Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
22-12-2024 15:07
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
5dbd95246d1c65df6f46863a305130f4d7def3e0f6d816ca6655e7f77c00e8d5.exe
Resource
win7-20241023-en
windows7-x64
5 signatures
120 seconds
General
-
Target
5dbd95246d1c65df6f46863a305130f4d7def3e0f6d816ca6655e7f77c00e8d5.exe
-
Size
256KB
-
MD5
c0cf8566d6cb501c5a833c3272074149
-
SHA1
7ada7e7ba7fa21601f8fa796a244ca0edfb38f83
-
SHA256
5dbd95246d1c65df6f46863a305130f4d7def3e0f6d816ca6655e7f77c00e8d5
-
SHA512
51ddd15cfe3cb25c813806c4497d99b14b63d8b73bd4e7a2ba4ec862a8b4b38e034f6a3b3caca61d8a16e2a0bc6ded505e1fb61658c60e5e95f4820067d99f0b
-
SSDEEP
6144:KVQeVilAqaAKPmKmjHixTAiXLddsrTUqV2yp:KVUpKWkTvhqTUqV7p
Malware Config
Extracted
Family
gozi
Extracted
Family
gozi
Botnet
1053
C2
127.0.0.1
Attributes
-
exe_type
worker
-
server_id
12
rsa_pubkey.plain
serpent.plain
Signatures
-
Gozi family
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\cmpblayx = "C:\\Users\\Admin\\AppData\\Roaming\\fdWSRESM\\comptdll.exe" 5dbd95246d1c65df6f46863a305130f4d7def3e0f6d816ca6655e7f77c00e8d5.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2312 5dbd95246d1c65df6f46863a305130f4d7def3e0f6d816ca6655e7f77c00e8d5.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2312 5dbd95246d1c65df6f46863a305130f4d7def3e0f6d816ca6655e7f77c00e8d5.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5dbd95246d1c65df6f46863a305130f4d7def3e0f6d816ca6655e7f77c00e8d5.exe"C:\Users\Admin\AppData\Local\Temp\5dbd95246d1c65df6f46863a305130f4d7def3e0f6d816ca6655e7f77c00e8d5.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of UnmapMainImage
PID:2312