Overview
overview
10Static
static
50442cfabb3...ab.exe
windows7-x64
8c0cf40b883...3a.exe
windows7-x64
8cry1.exe
windows7-x64
8cry2.exe
windows7-x64
8cry3.exe
windows7-x64
10cry4.exe
windows7-x64
10cry5.exe
windows7-x64
8cry6.exe
windows7-x64
10e49778d20a...73.exe
windows7-x64
8inquiry.scr
windows7-x64
9Накла...15.scr
windows7-x64
3ПРЕТЕ...Я.scr
windows7-x64
5Счет �...08.scr
windows7-x64
3карто...я.scr
windows7-x64
5Analysis
-
max time kernel
355s -
max time network
356s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
05-11-2024 11:10
Behavioral task
behavioral1
Sample
0442cfabb3212644c4b894a7e4a7e84c00fd23489cc4f96490f9988e6074b6ab.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c0cf40b8830d666a24bdd4febdc162e95aa30ed968fa3675e26ad97b2e88e03a.exe
Resource
win7-20240903-en
Behavioral task
behavioral3
Sample
cry1.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
cry2.exe
Resource
win7-20240903-en
Behavioral task
behavioral5
Sample
cry3.exe
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
cry4.exe
Resource
win7-20240903-en
Behavioral task
behavioral7
Sample
cry5.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
cry6.exe
Resource
win7-20240903-en
Behavioral task
behavioral9
Sample
e49778d20a2f9b1f8b00ddd24b6bcee81af381ed02cfe0a3c9ab3111cda5f573.exe
Resource
win7-20240729-en
Behavioral task
behavioral10
Sample
inquiry.scr
Resource
win7-20241010-en
Behavioral task
behavioral11
Sample
Накладная для 1736 от 26.08.2015.scr
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
ПРЕТЕНЗИЯ.scr
Resource
win7-20240903-en
Behavioral task
behavioral13
Sample
Счет на оплату от 26-08.scr
Resource
win7-20240708-en
General
-
Target
cry3.exe
-
Size
348KB
-
MD5
ff948412f6437a133022c32e7e94e11b
-
SHA1
bb60858ac2fa2910e21151262d1990bf50b6d42f
-
SHA256
13f8bb1af7e80604416111a9e5508426df058e53eb2f096d110fd74f55f798be
-
SHA512
3595c83f4106cda9a086d6b84f1110e9e97f5cb9d156d0088ec6229b22098b30650108dd6b4ca2ec1d46b108a1db334f741f7ab0e694960be3f5f72aff9194b4
-
SSDEEP
6144:q7P2fhhwRRWJhL+H/TZ5A9TYcwElgB2EYwxYeEZIGJABN6e:q7gSRWJhSH7tNB2E7xYeEuhD
Malware Config
Extracted
gozi
Extracted
gozi
1020
line.laslottery.com/htue503dt
line.fastfuel18.com/htue503dt
line.stkingsfunhouse.com/htue503dt
line.lovelacedweddings.com/htue503dt
lansystemstat.com/htue503dt
highnetwork.pw/htue503dt
-
exe_type
worker
-
server_id
60
Signatures
-
Gozi family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2644 set thread context of 2704 2644 cry3.exe 33 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cry3.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2644 wrote to memory of 2212 2644 cry3.exe 31 PID 2644 wrote to memory of 2212 2644 cry3.exe 31 PID 2644 wrote to memory of 2212 2644 cry3.exe 31 PID 2644 wrote to memory of 2212 2644 cry3.exe 31 PID 2644 wrote to memory of 2664 2644 cry3.exe 32 PID 2644 wrote to memory of 2664 2644 cry3.exe 32 PID 2644 wrote to memory of 2664 2644 cry3.exe 32 PID 2644 wrote to memory of 2664 2644 cry3.exe 32 PID 2644 wrote to memory of 2704 2644 cry3.exe 33 PID 2644 wrote to memory of 2704 2644 cry3.exe 33 PID 2644 wrote to memory of 2704 2644 cry3.exe 33 PID 2644 wrote to memory of 2704 2644 cry3.exe 33 PID 2644 wrote to memory of 2704 2644 cry3.exe 33 PID 2644 wrote to memory of 2704 2644 cry3.exe 33 PID 2644 wrote to memory of 2704 2644 cry3.exe 33 PID 2644 wrote to memory of 2704 2644 cry3.exe 33 PID 2644 wrote to memory of 2704 2644 cry3.exe 33 PID 2644 wrote to memory of 2704 2644 cry3.exe 33 PID 2644 wrote to memory of 2704 2644 cry3.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\cry3.exe"C:\Users\Admin\AppData\Local\Temp\cry3.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Users\Admin\AppData\Local\Temp\cry3.exe"C:\Users\Admin\AppData\Local\Temp\cry3.exe"2⤵PID:2212
-
-
C:\Users\Admin\AppData\Local\Temp\cry3.exe"C:\Users\Admin\AppData\Local\Temp\cry3.exe"2⤵PID:2664
-
-
C:\Users\Admin\AppData\Local\Temp\cry3.exe"C:\Users\Admin\AppData\Local\Temp\cry3.exe"2⤵PID:2704
-