Analysis
-
max time kernel
142s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
01-02-2024 14:01
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
871119561025c22cce7c161a408993fc.dll
Resource
win7-20231215-en
windows7-x64
2 signatures
150 seconds
General
-
Target
871119561025c22cce7c161a408993fc.dll
-
Size
461KB
-
MD5
871119561025c22cce7c161a408993fc
-
SHA1
d253f17e53f52cbe0978fd88861e560db55dbb12
-
SHA256
e33c1276938039d18d6feb813ef494458619f6999374e31f05a2b5a74e012ab6
-
SHA512
fa861cdb73bd57fde9a2a3bf173213a950464e85c9ddbe2bf5e17ba38c8985f631fe41b9bdf6f4279215ef83c3d35f431a3ea50979170d9754a1fe7094f8b88d
-
SSDEEP
12288:mxIkdQI90tC1o4imB/QD3Jv58kEPGxU3aV+2d:5pI90k3imB/Q1mZ73a42
Malware Config
Extracted
Family
gozi
Extracted
Family
gozi
Botnet
1500
C2
gtr.antoinfer.com
app.bighomegl.at
Attributes
-
build
250211
-
exe_type
loader
-
server_id
580
rsa_pubkey.plain
aes.plain
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 1916 wrote to memory of 2608 1916 rundll32.exe rundll32.exe PID 1916 wrote to memory of 2608 1916 rundll32.exe rundll32.exe PID 1916 wrote to memory of 2608 1916 rundll32.exe rundll32.exe PID 1916 wrote to memory of 2608 1916 rundll32.exe rundll32.exe PID 1916 wrote to memory of 2608 1916 rundll32.exe rundll32.exe PID 1916 wrote to memory of 2608 1916 rundll32.exe rundll32.exe PID 1916 wrote to memory of 2608 1916 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\871119561025c22cce7c161a408993fc.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\871119561025c22cce7c161a408993fc.dll,#12⤵PID:2608
-