Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
03-10-2023 11:55
Static task
static1
Behavioral task
behavioral1
Sample
client.exe
Resource
win7-20230831-en
General
-
Target
client.exe
-
Size
294KB
-
MD5
bb35f8c1a3236ad31c754cdfe795d57f
-
SHA1
b744f8ae31e2b3f7c3b72b9615823a3a3ad02989
-
SHA256
5cd96f6b1e6a4a172d852a7bcf5ad10bf029e135061f0ae5105f45a9920089a2
-
SHA512
fcb8f4458b7a5a4a2536a22ad55e4564ffe3d3327e4eefca10a30bc490ae29c8cc31760e07d567de53150090c84bb171209f1f3811f22d3f69545beb15edd0b0
-
SSDEEP
3072:4e6lIjmvg7aaCIg0JHk8D8uNhUqHAMMQKL2H/NHIS:4blIavYaaCIg6h/NhUDAHlH
Malware Config
Extracted
gozi
Extracted
gozi
5050
185.247.184.139
62.72.33.155
incontroler.com
-
base_path
/jerry/
-
build
250260
-
exe_type
loader
-
extension
.bob
-
server_id
50
Extracted
gozi
5050
expirew.com
whofos.com
onlinepoints.online
onlinepoints.top
-
base_path
/pictures/
-
build
250260
-
exe_type
worker
-
extension
.bob
-
server_id
50
Signatures
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2864 cmd.exe -
Drops file in System32 directory 1 IoCs
Processes:
powershell.exedescription ioc process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
powershell.exeExplorer.EXEcmd.exedescription pid process target process PID 2564 set thread context of 1236 2564 powershell.exe Explorer.EXE PID 1236 set thread context of 2864 1236 Explorer.EXE cmd.exe PID 2864 set thread context of 2076 2864 cmd.exe PING.EXE PID 1236 set thread context of 1548 1236 Explorer.EXE cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Processes:
mshta.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
Processes:
PING.EXEpid process 2076 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
client.exepowershell.exeExplorer.EXEpid process 2044 client.exe 2564 powershell.exe 1236 Explorer.EXE 1236 Explorer.EXE 1236 Explorer.EXE 1236 Explorer.EXE 1236 Explorer.EXE 1236 Explorer.EXE 1236 Explorer.EXE 1236 Explorer.EXE 1236 Explorer.EXE 1236 Explorer.EXE 1236 Explorer.EXE 1236 Explorer.EXE 1236 Explorer.EXE 1236 Explorer.EXE 1236 Explorer.EXE 1236 Explorer.EXE 1236 Explorer.EXE 1236 Explorer.EXE 1236 Explorer.EXE 1236 Explorer.EXE 1236 Explorer.EXE 1236 Explorer.EXE 1236 Explorer.EXE 1236 Explorer.EXE 1236 Explorer.EXE 1236 Explorer.EXE 1236 Explorer.EXE 1236 Explorer.EXE 1236 Explorer.EXE 1236 Explorer.EXE 1236 Explorer.EXE 1236 Explorer.EXE 1236 Explorer.EXE 1236 Explorer.EXE 1236 Explorer.EXE 1236 Explorer.EXE 1236 Explorer.EXE 1236 Explorer.EXE 1236 Explorer.EXE 1236 Explorer.EXE 1236 Explorer.EXE 1236 Explorer.EXE 1236 Explorer.EXE 1236 Explorer.EXE 1236 Explorer.EXE 1236 Explorer.EXE 1236 Explorer.EXE 1236 Explorer.EXE 1236 Explorer.EXE 1236 Explorer.EXE 1236 Explorer.EXE 1236 Explorer.EXE 1236 Explorer.EXE 1236 Explorer.EXE 1236 Explorer.EXE 1236 Explorer.EXE 1236 Explorer.EXE 1236 Explorer.EXE 1236 Explorer.EXE 1236 Explorer.EXE 1236 Explorer.EXE 1236 Explorer.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 1236 Explorer.EXE -
Suspicious behavior: MapViewOfSection 4 IoCs
Processes:
powershell.exeExplorer.EXEcmd.exepid process 2564 powershell.exe 1236 Explorer.EXE 2864 cmd.exe 1236 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 2564 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Explorer.EXEpid process 1236 Explorer.EXE -
Suspicious use of WriteProcessMemory 37 IoCs
Processes:
mshta.exepowershell.execsc.execsc.exeExplorer.EXEcmd.exedescription pid process target process PID 2496 wrote to memory of 2564 2496 mshta.exe powershell.exe PID 2496 wrote to memory of 2564 2496 mshta.exe powershell.exe PID 2496 wrote to memory of 2564 2496 mshta.exe powershell.exe PID 2564 wrote to memory of 2920 2564 powershell.exe csc.exe PID 2564 wrote to memory of 2920 2564 powershell.exe csc.exe PID 2564 wrote to memory of 2920 2564 powershell.exe csc.exe PID 2920 wrote to memory of 3044 2920 csc.exe cvtres.exe PID 2920 wrote to memory of 3044 2920 csc.exe cvtres.exe PID 2920 wrote to memory of 3044 2920 csc.exe cvtres.exe PID 2564 wrote to memory of 2300 2564 powershell.exe csc.exe PID 2564 wrote to memory of 2300 2564 powershell.exe csc.exe PID 2564 wrote to memory of 2300 2564 powershell.exe csc.exe PID 2300 wrote to memory of 892 2300 csc.exe cvtres.exe PID 2300 wrote to memory of 892 2300 csc.exe cvtres.exe PID 2300 wrote to memory of 892 2300 csc.exe cvtres.exe PID 2564 wrote to memory of 1236 2564 powershell.exe Explorer.EXE PID 2564 wrote to memory of 1236 2564 powershell.exe Explorer.EXE PID 2564 wrote to memory of 1236 2564 powershell.exe Explorer.EXE PID 1236 wrote to memory of 2864 1236 Explorer.EXE cmd.exe PID 1236 wrote to memory of 2864 1236 Explorer.EXE cmd.exe PID 1236 wrote to memory of 2864 1236 Explorer.EXE cmd.exe PID 1236 wrote to memory of 2864 1236 Explorer.EXE cmd.exe PID 1236 wrote to memory of 2864 1236 Explorer.EXE cmd.exe PID 1236 wrote to memory of 2864 1236 Explorer.EXE cmd.exe PID 2864 wrote to memory of 2076 2864 cmd.exe PING.EXE PID 2864 wrote to memory of 2076 2864 cmd.exe PING.EXE PID 2864 wrote to memory of 2076 2864 cmd.exe PING.EXE PID 2864 wrote to memory of 2076 2864 cmd.exe PING.EXE PID 1236 wrote to memory of 1548 1236 Explorer.EXE cmd.exe PID 1236 wrote to memory of 1548 1236 Explorer.EXE cmd.exe PID 1236 wrote to memory of 1548 1236 Explorer.EXE cmd.exe PID 1236 wrote to memory of 1548 1236 Explorer.EXE cmd.exe PID 1236 wrote to memory of 1548 1236 Explorer.EXE cmd.exe PID 2864 wrote to memory of 2076 2864 cmd.exe PING.EXE PID 2864 wrote to memory of 2076 2864 cmd.exe PING.EXE PID 1236 wrote to memory of 1548 1236 Explorer.EXE cmd.exe PID 1236 wrote to memory of 1548 1236 Explorer.EXE cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\client.exe"C:\Users\Admin\AppData\Local\Temp\client.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "about:<hta:application><script>Eo8e='wscript.shell';resizeTo(0,2);eval(new ActiveXObject(Eo8e).regread('HKCU\\\Software\\AppDataLow\\Software\\Microsoft\\30BA078A-CF87-E252-D964-73361DD857CA\\\TimeContact'));if(!window.flag)close()</script>"2⤵
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" new-alias -name gmjqsvbhgd -value gp; new-alias -name ddpeynnvc -value iex; ddpeynnvc ([System.Text.Encoding]::ASCII.GetString((gmjqsvbhgd "HKCU:Software\AppDataLow\Software\Microsoft\30BA078A-CF87-E252-D964-73361DD857CA").ChartText))3⤵
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\ivoxmh5l.cmdline"4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESACE3.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCACD3.tmp"5⤵
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\6c2uj06e.cmdline"4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESADCD.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCADCC.tmp"5⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C ping localhost -n 5 && del "C:\Users\Admin\AppData\Local\Temp\client.exe"2⤵
- Deletes itself
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\PING.EXEping localhost -n 53⤵
- Runs ping.exe
- Suspicious behavior: CmdExeWriteProcessMemorySpam
-
C:\Windows\syswow64\cmd.exe"C:\Windows\syswow64\cmd.exe" /C pause dll mail, ,2⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\6c2uj06e.dllFilesize
3KB
MD58166a5981a068dbe3324938c6ec89e99
SHA1a398bd438654f600e064d96915891c25911fe268
SHA2567be9db505661c4df909621261bb411336ad916fc65e26f35c7a8e183aad1d099
SHA5123d59ba9b9cdba8705f4c708da5bc5924c8a34c307ac2c573d66037095c948e228147d15aa44819d7d4bd41f170e13747685c89bae3a2ae4f49e1f0b863976861
-
C:\Users\Admin\AppData\Local\Temp\6c2uj06e.pdbFilesize
7KB
MD58a375c2ca7d2a6ac408c05778d3fe0b1
SHA1a688c3af312e824b3efbd60327814106c3783fb0
SHA2562580775f1f4b765f5db97e97c1b2e53852d0553fbaa696ee6661c210bd9db139
SHA5127def59bc8f8c141778dff0015d887fa007a984b6bff2185d8d093650e1de085245bc9d53e2e0d54aa650f3b73487385b909592a0da7e3b1f26fd479d1dc6e410
-
C:\Users\Admin\AppData\Local\Temp\RESACE3.tmpFilesize
1KB
MD5de5c4f8375f6622e6beca1a8c478db35
SHA11df837bb8ecfef5cb873fd0ca2f0e03e4ac4e6bf
SHA256dc6da79dafa5b5e63005587cb33f7a75f4fe11f7ade703808daaeed53e666c7e
SHA512a2062185ab55dcb059ee182771cb64749caae28707b5e4119181b586453cb591fa26805aacbc94c4c3cd7ea8f76507920cf790533e697cf00cce39176a44d75d
-
C:\Users\Admin\AppData\Local\Temp\RESADCD.tmpFilesize
1KB
MD5ec549c4cf31669d270f2234fd5c1c6be
SHA1759ba1a47bb516d3ae8df8be76c783129a689b31
SHA25619c25b08ce9964a2cd904a110be54666ae89374c236fd12a0d6433a72e5ac787
SHA5127d58de3c96146b0d684fa0a7b5ff6ede9ceb26843eaec0b8e1b276cce810f57b092df042c52639604fed9e0a2e903cdf7246a63c4ae069a74287dc24d5df6148
-
C:\Users\Admin\AppData\Local\Temp\ivoxmh5l.dllFilesize
3KB
MD58294bbc6bd8811f7edd6a98fa979f5b3
SHA1261a76ab18c35f7dd132ed980f94e001aef0d82e
SHA256fa87b663ed50cd82edc533f5132f89174e8590d1bf11017949569f7cd0386ea4
SHA51243aa6ad55a5332a62bdfd357e3e295f1071cdde3237f8458e75098da05a89b174c8ddf7539f4a448cbb3639c7b5094df063a47133af65dddc10610b5cf544c4d
-
C:\Users\Admin\AppData\Local\Temp\ivoxmh5l.pdbFilesize
7KB
MD54658eebf69f06cb1b4782cfae1c17cfa
SHA1fb2c0744d571cbde71cf489f710f1b3252df0710
SHA2564edb2a8e847c7840cccc3b3bc9f4378601635656a5fdaeafbc5bae88d78304f7
SHA5121b3624f754b6a55bd6de7234b2c93b5b41043f8120abecb6ff64d5afa699ccf53fdcddefada211c2ce369f8dd271676df3184624b503b16105eb540003670e2e
-
\??\c:\Users\Admin\AppData\Local\Temp\6c2uj06e.0.csFilesize
406B
MD5ca8887eacd573690830f71efaf282712
SHA10acd4f49fc8cf6372950792402ec3aeb68569ef8
SHA256568b0c1155379c88e91f904f4e70a3608fbf664ef890309cd705a7c5eb3232c3
SHA5122a538a308db6c7d09224737f549d442b4c206e8e9605a2570149243ee11bf0c5f028ebf003b383f86709d0dd976ff66d15ccb700f50969ff3da64dd39cab25c7
-
\??\c:\Users\Admin\AppData\Local\Temp\6c2uj06e.cmdlineFilesize
309B
MD50ce5de90233d8966af9af1fa04736b03
SHA195274fbd2b2fead15a5227abab0e7e320b453d65
SHA256d2be811e796d478b91658850a565691fe2e45104af4245871d2b71da52dce037
SHA512a6840b47a36501a1526375c50d92cc63550e132b7cfba78fe13a9a79d14d5fbef35b04a089e4314f4afc8045caa66d12d55e78e70242cf31648b4f51c125a715
-
\??\c:\Users\Admin\AppData\Local\Temp\CSCACD3.tmpFilesize
652B
MD550765690e9efdb5992697d042c17930f
SHA1b627d95ffcd39283f79447cd4bb45eec3c736857
SHA25670c473ee2e4e9f8aa649643dc322a371026e73c2648e5a696b1fa8bf84159143
SHA512a41e397e68ccf85d6008e487c645ea7b314633308aebb4e6a7effa37e55d47a0319f66396968699895eb61671ae5038fe355de630ba72c955d241ad1d73f9868
-
\??\c:\Users\Admin\AppData\Local\Temp\CSCADCC.tmpFilesize
652B
MD528a8bf7ca8bdb1e296f0ddcb1605407e
SHA1d50907c38baa3f270e1c42e3739a15be421d3d6f
SHA2567c8678b7aaa35021332a74f47eacbc0fcaadc0c867ac2799111d79f4f36f8783
SHA5123ebbc36a7ff8093510f5cd3511f5c19d9e36d1150b360d6cf56d574dc55d198df9509ee6afea43da64ad40c84448fd23f19cf3d44a8a0d5d2d357bbfb75b3270
-
\??\c:\Users\Admin\AppData\Local\Temp\ivoxmh5l.0.csFilesize
405B
MD5caed0b2e2cebaecd1db50994e0c15272
SHA15dfac9382598e0ad2e700de4f833de155c9c65fa
SHA25621210b9baafb8b03ab0ef625312973a77bb5aba856c91892b65826e8b7c3b150
SHA51286dc4f8cedd37464c9c492c467375d4603715e5827dfaf7bfcfe5c46ce5e09b439139d4b0a756afa37e4c2444c5b169ac1c024217b9ba449edb183a3b53f2b62
-
\??\c:\Users\Admin\AppData\Local\Temp\ivoxmh5l.cmdlineFilesize
309B
MD538b3fb4586bd95934f5926959b775dc8
SHA1e229fd35575c007e28be4acf2d8a20058f698660
SHA256bb0578f1db99467dfe94b35411adad6344dd76949b280018e6fb6ffb52e1f242
SHA5129600fbcfe83bd5be91f4a5303a2dfc580655b8fc251d794095eeb690d7a8023914022d18f3bf6cf11f9b7db32f82c7982152cf5f08f3676ff68c8051918bd645
-
memory/1236-58-0x0000000007130000-0x00000000071D4000-memory.dmpFilesize
656KB
-
memory/1236-91-0x0000000007130000-0x00000000071D4000-memory.dmpFilesize
656KB
-
memory/1236-59-0x0000000002BC0000-0x0000000002BC1000-memory.dmpFilesize
4KB
-
memory/1548-90-0x0000000001C60000-0x0000000001CF8000-memory.dmpFilesize
608KB
-
memory/1548-86-0x00000000001B0000-0x00000000001B1000-memory.dmpFilesize
4KB
-
memory/1548-83-0x0000000001C60000-0x0000000001CF8000-memory.dmpFilesize
608KB
-
memory/2044-11-0x0000000003E50000-0x0000000003E52000-memory.dmpFilesize
8KB
-
memory/2044-1-0x0000000002340000-0x0000000002440000-memory.dmpFilesize
1024KB
-
memory/2044-9-0x0000000000400000-0x0000000002290000-memory.dmpFilesize
30.6MB
-
memory/2044-8-0x0000000000220000-0x000000000022B000-memory.dmpFilesize
44KB
-
memory/2044-7-0x0000000002340000-0x0000000002440000-memory.dmpFilesize
1024KB
-
memory/2044-4-0x0000000000240000-0x000000000024D000-memory.dmpFilesize
52KB
-
memory/2044-3-0x0000000000400000-0x0000000002290000-memory.dmpFilesize
30.6MB
-
memory/2044-2-0x0000000000220000-0x000000000022B000-memory.dmpFilesize
44KB
-
memory/2076-77-0x000007FFFFFDB000-0x000007FFFFFDC000-memory.dmpFilesize
4KB
-
memory/2076-80-0x0000000000180000-0x0000000000181000-memory.dmpFilesize
4KB
-
memory/2076-92-0x0000000001BE0000-0x0000000001C84000-memory.dmpFilesize
656KB
-
memory/2076-78-0x0000000001BE0000-0x0000000001C84000-memory.dmpFilesize
656KB
-
memory/2300-45-0x0000000002140000-0x00000000021C0000-memory.dmpFilesize
512KB
-
memory/2564-20-0x0000000002690000-0x0000000002710000-memory.dmpFilesize
512KB
-
memory/2564-18-0x000007FEF53F0000-0x000007FEF5D8D000-memory.dmpFilesize
9.6MB
-
memory/2564-62-0x000007FEF53F0000-0x000007FEF5D8D000-memory.dmpFilesize
9.6MB
-
memory/2564-68-0x000007FEF53F0000-0x000007FEF5D8D000-memory.dmpFilesize
9.6MB
-
memory/2564-69-0x00000000029A0000-0x00000000029DD000-memory.dmpFilesize
244KB
-
memory/2564-16-0x000000001B280000-0x000000001B562000-memory.dmpFilesize
2.9MB
-
memory/2564-17-0x0000000001F40000-0x0000000001F48000-memory.dmpFilesize
32KB
-
memory/2564-57-0x00000000029A0000-0x00000000029DD000-memory.dmpFilesize
244KB
-
memory/2564-54-0x0000000002980000-0x0000000002988000-memory.dmpFilesize
32KB
-
memory/2564-37-0x0000000002960000-0x0000000002968000-memory.dmpFilesize
32KB
-
memory/2564-22-0x0000000002690000-0x0000000002710000-memory.dmpFilesize
512KB
-
memory/2564-21-0x000007FEF53F0000-0x000007FEF5D8D000-memory.dmpFilesize
9.6MB
-
memory/2564-19-0x0000000002690000-0x0000000002710000-memory.dmpFilesize
512KB
-
memory/2864-71-0x0000000001B80000-0x0000000001C24000-memory.dmpFilesize
656KB
-
memory/2864-72-0x00000000001A0000-0x00000000001A1000-memory.dmpFilesize
4KB
-
memory/2864-70-0x000007FFFFFDA000-0x000007FFFFFDB000-memory.dmpFilesize
4KB
-
memory/2864-93-0x0000000001B80000-0x0000000001C24000-memory.dmpFilesize
656KB