Analysis

  • max time kernel
    141s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    03-07-2022 08:38

General

  • Target

    3c181213b4ce99bf4329a9bf6c880199ef971531f164c0f2e570ab3b0e7d5304.dll

  • Size

    1.1MB

  • MD5

    b91e58d4b7dbf84c497a25dceca80366

  • SHA1

    d13c7920c28a9dc2677b238f1ad5b2d6526a16c5

  • SHA256

    3c181213b4ce99bf4329a9bf6c880199ef971531f164c0f2e570ab3b0e7d5304

  • SHA512

    dce948f35a4e065f48fe30a58185ba32b1d00029f55306cab9a0fbc5f5f0c0a2a677c035f6e31bd499e1f905d88b1fcb40dbdb70745b1832ae9e5f0f36a89473

Malware Config

Extracted

Family

gozi_ifsb

Botnet

1000

C2

http://ey7kuuklgieop2pq.onion

http://shoshanna.at

http://buismashallah.at

Attributes
  • build

    217027

  • dga_base_url

    constitution.org/usdeclar.txt

  • dga_crc

    0x4eb7d2ca

  • dga_season

    10

  • dga_tlds

    com

    ru

    org

  • exe_type

    worker

  • server_id

    12

rsa_pubkey.plain
serpent.plain

Signatures

  • Gozi, Gozi IFSB

    Gozi ISFB is a well-known and widely distributed banking trojan.

  • Unexpected DNS network traffic destination 3 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: MapViewOfSection 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 39 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1372
    • C:\Windows\system32\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\3c181213b4ce99bf4329a9bf6c880199ef971531f164c0f2e570ab3b0e7d5304.dll,#1
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1664
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe C:\Users\Admin\AppData\Local\Temp\3c181213b4ce99bf4329a9bf6c880199ef971531f164c0f2e570ab3b0e7d5304.dll,#1
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:1980
        • C:\Windows\system32\control.exe
          C:\Windows\system32\control.exe /?
          4⤵
          • Suspicious use of SetThreadContext
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          PID:1044
          • C:\Windows\system32\rundll32.exe
            "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL /?
            5⤵
              PID:1884
      • C:\Windows\system32\cmd.exe
        cmd /C "nslookup myip.opendns.com resolver1.opendns.com > C:\Users\Admin\AppData\Local\Temp\B958.bi1"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:776
        • C:\Windows\system32\nslookup.exe
          nslookup myip.opendns.com resolver1.opendns.com
          3⤵
            PID:1600
        • C:\Windows\system32\cmd.exe
          cmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\B958.bi1"
          2⤵
            PID:2008
          • C:\Windows\syswow64\cmd.exe
            "C:\Windows\syswow64\cmd.exe" /C pause dll mail, ,
            2⤵
              PID:1996

          Network

          MITRE ATT&CK Matrix ATT&CK v6

          Persistence

          Registry Run Keys / Startup Folder

          1
          T1060

          Defense Evasion

          Modify Registry

          1
          T1112

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\B958.bi1
            Filesize

            118B

            MD5

            4f6429322fdfd711b81d8824b25fcd9c

            SHA1

            f7f917b64dd43b620bacd21f134d430d3c406aec

            SHA256

            d22c844d015c874bbdbeb12b73ef54585cbd435c28f50d536fb4ace26d859ed8

            SHA512

            e661f8d79b031a4a043a388ec17d82b5092859ac1d0ce6668a082feecf1da5665837ad1ef984751c7be174bbb6c1012f45d9f550d5cf65dc8b0e6cddcbdb0816

          • C:\Users\Admin\AppData\Local\Temp\B958.bi1
            Filesize

            118B

            MD5

            4f6429322fdfd711b81d8824b25fcd9c

            SHA1

            f7f917b64dd43b620bacd21f134d430d3c406aec

            SHA256

            d22c844d015c874bbdbeb12b73ef54585cbd435c28f50d536fb4ace26d859ed8

            SHA512

            e661f8d79b031a4a043a388ec17d82b5092859ac1d0ce6668a082feecf1da5665837ad1ef984751c7be174bbb6c1012f45d9f550d5cf65dc8b0e6cddcbdb0816

          • C:\Users\Admin\AppData\Roaming\Microsoft\Appimapi\advptcls.dll
            Filesize

            1.1MB

            MD5

            b91e58d4b7dbf84c497a25dceca80366

            SHA1

            d13c7920c28a9dc2677b238f1ad5b2d6526a16c5

            SHA256

            3c181213b4ce99bf4329a9bf6c880199ef971531f164c0f2e570ab3b0e7d5304

            SHA512

            dce948f35a4e065f48fe30a58185ba32b1d00029f55306cab9a0fbc5f5f0c0a2a677c035f6e31bd499e1f905d88b1fcb40dbdb70745b1832ae9e5f0f36a89473

          • memory/776-79-0x0000000000000000-mapping.dmp
          • memory/1044-70-0x0000000000000000-mapping.dmp
          • memory/1044-78-0x0000000000290000-0x0000000000341000-memory.dmp
            Filesize

            708KB

          • memory/1044-76-0x0000000000290000-0x0000000000341000-memory.dmp
            Filesize

            708KB

          • memory/1044-72-0x000007FEFC061000-0x000007FEFC063000-memory.dmp
            Filesize

            8KB

          • memory/1372-75-0x0000000004C70000-0x0000000004D21000-memory.dmp
            Filesize

            708KB

          • memory/1600-80-0x0000000000000000-mapping.dmp
          • memory/1884-77-0x0000000001BF0000-0x0000000001CA1000-memory.dmp
            Filesize

            708KB

          • memory/1884-74-0x0000000000000000-mapping.dmp
          • memory/1980-54-0x0000000000000000-mapping.dmp
          • memory/1980-58-0x00000000022C0000-0x0000000002CDB000-memory.dmp
            Filesize

            10.1MB

          • memory/1980-59-0x00000000022C0000-0x000000000230B000-memory.dmp
            Filesize

            300KB

          • memory/1980-61-0x00000000022C0000-0x0000000002CDB000-memory.dmp
            Filesize

            10.1MB

          • memory/1980-62-0x00000000022C0000-0x0000000002CDB000-memory.dmp
            Filesize

            10.1MB

          • memory/1980-63-0x00000000006A0000-0x00000000006EA000-memory.dmp
            Filesize

            296KB

          • memory/1980-60-0x00000000022C0000-0x0000000002CDB000-memory.dmp
            Filesize

            10.1MB

          • memory/1980-71-0x00000000022C0000-0x0000000002CDB000-memory.dmp
            Filesize

            10.1MB

          • memory/1980-56-0x00000000022C0000-0x0000000002CDB000-memory.dmp
            Filesize

            10.1MB

          • memory/1980-55-0x0000000076011000-0x0000000076013000-memory.dmp
            Filesize

            8KB

          • memory/1996-84-0x0000000000000000-mapping.dmp
          • memory/1996-85-0x0000000000230000-0x00000000002D4000-memory.dmp
            Filesize

            656KB

          • memory/2008-81-0x0000000000000000-mapping.dmp