Analysis
-
max time kernel
29s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
01-06-2023 17:48
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
file.dll
Resource
win7-20230220-en
windows7-x64
2 signatures
150 seconds
General
-
Target
file.dll
-
Size
362KB
-
MD5
3969d9062eb2daef1872aaf898636f08
-
SHA1
7922117847dcda90de4d8fbaaa5613076b959115
-
SHA256
7ce0babea43a0eca93ed5458b77df1cd695f672e8dd784d8ff0af777b66e7865
-
SHA512
c88f6d7f3cea5dbc8341ad4a7f6c6fc197a6b9f30b807a2eb61ab9cf33d3f607f4ddd04e91eb461edf9842062319f60bbdf6d9f964f3fc20748c748734437bf4
-
SSDEEP
3072:QmNJTdnsnRNulFiOxyioF2XfSGXbR4cFekbhO6r253I0rSis6bGCKLb1TASh8mU+:2MtTX3hdrCk6bGRL5TASh8mUUJaM
Malware Config
Extracted
Family
gozi
Extracted
Family
gozi
Botnet
20000
C2
chick.bing.com
http://79.132.129.207
http://94.247.42.106
http://94.247.42.79
http://185.212.44.76
http://45.155.249.200
http://45.155.250.216
Attributes
-
base_path
/zerotohero/
-
build
250257
-
exe_type
loader
-
extension
.asi
-
server_id
50
rsa_pubkey.plain
aes.plain
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
regsvr32.exedescription pid process target process PID 2040 wrote to memory of 1096 2040 regsvr32.exe regsvr32.exe PID 2040 wrote to memory of 1096 2040 regsvr32.exe regsvr32.exe PID 2040 wrote to memory of 1096 2040 regsvr32.exe regsvr32.exe PID 2040 wrote to memory of 1096 2040 regsvr32.exe regsvr32.exe PID 2040 wrote to memory of 1096 2040 regsvr32.exe regsvr32.exe PID 2040 wrote to memory of 1096 2040 regsvr32.exe regsvr32.exe PID 2040 wrote to memory of 1096 2040 regsvr32.exe regsvr32.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1096-54-0x00000000001D0000-0x00000000001DF000-memory.dmpFilesize
60KB
-
memory/1096-58-0x0000000000220000-0x000000000022E000-memory.dmpFilesize
56KB
-
memory/1096-63-0x00000000001C0000-0x00000000001CD000-memory.dmpFilesize
52KB
-
memory/1096-64-0x0000000000250000-0x000000000025D000-memory.dmpFilesize
52KB