Analysis

  • max time kernel
    150s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-12-2024 20:35

General

  • Target

    27b34893f16a8d49650621dd320468abc3050a2d7c49144428fb7da9d07c486a.exe

  • Size

    516KB

  • MD5

    c5be10b6e6fb9f60cfbbd5cee5648f9c

  • SHA1

    90fb886f0dee7f7341092ef77cc42195df3dfeea

  • SHA256

    27b34893f16a8d49650621dd320468abc3050a2d7c49144428fb7da9d07c486a

  • SHA512

    10a1928866297461bc26ae937cba157372408015a14823b049a526e81e2281a5e78821a2e383c2c65086965d76eaffc90e7acbe61a2009dd2afa9d6d65736731

  • SSDEEP

    6144:d/urFQUUZM24vXpEvtZNXEcORzKld9830UAhqzaX3pGMKLYjjeZ4GpeV4Lz5GbR4:+LUZM9purdK0q+IYxj4o9Q7OGeNUFx

Malware Config

Signatures

  • Gozi

    Gozi is a well-known and widely distributed banking trojan.

  • Gozi family
  • Deletes itself 1 IoCs
  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
  • Network Share Discovery 1 TTPs

    Attempt to gather information on host network.

  • Enumerates processes with tasklist 1 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 2 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Discovers systems in the same network 1 TTPs 1 IoCs
  • Gathers system information 1 TTPs 1 IoCs

    Runs systeminfo.exe.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Deletes itself
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3432
    • C:\Users\Admin\AppData\Local\Temp\27b34893f16a8d49650621dd320468abc3050a2d7c49144428fb7da9d07c486a.exe
      "C:\Users\Admin\AppData\Local\Temp\27b34893f16a8d49650621dd320468abc3050a2d7c49144428fb7da9d07c486a.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4144
      • C:\Users\Admin\AppData\Local\Temp\27b34893f16a8d49650621dd320468abc3050a2d7c49144428fb7da9d07c486a.exe
        "C:\Users\Admin\AppData\Local\Temp\27b34893f16a8d49650621dd320468abc3050a2d7c49144428fb7da9d07c486a.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Checks SCSI registry key(s)
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:3412
        • C:\Windows\explorer.exe
          C:\Windows\explorer.exe
          4⤵
          • Suspicious use of SetThreadContext
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          PID:5112
    • C:\Windows\system32\cmd.exe
      cmd /C "systeminfo.exe > C:\Users\Admin\AppData\Local\Temp\E55B.bin1"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3652
      • C:\Windows\system32\systeminfo.exe
        systeminfo.exe
        3⤵
        • Gathers system information
        PID:664
    • C:\Windows\explorer.exe
      "C:\Windows\explorer.exe" -Function
      2⤵
      • Accesses Microsoft Outlook accounts
      • Accesses Microsoft Outlook profiles
      • outlook_office_path
      • outlook_win_path
      PID:392
    • C:\Windows\system32\cmd.exe
      cmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\E55B.bin1"
      2⤵
        PID:4996
      • C:\Windows\system32\cmd.exe
        cmd /C "net view >> C:\Users\Admin\AppData\Local\Temp\E55B.bin1"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2896
        • C:\Windows\system32\net.exe
          net view
          3⤵
          • Discovers systems in the same network
          PID:3940
      • C:\Windows\system32\cmd.exe
        cmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\E55B.bin1"
        2⤵
          PID:5064
        • C:\Windows\system32\cmd.exe
          cmd /C "nslookup 127.0.0.1 >> C:\Users\Admin\AppData\Local\Temp\E55B.bin1"
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:512
          • C:\Windows\system32\nslookup.exe
            nslookup 127.0.0.1
            3⤵
              PID:876
          • C:\Windows\system32\cmd.exe
            cmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\E55B.bin1"
            2⤵
              PID:1156
            • C:\Windows\system32\cmd.exe
              cmd /C "tasklist.exe /SVC >> C:\Users\Admin\AppData\Local\Temp\E55B.bin1"
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:4440
              • C:\Windows\system32\tasklist.exe
                tasklist.exe /SVC
                3⤵
                • Enumerates processes with tasklist
                • Suspicious use of AdjustPrivilegeToken
                PID:5056
            • C:\Windows\system32\cmd.exe
              cmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\E55B.bin1"
              2⤵
                PID:4876
              • C:\Windows\system32\cmd.exe
                cmd /C "driverquery.exe >> C:\Users\Admin\AppData\Local\Temp\E55B.bin1"
                2⤵
                • Suspicious use of WriteProcessMemory
                PID:2560
                • C:\Windows\system32\driverquery.exe
                  driverquery.exe
                  3⤵
                    PID:1596
                • C:\Windows\system32\cmd.exe
                  cmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\E55B.bin1"
                  2⤵
                    PID:4952
                  • C:\Windows\system32\cmd.exe
                    cmd /C "reg.exe query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall" /s >> C:\Users\Admin\AppData\Local\Temp\E55B.bin1"
                    2⤵
                    • Suspicious use of WriteProcessMemory
                    PID:428
                    • C:\Windows\system32\reg.exe
                      reg.exe query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall" /s
                      3⤵
                        PID:3884
                    • C:\Windows\system32\cmd.exe
                      cmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\E55B.bin1"
                      2⤵
                        PID:2192
                      • C:\Windows\system32\cmd.exe
                        cmd /C "reg.exe query "HKLM\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall" /s >> C:\Users\Admin\AppData\Local\Temp\E55B.bin1"
                        2⤵
                        • Suspicious use of WriteProcessMemory
                        PID:1500
                        • C:\Windows\system32\reg.exe
                          reg.exe query "HKLM\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall" /s
                          3⤵
                            PID:1216
                        • C:\Windows\system32\cmd.exe
                          cmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\E55B.bin1"
                          2⤵
                            PID:4368
                          • C:\Windows\system32\cmd.exe
                            cmd /U /C "type C:\Users\Admin\AppData\Local\Temp\E55B.bin1 > C:\Users\Admin\AppData\Local\Temp\E55B.bin & del C:\Users\Admin\AppData\Local\Temp\E55B.bin1"
                            2⤵
                              PID:4496
                            • C:\Windows\system32\makecab.exe
                              makecab.exe /F "C:\Users\Admin\AppData\Local\Temp\1B78.bin"
                              2⤵
                                PID:1540

                            Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\AppData\Local\Temp\1B78.bin

                              Filesize

                              153B

                              MD5

                              1db8f3477ae6858fd8d5849bc6268b82

                              SHA1

                              3188b6e323f9cda07d948fbb3bc65f95c9f1d907

                              SHA256

                              575549b4b41f4a34b43978c6ec94060d792afdf7345e1bd8a0f478615bc6286f

                              SHA512

                              488c15e568764673702589b385de3ed1ad47df7b8cb0c8e9a4bf2aeacfae9ee7f941be298746e07d7f14dbeb3b0c24f92ba52d6a363406ba5dbe0453a850e43c

                            • C:\Users\Admin\AppData\Local\Temp\241C.bin

                              Filesize

                              14KB

                              MD5

                              0c45c6f5a328c9929371f086b79a88d9

                              SHA1

                              a2cbf7f0d149e5a3105205d40ff3bde7f1f4ed2b

                              SHA256

                              6e50c260364acf5e1758a154b938ee12ffc257ad96a01171f133b13211557316

                              SHA512

                              fcf09a752ad051cfd1c2291c68af4e3eb3974be4deedbafdfa54857e84330ac3527b3dd4a761cd380a977e4951b8dd21330f8e5f4ea3c10a37ab270081ee0281

                            • C:\Users\Admin\AppData\Local\Temp\E55B.bin1

                              Filesize

                              2KB

                              MD5

                              8153f8a511bef401fa7fc36af9b6b02c

                              SHA1

                              74e4e8932c8593201c013662104f7a7caebce248

                              SHA256

                              e90ca89f0b5c9fbd564f4d2f73d87ce1c01b4af6247164d93948192cbdd9f971

                              SHA512

                              635ef67ee8fb9a99a7ed55b322b073e702fac558f8ca9e24ed0fcde9d069011f1d720f0c042dba9ee4778329b95ffdae3a65ad53e6eb77e3eaa01810913a90dc

                            • C:\Users\Admin\AppData\Local\Temp\E55B.bin1

                              Filesize

                              2KB

                              MD5

                              31a5b6fdc147926de2af41978f11a894

                              SHA1

                              5edbfb6b6925aca2fcbb2a1a258ac83cc4fc1596

                              SHA256

                              dc5deefbc7c1970e22a4260d74698e73c7379c0f261992b4a454cf26554985bf

                              SHA512

                              cc0f39f4c3485c62e9ce6b5b0eaa7e0acd4dca22729751bde6bd6452150d5c61d6d82bb6c23e3a7dfb7f3b989eeea80c8e453e7d617574694135f5702a2d7014

                            • C:\Users\Admin\AppData\Local\Temp\E55B.bin1

                              Filesize

                              2KB

                              MD5

                              62c1b5c31370f4a2aa5e5770a7eb5bc5

                              SHA1

                              a637d62b6357d7f31fcfe748b6cca04beb90c8f4

                              SHA256

                              bd58981dd7f54941d42ea5ad43f1a9039bd67a5f4d32485259f8edd390ca55dd

                              SHA512

                              f5fcea42509137f295b4c09e845d5432463ce85ba1e2d5d0b80957559dbbcfe3d25977a8bdd4c560bf2a1a08bfb263ea855722fde5ef2d4511597a742e3620bb

                            • C:\Users\Admin\AppData\Local\Temp\E55B.bin1

                              Filesize

                              9KB

                              MD5

                              335293190b641a061acdfa239cf14612

                              SHA1

                              c1d7a85c71dc8feedbdee0606523330fda631a1f

                              SHA256

                              12eeae5467def54da070bfc3fa11f03941bf20507c80ab918b8dab9cc270f02e

                              SHA512

                              f2aacc8b0151dcfbbad30c7b109002e452ec4943aec0d577e604b79c84b17a3bd3ec4bee3eb2eda4a61ae9d4f8a2e5dcb7fc2832be0d78084bf67755f8ded2bc

                            • C:\Users\Admin\AppData\Local\Temp\E55B.bin1

                              Filesize

                              35KB

                              MD5

                              5091db87f409077862485e0c9f157376

                              SHA1

                              564a92d884fa78bef092d52e55a20f4eff4d5886

                              SHA256

                              d251e64694c070a291d6c6b6ab3e0be04bf88dd29e2ce18c639c7c35c8bb233e

                              SHA512

                              621397f584404c6c31ba58f5290a8b37e214e4c6eaab66031bd0a47acf140bf46ab7382043faa4768f0e7070542e7fbc3e1c9c9caf774aaf7d2bdff2f1b5659d

                            • C:\Users\Admin\AppData\Local\Temp\E55B.bin1

                              Filesize

                              79KB

                              MD5

                              fc04bd4caa58ed3029972e707d083d14

                              SHA1

                              4fd9a1452f99e65f0beb7241d75f415f9cd05082

                              SHA256

                              e94c21aa9662b04918b16e337e6ce362395d0a70f68ca191d7fb5fac5edfe354

                              SHA512

                              d751ce8d6be059cbbf3863ea0a891e9713181dfe892ff36d5736ba5c60d181eb9eed497e51e3e8011e231590a7f89dc662b568925c46c70835c1208c802999ac

                            • C:\Users\Admin\AppData\Local\Temp\E55B.bin1

                              Filesize

                              79KB

                              MD5

                              778fbdc82f5b4f46a5d67613a1fa26c1

                              SHA1

                              fb16f80ecc366d0168d9310947c611868a94f6d0

                              SHA256

                              0aa7f6f67b934a6c9071bdbc0b271507589ecd6609d06324b1038e441eaf3276

                              SHA512

                              c3f56186ee71943d666f870109388bb5f26a4222b7dea3830ed8089083300cabebd9375025648fe4b97fa59c65ee23f4b3de776b986d043545f108d3d017c91e

                            • C:\Users\Admin\AppData\Local\Temp\E55B.bin1

                              Filesize

                              111KB

                              MD5

                              fe8ae0dd2fe6aaf53cc785189b3f6017

                              SHA1

                              47644d35bb5f3225fd79e24ff7580cde455189df

                              SHA256

                              d8294f8635d36f18e550a91268bfcbf69e3f82dadeba5c16f239842fb8ac8c3c

                              SHA512

                              7196295d988393a0caf1365e729b0686056db406bf6ae09a025fb4b9abe8dea4b5115ae3daa1103f4d0e07b42f5f7493c86dc0c18c337020a3b28d383b912c6f

                            • C:\Users\Admin\AppData\Local\Temp\setup.inf

                              Filesize

                              930B

                              MD5

                              a8dba4ed72e2d57947dee0d9795af3c9

                              SHA1

                              f80a61bd825d9d6a5b56483176f8827ef2afc495

                              SHA256

                              0037f46865d27d17d340ea1ac28f2598167f5b7acc1a84283167302887acbcd8

                              SHA512

                              00b310c1d619540b22cc99b17ad79b01dfee4ca26cd6c3957635fac03699a38e0c9f8461fa8f3cd4c279240b6d573c13afe1fa7b0374ac82b61b73ac420fad04

                            • C:\Users\Admin\AppData\Local\Temp\setup.rpt

                              Filesize

                              283B

                              MD5

                              47cdb690f8b62d0f06ebe8ce0d0649c3

                              SHA1

                              d3606f85e6448011a81343059a12086002a25367

                              SHA256

                              0c262d35fde184b7b3046aba7b44959377d8dca62743d8dc37ca4adb7dacefdf

                              SHA512

                              e4ca48ad581ea23500bb384073b658835e068c1e0c93c8966045bef7cc700e13eec0ced2a995c3ca51a4d3b3651f074590ae2dc47e92748dab5161ebec52bbbf

                            • memory/392-40-0x0000000002630000-0x0000000002767000-memory.dmp

                              Filesize

                              1.2MB

                            • memory/392-46-0x0000000002630000-0x0000000002767000-memory.dmp

                              Filesize

                              1.2MB

                            • memory/392-34-0x0000000002630000-0x0000000002767000-memory.dmp

                              Filesize

                              1.2MB

                            • memory/3412-10-0x0000000000400000-0x0000000000473000-memory.dmp

                              Filesize

                              460KB

                            • memory/3412-5-0x0000000000400000-0x0000000000473000-memory.dmp

                              Filesize

                              460KB

                            • memory/3412-4-0x0000000000400000-0x0000000000473000-memory.dmp

                              Filesize

                              460KB

                            • memory/3412-2-0x0000000000400000-0x0000000000473000-memory.dmp

                              Filesize

                              460KB

                            • memory/3432-25-0x0000000007B10000-0x0000000007C47000-memory.dmp

                              Filesize

                              1.2MB

                            • memory/3432-28-0x0000000007B10000-0x0000000007C47000-memory.dmp

                              Filesize

                              1.2MB

                            • memory/3432-31-0x0000000007B10000-0x0000000007C47000-memory.dmp

                              Filesize

                              1.2MB

                            • memory/3432-20-0x0000000007B10000-0x0000000007C47000-memory.dmp

                              Filesize

                              1.2MB

                            • memory/3432-33-0x0000000007B10000-0x0000000007C47000-memory.dmp

                              Filesize

                              1.2MB

                            • memory/3432-43-0x0000000007B10000-0x0000000007C47000-memory.dmp

                              Filesize

                              1.2MB

                            • memory/3432-44-0x0000000007B10000-0x0000000007C47000-memory.dmp

                              Filesize

                              1.2MB

                            • memory/3432-104-0x0000000007B10000-0x0000000007C47000-memory.dmp

                              Filesize

                              1.2MB

                            • memory/3432-24-0x0000000007B10000-0x0000000007C47000-memory.dmp

                              Filesize

                              1.2MB

                            • memory/3432-26-0x0000000007B10000-0x0000000007C47000-memory.dmp

                              Filesize

                              1.2MB

                            • memory/3432-27-0x0000000007B10000-0x0000000007C47000-memory.dmp

                              Filesize

                              1.2MB

                            • memory/3432-39-0x0000000007B10000-0x0000000007C47000-memory.dmp

                              Filesize

                              1.2MB

                            • memory/3432-29-0x0000000007B10000-0x0000000007C47000-memory.dmp

                              Filesize

                              1.2MB

                            • memory/3432-30-0x0000000007B10000-0x0000000007C47000-memory.dmp

                              Filesize

                              1.2MB

                            • memory/3432-16-0x0000000007B10000-0x0000000007C47000-memory.dmp

                              Filesize

                              1.2MB

                            • memory/3432-23-0x0000000000160000-0x0000000000161000-memory.dmp

                              Filesize

                              4KB

                            • memory/4144-1-0x0000000000650000-0x0000000000651000-memory.dmp

                              Filesize

                              4KB

                            • memory/5112-15-0x0000000002920000-0x0000000002A57000-memory.dmp

                              Filesize

                              1.2MB

                            • memory/5112-7-0x0000000000C00000-0x0000000000C01000-memory.dmp

                              Filesize

                              4KB

                            • memory/5112-11-0x0000000002920000-0x0000000002A57000-memory.dmp

                              Filesize

                              1.2MB

                            • memory/5112-22-0x0000000002920000-0x0000000002A57000-memory.dmp

                              Filesize

                              1.2MB