Analysis

  • max time kernel
    132s
  • max time network
    184s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    14-07-2022 01:46

General

  • Target

    48d1ea76ce5d582d654507d1611b64fb21b72a603054e35556ba27a1a293a1f1.exe

  • Size

    797KB

  • MD5

    4f035feeae93816049e986e757f04525

  • SHA1

    f7727fe7d403a6e18c1a21a944613c202112ff92

  • SHA256

    48d1ea76ce5d582d654507d1611b64fb21b72a603054e35556ba27a1a293a1f1

  • SHA512

    9768e4f1163e7c31325c3f4a407d74cedaa19c9796525d3b03e82e94f1f89fffb3f43b0643d6a0b850fc36a37f1a0e74d7ee8e282bd430f5485cc1689e275a03

Malware Config

Signatures

  • Gozi RM3

    A heavily modified version of Gozi using RM3 loader.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 51 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\48d1ea76ce5d582d654507d1611b64fb21b72a603054e35556ba27a1a293a1f1.exe
    "C:\Users\Admin\AppData\Local\Temp\48d1ea76ce5d582d654507d1611b64fb21b72a603054e35556ba27a1a293a1f1.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:884
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://clownfish-translator.com/voicechanger/#download
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1440
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1440 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1988
  • C:\Windows\SysWOW64\DllHost.exe
    C:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}
    1⤵
      PID:2032
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0x568
      1⤵
        PID:2008

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

        Filesize

        60KB

        MD5

        589c442fc7a0c70dca927115a700d41e

        SHA1

        66a07dace3afbfd1aa07a47e6875beab62c4bb31

        SHA256

        2e5cb72e9eb43baafb6c6bfcc573aac92f49a8064c483f9d378a9e8e781a526a

        SHA512

        1b5fa79e52be495c42cf49618441fb7012e28c02e7a08a91da9213db3ab810f0e83485bc1dd5f625a47d0ba7cfcdd5ea50acc9a8dcebb39f048c40f01e94155b

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        340B

        MD5

        e9166e3ee31a4be8f894b6da11092e50

        SHA1

        743d1e3b1b7112a6ff26436bb5fca0e7a4ecd5fc

        SHA256

        5bba3bc0989412b9f1fbe0dc767d6ed5af1cdbccf43e734345c311f02a4bcb36

        SHA512

        2dda99d5aaefddcecbc253394b97a6606bbda3a02c9cd0c1c175e7528efc7ff038837d5c13a1f9ebf90ed848a257fe3470bfe79075b022aa3804f0d0f1bce080

      • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\9os4y76\imagestore.dat

        Filesize

        5KB

        MD5

        6374cc3abe1d0c44e2b098b9fdb86bf0

        SHA1

        5ca0d8a7502fdf8e3df3f66111aff66868d848c7

        SHA256

        5ded047ae35e0fb5daa4c6eef18bc67e93c956ea8ea3607e10647bf7ed7aa6f6

        SHA512

        dae5cc1f2b7598523f276d0f89ee518eea864c89920d5b8f28454583ca824809314bca46c462a64aa59f1df7c22c10f1b06fc150517bcf658e0d4a7240c65028

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\R32CR4WA.txt

        Filesize

        603B

        MD5

        46d7ef005792c01def74e708d41e153e

        SHA1

        f2807ffd8408ea23ea086de06a85145221d36c5a

        SHA256

        7a887ccd4f135b6e2237d57e1a3b3aba0800b9de2ce9fa30b6ac7b738361e396

        SHA512

        41c319895b0ec064ca504b9609194d6235e4721ce6f214d7986a88029c38383c5dc98b2653ea47901f9543a9497e6c223309dbfaa5acea2916ad0c44d324a760

      • memory/884-54-0x000007FEFBF11000-0x000007FEFBF13000-memory.dmp

        Filesize

        8KB