Analysis
-
max time kernel
599s -
max time network
500s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
26-10-2022 23:52
Static task
static1
Behavioral task
behavioral1
Sample
026fd6ab8b5f12d1ae0795f7ad79b05a7ca1dc83e996cb7ee37f1b417d66de44.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
026fd6ab8b5f12d1ae0795f7ad79b05a7ca1dc83e996cb7ee37f1b417d66de44.exe
Resource
win10v2004-20220901-en
General
-
Target
026fd6ab8b5f12d1ae0795f7ad79b05a7ca1dc83e996cb7ee37f1b417d66de44.exe
-
Size
302KB
-
MD5
f870c0d62691fc39194922e4a59fdc1c
-
SHA1
69369a1aa35592ca4eede5179060f2c58e9bae6e
-
SHA256
026fd6ab8b5f12d1ae0795f7ad79b05a7ca1dc83e996cb7ee37f1b417d66de44
-
SHA512
92a452a2f63e9e214f98d14fcee1dd8f8c55b94ce90ed541986af08117f09779e159f76ae043ab6be4c49d254e4846448b632e0f33fcafb0be362a90a1a934ae
-
SSDEEP
6144:qTBSsdUvHN91B8LdCCoVupEo5KdEBaxRxnxXOWFi2HAwsih5:oUJvHNnBGdpOupzEdEByxW2g
Malware Config
Extracted
gozi_ifsb
1010
sys.cwthecw.com/bcms/assets/img
sys.whyblacklivesmatter.org/bcms/assets/img
sys.mohitsagarmusic.com/bcms/assets/img
lansystemstat.com/bcms/assets/img
highnetwork.pw/bcms/assets/img
lostnetwork.in/bcms/assets/img
sysconnections.net/bcms/assets/img
lansupports.com/bcms/assets/img
-
exe_type
worker
-
server_id
35
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1984 Authbk32.exe 4264 Authbk32.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 026fd6ab8b5f12d1ae0795f7ad79b05a7ca1dc83e996cb7ee37f1b417d66de44.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Bitssvcs = "C:\\Users\\Admin\\AppData\\Roaming\\AppVider\\Authbk32.exe" 026fd6ab8b5f12d1ae0795f7ad79b05a7ca1dc83e996cb7ee37f1b417d66de44.exe -
Suspicious use of SetThreadContext 7 IoCs
description pid Process procid_target PID 1380 set thread context of 1780 1380 026fd6ab8b5f12d1ae0795f7ad79b05a7ca1dc83e996cb7ee37f1b417d66de44.exe 92 PID 1984 set thread context of 4264 1984 Authbk32.exe 97 PID 4264 set thread context of 4304 4264 Authbk32.exe 98 PID 4304 set thread context of 3004 4304 svchost.exe 56 PID 3004 set thread context of 3360 3004 Explorer.EXE 29 PID 3004 set thread context of 3692 3004 Explorer.EXE 52 PID 3004 set thread context of 4960 3004 Explorer.EXE 49 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4264 Authbk32.exe 4264 Authbk32.exe 3004 Explorer.EXE 3004 Explorer.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3004 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 4264 Authbk32.exe 4304 svchost.exe 3004 Explorer.EXE 3004 Explorer.EXE 3004 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 26 IoCs
description pid Process Token: SeShutdownPrivilege 3004 Explorer.EXE Token: SeCreatePagefilePrivilege 3004 Explorer.EXE Token: SeShutdownPrivilege 3004 Explorer.EXE Token: SeCreatePagefilePrivilege 3004 Explorer.EXE Token: SeShutdownPrivilege 3004 Explorer.EXE Token: SeCreatePagefilePrivilege 3004 Explorer.EXE Token: SeShutdownPrivilege 3004 Explorer.EXE Token: SeCreatePagefilePrivilege 3004 Explorer.EXE Token: SeShutdownPrivilege 3004 Explorer.EXE Token: SeCreatePagefilePrivilege 3004 Explorer.EXE Token: SeShutdownPrivilege 3004 Explorer.EXE Token: SeCreatePagefilePrivilege 3004 Explorer.EXE Token: SeShutdownPrivilege 3004 Explorer.EXE Token: SeCreatePagefilePrivilege 3004 Explorer.EXE Token: SeShutdownPrivilege 3004 Explorer.EXE Token: SeCreatePagefilePrivilege 3004 Explorer.EXE Token: SeShutdownPrivilege 3004 Explorer.EXE Token: SeCreatePagefilePrivilege 3004 Explorer.EXE Token: SeShutdownPrivilege 3004 Explorer.EXE Token: SeCreatePagefilePrivilege 3004 Explorer.EXE Token: SeShutdownPrivilege 3004 Explorer.EXE Token: SeCreatePagefilePrivilege 3004 Explorer.EXE Token: SeShutdownPrivilege 3004 Explorer.EXE Token: SeCreatePagefilePrivilege 3004 Explorer.EXE Token: SeShutdownPrivilege 3004 Explorer.EXE Token: SeCreatePagefilePrivilege 3004 Explorer.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3004 Explorer.EXE -
Suspicious use of WriteProcessMemory 49 IoCs
description pid Process procid_target PID 1380 wrote to memory of 4984 1380 026fd6ab8b5f12d1ae0795f7ad79b05a7ca1dc83e996cb7ee37f1b417d66de44.exe 91 PID 1380 wrote to memory of 4984 1380 026fd6ab8b5f12d1ae0795f7ad79b05a7ca1dc83e996cb7ee37f1b417d66de44.exe 91 PID 1380 wrote to memory of 4984 1380 026fd6ab8b5f12d1ae0795f7ad79b05a7ca1dc83e996cb7ee37f1b417d66de44.exe 91 PID 1380 wrote to memory of 1780 1380 026fd6ab8b5f12d1ae0795f7ad79b05a7ca1dc83e996cb7ee37f1b417d66de44.exe 92 PID 1380 wrote to memory of 1780 1380 026fd6ab8b5f12d1ae0795f7ad79b05a7ca1dc83e996cb7ee37f1b417d66de44.exe 92 PID 1380 wrote to memory of 1780 1380 026fd6ab8b5f12d1ae0795f7ad79b05a7ca1dc83e996cb7ee37f1b417d66de44.exe 92 PID 1380 wrote to memory of 1780 1380 026fd6ab8b5f12d1ae0795f7ad79b05a7ca1dc83e996cb7ee37f1b417d66de44.exe 92 PID 1380 wrote to memory of 1780 1380 026fd6ab8b5f12d1ae0795f7ad79b05a7ca1dc83e996cb7ee37f1b417d66de44.exe 92 PID 1380 wrote to memory of 1780 1380 026fd6ab8b5f12d1ae0795f7ad79b05a7ca1dc83e996cb7ee37f1b417d66de44.exe 92 PID 1380 wrote to memory of 1780 1380 026fd6ab8b5f12d1ae0795f7ad79b05a7ca1dc83e996cb7ee37f1b417d66de44.exe 92 PID 1380 wrote to memory of 1780 1380 026fd6ab8b5f12d1ae0795f7ad79b05a7ca1dc83e996cb7ee37f1b417d66de44.exe 92 PID 1380 wrote to memory of 1780 1380 026fd6ab8b5f12d1ae0795f7ad79b05a7ca1dc83e996cb7ee37f1b417d66de44.exe 92 PID 1380 wrote to memory of 1780 1380 026fd6ab8b5f12d1ae0795f7ad79b05a7ca1dc83e996cb7ee37f1b417d66de44.exe 92 PID 1780 wrote to memory of 372 1780 026fd6ab8b5f12d1ae0795f7ad79b05a7ca1dc83e996cb7ee37f1b417d66de44.exe 93 PID 1780 wrote to memory of 372 1780 026fd6ab8b5f12d1ae0795f7ad79b05a7ca1dc83e996cb7ee37f1b417d66de44.exe 93 PID 1780 wrote to memory of 372 1780 026fd6ab8b5f12d1ae0795f7ad79b05a7ca1dc83e996cb7ee37f1b417d66de44.exe 93 PID 372 wrote to memory of 2556 372 cmd.exe 95 PID 372 wrote to memory of 2556 372 cmd.exe 95 PID 372 wrote to memory of 2556 372 cmd.exe 95 PID 2556 wrote to memory of 1984 2556 cmd.exe 96 PID 2556 wrote to memory of 1984 2556 cmd.exe 96 PID 2556 wrote to memory of 1984 2556 cmd.exe 96 PID 1984 wrote to memory of 4264 1984 Authbk32.exe 97 PID 1984 wrote to memory of 4264 1984 Authbk32.exe 97 PID 1984 wrote to memory of 4264 1984 Authbk32.exe 97 PID 1984 wrote to memory of 4264 1984 Authbk32.exe 97 PID 1984 wrote to memory of 4264 1984 Authbk32.exe 97 PID 1984 wrote to memory of 4264 1984 Authbk32.exe 97 PID 1984 wrote to memory of 4264 1984 Authbk32.exe 97 PID 1984 wrote to memory of 4264 1984 Authbk32.exe 97 PID 1984 wrote to memory of 4264 1984 Authbk32.exe 97 PID 1984 wrote to memory of 4264 1984 Authbk32.exe 97 PID 4264 wrote to memory of 4304 4264 Authbk32.exe 98 PID 4264 wrote to memory of 4304 4264 Authbk32.exe 98 PID 4264 wrote to memory of 4304 4264 Authbk32.exe 98 PID 4264 wrote to memory of 4304 4264 Authbk32.exe 98 PID 4264 wrote to memory of 4304 4264 Authbk32.exe 98 PID 4304 wrote to memory of 3004 4304 svchost.exe 56 PID 4304 wrote to memory of 3004 4304 svchost.exe 56 PID 4304 wrote to memory of 3004 4304 svchost.exe 56 PID 3004 wrote to memory of 3360 3004 Explorer.EXE 29 PID 3004 wrote to memory of 3360 3004 Explorer.EXE 29 PID 3004 wrote to memory of 3360 3004 Explorer.EXE 29 PID 3004 wrote to memory of 3692 3004 Explorer.EXE 52 PID 3004 wrote to memory of 3692 3004 Explorer.EXE 52 PID 3004 wrote to memory of 3692 3004 Explorer.EXE 52 PID 3004 wrote to memory of 4960 3004 Explorer.EXE 49 PID 3004 wrote to memory of 4960 3004 Explorer.EXE 49 PID 3004 wrote to memory of 4960 3004 Explorer.EXE 49
Processes
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3360
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4960
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3692
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Users\Admin\AppData\Local\Temp\026fd6ab8b5f12d1ae0795f7ad79b05a7ca1dc83e996cb7ee37f1b417d66de44.exe"C:\Users\Admin\AppData\Local\Temp\026fd6ab8b5f12d1ae0795f7ad79b05a7ca1dc83e996cb7ee37f1b417d66de44.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Users\Admin\AppData\Local\Temp\026fd6ab8b5f12d1ae0795f7ad79b05a7ca1dc83e996cb7ee37f1b417d66de44.exe"C:\Users\Admin\AppData\Local\Temp\026fd6ab8b5f12d1ae0795f7ad79b05a7ca1dc83e996cb7ee37f1b417d66de44.exe"3⤵PID:4984
-
-
C:\Users\Admin\AppData\Local\Temp\026fd6ab8b5f12d1ae0795f7ad79b05a7ca1dc83e996cb7ee37f1b417d66de44.exe"C:\Users\Admin\AppData\Local\Temp\026fd6ab8b5f12d1ae0795f7ad79b05a7ca1dc83e996cb7ee37f1b417d66de44.exe"3⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1750\D08E.bat" "C:\Users\Admin\AppData\Roaming\AppVider\Authbk32.exe" "C:\Users\Admin\AppData\Local\Temp\026FD6~1.EXE""4⤵
- Suspicious use of WriteProcessMemory
PID:372 -
C:\Windows\SysWOW64\cmd.execmd /C ""C:\Users\Admin\AppData\Roaming\AppVider\Authbk32.exe" "C:\Users\Admin\AppData\Local\Temp\026FD6~1.EXE""5⤵
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Users\Admin\AppData\Roaming\AppVider\Authbk32.exe"C:\Users\Admin\AppData\Roaming\AppVider\Authbk32.exe" "C:\Users\Admin\AppData\Local\Temp\026FD6~1.EXE"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Users\Admin\AppData\Roaming\AppVider\Authbk32.exe"C:\Users\Admin\AppData\Roaming\AppVider\Authbk32.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4264 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe8⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4304
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
112B
MD5f56711036239d9672e0dcf1f522eed58
SHA102fe9fd812c9eaf95201fd5102c6261c5c2fa990
SHA256adb76a26873753c74894801754a5f509cbca0fecd170cc018b6b4f0a330790f0
SHA51267bfcafa6c2e9b4d6c0cb52b2639b390ec1a06eda0d70037edd8e0aefc60cd3f3629b3bdaba1ce4b246b8dc4115c04c3320b652ebb203b405d3e135ca8272309
-
Filesize
302KB
MD5f870c0d62691fc39194922e4a59fdc1c
SHA169369a1aa35592ca4eede5179060f2c58e9bae6e
SHA256026fd6ab8b5f12d1ae0795f7ad79b05a7ca1dc83e996cb7ee37f1b417d66de44
SHA51292a452a2f63e9e214f98d14fcee1dd8f8c55b94ce90ed541986af08117f09779e159f76ae043ab6be4c49d254e4846448b632e0f33fcafb0be362a90a1a934ae
-
Filesize
302KB
MD5f870c0d62691fc39194922e4a59fdc1c
SHA169369a1aa35592ca4eede5179060f2c58e9bae6e
SHA256026fd6ab8b5f12d1ae0795f7ad79b05a7ca1dc83e996cb7ee37f1b417d66de44
SHA51292a452a2f63e9e214f98d14fcee1dd8f8c55b94ce90ed541986af08117f09779e159f76ae043ab6be4c49d254e4846448b632e0f33fcafb0be362a90a1a934ae
-
Filesize
302KB
MD5f870c0d62691fc39194922e4a59fdc1c
SHA169369a1aa35592ca4eede5179060f2c58e9bae6e
SHA256026fd6ab8b5f12d1ae0795f7ad79b05a7ca1dc83e996cb7ee37f1b417d66de44
SHA51292a452a2f63e9e214f98d14fcee1dd8f8c55b94ce90ed541986af08117f09779e159f76ae043ab6be4c49d254e4846448b632e0f33fcafb0be362a90a1a934ae