Analysis

  • max time kernel
    148s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    23-02-2023 09:26

General

  • Target

    metaplatform02.pdf..lnk

  • Size

    293.6MB

  • MD5

    d8564cb88267993101b3f0f54048c6a4

  • SHA1

    75dad371e05629179c7e30bd24a068553336aefd

  • SHA256

    e80e664931e44044b7d162100524858755203db39402ddc8f816a508404ea3c5

  • SHA512

    a41b87daa0aea3057a4e1cdd29a7aa81e488880e714139529c75bc714ac803dd43e6a0acac143d2c3edbfac4582205c66e822c4561e817a4337fcb910abb0d57

  • SSDEEP

    24576:87MkCMWioaEMPQjw1coi5qsSrKz6Fwoh73sVDGSQ7wqfU:0hQRoAz6quxhC

Malware Config

Extracted

Family

gozi

Extracted

Family

gozi

Botnet

1000

C2

https://colodart.top

Attributes
  • host_keep_time

    2

  • host_shift_time

    1

  • idle_time

    1

  • request_time

    10

aes.plain

Signatures

  • Gozi

    Gozi is a well-known and widely distributed banking trojan.

  • Blocklisted process makes network request 5 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Delays execution with timeout.exe 2 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Runs net.exe
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 51 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\metaplatform02.pdf..lnk
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1400
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c if exist C:\Users\Admin\AppData\Local\Temp\temp1_mplatform.zip\metaplatform02.pdf..lnk (certutil.exe -decode C:\Users\Admin\AppData\Local\Temp\temp1_mplatform.zip\metaplatform02.pdf..lnk C:\Users\Admin\AppData\Local\Temp\.hta&start C:\Users\Admin\AppData\Local\Temp\.hta)else (certutil -decode metaplatform02.pdf..lnk C:\Users\Admin\AppData\Local\Temp\.hta&start C:\Users\Admin\AppData\Local\Temp\.hta)
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:688
      • C:\Windows\system32\certutil.exe
        certutil -decode metaplatform02.pdf..lnk C:\Users\Admin\AppData\Local\Temp\.hta
        3⤵
          PID:1496
        • C:\Windows\SysWOW64\mshta.exe
          "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\AppData\Local\Temp\.hta"
          3⤵
          • Blocklisted process makes network request
          • Modifies system certificate store
          • Suspicious behavior: CmdExeWriteProcessMemorySpam
          • Suspicious use of WriteProcessMemory
          PID:1628
          • C:\Windows\SysWOW64\timeout.exe
            "C:\Windows\System32\timeout.exe" /t 30
            4⤵
            • Delays execution with timeout.exe
            PID:112
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgACIAQwA6AFwAIgA7AHQAaQBtAGUAbwB1AHQAIAAxADUA
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1788
            • C:\Windows\SysWOW64\timeout.exe
              "C:\Windows\system32\timeout.exe" 15
              5⤵
              • Delays execution with timeout.exe
              PID:1080
          • C:\Windows\SysWOW64\regsvr32.exe
            regsvr32 /s C:\Users\Admin\AppData\Local\Temp\x.dll
            4⤵
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:1088
            • C:\Windows\system32\regsvr32.exe
              /s C:\Users\Admin\AppData\Local\Temp\x.dll
              5⤵
              • Loads dropped DLL
              • Suspicious use of WriteProcessMemory
              PID:1652
              • C:\Windows\system32\cmd.exe
                cmd /c "net group "domain computers" /domain" >> C:\Users\Admin\AppData\Local\Temp\6BF4.tmp
                6⤵
                • Suspicious use of WriteProcessMemory
                PID:852
                • C:\Windows\system32\net.exe
                  net group "domain computers" /domain
                  7⤵
                  • Suspicious use of WriteProcessMemory
                  PID:1304
                  • C:\Windows\system32\net1.exe
                    C:\Windows\system32\net1 group "domain computers" /domain
                    8⤵
                      PID:1868
                • C:\Windows\system32\cmd.exe
                  cmd /c "nltest /dclist:" >> C:\Users\Admin\AppData\Local\Temp\8E3C.tmp
                  6⤵
                  • Suspicious use of WriteProcessMemory
                  PID:968
                  • C:\Windows\system32\nltest.exe
                    nltest /dclist:
                    7⤵
                      PID:920

        Network

        MITRE ATT&CK Matrix ATT&CK v6

        Defense Evasion

        Install Root Certificate

        1
        T1130

        Modify Registry

        1
        T1112

        Discovery

        System Information Discovery

        1
        T1082

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          342B

          MD5

          9d46260af005955562fb20a7e239935d

          SHA1

          b8683d11bba116df7a9c4c47f8b559cfd92a76bf

          SHA256

          2573e7f92603acce294e75d6e01200a0a7d096c9eab3f831bb627ece751cecd1

          SHA512

          d6d76a2aa826dfd29fe482ccaed42df7a649fc820938f57210a89561bfec30343cdf9279147a039614d0d3d288830a68bcbb499fc12d69c8603764a9af8a7a5e

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          Filesize

          342B

          MD5

          666e4b976a62d75de82555987a191598

          SHA1

          cde39eceaf0b33bfd0449d331ea85b271c42fd71

          SHA256

          1f6be49e3f26ba11984cae3f1fecbfd52d037139dcf3d18bfa90ddf1a4192e42

          SHA512

          b5e8c3484efd4e2f4d0a1553a2239adf09aa875a496d851d067e94ebfc971080484e02204f3c51ea0dc61145172f52cca85f6abbd29b5d790d1553dd9bcfa74c

        • C:\Users\Admin\AppData\Local\Temp\.hta
          Filesize

          29.4MB

          MD5

          31c3b2996567f246db9e134fd2f0df7d

          SHA1

          4b7c90a53bf6b56e64fff86ba87a27aa742e9310

          SHA256

          9738aa16bc292b49423c290c09136c40d0e08727595f7e8e5a44496bb4af7228

          SHA512

          e30d7170d743a8bfe0e8b4c44d6ed82a901c0289c8f595ae18e74dc80f5a67813babb3de39f5ed72cdf522e2868024eeb467a2907d5e8056e8a7017735625613

        • C:\Users\Admin\AppData\Local\Temp\6BF4.tmp
          Filesize

          78B

          MD5

          aaec14b2de8e2fdaf8427672122af65c

          SHA1

          ca953efad669c93af85b968d747baa544d4465fb

          SHA256

          14c94c44d0eb89a820d96e1791f4b754c87ee778b5f4478289df0fb22e1c3da1

          SHA512

          a5cbad3de5070fdcd6aa7f3f5eda42b69faef44a431cf48e20ca1f4f42c648ee80bd5f1d9b981624ae6b39e2435b4278c9fd1e97491e3b244a2bba7d629021a8

        • C:\Users\Admin\AppData\Local\Temp\8E3C.tmp
          Filesize

          36B

          MD5

          c58986635c266e6c06609b908580bede

          SHA1

          4672dce03d3dd9560cf74035aff3d9aebb7201e4

          SHA256

          a2f1bb2817f976e129974b003e3ec12fb8a644c1952bb667116317fd26416042

          SHA512

          36241e4bda8ad7e4137624bbfbb999c643d34a2095ba078f9886d92f4726913bdb9dc1e1f44141a6738c1e4d9042b802e49f774c0f1c6901735f4b069834449f

        • C:\Users\Admin\AppData\Local\Temp\Cab46C3.tmp
          Filesize

          61KB

          MD5

          fc4666cbca561e864e7fdf883a9e6661

          SHA1

          2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

          SHA256

          10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

          SHA512

          c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

        • C:\Users\Admin\AppData\Local\Temp\Tar4753.tmp
          Filesize

          161KB

          MD5

          73b4b714b42fc9a6aaefd0ae59adb009

          SHA1

          efdaffd5b0ad21913d22001d91bf6c19ecb4ac41

          SHA256

          c0cf8cc04c34b5b80a2d86ad0eafb2dd71436f070c86b0321fba0201879625fd

          SHA512

          73af3c51b15f89237552b1718bef21fd80788fa416bab2cb2e7fb3a60d56249a716eda0d2dd68ab643752272640e7eaaaf57ce64bcb38373ddc3d035fb8d57cd

        • C:\Users\Admin\AppData\Local\Temp\x.dll
          Filesize

          334.4MB

          MD5

          12385eaa57c3fc38cb2e10ea348a14d0

          SHA1

          a49dfb815c67d47326f4d823ad8b79101e099754

          SHA256

          31a4be5978fffc0eadb06152d391ec6b9884c71c8956ef204dd85695e8724976

          SHA512

          dea2270662875f520325b38e4d18692cae0d4286c52dab93ba5c6fe62c34d9554743645526214960daef8cae50d0730f377bcf7ae74faacea489c3d6c037111a

        • \Users\Admin\AppData\Local\Temp\x.dll
          Filesize

          334.4MB

          MD5

          12385eaa57c3fc38cb2e10ea348a14d0

          SHA1

          a49dfb815c67d47326f4d823ad8b79101e099754

          SHA256

          31a4be5978fffc0eadb06152d391ec6b9884c71c8956ef204dd85695e8724976

          SHA512

          dea2270662875f520325b38e4d18692cae0d4286c52dab93ba5c6fe62c34d9554743645526214960daef8cae50d0730f377bcf7ae74faacea489c3d6c037111a

        • \Users\Admin\AppData\Local\Temp\x.dll
          Filesize

          334.4MB

          MD5

          12385eaa57c3fc38cb2e10ea348a14d0

          SHA1

          a49dfb815c67d47326f4d823ad8b79101e099754

          SHA256

          31a4be5978fffc0eadb06152d391ec6b9884c71c8956ef204dd85695e8724976

          SHA512

          dea2270662875f520325b38e4d18692cae0d4286c52dab93ba5c6fe62c34d9554743645526214960daef8cae50d0730f377bcf7ae74faacea489c3d6c037111a

        • memory/1652-214-0x0000000000120000-0x0000000000121000-memory.dmp
          Filesize

          4KB

        • memory/1652-212-0x00000000002F0000-0x0000000000303000-memory.dmp
          Filesize

          76KB

        • memory/1652-208-0x0000000180000000-0x0000000180014000-memory.dmp
          Filesize

          80KB

        • memory/1652-206-0x0000000001ED0000-0x0000000001F83000-memory.dmp
          Filesize

          716KB

        • memory/1652-236-0x0000000001ED0000-0x0000000001F83000-memory.dmp
          Filesize

          716KB

        • memory/1652-243-0x0000000001ED0000-0x0000000001F83000-memory.dmp
          Filesize

          716KB

        • memory/1788-201-0x0000000002510000-0x0000000002550000-memory.dmp
          Filesize

          256KB

        • memory/1788-200-0x0000000002510000-0x0000000002550000-memory.dmp
          Filesize

          256KB