Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-12-2024 16:07
Static task
static1
Behavioral task
behavioral1
Sample
gye1.dll
Resource
win7-20240903-en
General
-
Target
gye1.dll
-
Size
632KB
-
MD5
e78b3e5f216b0fc21a528a1a4de83a39
-
SHA1
91d536c3667177f95b1713b563d54a1437bf27d5
-
SHA256
4eed17645ed997121a95459508067a23459d1e36f43d50f672f198e9d117cc2c
-
SHA512
b56548d765c9f0fcc0f65b4f283b406ce8b4f70c8b6b3a0845299075b8bc7ae1b60032cd7fb40f69ba855767e3304904c8ce413bbdb4cc4773df439256deadeb
-
SSDEEP
12288:WESrSs+4SAnLh9L3aO05K/FlW8jSGI2ixY0LLFsAi3:hSrJ4AnLPI5K/FlbOY0L
Malware Config
Extracted
gozi
Extracted
gozi
401
http://cdn-cloud.at
-
build
217107
-
dga_base_url
constitution.org/usdeclar.txt
-
dga_crc
0x4eb7d2ca
-
dga_season
10
-
dga_tlds
com
ru
org
-
exe_type
worker
-
server_id
12
Signatures
-
Gozi family
-
Unexpected DNS network traffic destination 3 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 208.67.222.222 Destination IP 208.67.222.222 Destination IP 208.67.222.222 -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\BOOTscui = "rundll32 \"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\BdeHxpps\\dxilerPS.dll\",DllRegisterServer" Explorer.EXE -
Suspicious use of SetThreadContext 7 IoCs
description pid Process procid_target PID 2032 set thread context of 4044 2032 regsvr32.exe 91 PID 4044 set thread context of 3532 4044 control.exe 56 PID 3532 set thread context of 4012 3532 Explorer.EXE 60 PID 3532 set thread context of 3716 3532 Explorer.EXE 62 PID 4044 set thread context of 1824 4044 control.exe 92 PID 3532 set thread context of 2668 3532 Explorer.EXE 76 PID 3532 set thread context of 2312 3532 Explorer.EXE 98 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2032 regsvr32.exe 2032 regsvr32.exe 3532 Explorer.EXE 3532 Explorer.EXE -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 2032 regsvr32.exe 4044 control.exe 3532 Explorer.EXE 3532 Explorer.EXE 4044 control.exe 3532 Explorer.EXE 3532 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeShutdownPrivilege 3532 Explorer.EXE Token: SeCreatePagefilePrivilege 3532 Explorer.EXE Token: SeShutdownPrivilege 4012 RuntimeBroker.exe Token: SeShutdownPrivilege 4012 RuntimeBroker.exe Token: SeShutdownPrivilege 3532 Explorer.EXE Token: SeCreatePagefilePrivilege 3532 Explorer.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3532 Explorer.EXE -
Suspicious use of WriteProcessMemory 37 IoCs
description pid Process procid_target PID 4880 wrote to memory of 2032 4880 regsvr32.exe 82 PID 4880 wrote to memory of 2032 4880 regsvr32.exe 82 PID 4880 wrote to memory of 2032 4880 regsvr32.exe 82 PID 2032 wrote to memory of 4044 2032 regsvr32.exe 91 PID 2032 wrote to memory of 4044 2032 regsvr32.exe 91 PID 2032 wrote to memory of 4044 2032 regsvr32.exe 91 PID 2032 wrote to memory of 4044 2032 regsvr32.exe 91 PID 2032 wrote to memory of 4044 2032 regsvr32.exe 91 PID 4044 wrote to memory of 3532 4044 control.exe 56 PID 4044 wrote to memory of 3532 4044 control.exe 56 PID 4044 wrote to memory of 3532 4044 control.exe 56 PID 3532 wrote to memory of 4012 3532 Explorer.EXE 60 PID 4044 wrote to memory of 1824 4044 control.exe 92 PID 4044 wrote to memory of 1824 4044 control.exe 92 PID 4044 wrote to memory of 1824 4044 control.exe 92 PID 3532 wrote to memory of 4012 3532 Explorer.EXE 60 PID 3532 wrote to memory of 4012 3532 Explorer.EXE 60 PID 3532 wrote to memory of 3716 3532 Explorer.EXE 62 PID 3532 wrote to memory of 3716 3532 Explorer.EXE 62 PID 3532 wrote to memory of 3716 3532 Explorer.EXE 62 PID 3532 wrote to memory of 2668 3532 Explorer.EXE 76 PID 4044 wrote to memory of 1824 4044 control.exe 92 PID 4044 wrote to memory of 1824 4044 control.exe 92 PID 3532 wrote to memory of 2668 3532 Explorer.EXE 76 PID 3532 wrote to memory of 2668 3532 Explorer.EXE 76 PID 3532 wrote to memory of 2812 3532 Explorer.EXE 93 PID 3532 wrote to memory of 2812 3532 Explorer.EXE 93 PID 2812 wrote to memory of 3588 2812 cmd.exe 95 PID 2812 wrote to memory of 3588 2812 cmd.exe 95 PID 3532 wrote to memory of 3732 3532 Explorer.EXE 96 PID 3532 wrote to memory of 3732 3532 Explorer.EXE 96 PID 3532 wrote to memory of 2312 3532 Explorer.EXE 98 PID 3532 wrote to memory of 2312 3532 Explorer.EXE 98 PID 3532 wrote to memory of 2312 3532 Explorer.EXE 98 PID 3532 wrote to memory of 2312 3532 Explorer.EXE 98 PID 3532 wrote to memory of 2312 3532 Explorer.EXE 98 PID 3532 wrote to memory of 2312 3532 Explorer.EXE 98
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3532 -
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\gye1.dll2⤵
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\gye1.dll3⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\system32\control.exeC:\Windows\system32\control.exe /?4⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL /?5⤵PID:1824
-
-
-
-
-
C:\Windows\system32\cmd.execmd /C "nslookup myip.opendns.com resolver1.opendns.com > C:\Users\Admin\AppData\Local\Temp\F451.bi1"2⤵
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\system32\nslookup.exenslookup myip.opendns.com resolver1.opendns.com3⤵PID:3588
-
-
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\F451.bi1"2⤵PID:3732
-
-
C:\Windows\syswow64\cmd.exe"C:\Windows\syswow64\cmd.exe" /C pause dll mail, ,2⤵
- System Location Discovery: System Language Discovery
PID:2312
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4012
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3716
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:2668
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
122B
MD54e722b4828cea8a135eb7a2bfd92ab01
SHA18e1abee672a878fd9c1d33e242502205d9b2da55
SHA256c4d1feacbfb9ecd1a24e9b6d3e51fc7e9797da543d319f43ff0917db4c1e5e02
SHA51288c0d6b07d45f906164b2c1178a938ffb56c4fa7288853a02f460339bca026fa58b26a37f52ea846bc205e1828f12f0361d1b0425a1106c8b1a947856d4ee4e4
-
Filesize
632KB
MD5e78b3e5f216b0fc21a528a1a4de83a39
SHA191d536c3667177f95b1713b563d54a1437bf27d5
SHA2564eed17645ed997121a95459508067a23459d1e36f43d50f672f198e9d117cc2c
SHA512b56548d765c9f0fcc0f65b4f283b406ce8b4f70c8b6b3a0845299075b8bc7ae1b60032cd7fb40f69ba855767e3304904c8ce413bbdb4cc4773df439256deadeb