Analysis
-
max time kernel
140s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
24-12-2024 11:21
Static task
static1
Behavioral task
behavioral1
Sample
8df914f790a6e5eb07042cce36ea9a23e23cdc1610d930f306f9ef55b6d8a2c5.dll
Resource
win7-20240729-en
General
-
Target
8df914f790a6e5eb07042cce36ea9a23e23cdc1610d930f306f9ef55b6d8a2c5.dll
-
Size
286KB
-
MD5
9df5fcca1aadec6333301aca7a13c481
-
SHA1
f3445c636e0a702eff7782b9e8eeb4ca84f842ff
-
SHA256
8df914f790a6e5eb07042cce36ea9a23e23cdc1610d930f306f9ef55b6d8a2c5
-
SHA512
c1bb8d9ce6f014cc6c1dd68e767c03bbc4d56875f792d2f994f5740ad2d23ab75d3caa9b9d9778fab903685db4f87c1b999756e5b3a971dec1a405cad5ac17ad
-
SSDEEP
6144:SExImdn3y5LQv+0az3d1jDbj950ylG+OhZHoTV43:SExTn34Qv+rz3/jDbj950ylG+AZH+V43
Malware Config
Extracted
gozi
Extracted
gozi
7251
web.vortex.data.microsoft.com
ocsp.sca1b.amazontrust.com
nerowins.com
-
build
250177
-
dns_servers
107.174.86.134
107.175.127.22
-
exe_type
loader
-
server_id
12
Signatures
-
Gozi family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2488 wrote to memory of 2108 2488 regsvr32.exe 31 PID 2488 wrote to memory of 2108 2488 regsvr32.exe 31 PID 2488 wrote to memory of 2108 2488 regsvr32.exe 31 PID 2488 wrote to memory of 2108 2488 regsvr32.exe 31 PID 2488 wrote to memory of 2108 2488 regsvr32.exe 31 PID 2488 wrote to memory of 2108 2488 regsvr32.exe 31 PID 2488 wrote to memory of 2108 2488 regsvr32.exe 31
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\8df914f790a6e5eb07042cce36ea9a23e23cdc1610d930f306f9ef55b6d8a2c5.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\8df914f790a6e5eb07042cce36ea9a23e23cdc1610d930f306f9ef55b6d8a2c5.dll2⤵
- System Location Discovery: System Language Discovery
PID:2108
-