Analysis
-
max time kernel
95s -
max time network
96s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
12-11-2024 12:43
Static task
static1
Behavioral task
behavioral1
Sample
8860a9bed353619eaf28f28eea95f3cfdefbb6eb25f2a557966703cf74678de7N.dll
Resource
win7-20240708-en
General
-
Target
8860a9bed353619eaf28f28eea95f3cfdefbb6eb25f2a557966703cf74678de7N.dll
-
Size
672KB
-
MD5
281ab1908c42955077a6ae9434c404a0
-
SHA1
d3dba9abdce5630188d8c51886e889305a698607
-
SHA256
8860a9bed353619eaf28f28eea95f3cfdefbb6eb25f2a557966703cf74678de7
-
SHA512
212d88553d5b92b278aa96f9cf7fd523ad1a95f7729bdf7e260ec321d8165bb0b110bd0ecb1af8ed896ee2f05b491077bdca8703c0c0524ff650914609852d99
-
SSDEEP
12288:97EFH9MS0eApw2fmB1zNDLRfm4yVjg6AI18R5kQSuOscoujeNA:97EIeewHNIAIiRmQ9ujeNA
Malware Config
Extracted
gozi
Extracted
gozi
1000
http://ey7kuuklgieop2pq.onion
http://shoshanna.at
http://maiamirainy.at
-
build
217027
-
dga_base_url
constitution.org/usdeclar.txt
-
dga_crc
0x4eb7d2ca
-
dga_season
10
-
dga_tlds
com
ru
org
-
exe_type
worker
-
server_id
12
Signatures
-
Gozi family
-
Unexpected DNS network traffic destination 3 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
Processes:
description ioc Destination IP 208.67.222.222 Destination IP 208.67.222.222 Destination IP 208.67.222.222 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Explorer.EXEdescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\Authtdll = "rundll32 \"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Apilxapi\\dfdtxva2.dll\",DllRegisterServer" Explorer.EXE -
Suspicious use of SetThreadContext 4 IoCs
Processes:
rundll32.execontrol.exeExplorer.EXEdescription pid process target process PID 2860 set thread context of 2740 2860 rundll32.exe control.exe PID 2740 set thread context of 1196 2740 control.exe Explorer.EXE PID 2740 set thread context of 2636 2740 control.exe rundll32.exe PID 1196 set thread context of 1976 1196 Explorer.EXE cmd.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.execmd.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exeExplorer.EXEpid process 2860 rundll32.exe 1196 Explorer.EXE -
Suspicious behavior: MapViewOfSection 4 IoCs
Processes:
rundll32.execontrol.exeExplorer.EXEpid process 2860 rundll32.exe 2740 control.exe 2740 control.exe 1196 Explorer.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Explorer.EXEpid process 1196 Explorer.EXE -
Suspicious use of WriteProcessMemory 39 IoCs
Processes:
rundll32.exerundll32.execontrol.exeExplorer.EXEcmd.exedescription pid process target process PID 2180 wrote to memory of 2860 2180 rundll32.exe rundll32.exe PID 2180 wrote to memory of 2860 2180 rundll32.exe rundll32.exe PID 2180 wrote to memory of 2860 2180 rundll32.exe rundll32.exe PID 2180 wrote to memory of 2860 2180 rundll32.exe rundll32.exe PID 2180 wrote to memory of 2860 2180 rundll32.exe rundll32.exe PID 2180 wrote to memory of 2860 2180 rundll32.exe rundll32.exe PID 2180 wrote to memory of 2860 2180 rundll32.exe rundll32.exe PID 2860 wrote to memory of 2740 2860 rundll32.exe control.exe PID 2860 wrote to memory of 2740 2860 rundll32.exe control.exe PID 2860 wrote to memory of 2740 2860 rundll32.exe control.exe PID 2860 wrote to memory of 2740 2860 rundll32.exe control.exe PID 2860 wrote to memory of 2740 2860 rundll32.exe control.exe PID 2860 wrote to memory of 2740 2860 rundll32.exe control.exe PID 2860 wrote to memory of 2740 2860 rundll32.exe control.exe PID 2740 wrote to memory of 1196 2740 control.exe Explorer.EXE PID 2740 wrote to memory of 1196 2740 control.exe Explorer.EXE PID 2740 wrote to memory of 1196 2740 control.exe Explorer.EXE PID 2740 wrote to memory of 2636 2740 control.exe rundll32.exe PID 2740 wrote to memory of 2636 2740 control.exe rundll32.exe PID 2740 wrote to memory of 2636 2740 control.exe rundll32.exe PID 2740 wrote to memory of 2636 2740 control.exe rundll32.exe PID 2740 wrote to memory of 2636 2740 control.exe rundll32.exe PID 2740 wrote to memory of 2636 2740 control.exe rundll32.exe PID 1196 wrote to memory of 1600 1196 Explorer.EXE cmd.exe PID 1196 wrote to memory of 1600 1196 Explorer.EXE cmd.exe PID 1196 wrote to memory of 1600 1196 Explorer.EXE cmd.exe PID 1600 wrote to memory of 1556 1600 cmd.exe nslookup.exe PID 1600 wrote to memory of 1556 1600 cmd.exe nslookup.exe PID 1600 wrote to memory of 1556 1600 cmd.exe nslookup.exe PID 1196 wrote to memory of 1488 1196 Explorer.EXE cmd.exe PID 1196 wrote to memory of 1488 1196 Explorer.EXE cmd.exe PID 1196 wrote to memory of 1488 1196 Explorer.EXE cmd.exe PID 1196 wrote to memory of 1976 1196 Explorer.EXE cmd.exe PID 1196 wrote to memory of 1976 1196 Explorer.EXE cmd.exe PID 1196 wrote to memory of 1976 1196 Explorer.EXE cmd.exe PID 1196 wrote to memory of 1976 1196 Explorer.EXE cmd.exe PID 1196 wrote to memory of 1976 1196 Explorer.EXE cmd.exe PID 1196 wrote to memory of 1976 1196 Explorer.EXE cmd.exe PID 1196 wrote to memory of 1976 1196 Explorer.EXE cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8860a9bed353619eaf28f28eea95f3cfdefbb6eb25f2a557966703cf74678de7N.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8860a9bed353619eaf28f28eea95f3cfdefbb6eb25f2a557966703cf74678de7N.dll,#13⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Windows\system32\control.exeC:\Windows\system32\control.exe /?4⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL /?5⤵PID:2636
-
-
-
-
-
C:\Windows\system32\cmd.execmd /C "nslookup myip.opendns.com resolver1.opendns.com > C:\Users\Admin\AppData\Local\Temp\1BE0.bi1"2⤵
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Windows\system32\nslookup.exenslookup myip.opendns.com resolver1.opendns.com3⤵PID:1556
-
-
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\1BE0.bi1"2⤵PID:1488
-
-
C:\Windows\syswow64\cmd.exe"C:\Windows\syswow64\cmd.exe" /C pause dll mail, ,2⤵
- System Location Discovery: System Language Discovery
PID:1976
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
110B
MD5469534e44d6489436c26d5e0d473ae1e
SHA1539f7ae0225c588fd2a60ee4ed036c568e2e8333
SHA25666d8bb9e94e6ee72da81b36efe59cfbb3db29170fc39cd2b43a39e5eb5087ce5
SHA5129d885af2c1a9800b5bedb4ea85559005c512db1831d5de2d3be438ad6a56099de211cd7ff0432a76c7044ba3b83389ab58bfd6c72e6b3f42452f3a82c1fde3bd
-
Filesize
121B
MD558910db4e6beb9df6a7facc8ff9ebd01
SHA14ac7a11682951faa9a2158955ec2887f2b54b7b2
SHA2568da116d5ff7ffd87e9839c748496155d74e6a425028514d324ddcf33ac00570f
SHA512ee5046838fef65364b93468ac35d97a6d1d028d897b8088fee77a88b977177c8d22e463b369a44048a40f2ea2e50f3acc54bcf314571c146a7602b67680260b2
-
Filesize
672KB
MD5281ab1908c42955077a6ae9434c404a0
SHA1d3dba9abdce5630188d8c51886e889305a698607
SHA2568860a9bed353619eaf28f28eea95f3cfdefbb6eb25f2a557966703cf74678de7
SHA512212d88553d5b92b278aa96f9cf7fd523ad1a95f7729bdf7e260ec321d8165bb0b110bd0ecb1af8ed896ee2f05b491077bdca8703c0c0524ff650914609852d99