Analysis
-
max time kernel
30s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
08-06-2023 22:14
Static task
static1
Behavioral task
behavioral1
Sample
1.exe
Resource
win7-20230220-en
windows7-x64
4 signatures
150 seconds
General
-
Target
1.exe
-
Size
617.3MB
-
MD5
66bd2a1dd8540c9d7281d1e36cee0c1b
-
SHA1
7407f62b80f1ce48f4a9500e82a6370faf689025
-
SHA256
63827113192d02e81371453ef61c3882b1f0abca89459ea78d6baa31bc2fe83d
-
SHA512
feb5ea41e05d59568115c8fef6fde731d030eb056c9e033a354e8c53a009bb65db86d9cdff6ae3bf5ea6938ed90fab233e0716f604cf2f366fae0e3848730db0
-
SSDEEP
12288:6pWvULtx0eFQ4+zoL/sB14b/FmQxXXzb9wZptR4b9wZptRUyoIOJ:6pTx5FQ5oL/sB1cFm8X9yi9ygP
Malware Config
Extracted
Family
gozi
Extracted
Family
gozi
Botnet
555756
C2
http://logonn.biinng.com
http://78.153.130.9
http://llogiin.biinng.com
http://45.15.157.239
Attributes
-
base_path
/zerotohero/
-
build
250257
-
exe_type
loader
-
extension
.asi
-
server_id
50
rsa_pubkey.plain
aes.plain
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1300 set thread context of 1144 1300 1.exe 28 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1300 1.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1300 wrote to memory of 1144 1300 1.exe 28 PID 1300 wrote to memory of 1144 1300 1.exe 28 PID 1300 wrote to memory of 1144 1300 1.exe 28 PID 1300 wrote to memory of 1144 1300 1.exe 28 PID 1300 wrote to memory of 1144 1300 1.exe 28 PID 1300 wrote to memory of 1144 1300 1.exe 28 PID 1300 wrote to memory of 1144 1300 1.exe 28 PID 1300 wrote to memory of 1144 1300 1.exe 28 PID 1300 wrote to memory of 1144 1300 1.exe 28 PID 1300 wrote to memory of 1144 1300 1.exe 28 PID 1300 wrote to memory of 1144 1300 1.exe 28 PID 1300 wrote to memory of 1144 1300 1.exe 28 PID 1300 wrote to memory of 1144 1300 1.exe 28 PID 1300 wrote to memory of 1144 1300 1.exe 28 PID 1300 wrote to memory of 1144 1300 1.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵PID:1144
-