Analysis

  • max time kernel
    141s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    08-05-2024 20:13

General

  • Target

    21e14ffc365273b956e176844f2435b571f37eb81a1e571308537b9f9ef88391.exe

  • Size

    163KB

  • MD5

    2137ef742d12377c9942d0f885706b08

  • SHA1

    bda09bfff8e2feb4f389a3038543f8a45a41d358

  • SHA256

    21e14ffc365273b956e176844f2435b571f37eb81a1e571308537b9f9ef88391

  • SHA512

    0cd98602bff81e068ce13c9f6486601c34647897d603ee188d94322d49ea6c821df2de72b09f2c3f5140e7d1d3e29190ebaa64a3fa73c6c78c44eee606073b9d

  • SSDEEP

    3072:/2r4q/0U64WFO7y7Z/SBmltOrWKDBr+yJb:/2rN/7D7y76mLOf

Malware Config

Extracted

Family

gozi

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 28 IoCs
  • Gozi

    Gozi is a well-known and widely distributed banking trojan.

  • Detects executables built or packed with MPress PE compressor 14 IoCs
  • UPX dump on OEP (original entry point) 14 IoCs
  • Executes dropped EXE 14 IoCs
  • Loads dropped DLL 32 IoCs
  • Drops file in System32 directory 42 IoCs
  • Program crash 1 IoCs
  • Modifies registry class 45 IoCs
  • Suspicious use of WriteProcessMemory 60 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\21e14ffc365273b956e176844f2435b571f37eb81a1e571308537b9f9ef88391.exe
    "C:\Users\Admin\AppData\Local\Temp\21e14ffc365273b956e176844f2435b571f37eb81a1e571308537b9f9ef88391.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Loads dropped DLL
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1692
    • C:\Windows\SysWOW64\Gphmeo32.exe
      C:\Windows\system32\Gphmeo32.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2784
      • C:\Windows\SysWOW64\Hiqbndpb.exe
        C:\Windows\system32\Hiqbndpb.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in System32 directory
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2584
        • C:\Windows\SysWOW64\Hkpnhgge.exe
          C:\Windows\system32\Hkpnhgge.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in System32 directory
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:2616
          • C:\Windows\SysWOW64\Hckcmjep.exe
            C:\Windows\system32\Hckcmjep.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • Loads dropped DLL
            • Drops file in System32 directory
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:2724
            • C:\Windows\SysWOW64\Hejoiedd.exe
              C:\Windows\system32\Hejoiedd.exe
              6⤵
              • Adds autorun key to be loaded by Explorer.exe on startup
              • Executes dropped EXE
              • Loads dropped DLL
              • Drops file in System32 directory
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:2588
              • C:\Windows\SysWOW64\Hobcak32.exe
                C:\Windows\system32\Hobcak32.exe
                7⤵
                • Adds autorun key to be loaded by Explorer.exe on startup
                • Executes dropped EXE
                • Loads dropped DLL
                • Drops file in System32 directory
                • Modifies registry class
                • Suspicious use of WriteProcessMemory
                PID:2876
                • C:\Windows\SysWOW64\Hellne32.exe
                  C:\Windows\system32\Hellne32.exe
                  8⤵
                  • Adds autorun key to be loaded by Explorer.exe on startup
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Drops file in System32 directory
                  • Modifies registry class
                  • Suspicious use of WriteProcessMemory
                  PID:1568
                  • C:\Windows\SysWOW64\Hhjhkq32.exe
                    C:\Windows\system32\Hhjhkq32.exe
                    9⤵
                    • Adds autorun key to be loaded by Explorer.exe on startup
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Drops file in System32 directory
                    • Modifies registry class
                    • Suspicious use of WriteProcessMemory
                    PID:2664
                    • C:\Windows\SysWOW64\Hcplhi32.exe
                      C:\Windows\system32\Hcplhi32.exe
                      10⤵
                      • Adds autorun key to be loaded by Explorer.exe on startup
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Drops file in System32 directory
                      • Modifies registry class
                      • Suspicious use of WriteProcessMemory
                      PID:1188
                      • C:\Windows\SysWOW64\Henidd32.exe
                        C:\Windows\system32\Henidd32.exe
                        11⤵
                        • Adds autorun key to be loaded by Explorer.exe on startup
                        • Executes dropped EXE
                        • Loads dropped DLL
                        • Drops file in System32 directory
                        • Modifies registry class
                        • Suspicious use of WriteProcessMemory
                        PID:1776
                        • C:\Windows\SysWOW64\Hlhaqogk.exe
                          C:\Windows\system32\Hlhaqogk.exe
                          12⤵
                          • Adds autorun key to be loaded by Explorer.exe on startup
                          • Executes dropped EXE
                          • Loads dropped DLL
                          • Drops file in System32 directory
                          • Modifies registry class
                          • Suspicious use of WriteProcessMemory
                          PID:2168
                          • C:\Windows\SysWOW64\Icbimi32.exe
                            C:\Windows\system32\Icbimi32.exe
                            13⤵
                            • Adds autorun key to be loaded by Explorer.exe on startup
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • Drops file in System32 directory
                            • Modifies registry class
                            • Suspicious use of WriteProcessMemory
                            PID:1424
                            • C:\Windows\SysWOW64\Idceea32.exe
                              C:\Windows\system32\Idceea32.exe
                              14⤵
                              • Adds autorun key to be loaded by Explorer.exe on startup
                              • Executes dropped EXE
                              • Loads dropped DLL
                              • Drops file in System32 directory
                              • Modifies registry class
                              • Suspicious use of WriteProcessMemory
                              PID:568
                              • C:\Windows\SysWOW64\Iagfoe32.exe
                                C:\Windows\system32\Iagfoe32.exe
                                15⤵
                                • Executes dropped EXE
                                • Suspicious use of WriteProcessMemory
                                PID:848
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -u -p 848 -s 140
                                  16⤵
                                  • Loads dropped DLL
                                  • Program crash
                                  PID:2892

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\Hcplhi32.exe

    Filesize

    163KB

    MD5

    f17bfdab1a01c61359d659ea5baebc6c

    SHA1

    037a53308f3fd7768e59757e6bf151b127bfd82c

    SHA256

    3dfffbfe1c82c2272a339ed2563e914e40dd1236370bd1d4133dab92df9bf00e

    SHA512

    2322c123880ece91e4bba75980536f36cc0fe376e770525c97f4344d5e3b85c9c4d430a4e5d24e29224ae20bc52c212565b2cb3fd1e2c87c521b19873a7897f0

  • C:\Windows\SysWOW64\Hellne32.exe

    Filesize

    163KB

    MD5

    5a5951908ef80b489863da5c2f12e68c

    SHA1

    561955ea314b2e324b084c18b82e2bdbcb19ebb0

    SHA256

    bb5d07fcfabe96ae9e481aa955030a7149ec8d1ebf3f69b2ca5d747b5ebac8b2

    SHA512

    0b85d54b8177a77075233c7cba809e10d4b9675484db3ff28a106800c5747cbfd36c9ba849004ef044789a78dda9382f59de9eb18c8bf3684ef17f92b683ea16

  • C:\Windows\SysWOW64\Henidd32.exe

    Filesize

    163KB

    MD5

    e67f14167bc139231be3e808bc8b5bf6

    SHA1

    dd9135dfde867ec20f7a6f32930324b54421aa55

    SHA256

    f28d7d6a11d143a4a0c8c6a71d15ebd37ffba6167f22e7f249994f737f998f53

    SHA512

    40268d24c36c501e00012f24ecf9abc6a3a7f4ff0690201e525463f985f3af2b1cb452d42b856f1ab5e329283f8c5ac375369023108a037164f7468cfc1280d5

  • C:\Windows\SysWOW64\Icbimi32.exe

    Filesize

    163KB

    MD5

    cd7229bea590f9d75f1e4754fb0c5b0d

    SHA1

    e1f141a88d2c5204b119501d80fbaae14282c480

    SHA256

    25eddc3e71edf88eb85f86a5045b10feef98ae5b704b9ce652523bcd48f43eb0

    SHA512

    83893c4d4470da917dab6721425aa1d85a542a195b9f75517c067f4c73071cf7efd9d3b331e9a20df5b0863d54c0cce7e81524d4877b1087dda2426a49ea6c7a

  • C:\Windows\SysWOW64\Idceea32.exe

    Filesize

    163KB

    MD5

    a46a090c28770dcc515cbd36c40e1c8f

    SHA1

    25f8d27bd51adf425a2d66f2b1997a54500e9cd7

    SHA256

    11ffb21f0472a638de3d4e11e858447da69c60fbac5a5367bb5273920a2cc328

    SHA512

    0da5d0b3a8d965708ce3dbaa4a44cf1fb138ce8330034d174931e1bec9303c7fb2d020fa5221f8112125138a9d312d61b2d7f0e21e2f1d3ea64ff9304a9c2a93

  • \Windows\SysWOW64\Gphmeo32.exe

    Filesize

    163KB

    MD5

    dd581aeca506acdc49be883426e7def4

    SHA1

    16ff6ccec7822bd899d2172322cc685ca33dcd97

    SHA256

    ceb1b775ee0eae4f071ec20e973c36ccf1ddf5a5fe9afdfc578847e3ee9e8922

    SHA512

    28c3602d92fe84ac890d934cb1fbc53dd70f19c75ab341ea816c27a106dd8be42664e8a0c12ab10d132db42a7f298f405f8241bd4c124e50ab4ebee163354103

  • \Windows\SysWOW64\Hckcmjep.exe

    Filesize

    163KB

    MD5

    ba89b7db39cd54f515797b9a45a5784b

    SHA1

    c45ce9b3d994d94821a100d1e5b1970dcb10c8cd

    SHA256

    3b1972ed5f9ed296d3739ad0703d8f8c3b1814af335169f71da7c079dc40424a

    SHA512

    fdde0265b4ff692695a949d9848708e70a6c27f065cae0c1004d8a2b30159356e0bcdde3e447af14452d7a00561cc98c57fcd6426c165d980c4760699429df1b

  • \Windows\SysWOW64\Hejoiedd.exe

    Filesize

    163KB

    MD5

    010818adc9b964ab4a122de8c110da6c

    SHA1

    a6b07aed4d559e021a671adddba3b2b55c8b059f

    SHA256

    425f901c6c5b76766ae75077bccb69ac3eb0313b021933208ed4584ed1b235f8

    SHA512

    2ab2a2a493d77e1b0a4bed50783c73f56f643648829342336fe5047cb398d92eec4b71e751fd6ca71e31e4a6ed29720b2667ec8b18546439866373957d294dc6

  • \Windows\SysWOW64\Hhjhkq32.exe

    Filesize

    163KB

    MD5

    02bce81aff4f0e21ca6f542671b994a2

    SHA1

    fc36b27123b5cc59e91b096712b0d25cd5dc091a

    SHA256

    3a01f8430bab9171432617105f62596a280134ecbc1085b4fbc509955ede10a0

    SHA512

    481bc9d8885603b5b8a1e673d8b7d82e45d6836ee29fe4020e0de6a28c2bd1ce83b60cb8aac8f77e8a7ce9c7716675d15235b9ee73607f89c1a91e30b8a63c35

  • \Windows\SysWOW64\Hiqbndpb.exe

    Filesize

    163KB

    MD5

    04c1a2c12586c5ac7b187e01f4b49119

    SHA1

    47a25cb2a32af14c86a35db93c29c64a88aa8ed2

    SHA256

    313f6b7c35b2eb829abbe2ce2e0cc910dc1acec747cdb6ccbb8b890281592e80

    SHA512

    95a8c3164d24dbab7f0f55e95c58c29b5a4bc131710d13177b6a45e2ad65a0a74e3076e440991df638381d5353e01fb509c5310440addea3003e90f403526abd

  • \Windows\SysWOW64\Hkpnhgge.exe

    Filesize

    163KB

    MD5

    1e4e4033fc578f3f62518d9fc82645b1

    SHA1

    61f9ce94f32a15ca0bacb6758d31f04a9a186bd5

    SHA256

    8d70fbd200d679dbef76d48300b1fe76921ab2500b090a106bbdbcdc30d35e50

    SHA512

    c6a9ca40df8fe3f9e024095babd9e706bf599cc0cb28b7ecf83301e81b45627bd1a3c8a8d51c284669da9ec4e313f5783226aff835cd76fd311c85b69911d7c5

  • \Windows\SysWOW64\Hlhaqogk.exe

    Filesize

    163KB

    MD5

    d4d1e28acbe5f3aa14372dd505473da2

    SHA1

    d6ab7184e4098acaea5d14d79334b02acb996a81

    SHA256

    369ef699711dfe96d679787f214eb0e1b26fc0da6f1f44b7a72c3cf2e54c35e6

    SHA512

    34d52235dcf2e8fbe0772b320cdc0baf220397e31fa73d6798700b6712b16b410d6f1ae872d3470ddd04959a64e7e0343640df7d3550e2ece9ea6228632da745

  • \Windows\SysWOW64\Hobcak32.exe

    Filesize

    163KB

    MD5

    8c3de4dd072a4bec42ef6b71aeb9e221

    SHA1

    b9fc089b66d927c5fd5250c766328d5f3a5ed074

    SHA256

    b1f65fc4b4aa8f56d7bca26eddd48421ded5c56b5052696fd75de9d9837b68d9

    SHA512

    bcfaa121b30e65e714f68e2b35f32a572733f412746ff8c6c6bb7cc03f5978e34b762f0e9b426ed1972bafd1fe5b8138b6e4f763ed4f289c781a1eb66adf785b

  • \Windows\SysWOW64\Iagfoe32.exe

    Filesize

    163KB

    MD5

    862cc47f8d17bea16596987a098839aa

    SHA1

    8376df2f66ec9d860d03e0adf86a7485911d24a4

    SHA256

    835ea056b1a9cdf8f88001f5d648af802ec9f1a4b47b6072ce3411c4647954df

    SHA512

    8c3d66d3dfa79bc79c11667a4ce79b7c35daa84a45135ab45e92482044d6f40fa60853db6b7c6f3629d3af91e21954c691ab0b8840ec8761223a4ed05635d745

  • memory/568-246-0x0000000000400000-0x0000000000453000-memory.dmp

    Filesize

    332KB

  • memory/568-180-0x0000000000250000-0x00000000002A3000-memory.dmp

    Filesize

    332KB

  • memory/568-181-0x0000000000250000-0x00000000002A3000-memory.dmp

    Filesize

    332KB

  • memory/568-167-0x0000000000400000-0x0000000000453000-memory.dmp

    Filesize

    332KB

  • memory/848-182-0x0000000000400000-0x0000000000453000-memory.dmp

    Filesize

    332KB

  • memory/1188-118-0x0000000000400000-0x0000000000453000-memory.dmp

    Filesize

    332KB

  • memory/1188-236-0x0000000000400000-0x0000000000453000-memory.dmp

    Filesize

    332KB

  • memory/1424-242-0x0000000000400000-0x0000000000453000-memory.dmp

    Filesize

    332KB

  • memory/1568-91-0x0000000000400000-0x0000000000453000-memory.dmp

    Filesize

    332KB

  • memory/1568-232-0x0000000000400000-0x0000000000453000-memory.dmp

    Filesize

    332KB

  • memory/1692-6-0x0000000000250000-0x00000000002A3000-memory.dmp

    Filesize

    332KB

  • memory/1692-0-0x0000000000400000-0x0000000000453000-memory.dmp

    Filesize

    332KB

  • memory/1692-218-0x0000000000400000-0x0000000000453000-memory.dmp

    Filesize

    332KB

  • memory/1776-238-0x0000000000400000-0x0000000000453000-memory.dmp

    Filesize

    332KB

  • memory/1776-137-0x0000000000290000-0x00000000002E3000-memory.dmp

    Filesize

    332KB

  • memory/2168-240-0x0000000000400000-0x0000000000453000-memory.dmp

    Filesize

    332KB

  • memory/2584-27-0x0000000000400000-0x0000000000453000-memory.dmp

    Filesize

    332KB

  • memory/2584-222-0x0000000000400000-0x0000000000453000-memory.dmp

    Filesize

    332KB

  • memory/2588-66-0x0000000000400000-0x0000000000453000-memory.dmp

    Filesize

    332KB

  • memory/2588-228-0x0000000000400000-0x0000000000453000-memory.dmp

    Filesize

    332KB

  • memory/2616-224-0x0000000000400000-0x0000000000453000-memory.dmp

    Filesize

    332KB

  • memory/2616-40-0x0000000000400000-0x0000000000453000-memory.dmp

    Filesize

    332KB

  • memory/2664-234-0x0000000000400000-0x0000000000453000-memory.dmp

    Filesize

    332KB

  • memory/2664-116-0x0000000000260000-0x00000000002B3000-memory.dmp

    Filesize

    332KB

  • memory/2724-226-0x0000000000400000-0x0000000000453000-memory.dmp

    Filesize

    332KB

  • memory/2724-65-0x00000000002D0000-0x0000000000323000-memory.dmp

    Filesize

    332KB

  • memory/2784-220-0x0000000000400000-0x0000000000453000-memory.dmp

    Filesize

    332KB

  • memory/2784-21-0x0000000000320000-0x0000000000373000-memory.dmp

    Filesize

    332KB

  • memory/2784-18-0x0000000000400000-0x0000000000453000-memory.dmp

    Filesize

    332KB

  • memory/2876-230-0x0000000000400000-0x0000000000453000-memory.dmp

    Filesize

    332KB