Analysis
-
max time kernel
52s -
max time network
43s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19-10-2022 07:54
Static task
static1
Behavioral task
behavioral1
Sample
1dba5f321b3b289692f794c663ba008a9424f2a845f4b453e00ce0ea52450845.dll
Resource
win7-20220812-en
windows7-x64
2 signatures
150 seconds
General
-
Target
1dba5f321b3b289692f794c663ba008a9424f2a845f4b453e00ce0ea52450845.dll
-
Size
364KB
-
MD5
32a1ba8b559bf66052bc2eac774696ad
-
SHA1
8aacf9a09a59b703d9f24afc16188eb097f32710
-
SHA256
1dba5f321b3b289692f794c663ba008a9424f2a845f4b453e00ce0ea52450845
-
SHA512
683605a70b1c808430c7f5fea10ab23fa7e064afb2bf2f8b87aeeb1cc3c71732245b9533c421125fc89a35f9020a5a88d5be6886b16a9bfb64c2118fb38bc311
-
SSDEEP
6144:dMMEq6F3ZmdajnNFNxGYl67WJJW5ZtxfkUWHO8QzzAc:dMMEq6l1jNHxGdyJ0XfGHWzAc
Malware Config
Extracted
Family
gozi_ifsb
Botnet
1500
C2
app10.laptok.at
apt.feel500.at
init.in100k.at
Attributes
-
build
250188
-
exe_type
loader
-
server_id
580
rsa_pubkey.plain
aes.plain
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
regsvr32.exedescription pid process target process PID 1504 wrote to memory of 1536 1504 regsvr32.exe regsvr32.exe PID 1504 wrote to memory of 1536 1504 regsvr32.exe regsvr32.exe PID 1504 wrote to memory of 1536 1504 regsvr32.exe regsvr32.exe PID 1504 wrote to memory of 1536 1504 regsvr32.exe regsvr32.exe PID 1504 wrote to memory of 1536 1504 regsvr32.exe regsvr32.exe PID 1504 wrote to memory of 1536 1504 regsvr32.exe regsvr32.exe PID 1504 wrote to memory of 1536 1504 regsvr32.exe regsvr32.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\1dba5f321b3b289692f794c663ba008a9424f2a845f4b453e00ce0ea52450845.dll1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\1dba5f321b3b289692f794c663ba008a9424f2a845f4b453e00ce0ea52450845.dll2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1504-54-0x000007FEFC141000-0x000007FEFC143000-memory.dmpFilesize
8KB
-
memory/1536-55-0x0000000000000000-mapping.dmp
-
memory/1536-56-0x00000000768A1000-0x00000000768A3000-memory.dmpFilesize
8KB
-
memory/1536-57-0x00000000747E0000-0x00000000747ED000-memory.dmpFilesize
52KB
-
memory/1536-58-0x00000000747E0000-0x0000000074D49000-memory.dmpFilesize
5.4MB
-
memory/1536-59-0x00000000747E0000-0x0000000074D49000-memory.dmpFilesize
5.4MB
-
memory/1536-60-0x00000000747E0000-0x0000000074D49000-memory.dmpFilesize
5.4MB