Analysis

  • max time kernel
    152s
  • max time network
    163s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    03-07-2022 02:45

General

  • Target

    3d8a0d250db8d3601e812e6c6e38ba97e12b7c9e455cda1b6bc33371b9dd6c78.exe

  • Size

    751KB

  • MD5

    c81f71163fbe9c29bf34ad33e1678cad

  • SHA1

    f49416d11f6b88cd918567f0a5edbab0376b03b6

  • SHA256

    3d8a0d250db8d3601e812e6c6e38ba97e12b7c9e455cda1b6bc33371b9dd6c78

  • SHA512

    710a776f0e74b97a94cdab4606f5d923034b2cdcf22be5beab6addd7a56d9d02a389fbf2d01c94aa1a78c0ae081dbfde1c792c579fe4f77c6f03830f28712d5c

Malware Config

Signatures

  • Gozi RM3

    A heavily modified version of Gozi using RM3 loader.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 51 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3d8a0d250db8d3601e812e6c6e38ba97e12b7c9e455cda1b6bc33371b9dd6c78.exe
    "C:\Users\Admin\AppData\Local\Temp\3d8a0d250db8d3601e812e6c6e38ba97e12b7c9e455cda1b6bc33371b9dd6c78.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:660
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://clownfish-translator.com/voicechanger/#download
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1004
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1004 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1288
  • C:\Windows\SysWOW64\DllHost.exe
    C:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}
    1⤵
      PID:1648
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0x56c
      1⤵
        PID:1416

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      Modify Registry

      2
      T1112

      Discovery

      System Information Discovery

      1
      T1082

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
        Filesize

        60KB

        MD5

        589c442fc7a0c70dca927115a700d41e

        SHA1

        66a07dace3afbfd1aa07a47e6875beab62c4bb31

        SHA256

        2e5cb72e9eb43baafb6c6bfcc573aac92f49a8064c483f9d378a9e8e781a526a

        SHA512

        1b5fa79e52be495c42cf49618441fb7012e28c02e7a08a91da9213db3ab810f0e83485bc1dd5f625a47d0ba7cfcdd5ea50acc9a8dcebb39f048c40f01e94155b

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
        Filesize

        340B

        MD5

        bf9c9a056b2fcc39a34ab1c2a2b4dd7d

        SHA1

        1c8c6326d91ac29c5e3507535897377ac19de83e

        SHA256

        d44ed999e5aee4ea7176592e6f9b49d4bfbbc876c447933499efce30d13a9a70

        SHA512

        b910dc056a991e0f8c02d4f1ea94a1f7a0f3c417a0b73d1207645e57370872c9f5f307edb496c685743c8e91ea95182ce7dfcc4120afea63147ca5f67a228edc

      • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\9os4y76\imagestore.dat
        Filesize

        5KB

        MD5

        576a637bfac19d351d3fb46872401de3

        SHA1

        d1d055af6aaf9410d3b1252b9374d0c155c89a22

        SHA256

        e23e241f9134b50b0db1237e111d27e2341a63f99551a5d0ecb992ec59f29c5c

        SHA512

        03696153cb3b755a33fd78434f138310db5373e4fed984d85606b5fd525ed6c40a654832808d69e98cb520d440bd835c61330f9d4f963aea3ac5f6230d8973cf

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\MY8UG1RD.txt
        Filesize

        600B

        MD5

        1a88f8b995f96ce51d9e4f3c502016cf

        SHA1

        dad9b7de98392a4640584f34b5fc66dd1d10793f

        SHA256

        0309e42883caa2a5e656a46e9f1f6260added32df495d7be125a9f680a9db263

        SHA512

        42f71dd3be3104ccb8bdd622da20a82d9160159bf01062b76810414d05b97b4e0cc586f0b810e9b2f6cba8434912b8e7faf6b79afd824ba86c3f3d3183ad97ec

      • memory/660-54-0x0000000075761000-0x0000000075763000-memory.dmp
        Filesize

        8KB