Overview
overview
10Static
static
513f8bb1af7...be.exe
windows7-x64
1049b84085b7...c6.exe
windows7-x64
10639a86559b...3d.exe
windows7-x64
10Счет �...15.scr
windows7-x64
3Счет �...08.scr
windows7-x64
3inquiry.scr
windows7-x64
9c0cf40b883...3a.exe
windows7-x64
8e49778d20a...73.exe
windows7-x64
8ПРЕТЕ...Я.scr
windows7-x64
5карто...я.scr
windows7-x64
5Analysis
-
max time kernel
300s -
max time network
241s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
03-11-2024 20:50
Behavioral task
behavioral1
Sample
13f8bb1af7e80604416111a9e5508426df058e53eb2f096d110fd74f55f798be.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
49b84085b7cc731d39fda5a6c15d8bedf3051f3e3f8792f4a50220ebdbf1a4c6.exe
Resource
win7-20240903-en
Behavioral task
behavioral3
Sample
639a86559b0a086fe388e4309ea22e49f79362c0983df1a5b09fa477db3c463d.exe
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
Счет и накладная/Накладная для 1736 от 26.08.2015.scr
Resource
win7-20240903-en
Behavioral task
behavioral5
Sample
Счет и накладная/Счет на оплату от 26-08.scr
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
inquiry.scr
Resource
win7-20240903-en
Behavioral task
behavioral7
Sample
c0cf40b8830d666a24bdd4febdc162e95aa30ed968fa3675e26ad97b2e88e03a.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
e49778d20a2f9b1f8b00ddd24b6bcee81af381ed02cfe0a3c9ab3111cda5f573.exe
Resource
win7-20240708-en
Behavioral task
behavioral9
Sample
ПРЕТЕНЗИЯ.scr
Resource
win7-20240903-en
General
-
Target
639a86559b0a086fe388e4309ea22e49f79362c0983df1a5b09fa477db3c463d.exe
-
Size
511KB
-
MD5
afb4846bd287f31e6297cb4095aece65
-
SHA1
b92d682a800d82ff6e980deae88f6cb7e048c11d
-
SHA256
639a86559b0a086fe388e4309ea22e49f79362c0983df1a5b09fa477db3c463d
-
SHA512
8f5b3062a7f4faada34001bbe8510235d20b3d507ee0858ef23db92853f31a3075c60e37738a93e1385995199c9d99dccb7e547247fc9af5b8a8f3557d03d070
-
SSDEEP
12288:nTY7/WAuLAOOxsgfj40bDKg0m7t4is8jYar:kusO+RDKgJBnsgYa
Malware Config
Extracted
gozi
-
build
215798
Signatures
-
Gozi family
-
Executes dropped EXE 2 IoCs
pid Process 2756 comrdemx.exe 1700 comrdemx.exe -
Loads dropped DLL 2 IoCs
pid Process 2872 cmd.exe 2872 cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\appmters = "C:\\Users\\Admin\\AppData\\Roaming\\AltTeSvr\\comrdemx.exe" 639a86559b0a086fe388e4309ea22e49f79362c0983df1a5b09fa477db3c463d.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 528 set thread context of 2964 528 639a86559b0a086fe388e4309ea22e49f79362c0983df1a5b09fa477db3c463d.exe 30 PID 2756 set thread context of 1700 2756 comrdemx.exe 35 PID 1700 set thread context of 2288 1700 comrdemx.exe 36 PID 2288 set thread context of 1248 2288 svchost.exe 21 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 639a86559b0a086fe388e4309ea22e49f79362c0983df1a5b09fa477db3c463d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language comrdemx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language comrdemx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 639a86559b0a086fe388e4309ea22e49f79362c0983df1a5b09fa477db3c463d.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1700 comrdemx.exe 1248 Explorer.EXE -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1700 comrdemx.exe 2288 svchost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 1248 Explorer.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1248 Explorer.EXE -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 528 wrote to memory of 2964 528 639a86559b0a086fe388e4309ea22e49f79362c0983df1a5b09fa477db3c463d.exe 30 PID 528 wrote to memory of 2964 528 639a86559b0a086fe388e4309ea22e49f79362c0983df1a5b09fa477db3c463d.exe 30 PID 528 wrote to memory of 2964 528 639a86559b0a086fe388e4309ea22e49f79362c0983df1a5b09fa477db3c463d.exe 30 PID 528 wrote to memory of 2964 528 639a86559b0a086fe388e4309ea22e49f79362c0983df1a5b09fa477db3c463d.exe 30 PID 528 wrote to memory of 2964 528 639a86559b0a086fe388e4309ea22e49f79362c0983df1a5b09fa477db3c463d.exe 30 PID 528 wrote to memory of 2964 528 639a86559b0a086fe388e4309ea22e49f79362c0983df1a5b09fa477db3c463d.exe 30 PID 528 wrote to memory of 2964 528 639a86559b0a086fe388e4309ea22e49f79362c0983df1a5b09fa477db3c463d.exe 30 PID 528 wrote to memory of 2964 528 639a86559b0a086fe388e4309ea22e49f79362c0983df1a5b09fa477db3c463d.exe 30 PID 528 wrote to memory of 2964 528 639a86559b0a086fe388e4309ea22e49f79362c0983df1a5b09fa477db3c463d.exe 30 PID 528 wrote to memory of 2964 528 639a86559b0a086fe388e4309ea22e49f79362c0983df1a5b09fa477db3c463d.exe 30 PID 528 wrote to memory of 2964 528 639a86559b0a086fe388e4309ea22e49f79362c0983df1a5b09fa477db3c463d.exe 30 PID 2964 wrote to memory of 2216 2964 639a86559b0a086fe388e4309ea22e49f79362c0983df1a5b09fa477db3c463d.exe 31 PID 2964 wrote to memory of 2216 2964 639a86559b0a086fe388e4309ea22e49f79362c0983df1a5b09fa477db3c463d.exe 31 PID 2964 wrote to memory of 2216 2964 639a86559b0a086fe388e4309ea22e49f79362c0983df1a5b09fa477db3c463d.exe 31 PID 2964 wrote to memory of 2216 2964 639a86559b0a086fe388e4309ea22e49f79362c0983df1a5b09fa477db3c463d.exe 31 PID 2216 wrote to memory of 2872 2216 cmd.exe 33 PID 2216 wrote to memory of 2872 2216 cmd.exe 33 PID 2216 wrote to memory of 2872 2216 cmd.exe 33 PID 2216 wrote to memory of 2872 2216 cmd.exe 33 PID 2872 wrote to memory of 2756 2872 cmd.exe 34 PID 2872 wrote to memory of 2756 2872 cmd.exe 34 PID 2872 wrote to memory of 2756 2872 cmd.exe 34 PID 2872 wrote to memory of 2756 2872 cmd.exe 34 PID 2756 wrote to memory of 1700 2756 comrdemx.exe 35 PID 2756 wrote to memory of 1700 2756 comrdemx.exe 35 PID 2756 wrote to memory of 1700 2756 comrdemx.exe 35 PID 2756 wrote to memory of 1700 2756 comrdemx.exe 35 PID 2756 wrote to memory of 1700 2756 comrdemx.exe 35 PID 2756 wrote to memory of 1700 2756 comrdemx.exe 35 PID 2756 wrote to memory of 1700 2756 comrdemx.exe 35 PID 2756 wrote to memory of 1700 2756 comrdemx.exe 35 PID 2756 wrote to memory of 1700 2756 comrdemx.exe 35 PID 2756 wrote to memory of 1700 2756 comrdemx.exe 35 PID 2756 wrote to memory of 1700 2756 comrdemx.exe 35 PID 1700 wrote to memory of 2288 1700 comrdemx.exe 36 PID 1700 wrote to memory of 2288 1700 comrdemx.exe 36 PID 1700 wrote to memory of 2288 1700 comrdemx.exe 36 PID 1700 wrote to memory of 2288 1700 comrdemx.exe 36 PID 1700 wrote to memory of 2288 1700 comrdemx.exe 36 PID 1700 wrote to memory of 2288 1700 comrdemx.exe 36 PID 1700 wrote to memory of 2288 1700 comrdemx.exe 36 PID 2288 wrote to memory of 1248 2288 svchost.exe 21 PID 2288 wrote to memory of 1248 2288 svchost.exe 21 PID 2288 wrote to memory of 1248 2288 svchost.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1248 -
C:\Users\Admin\AppData\Local\Temp\639a86559b0a086fe388e4309ea22e49f79362c0983df1a5b09fa477db3c463d.exe"C:\Users\Admin\AppData\Local\Temp\639a86559b0a086fe388e4309ea22e49f79362c0983df1a5b09fa477db3c463d.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:528 -
C:\Users\Admin\AppData\Local\Temp\639a86559b0a086fe388e4309ea22e49f79362c0983df1a5b09fa477db3c463d.exe"C:\Users\Admin\AppData\Local\Temp\639a86559b0a086fe388e4309ea22e49f79362c0983df1a5b09fa477db3c463d.exe"3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\E512\F289.bat" "C:\Users\Admin\AppData\Roaming\AltTeSvr\comrdemx.exe" "C:\Users\Admin\AppData\Local\Temp\639A86~1.EXE""4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Windows\SysWOW64\cmd.execmd /C ""C:\Users\Admin\AppData\Roaming\AltTeSvr\comrdemx.exe" "C:\Users\Admin\AppData\Local\Temp\639A86~1.EXE""5⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Users\Admin\AppData\Roaming\AltTeSvr\comrdemx.exe"C:\Users\Admin\AppData\Roaming\AltTeSvr\comrdemx.exe" "C:\Users\Admin\AppData\Local\Temp\639A86~1.EXE"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Users\Admin\AppData\Roaming\AltTeSvr\comrdemx.exe"C:\Users\Admin\AppData\Roaming\AltTeSvr\comrdemx.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe8⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2288
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
112B
MD56d035997ca4b74c989f0b490126162fd
SHA1d78d98184092f78374cc9bf4af4d6d24c5f5612c
SHA2561d0ff939dde4099c8e34ee1b4689cf8ff03eda2c2f6317f054422503f51472f2
SHA512edd15e35928e02d7848878cce5638995bdb25ceaa43c237aabc5c0b315eafd5b5a05ee2f9f243345873ad7cdc81400c20e012d810d8433ae6eec4708b89f5568
-
Filesize
511KB
MD5afb4846bd287f31e6297cb4095aece65
SHA1b92d682a800d82ff6e980deae88f6cb7e048c11d
SHA256639a86559b0a086fe388e4309ea22e49f79362c0983df1a5b09fa477db3c463d
SHA5128f5b3062a7f4faada34001bbe8510235d20b3d507ee0858ef23db92853f31a3075c60e37738a93e1385995199c9d99dccb7e547247fc9af5b8a8f3557d03d070