Analysis

  • max time kernel
    153s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-10-2022 23:08

General

  • Target

    00a0bc861d373a173fa465705d2e6760401413e6daee4d4ee13a5205256553b1.exe

  • Size

    392KB

  • MD5

    64b58ecac6319443fd82a68bbc6593c0

  • SHA1

    2132465f14b8910d650fc432e07d505a277ba33d

  • SHA256

    00a0bc861d373a173fa465705d2e6760401413e6daee4d4ee13a5205256553b1

  • SHA512

    b0692d77fedb5789a5602420e85a2e4bb6c4cda4ea5d0e4ecfe2b1dd2844a28dff5c6a0537187f9269bbeefceb199a3bfa4867f41ca55107362c450ecb9d0e2b

  • SSDEEP

    6144:VoBJ469J803mzXLavaHWydKiztOdIRzduOqPxPmMoemVdDq:VoBC6uiWZ5zt8IvuxeM5mVh

Malware Config

Extracted

Family

gozi_ifsb

Botnet

3004

C2

shiharch.net

naperedfish.com

naberplus.com

postpacifoc.com

gekkoting.com

Attributes
  • exe_type

    worker

  • server_id

    12

rsa_pubkey.plain
serpent.plain

Signatures

  • Gozi, Gozi IFSB

    Gozi ISFB is a well-known and widely distributed banking trojan.

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\00a0bc861d373a173fa465705d2e6760401413e6daee4d4ee13a5205256553b1.exe
    "C:\Users\Admin\AppData\Local\Temp\00a0bc861d373a173fa465705d2e6760401413e6daee4d4ee13a5205256553b1.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1864
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1B9B.bat" "C:\Users\Admin\AppData\Roaming\ClouinRT.exe" "C:\Users\Admin\AppData\Local\Temp\00A0BC~1.EXE""
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:544
      • C:\Windows\SysWOW64\cmd.exe
        cmd /C ""C:\Users\Admin\AppData\Roaming\ClouinRT.exe" "C:\Users\Admin\AppData\Local\Temp\00A0BC~1.EXE""
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1076
        • C:\Users\Admin\AppData\Roaming\ClouinRT.exe
          "C:\Users\Admin\AppData\Roaming\ClouinRT.exe" "C:\Users\Admin\AppData\Local\Temp\00A0BC~1.EXE"
          4⤵
          • Executes dropped EXE
          PID:4052

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\1B9B.bat

    Filesize

    112B

    MD5

    da4b8a1c6f158ba0c6c192f4a48a2868

    SHA1

    8178f46e74e61f1fe12c3e2559ef24129ee157d2

    SHA256

    4d3a7ba9e1380d8887d829d4ad4dba4667fa7921ea5720ef88bcaf8981b49bcc

    SHA512

    cf5a91b7c8275e0ef30e4863a22082a208dd492983b04bfe7c8e1dd0591c5ee4a4d1d65cfa8ab18a435f130bdccddddca75e54d3f1cfb45b3c2d073c5a19f4d9

  • C:\Users\Admin\AppData\Roaming\ClouinRT.exe

    Filesize

    392KB

    MD5

    64b58ecac6319443fd82a68bbc6593c0

    SHA1

    2132465f14b8910d650fc432e07d505a277ba33d

    SHA256

    00a0bc861d373a173fa465705d2e6760401413e6daee4d4ee13a5205256553b1

    SHA512

    b0692d77fedb5789a5602420e85a2e4bb6c4cda4ea5d0e4ecfe2b1dd2844a28dff5c6a0537187f9269bbeefceb199a3bfa4867f41ca55107362c450ecb9d0e2b

  • C:\Users\Admin\AppData\Roaming\ClouinRT.exe

    Filesize

    392KB

    MD5

    64b58ecac6319443fd82a68bbc6593c0

    SHA1

    2132465f14b8910d650fc432e07d505a277ba33d

    SHA256

    00a0bc861d373a173fa465705d2e6760401413e6daee4d4ee13a5205256553b1

    SHA512

    b0692d77fedb5789a5602420e85a2e4bb6c4cda4ea5d0e4ecfe2b1dd2844a28dff5c6a0537187f9269bbeefceb199a3bfa4867f41ca55107362c450ecb9d0e2b

  • memory/544-135-0x0000000000000000-mapping.dmp

  • memory/1076-138-0x0000000000000000-mapping.dmp

  • memory/1864-132-0x00000000021F0000-0x0000000002229000-memory.dmp

    Filesize

    228KB

  • memory/1864-133-0x0000000000400000-0x0000000000465000-memory.dmp

    Filesize

    404KB

  • memory/1864-134-0x0000000000400000-0x0000000000465000-memory.dmp

    Filesize

    404KB

  • memory/1864-136-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/4052-139-0x0000000000000000-mapping.dmp

  • memory/4052-142-0x0000000000400000-0x0000000000465000-memory.dmp

    Filesize

    404KB

  • memory/4052-143-0x0000000000400000-0x0000000000465000-memory.dmp

    Filesize

    404KB