Analysis
-
max time kernel
141s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-12-2024 08:42
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
kybe3.dll
Resource
win7-20240903-en
windows7-x64
4 signatures
150 seconds
General
-
Target
kybe3.dll
-
Size
563KB
-
MD5
c7eeecef364f35c1b3f56b3136d5607f
-
SHA1
17b1f56ce5ffed92d7939315ebc1818157f02506
-
SHA256
f2059f3054bee3cb57c666b3994c0cf3aa61c981e2d70a798b5f1f43a189f20a
-
SHA512
31da7d5d631dd7809e252374dded9ab47fe17875ae53a8680e1aa433dda65cbe4688f6a3d1afaca67dcb30756c988476381444e1c6e16090bb4b7278a52b6f34
-
SSDEEP
12288:qk4mO6uu/lzsGqjV6L3hKkXHqb2Nqdi3/BkldTdlX8A1:qk4Z6uutAGMVQRLX62wiJkldTP8A
Malware Config
Extracted
Family
gozi
Extracted
Family
gozi
Botnet
5500
C2
windows.update.com
shop.microsoft.com
fraloopilo.xyz
paladingrazz.xyz
Attributes
-
base_path
/manifest/
-
build
250177
-
dga_season
10
-
exe_type
loader
-
extension
.cnx
-
server_id
12
rsa_pubkey.plain
serpent.plain
Signatures
-
Gozi family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1964 wrote to memory of 2664 1964 regsvr32.exe 30 PID 1964 wrote to memory of 2664 1964 regsvr32.exe 30 PID 1964 wrote to memory of 2664 1964 regsvr32.exe 30 PID 1964 wrote to memory of 2664 1964 regsvr32.exe 30 PID 1964 wrote to memory of 2664 1964 regsvr32.exe 30 PID 1964 wrote to memory of 2664 1964 regsvr32.exe 30 PID 1964 wrote to memory of 2664 1964 regsvr32.exe 30