Analysis
-
max time kernel
140s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 00:19
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2175f4caac5f3acea3157bc76cb8ae10.dll
Resource
win7-20231215-en
2 signatures
150 seconds
General
-
Target
2175f4caac5f3acea3157bc76cb8ae10.dll
-
Size
643KB
-
MD5
2175f4caac5f3acea3157bc76cb8ae10
-
SHA1
bb990f49a441d3fe99609f9bc866105a5eb3917a
-
SHA256
eef5bb666034525e1e6856b8e185e757ec69fb8c367a274fc8e5106712e6acb4
-
SHA512
0d650b94cfd2237e8785607123e31edaaeaa8621bee8c5bd096643924d662b020c4f7ce75bea32f362bfed3e616282a760b78edb0a488b43000d5091cd7a4b57
-
SSDEEP
12288:HMUpikM1ABVY4lsBnllWzwazxRvwU9QKC71L715+PoR5nFIlW2i:K4Y4lglQzwyxRvwoSJLT5FIV
Malware Config
Extracted
Family
gozi
Extracted
Family
gozi
Botnet
1500
C2
gtr.antoinfer.com
app.bighomegl.at
Attributes
-
build
250211
-
exe_type
loader
-
server_id
580
rsa_pubkey.plain
aes.plain
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 2124 wrote to memory of 2996 2124 rundll32.exe rundll32.exe PID 2124 wrote to memory of 2996 2124 rundll32.exe rundll32.exe PID 2124 wrote to memory of 2996 2124 rundll32.exe rundll32.exe PID 2124 wrote to memory of 2996 2124 rundll32.exe rundll32.exe PID 2124 wrote to memory of 2996 2124 rundll32.exe rundll32.exe PID 2124 wrote to memory of 2996 2124 rundll32.exe rundll32.exe PID 2124 wrote to memory of 2996 2124 rundll32.exe rundll32.exe
Processes
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2175f4caac5f3acea3157bc76cb8ae10.dll,#11⤵
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2175f4caac5f3acea3157bc76cb8ae10.dll,#11⤵
- Suspicious use of WriteProcessMemory
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2996-1-0x0000000074670000-0x0000000074723000-memory.dmpFilesize
716KB
-
memory/2996-2-0x00000000001B0000-0x00000000001B1000-memory.dmpFilesize
4KB
-
memory/2996-0-0x0000000074670000-0x0000000074723000-memory.dmpFilesize
716KB
-
memory/2996-3-0x0000000074670000-0x0000000074723000-memory.dmpFilesize
716KB
-
memory/2996-4-0x0000000074670000-0x0000000074723000-memory.dmpFilesize
716KB
-
memory/2996-5-0x0000000074670000-0x0000000074723000-memory.dmpFilesize
716KB
-
memory/2996-6-0x0000000074670000-0x0000000074723000-memory.dmpFilesize
716KB
-
memory/2996-7-0x0000000074670000-0x0000000074723000-memory.dmpFilesize
716KB
-
memory/2996-8-0x0000000074670000-0x0000000074723000-memory.dmpFilesize
716KB
-
memory/2996-12-0x0000000074670000-0x0000000074723000-memory.dmpFilesize
716KB
-
memory/2996-13-0x0000000074670000-0x0000000074723000-memory.dmpFilesize
716KB
-
memory/2996-16-0x0000000074670000-0x0000000074723000-memory.dmpFilesize
716KB