Analysis

  • max time kernel
    127s
  • max time network
    136s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/11/2023, 15:30

General

  • Target

    kk_patched.exe

  • Size

    204KB

  • MD5

    f8e978df4fcb8406d3c3549c9d26278f

  • SHA1

    9f3193c6c2f7b390f664206d919d3f98d35df0ae

  • SHA256

    f1916929f5cc4e16a95b36409dc94344ffb441cfeb9fe50070836bf92ffd1d2d

  • SHA512

    ea1b4395872b56b8b72ee9937c2dd7bc6a1734d3505200f37d90f72bf8d2adaf209a302398490c0706967c92a1c455703aa0d34d82970fd2a2bf7896cb0d63ed

  • SSDEEP

    3072:uh5kduQdVECqxwPBBlUJjXkZr/ExfqStBiB6ZOYlFJrQOlF4Kdz2zxyLE6Huoalb:uxXkZTEtqStGuOYxQOlJS9yaEZWGPlk

Malware Config

Extracted

Family

gozi

Extracted

Family

gozi

Botnet

2004

C2

trackingg-protectioon.cdn4.mozilla.net

77.73.131.105

31.214.157.31

protectioon.cdn4.mozilla.net

185.212.47.59

79.132.128.116

Attributes
  • base_path

    /fonts/

  • build

    250257

  • exe_type

    loader

  • extension

    .bak

  • server_id

    50

rsa_pubkey.plain
aes.plain

Signatures

  • Gozi

    Gozi is a well-known and widely distributed banking trojan.

  • Uses the VBS compiler for execution 1 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\kk_patched.exe
    "C:\Users\Admin\AppData\Local\Temp\kk_patched.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3744
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
      2⤵
        PID:4520
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4520 -s 212
          3⤵
          • Program crash
          PID:3908
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4520 -ip 4520
      1⤵
        PID:764

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/3744-0-0x0000000075220000-0x00000000759D0000-memory.dmp

        Filesize

        7.7MB

      • memory/3744-1-0x00000000000A0000-0x00000000000D8000-memory.dmp

        Filesize

        224KB

      • memory/3744-2-0x0000000005200000-0x00000000057A4000-memory.dmp

        Filesize

        5.6MB

      • memory/3744-3-0x0000000004B00000-0x0000000004B92000-memory.dmp

        Filesize

        584KB

      • memory/3744-4-0x0000000004C40000-0x0000000004C50000-memory.dmp

        Filesize

        64KB

      • memory/3744-5-0x0000000004AD0000-0x0000000004AE4000-memory.dmp

        Filesize

        80KB

      • memory/3744-16-0x0000000075220000-0x00000000759D0000-memory.dmp

        Filesize

        7.7MB

      • memory/3744-17-0x0000000004C40000-0x0000000004C50000-memory.dmp

        Filesize

        64KB

      • memory/4520-11-0x00000000005A0000-0x00000000005AF000-memory.dmp

        Filesize

        60KB

      • memory/4520-7-0x00000000005A0000-0x00000000005AF000-memory.dmp

        Filesize

        60KB

      • memory/4520-6-0x0000000000400000-0x0000000000402000-memory.dmp

        Filesize

        8KB

      • memory/4520-15-0x00000000005A0000-0x00000000005AF000-memory.dmp

        Filesize

        60KB