Analysis

  • max time kernel
    184s
  • max time network
    199s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-11-2022 15:45

General

  • Target

    05ee1eca0bc8ac75f287f6e4f9d813822147af9b4ff0f050e9574c884f8a5f36.exe

  • Size

    386KB

  • MD5

    6fa26b5a051dfd46f88b7afd8a3cca2f

  • SHA1

    da72c68b166bb625155f45fa384f751221dcf83f

  • SHA256

    05ee1eca0bc8ac75f287f6e4f9d813822147af9b4ff0f050e9574c884f8a5f36

  • SHA512

    35a0a1ed114891bc9906ed17b42c62cab234ee873425357ae8750807b15d24635cb170f430fb321d52ed0f98d34c8040c6f2ac732d3e866eeec4c8ff18ba956f

  • SSDEEP

    6144:x3rdqFza2ihKec2XddzyXThYxoM3pYdW1G0musNy2u5pndAj:xRya2P2XbzyXlY+M3WdW1XLsNy2iAj

Malware Config

Extracted

Family

gozi

Extracted

Family

gozi

Botnet

1010

C2

neftinetinebudet.net/geodata/version/ip2ext

staticstoday.com/geodata/version/ip2ext

Attributes
  • exe_type

    worker

  • server_id

    30

rsa_pubkey.plain
serpent.plain

Signatures

  • Gozi

    Gozi is a well-known and widely distributed banking trojan.

  • Modifies Installed Components in the registry 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 58 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies registry class 45 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 53 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\05ee1eca0bc8ac75f287f6e4f9d813822147af9b4ff0f050e9574c884f8a5f36.exe
    "C:\Users\Admin\AppData\Local\Temp\05ee1eca0bc8ac75f287f6e4f9d813822147af9b4ff0f050e9574c884f8a5f36.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4288
    • C:\Windows\explorer.exe
      C:\Windows\explorer.exe
      2⤵
      • Modifies Installed Components in the registry
      • Enumerates connected drives
      • Checks SCSI registry key(s)
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:1140
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\58AD.bat" "C:\Users\Admin\AppData\Local\Temp\05EE1E~1.EXE""
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2268
      • C:\Windows\SysWOW64\attrib.exe
        attrib -r -s -h "C:\Users\Admin\AppData\Local\Temp\05EE1E~1.EXE"
        3⤵
        • Views/modifies file attributes
        PID:4892
  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
    1⤵
    • Enumerates system info in registry
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:4268
  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:476

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

2
T1060

Hidden Files and Directories

1
T1158

Defense Evasion

Modify Registry

2
T1112

Hidden Files and Directories

1
T1158

Discovery

Query Registry

4
T1012

System Information Discovery

5
T1082

Peripheral Device Discovery

2
T1120

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\58AD.bat
    Filesize

    76B

    MD5

    2e29a9c26dddf3d9f8d45bd797c36940

    SHA1

    6215a34015b4ebcd72ae8f358233d721e2a85d5a

    SHA256

    1446789d7420bda40e838b2bf906c0b132ec3941784ba1c382d163c4ac5ebfc8

    SHA512

    e0d12065508859b30a6a427d23ae8dde807f545082c53e64251596a45ecb67324cfe45ee5c76092bbcd1b607e7165b18b708e2fb73c1fff6c30f799abb14974e

  • memory/1140-134-0x0000000000000000-mapping.dmp
  • memory/2268-136-0x0000000000000000-mapping.dmp
  • memory/4268-148-0x000001E1695F8000-0x000001E169600000-memory.dmp
    Filesize

    32KB

  • memory/4268-150-0x000001E16B410000-0x000001E16B430000-memory.dmp
    Filesize

    128KB

  • memory/4268-154-0x000001E16B550000-0x000001E16B650000-memory.dmp
    Filesize

    1024KB

  • memory/4268-158-0x000001E16B220000-0x000001E16B240000-memory.dmp
    Filesize

    128KB

  • memory/4268-171-0x000001E16B510000-0x000001E16B530000-memory.dmp
    Filesize

    128KB

  • memory/4288-132-0x00000000023C0000-0x00000000024DD000-memory.dmp
    Filesize

    1.1MB

  • memory/4288-133-0x0000000000400000-0x0000000000464000-memory.dmp
    Filesize

    400KB

  • memory/4288-135-0x00000000023C0000-0x00000000024DD000-memory.dmp
    Filesize

    1.1MB

  • memory/4892-138-0x0000000000000000-mapping.dmp