Analysis
-
max time kernel
146s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
16-02-2024 05:50
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
9f9830791b377db452e376b1f5b7a609.dll
Resource
win7-20231215-en
windows7-x64
2 signatures
150 seconds
General
-
Target
9f9830791b377db452e376b1f5b7a609.dll
-
Size
643KB
-
MD5
9f9830791b377db452e376b1f5b7a609
-
SHA1
4a7bb8bf507fbcd55aad260b9de7aad24a8ce83a
-
SHA256
e1eccd1c27d390a9b08fe3314e450b97348d36fccf0cdada901edf9270a503bd
-
SHA512
10a948089c3a6989db5c62091f76309e3c7b8ad884cd09fa5c914ae7ac5981831e618d2ee9d5d412f8ef79616d60e03f13250d074f713d21f50a3db4e74b5b7c
-
SSDEEP
12288:HMUpikM1ABVY4lsBnllWzwazxRvwZ9QKC71L715+PoR5nFIlW2i:K4Y4lglQzwyxRvw/SJLT5FIV
Malware Config
Extracted
Family
gozi
Extracted
Family
gozi
Botnet
1500
C2
gtr.antoinfer.com
app.bighomegl.at
Attributes
-
build
250211
-
exe_type
loader
-
server_id
580
rsa_pubkey.plain
aes.plain
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 3640 wrote to memory of 3080 3640 rundll32.exe rundll32.exe PID 3640 wrote to memory of 3080 3640 rundll32.exe rundll32.exe PID 3640 wrote to memory of 3080 3640 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9f9830791b377db452e376b1f5b7a609.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9f9830791b377db452e376b1f5b7a609.dll,#12⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3080-0-0x0000000075790000-0x0000000075843000-memory.dmpFilesize
716KB
-
memory/3080-1-0x0000000001230000-0x0000000001231000-memory.dmpFilesize
4KB
-
memory/3080-2-0x0000000075790000-0x0000000075843000-memory.dmpFilesize
716KB
-
memory/3080-3-0x0000000075790000-0x0000000075843000-memory.dmpFilesize
716KB
-
memory/3080-4-0x0000000001300000-0x000000000130D000-memory.dmpFilesize
52KB
-
memory/3080-7-0x0000000075790000-0x0000000075843000-memory.dmpFilesize
716KB