Analysis
-
max time kernel
143s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
06-01-2023 19:39
Static task
static1
Behavioral task
behavioral1
Sample
loader-1.dll
Resource
win7-20220812-en
General
-
Target
loader-1.dll
-
Size
58KB
-
MD5
8d2860deeca2667cd9d9a490b0fb9312
-
SHA1
d4ed405e29a8c554903cd2313356755899761ec0
-
SHA256
0ca229d6985267551278509807381230b3351e8c1259d46f87bb3d4cac76176b
-
SHA512
0e34109e52b5405ca79fb84c0a271c9b19566c234e26d40f98aacd513c0ffbeac29cf44f9a138e71ff904fcd9d1d306ff4fc9106433f72b18911fb21d2f7428e
-
SSDEEP
1536:lKMj6u5qwXbuHq4DalAccmRCoU0rhZKLuT:nj9KRaR7jT
Malware Config
Extracted
gozi
202208151
https://fingerpin.cyou
https://dodstep.cyou
-
host_keep_time
2
-
host_shift_time
1
-
idle_time
1
-
request_time
10
Signatures
-
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
regsvr32.exedescription pid process target process PID 1612 wrote to memory of 1336 1612 regsvr32.exe cmd.exe PID 1612 wrote to memory of 1336 1612 regsvr32.exe cmd.exe PID 1612 wrote to memory of 1336 1612 regsvr32.exe cmd.exe PID 1612 wrote to memory of 2036 1612 regsvr32.exe cmd.exe PID 1612 wrote to memory of 2036 1612 regsvr32.exe cmd.exe PID 1612 wrote to memory of 2036 1612 regsvr32.exe cmd.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\loader-1.dll1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.execmd /c "echo Commands" >> C:\Users\Admin\AppData\Local\Temp\8F9C.tmp2⤵
-
C:\Windows\system32\cmd.execmd /c "dir" >> C:\Users\Admin\AppData\Local\Temp\8F9C.tmp2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\8F9C.tmpFilesize
173B
MD538f0354011bd9aa32330fad9ed1f5b6b
SHA113498f4fbe131f96164aee99cc7b366d670131dd
SHA256ecf200dcceaaf5da831c69591b3379eb0905a60b46583feef3534f26acbfcea7
SHA512c8247219bb7cca035bf4d452492dbe6fe9380ecbca7e4f016eb43138c0b33efad35a7a5be3f895ba3c88adcb8c9be399ecf54b531acd4b791ade9418b0120465
-
C:\Users\Admin\AppData\Local\Temp\8F9C.tmpFilesize
3KB
MD5f88eaf7c05e6e83358387af29b3e3685
SHA15bf127cb4d8eebd186444445f27432cbfa623156
SHA2562e239542ab59ceeb7b3d8e6b337fb466f1d09c420108fb38c463830a2cca2c05
SHA5121d7f8f5ae4b4b884f554c483798cf3fb51aaf4cf810f82d71b58b8b45fa61976fd43855a1d3cdccdf270aaeceaeabcc574391c67ec2187e406a98c5f128a16f9
-
memory/1336-61-0x0000000000000000-mapping.dmp
-
memory/1612-54-0x000007FEFB751000-0x000007FEFB753000-memory.dmpFilesize
8KB
-
memory/1612-55-0x0000000180000000-0x0000000180013000-memory.dmpFilesize
76KB
-
memory/1612-60-0x0000000140000000-0x0000000140011000-memory.dmpFilesize
68KB
-
memory/2036-62-0x0000000000000000-mapping.dmp