Overview
overview
10Static
static
7066d06ca00...81.exe
windows7-x64
1006d6f22d02...bc.exe
windows7-x64
809f1d49065...d1.exe
windows7-x64
10208cca124d...45.exe
windows7-x64
10241f67ece2...79.exe
windows7-x64
130616f6c48...60.exe
windows7-x64
1044f28cd6ea...7e.exe
windows7-x64
34b190a407b...5f.exe
windows7-x64
1072ddceebe7...6b.exe
windows7-x64
97b53a00b3a...b2.exe
windows7-x64
77cf39ebb44...57.exe
windows7-x64
108c42a08427...51.exe
windows7-x64
79d081b734c...91.exe
windows7-x64
4b25cc31472...15.exe
windows7-x64
10b2ec72de35...8f.exe
windows7-x64
6b4c2ffccfe...dd.exe
windows7-x64
5bab7af3306...be.exe
windows7-x64
9c531015ec0...86.exe
windows7-x64
8dc7ab2e7ed...60.exe
windows7-x64
8debfd1fb34...d8.exe
windows7-x64
8df36e2aaae...37.exe
windows7-x64
9df99316e57...27.exe
windows7-x64
4e60fc4473a...60.exe
windows7-x64
10Analysis
-
max time kernel
1171s -
max time network
862s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
12-11-2024 19:27
Behavioral task
behavioral1
Sample
066d06ca007d19457ca609dd95975f7facb551ffb5d8f6d4edf108236ad8c981.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
06d6f22d02443afd6d6880ead6648ebc.exe
Resource
win7-20240903-en
Behavioral task
behavioral3
Sample
09f1d49065108a595578ff86ff63a514d47d5496ab5c23f38cda1f0d57dd6cd1.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
208cca124ddafe35a122f6bdd36191151a2730b4e1051804d5f68d0cb4b44145.exe
Resource
win7-20240903-en
Behavioral task
behavioral5
Sample
241f67ece26c9e6047bb1a9fc60bf7c45a23ea1a2bb08a1617a385c71d008d79.exe
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
30616f6c488fa16ccdcbfd6273e7ac8604c82bc1468fc1a70b2a43661b674760.exe
Resource
win7-20240903-en
Behavioral task
behavioral7
Sample
44f28cd6ea894c05030ab913e2a0f1f1596b4aa7c551df9381f521cb88a92f7e.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
4b190a407bca89dd4778afa551bdc58dddff26fc5fe7622453e836ecdfaf565f.exe
Resource
win7-20240729-en
Behavioral task
behavioral9
Sample
72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
7b53a00b3a8859755f6144cb2149673fa17fdd6e439cbfdee21a7a513e6395b2.exe
Resource
win7-20241023-en
Behavioral task
behavioral11
Sample
7cf39ebb4409b13a7c153abff6661cc4d28d8d7109543d6419438ac9f2f1be57.exe
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
8c42a084278ff8e25f7ee765c37da84da02780da725505108f9eb39cfb05c051.exe
Resource
win7-20240903-en
Behavioral task
behavioral13
Sample
9d081b734c595a1ae38e254369c0060c5870ee119c9f7853989c23ebc204a291.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
b25cc314720ced9b2845941fb145bbf06493fad7b2b4a76b8fbffc995ff46215.exe
Resource
win7-20240903-en
Behavioral task
behavioral15
Sample
b2ec72de3543060f0f3af322c4f1caf2d65fa8ff56b5a93a5e8fa59c191d178f.exe
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
b4c2ffccfe807167860d70ea95cde0390f2dc4220992d272497ced04afb97edd.exe
Resource
win7-20240903-en
Behavioral task
behavioral17
Sample
bab7af3306f66d5deaafda1f0cd57c20e42678451a7bc70c71255f6a7e1806be.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
c531015ec09adf346131a375df9b9d04c90657fac9b80f2b1e269dae6186de86.exe
Resource
win7-20240903-en
Behavioral task
behavioral19
Sample
dc7ab2e7ed26554a11da51a184e95b01e685b1a2f99c7fc77d54d5966530bf60.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
debfd1fb34df5c7047c3c8837cdda27b59e6044934447a8bb6878344847b74d8.exe
Resource
win7-20240903-en
Behavioral task
behavioral21
Sample
df36e2aaae85f07851810a829e38a82827252fda15d4c4410da085d59ce38737.exe
Resource
win7-20241023-en
Behavioral task
behavioral22
Sample
df99316e57002298d88be785acad4c3a900cbc5e04a29e32d4549f25f08a7527.exe
Resource
win7-20240903-en
Behavioral task
behavioral23
Sample
e60fc4473ada26f3a8d2dd5c5f226441073bf86737e271f6f2ec61324ef9ab60.exe
Resource
win7-20241010-en
General
-
Target
066d06ca007d19457ca609dd95975f7facb551ffb5d8f6d4edf108236ad8c981.exe
-
Size
1.4MB
-
MD5
8f96e8a051cb8df97a27c36dcf71d585
-
SHA1
96dcf9b846ae8710a06e24d0f12b2b98446810af
-
SHA256
066d06ca007d19457ca609dd95975f7facb551ffb5d8f6d4edf108236ad8c981
-
SHA512
ebb56e6fe4ef2e5f5ccb429efdd8f6090761f8822c8acf6e466424f5d86b1238d3bad2236748dd0b9ce04a5f68e4fa15cc8714f1088031ffe5c3d41d2b2cdd94
-
SSDEEP
24576:wD4u03Es5iL6J4H1ZMJwOXWI3ZsrHjS/7YftKna/Rgy9c9fa:KIl5im4VN+2e7YfkUcZ
Malware Config
Extracted
gozi
Signatures
-
Gozi family
-
Drops startup file 2 IoCs
Processes:
cmd.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ElmersGlue_3.exe cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ElmersGlue_3.exe cmd.exe -
Executes dropped EXE 1 IoCs
Processes:
ElmersGlue_3.exepid process 1956 ElmersGlue_3.exe -
Processes:
resource yara_rule behavioral1/memory/2064-0-0x0000000000400000-0x0000000000703000-memory.dmp upx behavioral1/memory/2064-17-0x0000000000400000-0x0000000000703000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
066d06ca007d19457ca609dd95975f7facb551ffb5d8f6d4edf108236ad8c981.exeElmersGlue_3.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 066d06ca007d19457ca609dd95975f7facb551ffb5d8f6d4edf108236ad8c981.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ElmersGlue_3.exe -
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
Processes:
ElmersGlue_3.exepid process 1956 ElmersGlue_3.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
066d06ca007d19457ca609dd95975f7facb551ffb5d8f6d4edf108236ad8c981.execmd.exedescription pid process target process PID 2064 wrote to memory of 2088 2064 066d06ca007d19457ca609dd95975f7facb551ffb5d8f6d4edf108236ad8c981.exe cmd.exe PID 2064 wrote to memory of 2088 2064 066d06ca007d19457ca609dd95975f7facb551ffb5d8f6d4edf108236ad8c981.exe cmd.exe PID 2064 wrote to memory of 2088 2064 066d06ca007d19457ca609dd95975f7facb551ffb5d8f6d4edf108236ad8c981.exe cmd.exe PID 2064 wrote to memory of 2088 2064 066d06ca007d19457ca609dd95975f7facb551ffb5d8f6d4edf108236ad8c981.exe cmd.exe PID 2088 wrote to memory of 1956 2088 cmd.exe ElmersGlue_3.exe PID 2088 wrote to memory of 1956 2088 cmd.exe ElmersGlue_3.exe PID 2088 wrote to memory of 1956 2088 cmd.exe ElmersGlue_3.exe PID 2088 wrote to memory of 1956 2088 cmd.exe ElmersGlue_3.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\066d06ca007d19457ca609dd95975f7facb551ffb5d8f6d4edf108236ad8c981.exe"C:\Users\Admin\AppData\Local\Temp\066d06ca007d19457ca609dd95975f7facb551ffb5d8f6d4edf108236ad8c981.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\C6E7.tmp\C6E8.bat C:\Users\Admin\AppData\Local\Temp\066d06ca007d19457ca609dd95975f7facb551ffb5d8f6d4edf108236ad8c981.exe"2⤵
- Drops startup file
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Users\Admin\AppData\Local\Temp\C6E7.tmp\ElmersGlue_3.exeElmersGlue_3.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1956
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
303B
MD591445ef6b38800794ae9ffbf2eb29cf7
SHA13a56a399df2a3b3c546c0093197452edd0e8e92c
SHA2567d68b772ad72fedfdbf25699149e0ffb7bc71b6f3750f7a0c36722bff4f5797b
SHA512eb482537baac16495dca8192cbdb204ee3fded66d496e753c8c5f9cec5d17d81ba921da60a74cf11a52f047147ca3e63c8b987e85b57da193250bc460335f580
-
Filesize
2.8MB
MD5689d3bbc17c506fdd2626e0ee4f2d86f
SHA1d8fc12f42963e1dbcdca8a826a7598e9a740fe79
SHA25663e028dfbf88592d15738ca76505fd2ed240ffba015958e58080b3277c8c96ae
SHA512997ccff79049cd8763751cbfb451b4c1fd7184657f98591c59790939de65217437e5ade3f77105dfee302a505726aa20a1009c34c3e955882db4e5d2ceed9db1