Analysis
-
max time kernel
148s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 07:28
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2d64f3a3099cf3803a2af68f0b784ec7.dll
Resource
win7-20231215-en
2 signatures
150 seconds
General
-
Target
2d64f3a3099cf3803a2af68f0b784ec7.dll
-
Size
461KB
-
MD5
2d64f3a3099cf3803a2af68f0b784ec7
-
SHA1
ca7046ebe78496d1be9884ce9bd36abd05284af1
-
SHA256
6589003cf1942258e49562dbec1dec0eae7474d423e757a675004bd900cd79a0
-
SHA512
b881184c93b80734444e2e74abcaff144c368a701d5ccf7014098ac6b2febfddfc70322f5728bc9c0f5d5a3b6d631c4543b71b8bcb9fe816aa7840fe85e20433
-
SSDEEP
12288:mxIkdQI90tC1o4ivB/QD3Jv58kEPGxU3aV+2d:5pI90k3ivB/Q1mZ73a42
Malware Config
Extracted
Family
gozi
Extracted
Family
gozi
Botnet
1500
C2
gtr.antoinfer.com
app.bighomegl.at
Attributes
-
build
250211
-
exe_type
loader
-
server_id
580
rsa_pubkey.plain
aes.plain
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 4260 wrote to memory of 2300 4260 rundll32.exe rundll32.exe PID 4260 wrote to memory of 2300 4260 rundll32.exe rundll32.exe PID 4260 wrote to memory of 2300 4260 rundll32.exe rundll32.exe
Processes
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d64f3a3099cf3803a2af68f0b784ec7.dll,#11⤵
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d64f3a3099cf3803a2af68f0b784ec7.dll,#11⤵
- Suspicious use of WriteProcessMemory
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2300-1-0x0000000074F40000-0x0000000075052000-memory.dmpFilesize
1.1MB
-
memory/2300-2-0x0000000001610000-0x0000000001611000-memory.dmpFilesize
4KB
-
memory/2300-0-0x0000000074F40000-0x0000000075052000-memory.dmpFilesize
1.1MB
-
memory/2300-3-0x0000000002F40000-0x0000000002F4D000-memory.dmpFilesize
52KB
-
memory/2300-6-0x0000000074F40000-0x0000000075052000-memory.dmpFilesize
1.1MB