Analysis
-
max time kernel
144s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20220715-en -
resource tags
arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system -
submitted
24-07-2022 20:22
Static task
static1
Behavioral task
behavioral1
Sample
57b374e2d2f002c11c69b454fcf1aa57bd971cd0638eca12c6691cdb6a2f011c.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
57b374e2d2f002c11c69b454fcf1aa57bd971cd0638eca12c6691cdb6a2f011c.exe
Resource
win10v2004-20220721-en
General
-
Target
57b374e2d2f002c11c69b454fcf1aa57bd971cd0638eca12c6691cdb6a2f011c.exe
-
Size
457KB
-
MD5
13b78d808996120ae0ce4d1b19947c3e
-
SHA1
6937e2e6301f5ecb0251c26a3ad0afe4a0d30aed
-
SHA256
57b374e2d2f002c11c69b454fcf1aa57bd971cd0638eca12c6691cdb6a2f011c
-
SHA512
1c8000f502c10222aa4e14ae00a709d0f0684286de3a125b41649d8749632a91fba31866ce949713cc7920651745ab1f1f9fe3568d25c9065e37de2c47f754dd
Malware Config
Extracted
gozi_ifsb
-
build
214963
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
apisutil.exepid Process 1128 apisutil.exe -
Deletes itself 1 IoCs
Processes:
apisutil.exepid Process 1128 apisutil.exe -
Loads dropped DLL 1 IoCs
Processes:
cmd.exepid Process 1936 cmd.exe -
Unexpected DNS network traffic destination 3 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
Processes:
description ioc Destination IP 208.67.222.222 Destination IP 208.67.222.222 Destination IP 208.67.222.222 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
57b374e2d2f002c11c69b454fcf1aa57bd971cd0638eca12c6691cdb6a2f011c.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Windows\CurrentVersion\Run\devruota = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Dhcpgpui\\apisutil.exe" 57b374e2d2f002c11c69b454fcf1aa57bd971cd0638eca12c6691cdb6a2f011c.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
apisutil.exesvchost.exedescription pid Process procid_target PID 1128 set thread context of 1452 1128 apisutil.exe 31 PID 1452 set thread context of 1388 1452 svchost.exe 12 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
apisutil.exeExplorer.EXEpid Process 1128 apisutil.exe 1388 Explorer.EXE 1388 Explorer.EXE 1388 Explorer.EXE -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
apisutil.exesvchost.exepid Process 1128 apisutil.exe 1452 svchost.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
Explorer.EXEpid Process 1388 Explorer.EXE 1388 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
Explorer.EXEpid Process 1388 Explorer.EXE 1388 Explorer.EXE -
Suspicious use of WriteProcessMemory 31 IoCs
Processes:
57b374e2d2f002c11c69b454fcf1aa57bd971cd0638eca12c6691cdb6a2f011c.execmd.execmd.exeapisutil.exesvchost.exeExplorer.EXEcmd.exedescription pid Process procid_target PID 1812 wrote to memory of 1516 1812 57b374e2d2f002c11c69b454fcf1aa57bd971cd0638eca12c6691cdb6a2f011c.exe 27 PID 1812 wrote to memory of 1516 1812 57b374e2d2f002c11c69b454fcf1aa57bd971cd0638eca12c6691cdb6a2f011c.exe 27 PID 1812 wrote to memory of 1516 1812 57b374e2d2f002c11c69b454fcf1aa57bd971cd0638eca12c6691cdb6a2f011c.exe 27 PID 1812 wrote to memory of 1516 1812 57b374e2d2f002c11c69b454fcf1aa57bd971cd0638eca12c6691cdb6a2f011c.exe 27 PID 1516 wrote to memory of 1936 1516 cmd.exe 29 PID 1516 wrote to memory of 1936 1516 cmd.exe 29 PID 1516 wrote to memory of 1936 1516 cmd.exe 29 PID 1516 wrote to memory of 1936 1516 cmd.exe 29 PID 1936 wrote to memory of 1128 1936 cmd.exe 30 PID 1936 wrote to memory of 1128 1936 cmd.exe 30 PID 1936 wrote to memory of 1128 1936 cmd.exe 30 PID 1936 wrote to memory of 1128 1936 cmd.exe 30 PID 1128 wrote to memory of 1452 1128 apisutil.exe 31 PID 1128 wrote to memory of 1452 1128 apisutil.exe 31 PID 1128 wrote to memory of 1452 1128 apisutil.exe 31 PID 1128 wrote to memory of 1452 1128 apisutil.exe 31 PID 1128 wrote to memory of 1452 1128 apisutil.exe 31 PID 1128 wrote to memory of 1452 1128 apisutil.exe 31 PID 1128 wrote to memory of 1452 1128 apisutil.exe 31 PID 1452 wrote to memory of 1388 1452 svchost.exe 12 PID 1452 wrote to memory of 1388 1452 svchost.exe 12 PID 1452 wrote to memory of 1388 1452 svchost.exe 12 PID 1388 wrote to memory of 1592 1388 Explorer.EXE 32 PID 1388 wrote to memory of 1592 1388 Explorer.EXE 32 PID 1388 wrote to memory of 1592 1388 Explorer.EXE 32 PID 1592 wrote to memory of 1628 1592 cmd.exe 34 PID 1592 wrote to memory of 1628 1592 cmd.exe 34 PID 1592 wrote to memory of 1628 1592 cmd.exe 34 PID 1388 wrote to memory of 1632 1388 Explorer.EXE 35 PID 1388 wrote to memory of 1632 1388 Explorer.EXE 35 PID 1388 wrote to memory of 1632 1388 Explorer.EXE 35
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Users\Admin\AppData\Local\Temp\57b374e2d2f002c11c69b454fcf1aa57bd971cd0638eca12c6691cdb6a2f011c.exe"C:\Users\Admin\AppData\Local\Temp\57b374e2d2f002c11c69b454fcf1aa57bd971cd0638eca12c6691cdb6a2f011c.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\A255\1332.bat" "C:\Users\Admin\AppData\Roaming\MICROS~1\Dhcpgpui\apisutil.exe" "C:\Users\Admin\AppData\Local\Temp\57B374~1.EXE""3⤵
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Windows\SysWOW64\cmd.execmd /C ""C:\Users\Admin\AppData\Roaming\MICROS~1\Dhcpgpui\apisutil.exe" "C:\Users\Admin\AppData\Local\Temp\57B374~1.EXE""4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Users\Admin\AppData\Roaming\MICROS~1\Dhcpgpui\apisutil.exe"C:\Users\Admin\AppData\Roaming\MICROS~1\Dhcpgpui\apisutil.exe" "C:\Users\Admin\AppData\Local\Temp\57B374~1.EXE"5⤵
- Executes dropped EXE
- Deletes itself
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe6⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1452
-
-
-
-
-
-
C:\Windows\system32\cmd.execmd /C "nslookup myip.opendns.com resolver1.opendns.com > C:\Users\Admin\AppData\Local\Temp\CD48.bi1"2⤵
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Windows\system32\nslookup.exenslookup myip.opendns.com resolver1.opendns.com3⤵PID:1628
-
-
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\CD48.bi1"2⤵PID:1632
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
108B
MD5fd05eab0acc08af8c458e10dd428bb0c
SHA1618d4edd2121e11d2a201c253484ba03afad3beb
SHA2569e1a9bf8c51f2c63995d1129f4aaa3f1c139742f215cabf100d3f098fdef5b07
SHA51216f9bab12dbb9a9ea6e47aed99119d6800814e4eb4ca30a254856b0a60f8d2d752324d2e3cdd3ae08c6ca893eef05862e4d66a137b55754e42674747c57f854d
-
Filesize
118B
MD54f6429322fdfd711b81d8824b25fcd9c
SHA1f7f917b64dd43b620bacd21f134d430d3c406aec
SHA256d22c844d015c874bbdbeb12b73ef54585cbd435c28f50d536fb4ace26d859ed8
SHA512e661f8d79b031a4a043a388ec17d82b5092859ac1d0ce6668a082feecf1da5665837ad1ef984751c7be174bbb6c1012f45d9f550d5cf65dc8b0e6cddcbdb0816
-
Filesize
118B
MD54f6429322fdfd711b81d8824b25fcd9c
SHA1f7f917b64dd43b620bacd21f134d430d3c406aec
SHA256d22c844d015c874bbdbeb12b73ef54585cbd435c28f50d536fb4ace26d859ed8
SHA512e661f8d79b031a4a043a388ec17d82b5092859ac1d0ce6668a082feecf1da5665837ad1ef984751c7be174bbb6c1012f45d9f550d5cf65dc8b0e6cddcbdb0816
-
Filesize
457KB
MD513b78d808996120ae0ce4d1b19947c3e
SHA16937e2e6301f5ecb0251c26a3ad0afe4a0d30aed
SHA25657b374e2d2f002c11c69b454fcf1aa57bd971cd0638eca12c6691cdb6a2f011c
SHA5121c8000f502c10222aa4e14ae00a709d0f0684286de3a125b41649d8749632a91fba31866ce949713cc7920651745ab1f1f9fe3568d25c9065e37de2c47f754dd
-
Filesize
457KB
MD513b78d808996120ae0ce4d1b19947c3e
SHA16937e2e6301f5ecb0251c26a3ad0afe4a0d30aed
SHA25657b374e2d2f002c11c69b454fcf1aa57bd971cd0638eca12c6691cdb6a2f011c
SHA5121c8000f502c10222aa4e14ae00a709d0f0684286de3a125b41649d8749632a91fba31866ce949713cc7920651745ab1f1f9fe3568d25c9065e37de2c47f754dd
-
Filesize
457KB
MD513b78d808996120ae0ce4d1b19947c3e
SHA16937e2e6301f5ecb0251c26a3ad0afe4a0d30aed
SHA25657b374e2d2f002c11c69b454fcf1aa57bd971cd0638eca12c6691cdb6a2f011c
SHA5121c8000f502c10222aa4e14ae00a709d0f0684286de3a125b41649d8749632a91fba31866ce949713cc7920651745ab1f1f9fe3568d25c9065e37de2c47f754dd