Analysis
-
max time kernel
109s -
max time network
175s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
01-07-2024 14:48
Static task
static1
Behavioral task
behavioral1
Sample
2024-07-01_6068830154e280bb0c0ca87e57533425_gozi_magniber_revil.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-07-01_6068830154e280bb0c0ca87e57533425_gozi_magniber_revil.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-07-01_6068830154e280bb0c0ca87e57533425_gozi_magniber_revil.exe
-
Size
37.6MB
-
MD5
6068830154e280bb0c0ca87e57533425
-
SHA1
94e5cab7e49fb04ec30ff75b6e3bc4fcea9e792d
-
SHA256
492d4f36465829ece536dbd06aa7010b1d4c0270db158242d296ed6e73a4b696
-
SHA512
990ccda1b69c7a0d3bb43dc3bdf6bb518deb02197395b661b332e55d64cdbf4a740fbab830773c22e4b1afc6d357ee4be12e7ab9a6916f15386bd45c9e68df73
-
SSDEEP
786432:4TuUJP9mP1O9uGVD+6PPZlXMuzw+AuE3sBJm:4TuUJlmP1O9uGVDPxWiOuE3s/
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 2024-07-01_6068830154e280bb0c0ca87e57533425_gozi_magniber_revil.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 2024-07-01_6068830154e280bb0c0ca87e57533425_gozi_magniber_revil.exe -
Checks system information in the registry 2 TTPs 2 IoCs
System information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer 2024-07-01_6068830154e280bb0c0ca87e57533425_gozi_magniber_revil.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName 2024-07-01_6068830154e280bb0c0ca87e57533425_gozi_magniber_revil.exe -
Loads dropped DLL 1 IoCs
pid Process 2320 2024-07-01_6068830154e280bb0c0ca87e57533425_gozi_magniber_revil.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 7 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 2024-07-01_6068830154e280bb0c0ca87e57533425_gozi_magniber_revil.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz 2024-07-01_6068830154e280bb0c0ca87e57533425_gozi_magniber_revil.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 2024-07-01_6068830154e280bb0c0ca87e57533425_gozi_magniber_revil.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 2024-07-01_6068830154e280bb0c0ca87e57533425_gozi_magniber_revil.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz 2024-07-01_6068830154e280bb0c0ca87e57533425_gozi_magniber_revil.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor 2024-07-01_6068830154e280bb0c0ca87e57533425_gozi_magniber_revil.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor 2024-07-01_6068830154e280bb0c0ca87e57533425_gozi_magniber_revil.exe -
Suspicious behavior: EnumeratesProcesses 40 IoCs
pid Process 2320 2024-07-01_6068830154e280bb0c0ca87e57533425_gozi_magniber_revil.exe 2320 2024-07-01_6068830154e280bb0c0ca87e57533425_gozi_magniber_revil.exe 2320 2024-07-01_6068830154e280bb0c0ca87e57533425_gozi_magniber_revil.exe 2320 2024-07-01_6068830154e280bb0c0ca87e57533425_gozi_magniber_revil.exe 2320 2024-07-01_6068830154e280bb0c0ca87e57533425_gozi_magniber_revil.exe 2320 2024-07-01_6068830154e280bb0c0ca87e57533425_gozi_magniber_revil.exe 2320 2024-07-01_6068830154e280bb0c0ca87e57533425_gozi_magniber_revil.exe 2320 2024-07-01_6068830154e280bb0c0ca87e57533425_gozi_magniber_revil.exe 2320 2024-07-01_6068830154e280bb0c0ca87e57533425_gozi_magniber_revil.exe 2320 2024-07-01_6068830154e280bb0c0ca87e57533425_gozi_magniber_revil.exe 2320 2024-07-01_6068830154e280bb0c0ca87e57533425_gozi_magniber_revil.exe 2320 2024-07-01_6068830154e280bb0c0ca87e57533425_gozi_magniber_revil.exe 2320 2024-07-01_6068830154e280bb0c0ca87e57533425_gozi_magniber_revil.exe 2320 2024-07-01_6068830154e280bb0c0ca87e57533425_gozi_magniber_revil.exe 2320 2024-07-01_6068830154e280bb0c0ca87e57533425_gozi_magniber_revil.exe 2320 2024-07-01_6068830154e280bb0c0ca87e57533425_gozi_magniber_revil.exe 2320 2024-07-01_6068830154e280bb0c0ca87e57533425_gozi_magniber_revil.exe 2320 2024-07-01_6068830154e280bb0c0ca87e57533425_gozi_magniber_revil.exe 2320 2024-07-01_6068830154e280bb0c0ca87e57533425_gozi_magniber_revil.exe 2320 2024-07-01_6068830154e280bb0c0ca87e57533425_gozi_magniber_revil.exe 2320 2024-07-01_6068830154e280bb0c0ca87e57533425_gozi_magniber_revil.exe 2320 2024-07-01_6068830154e280bb0c0ca87e57533425_gozi_magniber_revil.exe 2320 2024-07-01_6068830154e280bb0c0ca87e57533425_gozi_magniber_revil.exe 2320 2024-07-01_6068830154e280bb0c0ca87e57533425_gozi_magniber_revil.exe 2320 2024-07-01_6068830154e280bb0c0ca87e57533425_gozi_magniber_revil.exe 2320 2024-07-01_6068830154e280bb0c0ca87e57533425_gozi_magniber_revil.exe 2320 2024-07-01_6068830154e280bb0c0ca87e57533425_gozi_magniber_revil.exe 2320 2024-07-01_6068830154e280bb0c0ca87e57533425_gozi_magniber_revil.exe 2320 2024-07-01_6068830154e280bb0c0ca87e57533425_gozi_magniber_revil.exe 2320 2024-07-01_6068830154e280bb0c0ca87e57533425_gozi_magniber_revil.exe 2320 2024-07-01_6068830154e280bb0c0ca87e57533425_gozi_magniber_revil.exe 2320 2024-07-01_6068830154e280bb0c0ca87e57533425_gozi_magniber_revil.exe 2320 2024-07-01_6068830154e280bb0c0ca87e57533425_gozi_magniber_revil.exe 2320 2024-07-01_6068830154e280bb0c0ca87e57533425_gozi_magniber_revil.exe 2320 2024-07-01_6068830154e280bb0c0ca87e57533425_gozi_magniber_revil.exe 2320 2024-07-01_6068830154e280bb0c0ca87e57533425_gozi_magniber_revil.exe 2320 2024-07-01_6068830154e280bb0c0ca87e57533425_gozi_magniber_revil.exe 2320 2024-07-01_6068830154e280bb0c0ca87e57533425_gozi_magniber_revil.exe 2320 2024-07-01_6068830154e280bb0c0ca87e57533425_gozi_magniber_revil.exe 2320 2024-07-01_6068830154e280bb0c0ca87e57533425_gozi_magniber_revil.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2320 2024-07-01_6068830154e280bb0c0ca87e57533425_gozi_magniber_revil.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2320 2024-07-01_6068830154e280bb0c0ca87e57533425_gozi_magniber_revil.exe 2320 2024-07-01_6068830154e280bb0c0ca87e57533425_gozi_magniber_revil.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-07-01_6068830154e280bb0c0ca87e57533425_gozi_magniber_revil.exe"C:\Users\Admin\AppData\Local\Temp\2024-07-01_6068830154e280bb0c0ca87e57533425_gozi_magniber_revil.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Checks computer location settings
- Checks system information in the registry
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2320
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1340 --field-trial-handle=2356,i,13261194862334667799,7441241219475888176,262144 --variations-seed-version /prefetch:81⤵PID:464
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512KB
MD56eaa37edd89818f4678234d852e6c072
SHA19d355c06b66bd18fcac221fba50247babf83dc91
SHA2560bed2954c6ca0f3f23bd4d9387822c6dcd17abe3592a34b82ca6d74553eb677e
SHA512780c6c1ca429e177e1dd154b2e9274a03c15d4ed2b36df59ce051a3b2f623d8340dbb81338f5c527d71aa7fa2d9f4912efd2e706c3c07d0577e115a34a526e55
-
Filesize
512KB
MD5876e2d613cc3e6b89cb5d9a6eac28a99
SHA14a52f86bde25562f36e9b3a92138b54f4f30e7b3
SHA25670f89e06cd0ba0e29784478d14f18f1634929e62ab3264788a62676d88c2f8b8
SHA512af859c02c75936085aa9c8eae12ccb5f32224d8de48bde157ec0751c7cc75f3250d835aad78412cb7513108f1f280b1f016e28be930be5a5d899d8e0f8fbdd81
-
Filesize
11.6MB
MD5007f40465d148ae3a7d8e3699bace8b3
SHA1a4b1071f53ddf7769eaf8a870b2376195ca60d56
SHA2568411aabc5c6b064529e8d00bc40b3e4eebfd8fb765c591ebca8a94c3b334e961
SHA51269bf7d967890f557e924fcbc34a1bbc2c38526f2091d0e715e9555bbc54bd94bab252066fce24b331963d4f4c462e651ca9faaff3f139f12c7a5ee7a39a2b49d
-
Filesize
11.6MB
MD5f034d1dbf166d6eafb64cac8a7676878
SHA1c1f540109f42b9d31427162e42398e588310f4dc
SHA256ad50702a1917cfa0952b08b153bd37165887289e41aae9ea6fab57ac0614db34
SHA512cf61c38d7958e506e1213457da34639a73972429e30ed178546afbabab9fecf754c440458d6a1c8c19bec9e2ca2171089dacd7217703ba3d8460e14c2201d636
-
Filesize
12.1MB
MD5f31decb3d78a7249e5a195de0ede1714
SHA1da423cdc3ace0440f635883afed267f873ae68fd
SHA2561f463d18749b788ad4a4d05fa5b1e8bbc50e18fa397724ffeb5a72cd387b3e99
SHA5123774148fa1b825893f4d371377985ff400468f197e96aa8e832bf865892488b02d5fff5c18455a7c6641c0ed95816df6e80310b2bb0eac5f19987493e7ba0c1e
-
Filesize
16KB
MD5f6b7f7030df241d48ab145e6f90216fe
SHA1bdf0180e4ef022c336e961ccfdd9831291fd0f2c
SHA25628b09857ffbbb46f2dc5e3584d247f2deeb43823bf479a0820880033802e664d
SHA512ef5a8e8eb8b7269256e9d9d8c819040de25f783fcdbf375ffc60164f0b0f508c806c3cf61e23bd0bd02d8daabb31dfd1ce6dc370041cceff92ca8ecb7642117d
-
Filesize
16KB
MD57b91c72168cde9db35311a2e3b610344
SHA1412944bce7ec2a2715fd679ea39497a3c75a944a
SHA25688f2fb34dd9db9cccc5153ef1f6dae5f26b95a4324014ac93fc743badc7f2b0b
SHA512df0cda580616a335dbc0b130d6cbb5c9160746423fdf7878eca00a8d0d5705600934683ea55728bd9034c0fcdfadcf39a3e745d0ef8792a21984893c34092e94
-
Filesize
16KB
MD5b97d285fe4a727be910932aabc127831
SHA1bbde156fb2f95907e6579075bd062e7add7e1211
SHA256a042c1af77df032a6acd09238a81da110f7c76692d369ef793521e588d2383cd
SHA5126ea997a811e2415f771632c8216d5c588e84c8b796d338694a8c00185dadada8a793fc5eb5da5b1ef84e469d7920ee2684f0ad0df4d349d4733c6c19fd35a658
-
Filesize
16KB
MD540f0e9e5bda3aacd50e372b41a660e64
SHA14f7383959d24cad4a73ec0c683ef1ee392e47879
SHA256be0d53c8dcf8e23de4f5b3fbf4aae7126439fabc71bda6bbf88d3107a2886904
SHA5125eeb7095fb351435ed132e963a92ce41bea761449994e5b0600dc467c4e08c4ce8c618851c4a5b7a99372472eea47300317f5c59280d233993c31057de4d8bbc
-
Filesize
600KB
MD5f637d5d3c3a60fddb5dd397556fe9b1d
SHA166f0c4f137870a9927400ea00facc00193ef21e3
SHA256641b843cb6ee7538ec267212694c9ef0616b9ac9ab14a0abd7cf020678d50b02
SHA512e96984f2f9c6858e989f10fd8e71b09a8a640c9be2fb87ac1692d9bca7107d7a837f8fbdcc46c01a6107dd9020994c5a6f975b7e16434e9b2bf1c43b1f0d8b31