Analysis
-
max time kernel
140s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
26-12-2023 09:18
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
631779ef3aecb4838360304f162dbd8c.dll
Resource
win7-20231129-en
windows7-x64
2 signatures
150 seconds
General
-
Target
631779ef3aecb4838360304f162dbd8c.dll
-
Size
643KB
-
MD5
631779ef3aecb4838360304f162dbd8c
-
SHA1
9103735e9771b40fb26b5b273683934dfea38402
-
SHA256
a4c7d46ab94add85adc74f9686c7367fd82eaae508b3e2227db8e62930fb3da0
-
SHA512
37a4008e70e99cdd182f95719a481ab811bd35867cae2c38c7c79cef406da7d6872762e1a79798a3a129f66c5326b3487e58a923214299d9410a044b5d14c667
-
SSDEEP
12288:HMUpikM1ABVY4lsBnllWzwazxRvwe9QKC71L715+PoR5nFIlW2i:K4Y4lglQzwyxRvwySJLT5FIV
Malware Config
Extracted
Family
gozi
Extracted
Family
gozi
Botnet
1500
C2
gtr.antoinfer.com
app.bighomegl.at
Attributes
-
build
250211
-
exe_type
loader
-
server_id
580
rsa_pubkey.plain
aes.plain
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 2552 wrote to memory of 2656 2552 rundll32.exe rundll32.exe PID 2552 wrote to memory of 2656 2552 rundll32.exe rundll32.exe PID 2552 wrote to memory of 2656 2552 rundll32.exe rundll32.exe PID 2552 wrote to memory of 2656 2552 rundll32.exe rundll32.exe PID 2552 wrote to memory of 2656 2552 rundll32.exe rundll32.exe PID 2552 wrote to memory of 2656 2552 rundll32.exe rundll32.exe PID 2552 wrote to memory of 2656 2552 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\631779ef3aecb4838360304f162dbd8c.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\631779ef3aecb4838360304f162dbd8c.dll,#12⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2656-0-0x0000000075420000-0x00000000754D3000-memory.dmpFilesize
716KB
-
memory/2656-2-0x00000000000C0000-0x00000000000C1000-memory.dmpFilesize
4KB
-
memory/2656-1-0x0000000075420000-0x00000000754D3000-memory.dmpFilesize
716KB
-
memory/2656-3-0x00000000000E0000-0x00000000000ED000-memory.dmpFilesize
52KB
-
memory/2656-6-0x0000000075420000-0x00000000754D3000-memory.dmpFilesize
716KB