Analysis
-
max time kernel
139s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
03-07-2022 07:32
Static task
static1
Behavioral task
behavioral1
Sample
3c6affe9595ac8498af6360aeb3f9281e755c28c1b3297eb770855f08ec88a1e.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
3c6affe9595ac8498af6360aeb3f9281e755c28c1b3297eb770855f08ec88a1e.exe
Resource
win10v2004-20220414-en
General
-
Target
3c6affe9595ac8498af6360aeb3f9281e755c28c1b3297eb770855f08ec88a1e.exe
-
Size
361KB
-
MD5
71f184786153407c588600179f11a920
-
SHA1
8c8e733df5df5f73f176993b7e5d2e1f4aed1f8c
-
SHA256
3c6affe9595ac8498af6360aeb3f9281e755c28c1b3297eb770855f08ec88a1e
-
SHA512
569bfeb1fa7f970b94b64e277436d7b6ca98c57bd02f480847dba244d3329d0e17a284d6c27935a4ae9460b45ca3b8e64a6357988a5203ab69c9ecbd07c83d4b
Malware Config
Extracted
gozi_ifsb
1010
diuolirt.at
deopliazae.at
nifredao.com
filokiyurt.at
-
exe_type
worker
-
server_id
12
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
apprispl.exepid process 2968 apprispl.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
3c6affe9595ac8498af6360aeb3f9281e755c28c1b3297eb770855f08ec88a1e.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation 3c6affe9595ac8498af6360aeb3f9281e755c28c1b3297eb770855f08ec88a1e.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
3c6affe9595ac8498af6360aeb3f9281e755c28c1b3297eb770855f08ec88a1e.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\capigSup = "C:\\Users\\Admin\\AppData\\Roaming\\Azurives\\apprispl.exe" 3c6affe9595ac8498af6360aeb3f9281e755c28c1b3297eb770855f08ec88a1e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2184 2968 WerFault.exe apprispl.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
apprispl.exepid process 2968 apprispl.exe 2968 apprispl.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
3c6affe9595ac8498af6360aeb3f9281e755c28c1b3297eb770855f08ec88a1e.execmd.execmd.exeapprispl.exedescription pid process target process PID 1860 wrote to memory of 1576 1860 3c6affe9595ac8498af6360aeb3f9281e755c28c1b3297eb770855f08ec88a1e.exe cmd.exe PID 1860 wrote to memory of 1576 1860 3c6affe9595ac8498af6360aeb3f9281e755c28c1b3297eb770855f08ec88a1e.exe cmd.exe PID 1860 wrote to memory of 1576 1860 3c6affe9595ac8498af6360aeb3f9281e755c28c1b3297eb770855f08ec88a1e.exe cmd.exe PID 1576 wrote to memory of 2852 1576 cmd.exe cmd.exe PID 1576 wrote to memory of 2852 1576 cmd.exe cmd.exe PID 1576 wrote to memory of 2852 1576 cmd.exe cmd.exe PID 2852 wrote to memory of 2968 2852 cmd.exe apprispl.exe PID 2852 wrote to memory of 2968 2852 cmd.exe apprispl.exe PID 2852 wrote to memory of 2968 2852 cmd.exe apprispl.exe PID 2968 wrote to memory of 1652 2968 apprispl.exe svchost.exe PID 2968 wrote to memory of 1652 2968 apprispl.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3c6affe9595ac8498af6360aeb3f9281e755c28c1b3297eb770855f08ec88a1e.exe"C:\Users\Admin\AppData\Local\Temp\3c6affe9595ac8498af6360aeb3f9281e755c28c1b3297eb770855f08ec88a1e.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\DDE6\1E1.bat" "C:\Users\Admin\AppData\Roaming\Azurives\apprispl.exe" "C:\Users\Admin\AppData\Local\Temp\3C6AFF~1.EXE""2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd /C ""C:\Users\Admin\AppData\Roaming\Azurives\apprispl.exe" "C:\Users\Admin\AppData\Local\Temp\3C6AFF~1.EXE""3⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Azurives\apprispl.exe"C:\Users\Admin\AppData\Roaming\Azurives\apprispl.exe" "C:\Users\Admin\AppData\Local\Temp\3C6AFF~1.EXE"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe5⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2968 -s 5845⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2968 -ip 29681⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\DDE6\1E1.batFilesize
112B
MD51e51a7558d04b3dcc9f4d16ef6f58d94
SHA15e842a7b795326c49d170735d50e22c1432f8a1f
SHA2561d228832cbad21bce9bb87039863347d40068ebe74476d6dd16f7c7f044ed3e9
SHA512133b350b80c3a976604313dfa451a726c2266fc18e7c54e386bc5bc1d34ece8a10ddc8e9d9f95f9e50dfadfae4a4627dbd0912fa04075045aa9dddfa49bb9c13
-
C:\Users\Admin\AppData\Roaming\Azurives\apprispl.exeFilesize
361KB
MD571f184786153407c588600179f11a920
SHA18c8e733df5df5f73f176993b7e5d2e1f4aed1f8c
SHA2563c6affe9595ac8498af6360aeb3f9281e755c28c1b3297eb770855f08ec88a1e
SHA512569bfeb1fa7f970b94b64e277436d7b6ca98c57bd02f480847dba244d3329d0e17a284d6c27935a4ae9460b45ca3b8e64a6357988a5203ab69c9ecbd07c83d4b
-
C:\Users\Admin\AppData\Roaming\Azurives\apprispl.exeFilesize
361KB
MD571f184786153407c588600179f11a920
SHA18c8e733df5df5f73f176993b7e5d2e1f4aed1f8c
SHA2563c6affe9595ac8498af6360aeb3f9281e755c28c1b3297eb770855f08ec88a1e
SHA512569bfeb1fa7f970b94b64e277436d7b6ca98c57bd02f480847dba244d3329d0e17a284d6c27935a4ae9460b45ca3b8e64a6357988a5203ab69c9ecbd07c83d4b
-
memory/1576-133-0x0000000000000000-mapping.dmp
-
memory/1860-130-0x0000000000400000-0x000000000045D000-memory.dmpFilesize
372KB
-
memory/1860-132-0x00000000005C0000-0x00000000005F0000-memory.dmpFilesize
192KB
-
memory/2852-135-0x0000000000000000-mapping.dmp
-
memory/2968-136-0x0000000000000000-mapping.dmp
-
memory/2968-139-0x0000000000400000-0x000000000045D000-memory.dmpFilesize
372KB
-
memory/2968-141-0x0000000000710000-0x0000000000740000-memory.dmpFilesize
192KB