Analysis

  • max time kernel
    140s
  • max time network
    166s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2022 22:28

General

  • Target

    8cd8efad8c6d62328a95a2be9b7bf3977ffcc066dc8f82010bdd56a6d0d6d11f.exe

  • Size

    376KB

  • MD5

    4165eb68c959487dad6ef02646aa29c3

  • SHA1

    fb3afa14170009086adb3a8e48ccdc189908a324

  • SHA256

    8cd8efad8c6d62328a95a2be9b7bf3977ffcc066dc8f82010bdd56a6d0d6d11f

  • SHA512

    24942d6a4011bbea790872e56912b1855cc9e29c03bbb706ebc4c78a46d4a9bb4fa09f57683f347a273ca4e79e69b4f6c804904f4ed93fc564a860db2b07e339

  • SSDEEP

    6144:qDf6Ygsvu1uyGSQlollY8DKc/qSUhosrLEV/V6r5:Mf6BsvmuzZGTDK2qS/yd

Malware Config

Extracted

Family

gozi

Extracted

Family

gozi

Botnet

2782923

C2

tmadecorrespondence.com

Attributes
  • exe_type

    worker

rsa_pubkey.plain
serpent.plain
rsa_pubkey.plain

Signatures

  • Gozi

    Gozi is a well-known and widely distributed banking trojan.

  • Modifies Installed Components in the registry 2 TTPs 1 IoCs
  • Deletes itself 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 18 IoCs
  • Suspicious use of FindShellTrayWindow 27 IoCs
  • Suspicious use of SendNotifyMessage 23 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8cd8efad8c6d62328a95a2be9b7bf3977ffcc066dc8f82010bdd56a6d0d6d11f.exe
    "C:\Users\Admin\AppData\Local\Temp\8cd8efad8c6d62328a95a2be9b7bf3977ffcc066dc8f82010bdd56a6d0d6d11f.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Sets desktop wallpaper using registry
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:960
    • C:\Windows\explorer.exe
      "C:\Windows\explorer.exe"
      2⤵
      • Modifies Installed Components in the registry
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:780
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\7182520.bat" "C:\Users\Admin\AppData\Local\Temp\8cd8efad8c6d62328a95a2be9b7bf3977ffcc066dc8f82010bdd56a6d0d6d11f.exe""
      2⤵
      • Deletes itself
      • Suspicious use of WriteProcessMemory
      PID:1612
      • C:\Windows\SysWOW64\attrib.exe
        attrib -r -s -h "C:\Users\Admin\AppData\Local\Temp\8cd8efad8c6d62328a95a2be9b7bf3977ffcc066dc8f82010bdd56a6d0d6d11f.exe"
        3⤵
        • Views/modifies file attributes
        PID:844
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x2f8
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1836

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

2
T1060

Hidden Files and Directories

1
T1158

Defense Evasion

Modify Registry

3
T1112

Hidden Files and Directories

1
T1158

Discovery

System Information Discovery

1
T1082

Impact

Defacement

1
T1491

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\7182520.bat
    Filesize

    72B

    MD5

    bd37b79d860b562df144427ffbc232af

    SHA1

    529e9d1f12e886d8d8007660221ca7de4f9de512

    SHA256

    f34dc2f040c2f5a320f1955fd77e4fa89bd50d48c28723b06f0c8fbcc9ef35f5

    SHA512

    4c273e028f983f8640b1dbf45ac665afe1d5c8aa82752f9be60895ae44c79b9dc14f780f2fbedb7895a8e977670dd098d398614486b31776cb02c452f11e3270

  • C:\Users\Admin\AppData\Local\Temp\EB7.tmp
    Filesize

    3.5MB

    MD5

    23e6b8b28e19060d30cd841ce1f02d93

    SHA1

    e5babef1a84f75dae910bcf9a34badfd96ca56e1

    SHA256

    4a1fdc9e4df5c4d39b2259154f0118b0bb6a59e2507dbfa10519d3c164f8efea

    SHA512

    ce29115d0ca1d6855e2579a0ae9d4def3f0f99dcb4fc2a727e171c4730cfa437e7dc4d2b9a2a810369811c44fba584beabb33b45e2e99a56f7b0a76c59c285a1

  • memory/780-57-0x0000000000000000-mapping.dmp
  • memory/780-58-0x0000000000200000-0x000000000025C000-memory.dmp
    Filesize

    368KB

  • memory/780-59-0x000007FEFBDE1000-0x000007FEFBDE3000-memory.dmp
    Filesize

    8KB

  • memory/780-60-0x0000000000200000-0x000000000025C000-memory.dmp
    Filesize

    368KB

  • memory/844-64-0x0000000000000000-mapping.dmp
  • memory/960-54-0x0000000075591000-0x0000000075593000-memory.dmp
    Filesize

    8KB

  • memory/960-55-0x0000000002370000-0x00000000024F3000-memory.dmp
    Filesize

    1.5MB

  • memory/960-56-0x0000000000400000-0x0000000000462000-memory.dmp
    Filesize

    392KB

  • memory/1612-62-0x0000000000000000-mapping.dmp