Analysis

  • max time kernel
    151s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-10-2023 08:08

General

  • Target

    911bb31927c7250b4741063159cccf6549e4a28ce6b0a5043d3392c7fce401e4.exe

  • Size

    274KB

  • MD5

    d18f3fecf6d28ddd0f4cf4a9b53c0aec

  • SHA1

    05263b9ec69fcf48cc71443ba23545fabe21df12

  • SHA256

    911bb31927c7250b4741063159cccf6549e4a28ce6b0a5043d3392c7fce401e4

  • SHA512

    4629ce7f35716bd2c0fc3c14104251c6b2f3eaf07f7b35cf181654d6bc9be85bda6cb6f802b00f98c6bbb446db4790940605dcf8f8d6391282281ac029ff0512

  • SSDEEP

    3072:utyJSwPI9F4BwVVO+kjH4wjyIphvo3ZDivScpBaa4l8QU:iyrPa4BI7wuIphg3ZDi6cnA8Q

Malware Config

Extracted

Family

gozi

Extracted

Family

gozi

Botnet

5050

C2

mifrutty.com

Attributes
  • base_path

    /jerry/

  • build

    250260

  • exe_type

    loader

  • extension

    .bob

  • server_id

    50

rsa_pubkey.plain
aes.plain

Extracted

Family

gozi

Botnet

5050

C2

http://igrovdow.com

Attributes
  • base_path

    /pictures/

  • build

    250260

  • exe_type

    worker

  • extension

    .bob

  • server_id

    50

rsa_pubkey.plain
aes.plain

Signatures

  • Gozi

    Gozi is a well-known and widely distributed banking trojan.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Suspicious use of SetThreadContext 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 19 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 46 IoCs

Processes

  • C:\Windows\System32\RuntimeBroker.exe
    C:\Windows\System32\RuntimeBroker.exe -Embedding
    1⤵
      PID:4864
    • C:\Windows\System32\RuntimeBroker.exe
      C:\Windows\System32\RuntimeBroker.exe -Embedding
      1⤵
        PID:4076
      • C:\Windows\System32\RuntimeBroker.exe
        C:\Windows\System32\RuntimeBroker.exe -Embedding
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:3788
      • C:\Windows\Explorer.EXE
        C:\Windows\Explorer.EXE
        1⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of UnmapMainImage
        • Suspicious use of WriteProcessMemory
        PID:3244
        • C:\Users\Admin\AppData\Local\Temp\911bb31927c7250b4741063159cccf6549e4a28ce6b0a5043d3392c7fce401e4.exe
          "C:\Users\Admin\AppData\Local\Temp\911bb31927c7250b4741063159cccf6549e4a28ce6b0a5043d3392c7fce401e4.exe"
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:4580
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4580 -s 736
            3⤵
            • Program crash
            PID:2032
        • C:\Windows\System32\mshta.exe
          "C:\Windows\System32\mshta.exe" "about:<hta:application><script>Mlk8='wscript.shell';resizeTo(0,2);eval(new ActiveXObject(Mlk8).regread('HKCU\\\Software\\AppDataLow\\Software\\Microsoft\\47C55FEA-FA41-11E9-3C6B-CED530CFE2D9\\\ActiveStart'));if(!window.flag)close()</script>"
          2⤵
          • Checks computer location settings
          • Suspicious use of WriteProcessMemory
          PID:3688
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" new-alias -name jdjdma -value gp; new-alias -name wulegndcrk -value iex; wulegndcrk ([System.Text.Encoding]::ASCII.GetString((jdjdma "HKCU:Software\AppDataLow\Software\Microsoft\47C55FEA-FA41-11E9-3C6B-CED530CFE2D9").ClassFile))
            3⤵
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:4316
            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
              "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\uvmbtidb\uvmbtidb.cmdline"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:5064
              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESE2BF.tmp" "c:\Users\Admin\AppData\Local\Temp\uvmbtidb\CSC4A98549D24DA45349D8FB47AF371A2D.TMP"
                5⤵
                  PID:1980
              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\24ru0f3u\24ru0f3u.cmdline"
                4⤵
                • Suspicious use of WriteProcessMemory
                PID:2240
                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                  C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESE36B.tmp" "c:\Users\Admin\AppData\Local\Temp\24ru0f3u\CSC577941724EDF4BCEB33F89DB8C9451.TMP"
                  5⤵
                    PID:960
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe" /C ping localhost -n 5 && del "C:\Users\Admin\AppData\Local\Temp\911bb31927c7250b4741063159cccf6549e4a28ce6b0a5043d3392c7fce401e4.exe"
              2⤵
              • Suspicious use of SetThreadContext
              • Suspicious behavior: MapViewOfSection
              • Suspicious use of WriteProcessMemory
              PID:4896
              • C:\Windows\system32\PING.EXE
                ping localhost -n 5
                3⤵
                • Runs ping.exe
                • Suspicious behavior: CmdExeWriteProcessMemorySpam
                PID:3284
            • C:\Windows\syswow64\cmd.exe
              "C:\Windows\syswow64\cmd.exe" /C pause dll mail, ,
              2⤵
                PID:1412
            • C:\Windows\System32\RuntimeBroker.exe
              C:\Windows\System32\RuntimeBroker.exe -Embedding
              1⤵
                PID:2460
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4580 -ip 4580
                1⤵
                  PID:2944

                Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Temp\24ru0f3u\24ru0f3u.dll
                  Filesize

                  3KB

                  MD5

                  7a3b3868eb4b4645ef6b8f5b9a7759ec

                  SHA1

                  d043bebe8c83058a98965187f12e732cce56cf00

                  SHA256

                  332ee8e61196191bc21e651535e2b60c80aa91ee61c26682e681fa5746fb42ef

                  SHA512

                  4b4918fbd5518c74b38939a10e31138ea394f02c57c921ef55c60b1cfc2b23a6df44178c901ba1a995e6fc7de50e839e0c26d1e6c9f7e44bda8c54d590f1e69f

                • C:\Users\Admin\AppData\Local\Temp\RESE2BF.tmp
                  Filesize

                  1KB

                  MD5

                  2ff292c923cf33f4c7c135d0361191e1

                  SHA1

                  9dd8f13d968bda54835766f2900a34a8f04a608a

                  SHA256

                  9251b375fae6964075a2651faed35d376b5456cc80d0229170873e0ff6f3ad5d

                  SHA512

                  9856e83d5a8fde09fcb3f6eac9d12b1c980ca40700367356fe700a6522f3b0dd49ab32e47b55708ec2b164a8dcb3ffa696f3c8280767bf5286f8d6c54c2724d4

                • C:\Users\Admin\AppData\Local\Temp\RESE36B.tmp
                  Filesize

                  1KB

                  MD5

                  98832eb7c23c7a326d946027319e5c6f

                  SHA1

                  f18652092f2283bfc1137eff7baaeff0373d759a

                  SHA256

                  9eb4b8608f8c7a1a1deb6d5976ae044139804658745cd5627de266e6b368249f

                  SHA512

                  c7efe454aa7f7aa4d19007d45f07d10ca785f09af77486cafe2f69c6ec27672df611cda8cb1f13261348dab253b3425fe84be11d626b111fdfc69b7a256cbfef

                • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_h03u0f5y.22x.ps1
                  Filesize

                  60B

                  MD5

                  d17fe0a3f47be24a6453e9ef58c94641

                  SHA1

                  6ab83620379fc69f80c0242105ddffd7d98d5d9d

                  SHA256

                  96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                  SHA512

                  5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                • C:\Users\Admin\AppData\Local\Temp\uvmbtidb\uvmbtidb.dll
                  Filesize

                  3KB

                  MD5

                  7bbabb66d5fb9d39f2bdc0460365056a

                  SHA1

                  1edba1afb1c99b2367be0cab2972fc7d6e47e9a1

                  SHA256

                  d774951d12ec9394b84fdeb6e5dd46c064b9ef02e23ecaf26557ac7c1e958898

                  SHA512

                  957147be9922126944a11bb1ef10bb8ebee8e73a247e7afc176ee6406c20bbf9dc05e29ea8f64e254bb14c006351679c5904cc70fb53ab6880ebbeb79bc21a7a

                • \??\c:\Users\Admin\AppData\Local\Temp\24ru0f3u\24ru0f3u.0.cs
                  Filesize

                  406B

                  MD5

                  ca8887eacd573690830f71efaf282712

                  SHA1

                  0acd4f49fc8cf6372950792402ec3aeb68569ef8

                  SHA256

                  568b0c1155379c88e91f904f4e70a3608fbf664ef890309cd705a7c5eb3232c3

                  SHA512

                  2a538a308db6c7d09224737f549d442b4c206e8e9605a2570149243ee11bf0c5f028ebf003b383f86709d0dd976ff66d15ccb700f50969ff3da64dd39cab25c7

                • \??\c:\Users\Admin\AppData\Local\Temp\24ru0f3u\24ru0f3u.cmdline
                  Filesize

                  369B

                  MD5

                  f462c8110e6b99981f72bddda4911544

                  SHA1

                  ac6de29cec4b22eba05115c6aec8cba49d2d21b3

                  SHA256

                  59b4f87c0b99aaaa90ef2761d69f8cbcb7ed1a2240848e7dad6b38e16be950ca

                  SHA512

                  4716601907b39734a673476bee4e0a2c43fb8e0313cbf64ec26c549973839303c838af505fc48c2443b47a8160029b473045af8a11868d7d049aafa2177cc352

                • \??\c:\Users\Admin\AppData\Local\Temp\24ru0f3u\CSC577941724EDF4BCEB33F89DB8C9451.TMP
                  Filesize

                  652B

                  MD5

                  dc2441a68a81ead685dc1bd952725061

                  SHA1

                  9a2028bbbcf475e76df3cb63d03d6364ef76e97d

                  SHA256

                  b355758b1790594fb769d454b3cb87b90c31037c982f76aa82cfecbd07c5f024

                  SHA512

                  38f34b416a16d31e454d2a00f2840d1f59729c7ae446e09fb56b3dcd9bda5ded935d62cbdd18040811d2263167c6613b7d3b4b4c830bf5aa4ec24fde61d0958a

                • \??\c:\Users\Admin\AppData\Local\Temp\uvmbtidb\CSC4A98549D24DA45349D8FB47AF371A2D.TMP
                  Filesize

                  652B

                  MD5

                  b3c9d5a5f089c5ceac802afa816d5f03

                  SHA1

                  e9cf1190c0faf8f7b3279519f82b7cbb32ec1c02

                  SHA256

                  58de0bc8402483d6066e685e47e9262e2b7b61f87328506b5fae8d8ba6eaf7a0

                  SHA512

                  7288e1726413250c9eadd9474134e641465e12dab5fc2ea765f0419430db6b6e7b3a6a5cf2dd8411ac6ed412ac59008182eff8d54dfa069978317f4d7e5d0415

                • \??\c:\Users\Admin\AppData\Local\Temp\uvmbtidb\uvmbtidb.0.cs
                  Filesize

                  405B

                  MD5

                  caed0b2e2cebaecd1db50994e0c15272

                  SHA1

                  5dfac9382598e0ad2e700de4f833de155c9c65fa

                  SHA256

                  21210b9baafb8b03ab0ef625312973a77bb5aba856c91892b65826e8b7c3b150

                  SHA512

                  86dc4f8cedd37464c9c492c467375d4603715e5827dfaf7bfcfe5c46ce5e09b439139d4b0a756afa37e4c2444c5b169ac1c024217b9ba449edb183a3b53f2b62

                • \??\c:\Users\Admin\AppData\Local\Temp\uvmbtidb\uvmbtidb.cmdline
                  Filesize

                  369B

                  MD5

                  a65a1b2f6329f2dad8860f9f18bfefef

                  SHA1

                  f77cc47e8db28148927afe505ccc00a014bc282b

                  SHA256

                  eb751d048bb3790158c363e4da892cd3f134a147eb098cefa9c5f5da4c64633f

                  SHA512

                  e5bf651f799f76ea05a4f81ea4ba884e1774bfafb9f8be57c7ff5602b6b97311db3157f9923ef9b65f166c248b517361e42f7662935ed728bcd31fa6f285cb83

                • memory/1412-103-0x0000000000A40000-0x0000000000AD8000-memory.dmp
                  Filesize

                  608KB

                • memory/1412-106-0x0000000000610000-0x0000000000611000-memory.dmp
                  Filesize

                  4KB

                • memory/1412-114-0x0000000000A40000-0x0000000000AD8000-memory.dmp
                  Filesize

                  608KB

                • memory/2460-89-0x0000025C51200000-0x0000025C512A4000-memory.dmp
                  Filesize

                  656KB

                • memory/2460-91-0x0000025C50FC0000-0x0000025C50FC1000-memory.dmp
                  Filesize

                  4KB

                • memory/2460-118-0x0000025C51200000-0x0000025C512A4000-memory.dmp
                  Filesize

                  656KB

                • memory/3244-57-0x00000000032A0000-0x00000000032A1000-memory.dmp
                  Filesize

                  4KB

                • memory/3244-97-0x0000000009300000-0x00000000093A4000-memory.dmp
                  Filesize

                  656KB

                • memory/3244-56-0x0000000009300000-0x00000000093A4000-memory.dmp
                  Filesize

                  656KB

                • memory/3244-69-0x0000000009300000-0x00000000093A4000-memory.dmp
                  Filesize

                  656KB

                • memory/3284-112-0x0000023991CB0000-0x0000023991CB1000-memory.dmp
                  Filesize

                  4KB

                • memory/3284-109-0x0000023991DD0000-0x0000023991E74000-memory.dmp
                  Filesize

                  656KB

                • memory/3284-119-0x0000023991DD0000-0x0000023991E74000-memory.dmp
                  Filesize

                  656KB

                • memory/3788-72-0x0000023D1DB40000-0x0000023D1DBE4000-memory.dmp
                  Filesize

                  656KB

                • memory/3788-104-0x0000023D1DB40000-0x0000023D1DBE4000-memory.dmp
                  Filesize

                  656KB

                • memory/3788-73-0x0000023D1D760000-0x0000023D1D761000-memory.dmp
                  Filesize

                  4KB

                • memory/4076-110-0x000002D44D820000-0x000002D44D8C4000-memory.dmp
                  Filesize

                  656KB

                • memory/4076-79-0x000002D44D7E0000-0x000002D44D7E1000-memory.dmp
                  Filesize

                  4KB

                • memory/4076-78-0x000002D44D820000-0x000002D44D8C4000-memory.dmp
                  Filesize

                  656KB

                • memory/4316-52-0x00000143B4ED0000-0x00000143B4ED8000-memory.dmp
                  Filesize

                  32KB

                • memory/4316-71-0x00000143B4F00000-0x00000143B4F3D000-memory.dmp
                  Filesize

                  244KB

                • memory/4316-68-0x00007FFEF50F0000-0x00007FFEF5BB1000-memory.dmp
                  Filesize

                  10.8MB

                • memory/4316-38-0x00000143B4B40000-0x00000143B4B48000-memory.dmp
                  Filesize

                  32KB

                • memory/4316-54-0x00000143B4F00000-0x00000143B4F3D000-memory.dmp
                  Filesize

                  244KB

                • memory/4316-12-0x00000143B4B50000-0x00000143B4B72000-memory.dmp
                  Filesize

                  136KB

                • memory/4316-22-0x00007FFEF50F0000-0x00007FFEF5BB1000-memory.dmp
                  Filesize

                  10.8MB

                • memory/4316-23-0x000001439C520000-0x000001439C530000-memory.dmp
                  Filesize

                  64KB

                • memory/4316-24-0x000001439C520000-0x000001439C530000-memory.dmp
                  Filesize

                  64KB

                • memory/4316-25-0x000001439C520000-0x000001439C530000-memory.dmp
                  Filesize

                  64KB

                • memory/4580-1-0x00000000024A0000-0x00000000025A0000-memory.dmp
                  Filesize

                  1024KB

                • memory/4580-3-0x0000000000400000-0x000000000228B000-memory.dmp
                  Filesize

                  30.5MB

                • memory/4580-5-0x0000000003EC0000-0x0000000003ECD000-memory.dmp
                  Filesize

                  52KB

                • memory/4580-4-0x00000000024A0000-0x00000000025A0000-memory.dmp
                  Filesize

                  1024KB

                • memory/4580-2-0x0000000003E90000-0x0000000003E9B000-memory.dmp
                  Filesize

                  44KB

                • memory/4580-8-0x0000000000400000-0x000000000228B000-memory.dmp
                  Filesize

                  30.5MB

                • memory/4580-9-0x0000000003E90000-0x0000000003E9B000-memory.dmp
                  Filesize

                  44KB

                • memory/4580-117-0x0000000000400000-0x000000000228B000-memory.dmp
                  Filesize

                  30.5MB

                • memory/4864-85-0x0000025F5BFC0000-0x0000025F5BFC1000-memory.dmp
                  Filesize

                  4KB

                • memory/4864-116-0x0000025F5C720000-0x0000025F5C7C4000-memory.dmp
                  Filesize

                  656KB

                • memory/4864-83-0x0000025F5C720000-0x0000025F5C7C4000-memory.dmp
                  Filesize

                  656KB

                • memory/4896-100-0x000001D305010000-0x000001D305011000-memory.dmp
                  Filesize

                  4KB

                • memory/4896-95-0x000001D304F60000-0x000001D305004000-memory.dmp
                  Filesize

                  656KB

                • memory/4896-120-0x000001D304F60000-0x000001D305004000-memory.dmp
                  Filesize

                  656KB