Analysis
-
max time kernel
140s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
21-12-2024 23:13
Static task
static1
Behavioral task
behavioral1
Sample
3b56b7298c366a323d28658a455abf0d4e78fa197a43ce13bedab05f26901d34.dll
Resource
win7-20241023-en
General
-
Target
3b56b7298c366a323d28658a455abf0d4e78fa197a43ce13bedab05f26901d34.dll
-
Size
821KB
-
MD5
50a299d1e92d9205e123404c8e05904d
-
SHA1
c188272ab757dbbf14e74781fc90fcefe4aeb615
-
SHA256
3b56b7298c366a323d28658a455abf0d4e78fa197a43ce13bedab05f26901d34
-
SHA512
ec30f36d70ddbb6ba4aaccb3342e0a0ffbd586d2784370500a94e33aa650d1c56d3712ffc3a9e15a0558194ce26d1b76d9f2a8953220684bef634e57f4579df1
-
SSDEEP
12288:mzCoYRvNZrA8Res/TPUOjUUGcqcoWEx9kMGUS6vOV5y4gnuD5wtqqB7ol:VdNZr5RLL1AZ/clUnHvk5hgU
Malware Config
Extracted
gozi
Extracted
gozi
8877
outlook.com/login
gmail.com
worunekulo.club
horunekulo.website
-
base_path
/greed/
-
build
250196
-
dga_season
10
-
exe_type
loader
-
extension
.gfk
-
server_id
12
Signatures
-
Gozi family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2612 wrote to memory of 2764 2612 rundll32.exe 30 PID 2612 wrote to memory of 2764 2612 rundll32.exe 30 PID 2612 wrote to memory of 2764 2612 rundll32.exe 30 PID 2612 wrote to memory of 2764 2612 rundll32.exe 30 PID 2612 wrote to memory of 2764 2612 rundll32.exe 30 PID 2612 wrote to memory of 2764 2612 rundll32.exe 30 PID 2612 wrote to memory of 2764 2612 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3b56b7298c366a323d28658a455abf0d4e78fa197a43ce13bedab05f26901d34.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3b56b7298c366a323d28658a455abf0d4e78fa197a43ce13bedab05f26901d34.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2764
-