Overview
overview
10Static
static
513f8bb1af7...be.exe
windows7-x64
1049b84085b7...c6.exe
windows7-x64
10639a86559b...3d.exe
windows7-x64
10Счет �...15.scr
windows7-x64
3Счет �...08.scr
windows7-x64
3inquiry.scr
windows7-x64
9c0cf40b883...3a.exe
windows7-x64
8e49778d20a...73.exe
windows7-x64
8ПРЕТЕ...Я.scr
windows7-x64
5карто...я.scr
windows7-x64
5Analysis
-
max time kernel
300s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-11-2024 20:50
Behavioral task
behavioral1
Sample
13f8bb1af7e80604416111a9e5508426df058e53eb2f096d110fd74f55f798be.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
49b84085b7cc731d39fda5a6c15d8bedf3051f3e3f8792f4a50220ebdbf1a4c6.exe
Resource
win7-20240903-en
Behavioral task
behavioral3
Sample
639a86559b0a086fe388e4309ea22e49f79362c0983df1a5b09fa477db3c463d.exe
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
Счет и накладная/Накладная для 1736 от 26.08.2015.scr
Resource
win7-20240903-en
Behavioral task
behavioral5
Sample
Счет и накладная/Счет на оплату от 26-08.scr
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
inquiry.scr
Resource
win7-20240903-en
Behavioral task
behavioral7
Sample
c0cf40b8830d666a24bdd4febdc162e95aa30ed968fa3675e26ad97b2e88e03a.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
e49778d20a2f9b1f8b00ddd24b6bcee81af381ed02cfe0a3c9ab3111cda5f573.exe
Resource
win7-20240708-en
Behavioral task
behavioral9
Sample
ПРЕТЕНЗИЯ.scr
Resource
win7-20240903-en
General
-
Target
49b84085b7cc731d39fda5a6c15d8bedf3051f3e3f8792f4a50220ebdbf1a4c6.exe
-
Size
507KB
-
MD5
6e352a6e96db293f487d1c1996f7ca60
-
SHA1
887a357a96b9dbb428b6b776a3ec8ca8de746f18
-
SHA256
49b84085b7cc731d39fda5a6c15d8bedf3051f3e3f8792f4a50220ebdbf1a4c6
-
SHA512
bad3b109707b7ba714ccfd41109d6defe9aa2c651cd7dd8c91f536622fa52394071e858a81a2844421a56219527737d395580ea73e250f6cb44c4c1c4959351d
-
SSDEEP
12288:IEi3NId2zO8PW418jZZUozZuzYgwz3r14Y07KCJ:GrdZ+tZlVUYBzB0KC
Malware Config
Extracted
gozi
-
build
215798
Signatures
-
Gozi family
-
Executes dropped EXE 2 IoCs
pid Process 1044 appmters.exe 2224 appmters.exe -
Loads dropped DLL 2 IoCs
pid Process 2600 cmd.exe 2600 cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\BioCutil = "C:\\Users\\Admin\\AppData\\Roaming\\comrdemx\\appmters.exe" 49b84085b7cc731d39fda5a6c15d8bedf3051f3e3f8792f4a50220ebdbf1a4c6.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2696 set thread context of 2824 2696 49b84085b7cc731d39fda5a6c15d8bedf3051f3e3f8792f4a50220ebdbf1a4c6.exe 30 PID 1044 set thread context of 2224 1044 appmters.exe 35 PID 2224 set thread context of 1004 2224 appmters.exe 36 PID 1004 set thread context of 1164 1004 svchost.exe 21 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 49b84085b7cc731d39fda5a6c15d8bedf3051f3e3f8792f4a50220ebdbf1a4c6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 49b84085b7cc731d39fda5a6c15d8bedf3051f3e3f8792f4a50220ebdbf1a4c6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language appmters.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language appmters.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2224 appmters.exe 1164 Explorer.EXE -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2224 appmters.exe 1004 svchost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 1164 Explorer.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1164 Explorer.EXE -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 2696 wrote to memory of 2824 2696 49b84085b7cc731d39fda5a6c15d8bedf3051f3e3f8792f4a50220ebdbf1a4c6.exe 30 PID 2696 wrote to memory of 2824 2696 49b84085b7cc731d39fda5a6c15d8bedf3051f3e3f8792f4a50220ebdbf1a4c6.exe 30 PID 2696 wrote to memory of 2824 2696 49b84085b7cc731d39fda5a6c15d8bedf3051f3e3f8792f4a50220ebdbf1a4c6.exe 30 PID 2696 wrote to memory of 2824 2696 49b84085b7cc731d39fda5a6c15d8bedf3051f3e3f8792f4a50220ebdbf1a4c6.exe 30 PID 2696 wrote to memory of 2824 2696 49b84085b7cc731d39fda5a6c15d8bedf3051f3e3f8792f4a50220ebdbf1a4c6.exe 30 PID 2696 wrote to memory of 2824 2696 49b84085b7cc731d39fda5a6c15d8bedf3051f3e3f8792f4a50220ebdbf1a4c6.exe 30 PID 2696 wrote to memory of 2824 2696 49b84085b7cc731d39fda5a6c15d8bedf3051f3e3f8792f4a50220ebdbf1a4c6.exe 30 PID 2696 wrote to memory of 2824 2696 49b84085b7cc731d39fda5a6c15d8bedf3051f3e3f8792f4a50220ebdbf1a4c6.exe 30 PID 2696 wrote to memory of 2824 2696 49b84085b7cc731d39fda5a6c15d8bedf3051f3e3f8792f4a50220ebdbf1a4c6.exe 30 PID 2696 wrote to memory of 2824 2696 49b84085b7cc731d39fda5a6c15d8bedf3051f3e3f8792f4a50220ebdbf1a4c6.exe 30 PID 2696 wrote to memory of 2824 2696 49b84085b7cc731d39fda5a6c15d8bedf3051f3e3f8792f4a50220ebdbf1a4c6.exe 30 PID 2824 wrote to memory of 2624 2824 49b84085b7cc731d39fda5a6c15d8bedf3051f3e3f8792f4a50220ebdbf1a4c6.exe 31 PID 2824 wrote to memory of 2624 2824 49b84085b7cc731d39fda5a6c15d8bedf3051f3e3f8792f4a50220ebdbf1a4c6.exe 31 PID 2824 wrote to memory of 2624 2824 49b84085b7cc731d39fda5a6c15d8bedf3051f3e3f8792f4a50220ebdbf1a4c6.exe 31 PID 2824 wrote to memory of 2624 2824 49b84085b7cc731d39fda5a6c15d8bedf3051f3e3f8792f4a50220ebdbf1a4c6.exe 31 PID 2624 wrote to memory of 2600 2624 cmd.exe 33 PID 2624 wrote to memory of 2600 2624 cmd.exe 33 PID 2624 wrote to memory of 2600 2624 cmd.exe 33 PID 2624 wrote to memory of 2600 2624 cmd.exe 33 PID 2600 wrote to memory of 1044 2600 cmd.exe 34 PID 2600 wrote to memory of 1044 2600 cmd.exe 34 PID 2600 wrote to memory of 1044 2600 cmd.exe 34 PID 2600 wrote to memory of 1044 2600 cmd.exe 34 PID 1044 wrote to memory of 2224 1044 appmters.exe 35 PID 1044 wrote to memory of 2224 1044 appmters.exe 35 PID 1044 wrote to memory of 2224 1044 appmters.exe 35 PID 1044 wrote to memory of 2224 1044 appmters.exe 35 PID 1044 wrote to memory of 2224 1044 appmters.exe 35 PID 1044 wrote to memory of 2224 1044 appmters.exe 35 PID 1044 wrote to memory of 2224 1044 appmters.exe 35 PID 1044 wrote to memory of 2224 1044 appmters.exe 35 PID 1044 wrote to memory of 2224 1044 appmters.exe 35 PID 1044 wrote to memory of 2224 1044 appmters.exe 35 PID 1044 wrote to memory of 2224 1044 appmters.exe 35 PID 2224 wrote to memory of 1004 2224 appmters.exe 36 PID 2224 wrote to memory of 1004 2224 appmters.exe 36 PID 2224 wrote to memory of 1004 2224 appmters.exe 36 PID 2224 wrote to memory of 1004 2224 appmters.exe 36 PID 2224 wrote to memory of 1004 2224 appmters.exe 36 PID 2224 wrote to memory of 1004 2224 appmters.exe 36 PID 2224 wrote to memory of 1004 2224 appmters.exe 36 PID 1004 wrote to memory of 1164 1004 svchost.exe 21 PID 1004 wrote to memory of 1164 1004 svchost.exe 21 PID 1004 wrote to memory of 1164 1004 svchost.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1164 -
C:\Users\Admin\AppData\Local\Temp\49b84085b7cc731d39fda5a6c15d8bedf3051f3e3f8792f4a50220ebdbf1a4c6.exe"C:\Users\Admin\AppData\Local\Temp\49b84085b7cc731d39fda5a6c15d8bedf3051f3e3f8792f4a50220ebdbf1a4c6.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Users\Admin\AppData\Local\Temp\49b84085b7cc731d39fda5a6c15d8bedf3051f3e3f8792f4a50220ebdbf1a4c6.exe"C:\Users\Admin\AppData\Local\Temp\49b84085b7cc731d39fda5a6c15d8bedf3051f3e3f8792f4a50220ebdbf1a4c6.exe"3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\BEFC\5F7E.bat" "C:\Users\Admin\AppData\Roaming\comrdemx\appmters.exe" "C:\Users\Admin\AppData\Local\Temp\49B840~1.EXE""4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Windows\SysWOW64\cmd.execmd /C ""C:\Users\Admin\AppData\Roaming\comrdemx\appmters.exe" "C:\Users\Admin\AppData\Local\Temp\49B840~1.EXE""5⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Users\Admin\AppData\Roaming\comrdemx\appmters.exe"C:\Users\Admin\AppData\Roaming\comrdemx\appmters.exe" "C:\Users\Admin\AppData\Local\Temp\49B840~1.EXE"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Users\Admin\AppData\Roaming\comrdemx\appmters.exe"C:\Users\Admin\AppData\Roaming\comrdemx\appmters.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe8⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1004
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
112B
MD5d063eb1e0703df75ad9d98f1726b1183
SHA1c158b6dec4ea081b4ef840b8b31842f3ee2f7d38
SHA2569d8c7a6262b9777a56bc18a602320b3af8a55d19fa8ae83c218b4ecf8c980818
SHA5129fdbd6fca19507def0786cc3128856799396b9402ab0574080338b4f3682bc0d3929411176ff004aab91208695604af3d0000649408287516a0d6bfd0f1f0b3c
-
Filesize
507KB
MD56e352a6e96db293f487d1c1996f7ca60
SHA1887a357a96b9dbb428b6b776a3ec8ca8de746f18
SHA25649b84085b7cc731d39fda5a6c15d8bedf3051f3e3f8792f4a50220ebdbf1a4c6
SHA512bad3b109707b7ba714ccfd41109d6defe9aa2c651cd7dd8c91f536622fa52394071e858a81a2844421a56219527737d395580ea73e250f6cb44c4c1c4959351d