Analysis

  • max time kernel
    151s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-10-2022 02:55

General

  • Target

    d85a9488a8042b3dd5fef96447ad97ce13be651ff44e61ef169983262c3fcf73.exe

  • Size

    359KB

  • MD5

    a5d00f4f2dc2a70f41f9078e954fa3f7

  • SHA1

    66c366e18ad670127108367df79398f524de28c3

  • SHA256

    d85a9488a8042b3dd5fef96447ad97ce13be651ff44e61ef169983262c3fcf73

  • SHA512

    62d0d67923bd1d3ee55377a5c97beae3bc89a22abba1497710261a60514e104c657b4635286c320e6510416ba678a2bd8aa62c97095c3807ed28935bdf6be8ee

  • SSDEEP

    6144:WiYJpJ1cY/d6fV7QTBpbbFzYyIHuoEUOckLiVfxbW3y2BNmm8:uJr9l65QTbbb93GuoExHLiVfeNx

Malware Config

Extracted

Family

gozi

Signatures

  • Gozi

    Gozi is a well-known and widely distributed banking trojan.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d85a9488a8042b3dd5fef96447ad97ce13be651ff44e61ef169983262c3fcf73.exe
    "C:\Users\Admin\AppData\Local\Temp\d85a9488a8042b3dd5fef96447ad97ce13be651ff44e61ef169983262c3fcf73.exe"
    1⤵
    • Adds Run key to start application
    PID:4716

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4716-132-0x0000000000400000-0x000000000045E000-memory.dmp
    Filesize

    376KB

  • memory/4716-133-0x0000000000400000-0x000000000045E000-memory.dmp
    Filesize

    376KB