Analysis
-
max time kernel
146s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
27-10-2022 16:06
Static task
static1
Behavioral task
behavioral1
Sample
d38f6f01bb926df07d34de0649f608f6.dll
Resource
win7-20220812-en
General
-
Target
d38f6f01bb926df07d34de0649f608f6.dll
-
Size
297KB
-
MD5
d38f6f01bb926df07d34de0649f608f6
-
SHA1
8a3bd09ea156ede59f527af01412e66181b6d74c
-
SHA256
b59430d733e346aef69dc5992cee0f06d8dbfca7744d212159528c89d1008953
-
SHA512
73c575e5aa7963ca3d3c8cd2b08c83178030ed3248c215ec766628fad02ece83bb76bf3da613f4591485bf7610e9422eefa3ddbbb53885021338976087395903
-
SSDEEP
3072:nt83jOM22CvPJZ7cV0DrIKFXx3LKnyeLt/yX0mUGLN4eS2HH9sQ0yMLDPt+d80Ub:MjQJNcV1YpLKjpyNUGB4SO0JmNx
Malware Config
Extracted
gozi
202206061
https://astope.xyz
https://giantos.xyz
-
host_keep_time
2
-
host_shift_time
1
-
idle_time
1
-
request_time
10
Signatures
-
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
regsvr32.exedescription pid process target process PID 948 wrote to memory of 1724 948 regsvr32.exe cmd.exe PID 948 wrote to memory of 1724 948 regsvr32.exe cmd.exe PID 948 wrote to memory of 1724 948 regsvr32.exe cmd.exe PID 948 wrote to memory of 936 948 regsvr32.exe cmd.exe PID 948 wrote to memory of 936 948 regsvr32.exe cmd.exe PID 948 wrote to memory of 936 948 regsvr32.exe cmd.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\d38f6f01bb926df07d34de0649f608f6.dll1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.execmd /c "echo Commands" >> C:\Users\Admin\AppData\Local\Temp\F6EC.tmp2⤵
-
C:\Windows\system32\cmd.execmd /c "dir" >> C:\Users\Admin\AppData\Local\Temp\F6EC.tmp2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\F6EC.tmpFilesize
173B
MD57ad260ddcdbf20196c0d42eb15c24500
SHA11a9b0ea14d30401e6d5e870f5aa838aa32fd466d
SHA2562ba6fe42b4ec7fbcb1d2b028580233e2ea9820b38ae3909d4720d9133b1c87da
SHA51278c3a24fc7716cc88400877415a6d4c734a3e94e33ca8178542f3cd077b4e8d3ef470c25ba751760d2015d49789fbca697f19710a6a53674b2732ad19d86944f
-
C:\Users\Admin\AppData\Local\Temp\F6EC.tmpFilesize
3KB
MD5e42f6292dd6673eebe244d550866653c
SHA135d4c79db8dab5521a24bafc1157f2d5536f7eb0
SHA2563ac30ae9283eda4cb47e85cdf1f6c67961b49496530b9146c053215c33dc5bf5
SHA5121bb0f890d6d3c532924a1621d1a9bb71b56c4eda53fea093187841f9dd80e6e96e6504aaa281fa351de2b7aa7b8220587ae91653544003e89bc10c1f6b2f88ae
-
memory/936-61-0x0000000000000000-mapping.dmp
-
memory/948-54-0x000007FEFB6D1000-0x000007FEFB6D3000-memory.dmpFilesize
8KB
-
memory/948-55-0x0000000180000000-0x0000000180012000-memory.dmpFilesize
72KB
-
memory/1724-60-0x0000000000000000-mapping.dmp