Malware Analysis Report

2024-10-19 01:08

Sample ID 220810-rz96msbdhp
Target 31a1197c1f7a1cb2b53bd1bb7fe2e1f8.dll
SHA256 1277c4177d2b564b221a369c587c6a99558253234f37bfbf19fef3a63bce88b5
Tags
gozi_ifsb 3000 banker trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

1277c4177d2b564b221a369c587c6a99558253234f37bfbf19fef3a63bce88b5

Threat Level: Known bad

The file 31a1197c1f7a1cb2b53bd1bb7fe2e1f8.dll was found to be: Known bad.

Malicious Activity Summary

gozi_ifsb 3000 banker trojan

Gozi, Gozi IFSB

Suspicious use of WriteProcessMemory

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2022-08-10 14:39

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2022-08-10 14:39

Reported

2022-08-10 14:41

Platform

win7-20220715-en

Max time kernel

45s

Max time network

49s

Command Line

regsvr32 /s C:\Users\Admin\AppData\Local\Temp\31a1197c1f7a1cb2b53bd1bb7fe2e1f8.dll

Signatures

Gozi, Gozi IFSB

banker trojan gozi_ifsb

Processes

C:\Windows\system32\regsvr32.exe

regsvr32 /s C:\Users\Admin\AppData\Local\Temp\31a1197c1f7a1cb2b53bd1bb7fe2e1f8.dll

C:\Windows\SysWOW64\regsvr32.exe

/s C:\Users\Admin\AppData\Local\Temp\31a1197c1f7a1cb2b53bd1bb7fe2e1f8.dll

Network

N/A

Files

memory/760-54-0x000007FEFC341000-0x000007FEFC343000-memory.dmp

memory/1996-55-0x0000000000000000-mapping.dmp

memory/1996-56-0x0000000075DF1000-0x0000000075DF3000-memory.dmp

memory/1996-57-0x0000000010000000-0x000000001000E000-memory.dmp

memory/1996-63-0x00000000001E0000-0x00000000001ED000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2022-08-10 14:39

Reported

2022-08-10 14:41

Platform

win10v2004-20220721-en

Max time kernel

149s

Max time network

152s

Command Line

regsvr32 /s C:\Users\Admin\AppData\Local\Temp\31a1197c1f7a1cb2b53bd1bb7fe2e1f8.dll

Signatures

Gozi, Gozi IFSB

banker trojan gozi_ifsb

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 5032 wrote to memory of 1488 N/A C:\Windows\system32\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe
PID 5032 wrote to memory of 1488 N/A C:\Windows\system32\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe
PID 5032 wrote to memory of 1488 N/A C:\Windows\system32\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe

Processes

C:\Windows\system32\regsvr32.exe

regsvr32 /s C:\Users\Admin\AppData\Local\Temp\31a1197c1f7a1cb2b53bd1bb7fe2e1f8.dll

C:\Windows\SysWOW64\regsvr32.exe

/s C:\Users\Admin\AppData\Local\Temp\31a1197c1f7a1cb2b53bd1bb7fe2e1f8.dll

Network

Country Destination Domain Proto
US 20.189.173.14:443 tcp
US 13.107.42.16:80 config.edge.skype.com tcp
NL 40.126.32.72:443 tcp
NL 79.110.52.8:80 tcp
NL 20.190.160.22:443 tcp
NL 40.126.32.72:443 tcp
NL 40.126.32.133:443 tcp
NL 20.190.160.22:443 tcp
NL 20.190.160.14:443 tcp
NL 40.126.32.133:443 tcp

Files

memory/1488-130-0x0000000000000000-mapping.dmp

memory/1488-131-0x0000000010000000-0x000000001000E000-memory.dmp

memory/1488-136-0x00000000008A0000-0x00000000008AD000-memory.dmp