Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    03-10-2023 12:15

General

  • Target

    client.exe

  • Size

    295KB

  • MD5

    ed017c0f334b6d10ac5aca77fe7f9a2a

  • SHA1

    de7a838cbf418f5c093e5bed00254c4c68b82fa7

  • SHA256

    9f710a0fc0cadbf3378c06ca4fefa2486bdf04646201f9efec7cd5a4c97634b4

  • SHA512

    e7210ef6cfb8b9cad8078b8bdc4331eba04c9b7bd87b1aadce8c84560035fe4725161dceaca03608f10f7e02de7120c6dbf345c0ac69c72d5613e85080f58316

  • SSDEEP

    3072:Az6N1tmvikka83g9IGkpt4fMlw5mlg9eidid74+VONrRrCS:bN1cvBka83g9PkUf55B++1r

Malware Config

Extracted

Family

gozi

Extracted

Family

gozi

Botnet

5050

C2

185.247.184.139

62.72.33.155

incontroler.com

Attributes
  • base_path

    /jerry/

  • build

    250260

  • exe_type

    loader

  • extension

    .bob

  • server_id

    50

rsa_pubkey.plain
aes.plain

Extracted

Family

gozi

Botnet

5050

C2

expirew.com

whofos.com

onlinepoints.online

onlinepoints.top

Attributes
  • base_path

    /pictures/

  • exe_type

    worker

  • extension

    .bob

  • server_id

    50

rsa_pubkey.plain
aes.plain

Signatures

  • Gozi

    Gozi is a well-known and widely distributed banking trojan.

  • Deletes itself 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1268
    • C:\Users\Admin\AppData\Local\Temp\client.exe
      "C:\Users\Admin\AppData\Local\Temp\client.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:1260
    • C:\Windows\System32\mshta.exe
      "C:\Windows\System32\mshta.exe" "about:<hta:application><script>M3av='wscript.shell';resizeTo(0,2);eval(new ActiveXObject(M3av).regread('HKCU\\\Software\\AppDataLow\\Software\\Microsoft\\C846A6CB-873B-3AC3-517C-AB0E15700F22\\\ContactClass'));if(!window.flag)close()</script>"
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of WriteProcessMemory
      PID:2620
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" new-alias -name ucnsprop -value gp; new-alias -name sqifwrtfk -value iex; sqifwrtfk ([System.Text.Encoding]::ASCII.GetString((ucnsprop "HKCU:Software\AppDataLow\Software\Microsoft\C846A6CB-873B-3AC3-517C-AB0E15700F22").AboutWhite))
        3⤵
        • Drops file in System32 directory
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2516
        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe
          "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\7qeuww5t.cmdline"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2840
          • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
            C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESC488.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCC487.tmp"
            5⤵
              PID:2880
          • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe
            "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\flxdslz3.cmdline"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2892
            • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
              C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESC534.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCC533.tmp"
              5⤵
                PID:1540
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe" /C ping localhost -n 5 && del "C:\Users\Admin\AppData\Local\Temp\client.exe"
          2⤵
          • Deletes itself
          • Suspicious use of SetThreadContext
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          PID:772
          • C:\Windows\system32\PING.EXE
            ping localhost -n 5
            3⤵
            • Runs ping.exe
            • Suspicious behavior: CmdExeWriteProcessMemorySpam
            PID:2876
        • C:\Windows\syswow64\cmd.exe
          "C:\Windows\syswow64\cmd.exe" /C pause dll mail, ,
          2⤵
            PID:1356

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\7qeuww5t.dll
          Filesize

          3KB

          MD5

          8e3b8aabff7d6d4eb44235dd668e386c

          SHA1

          856e81f2a4dfee26ca004a9ede473b1c54db3681

          SHA256

          1b0ff1514a0e490dc82ca83ef94af67d1e87e1de9949395cc1a37ff3ed07eda9

          SHA512

          2e1708fa4c78c1a0459c63261456abb8036511dd30f5b2552aab2204212da2298292186cc0df31f120117f7b5b5d8f369515b0b8499368b1d8ac1052086c7bb7

        • C:\Users\Admin\AppData\Local\Temp\7qeuww5t.pdb
          Filesize

          7KB

          MD5

          585f03e7b5341776a7981cc117c39b15

          SHA1

          1eb86ed870ce56625c07addc837374c4360e8ebc

          SHA256

          60ee86a33f94144fbf04f66fe608261f028d97018d5992470e01c5f652539e36

          SHA512

          5132d0c90c8cfcf3d6806c89634b700446ab11ac924b2f511cee0d95267804b4ab71216eb2f14242ca3644db16a69ae38726729dd2ec943019793d6d8df2f2fa

        • C:\Users\Admin\AppData\Local\Temp\RESC488.tmp
          Filesize

          1KB

          MD5

          0f55801f6ac94a218944cb12f223c8e1

          SHA1

          47660a0915469103bd8a4b2e12043f11ff573d6e

          SHA256

          626bb662b523b86c520c185db830a46836befae4e4d0813bd839afef0b26941d

          SHA512

          f0c90f3b714de52ae37af064511b578a4820dfa268d7229ab7b7d4e39a0c622a2733967b7d4c4c439a12432de5d85156d96be4fcf7c5339dc71ffa9c973f7786

        • C:\Users\Admin\AppData\Local\Temp\RESC534.tmp
          Filesize

          1KB

          MD5

          30b9b41f8089ad9f238efbb79debc001

          SHA1

          2101002126e2d13d5258b96696b9a0447cd13e8e

          SHA256

          5178dba4786ff49578fbb457bb1caddf38a1ce54e8eccce7ab61550b57d0cf23

          SHA512

          91e30a35ee29d21c8d61a5186af95ef32021e343f5ab414b76b8c5845608be6757a66b2c4714017f80f9d0ddc3cb8a636d10754ffd4665c6b632d3fc643a667c

        • C:\Users\Admin\AppData\Local\Temp\flxdslz3.dll
          Filesize

          3KB

          MD5

          6582e02f4af9439e8790d03662d0d634

          SHA1

          24117c043347fbfaf3959c5dbb707881ff38125b

          SHA256

          357c8897d6669b54e43e0799ed8f794b7e9710396fab3ac3ee0e4b138afe2a7b

          SHA512

          2f126cccea6f7b382c6a1d1baf59e66e3d8682898bf32d83650acda3c74b0c3be38584556b8a0f74cb956750462adb7b47535f0930906a839ee53f8972f24def

        • C:\Users\Admin\AppData\Local\Temp\flxdslz3.pdb
          Filesize

          7KB

          MD5

          cb2411954f58ec5e786fa411f44412f1

          SHA1

          acea6060ee7850f25ad36625f03a5c62c86d77c0

          SHA256

          4a15395017f1ad895d2c5f062308453d549e53e9feff70abd63236ba5479ada4

          SHA512

          d0d84563ae44da8f24717f9680d3146fafc57b481dcb90255ccf015b73f927c15fd8fa3ee94f7cf365f47cc0ddb64c503434e719d83201f82a439eac062773c3

        • \??\c:\Users\Admin\AppData\Local\Temp\7qeuww5t.0.cs
          Filesize

          405B

          MD5

          caed0b2e2cebaecd1db50994e0c15272

          SHA1

          5dfac9382598e0ad2e700de4f833de155c9c65fa

          SHA256

          21210b9baafb8b03ab0ef625312973a77bb5aba856c91892b65826e8b7c3b150

          SHA512

          86dc4f8cedd37464c9c492c467375d4603715e5827dfaf7bfcfe5c46ce5e09b439139d4b0a756afa37e4c2444c5b169ac1c024217b9ba449edb183a3b53f2b62

        • \??\c:\Users\Admin\AppData\Local\Temp\7qeuww5t.cmdline
          Filesize

          309B

          MD5

          aabc820b071b9615281b1bd7e78d3777

          SHA1

          618b2545157f4dc015bda151b812ae2a9675283b

          SHA256

          426cd5f4821199b58575ff40bc22c253b0386dabf73af999e3f75fcd074bcdfa

          SHA512

          b49b0f1d693a5edb623b03b29d9af5efe181f4f4639fee8dd227c98bcd6dcdbdcae8839497102b36b90f96fc248a5c2b8f8d58f2320913770533f58d8a863fe2

        • \??\c:\Users\Admin\AppData\Local\Temp\CSCC487.tmp
          Filesize

          652B

          MD5

          229462c326101192a11f96c24aebaad4

          SHA1

          e2c86a921e922c1a1e5072efdccd143f7ab52e0a

          SHA256

          9e4ee7bffa9a16f6b8e549b45ecc7d580e4331e8135394efbc6df2aec3f671fc

          SHA512

          36f99373ff7f9239ae51cdf7242e2aa346e2d67e12c17aa987c95bf5f68a22eb10a20e282f674bd08dcd261e34dc2fe674707bc4874c8af2a122b115ec00ecc9

        • \??\c:\Users\Admin\AppData\Local\Temp\CSCC533.tmp
          Filesize

          652B

          MD5

          6a0cbfb626bbb6f13f30ac870df470fe

          SHA1

          f747a816fdb7ef58c1e3ed76b017f7e761829c6d

          SHA256

          2e22f42464966b7b3f20ea786d369e63924a7b21acd4a5ceec2a75dda8c02f33

          SHA512

          fc73a6573cdc0c7ed44420d15a62aca2fb0d2d3f1444ea4420c9d3fef457fe71be8e8b8a3e14c7cc45b718bc13fa0009fd73b021d05fd287718536574865c7bb

        • \??\c:\Users\Admin\AppData\Local\Temp\flxdslz3.0.cs
          Filesize

          406B

          MD5

          ca8887eacd573690830f71efaf282712

          SHA1

          0acd4f49fc8cf6372950792402ec3aeb68569ef8

          SHA256

          568b0c1155379c88e91f904f4e70a3608fbf664ef890309cd705a7c5eb3232c3

          SHA512

          2a538a308db6c7d09224737f549d442b4c206e8e9605a2570149243ee11bf0c5f028ebf003b383f86709d0dd976ff66d15ccb700f50969ff3da64dd39cab25c7

        • \??\c:\Users\Admin\AppData\Local\Temp\flxdslz3.cmdline
          Filesize

          309B

          MD5

          a53f09259d7f821801e5c647ebc924a5

          SHA1

          bfe587a32662a28e774b7c1a7ae96afe19dc53b9

          SHA256

          8c74933ef2a91cf33f701d1a453fef3a1a8ee41238e1016f9453b3441c31d836

          SHA512

          55a26494dbcae273908e7d2dfddc9f372371138b0d9243963203480f6f3d850f19440f4d7f9093fa788a5d8401ea1516114fe72ddb204cd3de99566188e9b534

        • memory/772-68-0x000007FFFFFDF000-0x000007FFFFFE0000-memory.dmp
          Filesize

          4KB

        • memory/772-70-0x0000000000210000-0x0000000000211000-memory.dmp
          Filesize

          4KB

        • memory/772-69-0x0000000001CB0000-0x0000000001DE4000-memory.dmp
          Filesize

          1.2MB

        • memory/772-84-0x0000000001CB0000-0x0000000001DE4000-memory.dmp
          Filesize

          1.2MB

        • memory/1260-1-0x00000000023F0000-0x00000000024F0000-memory.dmp
          Filesize

          1024KB

        • memory/1260-11-0x0000000003D90000-0x0000000003D92000-memory.dmp
          Filesize

          8KB

        • memory/1260-8-0x0000000000400000-0x0000000002290000-memory.dmp
          Filesize

          30.6MB

        • memory/1260-7-0x00000000023F0000-0x00000000024F0000-memory.dmp
          Filesize

          1024KB

        • memory/1260-4-0x00000000002C0000-0x00000000002CD000-memory.dmp
          Filesize

          52KB

        • memory/1260-3-0x0000000000220000-0x000000000022B000-memory.dmp
          Filesize

          44KB

        • memory/1260-2-0x0000000000400000-0x0000000002290000-memory.dmp
          Filesize

          30.6MB

        • memory/1268-57-0x0000000009090000-0x00000000091C4000-memory.dmp
          Filesize

          1.2MB

        • memory/1268-58-0x0000000002AC0000-0x0000000002AC1000-memory.dmp
          Filesize

          4KB

        • memory/1268-85-0x0000000009090000-0x00000000091C4000-memory.dmp
          Filesize

          1.2MB

        • memory/2516-20-0x0000000002990000-0x0000000002A10000-memory.dmp
          Filesize

          512KB

        • memory/2516-19-0x0000000002990000-0x0000000002A10000-memory.dmp
          Filesize

          512KB

        • memory/2516-56-0x0000000002B90000-0x0000000002BCD000-memory.dmp
          Filesize

          244KB

        • memory/2516-36-0x0000000002780000-0x0000000002788000-memory.dmp
          Filesize

          32KB

        • memory/2516-18-0x000000001B2D0000-0x000000001B5B2000-memory.dmp
          Filesize

          2.9MB

        • memory/2516-61-0x000007FEF5670000-0x000007FEF600D000-memory.dmp
          Filesize

          9.6MB

        • memory/2516-53-0x0000000002790000-0x0000000002798000-memory.dmp
          Filesize

          32KB

        • memory/2516-67-0x000007FEF5670000-0x000007FEF600D000-memory.dmp
          Filesize

          9.6MB

        • memory/2516-21-0x00000000023E0000-0x00000000023E8000-memory.dmp
          Filesize

          32KB

        • memory/2516-22-0x0000000002990000-0x0000000002A10000-memory.dmp
          Filesize

          512KB

        • memory/2516-75-0x0000000002B90000-0x0000000002BCD000-memory.dmp
          Filesize

          244KB

        • memory/2516-17-0x000007FEF5670000-0x000007FEF600D000-memory.dmp
          Filesize

          9.6MB

        • memory/2876-77-0x00000000004B0000-0x00000000005E4000-memory.dmp
          Filesize

          1.2MB

        • memory/2876-78-0x0000000000280000-0x0000000000281000-memory.dmp
          Filesize

          4KB

        • memory/2876-83-0x00000000004B0000-0x00000000005E4000-memory.dmp
          Filesize

          1.2MB

        • memory/2876-76-0x000007FFFFFD5000-0x000007FFFFFD6000-memory.dmp
          Filesize

          4KB

        • memory/2892-47-0x0000000002250000-0x00000000022D0000-memory.dmp
          Filesize

          512KB