Analysis
-
max time kernel
140s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10-11-2024 18:16
Static task
static1
Behavioral task
behavioral1
Sample
Zeip.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Zeip.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Zeip.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Zeip.exe
Resource
win10v2004-20241007-en
General
-
Target
Zeip.dll
-
Size
592KB
-
MD5
85fa54c2a97ad3a1f8bd64af62450511
-
SHA1
db92c0a81e8b27d222607e093ccc9d00485db119
-
SHA256
e609894b274a6c42e971e8082af8fd167ade4aef5d1a3816d5acea04839f0b35
-
SHA512
6c6faba5f566e3c383d676c736319a7a70138070b0d9771727a1c7756718a4add05db8a7c3a5b038b9269a0ecb14434872516912faea8e2479729a192f9a4b4b
-
SSDEEP
12288:cysmuJC4fktsdyjJGL44Clz8JwsWydYo9NRl:cT7IoyjXTKdlnz
Malware Config
Extracted
gozi
Extracted
gozi
20005
trackingg-protectioon.cdn4.mozilla.net
80.77.23.77
80.77.25.109
protectioon.cdn4.mozilla.net
170.130.165.182
80.77.25.114
-
base_path
/fonts/
-
build
250250
-
exe_type
loader
-
extension
.bak
-
server_id
50
Signatures
-
Gozi family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2796 wrote to memory of 1780 2796 rundll32.exe 29 PID 2796 wrote to memory of 1780 2796 rundll32.exe 29 PID 2796 wrote to memory of 1780 2796 rundll32.exe 29 PID 2796 wrote to memory of 1780 2796 rundll32.exe 29 PID 2796 wrote to memory of 1780 2796 rundll32.exe 29 PID 2796 wrote to memory of 1780 2796 rundll32.exe 29 PID 2796 wrote to memory of 1780 2796 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\Zeip.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\Zeip.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1780
-