Analysis

  • max time kernel
    599s
  • max time network
    499s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-10-2022 00:02

General

  • Target

    2952a6ad1ba0a56ea176672f3ec9b1ad8a92836839dc51f592eb253db60c96af.exe

  • Size

    430KB

  • MD5

    8730820fabb55d15f327b8bca8ade887

  • SHA1

    e20c2ec38086bfd9760925f055e13d286bdd0aa3

  • SHA256

    2952a6ad1ba0a56ea176672f3ec9b1ad8a92836839dc51f592eb253db60c96af

  • SHA512

    dbe64932b5f7de98de9a7db1a127d5b3a13e595c556b86796de2c3857550b6f3ff3e061fc4b90d891c247b915d9c0fea85c07d9ee29cb8471decf2b81108e034

  • SSDEEP

    12288:/4SwXkbqJNiIeJY4kLm7lszLu0j4/VR7VXQfj:gSZ+TiIeJCLm7z4qVR7V

Malware Config

Extracted

Family

gozi_ifsb

Botnet

10008

C2

jscallowallowallowjcli.me

disallowjscuserallow.pw

Attributes
  • build

    215801

  • dga_base_url

    z1.zedo.com/robots.txt

  • dga_crc

    0x246640bb

  • exe_type

    worker

  • server_id

    12

rsa_pubkey.plain
serpent.plain

Signatures

  • Gozi, Gozi IFSB

    Gozi ISFB is a well-known and widely distributed banking trojan.

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 29 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2484
    • C:\Users\Admin\AppData\Local\Temp\2952a6ad1ba0a56ea176672f3ec9b1ad8a92836839dc51f592eb253db60c96af.exe
      "C:\Users\Admin\AppData\Local\Temp\2952a6ad1ba0a56ea176672f3ec9b1ad8a92836839dc51f592eb253db60c96af.exe"
      2⤵
      • Checks computer location settings
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2120
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1080\8840.bat" "C:\Users\Admin\AppData\Roaming\baseeMas\Appxplua.exe" "C:\Users\Admin\AppData\Local\Temp\2952A6~1.EXE""
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4884
        • C:\Windows\SysWOW64\cmd.exe
          cmd /C ""C:\Users\Admin\AppData\Roaming\baseeMas\Appxplua.exe" "C:\Users\Admin\AppData\Local\Temp\2952A6~1.EXE""
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4924
          • C:\Users\Admin\AppData\Roaming\baseeMas\Appxplua.exe
            "C:\Users\Admin\AppData\Roaming\baseeMas\Appxplua.exe" "C:\Users\Admin\AppData\Local\Temp\2952A6~1.EXE"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of WriteProcessMemory
            PID:4800
            • C:\Windows\system32\svchost.exe
              C:\Windows\system32\svchost.exe
              6⤵
              • Suspicious use of SetThreadContext
              • Suspicious behavior: MapViewOfSection
              • Suspicious use of WriteProcessMemory
              PID:4828
  • C:\Windows\System32\RuntimeBroker.exe
    C:\Windows\System32\RuntimeBroker.exe -Embedding
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:3424
  • C:\Windows\System32\RuntimeBroker.exe
    C:\Windows\System32\RuntimeBroker.exe -Embedding
    1⤵
      PID:4648
    • C:\Windows\System32\RuntimeBroker.exe
      C:\Windows\System32\RuntimeBroker.exe -Embedding
      1⤵
        PID:3696
      • C:\Windows\System32\RuntimeBroker.exe
        C:\Windows\System32\RuntimeBroker.exe -Embedding
        1⤵
          PID:4764

        Network

        MITRE ATT&CK Matrix ATT&CK v6

        Persistence

        Registry Run Keys / Startup Folder

        1
        T1060

        Defense Evasion

        Modify Registry

        1
        T1112

        Discovery

        Query Registry

        1
        T1012

        System Information Discovery

        2
        T1082

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\1080\8840.bat
          Filesize

          112B

          MD5

          fe00238ad7cf704b054bcb613210a365

          SHA1

          1c27155e2b1ac28c5e2075aaa4d141bd97a286bf

          SHA256

          d94f3951224822cb7ff476a18259fae27dbba0ae99060465ad18e2b4580fca82

          SHA512

          10efd96c287386b952741500175b9495b213f08546f46f204228ab50e94e57ccd5cef305038ba497ce18773d245dcb5eca732ec8c10eb8aa5c86924b3bda507a

        • C:\Users\Admin\AppData\Roaming\baseeMas\Appxplua.exe
          Filesize

          430KB

          MD5

          8730820fabb55d15f327b8bca8ade887

          SHA1

          e20c2ec38086bfd9760925f055e13d286bdd0aa3

          SHA256

          2952a6ad1ba0a56ea176672f3ec9b1ad8a92836839dc51f592eb253db60c96af

          SHA512

          dbe64932b5f7de98de9a7db1a127d5b3a13e595c556b86796de2c3857550b6f3ff3e061fc4b90d891c247b915d9c0fea85c07d9ee29cb8471decf2b81108e034

        • C:\Users\Admin\AppData\Roaming\baseeMas\Appxplua.exe
          Filesize

          430KB

          MD5

          8730820fabb55d15f327b8bca8ade887

          SHA1

          e20c2ec38086bfd9760925f055e13d286bdd0aa3

          SHA256

          2952a6ad1ba0a56ea176672f3ec9b1ad8a92836839dc51f592eb253db60c96af

          SHA512

          dbe64932b5f7de98de9a7db1a127d5b3a13e595c556b86796de2c3857550b6f3ff3e061fc4b90d891c247b915d9c0fea85c07d9ee29cb8471decf2b81108e034

        • memory/2120-135-0x0000000000950000-0x00000000009B0000-memory.dmp
          Filesize

          384KB

        • memory/2120-132-0x0000000000400000-0x0000000000473000-memory.dmp
          Filesize

          460KB

        • memory/2484-153-0x0000000008230000-0x0000000008323000-memory.dmp
          Filesize

          972KB

        • memory/2484-148-0x0000000008230000-0x0000000008323000-memory.dmp
          Filesize

          972KB

        • memory/3424-149-0x0000020213A40000-0x0000020213B33000-memory.dmp
          Filesize

          972KB

        • memory/3696-150-0x00000119D5D20000-0x00000119D5E13000-memory.dmp
          Filesize

          972KB

        • memory/4648-151-0x000001658B960000-0x000001658BA53000-memory.dmp
          Filesize

          972KB

        • memory/4764-152-0x0000020193000000-0x00000201930F3000-memory.dmp
          Filesize

          972KB

        • memory/4800-139-0x0000000000000000-mapping.dmp
        • memory/4800-146-0x0000000000820000-0x0000000000880000-memory.dmp
          Filesize

          384KB

        • memory/4828-145-0x0000000000000000-mapping.dmp
        • memory/4828-147-0x0000000000290000-0x0000000000383000-memory.dmp
          Filesize

          972KB

        • memory/4884-136-0x0000000000000000-mapping.dmp
        • memory/4924-138-0x0000000000000000-mapping.dmp