Analysis

  • max time kernel
    103s
  • max time network
    65s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    28-11-2022 08:18

General

  • Target

    d5ebcdac450c9999ef7184481f729df0bb5babd9ae9fb62b7c6fdff02569a674.exe

  • Size

    305KB

  • MD5

    f4cdbef32c96169f9194b6b33b3f7c26

  • SHA1

    53d0738923bcd20bddf9e280d281a81225378162

  • SHA256

    d5ebcdac450c9999ef7184481f729df0bb5babd9ae9fb62b7c6fdff02569a674

  • SHA512

    de2ee95658cfe3dd78a688932dd140849b04b7f6da869294d486326a010ccb6137264a4f924f88b4c4e3c6584399aa869ef6ec912e1d54b87ca05b67b4f861b9

  • SSDEEP

    6144:VId7WQ8X2rBWueOlQb2NOShT5RmUjD5uT:Vw7L+2rBWuFltF8UjD5uT

Malware Config

Extracted

Family

gozi

Extracted

Family

gozi

Botnet

1010

C2

redwoodmotors.ru

pampers-globalworld.ru

pinkfloyd-mp3love.ru

sosandhelpconnect.ru

Attributes
  • exe_type

    worker

rsa_pubkey.plain
serpent.plain

Signatures

  • Gozi

    Gozi is a well-known and widely distributed banking trojan.

  • Modifies Installed Components in the registry 2 TTPs 1 IoCs
  • Deletes itself 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 16 IoCs
  • Suspicious use of FindShellTrayWindow 28 IoCs
  • Suspicious use of SendNotifyMessage 22 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d5ebcdac450c9999ef7184481f729df0bb5babd9ae9fb62b7c6fdff02569a674.exe
    "C:\Users\Admin\AppData\Local\Temp\d5ebcdac450c9999ef7184481f729df0bb5babd9ae9fb62b7c6fdff02569a674.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1176
    • C:\Users\Admin\AppData\Local\Temp\d5ebcdac450c9999ef7184481f729df0bb5babd9ae9fb62b7c6fdff02569a674.exe
      "C:\Users\Admin\AppData\Local\Temp\d5ebcdac450c9999ef7184481f729df0bb5babd9ae9fb62b7c6fdff02569a674.exe"
      2⤵
      • Adds Run key to start application
      • Drops file in System32 directory
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:576
      • C:\Windows\explorer.exe
        "C:\Windows\explorer.exe"
        3⤵
        • Modifies Installed Components in the registry
        • Modifies registry class
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:1920
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\7131429.bat" "C:\Users\Admin\AppData\Local\Temp\D5EBCD~1.EXE""
        3⤵
        • Deletes itself
        • Suspicious use of WriteProcessMemory
        PID:628
        • C:\Windows\SysWOW64\attrib.exe
          attrib -r -s -h "C:\Users\Admin\AppData\Local\Temp\D5EBCD~1.EXE"
          4⤵
          • Views/modifies file attributes
          PID:1400
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x550
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1948

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

2
T1060

Hidden Files and Directories

1
T1158

Defense Evasion

Modify Registry

2
T1112

Hidden Files and Directories

1
T1158

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\7131429.bat
    Filesize

    72B

    MD5

    52e79bfc1e9b765489c384be21477c56

    SHA1

    1753be23b220defc13171b3d512a2b29d661b200

    SHA256

    8beae7eb8778a56ce491705cbe887507dd4cca91f27c65784a22fed26123db37

    SHA512

    d73ec29e56a21167944633e7389826fcd2489a15798bd23b2071c7317e7f2126786e913dda61bae0cc24880b577002802c0cf3423b87aa5933abbb68af5d3653

  • memory/576-69-0x0000000000400000-0x000000000042A000-memory.dmp
    Filesize

    168KB

  • memory/576-65-0x0000000000401000-mapping.dmp
  • memory/576-55-0x0000000000400000-0x000000000042A000-memory.dmp
    Filesize

    168KB

  • memory/576-59-0x0000000000400000-0x000000000042A000-memory.dmp
    Filesize

    168KB

  • memory/576-60-0x0000000000400000-0x000000000042A000-memory.dmp
    Filesize

    168KB

  • memory/576-62-0x0000000000400000-0x000000000042A000-memory.dmp
    Filesize

    168KB

  • memory/576-64-0x0000000000400000-0x000000000042A000-memory.dmp
    Filesize

    168KB

  • memory/576-75-0x0000000000400000-0x000000000042A000-memory.dmp
    Filesize

    168KB

  • memory/576-58-0x0000000000400000-0x000000000042A000-memory.dmp
    Filesize

    168KB

  • memory/576-56-0x0000000000400000-0x000000000042A000-memory.dmp
    Filesize

    168KB

  • memory/576-70-0x0000000000400000-0x000000000042A000-memory.dmp
    Filesize

    168KB

  • memory/628-74-0x0000000000000000-mapping.dmp
  • memory/1176-54-0x00000000752B1000-0x00000000752B3000-memory.dmp
    Filesize

    8KB

  • memory/1176-67-0x0000000000250000-0x0000000000279000-memory.dmp
    Filesize

    164KB

  • memory/1400-77-0x0000000000000000-mapping.dmp
  • memory/1920-78-0x0000000001B60000-0x0000000001BC2000-memory.dmp
    Filesize

    392KB

  • memory/1920-73-0x000007FEFB371000-0x000007FEFB373000-memory.dmp
    Filesize

    8KB

  • memory/1920-72-0x0000000001B60000-0x0000000001BC2000-memory.dmp
    Filesize

    392KB

  • memory/1920-71-0x0000000000000000-mapping.dmp