Analysis

  • max time kernel
    494s
  • max time network
    484s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    27-10-2022 00:07

General

  • Target

    3953faf955eede8c2220a501a0bc58be7fe58898ecb66a44d4373d2259dc69ff.exe

  • Size

    503KB

  • MD5

    60238ebad1c44bf159c2eba25f3c4ca6

  • SHA1

    8ee071c4e55bbc7ac2fcfa1779307b2e19f1e9d0

  • SHA256

    3953faf955eede8c2220a501a0bc58be7fe58898ecb66a44d4373d2259dc69ff

  • SHA512

    f209749ed5d7e6a189fcd4efc31b4eb2a462d6d7654b23101d0e2aad73a6d812cdf5a38840eb2a0309061b066d4a853f1e649f6ba35db0dac09e42d650302945

  • SSDEEP

    12288:mqE2NJWh/VScyFi9VJqgqrSyXNTTkiYfwtfYNh:k00dUi9SgLwdYfwt

Malware Config

Extracted

Family

gozi_ifsb

Botnet

3000

C2

romaya.ru

matashka.ru

matashka399.ru

Attributes
  • build

    200000

  • exe_type

    worker

  • server_id

    12

rsa_pubkey.plain
serpent.plain

Signatures

  • Gozi, Gozi IFSB

    Gozi ISFB is a well-known and widely distributed banking trojan.

  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:1216
    • C:\Users\Admin\AppData\Local\Temp\3953faf955eede8c2220a501a0bc58be7fe58898ecb66a44d4373d2259dc69ff.exe
      "C:\Users\Admin\AppData\Local\Temp\3953faf955eede8c2220a501a0bc58be7fe58898ecb66a44d4373d2259dc69ff.exe"
      2⤵
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1848
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\2C4C\2B82.bat" "C:\Users\Admin\AppData\Roaming\clbcwcfg\dsroXP32.exe" "C:\Users\Admin\AppData\Local\Temp\3953FA~1.EXE""
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1212
        • C:\Windows\SysWOW64\cmd.exe
          cmd /C ""C:\Users\Admin\AppData\Roaming\clbcwcfg\dsroXP32.exe" "C:\Users\Admin\AppData\Local\Temp\3953FA~1.EXE""
          4⤵
            PID:1708
          • C:\Windows\SysWOW64\cmd.exe
            cmd /C ""C:\Users\Admin\AppData\Roaming\clbcwcfg\dsroXP32.exe" "C:\Users\Admin\AppData\Local\Temp\3953FA~1.EXE""
            4⤵
              PID:860
            • C:\Windows\SysWOW64\cmd.exe
              cmd /C ""C:\Users\Admin\AppData\Roaming\clbcwcfg\dsroXP32.exe" "C:\Users\Admin\AppData\Local\Temp\3953FA~1.EXE""
              4⤵
                PID:1324
              • C:\Windows\SysWOW64\cmd.exe
                cmd /C ""C:\Users\Admin\AppData\Roaming\clbcwcfg\dsroXP32.exe" "C:\Users\Admin\AppData\Local\Temp\3953FA~1.EXE""
                4⤵
                  PID:1720
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /C ""C:\Users\Admin\AppData\Roaming\clbcwcfg\dsroXP32.exe" "C:\Users\Admin\AppData\Local\Temp\3953FA~1.EXE""
                  4⤵
                    PID:1272
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd /C ""C:\Users\Admin\AppData\Roaming\clbcwcfg\dsroXP32.exe" "C:\Users\Admin\AppData\Local\Temp\3953FA~1.EXE""
                    4⤵
                      PID:1208
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd /C ""C:\Users\Admin\AppData\Roaming\clbcwcfg\dsroXP32.exe" "C:\Users\Admin\AppData\Local\Temp\3953FA~1.EXE""
                      4⤵
                        PID:2000
                      • C:\Windows\SysWOW64\cmd.exe
                        cmd /C ""C:\Users\Admin\AppData\Roaming\clbcwcfg\dsroXP32.exe" "C:\Users\Admin\AppData\Local\Temp\3953FA~1.EXE""
                        4⤵
                          PID:1008
                        • C:\Windows\SysWOW64\cmd.exe
                          cmd /C ""C:\Users\Admin\AppData\Roaming\clbcwcfg\dsroXP32.exe" "C:\Users\Admin\AppData\Local\Temp\3953FA~1.EXE""
                          4⤵
                            PID:528
                          • C:\Windows\SysWOW64\cmd.exe
                            cmd /C ""C:\Users\Admin\AppData\Roaming\clbcwcfg\dsroXP32.exe" "C:\Users\Admin\AppData\Local\Temp\3953FA~1.EXE""
                            4⤵
                              PID:1068
                            • C:\Windows\SysWOW64\cmd.exe
                              cmd /C ""C:\Users\Admin\AppData\Roaming\clbcwcfg\dsroXP32.exe" "C:\Users\Admin\AppData\Local\Temp\3953FA~1.EXE""
                              4⤵
                                PID:592
                              • C:\Windows\SysWOW64\cmd.exe
                                cmd /C ""C:\Users\Admin\AppData\Roaming\clbcwcfg\dsroXP32.exe" "C:\Users\Admin\AppData\Local\Temp\3953FA~1.EXE""
                                4⤵
                                  PID:1440
                                • C:\Windows\SysWOW64\cmd.exe
                                  cmd /C ""C:\Users\Admin\AppData\Roaming\clbcwcfg\dsroXP32.exe" "C:\Users\Admin\AppData\Local\Temp\3953FA~1.EXE""
                                  4⤵
                                    PID:268
                                  • C:\Windows\SysWOW64\cmd.exe
                                    cmd /C ""C:\Users\Admin\AppData\Roaming\clbcwcfg\dsroXP32.exe" "C:\Users\Admin\AppData\Local\Temp\3953FA~1.EXE""
                                    4⤵
                                      PID:1704
                                    • C:\Windows\SysWOW64\cmd.exe
                                      cmd /C ""C:\Users\Admin\AppData\Roaming\clbcwcfg\dsroXP32.exe" "C:\Users\Admin\AppData\Local\Temp\3953FA~1.EXE""
                                      4⤵
                                        PID:436
                                      • C:\Windows\SysWOW64\cmd.exe
                                        cmd /C ""C:\Users\Admin\AppData\Roaming\clbcwcfg\dsroXP32.exe" "C:\Users\Admin\AppData\Local\Temp\3953FA~1.EXE""
                                        4⤵
                                        • Loads dropped DLL
                                        PID:1152
                                        • C:\Users\Admin\AppData\Roaming\clbcwcfg\dsroXP32.exe
                                          "C:\Users\Admin\AppData\Roaming\clbcwcfg\dsroXP32.exe" "C:\Users\Admin\AppData\Local\Temp\3953FA~1.EXE"
                                          5⤵
                                          • Executes dropped EXE
                                          • Deletes itself
                                          • Suspicious use of SetThreadContext
                                          • Suspicious behavior: EnumeratesProcesses
                                          • Suspicious behavior: MapViewOfSection
                                          PID:1640
                                          • C:\Windows\system32\svchost.exe
                                            C:\Windows\system32\svchost.exe
                                            6⤵
                                            • Suspicious use of SetThreadContext
                                            • Suspicious behavior: MapViewOfSection
                                            PID:1836

                                Network

                                MITRE ATT&CK Enterprise v6

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\Users\Admin\AppData\Local\Temp\2C4C\2B82.bat

                                  Filesize

                                  108B

                                  MD5

                                  500c598307ecd274946de27158acadcb

                                  SHA1

                                  40bdb1ae964c5ae7ea89aba1be0fe603eb28e002

                                  SHA256

                                  0beabe013a70cedc0f249a6240189289e9d400c8ddffa2db25acaa9e49235f27

                                  SHA512

                                  c0e44b8dab958dd4359f3c104cdb3902a88d6e3b8507618f86c6fec5e99452fb13e355edfa6a6b156defe0d42ebf49b106e668582c316bff6348b9b553993a65

                                • C:\Users\Admin\AppData\Roaming\clbcwcfg\dsroXP32.exe

                                  Filesize

                                  503KB

                                  MD5

                                  60238ebad1c44bf159c2eba25f3c4ca6

                                  SHA1

                                  8ee071c4e55bbc7ac2fcfa1779307b2e19f1e9d0

                                  SHA256

                                  3953faf955eede8c2220a501a0bc58be7fe58898ecb66a44d4373d2259dc69ff

                                  SHA512

                                  f209749ed5d7e6a189fcd4efc31b4eb2a462d6d7654b23101d0e2aad73a6d812cdf5a38840eb2a0309061b066d4a853f1e649f6ba35db0dac09e42d650302945

                                • C:\Users\Admin\AppData\Roaming\clbcwcfg\dsroXP32.exe

                                  Filesize

                                  503KB

                                  MD5

                                  60238ebad1c44bf159c2eba25f3c4ca6

                                  SHA1

                                  8ee071c4e55bbc7ac2fcfa1779307b2e19f1e9d0

                                  SHA256

                                  3953faf955eede8c2220a501a0bc58be7fe58898ecb66a44d4373d2259dc69ff

                                  SHA512

                                  f209749ed5d7e6a189fcd4efc31b4eb2a462d6d7654b23101d0e2aad73a6d812cdf5a38840eb2a0309061b066d4a853f1e649f6ba35db0dac09e42d650302945

                                • \Users\Admin\AppData\Roaming\clbcwcfg\dsroXP32.exe

                                  Filesize

                                  503KB

                                  MD5

                                  60238ebad1c44bf159c2eba25f3c4ca6

                                  SHA1

                                  8ee071c4e55bbc7ac2fcfa1779307b2e19f1e9d0

                                  SHA256

                                  3953faf955eede8c2220a501a0bc58be7fe58898ecb66a44d4373d2259dc69ff

                                  SHA512

                                  f209749ed5d7e6a189fcd4efc31b4eb2a462d6d7654b23101d0e2aad73a6d812cdf5a38840eb2a0309061b066d4a853f1e649f6ba35db0dac09e42d650302945

                                • memory/1216-90-0x0000000003FE0000-0x0000000004070000-memory.dmp

                                  Filesize

                                  576KB

                                • memory/1216-89-0x0000000003FE0000-0x0000000004070000-memory.dmp

                                  Filesize

                                  576KB

                                • memory/1640-82-0x00000000029F0000-0x000000000339E000-memory.dmp

                                  Filesize

                                  9.7MB

                                • memory/1640-86-0x00000000029F0000-0x000000000339E000-memory.dmp

                                  Filesize

                                  9.7MB

                                • memory/1640-83-0x0000000000400000-0x0000000000484000-memory.dmp

                                  Filesize

                                  528KB

                                • memory/1836-88-0x0000000000410000-0x00000000004A0000-memory.dmp

                                  Filesize

                                  576KB

                                • memory/1836-87-0x0000000000410000-0x00000000004A0000-memory.dmp

                                  Filesize

                                  576KB

                                • memory/1848-75-0x0000000002980000-0x000000000332E000-memory.dmp

                                  Filesize

                                  9.7MB

                                • memory/1848-54-0x0000000076091000-0x0000000076093000-memory.dmp

                                  Filesize

                                  8KB

                                • memory/1848-56-0x0000000000400000-0x0000000000484000-memory.dmp

                                  Filesize

                                  528KB

                                • memory/1848-55-0x0000000002980000-0x000000000332E000-memory.dmp

                                  Filesize

                                  9.7MB