Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
02-10-2023 12:53
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
cb652995b061a5269f7e4f51a01c2282108c307fcddd043a0d8ceae29c795cff.dll
Resource
win7-20230831-en
windows7-x64
2 signatures
150 seconds
General
-
Target
cb652995b061a5269f7e4f51a01c2282108c307fcddd043a0d8ceae29c795cff.dll
-
Size
241KB
-
MD5
6a8250fc42834f3ee7923c6fbc419296
-
SHA1
01a8b47f3690f09665f5624bda8ec733234dd526
-
SHA256
cb652995b061a5269f7e4f51a01c2282108c307fcddd043a0d8ceae29c795cff
-
SHA512
67e7b9366d0d6e3754f501f341b820556a3dd2cc4288c1c56ff0b12285104a1d45a534f7af37bdf42ab5d843eab8b68e7fbc7d5b3233d784c6d59cf3791802e8
-
SSDEEP
6144:hwBleesZTUgRttGQn0yf5tk3Etd9F4veS:sge6aQZ5tLIe
Malware Config
Extracted
Family
gozi
Extracted
Family
gozi
Botnet
5050
C2
https://config.edge.skype.com
91.215.85.204
Attributes
-
base_path
/jerry/
-
build
250255
-
exe_type
loader
-
extension
.bob
-
server_id
50
rsa_pubkey.plain
aes.plain
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
regsvr32.exedescription pid process target process PID 3748 wrote to memory of 4924 3748 regsvr32.exe regsvr32.exe PID 3748 wrote to memory of 4924 3748 regsvr32.exe regsvr32.exe PID 3748 wrote to memory of 4924 3748 regsvr32.exe regsvr32.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\cb652995b061a5269f7e4f51a01c2282108c307fcddd043a0d8ceae29c795cff.dll1⤵
- Suspicious use of WriteProcessMemory
PID:3748 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\cb652995b061a5269f7e4f51a01c2282108c307fcddd043a0d8ceae29c795cff.dll2⤵PID:4924