Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-12-2024 17:09
Behavioral task
behavioral1
Sample
infectedmars2021.doc
Resource
win7-20240708-en
General
-
Target
infectedmars2021.doc
-
Size
4.3MB
-
MD5
0c8555a71a055a1e553ffe8865cb3ea6
-
SHA1
a8e77218bdb915adec62580f95d3a8a679b18215
-
SHA256
2a7811607023a04ca559e46d7106588f4542af11352972ff84d28b49e59d4507
-
SHA512
ebd784a06b35e8affee01c16f599bdb99336ee5d720e540a56b550579b201d0a04d030cc412b9a120158e5c2ec5bb8e2c5b71fcc810c117f8c290377c87973a9
-
SSDEEP
49152:oVUg5AfUb76jl/PTV0maWj4qO4eiJbFFYRKFZW+sYzbtqrDpee26:o6gF2jxPpbaWjRnuv
Malware Config
Extracted
gozi
Extracted
gozi
5513
greenwoodgrace.website
-
base_path
/manifest/
-
build
250187
-
dga_season
10
-
exe_type
loader
-
extension
.cnx
-
server_id
12
Signatures
-
Gozi family
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE is not expected to spawn this process 3532 3096 cmd.exe 80 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 1684 regsvr32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 508 PING.EXE 4120 PING.EXE -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings cmd.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 508 PING.EXE 4120 PING.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 3096 WINWORD.EXE 3096 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 3096 WINWORD.EXE 3096 WINWORD.EXE 3096 WINWORD.EXE 3096 WINWORD.EXE 3096 WINWORD.EXE 3096 WINWORD.EXE 3096 WINWORD.EXE -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 3096 wrote to memory of 3532 3096 WINWORD.EXE 85 PID 3096 wrote to memory of 3532 3096 WINWORD.EXE 85 PID 3532 wrote to memory of 2232 3532 cmd.exe 93 PID 3532 wrote to memory of 2232 3532 cmd.exe 93 PID 3532 wrote to memory of 508 3532 cmd.exe 94 PID 3532 wrote to memory of 508 3532 cmd.exe 94 PID 3532 wrote to memory of 4120 3532 cmd.exe 95 PID 3532 wrote to memory of 4120 3532 cmd.exe 95 PID 3532 wrote to memory of 4596 3532 cmd.exe 96 PID 3532 wrote to memory of 4596 3532 cmd.exe 96 PID 4596 wrote to memory of 1684 4596 regsvr32.exe 97 PID 4596 wrote to memory of 1684 4596 regsvr32.exe 97 PID 4596 wrote to memory of 1684 4596 regsvr32.exe 97
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\infectedmars2021.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3096 -
C:\Windows\SYSTEM32\cmd.execmd /c c:\programdata\Milne.CMD2⤵
- Process spawned unexpected child process
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3532 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\brainw\Audiobook.vbs"3⤵PID:2232
-
-
C:\Windows\system32\PING.EXEping w 5000 ya.fr3⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:508
-
-
C:\Windows\system32\PING.EXEping w 5000 htr-oi.io3⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4120
-
-
C:\Windows\system32\regsvr32.exeregsvr32 -s c:\brainw\name1.dll3⤵
- Suspicious use of WriteProcessMemory
PID:4596 -
C:\Windows\SysWOW64\regsvr32.exe-s c:\brainw\name1.dll4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1684
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
262KB
MD551d32ee5bc7ab811041f799652d26e04
SHA1412193006aa3ef19e0a57e16acf86b830993024a
SHA2566230814bf5b2d554397580613e20681752240ab87fd354ececf188c1eabe0e97
SHA5125fc5d889b0c8e5ef464b76f0c4c9e61bda59b2d1205ac9417cc74d6e9f989fb73d78b4eb3044a1a1e1f2c00ce1ca1bd6d4d07eeadc4108c7b124867711c31810
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize2KB
MD56504f6c52b57452db74d21a5dcb1fc2e
SHA17900c671f5498fe43531cc140896d37c95f22d83
SHA256e99205bbec68a2652077e91fab46cdfc6e423e69134f361b1eb89cde3a00cccd
SHA512f12e4933926df24b66b34d128e4ec73ee23516927f28cba62a7431909a2978f771668ec704268f2ea14b53638cd9e15f5f6b94f39f274c73c51f20d58a2d580d
-
Filesize
1.1MB
MD572c67436a89961707eb873fba9a0371b
SHA1c7e18ca8b054e3d7af0d189224a370258e621be1
SHA256cadd5665efe629e813c90a10aa4aadd047f056402be591901573f0bf5ebdaa59
SHA51216851728c04cea0252932d2aea4f61df3d5cc976a65fef1950d8b7f6cf34cd645e8ad429cc2b1b966789a4774b72f09c91c02010224548c689dca3522ad7c783
-
Filesize
586KB
MD545fce7fad17e37916456694865b10bf4
SHA1dc2e64142432586caef9205f959181fb3d26c301
SHA2569b46b746e0838a160ceaa31bcde6d7eda49c3a065b7f50a3a29577ab6fda1023
SHA512132945f1d638dc042d5d37056a3c6faba581d08dda46c02320b693caf3160a3fafdde2c31deb6ed85e6f14113a55dbdb6b53cadf0b316b6b8ecd87272c14a231
-
Filesize
1.1MB
MD532a99b29a0e80abfc2bbfe8a785324a1
SHA1759fac2f1d0f63d5ff7c8ef54ea3c8bcb9243856
SHA2569f2d02ea06d235ef599acaede041bbb576731bb273045296caf395a2765d786c
SHA512d580790cbccc11a61a4ffac75c72c56653177e64faefea8ab1a175bf8760d0757cf18929d244342d93448734768d8949b3d2d897660f2b0b3cbcd7fd6ab89774