Analysis

  • max time kernel
    477s
  • max time network
    431s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    27-10-2022 00:02

General

  • Target

    2952a6ad1ba0a56ea176672f3ec9b1ad8a92836839dc51f592eb253db60c96af.exe

  • Size

    430KB

  • MD5

    8730820fabb55d15f327b8bca8ade887

  • SHA1

    e20c2ec38086bfd9760925f055e13d286bdd0aa3

  • SHA256

    2952a6ad1ba0a56ea176672f3ec9b1ad8a92836839dc51f592eb253db60c96af

  • SHA512

    dbe64932b5f7de98de9a7db1a127d5b3a13e595c556b86796de2c3857550b6f3ff3e061fc4b90d891c247b915d9c0fea85c07d9ee29cb8471decf2b81108e034

  • SSDEEP

    12288:/4SwXkbqJNiIeJY4kLm7lszLu0j4/VR7VXQfj:gSZ+TiIeJCLm7z4qVR7V

Malware Config

Extracted

Family

gozi_ifsb

Botnet

10008

C2

jscallowallowallowjcli.me

disallowjscuserallow.pw

Attributes
  • build

    215801

  • dga_base_url

    z1.zedo.com/robots.txt

  • dga_crc

    0x246640bb

  • exe_type

    worker

  • server_id

    12

rsa_pubkey.plain
serpent.plain

Signatures

  • Gozi, Gozi IFSB

    Gozi ISFB is a well-known and widely distributed banking trojan.

  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:1412
    • C:\Users\Admin\AppData\Local\Temp\2952a6ad1ba0a56ea176672f3ec9b1ad8a92836839dc51f592eb253db60c96af.exe
      "C:\Users\Admin\AppData\Local\Temp\2952a6ad1ba0a56ea176672f3ec9b1ad8a92836839dc51f592eb253db60c96af.exe"
      2⤵
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1504
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\1824\C12.bat" "C:\Users\Admin\AppData\Roaming\clbcwcfg\dsroXP32.exe" "C:\Users\Admin\AppData\Local\Temp\2952A6~1.EXE""
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1904
        • C:\Windows\SysWOW64\cmd.exe
          cmd /C ""C:\Users\Admin\AppData\Roaming\clbcwcfg\dsroXP32.exe" "C:\Users\Admin\AppData\Local\Temp\2952A6~1.EXE""
          4⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:1724
          • C:\Users\Admin\AppData\Roaming\clbcwcfg\dsroXP32.exe
            "C:\Users\Admin\AppData\Roaming\clbcwcfg\dsroXP32.exe" "C:\Users\Admin\AppData\Local\Temp\2952A6~1.EXE"
            5⤵
            • Executes dropped EXE
            • Deletes itself
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of WriteProcessMemory
            PID:1992
            • C:\Windows\system32\svchost.exe
              C:\Windows\system32\svchost.exe
              6⤵
              • Suspicious use of SetThreadContext
              • Suspicious behavior: MapViewOfSection
              • Suspicious use of WriteProcessMemory
              PID:1976

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\1824\C12.bat
    Filesize

    108B

    MD5

    81bac2582d15efa999fe61dccab3a5c7

    SHA1

    99043f9c4a1027e6e8257b0ec51ae98206570f29

    SHA256

    5c1ced2c271c0cfcb9968baa1e32bbd3f9ca6cae2078ed4e4a289c1667cd0b5d

    SHA512

    152bed418b3f75c7edd37a1d629a3c1cc2d3783e3136d3a9e7ced80135f2b011eac3e9e7eec408c264ab6940239ba4d82d2d73509d77e28a1df79d6c485fe72f

  • C:\Users\Admin\AppData\Roaming\clbcwcfg\dsroXP32.exe
    Filesize

    430KB

    MD5

    8730820fabb55d15f327b8bca8ade887

    SHA1

    e20c2ec38086bfd9760925f055e13d286bdd0aa3

    SHA256

    2952a6ad1ba0a56ea176672f3ec9b1ad8a92836839dc51f592eb253db60c96af

    SHA512

    dbe64932b5f7de98de9a7db1a127d5b3a13e595c556b86796de2c3857550b6f3ff3e061fc4b90d891c247b915d9c0fea85c07d9ee29cb8471decf2b81108e034

  • C:\Users\Admin\AppData\Roaming\clbcwcfg\dsroXP32.exe
    Filesize

    430KB

    MD5

    8730820fabb55d15f327b8bca8ade887

    SHA1

    e20c2ec38086bfd9760925f055e13d286bdd0aa3

    SHA256

    2952a6ad1ba0a56ea176672f3ec9b1ad8a92836839dc51f592eb253db60c96af

    SHA512

    dbe64932b5f7de98de9a7db1a127d5b3a13e595c556b86796de2c3857550b6f3ff3e061fc4b90d891c247b915d9c0fea85c07d9ee29cb8471decf2b81108e034

  • \Users\Admin\AppData\Roaming\clbcwcfg\dsroXP32.exe
    Filesize

    430KB

    MD5

    8730820fabb55d15f327b8bca8ade887

    SHA1

    e20c2ec38086bfd9760925f055e13d286bdd0aa3

    SHA256

    2952a6ad1ba0a56ea176672f3ec9b1ad8a92836839dc51f592eb253db60c96af

    SHA512

    dbe64932b5f7de98de9a7db1a127d5b3a13e595c556b86796de2c3857550b6f3ff3e061fc4b90d891c247b915d9c0fea85c07d9ee29cb8471decf2b81108e034

  • \Users\Admin\AppData\Roaming\clbcwcfg\dsroXP32.exe
    Filesize

    430KB

    MD5

    8730820fabb55d15f327b8bca8ade887

    SHA1

    e20c2ec38086bfd9760925f055e13d286bdd0aa3

    SHA256

    2952a6ad1ba0a56ea176672f3ec9b1ad8a92836839dc51f592eb253db60c96af

    SHA512

    dbe64932b5f7de98de9a7db1a127d5b3a13e595c556b86796de2c3857550b6f3ff3e061fc4b90d891c247b915d9c0fea85c07d9ee29cb8471decf2b81108e034

  • memory/1412-74-0x0000000003F70000-0x0000000004063000-memory.dmp
    Filesize

    972KB

  • memory/1504-59-0x0000000000480000-0x00000000004E0000-memory.dmp
    Filesize

    384KB

  • memory/1504-54-0x0000000075ED1000-0x0000000075ED3000-memory.dmp
    Filesize

    8KB

  • memory/1504-55-0x0000000000400000-0x0000000000473000-memory.dmp
    Filesize

    460KB

  • memory/1724-61-0x0000000000000000-mapping.dmp
  • memory/1904-58-0x0000000000000000-mapping.dmp
  • memory/1976-71-0x0000000000000000-mapping.dmp
  • memory/1976-72-0x0000000000420000-0x0000000000513000-memory.dmp
    Filesize

    972KB

  • memory/1976-73-0x0000000000420000-0x0000000000513000-memory.dmp
    Filesize

    972KB

  • memory/1992-65-0x0000000000000000-mapping.dmp