Analysis

  • max time kernel
    150s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-12-2024 20:38

General

  • Target

    27b34893f16a8d49650621dd320468abc3050a2d7c49144428fb7da9d07c486a.exe

  • Size

    516KB

  • MD5

    c5be10b6e6fb9f60cfbbd5cee5648f9c

  • SHA1

    90fb886f0dee7f7341092ef77cc42195df3dfeea

  • SHA256

    27b34893f16a8d49650621dd320468abc3050a2d7c49144428fb7da9d07c486a

  • SHA512

    10a1928866297461bc26ae937cba157372408015a14823b049a526e81e2281a5e78821a2e383c2c65086965d76eaffc90e7acbe61a2009dd2afa9d6d65736731

  • SSDEEP

    6144:d/urFQUUZM24vXpEvtZNXEcORzKld9830UAhqzaX3pGMKLYjjeZ4GpeV4Lz5GbR4:+LUZM9purdK0q+IYxj4o9Q7OGeNUFx

Malware Config

Signatures

  • Gozi

    Gozi is a well-known and widely distributed banking trojan.

  • Gozi family
  • Deletes itself 1 IoCs
  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
  • Network Share Discovery 1 TTPs

    Attempt to gather information on host network.

  • Enumerates processes with tasklist 1 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 2 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Discovers systems in the same network 1 TTPs 1 IoCs
  • Gathers system information 1 TTPs 1 IoCs

    Runs systeminfo.exe.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Deletes itself
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3540
    • C:\Users\Admin\AppData\Local\Temp\27b34893f16a8d49650621dd320468abc3050a2d7c49144428fb7da9d07c486a.exe
      "C:\Users\Admin\AppData\Local\Temp\27b34893f16a8d49650621dd320468abc3050a2d7c49144428fb7da9d07c486a.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2444
      • C:\Users\Admin\AppData\Local\Temp\27b34893f16a8d49650621dd320468abc3050a2d7c49144428fb7da9d07c486a.exe
        "C:\Users\Admin\AppData\Local\Temp\27b34893f16a8d49650621dd320468abc3050a2d7c49144428fb7da9d07c486a.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Checks SCSI registry key(s)
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:796
        • C:\Windows\explorer.exe
          C:\Windows\explorer.exe
          4⤵
          • Suspicious use of SetThreadContext
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          PID:4524
    • C:\Windows\system32\cmd.exe
      cmd /C "systeminfo.exe > C:\Users\Admin\AppData\Local\Temp\F75C.bin1"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2528
      • C:\Windows\system32\systeminfo.exe
        systeminfo.exe
        3⤵
        • Gathers system information
        PID:4840
    • C:\Windows\explorer.exe
      "C:\Windows\explorer.exe" -Function
      2⤵
      • Accesses Microsoft Outlook accounts
      • Accesses Microsoft Outlook profiles
      • outlook_office_path
      • outlook_win_path
      PID:3532
    • C:\Windows\system32\cmd.exe
      cmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\F75C.bin1"
      2⤵
        PID:220
      • C:\Windows\system32\cmd.exe
        cmd /C "net view >> C:\Users\Admin\AppData\Local\Temp\F75C.bin1"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:4896
        • C:\Windows\system32\net.exe
          net view
          3⤵
          • Discovers systems in the same network
          PID:4488
      • C:\Windows\system32\cmd.exe
        cmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\F75C.bin1"
        2⤵
          PID:5048
        • C:\Windows\system32\cmd.exe
          cmd /C "nslookup 127.0.0.1 >> C:\Users\Admin\AppData\Local\Temp\F75C.bin1"
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:2632
          • C:\Windows\system32\nslookup.exe
            nslookup 127.0.0.1
            3⤵
              PID:1016
          • C:\Windows\system32\cmd.exe
            cmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\F75C.bin1"
            2⤵
              PID:4148
            • C:\Windows\system32\cmd.exe
              cmd /C "tasklist.exe /SVC >> C:\Users\Admin\AppData\Local\Temp\F75C.bin1"
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:1720
              • C:\Windows\system32\tasklist.exe
                tasklist.exe /SVC
                3⤵
                • Enumerates processes with tasklist
                • Suspicious use of AdjustPrivilegeToken
                PID:3696
            • C:\Windows\system32\cmd.exe
              cmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\F75C.bin1"
              2⤵
                PID:1628
              • C:\Windows\system32\cmd.exe
                cmd /C "driverquery.exe >> C:\Users\Admin\AppData\Local\Temp\F75C.bin1"
                2⤵
                • Suspicious use of WriteProcessMemory
                PID:4856
                • C:\Windows\system32\driverquery.exe
                  driverquery.exe
                  3⤵
                    PID:1472
                • C:\Windows\system32\cmd.exe
                  cmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\F75C.bin1"
                  2⤵
                    PID:4780
                  • C:\Windows\system32\cmd.exe
                    cmd /C "reg.exe query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall" /s >> C:\Users\Admin\AppData\Local\Temp\F75C.bin1"
                    2⤵
                    • Suspicious use of WriteProcessMemory
                    PID:2900
                    • C:\Windows\system32\reg.exe
                      reg.exe query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall" /s
                      3⤵
                        PID:452
                    • C:\Windows\system32\cmd.exe
                      cmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\F75C.bin1"
                      2⤵
                        PID:4112
                      • C:\Windows\system32\cmd.exe
                        cmd /C "reg.exe query "HKLM\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall" /s >> C:\Users\Admin\AppData\Local\Temp\F75C.bin1"
                        2⤵
                        • Suspicious use of WriteProcessMemory
                        PID:4424
                        • C:\Windows\system32\reg.exe
                          reg.exe query "HKLM\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall" /s
                          3⤵
                            PID:2044
                        • C:\Windows\system32\cmd.exe
                          cmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\F75C.bin1"
                          2⤵
                            PID:2556
                          • C:\Windows\system32\cmd.exe
                            cmd /U /C "type C:\Users\Admin\AppData\Local\Temp\F75C.bin1 > C:\Users\Admin\AppData\Local\Temp\F75C.bin & del C:\Users\Admin\AppData\Local\Temp\F75C.bin1"
                            2⤵
                              PID:3992
                            • C:\Windows\system32\makecab.exe
                              makecab.exe /F "C:\Users\Admin\AppData\Local\Temp\2C61.bin"
                              2⤵
                                PID:64

                            Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\AppData\Local\Temp\2C61.bin

                              Filesize

                              153B

                              MD5

                              285d748b3bb1d4af9848353dedb6c4c8

                              SHA1

                              455bed95722460ce3dd9091993c540b3c91dedc8

                              SHA256

                              916bdbca84469d2914fdbcd92397dd2033db506fccbaf2f945e55a8bffbd00f2

                              SHA512

                              c7885303c0cdd0e59745b590ea800065f8a02777e218caee2becfaac1d33ebaf1257ff8c327becb019691fb1dd42e9afbf0288442ce431f600c8e206a9915b7e

                            • C:\Users\Admin\AppData\Local\Temp\3505.bin

                              Filesize

                              14KB

                              MD5

                              e0586e824ee526801e223531654178a5

                              SHA1

                              559cb5a98e69ab69bbe28f2f2232b61b97e165f5

                              SHA256

                              6a7873546714b418624a758e7793d3b31be465f05d4f549f591fe26d759b66f1

                              SHA512

                              99e1e69250e5538910839dc10c15f71be8267ecda9ce156a7459236c82fac3839dfcd11717bc4775d14e77962408faa32f26402fc21176a66ba872cf1eadddf6

                            • C:\Users\Admin\AppData\Local\Temp\F75C.bin1

                              Filesize

                              2KB

                              MD5

                              dbd140aa4e611adc6a6ba99b9b1f0a32

                              SHA1

                              ac0aacb35b18bf587cc7633225ef1e8cb34d6666

                              SHA256

                              af70e6c3d49921e55e570441ed9f279f9cba7c44747b8e1946b27feb6d287920

                              SHA512

                              153d5cf75e886c78ed835eb4ea856b8175131e9d929d96b61beb16b71b806e01cd4a54e5ca5c025f016f899e821b71e42cce132dab109f76d5bb86e22729cbdf

                            • C:\Users\Admin\AppData\Local\Temp\F75C.bin1

                              Filesize

                              2KB

                              MD5

                              07c48c7e161de6fc6bf79a6610842009

                              SHA1

                              4ff48e494820c210da9cc690c138590e8abdd3b4

                              SHA256

                              275b6e7c16d959a82d2a668b6dade4c6c7ca5a070155d3b472982915bf6ebcf7

                              SHA512

                              a9e3535d303ca1097a3d887651c375dd62bbcf65174e2f9aa811fd694de3ad55ece4727eae4dde3996c002a504bd7e6c6d6addae388c893ca0d1bae848e5e4b3

                            • C:\Users\Admin\AppData\Local\Temp\F75C.bin1

                              Filesize

                              2KB

                              MD5

                              98ff0874c547c45d6a1b1a30ab1a9ff3

                              SHA1

                              c65eadedfc8dce8b648ed7b4cf41ef1c5b3308b7

                              SHA256

                              8e01c8d015096626f287b1870e5370047d86064b472b3ff5d446949e8d69be94

                              SHA512

                              fd7248c0fa4060325379cc045ae5dd7df37b3f731d97bb0dd1833dcd6552e3f3a025adedd539109bd2a82e33d25f65e1fa2e991dba33e4930ca29c23afdc0741

                            • C:\Users\Admin\AppData\Local\Temp\F75C.bin1

                              Filesize

                              9KB

                              MD5

                              0a9cbd4d3cbf4d81e7145c33602ca3ce

                              SHA1

                              3b95179668d30c7cb39b6c8a821bfb4d15b9c6c0

                              SHA256

                              1f80332589f18e6336e4c12616db27ee10f0e871284545cc02e4f01f4177e784

                              SHA512

                              8d54eebbb7105a7f2bbfced748c4701c2c7ceea3ad6c4c6776bd02d9826080e1054908a5780b4845235040bb7ae2614172e82de2facb7d123ce4de5894e41f58

                            • C:\Users\Admin\AppData\Local\Temp\F75C.bin1

                              Filesize

                              35KB

                              MD5

                              8ae66b88caa9bc850abcbb5eea454a33

                              SHA1

                              8b63c209b515066d0f14202ac44791dccb708ac8

                              SHA256

                              b51e20759cf048f438441137fd95684a73d806a53849debf9a58b2cbac6e44dc

                              SHA512

                              3de8e687bf15186cd056d30b972f03d7a57590d9176df3322b32c57eed9e26a768280cafb9953d4de5ad7055b73cb1cc4a23c0e7073a38c9740b0f8eb800ac61

                            • C:\Users\Admin\AppData\Local\Temp\F75C.bin1

                              Filesize

                              78KB

                              MD5

                              47a5db33463d5469be451f5ebafabe44

                              SHA1

                              7abfeab7970640012fa9322cb376613411dccc60

                              SHA256

                              4475bf6614e28d4de0d7e40851357ba30c2cc005ca3306399e82d0ba68bf29d8

                              SHA512

                              98bd84ad2a6abdb96cba374f86846f90ec1cf29812ec60bf60df8aae0a2e21881718e92c9183729af8d87b7ef8a4e45287f8b5979b94d4aab3e5e25410c3f9e1

                            • C:\Users\Admin\AppData\Local\Temp\F75C.bin1

                              Filesize

                              78KB

                              MD5

                              393b9ccf5ac516341539eff7a71b0725

                              SHA1

                              f95b9dce3190c8f16a8518cd72352a5b4c51296c

                              SHA256

                              a2d4e82f4dc6ee828bb58caad4712d1d6adc0d012ff3bd2bbd81c12a15831136

                              SHA512

                              9eae9786ab5060a7cd4ea797f5d3967118701c1f87f9612bed8955d4d4d2cc830bb76ca51dd792ff78dcd931907ec3b8b5295fde2fc622b6335da9e6b1bd4fa5

                            • C:\Users\Admin\AppData\Local\Temp\F75C.bin1

                              Filesize

                              111KB

                              MD5

                              478996ba1f79405b00d63f0fb5a0ecf9

                              SHA1

                              875e96f705f8175744b5a58303d0632483c332ad

                              SHA256

                              d9cbe70327ce5c288489c1c20243315c199c0c996e040a92983e92b0be6d5008

                              SHA512

                              7268204648d91fbfa148ae751e2445b2a75d4a1d1f7a1623cd1ee50e8b9895efc58397dfe9eed6ad7f8e92807f54f9bf585cb6bba7a14525be621b856d44ed02

                            • C:\Users\Admin\AppData\Local\Temp\setup.inf

                              Filesize

                              930B

                              MD5

                              1fca9b9e5ac8d285a2a832a8c5db81d4

                              SHA1

                              1f2488ed6bb4a5cdfb0265689b1e100876203bc5

                              SHA256

                              204c4c5745dbb9399e466a1656f83e482a247b5da486bffd5e06d3e90f5f086c

                              SHA512

                              dbd52cde312b0b5c4b481293302d8c385fecab6331c95bc933611d6845bea7512ac6bb299630e0f34992f339a5d58745d8bcf2a99528b62ab2347b3e15e69af0

                            • C:\Users\Admin\AppData\Local\Temp\setup.rpt

                              Filesize

                              283B

                              MD5

                              f9f8416348a1c845c38d6af42d9b68bb

                              SHA1

                              7d73cabc8e1cdc4265336ffa8d09d53bc49cd48e

                              SHA256

                              00d7a488c4544dd2fc00238452baeb789ade183b7e3b372b0b5223fea12e6367

                              SHA512

                              72cf3fe3ee2a6b48513d7559b05f98cfc01a6dc9081a7a903223f1d9e55d353a0a68ae79fdd79526275811eafdb3330febdc6297d6e59726084fe217b182e556

                            • memory/796-10-0x0000000000400000-0x0000000000473000-memory.dmp

                              Filesize

                              460KB

                            • memory/796-5-0x0000000000400000-0x0000000000473000-memory.dmp

                              Filesize

                              460KB

                            • memory/796-4-0x0000000000400000-0x0000000000473000-memory.dmp

                              Filesize

                              460KB

                            • memory/796-2-0x0000000000400000-0x0000000000473000-memory.dmp

                              Filesize

                              460KB

                            • memory/2444-1-0x00000000006E0000-0x00000000006E1000-memory.dmp

                              Filesize

                              4KB

                            • memory/3532-40-0x00000000022E0000-0x0000000002417000-memory.dmp

                              Filesize

                              1.2MB

                            • memory/3532-45-0x00000000022E0000-0x0000000002417000-memory.dmp

                              Filesize

                              1.2MB

                            • memory/3532-34-0x00000000022E0000-0x0000000002417000-memory.dmp

                              Filesize

                              1.2MB

                            • memory/3540-24-0x00000000083A0000-0x00000000084D7000-memory.dmp

                              Filesize

                              1.2MB

                            • memory/3540-26-0x00000000083A0000-0x00000000084D7000-memory.dmp

                              Filesize

                              1.2MB

                            • memory/3540-31-0x00000000083A0000-0x00000000084D7000-memory.dmp

                              Filesize

                              1.2MB

                            • memory/3540-39-0x00000000083A0000-0x00000000084D7000-memory.dmp

                              Filesize

                              1.2MB

                            • memory/3540-27-0x00000000083A0000-0x00000000084D7000-memory.dmp

                              Filesize

                              1.2MB

                            • memory/3540-42-0x00000000083A0000-0x00000000084D7000-memory.dmp

                              Filesize

                              1.2MB

                            • memory/3540-43-0x00000000083A0000-0x00000000084D7000-memory.dmp

                              Filesize

                              1.2MB

                            • memory/3540-20-0x0000000000ED0000-0x0000000000ED1000-memory.dmp

                              Filesize

                              4KB

                            • memory/3540-21-0x00000000083A0000-0x00000000084D7000-memory.dmp

                              Filesize

                              1.2MB

                            • memory/3540-22-0x00000000083A0000-0x00000000084D7000-memory.dmp

                              Filesize

                              1.2MB

                            • memory/3540-23-0x00000000083A0000-0x00000000084D7000-memory.dmp

                              Filesize

                              1.2MB

                            • memory/3540-33-0x00000000083A0000-0x00000000084D7000-memory.dmp

                              Filesize

                              1.2MB

                            • memory/3540-29-0x00000000083A0000-0x00000000084D7000-memory.dmp

                              Filesize

                              1.2MB

                            • memory/3540-30-0x00000000083A0000-0x00000000084D7000-memory.dmp

                              Filesize

                              1.2MB

                            • memory/3540-28-0x00000000083A0000-0x00000000084D7000-memory.dmp

                              Filesize

                              1.2MB

                            • memory/3540-103-0x00000000083A0000-0x00000000084D7000-memory.dmp

                              Filesize

                              1.2MB

                            • memory/3540-16-0x00000000083A0000-0x00000000084D7000-memory.dmp

                              Filesize

                              1.2MB

                            • memory/4524-8-0x00000000013D0000-0x00000000013D1000-memory.dmp

                              Filesize

                              4KB

                            • memory/4524-11-0x0000000002D10000-0x0000000002E47000-memory.dmp

                              Filesize

                              1.2MB

                            • memory/4524-15-0x0000000002D10000-0x0000000002E47000-memory.dmp

                              Filesize

                              1.2MB

                            • memory/4524-25-0x0000000002D10000-0x0000000002E47000-memory.dmp

                              Filesize

                              1.2MB