Overview
overview
10Static
static
513f8bb1af7...be.exe
windows7-x64
1013f8bb1af7...be.exe
windows10-2004-x64
1049b84085b7...c6.exe
windows7-x64
1049b84085b7...c6.exe
windows10-2004-x64
10639a86559b...3d.exe
windows7-x64
10639a86559b...3d.exe
windows10-2004-x64
10c0cf40b883...3a.exe
windows7-x64
8c0cf40b883...3a.exe
windows10-2004-x64
8e49778d20a...73.exe
windows7-x64
8e49778d20a...73.exe
windows10-2004-x64
8inquiry.scr
windows7-x64
9inquiry.scr
windows10-2004-x64
9Накла...15.scr
windows7-x64
3Накла...15.scr
windows10-2004-x64
3ПРЕТЕ...Я.scr
windows7-x64
5ПРЕТЕ...Я.scr
windows10-2004-x64
5Счет �...08.scr
windows7-x64
3Счет �...08.scr
windows10-2004-x64
3карто...я.scr
windows7-x64
5карто...я.scr
windows10-2004-x64
5Analysis
-
max time kernel
122s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-11-2024 00:03
Behavioral task
behavioral1
Sample
13f8bb1af7e80604416111a9e5508426df058e53eb2f096d110fd74f55f798be.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
13f8bb1af7e80604416111a9e5508426df058e53eb2f096d110fd74f55f798be.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
49b84085b7cc731d39fda5a6c15d8bedf3051f3e3f8792f4a50220ebdbf1a4c6.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
49b84085b7cc731d39fda5a6c15d8bedf3051f3e3f8792f4a50220ebdbf1a4c6.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
639a86559b0a086fe388e4309ea22e49f79362c0983df1a5b09fa477db3c463d.exe
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
639a86559b0a086fe388e4309ea22e49f79362c0983df1a5b09fa477db3c463d.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
c0cf40b8830d666a24bdd4febdc162e95aa30ed968fa3675e26ad97b2e88e03a.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
c0cf40b8830d666a24bdd4febdc162e95aa30ed968fa3675e26ad97b2e88e03a.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
e49778d20a2f9b1f8b00ddd24b6bcee81af381ed02cfe0a3c9ab3111cda5f573.exe
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
e49778d20a2f9b1f8b00ddd24b6bcee81af381ed02cfe0a3c9ab3111cda5f573.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
inquiry.scr
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
inquiry.scr
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
Накладная для 1736 от 26.08.2015.scr
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
Накладная для 1736 от 26.08.2015.scr
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
ПРЕТЕНЗИЯ.scr
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
ПРЕТЕНЗИЯ.scr
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
Счет на оплату от 26-08.scr
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
Счет на оплату от 26-08.scr
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
карточка предприятия.scr
Resource
win7-20240903-en
General
-
Target
49b84085b7cc731d39fda5a6c15d8bedf3051f3e3f8792f4a50220ebdbf1a4c6.exe
-
Size
507KB
-
MD5
6e352a6e96db293f487d1c1996f7ca60
-
SHA1
887a357a96b9dbb428b6b776a3ec8ca8de746f18
-
SHA256
49b84085b7cc731d39fda5a6c15d8bedf3051f3e3f8792f4a50220ebdbf1a4c6
-
SHA512
bad3b109707b7ba714ccfd41109d6defe9aa2c651cd7dd8c91f536622fa52394071e858a81a2844421a56219527737d395580ea73e250f6cb44c4c1c4959351d
-
SSDEEP
12288:IEi3NId2zO8PW418jZZUozZuzYgwz3r14Y07KCJ:GrdZ+tZlVUYBzB0KC
Malware Config
Extracted
gozi
-
build
215798
Signatures
-
Gozi family
-
Executes dropped EXE 2 IoCs
pid Process 2864 authCore.exe 2680 authCore.exe -
Loads dropped DLL 3 IoCs
pid Process 2760 cmd.exe 2760 cmd.exe 2864 authCore.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\aecahell = "C:\\Users\\Admin\\AppData\\Roaming\\authtall\\authCore.exe" 49b84085b7cc731d39fda5a6c15d8bedf3051f3e3f8792f4a50220ebdbf1a4c6.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2440 set thread context of 2292 2440 49b84085b7cc731d39fda5a6c15d8bedf3051f3e3f8792f4a50220ebdbf1a4c6.exe 30 PID 2864 set thread context of 2680 2864 authCore.exe 35 PID 2680 set thread context of 2280 2680 authCore.exe 36 PID 2280 set thread context of 1192 2280 svchost.exe 21 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language authCore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 49b84085b7cc731d39fda5a6c15d8bedf3051f3e3f8792f4a50220ebdbf1a4c6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 49b84085b7cc731d39fda5a6c15d8bedf3051f3e3f8792f4a50220ebdbf1a4c6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language authCore.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2680 authCore.exe 1192 Explorer.EXE -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2680 authCore.exe 2280 svchost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1192 Explorer.EXE -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 2440 wrote to memory of 2292 2440 49b84085b7cc731d39fda5a6c15d8bedf3051f3e3f8792f4a50220ebdbf1a4c6.exe 30 PID 2440 wrote to memory of 2292 2440 49b84085b7cc731d39fda5a6c15d8bedf3051f3e3f8792f4a50220ebdbf1a4c6.exe 30 PID 2440 wrote to memory of 2292 2440 49b84085b7cc731d39fda5a6c15d8bedf3051f3e3f8792f4a50220ebdbf1a4c6.exe 30 PID 2440 wrote to memory of 2292 2440 49b84085b7cc731d39fda5a6c15d8bedf3051f3e3f8792f4a50220ebdbf1a4c6.exe 30 PID 2440 wrote to memory of 2292 2440 49b84085b7cc731d39fda5a6c15d8bedf3051f3e3f8792f4a50220ebdbf1a4c6.exe 30 PID 2440 wrote to memory of 2292 2440 49b84085b7cc731d39fda5a6c15d8bedf3051f3e3f8792f4a50220ebdbf1a4c6.exe 30 PID 2440 wrote to memory of 2292 2440 49b84085b7cc731d39fda5a6c15d8bedf3051f3e3f8792f4a50220ebdbf1a4c6.exe 30 PID 2440 wrote to memory of 2292 2440 49b84085b7cc731d39fda5a6c15d8bedf3051f3e3f8792f4a50220ebdbf1a4c6.exe 30 PID 2440 wrote to memory of 2292 2440 49b84085b7cc731d39fda5a6c15d8bedf3051f3e3f8792f4a50220ebdbf1a4c6.exe 30 PID 2440 wrote to memory of 2292 2440 49b84085b7cc731d39fda5a6c15d8bedf3051f3e3f8792f4a50220ebdbf1a4c6.exe 30 PID 2440 wrote to memory of 2292 2440 49b84085b7cc731d39fda5a6c15d8bedf3051f3e3f8792f4a50220ebdbf1a4c6.exe 30 PID 2292 wrote to memory of 2612 2292 49b84085b7cc731d39fda5a6c15d8bedf3051f3e3f8792f4a50220ebdbf1a4c6.exe 31 PID 2292 wrote to memory of 2612 2292 49b84085b7cc731d39fda5a6c15d8bedf3051f3e3f8792f4a50220ebdbf1a4c6.exe 31 PID 2292 wrote to memory of 2612 2292 49b84085b7cc731d39fda5a6c15d8bedf3051f3e3f8792f4a50220ebdbf1a4c6.exe 31 PID 2292 wrote to memory of 2612 2292 49b84085b7cc731d39fda5a6c15d8bedf3051f3e3f8792f4a50220ebdbf1a4c6.exe 31 PID 2612 wrote to memory of 2760 2612 cmd.exe 33 PID 2612 wrote to memory of 2760 2612 cmd.exe 33 PID 2612 wrote to memory of 2760 2612 cmd.exe 33 PID 2612 wrote to memory of 2760 2612 cmd.exe 33 PID 2760 wrote to memory of 2864 2760 cmd.exe 34 PID 2760 wrote to memory of 2864 2760 cmd.exe 34 PID 2760 wrote to memory of 2864 2760 cmd.exe 34 PID 2760 wrote to memory of 2864 2760 cmd.exe 34 PID 2864 wrote to memory of 2680 2864 authCore.exe 35 PID 2864 wrote to memory of 2680 2864 authCore.exe 35 PID 2864 wrote to memory of 2680 2864 authCore.exe 35 PID 2864 wrote to memory of 2680 2864 authCore.exe 35 PID 2864 wrote to memory of 2680 2864 authCore.exe 35 PID 2864 wrote to memory of 2680 2864 authCore.exe 35 PID 2864 wrote to memory of 2680 2864 authCore.exe 35 PID 2864 wrote to memory of 2680 2864 authCore.exe 35 PID 2864 wrote to memory of 2680 2864 authCore.exe 35 PID 2864 wrote to memory of 2680 2864 authCore.exe 35 PID 2864 wrote to memory of 2680 2864 authCore.exe 35 PID 2680 wrote to memory of 2280 2680 authCore.exe 36 PID 2680 wrote to memory of 2280 2680 authCore.exe 36 PID 2680 wrote to memory of 2280 2680 authCore.exe 36 PID 2680 wrote to memory of 2280 2680 authCore.exe 36 PID 2680 wrote to memory of 2280 2680 authCore.exe 36 PID 2680 wrote to memory of 2280 2680 authCore.exe 36 PID 2680 wrote to memory of 2280 2680 authCore.exe 36 PID 2280 wrote to memory of 1192 2280 svchost.exe 21 PID 2280 wrote to memory of 1192 2280 svchost.exe 21 PID 2280 wrote to memory of 1192 2280 svchost.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1192 -
C:\Users\Admin\AppData\Local\Temp\49b84085b7cc731d39fda5a6c15d8bedf3051f3e3f8792f4a50220ebdbf1a4c6.exe"C:\Users\Admin\AppData\Local\Temp\49b84085b7cc731d39fda5a6c15d8bedf3051f3e3f8792f4a50220ebdbf1a4c6.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Users\Admin\AppData\Local\Temp\49b84085b7cc731d39fda5a6c15d8bedf3051f3e3f8792f4a50220ebdbf1a4c6.exe"C:\Users\Admin\AppData\Local\Temp\49b84085b7cc731d39fda5a6c15d8bedf3051f3e3f8792f4a50220ebdbf1a4c6.exe"3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\FC78\FE3C.bat" "C:\Users\Admin\AppData\Roaming\authtall\authCore.exe" "C:\Users\Admin\AppData\Local\Temp\49B840~1.EXE""4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Windows\SysWOW64\cmd.execmd /C ""C:\Users\Admin\AppData\Roaming\authtall\authCore.exe" "C:\Users\Admin\AppData\Local\Temp\49B840~1.EXE""5⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Users\Admin\AppData\Roaming\authtall\authCore.exe"C:\Users\Admin\AppData\Roaming\authtall\authCore.exe" "C:\Users\Admin\AppData\Local\Temp\49B840~1.EXE"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Users\Admin\AppData\Roaming\authtall\authCore.exe"C:\Users\Admin\AppData\Roaming\authtall\authCore.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe8⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2280
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
112B
MD5d96cc54d4bccfdfce75e9d14dae04d41
SHA18380ae7515bb836ed8f005221cbbc49a95bd3577
SHA2568adc31338814c438767e5ef83e1b888e1ecba7ab902708e78b40fbe01fa50623
SHA51201594c1891ba35aee49a25f5a6a2e694cee70cfc3511ad7cc25021672cc9147cc79c633b5d2a0ce703b1047f63a66bda0d6ad64bfa091a23aba68430acfed7f0
-
Filesize
507KB
MD56e352a6e96db293f487d1c1996f7ca60
SHA1887a357a96b9dbb428b6b776a3ec8ca8de746f18
SHA25649b84085b7cc731d39fda5a6c15d8bedf3051f3e3f8792f4a50220ebdbf1a4c6
SHA512bad3b109707b7ba714ccfd41109d6defe9aa2c651cd7dd8c91f536622fa52394071e858a81a2844421a56219527737d395580ea73e250f6cb44c4c1c4959351d