Analysis
-
max time kernel
110s -
max time network
23s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-10-2024 22:49
Behavioral task
behavioral1
Sample
9d8ddfac510186612e769321f66c104b72f54c514457c10537a94523e331b502N.exe
Resource
win7-20240903-en
General
-
Target
9d8ddfac510186612e769321f66c104b72f54c514457c10537a94523e331b502N.exe
-
Size
393KB
-
MD5
1d3cd5942c096f8d35e17f80da41ef60
-
SHA1
a36851dc46e061cb6063b0fe7b9111ef2ba968c1
-
SHA256
9d8ddfac510186612e769321f66c104b72f54c514457c10537a94523e331b502
-
SHA512
85f7c2bbd72550c9424d7ee0df5199ecfac9fe47e5a64290b09e425936f22bf452f987767a48dd86617bf7ded8ac1174e716b323135a642a30ca5e8a6405d790
-
SSDEEP
6144:TrDJa7rspPBcndOjm+qzLzIke3cssoofBT+ArtkQ77QTveZAS16+Eb04PL38jfuZ:3DJaOBAj+qLD5lBVttIv+AUVEomL8KZP
Malware Config
Extracted
gozi
Signatures
-
resource yara_rule behavioral1/memory/2664-0-0x0000000000400000-0x000000000057D000-memory.dmp upx behavioral1/memory/2664-1-0x0000000000400000-0x000000000057D000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9d8ddfac510186612e769321f66c104b72f54c514457c10537a94523e331b502N.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2664 9d8ddfac510186612e769321f66c104b72f54c514457c10537a94523e331b502N.exe 2664 9d8ddfac510186612e769321f66c104b72f54c514457c10537a94523e331b502N.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9d8ddfac510186612e769321f66c104b72f54c514457c10537a94523e331b502N.exe"C:\Users\Admin\AppData\Local\Temp\9d8ddfac510186612e769321f66c104b72f54c514457c10537a94523e331b502N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2664