Analysis
-
max time kernel
77s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
28-11-2022 04:02
Static task
static1
Behavioral task
behavioral1
Sample
ad4721ceb5253c80c117ec3a65509ebbae07d4accf3689deab6644ad7b6096ea.exe
Resource
win7-20221111-en
General
-
Target
ad4721ceb5253c80c117ec3a65509ebbae07d4accf3689deab6644ad7b6096ea.exe
-
Size
361KB
-
MD5
0f4a6d7ab535e9354fde86800e3b3739
-
SHA1
76b1f3c52206aa92df7bfe9e0846a07adb700106
-
SHA256
ad4721ceb5253c80c117ec3a65509ebbae07d4accf3689deab6644ad7b6096ea
-
SHA512
444ab8f85683512430626f96b4d1f9e168360b05241604e962078f088a5092b2b1e6d2512dd561b9d6d727af140207d668b88eb998508faeed1c3f46ecb51a60
-
SSDEEP
6144:4IVQv0y3NRJO22A8oos+W0OBMgxDy1+yAD20GvPYE8a:RVQvBNfORjVOB7xDQ1AD20GXYEZ
Malware Config
Extracted
gozi
Extracted
gozi
1010
diuolirt.at
deopliazae.at
nifredao.com
filokiyurt.at
-
exe_type
worker
-
server_id
12
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
Authbk32.exepid process 4824 Authbk32.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ad4721ceb5253c80c117ec3a65509ebbae07d4accf3689deab6644ad7b6096ea.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation ad4721ceb5253c80c117ec3a65509ebbae07d4accf3689deab6644ad7b6096ea.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
ad4721ceb5253c80c117ec3a65509ebbae07d4accf3689deab6644ad7b6096ea.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Bitssvcs = "C:\\Users\\Admin\\AppData\\Roaming\\AppVider\\Authbk32.exe" ad4721ceb5253c80c117ec3a65509ebbae07d4accf3689deab6644ad7b6096ea.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 404 4824 WerFault.exe Authbk32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
Authbk32.exepid process 4824 Authbk32.exe 4824 Authbk32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
ad4721ceb5253c80c117ec3a65509ebbae07d4accf3689deab6644ad7b6096ea.execmd.execmd.exeAuthbk32.exedescription pid process target process PID 2148 wrote to memory of 2488 2148 ad4721ceb5253c80c117ec3a65509ebbae07d4accf3689deab6644ad7b6096ea.exe cmd.exe PID 2148 wrote to memory of 2488 2148 ad4721ceb5253c80c117ec3a65509ebbae07d4accf3689deab6644ad7b6096ea.exe cmd.exe PID 2148 wrote to memory of 2488 2148 ad4721ceb5253c80c117ec3a65509ebbae07d4accf3689deab6644ad7b6096ea.exe cmd.exe PID 2488 wrote to memory of 4108 2488 cmd.exe cmd.exe PID 2488 wrote to memory of 4108 2488 cmd.exe cmd.exe PID 2488 wrote to memory of 4108 2488 cmd.exe cmd.exe PID 4108 wrote to memory of 4824 4108 cmd.exe Authbk32.exe PID 4108 wrote to memory of 4824 4108 cmd.exe Authbk32.exe PID 4108 wrote to memory of 4824 4108 cmd.exe Authbk32.exe PID 4824 wrote to memory of 3544 4824 Authbk32.exe svchost.exe PID 4824 wrote to memory of 3544 4824 Authbk32.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad4721ceb5253c80c117ec3a65509ebbae07d4accf3689deab6644ad7b6096ea.exe"C:\Users\Admin\AppData\Local\Temp\ad4721ceb5253c80c117ec3a65509ebbae07d4accf3689deab6644ad7b6096ea.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\B606\DB13.bat" "C:\Users\Admin\AppData\Roaming\AppVider\Authbk32.exe" "C:\Users\Admin\AppData\Local\Temp\AD4721~1.EXE""2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd /C ""C:\Users\Admin\AppData\Roaming\AppVider\Authbk32.exe" "C:\Users\Admin\AppData\Local\Temp\AD4721~1.EXE""3⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\AppVider\Authbk32.exe"C:\Users\Admin\AppData\Roaming\AppVider\Authbk32.exe" "C:\Users\Admin\AppData\Local\Temp\AD4721~1.EXE"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe5⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4824 -s 5845⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4824 -ip 48241⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\B606\DB13.batFilesize
112B
MD5b7ebdc609e15cfcc90ac7305c5bc9323
SHA13ec613d518af880289b5950226b06c308261b6ea
SHA2566bc46da3c5e3a567a743e66c2b46a041fd1490608fca08caa941d4139af2f050
SHA512d707608b0447ac0ab756a276d5a888b6ed1049925967abde5b2cfa0ad39e4b0af2a595636351ac91ceeed30377e0240f4848ae1f1f307ff5df912b76dfe6ddd2
-
C:\Users\Admin\AppData\Roaming\AppVider\Authbk32.exeFilesize
361KB
MD50f4a6d7ab535e9354fde86800e3b3739
SHA176b1f3c52206aa92df7bfe9e0846a07adb700106
SHA256ad4721ceb5253c80c117ec3a65509ebbae07d4accf3689deab6644ad7b6096ea
SHA512444ab8f85683512430626f96b4d1f9e168360b05241604e962078f088a5092b2b1e6d2512dd561b9d6d727af140207d668b88eb998508faeed1c3f46ecb51a60
-
C:\Users\Admin\AppData\Roaming\AppVider\Authbk32.exeFilesize
361KB
MD50f4a6d7ab535e9354fde86800e3b3739
SHA176b1f3c52206aa92df7bfe9e0846a07adb700106
SHA256ad4721ceb5253c80c117ec3a65509ebbae07d4accf3689deab6644ad7b6096ea
SHA512444ab8f85683512430626f96b4d1f9e168360b05241604e962078f088a5092b2b1e6d2512dd561b9d6d727af140207d668b88eb998508faeed1c3f46ecb51a60
-
memory/2148-132-0x0000000000400000-0x000000000045D000-memory.dmpFilesize
372KB
-
memory/2148-134-0x0000000000720000-0x0000000000750000-memory.dmpFilesize
192KB
-
memory/2488-135-0x0000000000000000-mapping.dmp
-
memory/4108-137-0x0000000000000000-mapping.dmp
-
memory/4824-138-0x0000000000000000-mapping.dmp
-
memory/4824-141-0x0000000000400000-0x000000000045D000-memory.dmpFilesize
372KB
-
memory/4824-143-0x00000000005D0000-0x0000000000600000-memory.dmpFilesize
192KB