Analysis

  • max time kernel
    21s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    13-10-2022 16:57

General

  • Target

    adc9b4cb1e28544650105ab18a56bead0d8e2f2bbf77156683b5331b6060140d.exe

  • Size

    370KB

  • MD5

    5cf7fc7c80c42516bd3854417ccf6740

  • SHA1

    049b0b593cedc880f46436b3134b5d4783de415d

  • SHA256

    adc9b4cb1e28544650105ab18a56bead0d8e2f2bbf77156683b5331b6060140d

  • SHA512

    d7e7db1d4b6ee03135fd1383323880881f4efbc6254903bf78adc18fdf9c9af8730456189ef55ae2be64e695656dff57ad8c9faed574c65035d9664e318daa7d

  • SSDEEP

    6144:is9nB3cwgQccgBs9Hu5qRY41QnMWGMRosf9WSf4VzQtwHwwnn8rVN1c:viwgQcctH8qP1QnxGioqrwfHZslc

Malware Config

Signatures

  • Gozi, Gozi IFSB

    Gozi ISFB is a well-known and widely distributed banking trojan.

  • Deletes itself 1 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 8 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\adc9b4cb1e28544650105ab18a56bead0d8e2f2bbf77156683b5331b6060140d.exe
    "C:\Users\Admin\AppData\Local\Temp\adc9b4cb1e28544650105ab18a56bead0d8e2f2bbf77156683b5331b6060140d.exe"
    1⤵
    • Writes to the Master Boot Record (MBR)
    • Suspicious use of WriteProcessMemory
    PID:1732
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\588D.bat" "C:\Users\Admin\AppData\Local\Temp\ADC9B4~1.EXE""
      2⤵
      • Deletes itself
      • Suspicious use of WriteProcessMemory
      PID:1088
      • C:\Windows\SysWOW64\attrib.exe
        attrib -r -s -h "C:\Users\Admin\AppData\Local\Temp\ADC9B4~1.EXE"
        3⤵
        • Views/modifies file attributes
        PID:1740

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\588D.bat

    Filesize

    72B

    MD5

    f44ecc9db8cde52fb2432eeebe3cb2fb

    SHA1

    0886922986f2a360a4b94c8c0e9cfea4265d47c2

    SHA256

    f20bc5313d4fb0c4cd91fcded4a000ea048532478f76ab15fbb14ba2d8eabcb4

    SHA512

    6456403e76789511571acff87c424c4a80eb3f9522f87f3a1d1f932d635539ab8922062110e99a6d9de2b7499ac166b350a052be270188f8349e1041633b775f

  • memory/1088-61-0x0000000000000000-mapping.dmp

  • memory/1732-54-0x0000000075771000-0x0000000075773000-memory.dmp

    Filesize

    8KB

  • memory/1732-55-0x0000000000320000-0x0000000000325000-memory.dmp

    Filesize

    20KB

  • memory/1732-60-0x0000000000400000-0x0000000000483000-memory.dmp

    Filesize

    524KB

  • memory/1740-63-0x0000000000000000-mapping.dmp