Analysis
-
max time kernel
599s -
max time network
500s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
26-10-2022 23:52
Static task
static1
Behavioral task
behavioral1
Sample
026fd6ab8b5f12d1ae0795f7ad79b05a7ca1dc83e996cb7ee37f1b417d66de44.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
026fd6ab8b5f12d1ae0795f7ad79b05a7ca1dc83e996cb7ee37f1b417d66de44.exe
Resource
win10v2004-20220901-en
General
-
Target
026fd6ab8b5f12d1ae0795f7ad79b05a7ca1dc83e996cb7ee37f1b417d66de44.exe
-
Size
302KB
-
MD5
f870c0d62691fc39194922e4a59fdc1c
-
SHA1
69369a1aa35592ca4eede5179060f2c58e9bae6e
-
SHA256
026fd6ab8b5f12d1ae0795f7ad79b05a7ca1dc83e996cb7ee37f1b417d66de44
-
SHA512
92a452a2f63e9e214f98d14fcee1dd8f8c55b94ce90ed541986af08117f09779e159f76ae043ab6be4c49d254e4846448b632e0f33fcafb0be362a90a1a934ae
-
SSDEEP
6144:qTBSsdUvHN91B8LdCCoVupEo5KdEBaxRxnxXOWFi2HAwsih5:oUJvHNnBGdpOupzEdEByxW2g
Malware Config
Extracted
gozi_ifsb
1010
sys.cwthecw.com/bcms/assets/img
sys.whyblacklivesmatter.org/bcms/assets/img
sys.mohitsagarmusic.com/bcms/assets/img
lansystemstat.com/bcms/assets/img
highnetwork.pw/bcms/assets/img
lostnetwork.in/bcms/assets/img
sysconnections.net/bcms/assets/img
lansupports.com/bcms/assets/img
-
exe_type
worker
-
server_id
35
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
Authbk32.exeAuthbk32.exepid process 1984 Authbk32.exe 4264 Authbk32.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
026fd6ab8b5f12d1ae0795f7ad79b05a7ca1dc83e996cb7ee37f1b417d66de44.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 026fd6ab8b5f12d1ae0795f7ad79b05a7ca1dc83e996cb7ee37f1b417d66de44.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
026fd6ab8b5f12d1ae0795f7ad79b05a7ca1dc83e996cb7ee37f1b417d66de44.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Bitssvcs = "C:\\Users\\Admin\\AppData\\Roaming\\AppVider\\Authbk32.exe" 026fd6ab8b5f12d1ae0795f7ad79b05a7ca1dc83e996cb7ee37f1b417d66de44.exe -
Suspicious use of SetThreadContext 7 IoCs
Processes:
026fd6ab8b5f12d1ae0795f7ad79b05a7ca1dc83e996cb7ee37f1b417d66de44.exeAuthbk32.exeAuthbk32.exesvchost.exeExplorer.EXEdescription pid process target process PID 1380 set thread context of 1780 1380 026fd6ab8b5f12d1ae0795f7ad79b05a7ca1dc83e996cb7ee37f1b417d66de44.exe 026fd6ab8b5f12d1ae0795f7ad79b05a7ca1dc83e996cb7ee37f1b417d66de44.exe PID 1984 set thread context of 4264 1984 Authbk32.exe Authbk32.exe PID 4264 set thread context of 4304 4264 Authbk32.exe svchost.exe PID 4304 set thread context of 3004 4304 svchost.exe Explorer.EXE PID 3004 set thread context of 3360 3004 Explorer.EXE RuntimeBroker.exe PID 3004 set thread context of 3692 3004 Explorer.EXE RuntimeBroker.exe PID 3004 set thread context of 4960 3004 Explorer.EXE RuntimeBroker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
Authbk32.exeExplorer.EXEpid process 4264 Authbk32.exe 4264 Authbk32.exe 3004 Explorer.EXE 3004 Explorer.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 3004 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
Authbk32.exesvchost.exeExplorer.EXEpid process 4264 Authbk32.exe 4304 svchost.exe 3004 Explorer.EXE 3004 Explorer.EXE 3004 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 26 IoCs
Processes:
Explorer.EXEdescription pid process Token: SeShutdownPrivilege 3004 Explorer.EXE Token: SeCreatePagefilePrivilege 3004 Explorer.EXE Token: SeShutdownPrivilege 3004 Explorer.EXE Token: SeCreatePagefilePrivilege 3004 Explorer.EXE Token: SeShutdownPrivilege 3004 Explorer.EXE Token: SeCreatePagefilePrivilege 3004 Explorer.EXE Token: SeShutdownPrivilege 3004 Explorer.EXE Token: SeCreatePagefilePrivilege 3004 Explorer.EXE Token: SeShutdownPrivilege 3004 Explorer.EXE Token: SeCreatePagefilePrivilege 3004 Explorer.EXE Token: SeShutdownPrivilege 3004 Explorer.EXE Token: SeCreatePagefilePrivilege 3004 Explorer.EXE Token: SeShutdownPrivilege 3004 Explorer.EXE Token: SeCreatePagefilePrivilege 3004 Explorer.EXE Token: SeShutdownPrivilege 3004 Explorer.EXE Token: SeCreatePagefilePrivilege 3004 Explorer.EXE Token: SeShutdownPrivilege 3004 Explorer.EXE Token: SeCreatePagefilePrivilege 3004 Explorer.EXE Token: SeShutdownPrivilege 3004 Explorer.EXE Token: SeCreatePagefilePrivilege 3004 Explorer.EXE Token: SeShutdownPrivilege 3004 Explorer.EXE Token: SeCreatePagefilePrivilege 3004 Explorer.EXE Token: SeShutdownPrivilege 3004 Explorer.EXE Token: SeCreatePagefilePrivilege 3004 Explorer.EXE Token: SeShutdownPrivilege 3004 Explorer.EXE Token: SeCreatePagefilePrivilege 3004 Explorer.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Explorer.EXEpid process 3004 Explorer.EXE -
Suspicious use of WriteProcessMemory 49 IoCs
Processes:
026fd6ab8b5f12d1ae0795f7ad79b05a7ca1dc83e996cb7ee37f1b417d66de44.exe026fd6ab8b5f12d1ae0795f7ad79b05a7ca1dc83e996cb7ee37f1b417d66de44.execmd.execmd.exeAuthbk32.exeAuthbk32.exesvchost.exeExplorer.EXEdescription pid process target process PID 1380 wrote to memory of 4984 1380 026fd6ab8b5f12d1ae0795f7ad79b05a7ca1dc83e996cb7ee37f1b417d66de44.exe 026fd6ab8b5f12d1ae0795f7ad79b05a7ca1dc83e996cb7ee37f1b417d66de44.exe PID 1380 wrote to memory of 4984 1380 026fd6ab8b5f12d1ae0795f7ad79b05a7ca1dc83e996cb7ee37f1b417d66de44.exe 026fd6ab8b5f12d1ae0795f7ad79b05a7ca1dc83e996cb7ee37f1b417d66de44.exe PID 1380 wrote to memory of 4984 1380 026fd6ab8b5f12d1ae0795f7ad79b05a7ca1dc83e996cb7ee37f1b417d66de44.exe 026fd6ab8b5f12d1ae0795f7ad79b05a7ca1dc83e996cb7ee37f1b417d66de44.exe PID 1380 wrote to memory of 1780 1380 026fd6ab8b5f12d1ae0795f7ad79b05a7ca1dc83e996cb7ee37f1b417d66de44.exe 026fd6ab8b5f12d1ae0795f7ad79b05a7ca1dc83e996cb7ee37f1b417d66de44.exe PID 1380 wrote to memory of 1780 1380 026fd6ab8b5f12d1ae0795f7ad79b05a7ca1dc83e996cb7ee37f1b417d66de44.exe 026fd6ab8b5f12d1ae0795f7ad79b05a7ca1dc83e996cb7ee37f1b417d66de44.exe PID 1380 wrote to memory of 1780 1380 026fd6ab8b5f12d1ae0795f7ad79b05a7ca1dc83e996cb7ee37f1b417d66de44.exe 026fd6ab8b5f12d1ae0795f7ad79b05a7ca1dc83e996cb7ee37f1b417d66de44.exe PID 1380 wrote to memory of 1780 1380 026fd6ab8b5f12d1ae0795f7ad79b05a7ca1dc83e996cb7ee37f1b417d66de44.exe 026fd6ab8b5f12d1ae0795f7ad79b05a7ca1dc83e996cb7ee37f1b417d66de44.exe PID 1380 wrote to memory of 1780 1380 026fd6ab8b5f12d1ae0795f7ad79b05a7ca1dc83e996cb7ee37f1b417d66de44.exe 026fd6ab8b5f12d1ae0795f7ad79b05a7ca1dc83e996cb7ee37f1b417d66de44.exe PID 1380 wrote to memory of 1780 1380 026fd6ab8b5f12d1ae0795f7ad79b05a7ca1dc83e996cb7ee37f1b417d66de44.exe 026fd6ab8b5f12d1ae0795f7ad79b05a7ca1dc83e996cb7ee37f1b417d66de44.exe PID 1380 wrote to memory of 1780 1380 026fd6ab8b5f12d1ae0795f7ad79b05a7ca1dc83e996cb7ee37f1b417d66de44.exe 026fd6ab8b5f12d1ae0795f7ad79b05a7ca1dc83e996cb7ee37f1b417d66de44.exe PID 1380 wrote to memory of 1780 1380 026fd6ab8b5f12d1ae0795f7ad79b05a7ca1dc83e996cb7ee37f1b417d66de44.exe 026fd6ab8b5f12d1ae0795f7ad79b05a7ca1dc83e996cb7ee37f1b417d66de44.exe PID 1380 wrote to memory of 1780 1380 026fd6ab8b5f12d1ae0795f7ad79b05a7ca1dc83e996cb7ee37f1b417d66de44.exe 026fd6ab8b5f12d1ae0795f7ad79b05a7ca1dc83e996cb7ee37f1b417d66de44.exe PID 1380 wrote to memory of 1780 1380 026fd6ab8b5f12d1ae0795f7ad79b05a7ca1dc83e996cb7ee37f1b417d66de44.exe 026fd6ab8b5f12d1ae0795f7ad79b05a7ca1dc83e996cb7ee37f1b417d66de44.exe PID 1780 wrote to memory of 372 1780 026fd6ab8b5f12d1ae0795f7ad79b05a7ca1dc83e996cb7ee37f1b417d66de44.exe cmd.exe PID 1780 wrote to memory of 372 1780 026fd6ab8b5f12d1ae0795f7ad79b05a7ca1dc83e996cb7ee37f1b417d66de44.exe cmd.exe PID 1780 wrote to memory of 372 1780 026fd6ab8b5f12d1ae0795f7ad79b05a7ca1dc83e996cb7ee37f1b417d66de44.exe cmd.exe PID 372 wrote to memory of 2556 372 cmd.exe cmd.exe PID 372 wrote to memory of 2556 372 cmd.exe cmd.exe PID 372 wrote to memory of 2556 372 cmd.exe cmd.exe PID 2556 wrote to memory of 1984 2556 cmd.exe Authbk32.exe PID 2556 wrote to memory of 1984 2556 cmd.exe Authbk32.exe PID 2556 wrote to memory of 1984 2556 cmd.exe Authbk32.exe PID 1984 wrote to memory of 4264 1984 Authbk32.exe Authbk32.exe PID 1984 wrote to memory of 4264 1984 Authbk32.exe Authbk32.exe PID 1984 wrote to memory of 4264 1984 Authbk32.exe Authbk32.exe PID 1984 wrote to memory of 4264 1984 Authbk32.exe Authbk32.exe PID 1984 wrote to memory of 4264 1984 Authbk32.exe Authbk32.exe PID 1984 wrote to memory of 4264 1984 Authbk32.exe Authbk32.exe PID 1984 wrote to memory of 4264 1984 Authbk32.exe Authbk32.exe PID 1984 wrote to memory of 4264 1984 Authbk32.exe Authbk32.exe PID 1984 wrote to memory of 4264 1984 Authbk32.exe Authbk32.exe PID 1984 wrote to memory of 4264 1984 Authbk32.exe Authbk32.exe PID 4264 wrote to memory of 4304 4264 Authbk32.exe svchost.exe PID 4264 wrote to memory of 4304 4264 Authbk32.exe svchost.exe PID 4264 wrote to memory of 4304 4264 Authbk32.exe svchost.exe PID 4264 wrote to memory of 4304 4264 Authbk32.exe svchost.exe PID 4264 wrote to memory of 4304 4264 Authbk32.exe svchost.exe PID 4304 wrote to memory of 3004 4304 svchost.exe Explorer.EXE PID 4304 wrote to memory of 3004 4304 svchost.exe Explorer.EXE PID 4304 wrote to memory of 3004 4304 svchost.exe Explorer.EXE PID 3004 wrote to memory of 3360 3004 Explorer.EXE RuntimeBroker.exe PID 3004 wrote to memory of 3360 3004 Explorer.EXE RuntimeBroker.exe PID 3004 wrote to memory of 3360 3004 Explorer.EXE RuntimeBroker.exe PID 3004 wrote to memory of 3692 3004 Explorer.EXE RuntimeBroker.exe PID 3004 wrote to memory of 3692 3004 Explorer.EXE RuntimeBroker.exe PID 3004 wrote to memory of 3692 3004 Explorer.EXE RuntimeBroker.exe PID 3004 wrote to memory of 4960 3004 Explorer.EXE RuntimeBroker.exe PID 3004 wrote to memory of 4960 3004 Explorer.EXE RuntimeBroker.exe PID 3004 wrote to memory of 4960 3004 Explorer.EXE RuntimeBroker.exe
Processes
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3360
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4960
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3692
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Users\Admin\AppData\Local\Temp\026fd6ab8b5f12d1ae0795f7ad79b05a7ca1dc83e996cb7ee37f1b417d66de44.exe"C:\Users\Admin\AppData\Local\Temp\026fd6ab8b5f12d1ae0795f7ad79b05a7ca1dc83e996cb7ee37f1b417d66de44.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Users\Admin\AppData\Local\Temp\026fd6ab8b5f12d1ae0795f7ad79b05a7ca1dc83e996cb7ee37f1b417d66de44.exe"C:\Users\Admin\AppData\Local\Temp\026fd6ab8b5f12d1ae0795f7ad79b05a7ca1dc83e996cb7ee37f1b417d66de44.exe"3⤵PID:4984
-
-
C:\Users\Admin\AppData\Local\Temp\026fd6ab8b5f12d1ae0795f7ad79b05a7ca1dc83e996cb7ee37f1b417d66de44.exe"C:\Users\Admin\AppData\Local\Temp\026fd6ab8b5f12d1ae0795f7ad79b05a7ca1dc83e996cb7ee37f1b417d66de44.exe"3⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1750\D08E.bat" "C:\Users\Admin\AppData\Roaming\AppVider\Authbk32.exe" "C:\Users\Admin\AppData\Local\Temp\026FD6~1.EXE""4⤵
- Suspicious use of WriteProcessMemory
PID:372 -
C:\Windows\SysWOW64\cmd.execmd /C ""C:\Users\Admin\AppData\Roaming\AppVider\Authbk32.exe" "C:\Users\Admin\AppData\Local\Temp\026FD6~1.EXE""5⤵
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Users\Admin\AppData\Roaming\AppVider\Authbk32.exe"C:\Users\Admin\AppData\Roaming\AppVider\Authbk32.exe" "C:\Users\Admin\AppData\Local\Temp\026FD6~1.EXE"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Users\Admin\AppData\Roaming\AppVider\Authbk32.exe"C:\Users\Admin\AppData\Roaming\AppVider\Authbk32.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4264 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe8⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4304
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
112B
MD5f56711036239d9672e0dcf1f522eed58
SHA102fe9fd812c9eaf95201fd5102c6261c5c2fa990
SHA256adb76a26873753c74894801754a5f509cbca0fecd170cc018b6b4f0a330790f0
SHA51267bfcafa6c2e9b4d6c0cb52b2639b390ec1a06eda0d70037edd8e0aefc60cd3f3629b3bdaba1ce4b246b8dc4115c04c3320b652ebb203b405d3e135ca8272309
-
Filesize
302KB
MD5f870c0d62691fc39194922e4a59fdc1c
SHA169369a1aa35592ca4eede5179060f2c58e9bae6e
SHA256026fd6ab8b5f12d1ae0795f7ad79b05a7ca1dc83e996cb7ee37f1b417d66de44
SHA51292a452a2f63e9e214f98d14fcee1dd8f8c55b94ce90ed541986af08117f09779e159f76ae043ab6be4c49d254e4846448b632e0f33fcafb0be362a90a1a934ae
-
Filesize
302KB
MD5f870c0d62691fc39194922e4a59fdc1c
SHA169369a1aa35592ca4eede5179060f2c58e9bae6e
SHA256026fd6ab8b5f12d1ae0795f7ad79b05a7ca1dc83e996cb7ee37f1b417d66de44
SHA51292a452a2f63e9e214f98d14fcee1dd8f8c55b94ce90ed541986af08117f09779e159f76ae043ab6be4c49d254e4846448b632e0f33fcafb0be362a90a1a934ae
-
Filesize
302KB
MD5f870c0d62691fc39194922e4a59fdc1c
SHA169369a1aa35592ca4eede5179060f2c58e9bae6e
SHA256026fd6ab8b5f12d1ae0795f7ad79b05a7ca1dc83e996cb7ee37f1b417d66de44
SHA51292a452a2f63e9e214f98d14fcee1dd8f8c55b94ce90ed541986af08117f09779e159f76ae043ab6be4c49d254e4846448b632e0f33fcafb0be362a90a1a934ae