Analysis
-
max time kernel
494s -
max time network
484s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
27-10-2022 00:07
Static task
static1
Behavioral task
behavioral1
Sample
3953faf955eede8c2220a501a0bc58be7fe58898ecb66a44d4373d2259dc69ff.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3953faf955eede8c2220a501a0bc58be7fe58898ecb66a44d4373d2259dc69ff.exe
Resource
win10v2004-20220901-en
General
-
Target
3953faf955eede8c2220a501a0bc58be7fe58898ecb66a44d4373d2259dc69ff.exe
-
Size
503KB
-
MD5
60238ebad1c44bf159c2eba25f3c4ca6
-
SHA1
8ee071c4e55bbc7ac2fcfa1779307b2e19f1e9d0
-
SHA256
3953faf955eede8c2220a501a0bc58be7fe58898ecb66a44d4373d2259dc69ff
-
SHA512
f209749ed5d7e6a189fcd4efc31b4eb2a462d6d7654b23101d0e2aad73a6d812cdf5a38840eb2a0309061b066d4a853f1e649f6ba35db0dac09e42d650302945
-
SSDEEP
12288:mqE2NJWh/VScyFi9VJqgqrSyXNTTkiYfwtfYNh:k00dUi9SgLwdYfwt
Malware Config
Extracted
gozi_ifsb
3000
romaya.ru
matashka.ru
matashka399.ru
-
build
200000
-
exe_type
worker
-
server_id
12
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
dsroXP32.exepid process 1640 dsroXP32.exe -
Deletes itself 1 IoCs
Processes:
dsroXP32.exepid process 1640 dsroXP32.exe -
Loads dropped DLL 1 IoCs
Processes:
cmd.exepid process 1152 cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
3953faf955eede8c2220a501a0bc58be7fe58898ecb66a44d4373d2259dc69ff.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\dmvdXT32 = "C:\\Users\\Admin\\AppData\\Roaming\\clbcwcfg\\dsroXP32.exe" 3953faf955eede8c2220a501a0bc58be7fe58898ecb66a44d4373d2259dc69ff.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
dsroXP32.exesvchost.exedescription pid process target process PID 1640 set thread context of 1836 1640 dsroXP32.exe svchost.exe PID 1836 set thread context of 1216 1836 svchost.exe Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
dsroXP32.exepid process 1640 dsroXP32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 1216 Explorer.EXE -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
dsroXP32.exesvchost.exepid process 1640 dsroXP32.exe 1836 svchost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Explorer.EXEdescription pid process Token: SeShutdownPrivilege 1216 Explorer.EXE Token: SeShutdownPrivilege 1216 Explorer.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
Explorer.EXEpid process 1216 Explorer.EXE 1216 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
Explorer.EXEpid process 1216 Explorer.EXE 1216 Explorer.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Explorer.EXEpid process 1216 Explorer.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
3953faf955eede8c2220a501a0bc58be7fe58898ecb66a44d4373d2259dc69ff.execmd.exedescription pid process target process PID 1848 wrote to memory of 1212 1848 3953faf955eede8c2220a501a0bc58be7fe58898ecb66a44d4373d2259dc69ff.exe cmd.exe PID 1848 wrote to memory of 1212 1848 3953faf955eede8c2220a501a0bc58be7fe58898ecb66a44d4373d2259dc69ff.exe cmd.exe PID 1848 wrote to memory of 1212 1848 3953faf955eede8c2220a501a0bc58be7fe58898ecb66a44d4373d2259dc69ff.exe cmd.exe PID 1848 wrote to memory of 1212 1848 3953faf955eede8c2220a501a0bc58be7fe58898ecb66a44d4373d2259dc69ff.exe cmd.exe PID 1212 wrote to memory of 1708 1212 cmd.exe cmd.exe PID 1212 wrote to memory of 1708 1212 cmd.exe cmd.exe PID 1212 wrote to memory of 1708 1212 cmd.exe cmd.exe PID 1212 wrote to memory of 1708 1212 cmd.exe cmd.exe PID 1212 wrote to memory of 860 1212 cmd.exe cmd.exe PID 1212 wrote to memory of 860 1212 cmd.exe cmd.exe PID 1212 wrote to memory of 860 1212 cmd.exe cmd.exe PID 1212 wrote to memory of 860 1212 cmd.exe cmd.exe PID 1212 wrote to memory of 1324 1212 cmd.exe cmd.exe PID 1212 wrote to memory of 1324 1212 cmd.exe cmd.exe PID 1212 wrote to memory of 1324 1212 cmd.exe cmd.exe PID 1212 wrote to memory of 1324 1212 cmd.exe cmd.exe PID 1212 wrote to memory of 1720 1212 cmd.exe cmd.exe PID 1212 wrote to memory of 1720 1212 cmd.exe cmd.exe PID 1212 wrote to memory of 1720 1212 cmd.exe cmd.exe PID 1212 wrote to memory of 1720 1212 cmd.exe cmd.exe PID 1212 wrote to memory of 1272 1212 cmd.exe cmd.exe PID 1212 wrote to memory of 1272 1212 cmd.exe cmd.exe PID 1212 wrote to memory of 1272 1212 cmd.exe cmd.exe PID 1212 wrote to memory of 1272 1212 cmd.exe cmd.exe PID 1212 wrote to memory of 1208 1212 cmd.exe cmd.exe PID 1212 wrote to memory of 1208 1212 cmd.exe cmd.exe PID 1212 wrote to memory of 1208 1212 cmd.exe cmd.exe PID 1212 wrote to memory of 1208 1212 cmd.exe cmd.exe PID 1212 wrote to memory of 2000 1212 cmd.exe cmd.exe PID 1212 wrote to memory of 2000 1212 cmd.exe cmd.exe PID 1212 wrote to memory of 2000 1212 cmd.exe cmd.exe PID 1212 wrote to memory of 2000 1212 cmd.exe cmd.exe PID 1212 wrote to memory of 1008 1212 cmd.exe cmd.exe PID 1212 wrote to memory of 1008 1212 cmd.exe cmd.exe PID 1212 wrote to memory of 1008 1212 cmd.exe cmd.exe PID 1212 wrote to memory of 1008 1212 cmd.exe cmd.exe PID 1212 wrote to memory of 528 1212 cmd.exe cmd.exe PID 1212 wrote to memory of 528 1212 cmd.exe cmd.exe PID 1212 wrote to memory of 528 1212 cmd.exe cmd.exe PID 1212 wrote to memory of 528 1212 cmd.exe cmd.exe PID 1212 wrote to memory of 1068 1212 cmd.exe cmd.exe PID 1212 wrote to memory of 1068 1212 cmd.exe cmd.exe PID 1212 wrote to memory of 1068 1212 cmd.exe cmd.exe PID 1212 wrote to memory of 1068 1212 cmd.exe cmd.exe PID 1212 wrote to memory of 592 1212 cmd.exe cmd.exe PID 1212 wrote to memory of 592 1212 cmd.exe cmd.exe PID 1212 wrote to memory of 592 1212 cmd.exe cmd.exe PID 1212 wrote to memory of 592 1212 cmd.exe cmd.exe PID 1212 wrote to memory of 1440 1212 cmd.exe cmd.exe PID 1212 wrote to memory of 1440 1212 cmd.exe cmd.exe PID 1212 wrote to memory of 1440 1212 cmd.exe cmd.exe PID 1212 wrote to memory of 1440 1212 cmd.exe cmd.exe PID 1212 wrote to memory of 268 1212 cmd.exe cmd.exe PID 1212 wrote to memory of 268 1212 cmd.exe cmd.exe PID 1212 wrote to memory of 268 1212 cmd.exe cmd.exe PID 1212 wrote to memory of 268 1212 cmd.exe cmd.exe PID 1212 wrote to memory of 1704 1212 cmd.exe cmd.exe PID 1212 wrote to memory of 1704 1212 cmd.exe cmd.exe PID 1212 wrote to memory of 1704 1212 cmd.exe cmd.exe PID 1212 wrote to memory of 1704 1212 cmd.exe cmd.exe PID 1212 wrote to memory of 436 1212 cmd.exe cmd.exe PID 1212 wrote to memory of 436 1212 cmd.exe cmd.exe PID 1212 wrote to memory of 436 1212 cmd.exe cmd.exe PID 1212 wrote to memory of 436 1212 cmd.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1216 -
C:\Users\Admin\AppData\Local\Temp\3953faf955eede8c2220a501a0bc58be7fe58898ecb66a44d4373d2259dc69ff.exe"C:\Users\Admin\AppData\Local\Temp\3953faf955eede8c2220a501a0bc58be7fe58898ecb66a44d4373d2259dc69ff.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\2C4C\2B82.bat" "C:\Users\Admin\AppData\Roaming\clbcwcfg\dsroXP32.exe" "C:\Users\Admin\AppData\Local\Temp\3953FA~1.EXE""3⤵
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Windows\SysWOW64\cmd.execmd /C ""C:\Users\Admin\AppData\Roaming\clbcwcfg\dsroXP32.exe" "C:\Users\Admin\AppData\Local\Temp\3953FA~1.EXE""4⤵PID:1708
-
-
C:\Windows\SysWOW64\cmd.execmd /C ""C:\Users\Admin\AppData\Roaming\clbcwcfg\dsroXP32.exe" "C:\Users\Admin\AppData\Local\Temp\3953FA~1.EXE""4⤵PID:860
-
-
C:\Windows\SysWOW64\cmd.execmd /C ""C:\Users\Admin\AppData\Roaming\clbcwcfg\dsroXP32.exe" "C:\Users\Admin\AppData\Local\Temp\3953FA~1.EXE""4⤵PID:1324
-
-
C:\Windows\SysWOW64\cmd.execmd /C ""C:\Users\Admin\AppData\Roaming\clbcwcfg\dsroXP32.exe" "C:\Users\Admin\AppData\Local\Temp\3953FA~1.EXE""4⤵PID:1720
-
-
C:\Windows\SysWOW64\cmd.execmd /C ""C:\Users\Admin\AppData\Roaming\clbcwcfg\dsroXP32.exe" "C:\Users\Admin\AppData\Local\Temp\3953FA~1.EXE""4⤵PID:1272
-
-
C:\Windows\SysWOW64\cmd.execmd /C ""C:\Users\Admin\AppData\Roaming\clbcwcfg\dsroXP32.exe" "C:\Users\Admin\AppData\Local\Temp\3953FA~1.EXE""4⤵PID:1208
-
-
C:\Windows\SysWOW64\cmd.execmd /C ""C:\Users\Admin\AppData\Roaming\clbcwcfg\dsroXP32.exe" "C:\Users\Admin\AppData\Local\Temp\3953FA~1.EXE""4⤵PID:2000
-
-
C:\Windows\SysWOW64\cmd.execmd /C ""C:\Users\Admin\AppData\Roaming\clbcwcfg\dsroXP32.exe" "C:\Users\Admin\AppData\Local\Temp\3953FA~1.EXE""4⤵PID:1008
-
-
C:\Windows\SysWOW64\cmd.execmd /C ""C:\Users\Admin\AppData\Roaming\clbcwcfg\dsroXP32.exe" "C:\Users\Admin\AppData\Local\Temp\3953FA~1.EXE""4⤵PID:528
-
-
C:\Windows\SysWOW64\cmd.execmd /C ""C:\Users\Admin\AppData\Roaming\clbcwcfg\dsroXP32.exe" "C:\Users\Admin\AppData\Local\Temp\3953FA~1.EXE""4⤵PID:1068
-
-
C:\Windows\SysWOW64\cmd.execmd /C ""C:\Users\Admin\AppData\Roaming\clbcwcfg\dsroXP32.exe" "C:\Users\Admin\AppData\Local\Temp\3953FA~1.EXE""4⤵PID:592
-
-
C:\Windows\SysWOW64\cmd.execmd /C ""C:\Users\Admin\AppData\Roaming\clbcwcfg\dsroXP32.exe" "C:\Users\Admin\AppData\Local\Temp\3953FA~1.EXE""4⤵PID:1440
-
-
C:\Windows\SysWOW64\cmd.execmd /C ""C:\Users\Admin\AppData\Roaming\clbcwcfg\dsroXP32.exe" "C:\Users\Admin\AppData\Local\Temp\3953FA~1.EXE""4⤵PID:268
-
-
C:\Windows\SysWOW64\cmd.execmd /C ""C:\Users\Admin\AppData\Roaming\clbcwcfg\dsroXP32.exe" "C:\Users\Admin\AppData\Local\Temp\3953FA~1.EXE""4⤵PID:1704
-
-
C:\Windows\SysWOW64\cmd.execmd /C ""C:\Users\Admin\AppData\Roaming\clbcwcfg\dsroXP32.exe" "C:\Users\Admin\AppData\Local\Temp\3953FA~1.EXE""4⤵PID:436
-
-
C:\Windows\SysWOW64\cmd.execmd /C ""C:\Users\Admin\AppData\Roaming\clbcwcfg\dsroXP32.exe" "C:\Users\Admin\AppData\Local\Temp\3953FA~1.EXE""4⤵
- Loads dropped DLL
PID:1152 -
C:\Users\Admin\AppData\Roaming\clbcwcfg\dsroXP32.exe"C:\Users\Admin\AppData\Roaming\clbcwcfg\dsroXP32.exe" "C:\Users\Admin\AppData\Local\Temp\3953FA~1.EXE"5⤵
- Executes dropped EXE
- Deletes itself
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1640 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe6⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
PID:1836
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
108B
MD5500c598307ecd274946de27158acadcb
SHA140bdb1ae964c5ae7ea89aba1be0fe603eb28e002
SHA2560beabe013a70cedc0f249a6240189289e9d400c8ddffa2db25acaa9e49235f27
SHA512c0e44b8dab958dd4359f3c104cdb3902a88d6e3b8507618f86c6fec5e99452fb13e355edfa6a6b156defe0d42ebf49b106e668582c316bff6348b9b553993a65
-
Filesize
503KB
MD560238ebad1c44bf159c2eba25f3c4ca6
SHA18ee071c4e55bbc7ac2fcfa1779307b2e19f1e9d0
SHA2563953faf955eede8c2220a501a0bc58be7fe58898ecb66a44d4373d2259dc69ff
SHA512f209749ed5d7e6a189fcd4efc31b4eb2a462d6d7654b23101d0e2aad73a6d812cdf5a38840eb2a0309061b066d4a853f1e649f6ba35db0dac09e42d650302945
-
Filesize
503KB
MD560238ebad1c44bf159c2eba25f3c4ca6
SHA18ee071c4e55bbc7ac2fcfa1779307b2e19f1e9d0
SHA2563953faf955eede8c2220a501a0bc58be7fe58898ecb66a44d4373d2259dc69ff
SHA512f209749ed5d7e6a189fcd4efc31b4eb2a462d6d7654b23101d0e2aad73a6d812cdf5a38840eb2a0309061b066d4a853f1e649f6ba35db0dac09e42d650302945
-
Filesize
503KB
MD560238ebad1c44bf159c2eba25f3c4ca6
SHA18ee071c4e55bbc7ac2fcfa1779307b2e19f1e9d0
SHA2563953faf955eede8c2220a501a0bc58be7fe58898ecb66a44d4373d2259dc69ff
SHA512f209749ed5d7e6a189fcd4efc31b4eb2a462d6d7654b23101d0e2aad73a6d812cdf5a38840eb2a0309061b066d4a853f1e649f6ba35db0dac09e42d650302945