Analysis
-
max time kernel
134s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
18-10-2022 18:45
Static task
static1
Behavioral task
behavioral1
Sample
b51f67e67847ed20c75ef9bc8e057f0d93e2fa62bdf1df1a87d3f772603a59ff.dll
Resource
win7-20220812-en
windows7-x64
2 signatures
150 seconds
General
-
Target
b51f67e67847ed20c75ef9bc8e057f0d93e2fa62bdf1df1a87d3f772603a59ff.dll
-
Size
116KB
-
MD5
098e2b15bb37766a99b7bec04c504b78
-
SHA1
03ab72c389de1ce28605605a6fa0448802124f78
-
SHA256
b51f67e67847ed20c75ef9bc8e057f0d93e2fa62bdf1df1a87d3f772603a59ff
-
SHA512
035583149c9525cfe6a0019d3a64776bba5d483a6c118460d63f89f1bb9b055333401bfae8eb7e2492f34ca1650453bf19b003738b6e3d730db700f8e7095ecf
-
SSDEEP
3072:F14Nm3YTyii7bLYB0s7+Ec7V6bW2nnW6rifrQc1+lUmT:PvawYB0v72n6rQA+b
Malware Config
Extracted
Family
gozi_ifsb
Botnet
5000
C2
config.edge.skype.com
onlinetwork.top
linetwork.top
Attributes
-
base_path
/drew/
-
build
250246
-
exe_type
loader
-
extension
.jlk
-
server_id
50
rsa_pubkey.plain
aes.plain
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
regsvr32.exedescription pid process target process PID 2144 wrote to memory of 704 2144 regsvr32.exe regsvr32.exe PID 2144 wrote to memory of 704 2144 regsvr32.exe regsvr32.exe PID 2144 wrote to memory of 704 2144 regsvr32.exe regsvr32.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\b51f67e67847ed20c75ef9bc8e057f0d93e2fa62bdf1df1a87d3f772603a59ff.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\b51f67e67847ed20c75ef9bc8e057f0d93e2fa62bdf1df1a87d3f772603a59ff.dll2⤵PID:704
-