Analysis
-
max time kernel
144s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
19-10-2022 10:41
Static task
static1
Behavioral task
behavioral1
Sample
1479.lnk
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1479.lnk
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
internee/boutiques.dll
Resource
win7-20220901-en
Behavioral task
behavioral4
Sample
internee/boutiques.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
internee/champ.cmd
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
internee/champ.cmd
Resource
win10v2004-20220901-en
General
-
Target
1479.lnk
-
Size
1KB
-
MD5
3a7fe4683c4e75860cda2f9cfe8286e7
-
SHA1
c61988e9a7270572d66305a1ae117ad88e321276
-
SHA256
95d75f9f60c28efec7ec43966a0379063aa9c7ca5351f23c77dc3e67050f559a
-
SHA512
b144c4ce2285f19e3ae7df886cee5a0d3c596c58e035b7f6d258aa0c4d223c9c02ea436326c791c9048519049c68c4f7e6e9bd1df10e997c4896c68f7ce1b4c0
Malware Config
Extracted
gozi_ifsb
5000
config.edge.skype.com
onlinetwork.top
linetwork.top
-
base_path
/drew/
-
build
250246
-
exe_type
loader
-
extension
.jlk
-
server_id
50
Signatures
-
Blocklisted process makes network request 5 IoCs
Processes:
rundll32.exeflow pid process 36 1696 rundll32.exe 39 1696 rundll32.exe 44 1696 rundll32.exe 45 1696 rundll32.exe 46 1696 rundll32.exe -
Executes dropped EXE 1 IoCs
Processes:
xxl.exepid process 1824 xxl.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
cmd.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
cmd.execmd.exexxl.exedescription pid process target process PID 4112 wrote to memory of 2396 4112 cmd.exe cmd.exe PID 4112 wrote to memory of 2396 4112 cmd.exe cmd.exe PID 2396 wrote to memory of 1824 2396 cmd.exe xxl.exe PID 2396 wrote to memory of 1824 2396 cmd.exe xxl.exe PID 1824 wrote to memory of 1696 1824 xxl.exe rundll32.exe PID 1824 wrote to memory of 1696 1824 xxl.exe rundll32.exe PID 1824 wrote to memory of 1696 1824 xxl.exe rundll32.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\1479.lnk1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c internee\champ.cmd dll32.exe tem dows2⤵
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Users\Admin\AppData\Local\Temp\xxl.exeC:\Users\Admin\AppData\Local\Temp\xxl.exe internee\boutiques.3ds,DllRegisterServer3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Windows\SysWOW64\rundll32.exeC:\Users\Admin\AppData\Local\Temp\xxl.exe internee\boutiques.3ds,DllRegisterServer4⤵
- Blocklisted process makes network request
PID:1696
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD5ef3179d498793bf4234f708d3be28633
SHA1dd399ae46303343f9f0da189aee11c67bd868222
SHA256b53f3c0cd32d7f20849850768da6431e5f876b7bfa61db0aa0700b02873393fa
SHA51202aff154762d7e53e37754f878ce6aa3f4df5a1eb167e27f13d9762dced32bec892bfa3f3314e3c6dce5998f7d3c400d7d0314b9326eedcab72207c60b3d332e
-
Filesize
70KB
MD5ef3179d498793bf4234f708d3be28633
SHA1dd399ae46303343f9f0da189aee11c67bd868222
SHA256b53f3c0cd32d7f20849850768da6431e5f876b7bfa61db0aa0700b02873393fa
SHA51202aff154762d7e53e37754f878ce6aa3f4df5a1eb167e27f13d9762dced32bec892bfa3f3314e3c6dce5998f7d3c400d7d0314b9326eedcab72207c60b3d332e