Analysis
-
max time kernel
47s -
max time network
53s -
platform
windows7_x64 -
resource
win7-20220715-en -
resource tags
arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system -
submitted
18-07-2022 23:27
Static task
static1
Behavioral task
behavioral1
Sample
508aea085ee84ecc8b8267e021924f1dda945afda2445f7fc31be74625a4c409.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
508aea085ee84ecc8b8267e021924f1dda945afda2445f7fc31be74625a4c409.exe
Resource
win10v2004-20220718-en
General
-
Target
508aea085ee84ecc8b8267e021924f1dda945afda2445f7fc31be74625a4c409.exe
-
Size
351KB
-
MD5
257314a13ce06122c3b7020c3e7d8724
-
SHA1
d8a8df5a073049cf9b7a78bb16fc4437accf11e5
-
SHA256
508aea085ee84ecc8b8267e021924f1dda945afda2445f7fc31be74625a4c409
-
SHA512
b250b109e385e4103e110351d4ecb45d1e4ece7a2ab246122e82c1b9a7afbec9a193dd81874db69c3a1f56e40076ea7d102c2d4e8c0e12233806b071133997b8
Malware Config
Extracted
gozi_ifsb
1010
diuolirt.at
deopliazae.at
nifredao.com
filokiyurt.at
-
exe_type
worker
-
server_id
12
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
AuxilAPI.exepid process 1656 AuxilAPI.exe -
Deletes itself 1 IoCs
Processes:
AuxilAPI.exepid process 1656 AuxilAPI.exe -
Loads dropped DLL 2 IoCs
Processes:
cmd.exepid process 1760 cmd.exe 1760 cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
508aea085ee84ecc8b8267e021924f1dda945afda2445f7fc31be74625a4c409.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Windows\CurrentVersion\Run\d3d8wave = "C:\\Users\\Admin\\AppData\\Roaming\\compOMEX\\AuxilAPI.exe" 508aea085ee84ecc8b8267e021924f1dda945afda2445f7fc31be74625a4c409.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
AuxilAPI.exesvchost.exedescription pid process target process PID 1656 set thread context of 1884 1656 AuxilAPI.exe svchost.exe PID 1884 set thread context of 1296 1884 svchost.exe Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
AuxilAPI.exeExplorer.EXEpid process 1656 AuxilAPI.exe 1296 Explorer.EXE -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
AuxilAPI.exesvchost.exepid process 1656 AuxilAPI.exe 1884 svchost.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
Explorer.EXEpid process 1296 Explorer.EXE 1296 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
Explorer.EXEpid process 1296 Explorer.EXE 1296 Explorer.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Explorer.EXEpid process 1296 Explorer.EXE -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
508aea085ee84ecc8b8267e021924f1dda945afda2445f7fc31be74625a4c409.execmd.execmd.exeAuxilAPI.exesvchost.exedescription pid process target process PID 1104 wrote to memory of 1716 1104 508aea085ee84ecc8b8267e021924f1dda945afda2445f7fc31be74625a4c409.exe cmd.exe PID 1104 wrote to memory of 1716 1104 508aea085ee84ecc8b8267e021924f1dda945afda2445f7fc31be74625a4c409.exe cmd.exe PID 1104 wrote to memory of 1716 1104 508aea085ee84ecc8b8267e021924f1dda945afda2445f7fc31be74625a4c409.exe cmd.exe PID 1104 wrote to memory of 1716 1104 508aea085ee84ecc8b8267e021924f1dda945afda2445f7fc31be74625a4c409.exe cmd.exe PID 1716 wrote to memory of 1760 1716 cmd.exe cmd.exe PID 1716 wrote to memory of 1760 1716 cmd.exe cmd.exe PID 1716 wrote to memory of 1760 1716 cmd.exe cmd.exe PID 1716 wrote to memory of 1760 1716 cmd.exe cmd.exe PID 1760 wrote to memory of 1656 1760 cmd.exe AuxilAPI.exe PID 1760 wrote to memory of 1656 1760 cmd.exe AuxilAPI.exe PID 1760 wrote to memory of 1656 1760 cmd.exe AuxilAPI.exe PID 1760 wrote to memory of 1656 1760 cmd.exe AuxilAPI.exe PID 1656 wrote to memory of 1884 1656 AuxilAPI.exe svchost.exe PID 1656 wrote to memory of 1884 1656 AuxilAPI.exe svchost.exe PID 1656 wrote to memory of 1884 1656 AuxilAPI.exe svchost.exe PID 1656 wrote to memory of 1884 1656 AuxilAPI.exe svchost.exe PID 1656 wrote to memory of 1884 1656 AuxilAPI.exe svchost.exe PID 1656 wrote to memory of 1884 1656 AuxilAPI.exe svchost.exe PID 1656 wrote to memory of 1884 1656 AuxilAPI.exe svchost.exe PID 1884 wrote to memory of 1296 1884 svchost.exe Explorer.EXE PID 1884 wrote to memory of 1296 1884 svchost.exe Explorer.EXE PID 1884 wrote to memory of 1296 1884 svchost.exe Explorer.EXE
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\508aea085ee84ecc8b8267e021924f1dda945afda2445f7fc31be74625a4c409.exe"C:\Users\Admin\AppData\Local\Temp\508aea085ee84ecc8b8267e021924f1dda945afda2445f7fc31be74625a4c409.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\44A2\2251.bat" "C:\Users\Admin\AppData\Roaming\compOMEX\AuxilAPI.exe" "C:\Users\Admin\AppData\Local\Temp\508AEA~1.EXE""3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd /C ""C:\Users\Admin\AppData\Roaming\compOMEX\AuxilAPI.exe" "C:\Users\Admin\AppData\Local\Temp\508AEA~1.EXE""4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\compOMEX\AuxilAPI.exe"C:\Users\Admin\AppData\Roaming\compOMEX\AuxilAPI.exe" "C:\Users\Admin\AppData\Local\Temp\508AEA~1.EXE"5⤵
- Executes dropped EXE
- Deletes itself
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe6⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\44A2\2251.batFilesize
108B
MD557b580bae0ff1e0ff5b75cf68b5224d4
SHA130d41ac5d6a98e896e163980473909748a1f9c60
SHA256b40a0706bfd36fb3a726d181f2f6ca96e0e5b2ba3f361aa9e54520c6f7422b0c
SHA512a3a8ae3a0dc51b5825190690eaccbd774f64405dd7b4ff1bb38922a39b43557b8f189d37aba7ea241c32846db395943b43c3c41abb5137a6ddb23e3936398265
-
C:\Users\Admin\AppData\Roaming\compOMEX\AuxilAPI.exeFilesize
351KB
MD5257314a13ce06122c3b7020c3e7d8724
SHA1d8a8df5a073049cf9b7a78bb16fc4437accf11e5
SHA256508aea085ee84ecc8b8267e021924f1dda945afda2445f7fc31be74625a4c409
SHA512b250b109e385e4103e110351d4ecb45d1e4ece7a2ab246122e82c1b9a7afbec9a193dd81874db69c3a1f56e40076ea7d102c2d4e8c0e12233806b071133997b8
-
C:\Users\Admin\AppData\Roaming\compOMEX\AuxilAPI.exeFilesize
351KB
MD5257314a13ce06122c3b7020c3e7d8724
SHA1d8a8df5a073049cf9b7a78bb16fc4437accf11e5
SHA256508aea085ee84ecc8b8267e021924f1dda945afda2445f7fc31be74625a4c409
SHA512b250b109e385e4103e110351d4ecb45d1e4ece7a2ab246122e82c1b9a7afbec9a193dd81874db69c3a1f56e40076ea7d102c2d4e8c0e12233806b071133997b8
-
\Users\Admin\AppData\Roaming\compOMEX\AuxilAPI.exeFilesize
351KB
MD5257314a13ce06122c3b7020c3e7d8724
SHA1d8a8df5a073049cf9b7a78bb16fc4437accf11e5
SHA256508aea085ee84ecc8b8267e021924f1dda945afda2445f7fc31be74625a4c409
SHA512b250b109e385e4103e110351d4ecb45d1e4ece7a2ab246122e82c1b9a7afbec9a193dd81874db69c3a1f56e40076ea7d102c2d4e8c0e12233806b071133997b8
-
\Users\Admin\AppData\Roaming\compOMEX\AuxilAPI.exeFilesize
351KB
MD5257314a13ce06122c3b7020c3e7d8724
SHA1d8a8df5a073049cf9b7a78bb16fc4437accf11e5
SHA256508aea085ee84ecc8b8267e021924f1dda945afda2445f7fc31be74625a4c409
SHA512b250b109e385e4103e110351d4ecb45d1e4ece7a2ab246122e82c1b9a7afbec9a193dd81874db69c3a1f56e40076ea7d102c2d4e8c0e12233806b071133997b8
-
memory/1104-55-0x0000000000400000-0x000000000045A000-memory.dmpFilesize
360KB
-
memory/1104-57-0x00000000001C0000-0x00000000001F0000-memory.dmpFilesize
192KB
-
memory/1104-54-0x0000000076901000-0x0000000076903000-memory.dmpFilesize
8KB
-
memory/1296-74-0x0000000002910000-0x0000000002985000-memory.dmpFilesize
468KB
-
memory/1296-73-0x0000000002910000-0x0000000002985000-memory.dmpFilesize
468KB
-
memory/1656-67-0x0000000000400000-0x000000000045A000-memory.dmpFilesize
360KB
-
memory/1656-69-0x0000000000240000-0x0000000000270000-memory.dmpFilesize
192KB
-
memory/1656-64-0x0000000000000000-mapping.dmp
-
memory/1716-58-0x0000000000000000-mapping.dmp
-
memory/1760-60-0x0000000000000000-mapping.dmp
-
memory/1884-70-0x0000000000000000-mapping.dmp
-
memory/1884-71-0x00000000002C0000-0x0000000000335000-memory.dmpFilesize
468KB
-
memory/1884-72-0x00000000002C0000-0x0000000000335000-memory.dmpFilesize
468KB