Overview
overview
10Static
static
513f8bb1af7...be.exe
windows7-x64
1049b84085b7...c6.exe
windows7-x64
10639a86559b...3d.exe
windows7-x64
10c0cf40b883...3a.exe
windows7-x64
8e49778d20a...73.exe
windows7-x64
8inquiry.scr
windows7-x64
9Накла...15.scr
windows7-x64
3ПРЕТЕ...Я.scr
windows7-x64
5Счет �...08.scr
windows7-x64
3карто...я.scr
windows7-x64
5Analysis
-
max time kernel
1800s -
max time network
1720s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
03/11/2024, 20:53
Behavioral task
behavioral1
Sample
13f8bb1af7e80604416111a9e5508426df058e53eb2f096d110fd74f55f798be.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
49b84085b7cc731d39fda5a6c15d8bedf3051f3e3f8792f4a50220ebdbf1a4c6.exe
Resource
win7-20240903-en
Behavioral task
behavioral3
Sample
639a86559b0a086fe388e4309ea22e49f79362c0983df1a5b09fa477db3c463d.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
c0cf40b8830d666a24bdd4febdc162e95aa30ed968fa3675e26ad97b2e88e03a.exe
Resource
win7-20240903-en
Behavioral task
behavioral5
Sample
e49778d20a2f9b1f8b00ddd24b6bcee81af381ed02cfe0a3c9ab3111cda5f573.exe
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
inquiry.scr
Resource
win7-20240903-en
Behavioral task
behavioral7
Sample
Накладная для 1736 от 26.08.2015.scr
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
ПРЕТЕНЗИЯ.scr
Resource
win7-20241010-en
Behavioral task
behavioral9
Sample
Счет на оплату от 26-08.scr
Resource
win7-20240903-en
General
-
Target
13f8bb1af7e80604416111a9e5508426df058e53eb2f096d110fd74f55f798be.exe
-
Size
348KB
-
MD5
ff948412f6437a133022c32e7e94e11b
-
SHA1
bb60858ac2fa2910e21151262d1990bf50b6d42f
-
SHA256
13f8bb1af7e80604416111a9e5508426df058e53eb2f096d110fd74f55f798be
-
SHA512
3595c83f4106cda9a086d6b84f1110e9e97f5cb9d156d0088ec6229b22098b30650108dd6b4ca2ec1d46b108a1db334f741f7ab0e694960be3f5f72aff9194b4
-
SSDEEP
6144:q7P2fhhwRRWJhL+H/TZ5A9TYcwElgB2EYwxYeEZIGJABN6e:q7gSRWJhSH7tNB2E7xYeEuhD
Malware Config
Extracted
gozi
Extracted
gozi
1020
line.laslottery.com/htue503dt
line.fastfuel18.com/htue503dt
line.stkingsfunhouse.com/htue503dt
line.lovelacedweddings.com/htue503dt
lansystemstat.com/htue503dt
highnetwork.pw/htue503dt
-
exe_type
worker
-
server_id
60
Signatures
-
Gozi family
-
Executes dropped EXE 2 IoCs
pid Process 1280 comrdemx.exe 2976 comrdemx.exe -
Loads dropped DLL 2 IoCs
pid Process 2152 cmd.exe 2152 cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\appmters = "C:\\Users\\Admin\\AppData\\Roaming\\AltTeSvr\\comrdemx.exe" 13f8bb1af7e80604416111a9e5508426df058e53eb2f096d110fd74f55f798be.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2072 set thread context of 2000 2072 13f8bb1af7e80604416111a9e5508426df058e53eb2f096d110fd74f55f798be.exe 31 PID 1280 set thread context of 2976 1280 comrdemx.exe 36 PID 2976 set thread context of 1872 2976 comrdemx.exe 37 PID 1872 set thread context of 1424 1872 svchost.exe 21 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 13f8bb1af7e80604416111a9e5508426df058e53eb2f096d110fd74f55f798be.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language comrdemx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language comrdemx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 13f8bb1af7e80604416111a9e5508426df058e53eb2f096d110fd74f55f798be.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2976 comrdemx.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2976 comrdemx.exe 1872 svchost.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeShutdownPrivilege 1424 Explorer.EXE Token: SeShutdownPrivilege 1424 Explorer.EXE Token: SeShutdownPrivilege 1424 Explorer.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1424 Explorer.EXE 1424 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1424 Explorer.EXE 1424 Explorer.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1424 Explorer.EXE -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 2072 wrote to memory of 2000 2072 13f8bb1af7e80604416111a9e5508426df058e53eb2f096d110fd74f55f798be.exe 31 PID 2072 wrote to memory of 2000 2072 13f8bb1af7e80604416111a9e5508426df058e53eb2f096d110fd74f55f798be.exe 31 PID 2072 wrote to memory of 2000 2072 13f8bb1af7e80604416111a9e5508426df058e53eb2f096d110fd74f55f798be.exe 31 PID 2072 wrote to memory of 2000 2072 13f8bb1af7e80604416111a9e5508426df058e53eb2f096d110fd74f55f798be.exe 31 PID 2072 wrote to memory of 2000 2072 13f8bb1af7e80604416111a9e5508426df058e53eb2f096d110fd74f55f798be.exe 31 PID 2072 wrote to memory of 2000 2072 13f8bb1af7e80604416111a9e5508426df058e53eb2f096d110fd74f55f798be.exe 31 PID 2072 wrote to memory of 2000 2072 13f8bb1af7e80604416111a9e5508426df058e53eb2f096d110fd74f55f798be.exe 31 PID 2072 wrote to memory of 2000 2072 13f8bb1af7e80604416111a9e5508426df058e53eb2f096d110fd74f55f798be.exe 31 PID 2072 wrote to memory of 2000 2072 13f8bb1af7e80604416111a9e5508426df058e53eb2f096d110fd74f55f798be.exe 31 PID 2072 wrote to memory of 2000 2072 13f8bb1af7e80604416111a9e5508426df058e53eb2f096d110fd74f55f798be.exe 31 PID 2072 wrote to memory of 2000 2072 13f8bb1af7e80604416111a9e5508426df058e53eb2f096d110fd74f55f798be.exe 31 PID 2000 wrote to memory of 2060 2000 13f8bb1af7e80604416111a9e5508426df058e53eb2f096d110fd74f55f798be.exe 32 PID 2000 wrote to memory of 2060 2000 13f8bb1af7e80604416111a9e5508426df058e53eb2f096d110fd74f55f798be.exe 32 PID 2000 wrote to memory of 2060 2000 13f8bb1af7e80604416111a9e5508426df058e53eb2f096d110fd74f55f798be.exe 32 PID 2000 wrote to memory of 2060 2000 13f8bb1af7e80604416111a9e5508426df058e53eb2f096d110fd74f55f798be.exe 32 PID 2060 wrote to memory of 2152 2060 cmd.exe 34 PID 2060 wrote to memory of 2152 2060 cmd.exe 34 PID 2060 wrote to memory of 2152 2060 cmd.exe 34 PID 2060 wrote to memory of 2152 2060 cmd.exe 34 PID 2152 wrote to memory of 1280 2152 cmd.exe 35 PID 2152 wrote to memory of 1280 2152 cmd.exe 35 PID 2152 wrote to memory of 1280 2152 cmd.exe 35 PID 2152 wrote to memory of 1280 2152 cmd.exe 35 PID 1280 wrote to memory of 2976 1280 comrdemx.exe 36 PID 1280 wrote to memory of 2976 1280 comrdemx.exe 36 PID 1280 wrote to memory of 2976 1280 comrdemx.exe 36 PID 1280 wrote to memory of 2976 1280 comrdemx.exe 36 PID 1280 wrote to memory of 2976 1280 comrdemx.exe 36 PID 1280 wrote to memory of 2976 1280 comrdemx.exe 36 PID 1280 wrote to memory of 2976 1280 comrdemx.exe 36 PID 1280 wrote to memory of 2976 1280 comrdemx.exe 36 PID 1280 wrote to memory of 2976 1280 comrdemx.exe 36 PID 1280 wrote to memory of 2976 1280 comrdemx.exe 36 PID 1280 wrote to memory of 2976 1280 comrdemx.exe 36 PID 2976 wrote to memory of 1872 2976 comrdemx.exe 37 PID 2976 wrote to memory of 1872 2976 comrdemx.exe 37 PID 2976 wrote to memory of 1872 2976 comrdemx.exe 37 PID 2976 wrote to memory of 1872 2976 comrdemx.exe 37 PID 2976 wrote to memory of 1872 2976 comrdemx.exe 37 PID 2976 wrote to memory of 1872 2976 comrdemx.exe 37 PID 2976 wrote to memory of 1872 2976 comrdemx.exe 37 PID 1872 wrote to memory of 1424 1872 svchost.exe 21 PID 1872 wrote to memory of 1424 1872 svchost.exe 21 PID 1872 wrote to memory of 1424 1872 svchost.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1424 -
C:\Users\Admin\AppData\Local\Temp\13f8bb1af7e80604416111a9e5508426df058e53eb2f096d110fd74f55f798be.exe"C:\Users\Admin\AppData\Local\Temp\13f8bb1af7e80604416111a9e5508426df058e53eb2f096d110fd74f55f798be.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Users\Admin\AppData\Local\Temp\13f8bb1af7e80604416111a9e5508426df058e53eb2f096d110fd74f55f798be.exe"C:\Users\Admin\AppData\Local\Temp\13f8bb1af7e80604416111a9e5508426df058e53eb2f096d110fd74f55f798be.exe"3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\FCF2\FAE8.bat" "C:\Users\Admin\AppData\Roaming\AltTeSvr\comrdemx.exe" "C:\Users\Admin\AppData\Local\Temp\13F8BB~1.EXE""4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\SysWOW64\cmd.execmd /C ""C:\Users\Admin\AppData\Roaming\AltTeSvr\comrdemx.exe" "C:\Users\Admin\AppData\Local\Temp\13F8BB~1.EXE""5⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Users\Admin\AppData\Roaming\AltTeSvr\comrdemx.exe"C:\Users\Admin\AppData\Roaming\AltTeSvr\comrdemx.exe" "C:\Users\Admin\AppData\Local\Temp\13F8BB~1.EXE"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Users\Admin\AppData\Roaming\AltTeSvr\comrdemx.exe"C:\Users\Admin\AppData\Roaming\AltTeSvr\comrdemx.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe8⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1872
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
112B
MD536daf71d55ebc1956414a992c2fd514c
SHA1d4d81785fa4262dba1f8c4f81a383ff03b2a484a
SHA2568b2eb9ed6561582ba883121571232d211e863365b395855570bbc36a606d2194
SHA5125cfba9b43e6fd1d9d8596688badd6b06665dc81107a62cea0f74bb6c065a3f84b1be9c207c39a6b7292023dfc4854655ca0813ba645f560a6d5b20319144bc08
-
Filesize
348KB
MD5ff948412f6437a133022c32e7e94e11b
SHA1bb60858ac2fa2910e21151262d1990bf50b6d42f
SHA25613f8bb1af7e80604416111a9e5508426df058e53eb2f096d110fd74f55f798be
SHA5123595c83f4106cda9a086d6b84f1110e9e97f5cb9d156d0088ec6229b22098b30650108dd6b4ca2ec1d46b108a1db334f741f7ab0e694960be3f5f72aff9194b4