Analysis

  • max time kernel
    161s
  • max time network
    203s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220721-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-07-2022 07:18

General

  • Target

    7af90590d1cd4e6f6d9d54bfc65e827d5ed0b062241e92d0a71eb991d079d989.exe

  • Size

    190KB

  • MD5

    cfe77040029dbc2a5a6a416c02017bd0

  • SHA1

    3b01ffd567b3443d0613f867a69ce4a60d2d7a26

  • SHA256

    7af90590d1cd4e6f6d9d54bfc65e827d5ed0b062241e92d0a71eb991d079d989

  • SHA512

    5bbc23aee0b94c774b9d0795e94f019f2c86e1966a6bbfec0bca0b71fc0c3caa01754fc8960e70fdfa92cc627bc06602a90aba96d2af25b09b7b2e4d1ec21332

Malware Config

Extracted

Family

gootkit

Botnet

2855

C2

me.jmitchelldayton.com

otnhmtkwodm1.site

Attributes
  • vendor_id

    2855

Signatures

  • Gootkit

    Gootkit is a banking trojan, where large parts are written in node.JS.

  • Modifies Internet Explorer Protected Mode 1 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7af90590d1cd4e6f6d9d54bfc65e827d5ed0b062241e92d0a71eb991d079d989.exe
    "C:\Users\Admin\AppData\Local\Temp\7af90590d1cd4e6f6d9d54bfc65e827d5ed0b062241e92d0a71eb991d079d989.exe"
    1⤵
    • Modifies Internet Explorer Protected Mode
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4556
    • C:\Users\Admin\AppData\Local\Temp\7af90590d1cd4e6f6d9d54bfc65e827d5ed0b062241e92d0a71eb991d079d989.exe
      C:\Users\Admin\AppData\Local\Temp\7af90590d1cd4e6f6d9d54bfc65e827d5ed0b062241e92d0a71eb991d079d989.exe --vwxyz
      2⤵
        PID:3664

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3664-132-0x0000000000000000-mapping.dmp

    • memory/4556-131-0x0000000000400000-0x0000000000432000-memory.dmp

      Filesize

      200KB

    • memory/4556-130-0x0000000000400000-0x0000000000432000-memory.dmp

      Filesize

      200KB