Analysis
-
max time kernel
422s -
max time network
426s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
27-10-2022 00:03
Static task
static1
Behavioral task
behavioral1
Sample
2e563953d95288b1e36d9b7a556cb71d907510e40df243ec8b9c8ec1903edb13.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
2e563953d95288b1e36d9b7a556cb71d907510e40df243ec8b9c8ec1903edb13.exe
Resource
win10v2004-20220812-en
General
-
Target
2e563953d95288b1e36d9b7a556cb71d907510e40df243ec8b9c8ec1903edb13.exe
-
Size
393KB
-
MD5
78711573b936a6dc94070d16d19f699c
-
SHA1
625af3edc53e5f0e5fcbbcb2177679dd11080c09
-
SHA256
2e563953d95288b1e36d9b7a556cb71d907510e40df243ec8b9c8ec1903edb13
-
SHA512
be2b7b8321dda8fe38b82f8ac944b4c95e909a176431191d47588e1d51b020dd87324de732b32522864b6955352379518b2c1ec5d85132b3bcaacd74577519db
-
SSDEEP
12288:CqLvHvcLEtBpTr/xK9fk/PoWRV7jCiUwgy:xL3cLEtjTrI+3oWH7Gi
Malware Config
Extracted
gozi_ifsb
1010
supportsstats.com/geodata/version/ip2ext
neteworkgroup.com/geodata/version/ip2ext
highnetwork.pw/geodata/version/ip2ext
lostnetwork.in/geodata/version/ip2ext
sysconnections.net/geodata/version/ip2ext
lansupports.com/geodata/version/ip2ext
-
build
212578
-
exe_type
worker
-
server_id
30
Signatures
-
Modifies Installed Components in the registry 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 524 cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
2e563953d95288b1e36d9b7a556cb71d907510e40df243ec8b9c8ec1903edb13.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\dpmoprov = "C:\\Windows\\system32\\cmstwave.exe" 2e563953d95288b1e36d9b7a556cb71d907510e40df243ec8b9c8ec1903edb13.exe -
Drops file in System32 directory 2 IoCs
Processes:
2e563953d95288b1e36d9b7a556cb71d907510e40df243ec8b9c8ec1903edb13.exedescription ioc process File created C:\Windows\system32\cmstwave.exe 2e563953d95288b1e36d9b7a556cb71d907510e40df243ec8b9c8ec1903edb13.exe File opened for modification C:\Windows\system32\cmstwave.exe 2e563953d95288b1e36d9b7a556cb71d907510e40df243ec8b9c8ec1903edb13.exe -
Sets desktop wallpaper using registry 2 TTPs 2 IoCs
Processes:
2e563953d95288b1e36d9b7a556cb71d907510e40df243ec8b9c8ec1903edb13.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\D11.bin" 2e563953d95288b1e36d9b7a556cb71d907510e40df243ec8b9c8ec1903edb13.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Pictures\\My Wallpaper.jpg" 2e563953d95288b1e36d9b7a556cb71d907510e40df243ec8b9c8ec1903edb13.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
2e563953d95288b1e36d9b7a556cb71d907510e40df243ec8b9c8ec1903edb13.exe2e563953d95288b1e36d9b7a556cb71d907510e40df243ec8b9c8ec1903edb13.exedescription pid process target process PID 1468 set thread context of 1496 1468 2e563953d95288b1e36d9b7a556cb71d907510e40df243ec8b9c8ec1903edb13.exe 2e563953d95288b1e36d9b7a556cb71d907510e40df243ec8b9c8ec1903edb13.exe PID 1496 set thread context of 296 1496 2e563953d95288b1e36d9b7a556cb71d907510e40df243ec8b9c8ec1903edb13.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 5 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_Classes\Local Settings explorer.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
2e563953d95288b1e36d9b7a556cb71d907510e40df243ec8b9c8ec1903edb13.exepid process 1496 2e563953d95288b1e36d9b7a556cb71d907510e40df243ec8b9c8ec1903edb13.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
explorer.exepid process 296 explorer.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
2e563953d95288b1e36d9b7a556cb71d907510e40df243ec8b9c8ec1903edb13.exepid process 1496 2e563953d95288b1e36d9b7a556cb71d907510e40df243ec8b9c8ec1903edb13.exe -
Suspicious use of AdjustPrivilegeToken 17 IoCs
Processes:
explorer.exeAUDIODG.EXEdescription pid process Token: SeShutdownPrivilege 296 explorer.exe Token: SeShutdownPrivilege 296 explorer.exe Token: SeShutdownPrivilege 296 explorer.exe Token: SeShutdownPrivilege 296 explorer.exe Token: SeShutdownPrivilege 296 explorer.exe Token: SeShutdownPrivilege 296 explorer.exe Token: SeShutdownPrivilege 296 explorer.exe Token: SeShutdownPrivilege 296 explorer.exe Token: SeShutdownPrivilege 296 explorer.exe Token: SeShutdownPrivilege 296 explorer.exe Token: 33 1600 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1600 AUDIODG.EXE Token: 33 1600 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1600 AUDIODG.EXE Token: SeShutdownPrivilege 296 explorer.exe Token: SeShutdownPrivilege 296 explorer.exe Token: SeShutdownPrivilege 296 explorer.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
Processes:
explorer.exepid process 296 explorer.exe 296 explorer.exe 296 explorer.exe 296 explorer.exe 296 explorer.exe 296 explorer.exe 296 explorer.exe 296 explorer.exe 296 explorer.exe 296 explorer.exe 296 explorer.exe 296 explorer.exe 296 explorer.exe 296 explorer.exe 296 explorer.exe 296 explorer.exe 296 explorer.exe 296 explorer.exe 296 explorer.exe 296 explorer.exe 296 explorer.exe 296 explorer.exe 296 explorer.exe 296 explorer.exe 296 explorer.exe 296 explorer.exe 296 explorer.exe 296 explorer.exe 296 explorer.exe 296 explorer.exe 296 explorer.exe 296 explorer.exe 296 explorer.exe -
Suspicious use of SendNotifyMessage 22 IoCs
Processes:
explorer.exepid process 296 explorer.exe 296 explorer.exe 296 explorer.exe 296 explorer.exe 296 explorer.exe 296 explorer.exe 296 explorer.exe 296 explorer.exe 296 explorer.exe 296 explorer.exe 296 explorer.exe 296 explorer.exe 296 explorer.exe 296 explorer.exe 296 explorer.exe 296 explorer.exe 296 explorer.exe 296 explorer.exe 296 explorer.exe 296 explorer.exe 296 explorer.exe 296 explorer.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
explorer.exepid process 296 explorer.exe -
Suspicious use of WriteProcessMemory 26 IoCs
Processes:
2e563953d95288b1e36d9b7a556cb71d907510e40df243ec8b9c8ec1903edb13.exe2e563953d95288b1e36d9b7a556cb71d907510e40df243ec8b9c8ec1903edb13.execmd.exedescription pid process target process PID 1468 wrote to memory of 1496 1468 2e563953d95288b1e36d9b7a556cb71d907510e40df243ec8b9c8ec1903edb13.exe 2e563953d95288b1e36d9b7a556cb71d907510e40df243ec8b9c8ec1903edb13.exe PID 1468 wrote to memory of 1496 1468 2e563953d95288b1e36d9b7a556cb71d907510e40df243ec8b9c8ec1903edb13.exe 2e563953d95288b1e36d9b7a556cb71d907510e40df243ec8b9c8ec1903edb13.exe PID 1468 wrote to memory of 1496 1468 2e563953d95288b1e36d9b7a556cb71d907510e40df243ec8b9c8ec1903edb13.exe 2e563953d95288b1e36d9b7a556cb71d907510e40df243ec8b9c8ec1903edb13.exe PID 1468 wrote to memory of 1496 1468 2e563953d95288b1e36d9b7a556cb71d907510e40df243ec8b9c8ec1903edb13.exe 2e563953d95288b1e36d9b7a556cb71d907510e40df243ec8b9c8ec1903edb13.exe PID 1468 wrote to memory of 1496 1468 2e563953d95288b1e36d9b7a556cb71d907510e40df243ec8b9c8ec1903edb13.exe 2e563953d95288b1e36d9b7a556cb71d907510e40df243ec8b9c8ec1903edb13.exe PID 1468 wrote to memory of 1496 1468 2e563953d95288b1e36d9b7a556cb71d907510e40df243ec8b9c8ec1903edb13.exe 2e563953d95288b1e36d9b7a556cb71d907510e40df243ec8b9c8ec1903edb13.exe PID 1468 wrote to memory of 1496 1468 2e563953d95288b1e36d9b7a556cb71d907510e40df243ec8b9c8ec1903edb13.exe 2e563953d95288b1e36d9b7a556cb71d907510e40df243ec8b9c8ec1903edb13.exe PID 1468 wrote to memory of 1496 1468 2e563953d95288b1e36d9b7a556cb71d907510e40df243ec8b9c8ec1903edb13.exe 2e563953d95288b1e36d9b7a556cb71d907510e40df243ec8b9c8ec1903edb13.exe PID 1468 wrote to memory of 1496 1468 2e563953d95288b1e36d9b7a556cb71d907510e40df243ec8b9c8ec1903edb13.exe 2e563953d95288b1e36d9b7a556cb71d907510e40df243ec8b9c8ec1903edb13.exe PID 1468 wrote to memory of 1496 1468 2e563953d95288b1e36d9b7a556cb71d907510e40df243ec8b9c8ec1903edb13.exe 2e563953d95288b1e36d9b7a556cb71d907510e40df243ec8b9c8ec1903edb13.exe PID 1468 wrote to memory of 1496 1468 2e563953d95288b1e36d9b7a556cb71d907510e40df243ec8b9c8ec1903edb13.exe 2e563953d95288b1e36d9b7a556cb71d907510e40df243ec8b9c8ec1903edb13.exe PID 1496 wrote to memory of 296 1496 2e563953d95288b1e36d9b7a556cb71d907510e40df243ec8b9c8ec1903edb13.exe explorer.exe PID 1496 wrote to memory of 296 1496 2e563953d95288b1e36d9b7a556cb71d907510e40df243ec8b9c8ec1903edb13.exe explorer.exe PID 1496 wrote to memory of 296 1496 2e563953d95288b1e36d9b7a556cb71d907510e40df243ec8b9c8ec1903edb13.exe explorer.exe PID 1496 wrote to memory of 296 1496 2e563953d95288b1e36d9b7a556cb71d907510e40df243ec8b9c8ec1903edb13.exe explorer.exe PID 1496 wrote to memory of 296 1496 2e563953d95288b1e36d9b7a556cb71d907510e40df243ec8b9c8ec1903edb13.exe explorer.exe PID 1496 wrote to memory of 296 1496 2e563953d95288b1e36d9b7a556cb71d907510e40df243ec8b9c8ec1903edb13.exe explorer.exe PID 1496 wrote to memory of 296 1496 2e563953d95288b1e36d9b7a556cb71d907510e40df243ec8b9c8ec1903edb13.exe explorer.exe PID 1496 wrote to memory of 524 1496 2e563953d95288b1e36d9b7a556cb71d907510e40df243ec8b9c8ec1903edb13.exe cmd.exe PID 1496 wrote to memory of 524 1496 2e563953d95288b1e36d9b7a556cb71d907510e40df243ec8b9c8ec1903edb13.exe cmd.exe PID 1496 wrote to memory of 524 1496 2e563953d95288b1e36d9b7a556cb71d907510e40df243ec8b9c8ec1903edb13.exe cmd.exe PID 1496 wrote to memory of 524 1496 2e563953d95288b1e36d9b7a556cb71d907510e40df243ec8b9c8ec1903edb13.exe cmd.exe PID 524 wrote to memory of 1704 524 cmd.exe attrib.exe PID 524 wrote to memory of 1704 524 cmd.exe attrib.exe PID 524 wrote to memory of 1704 524 cmd.exe attrib.exe PID 524 wrote to memory of 1704 524 cmd.exe attrib.exe -
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Users\Admin\AppData\Local\Temp\2e563953d95288b1e36d9b7a556cb71d907510e40df243ec8b9c8ec1903edb13.exe"C:\Users\Admin\AppData\Local\Temp\2e563953d95288b1e36d9b7a556cb71d907510e40df243ec8b9c8ec1903edb13.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\2e563953d95288b1e36d9b7a556cb71d907510e40df243ec8b9c8ec1903edb13.exe"C:\Users\Admin\AppData\Local\Temp\2e563953d95288b1e36d9b7a556cb71d907510e40df243ec8b9c8ec1903edb13.exe"2⤵
- Adds Run key to start application
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\explorer.exeC:\Windows\explorer.exe3⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\3438.bat" "C:\Users\Admin\AppData\Local\Temp\2E5639~1.EXE""3⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\attrib.exeattrib -r -s -h "C:\Users\Admin\AppData\Local\Temp\2E5639~1.EXE"4⤵
- Views/modifies file attributes
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5681⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\3438.batFilesize
72B
MD56520c8f6774644ef43d42f4077a6c453
SHA1d4b6d1f68ff0cde48c8f4151901af6b842d971aa
SHA256f3f19349839b65de15ca2de2b692257b88127ad82afe57499b03b56defb80e19
SHA5128c4a5d4ac124a5bba6912c267423212e5139b191f574c9167628725ab504b6fc1a51b88312e843a8f8f6fd31d563544f2e4b2e76b852cf309d8e6d3f947cc6e3
-
memory/296-68-0x0000000000000000-mapping.dmp
-
memory/296-75-0x0000000001B60000-0x0000000001BE6000-memory.dmpFilesize
536KB
-
memory/296-70-0x000007FEFC5A1000-0x000007FEFC5A3000-memory.dmpFilesize
8KB
-
memory/524-71-0x0000000000000000-mapping.dmp
-
memory/1496-60-0x0000000000400000-0x0000000000439000-memory.dmpFilesize
228KB
-
memory/1496-63-0x0000000000400000-0x0000000000439000-memory.dmpFilesize
228KB
-
memory/1496-64-0x000000000040110F-mapping.dmp
-
memory/1496-66-0x0000000076BA1000-0x0000000076BA3000-memory.dmpFilesize
8KB
-
memory/1496-67-0x0000000000400000-0x0000000000439000-memory.dmpFilesize
228KB
-
memory/1496-61-0x0000000000400000-0x0000000000439000-memory.dmpFilesize
228KB
-
memory/1496-69-0x0000000000400000-0x0000000000439000-memory.dmpFilesize
228KB
-
memory/1496-54-0x0000000000400000-0x0000000000439000-memory.dmpFilesize
228KB
-
memory/1496-59-0x0000000000400000-0x0000000000439000-memory.dmpFilesize
228KB
-
memory/1496-72-0x0000000000400000-0x0000000000439000-memory.dmpFilesize
228KB
-
memory/1496-57-0x0000000000400000-0x0000000000439000-memory.dmpFilesize
228KB
-
memory/1496-55-0x0000000000400000-0x0000000000439000-memory.dmpFilesize
228KB
-
memory/1704-74-0x0000000000000000-mapping.dmp