Overview
overview
10Static
static
50442cfabb3...ab.exe
windows7-x64
8c0cf40b883...3a.exe
windows7-x64
8cry1.exe
windows7-x64
8cry2.exe
windows7-x64
8cry3.exe
windows7-x64
10cry4.exe
windows7-x64
10cry5.exe
windows7-x64
8cry6.exe
windows7-x64
10e49778d20a...73.exe
windows7-x64
8inquiry.scr
windows7-x64
9Накла...15.scr
windows7-x64
3ПРЕТЕ...Я.scr
windows7-x64
5Счет �...08.scr
windows7-x64
3карто...я.scr
windows7-x64
5Analysis
-
max time kernel
600s -
max time network
597s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-11-2024 11:10
Behavioral task
behavioral1
Sample
0442cfabb3212644c4b894a7e4a7e84c00fd23489cc4f96490f9988e6074b6ab.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c0cf40b8830d666a24bdd4febdc162e95aa30ed968fa3675e26ad97b2e88e03a.exe
Resource
win7-20240903-en
Behavioral task
behavioral3
Sample
cry1.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
cry2.exe
Resource
win7-20240903-en
Behavioral task
behavioral5
Sample
cry3.exe
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
cry4.exe
Resource
win7-20240903-en
Behavioral task
behavioral7
Sample
cry5.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
cry6.exe
Resource
win7-20240903-en
Behavioral task
behavioral9
Sample
e49778d20a2f9b1f8b00ddd24b6bcee81af381ed02cfe0a3c9ab3111cda5f573.exe
Resource
win7-20240729-en
Behavioral task
behavioral10
Sample
inquiry.scr
Resource
win7-20241010-en
Behavioral task
behavioral11
Sample
Накладная для 1736 от 26.08.2015.scr
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
ПРЕТЕНЗИЯ.scr
Resource
win7-20240903-en
Behavioral task
behavioral13
Sample
Счет на оплату от 26-08.scr
Resource
win7-20240708-en
General
-
Target
cry6.exe
-
Size
511KB
-
MD5
afb4846bd287f31e6297cb4095aece65
-
SHA1
b92d682a800d82ff6e980deae88f6cb7e048c11d
-
SHA256
639a86559b0a086fe388e4309ea22e49f79362c0983df1a5b09fa477db3c463d
-
SHA512
8f5b3062a7f4faada34001bbe8510235d20b3d507ee0858ef23db92853f31a3075c60e37738a93e1385995199c9d99dccb7e547247fc9af5b8a8f3557d03d070
-
SSDEEP
12288:nTY7/WAuLAOOxsgfj40bDKg0m7t4is8jYar:kusO+RDKgJBnsgYa
Malware Config
Extracted
gozi
-
build
215798
Signatures
-
Gozi family
-
Executes dropped EXE 2 IoCs
pid Process 2624 chtbider.exe 3016 chtbider.exe -
Loads dropped DLL 2 IoCs
pid Process 2592 cmd.exe 2592 cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\DHCPupnp = "C:\\Users\\Admin\\AppData\\Roaming\\drprssec\\chtbider.exe" cry6.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2228 set thread context of 2676 2228 cry6.exe 30 PID 2624 set thread context of 3016 2624 chtbider.exe 35 PID 3016 set thread context of 1196 3016 chtbider.exe 36 PID 1196 set thread context of 1180 1196 svchost.exe 21 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cry6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cry6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chtbider.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chtbider.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3016 chtbider.exe 1180 Explorer.EXE -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 3016 chtbider.exe 1196 svchost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 1180 Explorer.EXE Token: SeShutdownPrivilege 1180 Explorer.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1180 Explorer.EXE -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 2228 wrote to memory of 2676 2228 cry6.exe 30 PID 2228 wrote to memory of 2676 2228 cry6.exe 30 PID 2228 wrote to memory of 2676 2228 cry6.exe 30 PID 2228 wrote to memory of 2676 2228 cry6.exe 30 PID 2228 wrote to memory of 2676 2228 cry6.exe 30 PID 2228 wrote to memory of 2676 2228 cry6.exe 30 PID 2228 wrote to memory of 2676 2228 cry6.exe 30 PID 2228 wrote to memory of 2676 2228 cry6.exe 30 PID 2228 wrote to memory of 2676 2228 cry6.exe 30 PID 2228 wrote to memory of 2676 2228 cry6.exe 30 PID 2228 wrote to memory of 2676 2228 cry6.exe 30 PID 2676 wrote to memory of 2664 2676 cry6.exe 31 PID 2676 wrote to memory of 2664 2676 cry6.exe 31 PID 2676 wrote to memory of 2664 2676 cry6.exe 31 PID 2676 wrote to memory of 2664 2676 cry6.exe 31 PID 2664 wrote to memory of 2592 2664 cmd.exe 33 PID 2664 wrote to memory of 2592 2664 cmd.exe 33 PID 2664 wrote to memory of 2592 2664 cmd.exe 33 PID 2664 wrote to memory of 2592 2664 cmd.exe 33 PID 2592 wrote to memory of 2624 2592 cmd.exe 34 PID 2592 wrote to memory of 2624 2592 cmd.exe 34 PID 2592 wrote to memory of 2624 2592 cmd.exe 34 PID 2592 wrote to memory of 2624 2592 cmd.exe 34 PID 2624 wrote to memory of 3016 2624 chtbider.exe 35 PID 2624 wrote to memory of 3016 2624 chtbider.exe 35 PID 2624 wrote to memory of 3016 2624 chtbider.exe 35 PID 2624 wrote to memory of 3016 2624 chtbider.exe 35 PID 2624 wrote to memory of 3016 2624 chtbider.exe 35 PID 2624 wrote to memory of 3016 2624 chtbider.exe 35 PID 2624 wrote to memory of 3016 2624 chtbider.exe 35 PID 2624 wrote to memory of 3016 2624 chtbider.exe 35 PID 2624 wrote to memory of 3016 2624 chtbider.exe 35 PID 2624 wrote to memory of 3016 2624 chtbider.exe 35 PID 2624 wrote to memory of 3016 2624 chtbider.exe 35 PID 3016 wrote to memory of 1196 3016 chtbider.exe 36 PID 3016 wrote to memory of 1196 3016 chtbider.exe 36 PID 3016 wrote to memory of 1196 3016 chtbider.exe 36 PID 3016 wrote to memory of 1196 3016 chtbider.exe 36 PID 3016 wrote to memory of 1196 3016 chtbider.exe 36 PID 3016 wrote to memory of 1196 3016 chtbider.exe 36 PID 3016 wrote to memory of 1196 3016 chtbider.exe 36 PID 1196 wrote to memory of 1180 1196 svchost.exe 21 PID 1196 wrote to memory of 1180 1196 svchost.exe 21 PID 1196 wrote to memory of 1180 1196 svchost.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1180 -
C:\Users\Admin\AppData\Local\Temp\cry6.exe"C:\Users\Admin\AppData\Local\Temp\cry6.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Users\Admin\AppData\Local\Temp\cry6.exe"C:\Users\Admin\AppData\Local\Temp\cry6.exe"3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\B194\58CA.bat" "C:\Users\Admin\AppData\Roaming\drprssec\chtbider.exe" "C:\Users\Admin\AppData\Local\Temp\cry6.exe""4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\SysWOW64\cmd.execmd /C ""C:\Users\Admin\AppData\Roaming\drprssec\chtbider.exe" "C:\Users\Admin\AppData\Local\Temp\cry6.exe""5⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Users\Admin\AppData\Roaming\drprssec\chtbider.exe"C:\Users\Admin\AppData\Roaming\drprssec\chtbider.exe" "C:\Users\Admin\AppData\Local\Temp\cry6.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Users\Admin\AppData\Roaming\drprssec\chtbider.exe"C:\Users\Admin\AppData\Roaming\drprssec\chtbider.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe8⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1196
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
112B
MD539292e8b5766d04006a7a5fe4fba559c
SHA183ebd8f4e97e8704a4bc496fcf32a399a78cd6b9
SHA256202b2077426e8f0ee5b44da806b25ed4711161fe3de456222277d9ef31855ae1
SHA5129905c8a6f661df65b90e56c43d4c03688768b942c2ee9d36f5055ca083bd6a2fe7a10375f82aba7682f26c7ccd29111b8dee659f3f36a17e69f70891b451c1b7
-
Filesize
511KB
MD5afb4846bd287f31e6297cb4095aece65
SHA1b92d682a800d82ff6e980deae88f6cb7e048c11d
SHA256639a86559b0a086fe388e4309ea22e49f79362c0983df1a5b09fa477db3c463d
SHA5128f5b3062a7f4faada34001bbe8510235d20b3d507ee0858ef23db92853f31a3075c60e37738a93e1385995199c9d99dccb7e547247fc9af5b8a8f3557d03d070