Analysis
-
max time kernel
140s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-12-2024 10:57
Static task
static1
Behavioral task
behavioral1
Sample
4a9101eedac349f9363fa76025195945ec79c6c6.dll
Resource
win7-20241023-en
General
-
Target
4a9101eedac349f9363fa76025195945ec79c6c6.dll
-
Size
348KB
-
MD5
2ffb89e36cccc8955c9da3f8e4c618f5
-
SHA1
4a9101eedac349f9363fa76025195945ec79c6c6
-
SHA256
4c1521c42afc6a16bccfcce47ddaaad622c63de601a7d2395c64cf00e783fea3
-
SHA512
baa971f8941e84ebb57b84ac0caeab225051a7284f6c74ddc37506491d65aa6b7472cebe97f21fb2817d0928ef4e28c62d5339e77e11b762b9301d4441f298d8
-
SSDEEP
6144:qYlGMLjIsJnsrYBiTkF1YqDiUrNegsi74kRadUo4Tv:qYl1vIsJn5BiYT7TYgsS4kRadUo4
Malware Config
Extracted
gozi
Extracted
gozi
2500
atl.bigbigpoppa.com
pop.urlovedstuff.com
-
build
250211
-
exe_type
loader
-
server_id
580
Signatures
-
Gozi family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4868 wrote to memory of 4828 4868 rundll32.exe 85 PID 4868 wrote to memory of 4828 4868 rundll32.exe 85 PID 4868 wrote to memory of 4828 4868 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a9101eedac349f9363fa76025195945ec79c6c6.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a9101eedac349f9363fa76025195945ec79c6c6.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4828
-