Analysis
-
max time kernel
146s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-12-2024 19:31
Static task
static1
Behavioral task
behavioral1
Sample
04d6963ab02c1f483cb9ff7af68c15456740099de5dd84dc68a77e9511772129.dll
Resource
win7-20240903-en
General
-
Target
04d6963ab02c1f483cb9ff7af68c15456740099de5dd84dc68a77e9511772129.dll
-
Size
761KB
-
MD5
daacc7852627bd0e71b8e3d2a4a6543b
-
SHA1
f47462d2b9d2b375684f98f011e399c25fe2e7dd
-
SHA256
04d6963ab02c1f483cb9ff7af68c15456740099de5dd84dc68a77e9511772129
-
SHA512
4c6fe5679e123443c3ec19094683ba834dbec0515b56bcde43c33d423db2684b108d6f9c457c9c10daa4765054c7d8bdc163b59a2c75464c42d7bcb6a18b2cd8
-
SSDEEP
12288:JauX9Io7goxCqOJC0g+j4gBoB3KD/KZExnbCZwcSeVX6OF+XN15xJgiC42D6r3ec:Jah7oYJRrLDSZExnbCvSyF+XW/6T
Malware Config
Extracted
gozi
Extracted
gozi
1000
http://ey7kuuklgieop2pq.onion
http://maiamirainy.at
http://drunt.at
http://news-deck.at
-
build
216098
-
dga_base_url
constitution.org/usdeclar.txt
-
dga_crc
0x4eb7d2ca
-
dga_season
10
-
dga_tlds
com
ru
org
-
exe_type
worker
-
server_id
12
Signatures
-
Gozi family
-
Unexpected DNS network traffic destination 3 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 208.67.222.222 Destination IP 208.67.222.222 Destination IP 208.67.222.222 -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Audiawex = "rundll32 \"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Cleakmon\\CIRCmifs.dll\",DllRegisterServer" Explorer.EXE -
Suspicious use of SetThreadContext 7 IoCs
description pid Process procid_target PID 1136 set thread context of 2096 1136 rundll32.exe 91 PID 2096 set thread context of 3412 2096 control.exe 56 PID 3412 set thread context of 3888 3412 Explorer.EXE 60 PID 2096 set thread context of 4668 2096 control.exe 94 PID 3412 set thread context of 3488 3412 Explorer.EXE 62 PID 3412 set thread context of 3868 3412 Explorer.EXE 76 PID 3412 set thread context of 4208 3412 Explorer.EXE 108 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1136 rundll32.exe 1136 rundll32.exe 3412 Explorer.EXE 3412 Explorer.EXE -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 1136 rundll32.exe 2096 control.exe 3412 Explorer.EXE 2096 control.exe 3412 Explorer.EXE 3412 Explorer.EXE 3412 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeShutdownPrivilege 3412 Explorer.EXE Token: SeCreatePagefilePrivilege 3412 Explorer.EXE Token: SeShutdownPrivilege 3888 RuntimeBroker.exe Token: SeShutdownPrivilege 3888 RuntimeBroker.exe Token: SeShutdownPrivilege 3888 RuntimeBroker.exe Token: SeShutdownPrivilege 3412 Explorer.EXE Token: SeCreatePagefilePrivilege 3412 Explorer.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3412 Explorer.EXE -
Suspicious use of WriteProcessMemory 37 IoCs
description pid Process procid_target PID 2324 wrote to memory of 1136 2324 rundll32.exe 83 PID 2324 wrote to memory of 1136 2324 rundll32.exe 83 PID 2324 wrote to memory of 1136 2324 rundll32.exe 83 PID 1136 wrote to memory of 2096 1136 rundll32.exe 91 PID 1136 wrote to memory of 2096 1136 rundll32.exe 91 PID 1136 wrote to memory of 2096 1136 rundll32.exe 91 PID 1136 wrote to memory of 2096 1136 rundll32.exe 91 PID 1136 wrote to memory of 2096 1136 rundll32.exe 91 PID 2096 wrote to memory of 3412 2096 control.exe 56 PID 2096 wrote to memory of 3412 2096 control.exe 56 PID 2096 wrote to memory of 3412 2096 control.exe 56 PID 3412 wrote to memory of 3888 3412 Explorer.EXE 60 PID 2096 wrote to memory of 4668 2096 control.exe 94 PID 2096 wrote to memory of 4668 2096 control.exe 94 PID 2096 wrote to memory of 4668 2096 control.exe 94 PID 3412 wrote to memory of 3888 3412 Explorer.EXE 60 PID 3412 wrote to memory of 3888 3412 Explorer.EXE 60 PID 3412 wrote to memory of 3488 3412 Explorer.EXE 62 PID 2096 wrote to memory of 4668 2096 control.exe 94 PID 2096 wrote to memory of 4668 2096 control.exe 94 PID 3412 wrote to memory of 3488 3412 Explorer.EXE 62 PID 3412 wrote to memory of 3488 3412 Explorer.EXE 62 PID 3412 wrote to memory of 3868 3412 Explorer.EXE 76 PID 3412 wrote to memory of 3868 3412 Explorer.EXE 76 PID 3412 wrote to memory of 3868 3412 Explorer.EXE 76 PID 3412 wrote to memory of 4552 3412 Explorer.EXE 102 PID 3412 wrote to memory of 4552 3412 Explorer.EXE 102 PID 4552 wrote to memory of 1680 4552 cmd.exe 104 PID 4552 wrote to memory of 1680 4552 cmd.exe 104 PID 3412 wrote to memory of 4844 3412 Explorer.EXE 106 PID 3412 wrote to memory of 4844 3412 Explorer.EXE 106 PID 3412 wrote to memory of 4208 3412 Explorer.EXE 108 PID 3412 wrote to memory of 4208 3412 Explorer.EXE 108 PID 3412 wrote to memory of 4208 3412 Explorer.EXE 108 PID 3412 wrote to memory of 4208 3412 Explorer.EXE 108 PID 3412 wrote to memory of 4208 3412 Explorer.EXE 108 PID 3412 wrote to memory of 4208 3412 Explorer.EXE 108
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3412 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\04d6963ab02c1f483cb9ff7af68c15456740099de5dd84dc68a77e9511772129.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\04d6963ab02c1f483cb9ff7af68c15456740099de5dd84dc68a77e9511772129.dll,#13⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1136 -
C:\Windows\system32\control.exeC:\Windows\system32\control.exe /?4⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL /?5⤵PID:4668
-
-
-
-
-
C:\Windows\system32\cmd.execmd /C "nslookup myip.opendns.com resolver1.opendns.com > C:\Users\Admin\AppData\Local\Temp\9CD0.bi1"2⤵
- Suspicious use of WriteProcessMemory
PID:4552 -
C:\Windows\system32\nslookup.exenslookup myip.opendns.com resolver1.opendns.com3⤵PID:1680
-
-
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\9CD0.bi1"2⤵PID:4844
-
-
C:\Windows\syswow64\cmd.exe"C:\Windows\syswow64\cmd.exe" /C pause dll mail, ,2⤵
- System Location Discovery: System Language Discovery
PID:4208
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3888
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3488
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3868
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
122B
MD54e722b4828cea8a135eb7a2bfd92ab01
SHA18e1abee672a878fd9c1d33e242502205d9b2da55
SHA256c4d1feacbfb9ecd1a24e9b6d3e51fc7e9797da543d319f43ff0917db4c1e5e02
SHA51288c0d6b07d45f906164b2c1178a938ffb56c4fa7288853a02f460339bca026fa58b26a37f52ea846bc205e1828f12f0361d1b0425a1106c8b1a947856d4ee4e4
-
Filesize
761KB
MD5daacc7852627bd0e71b8e3d2a4a6543b
SHA1f47462d2b9d2b375684f98f011e399c25fe2e7dd
SHA25604d6963ab02c1f483cb9ff7af68c15456740099de5dd84dc68a77e9511772129
SHA5124c6fe5679e123443c3ec19094683ba834dbec0515b56bcde43c33d423db2684b108d6f9c457c9c10daa4765054c7d8bdc163b59a2c75464c42d7bcb6a18b2cd8