Analysis
-
max time kernel
152s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
09/01/2024, 02:45
Behavioral task
behavioral1
Sample
4d22640d9cbdc1052d109f6442feabf8.exe
Resource
win7-20231129-en
General
-
Target
4d22640d9cbdc1052d109f6442feabf8.exe
-
Size
9.6MB
-
MD5
4d22640d9cbdc1052d109f6442feabf8
-
SHA1
6e4be4d380dfa2f043f09505971ebe5a7773051c
-
SHA256
45bbc1888cb27463adf280d312fc932fa784877f4592a8b81517ca431a00ccca
-
SHA512
3107453c6b7f61355a851373d4351d799d046cb3c9014b6e0a16e00cec4f5235152c88574a49cd9b54e047c01a2580e9e96871e33df46bb622dcdae278075788
-
SSDEEP
196608:67B4Ngl/iBBB1hm1Wgl/iBZMkgl/iBBB1hm1Wgl/iBP:IB42i3vmI2iZR2i3vmI2iP
Malware Config
Extracted
gozi
Signatures
-
Deletes itself 1 IoCs
pid Process 3248 4d22640d9cbdc1052d109f6442feabf8.exe -
Executes dropped EXE 1 IoCs
pid Process 3248 4d22640d9cbdc1052d109f6442feabf8.exe -
resource yara_rule behavioral2/memory/468-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x000700000002313a-11.dat upx behavioral2/memory/3248-13-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 468 4d22640d9cbdc1052d109f6442feabf8.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 468 4d22640d9cbdc1052d109f6442feabf8.exe 3248 4d22640d9cbdc1052d109f6442feabf8.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 468 wrote to memory of 3248 468 4d22640d9cbdc1052d109f6442feabf8.exe 93 PID 468 wrote to memory of 3248 468 4d22640d9cbdc1052d109f6442feabf8.exe 93 PID 468 wrote to memory of 3248 468 4d22640d9cbdc1052d109f6442feabf8.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\4d22640d9cbdc1052d109f6442feabf8.exe"C:\Users\Admin\AppData\Local\Temp\4d22640d9cbdc1052d109f6442feabf8.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Users\Admin\AppData\Local\Temp\4d22640d9cbdc1052d109f6442feabf8.exeC:\Users\Admin\AppData\Local\Temp\4d22640d9cbdc1052d109f6442feabf8.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3248
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9.6MB
MD5dcf75f421bce2399b6a7a93d5f816e27
SHA1b28f0947adffa11747337f5e1ce32f870878725b
SHA256422eb814da05aa0b5c506fb434830c8254b7c3b9e2af1d6c29475292f9c47da8
SHA5122d526ed296bc1570b5193b122efdea5d82fd2f9e50c4495027fbde7fe9ea256bdcf9070d918c8d0771aa26e9c9b11bd3238997f1fc4e77fbb644743a51d5a4e4