Resubmissions
06-10-2023 00:32
231006-avxlbaac38 1006-10-2023 00:31
231006-at7pwsgb5s 1005-10-2023 16:10
231005-tmvxasec87 10Analysis
-
max time kernel
150s -
max time network
140s -
platform
windows10-1703_x64 -
resource
win10-20230915-en -
resource tags
arch:x64arch:x86image:win10-20230915-enlocale:en-usos:windows10-1703-x64system -
submitted
06-10-2023 00:32
Static task
static1
Behavioral task
behavioral1
Sample
7665e793186c3c83ec2c2c69adaee5e81ec60d395d8714921352296a5ab88ae6.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
7665e793186c3c83ec2c2c69adaee5e81ec60d395d8714921352296a5ab88ae6.exe
Resource
win10-20230915-en
General
-
Target
7665e793186c3c83ec2c2c69adaee5e81ec60d395d8714921352296a5ab88ae6.exe
-
Size
304KB
-
MD5
a3f4c907a088c99a8b7bf5f4280d7d0c
-
SHA1
9a9297bd0af1c008eb7477c1e310ce70c30c6d56
-
SHA256
7665e793186c3c83ec2c2c69adaee5e81ec60d395d8714921352296a5ab88ae6
-
SHA512
106a0a4275a421a6dbef6c43e76921e6eae1aca5f6d960f823763a3127b7ebf826c626da460db82451aba4a94c32c8c198d6871b0a2c6de7d96c937384e92f9b
-
SSDEEP
6144:Oo+91vDNpa6NK56upTHirwtc3nhBvjQOR/Oz2IHTN+:ONDLu4K56u1HqfhBvjQOWz2W
Malware Config
Extracted
gozi
Extracted
gozi
5050
mifrutty.com
-
base_path
/jerry/
-
build
250260
-
exe_type
loader
-
extension
.bob
-
server_id
50
Extracted
gozi
5050
mifrutty.com
systemcheck.top
-
base_path
/pictures/
-
build
250260
-
exe_type
worker
-
extension
.bob
-
server_id
50
Signatures
-
Dave packer 1 IoCs
Detects executable using a packer named 'Dave' by the community, based on a string at the end.
Processes:
resource yara_rule behavioral2/memory/3856-1-0x0000000000860000-0x000000000086C000-memory.dmp dave -
Suspicious use of SetThreadContext 6 IoCs
Processes:
powershell.exeExplorer.EXEcmd.exedescription pid process target process PID 3644 set thread context of 3328 3644 powershell.exe Explorer.EXE PID 3328 set thread context of 3892 3328 Explorer.EXE RuntimeBroker.exe PID 3328 set thread context of 4300 3328 Explorer.EXE cmd.exe PID 4300 set thread context of 4348 4300 cmd.exe PING.EXE PID 3328 set thread context of 5000 3328 Explorer.EXE WinMail.exe PID 3328 set thread context of 4536 3328 Explorer.EXE cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
Processes:
PING.EXEpid process 4348 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
7665e793186c3c83ec2c2c69adaee5e81ec60d395d8714921352296a5ab88ae6.exepowershell.exeExplorer.EXEpid process 3856 7665e793186c3c83ec2c2c69adaee5e81ec60d395d8714921352296a5ab88ae6.exe 3856 7665e793186c3c83ec2c2c69adaee5e81ec60d395d8714921352296a5ab88ae6.exe 3644 powershell.exe 3644 powershell.exe 3644 powershell.exe 3328 Explorer.EXE 3328 Explorer.EXE 3328 Explorer.EXE 3328 Explorer.EXE 3328 Explorer.EXE 3328 Explorer.EXE 3328 Explorer.EXE 3328 Explorer.EXE 3328 Explorer.EXE 3328 Explorer.EXE 3328 Explorer.EXE 3328 Explorer.EXE 3328 Explorer.EXE 3328 Explorer.EXE 3328 Explorer.EXE 3328 Explorer.EXE 3328 Explorer.EXE 3328 Explorer.EXE 3328 Explorer.EXE 3328 Explorer.EXE 3328 Explorer.EXE 3328 Explorer.EXE 3328 Explorer.EXE 3328 Explorer.EXE 3328 Explorer.EXE 3328 Explorer.EXE 3328 Explorer.EXE 3328 Explorer.EXE 3328 Explorer.EXE 3328 Explorer.EXE 3328 Explorer.EXE 3328 Explorer.EXE 3328 Explorer.EXE 3328 Explorer.EXE 3328 Explorer.EXE 3328 Explorer.EXE 3328 Explorer.EXE 3328 Explorer.EXE 3328 Explorer.EXE 3328 Explorer.EXE 3328 Explorer.EXE 3328 Explorer.EXE 3328 Explorer.EXE 3328 Explorer.EXE 3328 Explorer.EXE 3328 Explorer.EXE 3328 Explorer.EXE 3328 Explorer.EXE 3328 Explorer.EXE 3328 Explorer.EXE 3328 Explorer.EXE 3328 Explorer.EXE 3328 Explorer.EXE 3328 Explorer.EXE 3328 Explorer.EXE 3328 Explorer.EXE 3328 Explorer.EXE 3328 Explorer.EXE 3328 Explorer.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 3328 Explorer.EXE -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
powershell.exeExplorer.EXEcmd.exepid process 3644 powershell.exe 3328 Explorer.EXE 3328 Explorer.EXE 4300 cmd.exe 3328 Explorer.EXE 3328 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 11 IoCs
Processes:
powershell.exeExplorer.EXEdescription pid process Token: SeDebugPrivilege 3644 powershell.exe Token: SeShutdownPrivilege 3328 Explorer.EXE Token: SeCreatePagefilePrivilege 3328 Explorer.EXE Token: SeShutdownPrivilege 3328 Explorer.EXE Token: SeCreatePagefilePrivilege 3328 Explorer.EXE Token: SeShutdownPrivilege 3328 Explorer.EXE Token: SeCreatePagefilePrivilege 3328 Explorer.EXE Token: SeShutdownPrivilege 3328 Explorer.EXE Token: SeCreatePagefilePrivilege 3328 Explorer.EXE Token: SeShutdownPrivilege 3328 Explorer.EXE Token: SeCreatePagefilePrivilege 3328 Explorer.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Explorer.EXEpid process 3328 Explorer.EXE -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
Explorer.EXEpid process 3328 Explorer.EXE -
Suspicious use of WriteProcessMemory 39 IoCs
Processes:
mshta.exepowershell.execsc.execsc.exeExplorer.EXEcmd.exedescription pid process target process PID 2644 wrote to memory of 3644 2644 mshta.exe powershell.exe PID 2644 wrote to memory of 3644 2644 mshta.exe powershell.exe PID 3644 wrote to memory of 692 3644 powershell.exe csc.exe PID 3644 wrote to memory of 692 3644 powershell.exe csc.exe PID 692 wrote to memory of 200 692 csc.exe cvtres.exe PID 692 wrote to memory of 200 692 csc.exe cvtres.exe PID 3644 wrote to memory of 216 3644 powershell.exe csc.exe PID 3644 wrote to memory of 216 3644 powershell.exe csc.exe PID 216 wrote to memory of 192 216 csc.exe cvtres.exe PID 216 wrote to memory of 192 216 csc.exe cvtres.exe PID 3644 wrote to memory of 3328 3644 powershell.exe Explorer.EXE PID 3644 wrote to memory of 3328 3644 powershell.exe Explorer.EXE PID 3644 wrote to memory of 3328 3644 powershell.exe Explorer.EXE PID 3644 wrote to memory of 3328 3644 powershell.exe Explorer.EXE PID 3328 wrote to memory of 3892 3328 Explorer.EXE RuntimeBroker.exe PID 3328 wrote to memory of 3892 3328 Explorer.EXE RuntimeBroker.exe PID 3328 wrote to memory of 3892 3328 Explorer.EXE RuntimeBroker.exe PID 3328 wrote to memory of 3892 3328 Explorer.EXE RuntimeBroker.exe PID 3328 wrote to memory of 4300 3328 Explorer.EXE cmd.exe PID 3328 wrote to memory of 4300 3328 Explorer.EXE cmd.exe PID 3328 wrote to memory of 4300 3328 Explorer.EXE cmd.exe PID 3328 wrote to memory of 4300 3328 Explorer.EXE cmd.exe PID 3328 wrote to memory of 4300 3328 Explorer.EXE cmd.exe PID 4300 wrote to memory of 4348 4300 cmd.exe PING.EXE PID 4300 wrote to memory of 4348 4300 cmd.exe PING.EXE PID 4300 wrote to memory of 4348 4300 cmd.exe PING.EXE PID 4300 wrote to memory of 4348 4300 cmd.exe PING.EXE PID 4300 wrote to memory of 4348 4300 cmd.exe PING.EXE PID 3328 wrote to memory of 5000 3328 Explorer.EXE WinMail.exe PID 3328 wrote to memory of 5000 3328 Explorer.EXE WinMail.exe PID 3328 wrote to memory of 5000 3328 Explorer.EXE WinMail.exe PID 3328 wrote to memory of 5000 3328 Explorer.EXE WinMail.exe PID 3328 wrote to memory of 5000 3328 Explorer.EXE WinMail.exe PID 3328 wrote to memory of 4536 3328 Explorer.EXE cmd.exe PID 3328 wrote to memory of 4536 3328 Explorer.EXE cmd.exe PID 3328 wrote to memory of 4536 3328 Explorer.EXE cmd.exe PID 3328 wrote to memory of 4536 3328 Explorer.EXE cmd.exe PID 3328 wrote to memory of 4536 3328 Explorer.EXE cmd.exe PID 3328 wrote to memory of 4536 3328 Explorer.EXE cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3328 -
C:\Users\Admin\AppData\Local\Temp\7665e793186c3c83ec2c2c69adaee5e81ec60d395d8714921352296a5ab88ae6.exe"C:\Users\Admin\AppData\Local\Temp\7665e793186c3c83ec2c2c69adaee5e81ec60d395d8714921352296a5ab88ae6.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3856 -
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "about:<hta:application><script>Hk43='wscript.shell';resizeTo(0,2);eval(new ActiveXObject(Hk43).regread('HKCU\\\Software\\AppDataLow\\Software\\Microsoft\\31C71D01-DC96-8B44-6EF5-D0EF82F90493\\\StopBlack'));if(!window.flag)close()</script>"2⤵
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" new-alias -name pkynwt -value gp; new-alias -name jflbsvfnuh -value iex; jflbsvfnuh ([System.Text.Encoding]::ASCII.GetString((pkynwt "HKCU:Software\AppDataLow\Software\Microsoft\31C71D01-DC96-8B44-6EF5-D0EF82F90493").ClassContact))3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3644 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\axyra5sm\axyra5sm.cmdline"4⤵
- Suspicious use of WriteProcessMemory
PID:692 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES3B20.tmp" "c:\Users\Admin\AppData\Local\Temp\axyra5sm\CSC37ECF1CFC6214E1686AF4BAF395F3781.TMP"5⤵PID:200
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\jr1kfu1f\jr1kfu1f.cmdline"4⤵
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES3C29.tmp" "c:\Users\Admin\AppData\Local\Temp\jr1kfu1f\CSC4032C025C7EB4A43AC9D5E5EAE6C4C1F.TMP"5⤵PID:192
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C ping localhost -n 5 && del "C:\Users\Admin\AppData\Local\Temp\7665e793186c3c83ec2c2c69adaee5e81ec60d395d8714921352296a5ab88ae6.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4300 -
C:\Windows\system32\PING.EXEping localhost -n 53⤵
- Runs ping.exe
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:4348 -
C:\Program Files\Windows Mail\WinMail.exe"C:\Program Files\Windows Mail\WinMail" OCInstallUserConfigOE2⤵PID:5000
-
C:\Windows\syswow64\cmd.exe"C:\Windows\syswow64\cmd.exe" /C pause dll mail, ,2⤵PID:4536
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3892
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD52c8b68d3e1b31eff509b46db88a0dff8
SHA13cad9a2c7ced13238d2d958acccab5faa0dc3b97
SHA256209a3c7d0fd706186769211fd4028644844c1700c6ef7ec513f548e635a683cc
SHA5121ed6d5e19ed7bfca342146ccf649d0b5afc92bdf9f545c4b9030a682a41358b8a3075f6fbeea83b28fe56ec1daaf31272ac9c2fc90004b8c2eec8a31aed83ba2
-
Filesize
1KB
MD5c86bd9364c46c56b3d89ccc169854d6a
SHA1216e3978d85f460fa98407c2b7a4c16a6170b2f6
SHA256d79d153211649839c909ba54e4e89adfdee07be2a21e887768790562e39be22d
SHA512c0e089e239202df8e1321eb7fbe90e5f7154763a0d15e0e04f9887688b14dfb94a8a44cfaef9f87a5792c00c63ddf48f43f8f3db9edcb1b6bd047016cc197213
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
3KB
MD5b53dc9dbf830d1e83f7f92a11f98155b
SHA17d712f2a821f000836c4f94406b3b0f180c6a995
SHA25609c3446232cd3c2be98e3def1c3368fc8f84c671ca06980a51b9224ea38514b7
SHA512110b3ff5885aa806a24a617e42c846d8e6e143efb481be6787a76d9fce35a41655e43041ba71a6ed7a2367bcee5d85b2a269cd674938a84bfbbbd4e37ac340ed
-
Filesize
3KB
MD5e55432a975fbeb854cdc5766b339a277
SHA14701d73e94945b6f5c5382139323910030b23bd4
SHA2562740e97fd2f3e41be1b8e4291641333ec33dbd84412dc7980456ad9103aa608c
SHA512cf4a9a93007a46d0b7030551b2baf36f98c942d616e782f95519533d4d1d24a26f11382ea79fb41bfc9feee358f1dab5863370dee06c34734eba47a8fc4f74f4
-
Filesize
652B
MD5941aff72715f93aa676852513a5f4402
SHA15a0ffbd95f1b7f0b00e27c851c8b3501d3dba3c8
SHA25664865daaa8d447290bf3a43b920e96228f3f2987e9dce90bdd63b1fdca72d062
SHA512c44febd92dc2f805445f8707f08c4d2095535f58fd5db4860e8faf33ea57de592ca6ded04d6585616ad47e6c6236fad5ff30fa70ad2aa47fa21ad3f30cba697a
-
Filesize
405B
MD5caed0b2e2cebaecd1db50994e0c15272
SHA15dfac9382598e0ad2e700de4f833de155c9c65fa
SHA25621210b9baafb8b03ab0ef625312973a77bb5aba856c91892b65826e8b7c3b150
SHA51286dc4f8cedd37464c9c492c467375d4603715e5827dfaf7bfcfe5c46ce5e09b439139d4b0a756afa37e4c2444c5b169ac1c024217b9ba449edb183a3b53f2b62
-
Filesize
369B
MD56a3b915953abd231cfdc52657c31a25e
SHA1055b752fc046d6a3689f2bf52a8ed2bf59b816a4
SHA2563ec1e9dd251926e7ec82169aaaaca039bb1e94480e00317b13b68f20e8b8e609
SHA5128dc00240b4cf2c97dab516304f53b96cdb7fbb64deec6db6d0213228c1c4863caf6926d4e83c08c4355b0c87bb01318d290d756ab9dfea35bd9d2ecc5a118957
-
Filesize
652B
MD5ceb328d7c09687b87c14b9b88d4f9e4b
SHA16075b08f950ec710f9f5693fdf727351710c55f7
SHA256c35a5e5766356649421d6d3927b7340646e9dfd341c9ad1994337da680c9e218
SHA512392abc8406f9295cb378bfddb2b6dbb65217ea7e0f375afde84a16cfbed2d1faf8ee79a18bfa36f51b1001c992c581313d0d41a0570b657aba7a6aecb5a6ad92
-
Filesize
406B
MD5ca8887eacd573690830f71efaf282712
SHA10acd4f49fc8cf6372950792402ec3aeb68569ef8
SHA256568b0c1155379c88e91f904f4e70a3608fbf664ef890309cd705a7c5eb3232c3
SHA5122a538a308db6c7d09224737f549d442b4c206e8e9605a2570149243ee11bf0c5f028ebf003b383f86709d0dd976ff66d15ccb700f50969ff3da64dd39cab25c7
-
Filesize
369B
MD51cefae6bf669793af0bc063b2b94b0c2
SHA1a7ce032d4f8368b76ee8309ede84d63bfbd89f1c
SHA256624833b47ea322fd85074eb57473ffaaa4bcb4023140c145da7310a27e023a8e
SHA512500c2504b974280c8787e0e51ecdfcfccc7e2e1cffb58a654cc576b2afddd57ea826a6e00b78c41d0462f069259e8c6223fcdc6b2608bd521fc52b388f51bfee