Analysis

  • max time kernel
    148s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    03-07-2022 08:38

General

  • Target

    3c181213b4ce99bf4329a9bf6c880199ef971531f164c0f2e570ab3b0e7d5304.dll

  • Size

    1.1MB

  • MD5

    b91e58d4b7dbf84c497a25dceca80366

  • SHA1

    d13c7920c28a9dc2677b238f1ad5b2d6526a16c5

  • SHA256

    3c181213b4ce99bf4329a9bf6c880199ef971531f164c0f2e570ab3b0e7d5304

  • SHA512

    dce948f35a4e065f48fe30a58185ba32b1d00029f55306cab9a0fbc5f5f0c0a2a677c035f6e31bd499e1f905d88b1fcb40dbdb70745b1832ae9e5f0f36a89473

Malware Config

Extracted

Family

gozi_ifsb

Botnet

1000

C2

http://ey7kuuklgieop2pq.onion

http://shoshanna.at

http://buismashallah.at

Attributes
  • build

    217027

  • dga_base_url

    constitution.org/usdeclar.txt

  • dga_crc

    0x4eb7d2ca

  • dga_season

    10

  • dga_tlds

    com

    ru

    org

  • exe_type

    worker

  • server_id

    12

rsa_pubkey.plain
serpent.plain

Signatures

  • Gozi, Gozi IFSB

    Gozi ISFB is a well-known and widely distributed banking trojan.

  • Unexpected DNS network traffic destination 3 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs

Processes

  • C:\Windows\System32\RuntimeBroker.exe
    C:\Windows\System32\RuntimeBroker.exe -Embedding
    1⤵
      PID:3528
    • C:\Windows\System32\RuntimeBroker.exe
      C:\Windows\System32\RuntimeBroker.exe -Embedding
      1⤵
        PID:2612
      • C:\Windows\System32\RuntimeBroker.exe
        C:\Windows\System32\RuntimeBroker.exe -Embedding
        1⤵
          PID:3824
        • C:\Windows\Explorer.EXE
          C:\Windows\Explorer.EXE
          1⤵
          • Adds Run key to start application
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1504
          • C:\Windows\system32\rundll32.exe
            rundll32.exe C:\Users\Admin\AppData\Local\Temp\3c181213b4ce99bf4329a9bf6c880199ef971531f164c0f2e570ab3b0e7d5304.dll,#1
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:4256
            • C:\Windows\SysWOW64\rundll32.exe
              rundll32.exe C:\Users\Admin\AppData\Local\Temp\3c181213b4ce99bf4329a9bf6c880199ef971531f164c0f2e570ab3b0e7d5304.dll,#1
              3⤵
              • Suspicious use of SetThreadContext
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious behavior: MapViewOfSection
              • Suspicious use of WriteProcessMemory
              PID:776
              • C:\Windows\system32\control.exe
                C:\Windows\system32\control.exe /?
                4⤵
                • Suspicious use of SetThreadContext
                • Suspicious behavior: MapViewOfSection
                • Suspicious use of WriteProcessMemory
                PID:548
                • C:\Windows\system32\rundll32.exe
                  "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL /?
                  5⤵
                    PID:3968
            • C:\Windows\system32\cmd.exe
              cmd /C "nslookup myip.opendns.com resolver1.opendns.com > C:\Users\Admin\AppData\Local\Temp\6138.bi1"
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:2324
              • C:\Windows\system32\nslookup.exe
                nslookup myip.opendns.com resolver1.opendns.com
                3⤵
                  PID:2232
              • C:\Windows\system32\cmd.exe
                cmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\6138.bi1"
                2⤵
                  PID:2928
                • C:\Windows\syswow64\cmd.exe
                  "C:\Windows\syswow64\cmd.exe" /C pause dll mail, ,
                  2⤵
                    PID:3780
                • C:\Windows\System32\RuntimeBroker.exe
                  C:\Windows\System32\RuntimeBroker.exe -Embedding
                  1⤵
                    PID:2592

                  Network

                  MITRE ATT&CK Matrix ATT&CK v6

                  Persistence

                  Registry Run Keys / Startup Folder

                  1
                  T1060

                  Defense Evasion

                  Modify Registry

                  1
                  T1112

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Temp\6138.bi1
                    Filesize

                    118B

                    MD5

                    4f6429322fdfd711b81d8824b25fcd9c

                    SHA1

                    f7f917b64dd43b620bacd21f134d430d3c406aec

                    SHA256

                    d22c844d015c874bbdbeb12b73ef54585cbd435c28f50d536fb4ace26d859ed8

                    SHA512

                    e661f8d79b031a4a043a388ec17d82b5092859ac1d0ce6668a082feecf1da5665837ad1ef984751c7be174bbb6c1012f45d9f550d5cf65dc8b0e6cddcbdb0816

                  • C:\Users\Admin\AppData\Local\Temp\6138.bi1
                    Filesize

                    118B

                    MD5

                    4f6429322fdfd711b81d8824b25fcd9c

                    SHA1

                    f7f917b64dd43b620bacd21f134d430d3c406aec

                    SHA256

                    d22c844d015c874bbdbeb12b73ef54585cbd435c28f50d536fb4ace26d859ed8

                    SHA512

                    e661f8d79b031a4a043a388ec17d82b5092859ac1d0ce6668a082feecf1da5665837ad1ef984751c7be174bbb6c1012f45d9f550d5cf65dc8b0e6cddcbdb0816

                  • C:\Users\Admin\AppData\Roaming\Microsoft\Asfeynth\APHoFWGP.dll
                    Filesize

                    1.1MB

                    MD5

                    b91e58d4b7dbf84c497a25dceca80366

                    SHA1

                    d13c7920c28a9dc2677b238f1ad5b2d6526a16c5

                    SHA256

                    3c181213b4ce99bf4329a9bf6c880199ef971531f164c0f2e570ab3b0e7d5304

                    SHA512

                    dce948f35a4e065f48fe30a58185ba32b1d00029f55306cab9a0fbc5f5f0c0a2a677c035f6e31bd499e1f905d88b1fcb40dbdb70745b1832ae9e5f0f36a89473

                  • memory/548-146-0x0000000000000000-mapping.dmp
                  • memory/548-151-0x0000000000780000-0x0000000000831000-memory.dmp
                    Filesize

                    708KB

                  • memory/776-138-0x00000000028B0000-0x00000000028FA000-memory.dmp
                    Filesize

                    296KB

                  • memory/776-136-0x0000000001E90000-0x00000000028AB000-memory.dmp
                    Filesize

                    10.1MB

                  • memory/776-130-0x0000000000000000-mapping.dmp
                  • memory/776-145-0x0000000001E90000-0x00000000028AB000-memory.dmp
                    Filesize

                    10.1MB

                  • memory/776-137-0x0000000001E90000-0x00000000028AB000-memory.dmp
                    Filesize

                    10.1MB

                  • memory/776-147-0x0000000001E90000-0x00000000028AB000-memory.dmp
                    Filesize

                    10.1MB

                  • memory/776-135-0x0000000001E91000-0x0000000001F48000-memory.dmp
                    Filesize

                    732KB

                  • memory/776-131-0x0000000001E90000-0x00000000028AB000-memory.dmp
                    Filesize

                    10.1MB

                  • memory/776-133-0x0000000001E90000-0x00000000028AB000-memory.dmp
                    Filesize

                    10.1MB

                  • memory/776-134-0x0000000001E90000-0x0000000001EDB000-memory.dmp
                    Filesize

                    300KB

                  • memory/1504-152-0x0000000007C90000-0x0000000007D41000-memory.dmp
                    Filesize

                    708KB

                  • memory/2232-158-0x0000000000000000-mapping.dmp
                  • memory/2324-157-0x0000000000000000-mapping.dmp
                  • memory/2592-156-0x00000199E6310000-0x00000199E63C1000-memory.dmp
                    Filesize

                    708KB

                  • memory/2612-155-0x000001A7CE830000-0x000001A7CE8E1000-memory.dmp
                    Filesize

                    708KB

                  • memory/2928-159-0x0000000000000000-mapping.dmp
                  • memory/3528-153-0x000001E5721F0000-0x000001E5722A1000-memory.dmp
                    Filesize

                    708KB

                  • memory/3780-162-0x0000000000000000-mapping.dmp
                  • memory/3780-163-0x0000000000DE6B20-0x0000000000DE6B24-memory.dmp
                    Filesize

                    4B

                  • memory/3780-164-0x00000000016F0000-0x0000000001794000-memory.dmp
                    Filesize

                    656KB

                  • memory/3824-154-0x000001B8D6510000-0x000001B8D65C1000-memory.dmp
                    Filesize

                    708KB

                  • memory/3968-150-0x000002345DEC0000-0x000002345DF71000-memory.dmp
                    Filesize

                    708KB

                  • memory/3968-149-0x0000000000000000-mapping.dmp