Analysis
-
max time kernel
134s -
max time network
168s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 00:18
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
084aaf4ed20aaf6d53a75ffa92a4d9f7.dll
Resource
win7-20231215-en
2 signatures
150 seconds
General
-
Target
084aaf4ed20aaf6d53a75ffa92a4d9f7.dll
-
Size
543KB
-
MD5
084aaf4ed20aaf6d53a75ffa92a4d9f7
-
SHA1
6a3fc820992f5a2ad96fd60eaa7caec4242669f6
-
SHA256
1c5545e8fe89c9d6a0171332305d2aa83d7eb343b62d6615308ba93b93b15272
-
SHA512
058aadaef1a54457d05f7013f182ac01553f7312b372e341a5108592eda879f3486108e613b15f4eb703c18df486b573e0206f2d4a8273d34034040e03a87966
-
SSDEEP
12288:KaMB5j1f/QOwOSnV8Eh3doxeNZNN2lFzx3ycxXs4:KaWz3E4INX03ycxc4
Malware Config
Extracted
Family
gozi
Extracted
Family
gozi
Botnet
8877
C2
outlook.com
zaluoa.live
daskdjknefjkewfnkjwe.net
Attributes
-
base_path
/jkloop/
-
build
250207
-
dga_season
10
-
exe_type
loader
-
extension
.kre
-
server_id
12
rsa_pubkey.plain
serpent.plain
Signatures
-
Blocklisted process makes network request 4 IoCs
flow pid Process 73 1292 rundll32.exe 78 1292 rundll32.exe 83 1292 rundll32.exe 92 1292 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2068 wrote to memory of 1292 2068 rundll32.exe 90 PID 2068 wrote to memory of 1292 2068 rundll32.exe 90 PID 2068 wrote to memory of 1292 2068 rundll32.exe 90
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\084aaf4ed20aaf6d53a75ffa92a4d9f7.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\084aaf4ed20aaf6d53a75ffa92a4d9f7.dll,#12⤵
- Blocklisted process makes network request
PID:1292
-