Analysis
-
max time kernel
115s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-12-2024 22:42
Static task
static1
Behavioral task
behavioral1
Sample
05e33f5e53db406bfa76e2bf569b1c21b4bffec3b90d1e8059963a2214d97e3cN.dll
Resource
win7-20240903-en
General
-
Target
05e33f5e53db406bfa76e2bf569b1c21b4bffec3b90d1e8059963a2214d97e3cN.dll
-
Size
971KB
-
MD5
257a35e347e7f71dc1425ff153ec2510
-
SHA1
79a6d6e5ebc2d8357d3c3e4c0ac2bee55eea5fb2
-
SHA256
05e33f5e53db406bfa76e2bf569b1c21b4bffec3b90d1e8059963a2214d97e3c
-
SHA512
593399bdd9ec38f3c4b5c901243241bfb33885835cfd5e5f5a67d2052b0a4c67290dde0d42a0541234164857ec75bf6b63f6e1eeab076bed0e3b3b785a8f7c61
-
SSDEEP
24576:dGlkSyXOKByXVHmuUAQrFZ5J5EdG9UAGPatVWZ:oyeKByF5U9FZ5J5YatVWZ
Malware Config
Extracted
gozi
Extracted
gozi
1000
http://ey7kuuklgieop2pq.onion
http://shoshanna.at
http://maiamirainy.at
-
build
217027
-
dga_base_url
constitution.org/usdeclar.txt
-
dga_crc
0x4eb7d2ca
-
dga_season
10
-
dga_tlds
com
ru
org
-
exe_type
worker
-
server_id
12
Signatures
-
Gozi family
-
Unexpected DNS network traffic destination 3 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 208.67.222.222 Destination IP 208.67.222.222 Destination IP 208.67.222.222 -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\BOOTscui = "rundll32 \"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\BdeHxpps\\dxilerPS.dll\",DllRegisterServer" Explorer.EXE -
Suspicious use of SetThreadContext 7 IoCs
description pid Process procid_target PID 3024 set thread context of 4448 3024 rundll32.exe 90 PID 4448 set thread context of 3352 4448 control.exe 55 PID 3352 set thread context of 4004 3352 Explorer.EXE 60 PID 3352 set thread context of 4276 3352 Explorer.EXE 62 PID 3352 set thread context of 4576 3352 Explorer.EXE 64 PID 4448 set thread context of 2616 4448 control.exe 91 PID 3352 set thread context of 1512 3352 Explorer.EXE 99 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3024 rundll32.exe 3024 rundll32.exe 3352 Explorer.EXE 3352 Explorer.EXE -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 3024 rundll32.exe 4448 control.exe 3352 Explorer.EXE 3352 Explorer.EXE 3352 Explorer.EXE 4448 control.exe 3352 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeShutdownPrivilege 3352 Explorer.EXE Token: SeCreatePagefilePrivilege 3352 Explorer.EXE Token: SeShutdownPrivilege 3352 Explorer.EXE Token: SeCreatePagefilePrivilege 3352 Explorer.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3352 Explorer.EXE -
Suspicious use of WriteProcessMemory 37 IoCs
description pid Process procid_target PID 2108 wrote to memory of 3024 2108 rundll32.exe 82 PID 2108 wrote to memory of 3024 2108 rundll32.exe 82 PID 2108 wrote to memory of 3024 2108 rundll32.exe 82 PID 3024 wrote to memory of 4448 3024 rundll32.exe 90 PID 3024 wrote to memory of 4448 3024 rundll32.exe 90 PID 3024 wrote to memory of 4448 3024 rundll32.exe 90 PID 3024 wrote to memory of 4448 3024 rundll32.exe 90 PID 3024 wrote to memory of 4448 3024 rundll32.exe 90 PID 4448 wrote to memory of 3352 4448 control.exe 55 PID 4448 wrote to memory of 3352 4448 control.exe 55 PID 4448 wrote to memory of 3352 4448 control.exe 55 PID 3352 wrote to memory of 4004 3352 Explorer.EXE 60 PID 3352 wrote to memory of 4004 3352 Explorer.EXE 60 PID 3352 wrote to memory of 4004 3352 Explorer.EXE 60 PID 3352 wrote to memory of 4276 3352 Explorer.EXE 62 PID 4448 wrote to memory of 2616 4448 control.exe 91 PID 4448 wrote to memory of 2616 4448 control.exe 91 PID 4448 wrote to memory of 2616 4448 control.exe 91 PID 3352 wrote to memory of 4276 3352 Explorer.EXE 62 PID 3352 wrote to memory of 4276 3352 Explorer.EXE 62 PID 3352 wrote to memory of 4576 3352 Explorer.EXE 64 PID 3352 wrote to memory of 4576 3352 Explorer.EXE 64 PID 3352 wrote to memory of 4576 3352 Explorer.EXE 64 PID 4448 wrote to memory of 2616 4448 control.exe 91 PID 4448 wrote to memory of 2616 4448 control.exe 91 PID 3352 wrote to memory of 1432 3352 Explorer.EXE 94 PID 3352 wrote to memory of 1432 3352 Explorer.EXE 94 PID 1432 wrote to memory of 432 1432 cmd.exe 96 PID 1432 wrote to memory of 432 1432 cmd.exe 96 PID 3352 wrote to memory of 3184 3352 Explorer.EXE 97 PID 3352 wrote to memory of 3184 3352 Explorer.EXE 97 PID 3352 wrote to memory of 1512 3352 Explorer.EXE 99 PID 3352 wrote to memory of 1512 3352 Explorer.EXE 99 PID 3352 wrote to memory of 1512 3352 Explorer.EXE 99 PID 3352 wrote to memory of 1512 3352 Explorer.EXE 99 PID 3352 wrote to memory of 1512 3352 Explorer.EXE 99 PID 3352 wrote to memory of 1512 3352 Explorer.EXE 99
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3352 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\05e33f5e53db406bfa76e2bf569b1c21b4bffec3b90d1e8059963a2214d97e3cN.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\05e33f5e53db406bfa76e2bf569b1c21b4bffec3b90d1e8059963a2214d97e3cN.dll,#13⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\system32\control.exeC:\Windows\system32\control.exe /?4⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4448 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL /?5⤵PID:2616
-
-
-
-
-
C:\Windows\system32\cmd.execmd /C "nslookup myip.opendns.com resolver1.opendns.com > C:\Users\Admin\AppData\Local\Temp\ABD9.bi1"2⤵
- Suspicious use of WriteProcessMemory
PID:1432 -
C:\Windows\system32\nslookup.exenslookup myip.opendns.com resolver1.opendns.com3⤵PID:432
-
-
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\ABD9.bi1"2⤵PID:3184
-
-
C:\Windows\syswow64\cmd.exe"C:\Windows\syswow64\cmd.exe" /C pause dll mail, ,2⤵
- System Location Discovery: System Language Discovery
PID:1512
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4004
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4276
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4576
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
122B
MD54e722b4828cea8a135eb7a2bfd92ab01
SHA18e1abee672a878fd9c1d33e242502205d9b2da55
SHA256c4d1feacbfb9ecd1a24e9b6d3e51fc7e9797da543d319f43ff0917db4c1e5e02
SHA51288c0d6b07d45f906164b2c1178a938ffb56c4fa7288853a02f460339bca026fa58b26a37f52ea846bc205e1828f12f0361d1b0425a1106c8b1a947856d4ee4e4