Analysis
-
max time kernel
103s -
max time network
65s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
28-11-2022 08:18
Static task
static1
Behavioral task
behavioral1
Sample
d5ebcdac450c9999ef7184481f729df0bb5babd9ae9fb62b7c6fdff02569a674.exe
Resource
win7-20221111-en
General
-
Target
d5ebcdac450c9999ef7184481f729df0bb5babd9ae9fb62b7c6fdff02569a674.exe
-
Size
305KB
-
MD5
f4cdbef32c96169f9194b6b33b3f7c26
-
SHA1
53d0738923bcd20bddf9e280d281a81225378162
-
SHA256
d5ebcdac450c9999ef7184481f729df0bb5babd9ae9fb62b7c6fdff02569a674
-
SHA512
de2ee95658cfe3dd78a688932dd140849b04b7f6da869294d486326a010ccb6137264a4f924f88b4c4e3c6584399aa869ef6ec912e1d54b87ca05b67b4f861b9
-
SSDEEP
6144:VId7WQ8X2rBWueOlQb2NOShT5RmUjD5uT:Vw7L+2rBWuFltF8UjD5uT
Malware Config
Extracted
gozi
Extracted
gozi
1010
redwoodmotors.ru
pampers-globalworld.ru
pinkfloyd-mp3love.ru
sosandhelpconnect.ru
-
exe_type
worker
Signatures
-
Modifies Installed Components in the registry 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 628 cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
d5ebcdac450c9999ef7184481f729df0bb5babd9ae9fb62b7c6fdff02569a674.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\FwReSCOM = "C:\\Windows\\system32\\appiroxy.exe" d5ebcdac450c9999ef7184481f729df0bb5babd9ae9fb62b7c6fdff02569a674.exe -
Drops file in System32 directory 2 IoCs
Processes:
d5ebcdac450c9999ef7184481f729df0bb5babd9ae9fb62b7c6fdff02569a674.exedescription ioc process File created C:\Windows\system32\appiroxy.exe d5ebcdac450c9999ef7184481f729df0bb5babd9ae9fb62b7c6fdff02569a674.exe File opened for modification C:\Windows\system32\appiroxy.exe d5ebcdac450c9999ef7184481f729df0bb5babd9ae9fb62b7c6fdff02569a674.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
d5ebcdac450c9999ef7184481f729df0bb5babd9ae9fb62b7c6fdff02569a674.exed5ebcdac450c9999ef7184481f729df0bb5babd9ae9fb62b7c6fdff02569a674.exedescription pid process target process PID 1176 set thread context of 576 1176 d5ebcdac450c9999ef7184481f729df0bb5babd9ae9fb62b7c6fdff02569a674.exe d5ebcdac450c9999ef7184481f729df0bb5babd9ae9fb62b7c6fdff02569a674.exe PID 576 set thread context of 1920 576 d5ebcdac450c9999ef7184481f729df0bb5babd9ae9fb62b7c6fdff02569a674.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 5 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000_Classes\Local Settings explorer.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
d5ebcdac450c9999ef7184481f729df0bb5babd9ae9fb62b7c6fdff02569a674.exed5ebcdac450c9999ef7184481f729df0bb5babd9ae9fb62b7c6fdff02569a674.exepid process 1176 d5ebcdac450c9999ef7184481f729df0bb5babd9ae9fb62b7c6fdff02569a674.exe 1176 d5ebcdac450c9999ef7184481f729df0bb5babd9ae9fb62b7c6fdff02569a674.exe 576 d5ebcdac450c9999ef7184481f729df0bb5babd9ae9fb62b7c6fdff02569a674.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
explorer.exepid process 1920 explorer.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
d5ebcdac450c9999ef7184481f729df0bb5babd9ae9fb62b7c6fdff02569a674.exepid process 576 d5ebcdac450c9999ef7184481f729df0bb5babd9ae9fb62b7c6fdff02569a674.exe -
Suspicious use of AdjustPrivilegeToken 16 IoCs
Processes:
explorer.exeAUDIODG.EXEdescription pid process Token: SeShutdownPrivilege 1920 explorer.exe Token: SeShutdownPrivilege 1920 explorer.exe Token: SeShutdownPrivilege 1920 explorer.exe Token: SeShutdownPrivilege 1920 explorer.exe Token: SeShutdownPrivilege 1920 explorer.exe Token: SeShutdownPrivilege 1920 explorer.exe Token: SeShutdownPrivilege 1920 explorer.exe Token: SeShutdownPrivilege 1920 explorer.exe Token: SeShutdownPrivilege 1920 explorer.exe Token: SeShutdownPrivilege 1920 explorer.exe Token: 33 1948 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1948 AUDIODG.EXE Token: 33 1948 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1948 AUDIODG.EXE Token: SeShutdownPrivilege 1920 explorer.exe Token: SeShutdownPrivilege 1920 explorer.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
Processes:
explorer.exepid process 1920 explorer.exe 1920 explorer.exe 1920 explorer.exe 1920 explorer.exe 1920 explorer.exe 1920 explorer.exe 1920 explorer.exe 1920 explorer.exe 1920 explorer.exe 1920 explorer.exe 1920 explorer.exe 1920 explorer.exe 1920 explorer.exe 1920 explorer.exe 1920 explorer.exe 1920 explorer.exe 1920 explorer.exe 1920 explorer.exe 1920 explorer.exe 1920 explorer.exe 1920 explorer.exe 1920 explorer.exe 1920 explorer.exe 1920 explorer.exe 1920 explorer.exe 1920 explorer.exe 1920 explorer.exe 1920 explorer.exe -
Suspicious use of SendNotifyMessage 22 IoCs
Processes:
explorer.exepid process 1920 explorer.exe 1920 explorer.exe 1920 explorer.exe 1920 explorer.exe 1920 explorer.exe 1920 explorer.exe 1920 explorer.exe 1920 explorer.exe 1920 explorer.exe 1920 explorer.exe 1920 explorer.exe 1920 explorer.exe 1920 explorer.exe 1920 explorer.exe 1920 explorer.exe 1920 explorer.exe 1920 explorer.exe 1920 explorer.exe 1920 explorer.exe 1920 explorer.exe 1920 explorer.exe 1920 explorer.exe -
Suspicious use of WriteProcessMemory 26 IoCs
Processes:
d5ebcdac450c9999ef7184481f729df0bb5babd9ae9fb62b7c6fdff02569a674.exed5ebcdac450c9999ef7184481f729df0bb5babd9ae9fb62b7c6fdff02569a674.execmd.exedescription pid process target process PID 1176 wrote to memory of 576 1176 d5ebcdac450c9999ef7184481f729df0bb5babd9ae9fb62b7c6fdff02569a674.exe d5ebcdac450c9999ef7184481f729df0bb5babd9ae9fb62b7c6fdff02569a674.exe PID 1176 wrote to memory of 576 1176 d5ebcdac450c9999ef7184481f729df0bb5babd9ae9fb62b7c6fdff02569a674.exe d5ebcdac450c9999ef7184481f729df0bb5babd9ae9fb62b7c6fdff02569a674.exe PID 1176 wrote to memory of 576 1176 d5ebcdac450c9999ef7184481f729df0bb5babd9ae9fb62b7c6fdff02569a674.exe d5ebcdac450c9999ef7184481f729df0bb5babd9ae9fb62b7c6fdff02569a674.exe PID 1176 wrote to memory of 576 1176 d5ebcdac450c9999ef7184481f729df0bb5babd9ae9fb62b7c6fdff02569a674.exe d5ebcdac450c9999ef7184481f729df0bb5babd9ae9fb62b7c6fdff02569a674.exe PID 1176 wrote to memory of 576 1176 d5ebcdac450c9999ef7184481f729df0bb5babd9ae9fb62b7c6fdff02569a674.exe d5ebcdac450c9999ef7184481f729df0bb5babd9ae9fb62b7c6fdff02569a674.exe PID 1176 wrote to memory of 576 1176 d5ebcdac450c9999ef7184481f729df0bb5babd9ae9fb62b7c6fdff02569a674.exe d5ebcdac450c9999ef7184481f729df0bb5babd9ae9fb62b7c6fdff02569a674.exe PID 1176 wrote to memory of 576 1176 d5ebcdac450c9999ef7184481f729df0bb5babd9ae9fb62b7c6fdff02569a674.exe d5ebcdac450c9999ef7184481f729df0bb5babd9ae9fb62b7c6fdff02569a674.exe PID 1176 wrote to memory of 576 1176 d5ebcdac450c9999ef7184481f729df0bb5babd9ae9fb62b7c6fdff02569a674.exe d5ebcdac450c9999ef7184481f729df0bb5babd9ae9fb62b7c6fdff02569a674.exe PID 1176 wrote to memory of 576 1176 d5ebcdac450c9999ef7184481f729df0bb5babd9ae9fb62b7c6fdff02569a674.exe d5ebcdac450c9999ef7184481f729df0bb5babd9ae9fb62b7c6fdff02569a674.exe PID 1176 wrote to memory of 576 1176 d5ebcdac450c9999ef7184481f729df0bb5babd9ae9fb62b7c6fdff02569a674.exe d5ebcdac450c9999ef7184481f729df0bb5babd9ae9fb62b7c6fdff02569a674.exe PID 1176 wrote to memory of 576 1176 d5ebcdac450c9999ef7184481f729df0bb5babd9ae9fb62b7c6fdff02569a674.exe d5ebcdac450c9999ef7184481f729df0bb5babd9ae9fb62b7c6fdff02569a674.exe PID 576 wrote to memory of 1920 576 d5ebcdac450c9999ef7184481f729df0bb5babd9ae9fb62b7c6fdff02569a674.exe explorer.exe PID 576 wrote to memory of 1920 576 d5ebcdac450c9999ef7184481f729df0bb5babd9ae9fb62b7c6fdff02569a674.exe explorer.exe PID 576 wrote to memory of 1920 576 d5ebcdac450c9999ef7184481f729df0bb5babd9ae9fb62b7c6fdff02569a674.exe explorer.exe PID 576 wrote to memory of 1920 576 d5ebcdac450c9999ef7184481f729df0bb5babd9ae9fb62b7c6fdff02569a674.exe explorer.exe PID 576 wrote to memory of 1920 576 d5ebcdac450c9999ef7184481f729df0bb5babd9ae9fb62b7c6fdff02569a674.exe explorer.exe PID 576 wrote to memory of 1920 576 d5ebcdac450c9999ef7184481f729df0bb5babd9ae9fb62b7c6fdff02569a674.exe explorer.exe PID 576 wrote to memory of 1920 576 d5ebcdac450c9999ef7184481f729df0bb5babd9ae9fb62b7c6fdff02569a674.exe explorer.exe PID 576 wrote to memory of 628 576 d5ebcdac450c9999ef7184481f729df0bb5babd9ae9fb62b7c6fdff02569a674.exe cmd.exe PID 576 wrote to memory of 628 576 d5ebcdac450c9999ef7184481f729df0bb5babd9ae9fb62b7c6fdff02569a674.exe cmd.exe PID 576 wrote to memory of 628 576 d5ebcdac450c9999ef7184481f729df0bb5babd9ae9fb62b7c6fdff02569a674.exe cmd.exe PID 576 wrote to memory of 628 576 d5ebcdac450c9999ef7184481f729df0bb5babd9ae9fb62b7c6fdff02569a674.exe cmd.exe PID 628 wrote to memory of 1400 628 cmd.exe attrib.exe PID 628 wrote to memory of 1400 628 cmd.exe attrib.exe PID 628 wrote to memory of 1400 628 cmd.exe attrib.exe PID 628 wrote to memory of 1400 628 cmd.exe attrib.exe -
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Users\Admin\AppData\Local\Temp\d5ebcdac450c9999ef7184481f729df0bb5babd9ae9fb62b7c6fdff02569a674.exe"C:\Users\Admin\AppData\Local\Temp\d5ebcdac450c9999ef7184481f729df0bb5babd9ae9fb62b7c6fdff02569a674.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\d5ebcdac450c9999ef7184481f729df0bb5babd9ae9fb62b7c6fdff02569a674.exe"C:\Users\Admin\AppData\Local\Temp\d5ebcdac450c9999ef7184481f729df0bb5babd9ae9fb62b7c6fdff02569a674.exe"2⤵
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"3⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\7131429.bat" "C:\Users\Admin\AppData\Local\Temp\D5EBCD~1.EXE""3⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\attrib.exeattrib -r -s -h "C:\Users\Admin\AppData\Local\Temp\D5EBCD~1.EXE"4⤵
- Views/modifies file attributes
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5501⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\7131429.batFilesize
72B
MD552e79bfc1e9b765489c384be21477c56
SHA11753be23b220defc13171b3d512a2b29d661b200
SHA2568beae7eb8778a56ce491705cbe887507dd4cca91f27c65784a22fed26123db37
SHA512d73ec29e56a21167944633e7389826fcd2489a15798bd23b2071c7317e7f2126786e913dda61bae0cc24880b577002802c0cf3423b87aa5933abbb68af5d3653
-
memory/576-69-0x0000000000400000-0x000000000042A000-memory.dmpFilesize
168KB
-
memory/576-65-0x0000000000401000-mapping.dmp
-
memory/576-55-0x0000000000400000-0x000000000042A000-memory.dmpFilesize
168KB
-
memory/576-59-0x0000000000400000-0x000000000042A000-memory.dmpFilesize
168KB
-
memory/576-60-0x0000000000400000-0x000000000042A000-memory.dmpFilesize
168KB
-
memory/576-62-0x0000000000400000-0x000000000042A000-memory.dmpFilesize
168KB
-
memory/576-64-0x0000000000400000-0x000000000042A000-memory.dmpFilesize
168KB
-
memory/576-75-0x0000000000400000-0x000000000042A000-memory.dmpFilesize
168KB
-
memory/576-58-0x0000000000400000-0x000000000042A000-memory.dmpFilesize
168KB
-
memory/576-56-0x0000000000400000-0x000000000042A000-memory.dmpFilesize
168KB
-
memory/576-70-0x0000000000400000-0x000000000042A000-memory.dmpFilesize
168KB
-
memory/628-74-0x0000000000000000-mapping.dmp
-
memory/1176-54-0x00000000752B1000-0x00000000752B3000-memory.dmpFilesize
8KB
-
memory/1176-67-0x0000000000250000-0x0000000000279000-memory.dmpFilesize
164KB
-
memory/1400-77-0x0000000000000000-mapping.dmp
-
memory/1920-78-0x0000000001B60000-0x0000000001BC2000-memory.dmpFilesize
392KB
-
memory/1920-73-0x000007FEFB371000-0x000007FEFB373000-memory.dmpFilesize
8KB
-
memory/1920-72-0x0000000001B60000-0x0000000001BC2000-memory.dmpFilesize
392KB
-
memory/1920-71-0x0000000000000000-mapping.dmp