Overview
overview
10Static
static
50442cfabb3...ab.exe
windows7-x64
8c0cf40b883...3a.exe
windows7-x64
8cry1.exe
windows7-x64
8cry2.exe
windows7-x64
8cry3.exe
windows7-x64
10cry4.exe
windows7-x64
10cry5.exe
windows7-x64
8cry6.exe
windows7-x64
10e49778d20a...73.exe
windows7-x64
8inquiry.scr
windows7-x64
9Накла...15.scr
windows7-x64
3ПРЕТЕ...Я.scr
windows7-x64
5Счет �...08.scr
windows7-x64
3карто...я.scr
windows7-x64
5Analysis
-
max time kernel
600s -
max time network
597s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-11-2024 11:10
Behavioral task
behavioral1
Sample
0442cfabb3212644c4b894a7e4a7e84c00fd23489cc4f96490f9988e6074b6ab.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c0cf40b8830d666a24bdd4febdc162e95aa30ed968fa3675e26ad97b2e88e03a.exe
Resource
win7-20240903-en
Behavioral task
behavioral3
Sample
cry1.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
cry2.exe
Resource
win7-20240903-en
Behavioral task
behavioral5
Sample
cry3.exe
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
cry4.exe
Resource
win7-20240903-en
Behavioral task
behavioral7
Sample
cry5.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
cry6.exe
Resource
win7-20240903-en
Behavioral task
behavioral9
Sample
e49778d20a2f9b1f8b00ddd24b6bcee81af381ed02cfe0a3c9ab3111cda5f573.exe
Resource
win7-20240729-en
Behavioral task
behavioral10
Sample
inquiry.scr
Resource
win7-20241010-en
Behavioral task
behavioral11
Sample
Накладная для 1736 от 26.08.2015.scr
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
ПРЕТЕНЗИЯ.scr
Resource
win7-20240903-en
Behavioral task
behavioral13
Sample
Счет на оплату от 26-08.scr
Resource
win7-20240708-en
General
-
Target
cry4.exe
-
Size
507KB
-
MD5
6e352a6e96db293f487d1c1996f7ca60
-
SHA1
887a357a96b9dbb428b6b776a3ec8ca8de746f18
-
SHA256
49b84085b7cc731d39fda5a6c15d8bedf3051f3e3f8792f4a50220ebdbf1a4c6
-
SHA512
bad3b109707b7ba714ccfd41109d6defe9aa2c651cd7dd8c91f536622fa52394071e858a81a2844421a56219527737d395580ea73e250f6cb44c4c1c4959351d
-
SSDEEP
12288:IEi3NId2zO8PW418jZZUozZuzYgwz3r14Y07KCJ:GrdZ+tZlVUYBzB0KC
Malware Config
Extracted
gozi
-
build
215798
Signatures
-
Gozi family
-
Executes dropped EXE 2 IoCs
pid Process 2704 cewmnect.exe 2712 cewmnect.exe -
Loads dropped DLL 2 IoCs
pid Process 2668 cmd.exe 2668 cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\desksenh = "C:\\Users\\Admin\\AppData\\Roaming\\difxuser\\cewmnect.exe" cry4.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2204 set thread context of 2176 2204 cry4.exe 31 PID 2704 set thread context of 2712 2704 cewmnect.exe 36 PID 2712 set thread context of 2016 2712 cewmnect.exe 37 PID 2016 set thread context of 1132 2016 svchost.exe 20 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cry4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cewmnect.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cewmnect.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cry4.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2712 cewmnect.exe 1132 Explorer.EXE -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2712 cewmnect.exe 2016 svchost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 1132 Explorer.EXE Token: SeShutdownPrivilege 1132 Explorer.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1132 Explorer.EXE -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 2204 wrote to memory of 2176 2204 cry4.exe 31 PID 2204 wrote to memory of 2176 2204 cry4.exe 31 PID 2204 wrote to memory of 2176 2204 cry4.exe 31 PID 2204 wrote to memory of 2176 2204 cry4.exe 31 PID 2204 wrote to memory of 2176 2204 cry4.exe 31 PID 2204 wrote to memory of 2176 2204 cry4.exe 31 PID 2204 wrote to memory of 2176 2204 cry4.exe 31 PID 2204 wrote to memory of 2176 2204 cry4.exe 31 PID 2204 wrote to memory of 2176 2204 cry4.exe 31 PID 2204 wrote to memory of 2176 2204 cry4.exe 31 PID 2204 wrote to memory of 2176 2204 cry4.exe 31 PID 2176 wrote to memory of 2744 2176 cry4.exe 32 PID 2176 wrote to memory of 2744 2176 cry4.exe 32 PID 2176 wrote to memory of 2744 2176 cry4.exe 32 PID 2176 wrote to memory of 2744 2176 cry4.exe 32 PID 2744 wrote to memory of 2668 2744 cmd.exe 34 PID 2744 wrote to memory of 2668 2744 cmd.exe 34 PID 2744 wrote to memory of 2668 2744 cmd.exe 34 PID 2744 wrote to memory of 2668 2744 cmd.exe 34 PID 2668 wrote to memory of 2704 2668 cmd.exe 35 PID 2668 wrote to memory of 2704 2668 cmd.exe 35 PID 2668 wrote to memory of 2704 2668 cmd.exe 35 PID 2668 wrote to memory of 2704 2668 cmd.exe 35 PID 2704 wrote to memory of 2712 2704 cewmnect.exe 36 PID 2704 wrote to memory of 2712 2704 cewmnect.exe 36 PID 2704 wrote to memory of 2712 2704 cewmnect.exe 36 PID 2704 wrote to memory of 2712 2704 cewmnect.exe 36 PID 2704 wrote to memory of 2712 2704 cewmnect.exe 36 PID 2704 wrote to memory of 2712 2704 cewmnect.exe 36 PID 2704 wrote to memory of 2712 2704 cewmnect.exe 36 PID 2704 wrote to memory of 2712 2704 cewmnect.exe 36 PID 2704 wrote to memory of 2712 2704 cewmnect.exe 36 PID 2704 wrote to memory of 2712 2704 cewmnect.exe 36 PID 2704 wrote to memory of 2712 2704 cewmnect.exe 36 PID 2712 wrote to memory of 2016 2712 cewmnect.exe 37 PID 2712 wrote to memory of 2016 2712 cewmnect.exe 37 PID 2712 wrote to memory of 2016 2712 cewmnect.exe 37 PID 2712 wrote to memory of 2016 2712 cewmnect.exe 37 PID 2712 wrote to memory of 2016 2712 cewmnect.exe 37 PID 2712 wrote to memory of 2016 2712 cewmnect.exe 37 PID 2712 wrote to memory of 2016 2712 cewmnect.exe 37 PID 2016 wrote to memory of 1132 2016 svchost.exe 20 PID 2016 wrote to memory of 1132 2016 svchost.exe 20 PID 2016 wrote to memory of 1132 2016 svchost.exe 20
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1132 -
C:\Users\Admin\AppData\Local\Temp\cry4.exe"C:\Users\Admin\AppData\Local\Temp\cry4.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\cry4.exe"C:\Users\Admin\AppData\Local\Temp\cry4.exe"3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\6336\319B.bat" "C:\Users\Admin\AppData\Roaming\difxuser\cewmnect.exe" "C:\Users\Admin\AppData\Local\Temp\cry4.exe""4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\cmd.execmd /C ""C:\Users\Admin\AppData\Roaming\difxuser\cewmnect.exe" "C:\Users\Admin\AppData\Local\Temp\cry4.exe""5⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Users\Admin\AppData\Roaming\difxuser\cewmnect.exe"C:\Users\Admin\AppData\Roaming\difxuser\cewmnect.exe" "C:\Users\Admin\AppData\Local\Temp\cry4.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Users\Admin\AppData\Roaming\difxuser\cewmnect.exe"C:\Users\Admin\AppData\Roaming\difxuser\cewmnect.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe8⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2016
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
112B
MD5bc01f616c09d69a6dd36f7bc58286817
SHA1b83283444714ab1e312a7b221dc709f8806c5ff4
SHA256d19793bcf4f5441e08c64d40b4d4d31164efc59944f2d3ecc0a963ba55565e85
SHA512f6764745c4c5ea014a349156299c2a0aab725fc0edbce095cff28cb1a37d4612db6c2d64bce0339bcb12c074d7aa9b7c226cd7f873c0c9e564de44c328e12b13
-
Filesize
507KB
MD56e352a6e96db293f487d1c1996f7ca60
SHA1887a357a96b9dbb428b6b776a3ec8ca8de746f18
SHA25649b84085b7cc731d39fda5a6c15d8bedf3051f3e3f8792f4a50220ebdbf1a4c6
SHA512bad3b109707b7ba714ccfd41109d6defe9aa2c651cd7dd8c91f536622fa52394071e858a81a2844421a56219527737d395580ea73e250f6cb44c4c1c4959351d