304ae6ba06f1547e02eb22099b27a85135553cf2a75