Resubmissions
06-10-2023 00:32
231006-avxlbaac38 1006-10-2023 00:31
231006-at7pwsgb5s 1005-10-2023 16:10
231005-tmvxasec87 10Analysis
-
max time kernel
151s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
05-10-2023 16:10
Static task
static1
Behavioral task
behavioral1
Sample
7665e793186c3c83ec2c2c69adaee5e81ec60d395d8714921352296a5ab88ae6.exe
Resource
win7-20230831-en
General
-
Target
7665e793186c3c83ec2c2c69adaee5e81ec60d395d8714921352296a5ab88ae6.exe
-
Size
304KB
-
MD5
a3f4c907a088c99a8b7bf5f4280d7d0c
-
SHA1
9a9297bd0af1c008eb7477c1e310ce70c30c6d56
-
SHA256
7665e793186c3c83ec2c2c69adaee5e81ec60d395d8714921352296a5ab88ae6
-
SHA512
106a0a4275a421a6dbef6c43e76921e6eae1aca5f6d960f823763a3127b7ebf826c626da460db82451aba4a94c32c8c198d6871b0a2c6de7d96c937384e92f9b
-
SSDEEP
6144:Oo+91vDNpa6NK56upTHirwtc3nhBvjQOR/Oz2IHTN+:ONDLu4K56u1HqfhBvjQOWz2W
Malware Config
Extracted
gozi
Extracted
gozi
5050
mifrutty.com
-
base_path
/jerry/
-
build
250260
-
exe_type
loader
-
extension
.bob
-
server_id
50
Extracted
gozi
5050
mifrutty.com
systemcheck.top
-
base_path
/pictures/
-
build
250260
-
exe_type
worker
-
extension
.bob
-
server_id
50
Signatures
-
Dave packer 1 IoCs
Detects executable using a packer named 'Dave' by the community, based on a string at the end.
Processes:
resource yara_rule behavioral2/memory/4700-1-0x0000000002A70000-0x0000000002A7C000-memory.dmp dave -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
mshta.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation mshta.exe -
Suspicious use of SetThreadContext 7 IoCs
Processes:
powershell.exeExplorer.EXEcmd.exedescription pid process target process PID 4800 set thread context of 3144 4800 powershell.exe Explorer.EXE PID 3144 set thread context of 3768 3144 Explorer.EXE RuntimeBroker.exe PID 3144 set thread context of 3304 3144 Explorer.EXE RuntimeBroker.exe PID 3144 set thread context of 4852 3144 Explorer.EXE RuntimeBroker.exe PID 3144 set thread context of 3884 3144 Explorer.EXE cmd.exe PID 3144 set thread context of 1328 3144 Explorer.EXE cmd.exe PID 3884 set thread context of 992 3884 cmd.exe PING.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
Processes:
PING.EXEpid process 992 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
7665e793186c3c83ec2c2c69adaee5e81ec60d395d8714921352296a5ab88ae6.exepowershell.exeExplorer.EXEpid process 4700 7665e793186c3c83ec2c2c69adaee5e81ec60d395d8714921352296a5ab88ae6.exe 4700 7665e793186c3c83ec2c2c69adaee5e81ec60d395d8714921352296a5ab88ae6.exe 4800 powershell.exe 4800 powershell.exe 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 3144 Explorer.EXE -
Suspicious behavior: MapViewOfSection 7 IoCs
Processes:
powershell.exeExplorer.EXEcmd.exepid process 4800 powershell.exe 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3884 cmd.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
Processes:
powershell.exeExplorer.EXERuntimeBroker.exedescription pid process Token: SeDebugPrivilege 4800 powershell.exe Token: SeShutdownPrivilege 3144 Explorer.EXE Token: SeCreatePagefilePrivilege 3144 Explorer.EXE Token: SeShutdownPrivilege 3144 Explorer.EXE Token: SeCreatePagefilePrivilege 3144 Explorer.EXE Token: SeShutdownPrivilege 3768 RuntimeBroker.exe Token: SeShutdownPrivilege 3144 Explorer.EXE Token: SeCreatePagefilePrivilege 3144 Explorer.EXE Token: SeShutdownPrivilege 3768 RuntimeBroker.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Explorer.EXEpid process 3144 Explorer.EXE -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
Explorer.EXEpid process 3144 Explorer.EXE -
Suspicious use of WriteProcessMemory 42 IoCs
Processes:
mshta.exepowershell.execsc.execsc.exeExplorer.EXEcmd.exedescription pid process target process PID 4632 wrote to memory of 4800 4632 mshta.exe powershell.exe PID 4632 wrote to memory of 4800 4632 mshta.exe powershell.exe PID 4800 wrote to memory of 3960 4800 powershell.exe csc.exe PID 4800 wrote to memory of 3960 4800 powershell.exe csc.exe PID 3960 wrote to memory of 1040 3960 csc.exe cvtres.exe PID 3960 wrote to memory of 1040 3960 csc.exe cvtres.exe PID 4800 wrote to memory of 3504 4800 powershell.exe csc.exe PID 4800 wrote to memory of 3504 4800 powershell.exe csc.exe PID 3504 wrote to memory of 3688 3504 csc.exe cvtres.exe PID 3504 wrote to memory of 3688 3504 csc.exe cvtres.exe PID 4800 wrote to memory of 3144 4800 powershell.exe Explorer.EXE PID 4800 wrote to memory of 3144 4800 powershell.exe Explorer.EXE PID 4800 wrote to memory of 3144 4800 powershell.exe Explorer.EXE PID 4800 wrote to memory of 3144 4800 powershell.exe Explorer.EXE PID 3144 wrote to memory of 3768 3144 Explorer.EXE RuntimeBroker.exe PID 3144 wrote to memory of 3768 3144 Explorer.EXE RuntimeBroker.exe PID 3144 wrote to memory of 3768 3144 Explorer.EXE RuntimeBroker.exe PID 3144 wrote to memory of 3768 3144 Explorer.EXE RuntimeBroker.exe PID 3144 wrote to memory of 3304 3144 Explorer.EXE RuntimeBroker.exe PID 3144 wrote to memory of 3304 3144 Explorer.EXE RuntimeBroker.exe PID 3144 wrote to memory of 3304 3144 Explorer.EXE RuntimeBroker.exe PID 3144 wrote to memory of 3304 3144 Explorer.EXE RuntimeBroker.exe PID 3144 wrote to memory of 4852 3144 Explorer.EXE RuntimeBroker.exe PID 3144 wrote to memory of 4852 3144 Explorer.EXE RuntimeBroker.exe PID 3144 wrote to memory of 4852 3144 Explorer.EXE RuntimeBroker.exe PID 3144 wrote to memory of 4852 3144 Explorer.EXE RuntimeBroker.exe PID 3144 wrote to memory of 3884 3144 Explorer.EXE cmd.exe PID 3144 wrote to memory of 3884 3144 Explorer.EXE cmd.exe PID 3144 wrote to memory of 3884 3144 Explorer.EXE cmd.exe PID 3144 wrote to memory of 1328 3144 Explorer.EXE cmd.exe PID 3144 wrote to memory of 1328 3144 Explorer.EXE cmd.exe PID 3144 wrote to memory of 1328 3144 Explorer.EXE cmd.exe PID 3144 wrote to memory of 1328 3144 Explorer.EXE cmd.exe PID 3144 wrote to memory of 3884 3144 Explorer.EXE cmd.exe PID 3144 wrote to memory of 3884 3144 Explorer.EXE cmd.exe PID 3884 wrote to memory of 992 3884 cmd.exe PING.EXE PID 3884 wrote to memory of 992 3884 cmd.exe PING.EXE PID 3884 wrote to memory of 992 3884 cmd.exe PING.EXE PID 3144 wrote to memory of 1328 3144 Explorer.EXE cmd.exe PID 3144 wrote to memory of 1328 3144 Explorer.EXE cmd.exe PID 3884 wrote to memory of 992 3884 cmd.exe PING.EXE PID 3884 wrote to memory of 992 3884 cmd.exe PING.EXE
Processes
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3768
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4852
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3304
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3144 -
C:\Users\Admin\AppData\Local\Temp\7665e793186c3c83ec2c2c69adaee5e81ec60d395d8714921352296a5ab88ae6.exe"C:\Users\Admin\AppData\Local\Temp\7665e793186c3c83ec2c2c69adaee5e81ec60d395d8714921352296a5ab88ae6.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4700 -
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "about:<hta:application><script>Vtih='wscript.shell';resizeTo(0,2);eval(new ActiveXObject(Vtih).regread('HKCU\\\Software\\AppDataLow\\Software\\Microsoft\\DD164BDA-982A-17AD-8A61-4C3B5E25409F\\\FolderOptions'));if(!window.flag)close()</script>"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4632 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" new-alias -name twmokmkvhw -value gp; new-alias -name pofesbtof -value iex; pofesbtof ([System.Text.Encoding]::ASCII.GetString((twmokmkvhw "HKCU:Software\AppDataLow\Software\Microsoft\DD164BDA-982A-17AD-8A61-4C3B5E25409F").MelodyTool))3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\33dr0tch\33dr0tch.cmdline"4⤵
- Suspicious use of WriteProcessMemory
PID:3960 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB282.tmp" "c:\Users\Admin\AppData\Local\Temp\33dr0tch\CSC8CDC658437A6429DB42B6138C2A9431.TMP"5⤵PID:1040
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\t5uktar4\t5uktar4.cmdline"4⤵
- Suspicious use of WriteProcessMemory
PID:3504 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB3F9.tmp" "c:\Users\Admin\AppData\Local\Temp\t5uktar4\CSCC4E1A7E32381470ABBD08889F6928AC0.TMP"5⤵PID:3688
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C ping localhost -n 5 && del "C:\Users\Admin\AppData\Local\Temp\7665e793186c3c83ec2c2c69adaee5e81ec60d395d8714921352296a5ab88ae6.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3884 -
C:\Windows\system32\PING.EXEping localhost -n 53⤵
- Runs ping.exe
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:992 -
C:\Windows\syswow64\cmd.exe"C:\Windows\syswow64\cmd.exe" /C pause dll mail, ,2⤵PID:1328
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5cd19eec3d9f4775a88783d8ea59c6807
SHA1553f3d3ce9431a2e46b8fd5f3c54694fbd2e089d
SHA256cb91986063e7aa62289c77ddf297478a1d8672f1df1f0d7be346967ca4652f73
SHA512158e2760a08125c8e62cc2ade31a0960d0d39e288c502dc45d68f9ee0f05c88350ef5de0242445c13c4bcf78c9a2648477c046ff08fd25fe764506408f12187a
-
Filesize
1KB
MD5e08828955f6057fec1fec3500dcd997b
SHA16c52abca3a8146ac1769a0b27d5385b510833679
SHA256200f82a13841f1cd5f4ccdbfac292b3acf9aab7da48899fd3dc295ecb3671c94
SHA5122118367727eaa65697ebac065071218b6de0a0fedb67cf56e628bf3bf005aa8666d2fb3d1e050b88edefc79e55bd2cb05e5a65d6ff75ddfda43f8b9ef11a081d
-
Filesize
1KB
MD591788916e7d8f8fc3b28d95f5f6445e4
SHA1e2f75d7e756bbf41bc78b25d9c6964e33c1d5c23
SHA256fa6d66584e7511f53b50003a68fd15573914873209fbd571578c3e2f471f661b
SHA5128b5ea810014a6c13e2562b18c620e3347b5c1206cbc5e6967f4a8391d45a0feb92c05540b88d2095178c8a5008eca48f58bf2268e27da9faad4e8111b3d88976
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
3KB
MD5ce0e073b433ce325d342932b32641ce2
SHA1cf5720b0d52602e632472b16b0a0cc098bc256e0
SHA2563cdd1b3b00bf9b1592c0069c99d33dce3829e239a8a637b3033b8f59edafd4c5
SHA51297a19af268001fb91a7fc46e8c61385e85fb7f740759dd55d638164845c3bd254cc41d8ca3304180380936d47741568394ae5fbf72a1368c615a547846d725ca
-
Filesize
405B
MD5caed0b2e2cebaecd1db50994e0c15272
SHA15dfac9382598e0ad2e700de4f833de155c9c65fa
SHA25621210b9baafb8b03ab0ef625312973a77bb5aba856c91892b65826e8b7c3b150
SHA51286dc4f8cedd37464c9c492c467375d4603715e5827dfaf7bfcfe5c46ce5e09b439139d4b0a756afa37e4c2444c5b169ac1c024217b9ba449edb183a3b53f2b62
-
Filesize
369B
MD55a7e2d683dbcb8149f6e752e16e8c5f0
SHA18cfe2ea3d36982ed04c8a5dade1e320950f8c46a
SHA256eb6f88ceb11e7b19fb4e3f6b967764f3269cd638315bdebad6b453d1cf3ae537
SHA5125f24c3fb17bf3da67840c7d0c23ee5265de01e0615e452e4a05d7175f65bdd983adab57a5e3c75c37de9ebf92471f25ba015089e1466ee0d23f829bddd6af4be
-
Filesize
652B
MD5dfd9525548f8dab77758923f24c39944
SHA1de322b62c8dc4ebe913cd2ca1f4c7e6311ff226d
SHA256c272784be1f7ff867905eb5dd80eb777020888a20c41c6daf0937a6484e8928f
SHA5126136d78ced7d70e4718ce098cd9b4f8b57f3747ccb585065fa847fb789b1ebe548ed23035c0420d0235d254185e0555ac0b939237e1c465b925025a9dd655062
-
Filesize
652B
MD56c9e7e235257efefa347f89838ca9779
SHA1c5fb9f07bd8fdf720698361e0cd3c3318c961f20
SHA256e4c2eac952ef1d818296b9b874fc701d7feb419acc2f845d42ee0606bb548cbe
SHA512c35be01c3ef4133d3885cbb60c647f0a3c65bbce05b725b80aab36b3f74a8f2a53c1a31d0b21da8706913b8e61fa135e228e7ae4282bfee4e2deb61dc81e71d5
-
Filesize
406B
MD5ca8887eacd573690830f71efaf282712
SHA10acd4f49fc8cf6372950792402ec3aeb68569ef8
SHA256568b0c1155379c88e91f904f4e70a3608fbf664ef890309cd705a7c5eb3232c3
SHA5122a538a308db6c7d09224737f549d442b4c206e8e9605a2570149243ee11bf0c5f028ebf003b383f86709d0dd976ff66d15ccb700f50969ff3da64dd39cab25c7
-
Filesize
369B
MD504783e771f17692067ce523226cdd180
SHA109f3e1f276df997beee3db83f47d0653b965f750
SHA2568539b2885e9803fcf94c4b02e111ac0df5727852fce8d4b89ed86052498acc7e
SHA5129a7a415954417c1e72b158867526d1a81342640f207d8cf392903441219e1b323a1641ef9096777d6da67e265784a45989597efbb1c47006f5e761f376744415