Analysis
-
max time kernel
146s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24-12-2023 14:38
Static task
static1
Behavioral task
behavioral1
Sample
0196aa6b6e09389e94acafba9049fe5f.dll
Resource
win7-20231215-en
General
-
Target
0196aa6b6e09389e94acafba9049fe5f.dll
-
Size
355KB
-
MD5
0196aa6b6e09389e94acafba9049fe5f
-
SHA1
6248bd71cc01f4dd0728bf8536c29aff31adb4ce
-
SHA256
84b16227e05b966470c3624cc9129296d73b96c11c90ff5d02a6aea8ab196b9e
-
SHA512
004683c3bcc190134f6715bef7fc1d788e3b7d02c68f6f51980433078be7c126f382fb2832d2668c23f234f9b6ab0d0e1e2e1d0dca33d9f40803f412f566c81a
-
SSDEEP
6144:BstpyZ+ANKcOVwmBfjdLz5kazt+x1gLY3TGAa7VGpwCu:BstpbA3OOmljdLGeZOGH7Cu
Malware Config
Extracted
gozi
Extracted
gozi
1500
gtr.antoinfer.com
app.bighomegl.at
-
build
250204
-
exe_type
loader
-
server_id
580
Signatures
-
Processes:
iexplore.exeiexplore.exeIEXPLORE.EXEiexplore.exeiexplore.exeIEXPLORE.EXEIEXPLORE.EXEIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000566b58630fb3a044b91770fce5e9b2d600000000020000000000106600000001000020000000f4b0dfb9c8e8a9f798a573a354b5f7fa8ee11cc3c4f213f2ee9966c26d09dedb000000000e8000000002000020000000594734781524b3ba20c784ad706de256ffa21e945bd49370738c92c02a864c4c20000000120d0fbfa1580d1bc12cce365d579fcf24192e8da3d4a211167ca17ae634a89c40000000e8438ec90d268e37264dfcf4e1d4b6120ecaf9f2ae00f115eb55b6b92ca5fb4cc5f9ee86f745506813d024c07103a69f2262c2e5a0ddee955cd3cec4f4a39f20 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d080a3189036da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5CB5BDB1-A283-11EE-A5DE-CE253106968E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{695648F1-A283-11EE-A5DE-CE253106968E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000566b58630fb3a044b91770fce5e9b2d60000000002000000000010660000000100002000000015b554a05028f0f95bc94472bc88bde7ea4377660677bc7d51878f7905554081000000000e80000000020000200000001e93b817ecaf5c428d19bdc390ca926ccaed52972613fa32dd394da1c508715f9000000047a1959f0adb8d8eb0640b286441622c3d0c581dca3420bfbe5d873387a7e2c8f375edd0c704ca624de8edf75bd1fb1bb5866b0ba681b0261de5a07dfcfcf6f8067d1835213f8f8660f9f2d9d037c5b2e88adfd3ba4bfc0b7fa040bf81e0a9a34d7d2b3aad1f95f2c45459784986af0bfe1df902aa11da9e63f15aa3d3962914f320aff2a34dc8564e13df7a301a85d6400000009a9ab92047186adf69cd284cf7f63ad8b485029aff1e6b2e9288126327366e09f2e4b42d89a981687dc78b863c77ad656a73957606230e14afb0f8615f5de795 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
iexplore.exeiexplore.exeiexplore.exeiexplore.exepid process 2600 iexplore.exe 2912 iexplore.exe 1688 iexplore.exe 3004 iexplore.exe -
Suspicious use of SetWindowsHookEx 16 IoCs
Processes:
iexplore.exeIEXPLORE.EXEiexplore.exeIEXPLORE.EXEiexplore.exeIEXPLORE.EXEiexplore.exeIEXPLORE.EXEpid process 2600 iexplore.exe 2600 iexplore.exe 3016 IEXPLORE.EXE 3016 IEXPLORE.EXE 2912 iexplore.exe 2912 iexplore.exe 540 IEXPLORE.EXE 540 IEXPLORE.EXE 1688 iexplore.exe 1688 iexplore.exe 2312 IEXPLORE.EXE 2312 IEXPLORE.EXE 3004 iexplore.exe 3004 iexplore.exe 1596 IEXPLORE.EXE 1596 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
rundll32.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exedescription pid process target process PID 1032 wrote to memory of 1520 1032 rundll32.exe rundll32.exe PID 1032 wrote to memory of 1520 1032 rundll32.exe rundll32.exe PID 1032 wrote to memory of 1520 1032 rundll32.exe rundll32.exe PID 1032 wrote to memory of 1520 1032 rundll32.exe rundll32.exe PID 1032 wrote to memory of 1520 1032 rundll32.exe rundll32.exe PID 1032 wrote to memory of 1520 1032 rundll32.exe rundll32.exe PID 1032 wrote to memory of 1520 1032 rundll32.exe rundll32.exe PID 2600 wrote to memory of 3016 2600 iexplore.exe IEXPLORE.EXE PID 2600 wrote to memory of 3016 2600 iexplore.exe IEXPLORE.EXE PID 2600 wrote to memory of 3016 2600 iexplore.exe IEXPLORE.EXE PID 2600 wrote to memory of 3016 2600 iexplore.exe IEXPLORE.EXE PID 2912 wrote to memory of 540 2912 iexplore.exe IEXPLORE.EXE PID 2912 wrote to memory of 540 2912 iexplore.exe IEXPLORE.EXE PID 2912 wrote to memory of 540 2912 iexplore.exe IEXPLORE.EXE PID 2912 wrote to memory of 540 2912 iexplore.exe IEXPLORE.EXE PID 1688 wrote to memory of 2312 1688 iexplore.exe IEXPLORE.EXE PID 1688 wrote to memory of 2312 1688 iexplore.exe IEXPLORE.EXE PID 1688 wrote to memory of 2312 1688 iexplore.exe IEXPLORE.EXE PID 1688 wrote to memory of 2312 1688 iexplore.exe IEXPLORE.EXE PID 3004 wrote to memory of 1596 3004 iexplore.exe IEXPLORE.EXE PID 3004 wrote to memory of 1596 3004 iexplore.exe IEXPLORE.EXE PID 3004 wrote to memory of 1596 3004 iexplore.exe IEXPLORE.EXE PID 3004 wrote to memory of 1596 3004 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0196aa6b6e09389e94acafba9049fe5f.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0196aa6b6e09389e94acafba9049fe5f.dll,#12⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2600 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2912 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1688 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3004 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD50fe680884ef2cc3dd33c674e84d08de4
SHA13ead7865e9553db2292d647322846612a6957679
SHA256f156ab9b0439419bc258d83610d16bfc506b26d2f1b3a587b39ecb7b70c889e8
SHA512bfa649dbca8174374b168f38427022cb0a81c958bb8d9147bf83bae884983014a3014cd8abbbe1b76cf424ab4cc903fae50da16ffa539e01f6feb2f6f3c017c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5534a71dda8d8068380cefa3f22ccd678
SHA1f7fb75751752a2ba8d8b73192c54e4441fcb08c7
SHA2568d1f3b042dba53d730acc09d44d8a590b42c37c9c689b8f89cb927d20ec93da9
SHA512ce1d112f30bf62b4f894ead008afd547862936ee2758c6730fcb96535f50e978fef308124a5c0380d6c658ff9145eab9f100cdb18ed1beb71ab2a4d1e373fa3d
-
C:\Users\Admin\AppData\Local\Temp\CabBFE8.tmpFilesize
44KB
MD5e713b29b5002fb0a530d8e928084fc99
SHA1ab597c5918b7156c4a1e0ca5d88fe34902253353
SHA256eadf2de13faa9969c1bf0d6e358355d994a536cc2c3d4439ca010d20d413fda2
SHA512824f02aca11833e61fb55975547114d7316bcb45742eebead2a131781965593d3600316fbbe60ef3e708374c031497a56a30ff63585abb0d6ea5883394d1a5c6
-
C:\Users\Admin\AppData\Local\Temp\TarBFFB.tmpFilesize
60KB
MD587735fd22057dc4d908015170f1e45f1
SHA166d82f4d945a1dc88e074a5ecca104ee7a6ab4a7
SHA256fc426324ac66a979dcee6c5e60823726a450aa671d2b5f6c18e593db11ea4174
SHA51209077533c5a30a8198ed99ec1b6aaf63b99da56f17be9da4d846f46d6c9af726ee7b25148853c06efacb6ab70ff69d95db725c788559ab32fa2f11ab415e72ea
-
C:\Users\Admin\AppData\Local\Temp\~DF6A032A731A504800.TMPFilesize
16KB
MD50e8003288e0b8f3f0f345c79d71def4a
SHA183be1830dbe2510983cf24e9f141505448f9ba6e
SHA2564c147ff160c4778b396dbc5164e5e090b230e0532fa69ac23c2a59941cd8f8c6
SHA512c3e62b4130b9b4aff8a7cd0f6f7f455554e42d65d0aa40d19e62fe0605881d5a262d6cff9438bed20b6381812d6de6ec1c7bdd6d53f23cd1e49fc65b0208b7a4
-
memory/1520-0-0x0000000074600000-0x00000000746F4000-memory.dmpFilesize
976KB
-
memory/1520-1-0x0000000074600000-0x00000000746F4000-memory.dmpFilesize
976KB
-
memory/1520-2-0x0000000000140000-0x0000000000141000-memory.dmpFilesize
4KB
-
memory/1520-3-0x0000000000160000-0x000000000016D000-memory.dmpFilesize
52KB
-
memory/1520-6-0x0000000074600000-0x00000000746F4000-memory.dmpFilesize
976KB
-
memory/1520-9-0x0000000000220000-0x0000000000222000-memory.dmpFilesize
8KB