Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
08/01/2024, 16:20
Behavioral task
behavioral1
Sample
4be5cce19e748a9358fdac3fc56f4d0e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4be5cce19e748a9358fdac3fc56f4d0e.exe
Resource
win10v2004-20231215-en
General
-
Target
4be5cce19e748a9358fdac3fc56f4d0e.exe
-
Size
1.3MB
-
MD5
4be5cce19e748a9358fdac3fc56f4d0e
-
SHA1
11f4acd0fc6e3ab32749034f24753c42279d5a9d
-
SHA256
4124de1673fe7567235b6fc68f31970785c764d5f437a9440f61f2f14a098569
-
SHA512
242d7485c53f269872d191e2735b2382c4489f4cd1411bfa677f67540aa8507451f9458c9517d422919ce72362445cc95c863773ab6c4cf6ce095304cf1a6d58
-
SSDEEP
24576:dMcp/Zv8F7z1527o9FVvCXbj4A6bO7bAGbfTLDZGF0OMWO:ecpqF7z1uo/VvnA1Xr3IF0df
Malware Config
Extracted
gozi
Signatures
-
Deletes itself 1 IoCs
pid Process 2160 4be5cce19e748a9358fdac3fc56f4d0e.exe -
Executes dropped EXE 1 IoCs
pid Process 2160 4be5cce19e748a9358fdac3fc56f4d0e.exe -
Loads dropped DLL 1 IoCs
pid Process 2092 4be5cce19e748a9358fdac3fc56f4d0e.exe -
resource yara_rule behavioral1/memory/2092-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral1/files/0x000a000000012263-10.dat upx behavioral1/memory/2160-16-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral1/memory/2092-13-0x00000000034A0000-0x000000000398F000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2092 4be5cce19e748a9358fdac3fc56f4d0e.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2092 4be5cce19e748a9358fdac3fc56f4d0e.exe 2160 4be5cce19e748a9358fdac3fc56f4d0e.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2092 wrote to memory of 2160 2092 4be5cce19e748a9358fdac3fc56f4d0e.exe 28 PID 2092 wrote to memory of 2160 2092 4be5cce19e748a9358fdac3fc56f4d0e.exe 28 PID 2092 wrote to memory of 2160 2092 4be5cce19e748a9358fdac3fc56f4d0e.exe 28 PID 2092 wrote to memory of 2160 2092 4be5cce19e748a9358fdac3fc56f4d0e.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\4be5cce19e748a9358fdac3fc56f4d0e.exe"C:\Users\Admin\AppData\Local\Temp\4be5cce19e748a9358fdac3fc56f4d0e.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Users\Admin\AppData\Local\Temp\4be5cce19e748a9358fdac3fc56f4d0e.exeC:\Users\Admin\AppData\Local\Temp\4be5cce19e748a9358fdac3fc56f4d0e.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2160
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD56b9b8908ba8bcaedcacd5420886726a1
SHA1994223a1b00fb6192402b64beecfd712e8dec2df
SHA25682125b9b62e13c1aecf8b403176d6cabaa96856fba29c4ee159236ff64ada7bc
SHA5127e1da8ef15218e9f9da2a9839a0e3b059baf8c23877b611e4f2ce1f95bbc8e0e73f52f596c33e033c475b0a20a4d9b499fe34062ae6acc11f5f4d941a5966aa8