Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    139s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/02/2023, 12:15 UTC

General

  • Target

    45801ddcea54e60f804a3e217b91eb998e67ed592c4894fa9a0b4cecaa3c8b2c.dll

  • Size

    478KB

  • MD5

    a680574ade5140ed02c9c36bde94f1d9

  • SHA1

    7bc6ac0a197efc9d894b586b1cd00c5b6fb1f6a0

  • SHA256

    45801ddcea54e60f804a3e217b91eb998e67ed592c4894fa9a0b4cecaa3c8b2c

  • SHA512

    cf505bb0556ac84944c5073f0baf5ecae7009e4ab4a1ed84421155b7cf658f07dfbda01461e2616a56186a81d41a05fee394790bec070d398704cf21af729c11

  • SSDEEP

    6144:4dhdVjFYJCovXPXqtBwlK4sPY3qrRM9ZO5/pQML1oKcG5wSlD2t+:OjFGfvXPXiUK4BAM90cG5Q

Malware Config

Extracted

Family

gozi

Extracted

Family

gozi

Botnet

1000

C2

https://mereter.cloud

Attributes
  • host_keep_time

    2

  • host_shift_time

    1

  • idle_time

    1

  • request_time

    10

aes.plain
1
oEKAGSfDCJKsbAEB

Signatures

  • Gozi

    Gozi is a well-known and widely distributed banking trojan.

  • Program crash 1 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\45801ddcea54e60f804a3e217b91eb998e67ed592c4894fa9a0b4cecaa3c8b2c.dll
    1⤵
      PID:4664
      • C:\Windows\system32\WerFault.exe
        C:\Windows\system32\WerFault.exe -u -p 4664 -s 412
        2⤵
        • Program crash
        PID:4984
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -pss -s 428 -p 4664 -ip 4664
      1⤵
        PID:3988

      Network

        No results found
      • 20.189.173.11:443
        322 B
        7
      • 104.80.225.205:443
        322 B
        7
      No results found

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/4664-132-0x0000000180000000-0x0000000180014000-memory.dmp

        Filesize

        80KB

      • memory/4664-136-0x0000000002A10000-0x0000000002A23000-memory.dmp

        Filesize

        76KB

      We care about your privacy.

      This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.