Analysis

  • max time kernel
    91s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    25-06-2022 06:36

General

  • Target

    3a25ac74307f2358212c1cf753a9ae3ff548737ee6c6c0a789ca07464038bb5a.exe

  • Size

    361KB

  • MD5

    1e4e3ab0d662c3f8a47c67ed427a154f

  • SHA1

    c96cf36141dd1a2a88bcaf3881f233a40854fb2b

  • SHA256

    3a25ac74307f2358212c1cf753a9ae3ff548737ee6c6c0a789ca07464038bb5a

  • SHA512

    879ac733fc2cfd57561ce65a92bab41d47484da3b7e7e2c430359bfa0301f1f3fcf253d181ed1bc7fbf20861b35cdc871acc9cf461909e69936fadaa58c4936e

Malware Config

Extracted

Family

gozi_ifsb

Botnet

1010

C2

diuolirt.at

deopliazae.at

nifredao.com

filokiyurt.at

Attributes
  • exe_type

    worker

  • server_id

    12

rsa_pubkey.plain
serpent.plain

Signatures

  • Gozi, Gozi IFSB

    Gozi ISFB is a well-known and widely distributed banking trojan.

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3a25ac74307f2358212c1cf753a9ae3ff548737ee6c6c0a789ca07464038bb5a.exe
    "C:\Users\Admin\AppData\Local\Temp\3a25ac74307f2358212c1cf753a9ae3ff548737ee6c6c0a789ca07464038bb5a.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1620
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\5CBB\33.bat" "C:\Users\Admin\AppData\Roaming\Addrdlet\Actipi32.exe" "C:\Users\Admin\AppData\Local\Temp\3A25AC~1.EXE""
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2220
      • C:\Windows\SysWOW64\cmd.exe
        cmd /C ""C:\Users\Admin\AppData\Roaming\Addrdlet\Actipi32.exe" "C:\Users\Admin\AppData\Local\Temp\3A25AC~1.EXE""
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1388
        • C:\Users\Admin\AppData\Roaming\Addrdlet\Actipi32.exe
          "C:\Users\Admin\AppData\Roaming\Addrdlet\Actipi32.exe" "C:\Users\Admin\AppData\Local\Temp\3A25AC~1.EXE"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:720
          • C:\Windows\system32\svchost.exe
            C:\Windows\system32\svchost.exe
            5⤵
              PID:1576
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 720 -s 584
              5⤵
              • Program crash
              PID:4032
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 720 -ip 720
      1⤵
        PID:1172

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      Modify Registry

      1
      T1112

      Discovery

      Query Registry

      1
      T1012

      System Information Discovery

      2
      T1082

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\5CBB\33.bat
        Filesize

        112B

        MD5

        162ce4b12b25c5d87a22bba996effa8d

        SHA1

        1913d2528e5270504050ff7ae89dc6f62f751004

        SHA256

        79461f900571f16bad1c0f1e4f024d59994df94bd6077607bba4822f9f6b09d8

        SHA512

        596429b517430b4a0d7e2a77f98cf6f7ee2b3a3e5bf3f22f28c16339c4370af569197f9764121b30aa51e1441166b8de39012c16f04e34a1257771434ce8b44c

      • C:\Users\Admin\AppData\Roaming\Addrdlet\Actipi32.exe
        Filesize

        361KB

        MD5

        1e4e3ab0d662c3f8a47c67ed427a154f

        SHA1

        c96cf36141dd1a2a88bcaf3881f233a40854fb2b

        SHA256

        3a25ac74307f2358212c1cf753a9ae3ff548737ee6c6c0a789ca07464038bb5a

        SHA512

        879ac733fc2cfd57561ce65a92bab41d47484da3b7e7e2c430359bfa0301f1f3fcf253d181ed1bc7fbf20861b35cdc871acc9cf461909e69936fadaa58c4936e

      • C:\Users\Admin\AppData\Roaming\Addrdlet\Actipi32.exe
        Filesize

        361KB

        MD5

        1e4e3ab0d662c3f8a47c67ed427a154f

        SHA1

        c96cf36141dd1a2a88bcaf3881f233a40854fb2b

        SHA256

        3a25ac74307f2358212c1cf753a9ae3ff548737ee6c6c0a789ca07464038bb5a

        SHA512

        879ac733fc2cfd57561ce65a92bab41d47484da3b7e7e2c430359bfa0301f1f3fcf253d181ed1bc7fbf20861b35cdc871acc9cf461909e69936fadaa58c4936e

      • memory/720-136-0x0000000000000000-mapping.dmp
      • memory/720-139-0x0000000000400000-0x000000000045D000-memory.dmp
        Filesize

        372KB

      • memory/720-141-0x00000000006F0000-0x0000000000720000-memory.dmp
        Filesize

        192KB

      • memory/1388-135-0x0000000000000000-mapping.dmp
      • memory/1620-130-0x0000000000400000-0x000000000045D000-memory.dmp
        Filesize

        372KB

      • memory/1620-132-0x0000000000700000-0x0000000000730000-memory.dmp
        Filesize

        192KB

      • memory/2220-133-0x0000000000000000-mapping.dmp