Analysis

  • max time kernel
    144s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20220715-en
  • resource tags

    arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system
  • submitted
    24-07-2022 20:22

General

  • Target

    57b374e2d2f002c11c69b454fcf1aa57bd971cd0638eca12c6691cdb6a2f011c.exe

  • Size

    457KB

  • MD5

    13b78d808996120ae0ce4d1b19947c3e

  • SHA1

    6937e2e6301f5ecb0251c26a3ad0afe4a0d30aed

  • SHA256

    57b374e2d2f002c11c69b454fcf1aa57bd971cd0638eca12c6691cdb6a2f011c

  • SHA512

    1c8000f502c10222aa4e14ae00a709d0f0684286de3a125b41649d8749632a91fba31866ce949713cc7920651745ab1f1f9fe3568d25c9065e37de2c47f754dd

Malware Config

Extracted

Family

gozi_ifsb

Attributes
  • build

    214963

Signatures

  • Gozi, Gozi IFSB

    Gozi ISFB is a well-known and widely distributed banking trojan.

  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Unexpected DNS network traffic destination 3 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 31 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1388
    • C:\Users\Admin\AppData\Local\Temp\57b374e2d2f002c11c69b454fcf1aa57bd971cd0638eca12c6691cdb6a2f011c.exe
      "C:\Users\Admin\AppData\Local\Temp\57b374e2d2f002c11c69b454fcf1aa57bd971cd0638eca12c6691cdb6a2f011c.exe"
      2⤵
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1812
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\A255\1332.bat" "C:\Users\Admin\AppData\Roaming\MICROS~1\Dhcpgpui\apisutil.exe" "C:\Users\Admin\AppData\Local\Temp\57B374~1.EXE""
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1516
        • C:\Windows\SysWOW64\cmd.exe
          cmd /C ""C:\Users\Admin\AppData\Roaming\MICROS~1\Dhcpgpui\apisutil.exe" "C:\Users\Admin\AppData\Local\Temp\57B374~1.EXE""
          4⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:1936
          • C:\Users\Admin\AppData\Roaming\MICROS~1\Dhcpgpui\apisutil.exe
            "C:\Users\Admin\AppData\Roaming\MICROS~1\Dhcpgpui\apisutil.exe" "C:\Users\Admin\AppData\Local\Temp\57B374~1.EXE"
            5⤵
            • Executes dropped EXE
            • Deletes itself
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of WriteProcessMemory
            PID:1128
            • C:\Windows\system32\svchost.exe
              C:\Windows\system32\svchost.exe
              6⤵
              • Suspicious use of SetThreadContext
              • Suspicious behavior: MapViewOfSection
              • Suspicious use of WriteProcessMemory
              PID:1452
    • C:\Windows\system32\cmd.exe
      cmd /C "nslookup myip.opendns.com resolver1.opendns.com > C:\Users\Admin\AppData\Local\Temp\CD48.bi1"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1592
      • C:\Windows\system32\nslookup.exe
        nslookup myip.opendns.com resolver1.opendns.com
        3⤵
          PID:1628
      • C:\Windows\system32\cmd.exe
        cmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\CD48.bi1"
        2⤵
          PID:1632

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\A255\1332.bat

        Filesize

        108B

        MD5

        fd05eab0acc08af8c458e10dd428bb0c

        SHA1

        618d4edd2121e11d2a201c253484ba03afad3beb

        SHA256

        9e1a9bf8c51f2c63995d1129f4aaa3f1c139742f215cabf100d3f098fdef5b07

        SHA512

        16f9bab12dbb9a9ea6e47aed99119d6800814e4eb4ca30a254856b0a60f8d2d752324d2e3cdd3ae08c6ca893eef05862e4d66a137b55754e42674747c57f854d

      • C:\Users\Admin\AppData\Local\Temp\CD48.bi1

        Filesize

        118B

        MD5

        4f6429322fdfd711b81d8824b25fcd9c

        SHA1

        f7f917b64dd43b620bacd21f134d430d3c406aec

        SHA256

        d22c844d015c874bbdbeb12b73ef54585cbd435c28f50d536fb4ace26d859ed8

        SHA512

        e661f8d79b031a4a043a388ec17d82b5092859ac1d0ce6668a082feecf1da5665837ad1ef984751c7be174bbb6c1012f45d9f550d5cf65dc8b0e6cddcbdb0816

      • C:\Users\Admin\AppData\Local\Temp\CD48.bi1

        Filesize

        118B

        MD5

        4f6429322fdfd711b81d8824b25fcd9c

        SHA1

        f7f917b64dd43b620bacd21f134d430d3c406aec

        SHA256

        d22c844d015c874bbdbeb12b73ef54585cbd435c28f50d536fb4ace26d859ed8

        SHA512

        e661f8d79b031a4a043a388ec17d82b5092859ac1d0ce6668a082feecf1da5665837ad1ef984751c7be174bbb6c1012f45d9f550d5cf65dc8b0e6cddcbdb0816

      • C:\Users\Admin\AppData\Roaming\MICROS~1\Dhcpgpui\apisutil.exe

        Filesize

        457KB

        MD5

        13b78d808996120ae0ce4d1b19947c3e

        SHA1

        6937e2e6301f5ecb0251c26a3ad0afe4a0d30aed

        SHA256

        57b374e2d2f002c11c69b454fcf1aa57bd971cd0638eca12c6691cdb6a2f011c

        SHA512

        1c8000f502c10222aa4e14ae00a709d0f0684286de3a125b41649d8749632a91fba31866ce949713cc7920651745ab1f1f9fe3568d25c9065e37de2c47f754dd

      • C:\Users\Admin\AppData\Roaming\MICROS~1\Dhcpgpui\apisutil.exe

        Filesize

        457KB

        MD5

        13b78d808996120ae0ce4d1b19947c3e

        SHA1

        6937e2e6301f5ecb0251c26a3ad0afe4a0d30aed

        SHA256

        57b374e2d2f002c11c69b454fcf1aa57bd971cd0638eca12c6691cdb6a2f011c

        SHA512

        1c8000f502c10222aa4e14ae00a709d0f0684286de3a125b41649d8749632a91fba31866ce949713cc7920651745ab1f1f9fe3568d25c9065e37de2c47f754dd

      • \Users\Admin\AppData\Roaming\MICROS~1\Dhcpgpui\apisutil.exe

        Filesize

        457KB

        MD5

        13b78d808996120ae0ce4d1b19947c3e

        SHA1

        6937e2e6301f5ecb0251c26a3ad0afe4a0d30aed

        SHA256

        57b374e2d2f002c11c69b454fcf1aa57bd971cd0638eca12c6691cdb6a2f011c

        SHA512

        1c8000f502c10222aa4e14ae00a709d0f0684286de3a125b41649d8749632a91fba31866ce949713cc7920651745ab1f1f9fe3568d25c9065e37de2c47f754dd

      • memory/1128-66-0x0000000000400000-0x000000000049B000-memory.dmp

        Filesize

        620KB

      • memory/1128-64-0x0000000000400000-0x000000000049B000-memory.dmp

        Filesize

        620KB

      • memory/1128-62-0x0000000000000000-mapping.dmp

      • memory/1388-69-0x0000000008470000-0x0000000008A87000-memory.dmp

        Filesize

        6.1MB

      • memory/1388-68-0x00000000042B0000-0x0000000004342000-memory.dmp

        Filesize

        584KB

      • memory/1388-81-0x00000000042B0000-0x0000000004342000-memory.dmp

        Filesize

        584KB

      • memory/1452-65-0x0000000000000000-mapping.dmp

      • memory/1452-67-0x00000000003A0000-0x0000000000432000-memory.dmp

        Filesize

        584KB

      • memory/1516-56-0x0000000000000000-mapping.dmp

      • memory/1592-76-0x0000000000000000-mapping.dmp

      • memory/1628-77-0x0000000000000000-mapping.dmp

      • memory/1632-78-0x0000000000000000-mapping.dmp

      • memory/1812-57-0x0000000000400000-0x000000000049B000-memory.dmp

        Filesize

        620KB

      • memory/1812-54-0x00000000002E0000-0x000000000033D000-memory.dmp

        Filesize

        372KB

      • memory/1812-55-0x0000000000400000-0x000000000049B000-memory.dmp

        Filesize

        620KB

      • memory/1936-59-0x0000000000000000-mapping.dmp