Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    141s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    29/08/2023, 14:26

General

  • Target

    6dda626b8ecf2e68f2f57328a0ddfdf4297ec10f7a706574c69387fd9e136e1d.dll

  • Size

    222KB

  • MD5

    751c24642e4d160c3bddd3b007823f7b

  • SHA1

    c8c2b1e3b8ebcb868d80878e6ccfaa50d5f164b5

  • SHA256

    6dda626b8ecf2e68f2f57328a0ddfdf4297ec10f7a706574c69387fd9e136e1d

  • SHA512

    dbced184573f4c78099f8913feab796fa55381315dca9173d572841dae046d7d8afb7fab578c1ca1d85a38236e488944f0b6428787e503551b895f4f877f9e48

  • SSDEEP

    6144:lug7uSfrq53f/naaLgXwVoVXt+3HRzVOf:L3fe53naaLgXw6FIh2

Malware Config

Extracted

Family

gozi

Extracted

Family

gozi

Botnet

7244

C2

web.vortex.data.microsoft.com

ocsp.sca1b.amazontrust.com

gstatici.com

Attributes
  • build

    250167

  • dns_servers

    107.174.86.134

    107.175.127.22

  • exe_type

    loader

  • server_id

    12

rsa_pubkey.plain
serpent.plain

Signatures

  • Gozi

    Gozi is a well-known and widely distributed banking trojan.

  • Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SetWindowsHookEx 16 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\6dda626b8ecf2e68f2f57328a0ddfdf4297ec10f7a706574c69387fd9e136e1d.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2228
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\6dda626b8ecf2e68f2f57328a0ddfdf4297ec10f7a706574c69387fd9e136e1d.dll
      2⤵
        PID:2800
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2916
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2916 CREDAT:275457 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:3056
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:240
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:240 CREDAT:275457 /prefetch:2
        2⤵
        • Suspicious use of SetWindowsHookEx
        PID:1488
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2608
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2608 CREDAT:275457 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:884
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
      1⤵
      • Modifies Internet Explorer Phishing Filter
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3000
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3000 CREDAT:275457 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2856

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      1a71fa7322abd3f3b3a8837513c11c70

      SHA1

      318bb79484c3fa2d7bf98246c86a126c2997a936

      SHA256

      f49c7f798b47602e732005f40a206bf7990c691f9258abbc74880d2f35b0748c

      SHA512

      c5b81c4f01bb89af808521ee62492c9db265634c096a2d3d7ad64d341bd1ede54ac56ed6988e3a05b50c45b0b574e59222a700f6b412025e26d36ff4d3743a4a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      02878eeeebd153b2fb3c11c9f9f0b2af

      SHA1

      3ff44effccab5d8a47ad7058b52f40c0ebba4a44

      SHA256

      201f8506b56994fed4af14ba176c1e7a4072c8d958e8bf9238f65e6a287061bc

      SHA512

      7f84a6283f1d6ebb4c6f7bd6f87112ac60d4d6b3579047f5bd42b104f676c1a6267f48091e472ec00c95c0eb1df3e2a3a4d09712b2af2f3a2a3057d80e2126fd

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      cd3e375abdbcb6953a4142d7d41e2fb4

      SHA1

      efd78dc73511b16baabb56b15a83cbbee1a2278c

      SHA256

      a29328037b9d5a43a31c231e454a983bb72fc5c868a45fc4f3a0bd9a2f6115a4

      SHA512

      0554b14ac33e9616462e5a808fc972acc3c2b589a54895d16e70b1f0ef47548e1952db972884305402a1628e41db2a3481a74da27c37ab4626142ac09702e205

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      b4684395a45893a8770168ac7b76fc16

      SHA1

      b2d6ad286c01b9de84e8a9b86602e6530b79a0f0

      SHA256

      335035dbc0a1e067da5a50710b9dae8b4dbc6c9b764bbf8405426e54043b6885

      SHA512

      e0df7ec8ed19f5f37710ede3e6e71dac1c75f78b3a707e6e6ea736694343397c56f6817372bdd505638dd788de8f9f8a033a36c49773676b43ba62a694a603ad

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      d69b6376d17e9f2a4d416b7d7c5ab918

      SHA1

      bec2b18c9f5c3219a8d792f4a56e1fa27dea9e66

      SHA256

      359fb0abbb2f8031bc47e31672ae367ab03d19dd0692c879ababfdfbc7283057

      SHA512

      eb91e93fd4d183e3ab2d50ac68a925949f802c431cd455dcba76d05aff80983511b1a480e7be7317ca1d1cabd94019d190589a135219279216b14cfb340d27cc

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      598fb5192dabf00e6dc9b460f9fbb133

      SHA1

      89ae8ce4ab612e3a306d9a9c1d452ad6601c45b6

      SHA256

      e1b7d6fd947cccf09c402bd0baec0e5149edfecf5fe5940b17ebd28fe7d65258

      SHA512

      0d6bd6160b43adcf02c97bece8f2e2b847ed83cd6860fcc1c73a6d9ac55996f4036f526ecb7e82e593cdb048eeca410472b5a6d65b2703bd7edde7b11b746bff

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      e7dddde5dd8c5dbe5f8f7e82b4f61f78

      SHA1

      3a537d64427e80abcd47fbf1dfa03819d76fe93d

      SHA256

      2ec232b18593a976dea56d9d1cb17d6b31195d0eb2a376eb3b2a3c0980a3ce1a

      SHA512

      d433a96ed0ca6dc4d028e148eaee96f1999c8010424b49647182153c139184a42c8e294f1b2dcbb8bbabc3fbf03886aad4f852fa752949f21420b56b97af77d3

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      b0ef338a8ff078473a3eb225892fef57

      SHA1

      46b6ef9ee06204ec6df2537ab5c397256c885b87

      SHA256

      f947c6386e31197d56f972bb4216c17c7cb5b944904140ba7ba08ccd7d398fd5

      SHA512

      f19de3854cfb98a7b5900fae5f4b093ef72500920c2559bfe8904c8ee2c28999af4ce9f5f2d654ae61344226e497b86721b9f8ac6e2c050ce587d77580163e9c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      9cdfeaf591791497d530ece2e71b2a90

      SHA1

      d0b8eed81c5900733bb7ee02e5c3a63d3aaf8fcc

      SHA256

      5df58221366013d29a81292c78fbb463f4709ecf9b49b374f7aacbe2abaf778b

      SHA512

      4e5a03ebd8423f72799211f4db722a0d1befc3f5ace2378dc2b685181355f272b95449102853623bfa39b19498987ff0970f1cb3797cd847881516361be886ef

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      e49a4f8fe3af99344431503caea8ccc6

      SHA1

      b2151c66633df5166487d03e76e3abf6661d873b

      SHA256

      f8d8c7b9b1a8ffc88cfd867ecdd1b1006cbe00f2c5ffa36813a66ab21c3fab26

      SHA512

      a5d804149fccad9807165bf732dca7539ebb2c27d9d4e759afd28e0b65d28635f1ba0887725510dbade48c98ffe2bce41c9b1ee73e2f223721ec1c0c99846bc0

    • C:\Users\Admin\AppData\Local\Temp\CabD9FD.tmp

      Filesize

      62KB

      MD5

      3ac860860707baaf32469fa7cc7c0192

      SHA1

      c33c2acdaba0e6fa41fd2f00f186804722477639

      SHA256

      d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

      SHA512

      d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

    • C:\Users\Admin\AppData\Local\Temp\CabDB76.tmp

      Filesize

      61KB

      MD5

      f3441b8572aae8801c04f3060b550443

      SHA1

      4ef0a35436125d6821831ef36c28ffaf196cda15

      SHA256

      6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

      SHA512

      5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

    • C:\Users\Admin\AppData\Local\Temp\TarDBA9.tmp

      Filesize

      163KB

      MD5

      9441737383d21192400eca82fda910ec

      SHA1

      725e0d606a4fc9ba44aa8ffde65bed15e65367e4

      SHA256

      bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

      SHA512

      7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

    • C:\Users\Admin\AppData\Local\Temp\~DFE69DE5BDCFC905E2.TMP

      Filesize

      16KB

      MD5

      d7a7e1f7e9f16cdff04d89fdad3ecde1

      SHA1

      b9c90c1af85139748999e2efdd43a1faa6352f48

      SHA256

      dccfe795d6e2761b5a9453791964a1eb5591c47aec1876522ec6c22f4babd8fa

      SHA512

      c2c33a107a00ae46db5bc95b79d625e17bc7ee0d7f36fc1d2bb1b8af5f0c0ca4e067eb7cfbb5e9a1824857b749bdde1c5325ac42de2e35630e90438b0747c586

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\7FT11YZB.txt

      Filesize

      170B

      MD5

      a9005f6e806bcfc6f2c409117a727418

      SHA1

      0870680fa2e67c2df49eba48a25565a0230f1523

      SHA256

      5f323b6148b41d0123977065b2596338513dfadeb15a94397f6309ff7b3bddec

      SHA512

      37c315d9d84de8a83ce08f6e5ce231d61e0629d540eab8a52a7565a6abc0d01c6fae78823761dc96b2ea45b79858f1bce3396d8ce5f7dfc877f00773b0edd413

    • memory/2800-0-0x00000000001B0000-0x000000000021C000-memory.dmp

      Filesize

      432KB

    • memory/2800-14-0x00000000001B0000-0x000000000021C000-memory.dmp

      Filesize

      432KB

    • memory/2800-6-0x0000000000670000-0x0000000000672000-memory.dmp

      Filesize

      8KB

    • memory/2800-3-0x0000000000620000-0x0000000000630000-memory.dmp

      Filesize

      64KB

    • memory/2800-1-0x00000000001B0000-0x000000000021C000-memory.dmp

      Filesize

      432KB