Analysis
-
max time kernel
43s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30-09-2022 12:27
Static task
static1
Behavioral task
behavioral1
Sample
b467220263eeecd1540d6dd9fb7ae1d4d7a0b14cabd14d66231a5c10f8fb4205.dll
Resource
win7-20220812-en
General
-
Target
b467220263eeecd1540d6dd9fb7ae1d4d7a0b14cabd14d66231a5c10f8fb4205.dll
-
Size
511KB
-
MD5
b168b018582b096d8cdeb8e1ebc5f6b2
-
SHA1
5dc6b11fc92b846963a15089cf00da43426e6f03
-
SHA256
b467220263eeecd1540d6dd9fb7ae1d4d7a0b14cabd14d66231a5c10f8fb4205
-
SHA512
9db9847ef5f8b45ee1bd347cc36c6e6cd6cd5e3e3d39f1c768ce8b9bd04ada52902e86ace8d2b20acc06955131bc1d3f941998e1486732c9a92e8fd1526f8f27
-
SSDEEP
6144:ATZBx+7jsPTl/N80J849j3si2Hw2Kfl0OA5P1rh/YwOnhu58jT7FWQ+ICBFQ5jym:WZP+7jsZS0r59Qw3RxjkePx
Malware Config
Extracted
gozi_ifsb
3000
config.edge.skype.com
89.41.26.99
89.45.4.102
interstarts.top
superlist.top
internetcoca.in
-
base_path
/drew/
-
build
250246
-
exe_type
loader
-
extension
.jlk
-
server_id
50
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
regsvr32.exedescription pid Process procid_target PID 1112 wrote to memory of 1928 1112 regsvr32.exe 28 PID 1112 wrote to memory of 1928 1112 regsvr32.exe 28 PID 1112 wrote to memory of 1928 1112 regsvr32.exe 28 PID 1112 wrote to memory of 1928 1112 regsvr32.exe 28 PID 1112 wrote to memory of 1928 1112 regsvr32.exe 28 PID 1112 wrote to memory of 1928 1112 regsvr32.exe 28 PID 1112 wrote to memory of 1928 1112 regsvr32.exe 28
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\b467220263eeecd1540d6dd9fb7ae1d4d7a0b14cabd14d66231a5c10f8fb4205.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\b467220263eeecd1540d6dd9fb7ae1d4d7a0b14cabd14d66231a5c10f8fb4205.dll2⤵PID:1928
-