Analysis
-
max time kernel
146s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20220722-en -
resource tags
arch:x64arch:x86image:win10v2004-20220722-enlocale:en-usos:windows10-2004-x64system -
submitted
31-07-2022 19:42
Static task
static1
Behavioral task
behavioral1
Sample
5ea26dac1374c00472c64c6e2b68688eb7c090bc831026c6386db28555e6b05d.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
5ea26dac1374c00472c64c6e2b68688eb7c090bc831026c6386db28555e6b05d.exe
Resource
win10v2004-20220722-en
General
-
Target
5ea26dac1374c00472c64c6e2b68688eb7c090bc831026c6386db28555e6b05d.exe
-
Size
388KB
-
MD5
5031ce596f9f1898fe11cfa7e8858795
-
SHA1
ed60c8e01112ae2ae731a34703e241138bd6575d
-
SHA256
5ea26dac1374c00472c64c6e2b68688eb7c090bc831026c6386db28555e6b05d
-
SHA512
1bb76a86527720dd7cae237d0f7a8c70583cc9a2fc02dea287f5d60557657343d05487ef7ffe156efda1f09721f7b8a5a00b52cee88f283e2506bec6d9b9284f
Malware Config
Extracted
gozi_ifsb
1010
diuolirt.at
deopliazae.at
nifredao.com
filokiyurt.at
-
exe_type
worker
-
server_id
12
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
Bingutil.exepid process 2292 Bingutil.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
5ea26dac1374c00472c64c6e2b68688eb7c090bc831026c6386db28555e6b05d.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3463845317-933582289-45817732-1000\Control Panel\International\Geo\Nation 5ea26dac1374c00472c64c6e2b68688eb7c090bc831026c6386db28555e6b05d.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
5ea26dac1374c00472c64c6e2b68688eb7c090bc831026c6386db28555e6b05d.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3463845317-933582289-45817732-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AcGeecfc = "C:\\Users\\Admin\\AppData\\Roaming\\capahost\\Bingutil.exe" 5ea26dac1374c00472c64c6e2b68688eb7c090bc831026c6386db28555e6b05d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1532 2292 WerFault.exe Bingutil.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
Bingutil.exepid process 2292 Bingutil.exe 2292 Bingutil.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
5ea26dac1374c00472c64c6e2b68688eb7c090bc831026c6386db28555e6b05d.execmd.execmd.exeBingutil.exedescription pid process target process PID 488 wrote to memory of 4496 488 5ea26dac1374c00472c64c6e2b68688eb7c090bc831026c6386db28555e6b05d.exe cmd.exe PID 488 wrote to memory of 4496 488 5ea26dac1374c00472c64c6e2b68688eb7c090bc831026c6386db28555e6b05d.exe cmd.exe PID 488 wrote to memory of 4496 488 5ea26dac1374c00472c64c6e2b68688eb7c090bc831026c6386db28555e6b05d.exe cmd.exe PID 4496 wrote to memory of 3328 4496 cmd.exe cmd.exe PID 4496 wrote to memory of 3328 4496 cmd.exe cmd.exe PID 4496 wrote to memory of 3328 4496 cmd.exe cmd.exe PID 3328 wrote to memory of 2292 3328 cmd.exe Bingutil.exe PID 3328 wrote to memory of 2292 3328 cmd.exe Bingutil.exe PID 3328 wrote to memory of 2292 3328 cmd.exe Bingutil.exe PID 2292 wrote to memory of 1116 2292 Bingutil.exe svchost.exe PID 2292 wrote to memory of 1116 2292 Bingutil.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5ea26dac1374c00472c64c6e2b68688eb7c090bc831026c6386db28555e6b05d.exe"C:\Users\Admin\AppData\Local\Temp\5ea26dac1374c00472c64c6e2b68688eb7c090bc831026c6386db28555e6b05d.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\BFA1\3FC1.bat" "C:\Users\Admin\AppData\Roaming\capahost\Bingutil.exe" "C:\Users\Admin\AppData\Local\Temp\5EA26D~1.EXE""2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd /C ""C:\Users\Admin\AppData\Roaming\capahost\Bingutil.exe" "C:\Users\Admin\AppData\Local\Temp\5EA26D~1.EXE""3⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\capahost\Bingutil.exe"C:\Users\Admin\AppData\Roaming\capahost\Bingutil.exe" "C:\Users\Admin\AppData\Local\Temp\5EA26D~1.EXE"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe5⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2292 -s 5845⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 2292 -ip 22921⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\BFA1\3FC1.batFilesize
112B
MD5f61a29ae0612754b2de446c6cc81de10
SHA128ae65401b60452b2842a1b8f984d48438d8e703
SHA2561ecf31772c8539362f3b35018e85b086052938ea60c88992f1655853e37252d1
SHA512bcc2da3a3f17e6a4267b0882475f8f5e72250a4ec59595c9b03568e4965354876b90550bb9904129cc0b0e53950d57326cc9d98445aacedb2632ba745d7f5c2c
-
C:\Users\Admin\AppData\Roaming\capahost\Bingutil.exeFilesize
388KB
MD55031ce596f9f1898fe11cfa7e8858795
SHA1ed60c8e01112ae2ae731a34703e241138bd6575d
SHA2565ea26dac1374c00472c64c6e2b68688eb7c090bc831026c6386db28555e6b05d
SHA5121bb76a86527720dd7cae237d0f7a8c70583cc9a2fc02dea287f5d60557657343d05487ef7ffe156efda1f09721f7b8a5a00b52cee88f283e2506bec6d9b9284f
-
C:\Users\Admin\AppData\Roaming\capahost\Bingutil.exeFilesize
388KB
MD55031ce596f9f1898fe11cfa7e8858795
SHA1ed60c8e01112ae2ae731a34703e241138bd6575d
SHA2565ea26dac1374c00472c64c6e2b68688eb7c090bc831026c6386db28555e6b05d
SHA5121bb76a86527720dd7cae237d0f7a8c70583cc9a2fc02dea287f5d60557657343d05487ef7ffe156efda1f09721f7b8a5a00b52cee88f283e2506bec6d9b9284f
-
memory/488-132-0x0000000000710000-0x0000000000740000-memory.dmpFilesize
192KB
-
memory/488-133-0x0000000000400000-0x0000000000463000-memory.dmpFilesize
396KB
-
memory/488-135-0x0000000000710000-0x0000000000740000-memory.dmpFilesize
192KB
-
memory/2292-139-0x0000000000000000-mapping.dmp
-
memory/2292-142-0x0000000000400000-0x0000000000463000-memory.dmpFilesize
396KB
-
memory/2292-144-0x00000000007D0000-0x0000000000800000-memory.dmpFilesize
192KB
-
memory/3328-138-0x0000000000000000-mapping.dmp
-
memory/4496-136-0x0000000000000000-mapping.dmp