Analysis
-
max time kernel
153s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01-10-2022 23:08
Static task
static1
Behavioral task
behavioral1
Sample
00a0bc861d373a173fa465705d2e6760401413e6daee4d4ee13a5205256553b1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
00a0bc861d373a173fa465705d2e6760401413e6daee4d4ee13a5205256553b1.exe
Resource
win10v2004-20220812-en
General
-
Target
00a0bc861d373a173fa465705d2e6760401413e6daee4d4ee13a5205256553b1.exe
-
Size
392KB
-
MD5
64b58ecac6319443fd82a68bbc6593c0
-
SHA1
2132465f14b8910d650fc432e07d505a277ba33d
-
SHA256
00a0bc861d373a173fa465705d2e6760401413e6daee4d4ee13a5205256553b1
-
SHA512
b0692d77fedb5789a5602420e85a2e4bb6c4cda4ea5d0e4ecfe2b1dd2844a28dff5c6a0537187f9269bbeefceb199a3bfa4867f41ca55107362c450ecb9d0e2b
-
SSDEEP
6144:VoBJ469J803mzXLavaHWydKiztOdIRzduOqPxPmMoemVdDq:VoBC6uiWZ5zt8IvuxeM5mVh
Malware Config
Extracted
gozi_ifsb
3004
shiharch.net
naperedfish.com
naberplus.com
postpacifoc.com
gekkoting.com
-
exe_type
worker
-
server_id
12
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
ClouinRT.exepid Process 4052 ClouinRT.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
00a0bc861d373a173fa465705d2e6760401413e6daee4d4ee13a5205256553b1.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 00a0bc861d373a173fa465705d2e6760401413e6daee4d4ee13a5205256553b1.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
00a0bc861d373a173fa465705d2e6760401413e6daee4d4ee13a5205256553b1.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Bcasvice = "C:\\Users\\Admin\\AppData\\Roaming\\ClouinRT.exe" 00a0bc861d373a173fa465705d2e6760401413e6daee4d4ee13a5205256553b1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
00a0bc861d373a173fa465705d2e6760401413e6daee4d4ee13a5205256553b1.execmd.execmd.exedescription pid Process procid_target PID 1864 wrote to memory of 544 1864 00a0bc861d373a173fa465705d2e6760401413e6daee4d4ee13a5205256553b1.exe 87 PID 1864 wrote to memory of 544 1864 00a0bc861d373a173fa465705d2e6760401413e6daee4d4ee13a5205256553b1.exe 87 PID 1864 wrote to memory of 544 1864 00a0bc861d373a173fa465705d2e6760401413e6daee4d4ee13a5205256553b1.exe 87 PID 544 wrote to memory of 1076 544 cmd.exe 89 PID 544 wrote to memory of 1076 544 cmd.exe 89 PID 544 wrote to memory of 1076 544 cmd.exe 89 PID 1076 wrote to memory of 4052 1076 cmd.exe 90 PID 1076 wrote to memory of 4052 1076 cmd.exe 90 PID 1076 wrote to memory of 4052 1076 cmd.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\00a0bc861d373a173fa465705d2e6760401413e6daee4d4ee13a5205256553b1.exe"C:\Users\Admin\AppData\Local\Temp\00a0bc861d373a173fa465705d2e6760401413e6daee4d4ee13a5205256553b1.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1B9B.bat" "C:\Users\Admin\AppData\Roaming\ClouinRT.exe" "C:\Users\Admin\AppData\Local\Temp\00A0BC~1.EXE""2⤵
- Suspicious use of WriteProcessMemory
PID:544 -
C:\Windows\SysWOW64\cmd.execmd /C ""C:\Users\Admin\AppData\Roaming\ClouinRT.exe" "C:\Users\Admin\AppData\Local\Temp\00A0BC~1.EXE""3⤵
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Users\Admin\AppData\Roaming\ClouinRT.exe"C:\Users\Admin\AppData\Roaming\ClouinRT.exe" "C:\Users\Admin\AppData\Local\Temp\00A0BC~1.EXE"4⤵
- Executes dropped EXE
PID:4052
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
112B
MD5da4b8a1c6f158ba0c6c192f4a48a2868
SHA18178f46e74e61f1fe12c3e2559ef24129ee157d2
SHA2564d3a7ba9e1380d8887d829d4ad4dba4667fa7921ea5720ef88bcaf8981b49bcc
SHA512cf5a91b7c8275e0ef30e4863a22082a208dd492983b04bfe7c8e1dd0591c5ee4a4d1d65cfa8ab18a435f130bdccddddca75e54d3f1cfb45b3c2d073c5a19f4d9
-
Filesize
392KB
MD564b58ecac6319443fd82a68bbc6593c0
SHA12132465f14b8910d650fc432e07d505a277ba33d
SHA25600a0bc861d373a173fa465705d2e6760401413e6daee4d4ee13a5205256553b1
SHA512b0692d77fedb5789a5602420e85a2e4bb6c4cda4ea5d0e4ecfe2b1dd2844a28dff5c6a0537187f9269bbeefceb199a3bfa4867f41ca55107362c450ecb9d0e2b
-
Filesize
392KB
MD564b58ecac6319443fd82a68bbc6593c0
SHA12132465f14b8910d650fc432e07d505a277ba33d
SHA25600a0bc861d373a173fa465705d2e6760401413e6daee4d4ee13a5205256553b1
SHA512b0692d77fedb5789a5602420e85a2e4bb6c4cda4ea5d0e4ecfe2b1dd2844a28dff5c6a0537187f9269bbeefceb199a3bfa4867f41ca55107362c450ecb9d0e2b