Analysis
-
max time kernel
42s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
01-07-2022 06:21
Static task
static1
Behavioral task
behavioral1
Sample
a15a6a727942f41f7fc9b3907da7792ad201a762dc177efb18b7be9edab9ed42.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
a15a6a727942f41f7fc9b3907da7792ad201a762dc177efb18b7be9edab9ed42.exe
-
Size
352KB
-
MD5
5e58ce6ab4db0018af5d89544d5aafe1
-
SHA1
10db699993eb09799ff16304f6ad0229d1ecf2c8
-
SHA256
a15a6a727942f41f7fc9b3907da7792ad201a762dc177efb18b7be9edab9ed42
-
SHA512
8a9b19ac641498abf62864ce581436c4010a5156130a762cc8e96cbacac40016082bb26a03c9494d8b1f3b26817e96042f0c76903dff08891624ed3842e19c58
Malware Config
Extracted
Family
gozi_ifsb
Attributes
-
build
214082
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 912 880 WerFault.exe a15a6a727942f41f7fc9b3907da7792ad201a762dc177efb18b7be9edab9ed42.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
a15a6a727942f41f7fc9b3907da7792ad201a762dc177efb18b7be9edab9ed42.exedescription pid process target process PID 880 wrote to memory of 912 880 a15a6a727942f41f7fc9b3907da7792ad201a762dc177efb18b7be9edab9ed42.exe WerFault.exe PID 880 wrote to memory of 912 880 a15a6a727942f41f7fc9b3907da7792ad201a762dc177efb18b7be9edab9ed42.exe WerFault.exe PID 880 wrote to memory of 912 880 a15a6a727942f41f7fc9b3907da7792ad201a762dc177efb18b7be9edab9ed42.exe WerFault.exe PID 880 wrote to memory of 912 880 a15a6a727942f41f7fc9b3907da7792ad201a762dc177efb18b7be9edab9ed42.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a15a6a727942f41f7fc9b3907da7792ad201a762dc177efb18b7be9edab9ed42.exe"C:\Users\Admin\AppData\Local\Temp\a15a6a727942f41f7fc9b3907da7792ad201a762dc177efb18b7be9edab9ed42.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 880 -s 1042⤵
- Program crash
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/880-54-0x0000000001150000-0x00000000011B4000-memory.dmpFilesize
400KB
-
memory/880-55-0x0000000001150000-0x000000000115E000-memory.dmpFilesize
56KB
-
memory/880-56-0x0000000001150000-0x00000000011B4000-memory.dmpFilesize
400KB
-
memory/880-58-0x0000000001150000-0x00000000011B4000-memory.dmpFilesize
400KB
-
memory/912-57-0x0000000000000000-mapping.dmp