Analysis
-
max time kernel
118s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 00:16
Static task
static1
Behavioral task
behavioral1
Sample
8860a9bed353619eaf28f28eea95f3cfdefbb6eb25f2a557966703cf74678de7N.dll
Resource
win7-20241010-en
General
-
Target
8860a9bed353619eaf28f28eea95f3cfdefbb6eb25f2a557966703cf74678de7N.dll
-
Size
672KB
-
MD5
727235afc25234c92c82e99c05a9f0c8
-
SHA1
a200141f482b8d470e0a3c1a7638a74df9987920
-
SHA256
732f00a1a664ca6b7a3b19a4f533a32719c7f1d688e3175e6e5118e7cd829693
-
SHA512
94eda3f5ad431382d51d98af49bb8672d79d7996b6beeb2e9ab7e036b6784a513ca1ebb2b3db35cb591ffd7a667c9605cb0948996bba30253f597955ad377db9
-
SSDEEP
12288:97EFH9MS0eApw2fmB1zNDLRfm4yVjg6AI18R5kQSuOscoujeNR:97EIeewHNIAIiRmQ9ujeNR
Malware Config
Extracted
gozi
Extracted
gozi
1000
http://ey7kuuklgieop2pq.onion
http://shoshanna.at
http://maiamirainy.at
-
dga_base_url
constitution.org/usdeclar.txt
-
dga_crc
0x4eb7d2ca
-
dga_season
10
-
dga_tlds
com
ru
org
-
exe_type
worker
-
server_id
12
Signatures
-
Gozi family
-
Unexpected DNS network traffic destination 3 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 208.67.222.222 Destination IP 208.67.222.222 Destination IP 208.67.222.222 -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Audiawex = "rundll32 \"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Cleakmon\\CIRCmifs.dll\",DllRegisterServer" Explorer.EXE -
Suspicious use of SetThreadContext 9 IoCs
description pid Process procid_target PID 4564 set thread context of 3268 4564 rundll32.exe 101 PID 3268 set thread context of 3516 3268 control.exe 56 PID 3516 set thread context of 4016 3516 Explorer.EXE 60 PID 3516 set thread context of 4128 3516 Explorer.EXE 62 PID 3516 set thread context of 3440 3516 Explorer.EXE 76 PID 3268 set thread context of 4112 3268 control.exe 102 PID 3516 set thread context of 860 3516 Explorer.EXE 85 PID 3516 set thread context of 1608 3516 Explorer.EXE 86 PID 3516 set thread context of 2948 3516 Explorer.EXE 109 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4564 rundll32.exe 4564 rundll32.exe 3516 Explorer.EXE 3516 Explorer.EXE -
Suspicious behavior: MapViewOfSection 9 IoCs
pid Process 4564 rundll32.exe 3268 control.exe 3516 Explorer.EXE 3516 Explorer.EXE 3516 Explorer.EXE 3268 control.exe 3516 Explorer.EXE 3516 Explorer.EXE 3516 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeShutdownPrivilege 3516 Explorer.EXE Token: SeCreatePagefilePrivilege 3516 Explorer.EXE Token: SeShutdownPrivilege 3516 Explorer.EXE Token: SeCreatePagefilePrivilege 3516 Explorer.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3516 Explorer.EXE -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3516 Explorer.EXE -
Suspicious use of WriteProcessMemory 43 IoCs
description pid Process procid_target PID 4332 wrote to memory of 4564 4332 rundll32.exe 83 PID 4332 wrote to memory of 4564 4332 rundll32.exe 83 PID 4332 wrote to memory of 4564 4332 rundll32.exe 83 PID 4564 wrote to memory of 3268 4564 rundll32.exe 101 PID 4564 wrote to memory of 3268 4564 rundll32.exe 101 PID 4564 wrote to memory of 3268 4564 rundll32.exe 101 PID 4564 wrote to memory of 3268 4564 rundll32.exe 101 PID 4564 wrote to memory of 3268 4564 rundll32.exe 101 PID 3268 wrote to memory of 3516 3268 control.exe 56 PID 3268 wrote to memory of 3516 3268 control.exe 56 PID 3268 wrote to memory of 3516 3268 control.exe 56 PID 3516 wrote to memory of 4016 3516 Explorer.EXE 60 PID 3268 wrote to memory of 4112 3268 control.exe 102 PID 3268 wrote to memory of 4112 3268 control.exe 102 PID 3268 wrote to memory of 4112 3268 control.exe 102 PID 3516 wrote to memory of 4016 3516 Explorer.EXE 60 PID 3516 wrote to memory of 4016 3516 Explorer.EXE 60 PID 3516 wrote to memory of 4128 3516 Explorer.EXE 62 PID 3516 wrote to memory of 4128 3516 Explorer.EXE 62 PID 3516 wrote to memory of 4128 3516 Explorer.EXE 62 PID 3516 wrote to memory of 3440 3516 Explorer.EXE 76 PID 3516 wrote to memory of 3440 3516 Explorer.EXE 76 PID 3516 wrote to memory of 3440 3516 Explorer.EXE 76 PID 3268 wrote to memory of 4112 3268 control.exe 102 PID 3516 wrote to memory of 860 3516 Explorer.EXE 85 PID 3268 wrote to memory of 4112 3268 control.exe 102 PID 3516 wrote to memory of 860 3516 Explorer.EXE 85 PID 3516 wrote to memory of 860 3516 Explorer.EXE 85 PID 3516 wrote to memory of 1608 3516 Explorer.EXE 86 PID 3516 wrote to memory of 1608 3516 Explorer.EXE 86 PID 3516 wrote to memory of 1608 3516 Explorer.EXE 86 PID 3516 wrote to memory of 3068 3516 Explorer.EXE 103 PID 3516 wrote to memory of 3068 3516 Explorer.EXE 103 PID 3068 wrote to memory of 2312 3068 cmd.exe 105 PID 3068 wrote to memory of 2312 3068 cmd.exe 105 PID 3516 wrote to memory of 4944 3516 Explorer.EXE 107 PID 3516 wrote to memory of 4944 3516 Explorer.EXE 107 PID 3516 wrote to memory of 2948 3516 Explorer.EXE 109 PID 3516 wrote to memory of 2948 3516 Explorer.EXE 109 PID 3516 wrote to memory of 2948 3516 Explorer.EXE 109 PID 3516 wrote to memory of 2948 3516 Explorer.EXE 109 PID 3516 wrote to memory of 2948 3516 Explorer.EXE 109 PID 3516 wrote to memory of 2948 3516 Explorer.EXE 109
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3516 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8860a9bed353619eaf28f28eea95f3cfdefbb6eb25f2a557966703cf74678de7N.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:4332 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8860a9bed353619eaf28f28eea95f3cfdefbb6eb25f2a557966703cf74678de7N.dll,#13⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4564 -
C:\Windows\system32\control.exeC:\Windows\system32\control.exe /?4⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3268 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL /?5⤵PID:4112
-
-
-
-
-
C:\Windows\system32\cmd.execmd /C "nslookup myip.opendns.com resolver1.opendns.com > C:\Users\Admin\AppData\Local\Temp\76B.bi1"2⤵
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\system32\nslookup.exenslookup myip.opendns.com resolver1.opendns.com3⤵PID:2312
-
-
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\76B.bi1"2⤵PID:4944
-
-
C:\Windows\syswow64\cmd.exe"C:\Windows\syswow64\cmd.exe" /C pause dll mail, ,2⤵
- System Location Discovery: System Language Discovery
PID:2948
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4016
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4128
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3440
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:860
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:1608
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
121B
MD558910db4e6beb9df6a7facc8ff9ebd01
SHA14ac7a11682951faa9a2158955ec2887f2b54b7b2
SHA2568da116d5ff7ffd87e9839c748496155d74e6a425028514d324ddcf33ac00570f
SHA512ee5046838fef65364b93468ac35d97a6d1d028d897b8088fee77a88b977177c8d22e463b369a44048a40f2ea2e50f3acc54bcf314571c146a7602b67680260b2
-
Filesize
672KB
MD5727235afc25234c92c82e99c05a9f0c8
SHA1a200141f482b8d470e0a3c1a7638a74df9987920
SHA256732f00a1a664ca6b7a3b19a4f533a32719c7f1d688e3175e6e5118e7cd829693
SHA51294eda3f5ad431382d51d98af49bb8672d79d7996b6beeb2e9ab7e036b6784a513ca1ebb2b3db35cb591ffd7a667c9605cb0948996bba30253f597955ad377db9