Analysis

  • max time kernel
    151s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-10-2023 18:20

General

  • Target

    b3a2a819e27b004310e65c2b6b000cb8444b3233271a5064e5314d9580d128d3_JC.exe

  • Size

    296KB

  • MD5

    3f39517fb0f5de4ba10e72242fb6cd9a

  • SHA1

    d9c68d8110038c21b9d1c5763eab9331c2cf3b45

  • SHA256

    b3a2a819e27b004310e65c2b6b000cb8444b3233271a5064e5314d9580d128d3

  • SHA512

    c69a9438a9915724233aff2a45a25421a33d05ff2fdcaa7ffdef7dd67f2c27aa1f0894e1c0b11def837d01515dbf42931d4ac829a0ea6a40b115002e615f7ebe

  • SSDEEP

    3072:pqrRrmv3TwaCRNnA/UeXFa3mSRACC2IS/gc/LRxNuIY:QrRyvDwaCRNn4XQ2wACZgc/LR/u

Malware Config

Extracted

Family

gozi

Extracted

Family

gozi

Botnet

5050

C2

185.247.184.139

62.72.33.155

incontroler.com

Attributes
  • base_path

    /jerry/

  • build

    250260

  • exe_type

    loader

  • extension

    .bob

  • server_id

    50

rsa_pubkey.plain
aes.plain

Extracted

Family

gozi

Botnet

5050

C2

mifrutty.com

systemcheck.top

Attributes
  • base_path

    /pictures/

  • build

    250260

  • exe_type

    worker

  • extension

    .bob

  • server_id

    50

rsa_pubkey.plain
aes.plain

Signatures

  • Gozi

    Gozi is a well-known and widely distributed banking trojan.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Suspicious use of SetThreadContext 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 46 IoCs

Processes

  • C:\Windows\System32\RuntimeBroker.exe
    C:\Windows\System32\RuntimeBroker.exe -Embedding
    1⤵
      PID:3704
    • C:\Windows\System32\RuntimeBroker.exe
      C:\Windows\System32\RuntimeBroker.exe -Embedding
      1⤵
        PID:4888
      • C:\Windows\System32\RuntimeBroker.exe
        C:\Windows\System32\RuntimeBroker.exe -Embedding
        1⤵
          PID:3988
        • C:\Windows\Explorer.EXE
          C:\Windows\Explorer.EXE
          1⤵
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2632
          • C:\Users\Admin\AppData\Local\Temp\b3a2a819e27b004310e65c2b6b000cb8444b3233271a5064e5314d9580d128d3_JC.exe
            "C:\Users\Admin\AppData\Local\Temp\b3a2a819e27b004310e65c2b6b000cb8444b3233271a5064e5314d9580d128d3_JC.exe"
            2⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:2832
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2832 -s 312
              3⤵
              • Program crash
              PID:2664
          • C:\Windows\System32\mshta.exe
            "C:\Windows\System32\mshta.exe" "about:<hta:application><script>Kjwj='wscript.shell';resizeTo(0,2);eval(new ActiveXObject(Kjwj).regread('HKCU\\\Software\\AppDataLow\\Software\\Microsoft\\47C55FEA-FA41-11E9-3C6B-CED530CFE2D9\\\ActiveStart'));if(!window.flag)close()</script>"
            2⤵
            • Checks computer location settings
            • Suspicious use of WriteProcessMemory
            PID:988
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" new-alias -name dplrrfmw -value gp; new-alias -name kwgncuboo -value iex; kwgncuboo ([System.Text.Encoding]::ASCII.GetString((dplrrfmw "HKCU:Software\AppDataLow\Software\Microsoft\47C55FEA-FA41-11E9-3C6B-CED530CFE2D9").ClassFile))
              3⤵
              • Suspicious use of SetThreadContext
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious behavior: MapViewOfSection
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:4080
              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\lwi1mqbd\lwi1mqbd.cmdline"
                4⤵
                • Suspicious use of WriteProcessMemory
                PID:3720
                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                  C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES3251.tmp" "c:\Users\Admin\AppData\Local\Temp\lwi1mqbd\CSCF46D0A38AA6B4AFEB91DAD327133B380.TMP"
                  5⤵
                    PID:3872
                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                  "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\lcbjmw1c\lcbjmw1c.cmdline"
                  4⤵
                  • Suspicious use of WriteProcessMemory
                  PID:4724
                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES33F7.tmp" "c:\Users\Admin\AppData\Local\Temp\lcbjmw1c\CSC22CCE97DBA314E70A479CDE07143142D.TMP"
                    5⤵
                      PID:2656
              • C:\Windows\System32\cmd.exe
                "C:\Windows\System32\cmd.exe" /C ping localhost -n 5 && del "C:\Users\Admin\AppData\Local\Temp\b3a2a819e27b004310e65c2b6b000cb8444b3233271a5064e5314d9580d128d3_JC.exe"
                2⤵
                • Suspicious use of SetThreadContext
                • Suspicious behavior: MapViewOfSection
                • Suspicious use of WriteProcessMemory
                PID:2232
                • C:\Windows\system32\PING.EXE
                  ping localhost -n 5
                  3⤵
                  • Runs ping.exe
                  • Suspicious behavior: CmdExeWriteProcessMemorySpam
                  PID:1732
              • C:\Windows\syswow64\cmd.exe
                "C:\Windows\syswow64\cmd.exe" /C pause dll mail, ,
                2⤵
                  PID:2476
              • C:\Windows\System32\RuntimeBroker.exe
                C:\Windows\System32\RuntimeBroker.exe -Embedding
                1⤵
                  PID:4332
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2832 -ip 2832
                  1⤵
                    PID:2200

                  Network

                  MITRE ATT&CK Matrix ATT&CK v13

                  Discovery

                  Query Registry

                  1
                  T1012

                  System Information Discovery

                  2
                  T1082

                  Remote System Discovery

                  1
                  T1018

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Temp\RES3251.tmp
                    Filesize

                    1KB

                    MD5

                    6e09313520d699d2490d21c7790b994d

                    SHA1

                    d79f95452c0e64a4a3c29f7b7e7433b3e331c13f

                    SHA256

                    058c3979572d394e4546287b04802fefc4eba2423eed26320b44c5189ea82cd8

                    SHA512

                    da9fc6b3b1f8cdf50c74cef3885a6887d079a6923470335dac8a819ed71f589d92585bbc80649cc9a35eb04eda6bd8cb5aec6a7cba19b85d8b78cce8f1a798e8

                  • C:\Users\Admin\AppData\Local\Temp\RES33F7.tmp
                    Filesize

                    1KB

                    MD5

                    82f92e62399a8d79d8c140cb2e84c155

                    SHA1

                    be98a7d99bbe4b0dcf9732d0ea067fd24d608a18

                    SHA256

                    26887fe39c04e4b4b856b1bf580f3c38dc8a87ef2e74504e5f1b3ffbd5382fae

                    SHA512

                    9f6fd55f8f51ebe4ac63320d2852e447687fe93086851d139af146ef88081d309cd3119908b9853f50e7fb1df8c6a21535ce904b6d98b426cf251c79f13bcf99

                  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_vr2kzolc.bjk.ps1
                    Filesize

                    60B

                    MD5

                    d17fe0a3f47be24a6453e9ef58c94641

                    SHA1

                    6ab83620379fc69f80c0242105ddffd7d98d5d9d

                    SHA256

                    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                    SHA512

                    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                  • C:\Users\Admin\AppData\Local\Temp\lcbjmw1c\lcbjmw1c.dll
                    Filesize

                    3KB

                    MD5

                    a4fdb9bc63fa876fb038afdc8b55be98

                    SHA1

                    b6d95712e7b7596caf56fa2fadfe88a23b7649cd

                    SHA256

                    3b01958230f9c4210b8717d155d91ac7c19eb847d46bf3c655cf0235eba6b514

                    SHA512

                    0837d2e202ef93bdd31daf541b3d9d3a001851757893d5be5525fb1d97ed7591d29c18b22582b585c37b67eaad6c80a8c9d4e15e033825c5e917c0a1bf77452c

                  • C:\Users\Admin\AppData\Local\Temp\lwi1mqbd\lwi1mqbd.dll
                    Filesize

                    3KB

                    MD5

                    f68fdce6b10f5aa9a2e4ecfb78a05e75

                    SHA1

                    bf49a9dea70efb0776881a95d0fa91770b13d58d

                    SHA256

                    1ad69173a934f1e3cda70af6ed982741fb80f659231d97a24d59c45badcb42fc

                    SHA512

                    7dc3adcaaf1ab751c4a1638c381ad60febb10b642cae844f4a70378fcbce4d22fa8afdf7a1fe2ec3436e6298008e6f7931dc79dbc03c9a5426c56b0aa46ce601

                  • \??\c:\Users\Admin\AppData\Local\Temp\lcbjmw1c\CSC22CCE97DBA314E70A479CDE07143142D.TMP
                    Filesize

                    652B

                    MD5

                    cae3aa01378061778e62d00252335fca

                    SHA1

                    283e4c1c9cfe23f92511954c09c766c0ece51edb

                    SHA256

                    5d8d445ebd305cf5c21c4b3f3c3247af68974386b720a7fa90d40d5873c49c9a

                    SHA512

                    e52c647a7d568ed3b8d888ca7a9fa884b0c7768cf2bfc994126e8715dfcc40ba85889bc38c131538e358bd70df941bd2d2e064e2450e0031d95e9666b81ff0b7

                  • \??\c:\Users\Admin\AppData\Local\Temp\lcbjmw1c\lcbjmw1c.0.cs
                    Filesize

                    406B

                    MD5

                    ca8887eacd573690830f71efaf282712

                    SHA1

                    0acd4f49fc8cf6372950792402ec3aeb68569ef8

                    SHA256

                    568b0c1155379c88e91f904f4e70a3608fbf664ef890309cd705a7c5eb3232c3

                    SHA512

                    2a538a308db6c7d09224737f549d442b4c206e8e9605a2570149243ee11bf0c5f028ebf003b383f86709d0dd976ff66d15ccb700f50969ff3da64dd39cab25c7

                  • \??\c:\Users\Admin\AppData\Local\Temp\lcbjmw1c\lcbjmw1c.cmdline
                    Filesize

                    369B

                    MD5

                    d9995b155737403a03bf34f602ba39c8

                    SHA1

                    c99b64426916f254778fecb4f7d0c34a03c1c064

                    SHA256

                    18bad02af2abd8129e3f1c07cc92d94ae244a39a075b960b75204c829767643f

                    SHA512

                    8726ab05fab373adfd890e10864702c92c24f18f108246f271699c5111bb3d8dcb4f7ccb8b85eede6a19b1b986e2514dc0685a4f93d660cfc8e71ee69ab53816

                  • \??\c:\Users\Admin\AppData\Local\Temp\lwi1mqbd\CSCF46D0A38AA6B4AFEB91DAD327133B380.TMP
                    Filesize

                    652B

                    MD5

                    d0e0fcb8064c99ccdbd548e9eee8919d

                    SHA1

                    80194326bcb496f39f023cd46084b1d5da5db3ab

                    SHA256

                    ee5589674803442734ccec1606153133211aa406a376ff2cba6c161a3d15784b

                    SHA512

                    66a0532127c3f49acf247eefb5f0f640e09b194907fdf2b7582d163d8aa504c95cf47ee6b88fea3d7105a34b1f57a56b069ec98563cef67bb8a99985e731560a

                  • \??\c:\Users\Admin\AppData\Local\Temp\lwi1mqbd\lwi1mqbd.0.cs
                    Filesize

                    405B

                    MD5

                    caed0b2e2cebaecd1db50994e0c15272

                    SHA1

                    5dfac9382598e0ad2e700de4f833de155c9c65fa

                    SHA256

                    21210b9baafb8b03ab0ef625312973a77bb5aba856c91892b65826e8b7c3b150

                    SHA512

                    86dc4f8cedd37464c9c492c467375d4603715e5827dfaf7bfcfe5c46ce5e09b439139d4b0a756afa37e4c2444c5b169ac1c024217b9ba449edb183a3b53f2b62

                  • \??\c:\Users\Admin\AppData\Local\Temp\lwi1mqbd\lwi1mqbd.cmdline
                    Filesize

                    369B

                    MD5

                    1859ccd1596417d1d1e1f6b58289bbc9

                    SHA1

                    17deb3d9bcac441e22862f2bfe37a964989a0335

                    SHA256

                    89ffd1c1938aa08b3543291d5c83720b29c247a4090cd98a367418365cec6126

                    SHA512

                    98343ff48a23cc399b8025913fc8116481db2be1c3a896e6e2276d1de25037ea1377777074739c2ad6f7e0023cf3b61b50ef8d98d710a5120812cc9ee282ab2c

                  • memory/1732-119-0x0000019593F30000-0x0000019593FD4000-memory.dmp
                    Filesize

                    656KB

                  • memory/1732-121-0x0000019593D50000-0x0000019593D51000-memory.dmp
                    Filesize

                    4KB

                  • memory/1732-128-0x0000019593F30000-0x0000019593FD4000-memory.dmp
                    Filesize

                    656KB

                  • memory/2232-105-0x000002AEB3130000-0x000002AEB31D4000-memory.dmp
                    Filesize

                    656KB

                  • memory/2232-129-0x000002AEB3130000-0x000002AEB31D4000-memory.dmp
                    Filesize

                    656KB

                  • memory/2232-108-0x000002AEB2F50000-0x000002AEB2F51000-memory.dmp
                    Filesize

                    4KB

                  • memory/2476-112-0x0000000001770000-0x0000000001808000-memory.dmp
                    Filesize

                    608KB

                  • memory/2476-116-0x0000000001810000-0x0000000001811000-memory.dmp
                    Filesize

                    4KB

                  • memory/2476-124-0x0000000001770000-0x0000000001808000-memory.dmp
                    Filesize

                    608KB

                  • memory/2632-65-0x00000000084F0000-0x0000000008594000-memory.dmp
                    Filesize

                    656KB

                  • memory/2632-66-0x00000000021F0000-0x00000000021F1000-memory.dmp
                    Filesize

                    4KB

                  • memory/2632-106-0x00000000084F0000-0x0000000008594000-memory.dmp
                    Filesize

                    656KB

                  • memory/2832-4-0x0000000002550000-0x000000000255D000-memory.dmp
                    Filesize

                    52KB

                  • memory/2832-9-0x0000000000400000-0x0000000002290000-memory.dmp
                    Filesize

                    30.6MB

                  • memory/2832-3-0x0000000000400000-0x0000000002290000-memory.dmp
                    Filesize

                    30.6MB

                  • memory/2832-7-0x0000000002560000-0x0000000002660000-memory.dmp
                    Filesize

                    1024KB

                  • memory/2832-8-0x0000000002420000-0x000000000242B000-memory.dmp
                    Filesize

                    44KB

                  • memory/2832-126-0x0000000000400000-0x0000000002290000-memory.dmp
                    Filesize

                    30.6MB

                  • memory/2832-1-0x0000000002560000-0x0000000002660000-memory.dmp
                    Filesize

                    1024KB

                  • memory/2832-2-0x0000000002420000-0x000000000242B000-memory.dmp
                    Filesize

                    44KB

                  • memory/3704-113-0x0000021333600000-0x00000213336A4000-memory.dmp
                    Filesize

                    656KB

                  • memory/3704-80-0x0000021333130000-0x0000021333131000-memory.dmp
                    Filesize

                    4KB

                  • memory/3704-79-0x0000021333600000-0x00000213336A4000-memory.dmp
                    Filesize

                    656KB

                  • memory/3988-85-0x0000028FD4980000-0x0000028FD4981000-memory.dmp
                    Filesize

                    4KB

                  • memory/3988-84-0x0000028FD49C0000-0x0000028FD4A64000-memory.dmp
                    Filesize

                    656KB

                  • memory/3988-125-0x0000028FD49C0000-0x0000028FD4A64000-memory.dmp
                    Filesize

                    656KB

                  • memory/4080-33-0x0000013E2A4A0000-0x0000013E2A4B0000-memory.dmp
                    Filesize

                    64KB

                  • memory/4080-61-0x0000013E42E40000-0x0000013E42E48000-memory.dmp
                    Filesize

                    32KB

                  • memory/4080-32-0x0000013E2A4A0000-0x0000013E2A4B0000-memory.dmp
                    Filesize

                    64KB

                  • memory/4080-47-0x0000013E2A500000-0x0000013E2A508000-memory.dmp
                    Filesize

                    32KB

                  • memory/4080-77-0x0000013E42E50000-0x0000013E42E8D000-memory.dmp
                    Filesize

                    244KB

                  • memory/4080-76-0x00007FFB515D0000-0x00007FFB52091000-memory.dmp
                    Filesize

                    10.8MB

                  • memory/4080-63-0x0000013E42E50000-0x0000013E42E8D000-memory.dmp
                    Filesize

                    244KB

                  • memory/4080-31-0x0000013E2A4A0000-0x0000013E2A4B0000-memory.dmp
                    Filesize

                    64KB

                  • memory/4080-22-0x0000013E2A4B0000-0x0000013E2A4D2000-memory.dmp
                    Filesize

                    136KB

                  • memory/4080-30-0x00007FFB515D0000-0x00007FFB52091000-memory.dmp
                    Filesize

                    10.8MB

                  • memory/4332-98-0x0000026FDCF30000-0x0000026FDCF31000-memory.dmp
                    Filesize

                    4KB

                  • memory/4332-96-0x0000026FDD440000-0x0000026FDD4E4000-memory.dmp
                    Filesize

                    656KB

                  • memory/4332-130-0x0000026FDD440000-0x0000026FDD4E4000-memory.dmp
                    Filesize

                    656KB

                  • memory/4888-90-0x0000028890440000-0x00000288904E4000-memory.dmp
                    Filesize

                    656KB

                  • memory/4888-127-0x0000028890440000-0x00000288904E4000-memory.dmp
                    Filesize

                    656KB

                  • memory/4888-92-0x000002888FBE0000-0x000002888FBE1000-memory.dmp
                    Filesize

                    4KB