Malware Analysis Report

2024-10-19 01:08

Sample ID 220810-r1zrasdda9
Target 31a1197c1f7a1cb2b53bd1bb7fe2e1f8.dll
SHA256 1277c4177d2b564b221a369c587c6a99558253234f37bfbf19fef3a63bce88b5
Tags
gozi_ifsb 3000 banker trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

1277c4177d2b564b221a369c587c6a99558253234f37bfbf19fef3a63bce88b5

Threat Level: Known bad

The file 31a1197c1f7a1cb2b53bd1bb7fe2e1f8.dll was found to be: Known bad.

Malicious Activity Summary

gozi_ifsb 3000 banker trojan

Gozi, Gozi IFSB

Suspicious use of WriteProcessMemory

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2022-08-10 14:40

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2022-08-10 14:40

Reported

2022-08-10 14:42

Platform

win7-20220715-en

Max time kernel

45s

Max time network

56s

Command Line

regsvr32 /s C:\Users\Admin\AppData\Local\Temp\31a1197c1f7a1cb2b53bd1bb7fe2e1f8.dll

Signatures

Gozi, Gozi IFSB

banker trojan gozi_ifsb

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1488 wrote to memory of 1252 N/A C:\Windows\system32\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe
PID 1488 wrote to memory of 1252 N/A C:\Windows\system32\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe
PID 1488 wrote to memory of 1252 N/A C:\Windows\system32\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe
PID 1488 wrote to memory of 1252 N/A C:\Windows\system32\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe
PID 1488 wrote to memory of 1252 N/A C:\Windows\system32\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe
PID 1488 wrote to memory of 1252 N/A C:\Windows\system32\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe
PID 1488 wrote to memory of 1252 N/A C:\Windows\system32\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe

Processes

C:\Windows\system32\regsvr32.exe

regsvr32 /s C:\Users\Admin\AppData\Local\Temp\31a1197c1f7a1cb2b53bd1bb7fe2e1f8.dll

C:\Windows\SysWOW64\regsvr32.exe

/s C:\Users\Admin\AppData\Local\Temp\31a1197c1f7a1cb2b53bd1bb7fe2e1f8.dll

Network

Country Destination Domain Proto
NL 172.217.168.238:443 tcp
NL 142.250.179.206:443 tcp
US 8.8.8.8:443 tcp
NL 142.251.36.45:443 tcp
US 8.8.4.4:443 tcp
NL 142.250.179.195:443 tcp
NL 216.58.208.99:443 tcp
NL 142.250.179.195:443 tcp
US 8.8.4.4:443 tcp
NL 142.250.179.163:443 tcp
US 8.8.8.8:443 tcp

Files

memory/1488-54-0x000007FEFC3E1000-0x000007FEFC3E3000-memory.dmp

memory/1252-55-0x0000000000000000-mapping.dmp

memory/1252-56-0x00000000764D1000-0x00000000764D3000-memory.dmp

memory/1252-57-0x0000000010000000-0x000000001000E000-memory.dmp

memory/1252-63-0x00000000001A0000-0x00000000001AD000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2022-08-10 14:40

Reported

2022-08-10 14:42

Platform

win10v2004-20220721-en

Max time kernel

149s

Max time network

153s

Command Line

regsvr32 /s C:\Users\Admin\AppData\Local\Temp\31a1197c1f7a1cb2b53bd1bb7fe2e1f8.dll

Signatures

Gozi, Gozi IFSB

banker trojan gozi_ifsb

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2288 wrote to memory of 4436 N/A C:\Windows\system32\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe
PID 2288 wrote to memory of 4436 N/A C:\Windows\system32\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe
PID 2288 wrote to memory of 4436 N/A C:\Windows\system32\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe

Processes

C:\Windows\system32\regsvr32.exe

regsvr32 /s C:\Users\Admin\AppData\Local\Temp\31a1197c1f7a1cb2b53bd1bb7fe2e1f8.dll

C:\Windows\SysWOW64\regsvr32.exe

/s C:\Users\Admin\AppData\Local\Temp\31a1197c1f7a1cb2b53bd1bb7fe2e1f8.dll

Network

Country Destination Domain Proto
NL 104.80.225.205:443 tcp
FR 51.11.192.48:443 tcp
US 13.107.42.16:80 config.edge.skype.com tcp
US 8.253.183.249:80 tcp
US 8.253.183.249:80 tcp
US 8.253.183.249:80 tcp
US 8.253.183.249:80 tcp
US 67.26.205.254:80 tcp
US 8.253.183.249:80 tcp
US 67.26.205.254:80 tcp
NL 79.110.52.8:80 tcp

Files

memory/4436-130-0x0000000000000000-mapping.dmp

memory/4436-131-0x0000000010000000-0x000000001000E000-memory.dmp

memory/4436-136-0x00000000008F0000-0x00000000008FD000-memory.dmp