Analysis
-
max time kernel
160s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26-12-2023 10:40
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
681b65ba5f4ca3b98a08da2c7ae9da0a.dll
Resource
win7-20231215-en
windows7-x64
2 signatures
150 seconds
General
-
Target
681b65ba5f4ca3b98a08da2c7ae9da0a.dll
-
Size
643KB
-
MD5
681b65ba5f4ca3b98a08da2c7ae9da0a
-
SHA1
00fc38ab30e4c52ebb0e2c3cdddb99927052b1b0
-
SHA256
8932ac8878c5eafb68986b8bab98e50f6f2a6e7ce49c28ce682708f25656c9cc
-
SHA512
8fee3513eaf2d7f3065ad4495e0f58f5b623579dca0601ddeee2075ba6aeea98ee6717ebe5e11e046eb31de7262843bc75b1afb895f762511a6f88af24d1d3de
-
SSDEEP
12288:HMUpikM1ABVY4lsBnllWzwazxRvwY9QKC71L715+PoR5nFIlW2i:K4Y4lglQzwyxRvwMSJLT5FIV
Malware Config
Extracted
Family
gozi
Extracted
Family
gozi
Botnet
1500
C2
gtr.antoinfer.com
app.bighomegl.at
Attributes
-
build
250211
-
exe_type
loader
-
server_id
580
rsa_pubkey.plain
aes.plain
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 2104 wrote to memory of 2772 2104 rundll32.exe rundll32.exe PID 2104 wrote to memory of 2772 2104 rundll32.exe rundll32.exe PID 2104 wrote to memory of 2772 2104 rundll32.exe rundll32.exe PID 2104 wrote to memory of 2772 2104 rundll32.exe rundll32.exe PID 2104 wrote to memory of 2772 2104 rundll32.exe rundll32.exe PID 2104 wrote to memory of 2772 2104 rundll32.exe rundll32.exe PID 2104 wrote to memory of 2772 2104 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\681b65ba5f4ca3b98a08da2c7ae9da0a.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\681b65ba5f4ca3b98a08da2c7ae9da0a.dll,#12⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2772-0-0x0000000074CC0000-0x0000000074D73000-memory.dmpFilesize
716KB
-
memory/2772-1-0x0000000074CC0000-0x0000000074D73000-memory.dmpFilesize
716KB
-
memory/2772-2-0x0000000000170000-0x0000000000171000-memory.dmpFilesize
4KB
-
memory/2772-3-0x0000000000190000-0x000000000019D000-memory.dmpFilesize
52KB
-
memory/2772-6-0x0000000074CC0000-0x0000000074D73000-memory.dmpFilesize
716KB