Analysis
-
max time kernel
142s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
07-11-2022 16:10
Static task
static1
Behavioral task
behavioral1
Sample
b3b8433b8322d3884a24aa66d423bb386bd2d26edc86f09f5409a7a30b52bcfb.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b3b8433b8322d3884a24aa66d423bb386bd2d26edc86f09f5409a7a30b52bcfb.exe
Resource
win10v2004-20220812-en
General
-
Target
b3b8433b8322d3884a24aa66d423bb386bd2d26edc86f09f5409a7a30b52bcfb.exe
-
Size
296KB
-
MD5
0f4a3710b28ebbf430bc765f9b9e9740
-
SHA1
362460f5f63c8cf844dc089454f72cb974046c07
-
SHA256
b3b8433b8322d3884a24aa66d423bb386bd2d26edc86f09f5409a7a30b52bcfb
-
SHA512
fdfa471259ecb69f64b749b485e9cb9d2be2227113117dc19facce9daba4f86f19dbe34fa36379e89ecc0ddaf42aaa69a275c15d78b50b6a80777001e4b4839c
-
SSDEEP
6144:BSu1zvPvYDyLpj5weLCVrk0WRm/wpnN5Oie6xjMPt9eZiC3:gu1znL8k0WdNre6h+t9k
Malware Config
Extracted
gozi
Extracted
gozi
1099
fkklqkjgnr.com
sinpotikos.com
bnkalirmf.com
-
exe_type
worker
-
server_id
12
Signatures
-
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Deletes itself 1 IoCs
pid Process 1504 cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\dhcpprop = "C:\\Windows\\system32\\Audiwcfg.exe" b3b8433b8322d3884a24aa66d423bb386bd2d26edc86f09f5409a7a30b52bcfb.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system32\Audiwcfg.exe b3b8433b8322d3884a24aa66d423bb386bd2d26edc86f09f5409a7a30b52bcfb.exe File created C:\Windows\system32\Audiwcfg.exe b3b8433b8322d3884a24aa66d423bb386bd2d26edc86f09f5409a7a30b52bcfb.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 740 set thread context of 1924 740 b3b8433b8322d3884a24aa66d423bb386bd2d26edc86f09f5409a7a30b52bcfb.exe 27 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 5 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 740 b3b8433b8322d3884a24aa66d423bb386bd2d26edc86f09f5409a7a30b52bcfb.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1924 explorer.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 740 b3b8433b8322d3884a24aa66d423bb386bd2d26edc86f09f5409a7a30b52bcfb.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeShutdownPrivilege 1924 explorer.exe Token: SeShutdownPrivilege 1924 explorer.exe Token: SeShutdownPrivilege 1924 explorer.exe Token: SeShutdownPrivilege 1924 explorer.exe Token: SeShutdownPrivilege 1924 explorer.exe Token: SeShutdownPrivilege 1924 explorer.exe Token: SeShutdownPrivilege 1924 explorer.exe Token: SeShutdownPrivilege 1924 explorer.exe Token: SeShutdownPrivilege 1924 explorer.exe Token: SeShutdownPrivilege 1924 explorer.exe Token: SeShutdownPrivilege 1924 explorer.exe Token: SeShutdownPrivilege 1924 explorer.exe -
Suspicious use of FindShellTrayWindow 30 IoCs
pid Process 1924 explorer.exe 1924 explorer.exe 1924 explorer.exe 1924 explorer.exe 1924 explorer.exe 1924 explorer.exe 1924 explorer.exe 1924 explorer.exe 1924 explorer.exe 1924 explorer.exe 1924 explorer.exe 1924 explorer.exe 1924 explorer.exe 1924 explorer.exe 1924 explorer.exe 1924 explorer.exe 1924 explorer.exe 1924 explorer.exe 1924 explorer.exe 1924 explorer.exe 1924 explorer.exe 1924 explorer.exe 1924 explorer.exe 1924 explorer.exe 1924 explorer.exe 1924 explorer.exe 1924 explorer.exe 1924 explorer.exe 1924 explorer.exe 1924 explorer.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1924 explorer.exe 1924 explorer.exe 1924 explorer.exe 1924 explorer.exe 1924 explorer.exe 1924 explorer.exe 1924 explorer.exe 1924 explorer.exe 1924 explorer.exe 1924 explorer.exe 1924 explorer.exe 1924 explorer.exe 1924 explorer.exe 1924 explorer.exe 1924 explorer.exe 1924 explorer.exe 1924 explorer.exe 1924 explorer.exe 1924 explorer.exe 1924 explorer.exe 1924 explorer.exe 1924 explorer.exe 1924 explorer.exe 1924 explorer.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 740 wrote to memory of 1924 740 b3b8433b8322d3884a24aa66d423bb386bd2d26edc86f09f5409a7a30b52bcfb.exe 27 PID 740 wrote to memory of 1924 740 b3b8433b8322d3884a24aa66d423bb386bd2d26edc86f09f5409a7a30b52bcfb.exe 27 PID 740 wrote to memory of 1924 740 b3b8433b8322d3884a24aa66d423bb386bd2d26edc86f09f5409a7a30b52bcfb.exe 27 PID 740 wrote to memory of 1924 740 b3b8433b8322d3884a24aa66d423bb386bd2d26edc86f09f5409a7a30b52bcfb.exe 27 PID 740 wrote to memory of 1924 740 b3b8433b8322d3884a24aa66d423bb386bd2d26edc86f09f5409a7a30b52bcfb.exe 27 PID 740 wrote to memory of 1924 740 b3b8433b8322d3884a24aa66d423bb386bd2d26edc86f09f5409a7a30b52bcfb.exe 27 PID 740 wrote to memory of 1924 740 b3b8433b8322d3884a24aa66d423bb386bd2d26edc86f09f5409a7a30b52bcfb.exe 27 PID 740 wrote to memory of 1504 740 b3b8433b8322d3884a24aa66d423bb386bd2d26edc86f09f5409a7a30b52bcfb.exe 28 PID 740 wrote to memory of 1504 740 b3b8433b8322d3884a24aa66d423bb386bd2d26edc86f09f5409a7a30b52bcfb.exe 28 PID 740 wrote to memory of 1504 740 b3b8433b8322d3884a24aa66d423bb386bd2d26edc86f09f5409a7a30b52bcfb.exe 28 PID 740 wrote to memory of 1504 740 b3b8433b8322d3884a24aa66d423bb386bd2d26edc86f09f5409a7a30b52bcfb.exe 28 PID 1504 wrote to memory of 1768 1504 cmd.exe 30 PID 1504 wrote to memory of 1768 1504 cmd.exe 30 PID 1504 wrote to memory of 1768 1504 cmd.exe 30 PID 1504 wrote to memory of 1768 1504 cmd.exe 30 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 1768 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b3b8433b8322d3884a24aa66d423bb386bd2d26edc86f09f5409a7a30b52bcfb.exe"C:\Users\Admin\AppData\Local\Temp\b3b8433b8322d3884a24aa66d423bb386bd2d26edc86f09f5409a7a30b52bcfb.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:740 -
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1924
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\381F.bat" "C:\Users\Admin\AppData\Local\Temp\B3B843~1.EXE""2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Windows\SysWOW64\attrib.exeattrib -r -s -h "C:\Users\Admin\AppData\Local\Temp\B3B843~1.EXE"3⤵
- Views/modifies file attributes
PID:1768
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72B
MD506cb28d678c5f24c16e1c9cb1e92b337
SHA1399ecc84dd035983c41a65a9106f9f87b080d314
SHA256820846ce52b38cf76a480a649224f6b3f35b50845273035f8de7ce793554d8cf
SHA512da137bf0d242e64a74ca0954fbec0addf57febfa3970a0826e3c1362a1f9338decadc6048d101c3226872265cc60a318ae1e95d01b3f3e0f41235dea04496126