Analysis

  • max time kernel
    159s
  • max time network
    50s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    25-11-2022 23:06

General

  • Target

    fc7ba1d4f3c922bb95e1c80c65c3a4de6564f19379e28b287808e4f4c5ea36f9.exe

  • Size

    348KB

  • MD5

    40cd2fec7ef2cada01d56afbae18015b

  • SHA1

    512de247dbceb55babbf55e9d0945810f389674d

  • SHA256

    fc7ba1d4f3c922bb95e1c80c65c3a4de6564f19379e28b287808e4f4c5ea36f9

  • SHA512

    9af87fcd4a625ba6d86dd3211b5bcfaab6eef3d5e013e0be179ed1021dffcfe9cf2720127a8466e1d1f7391c227397f31fc5cbb9369443fe1c8f7168d7b623fc

  • SSDEEP

    6144:N4e0DLTDAOtoPvUHxXhDOOq/GS86H8jZ3alw5ZuMdRdEx7RzrgM:ueOL/36vwXIOq/GVdGw5QMNk71z

Malware Config

Extracted

Family

gozi

Extracted

Family

gozi

Botnet

1012

C2

lolila.net

vndjtu968488.ru

moriyurw368798.ru

Attributes
  • build

    213459

  • exe_type

    worker

rsa_pubkey.plain
serpent.plain

Signatures

  • Gozi

    Gozi is a well-known and widely distributed banking trojan.

  • Modifies Installed Components in the registry 2 TTPs 1 IoCs
  • Deletes itself 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 16 IoCs
  • Suspicious use of FindShellTrayWindow 29 IoCs
  • Suspicious use of SendNotifyMessage 19 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fc7ba1d4f3c922bb95e1c80c65c3a4de6564f19379e28b287808e4f4c5ea36f9.exe
    "C:\Users\Admin\AppData\Local\Temp\fc7ba1d4f3c922bb95e1c80c65c3a4de6564f19379e28b287808e4f4c5ea36f9.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Sets desktop wallpaper using registry
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:1076
    • C:\Windows\explorer.exe
      C:\Windows\explorer.exe
      2⤵
      • Modifies Installed Components in the registry
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:1952
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\13FC.bat" "C:\Users\Admin\AppData\Local\Temp\FC7BA1~1.EXE""
      2⤵
      • Deletes itself
      • Suspicious use of WriteProcessMemory
      PID:2000
      • C:\Windows\SysWOW64\attrib.exe
        attrib -r -s -h "C:\Users\Admin\AppData\Local\Temp\FC7BA1~1.EXE"
        3⤵
        • Views/modifies file attributes
        PID:1092
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x5a0
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1336

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

2
T1060

Hidden Files and Directories

1
T1158

Defense Evasion

Modify Registry

3
T1112

Hidden Files and Directories

1
T1158

Discovery

System Information Discovery

1
T1082

Impact

Defacement

1
T1491

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\13FC.bat
    Filesize

    72B

    MD5

    242e1e0d315f2167417cc90e884fa103

    SHA1

    d7de966b2699db87752f499e38e487aa1cc3d973

    SHA256

    ae202763640cda6e8aef18dceeb8e1c09fc8dbb8a623f7a2fe976e41f6d8bfde

    SHA512

    d16c2ed896ab5f110faf6112527ed3d577de168c1ad6bfa69b190fadf708859dba137775991ec60e52cc68af85a0490f9c0f5bd27c2a9cde2f62af8b5e54d36f

  • C:\Users\Admin\AppData\Local\Temp\A941.tmp
    Filesize

    3.5MB

    MD5

    1fa69f624f25402fb09d76cbb8772177

    SHA1

    658e9405947bc127af665bbb465d147e9397140e

    SHA256

    bb2684d401551006b3f1ddd864c574ddbaab0b7643ff883a4cf085b812f64d22

    SHA512

    490cf7c076a0089b203fb9ccb305a133f59cf7932c5c47cfb2751c4d65aecbe5017881a95f5184111650b7829628466fcd10c781d68f5ebd83a9e971df0bfc00

  • memory/1076-54-0x0000000076AE1000-0x0000000076AE3000-memory.dmp
    Filesize

    8KB

  • memory/1076-55-0x0000000000240000-0x0000000000279000-memory.dmp
    Filesize

    228KB

  • memory/1076-56-0x0000000000400000-0x0000000000478000-memory.dmp
    Filesize

    480KB

  • memory/1076-61-0x0000000000400000-0x0000000000478000-memory.dmp
    Filesize

    480KB

  • memory/1092-64-0x0000000000000000-mapping.dmp
  • memory/1952-57-0x0000000000000000-mapping.dmp
  • memory/1952-58-0x000007FEFBEA1000-0x000007FEFBEA3000-memory.dmp
    Filesize

    8KB

  • memory/1952-59-0x00000000002D0000-0x0000000000338000-memory.dmp
    Filesize

    416KB

  • memory/1952-65-0x0000000002D20000-0x0000000002D30000-memory.dmp
    Filesize

    64KB

  • memory/2000-62-0x0000000000000000-mapping.dmp