Analysis

  • max time kernel
    141s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    01/03/2025, 17:39

General

  • Target

    a3ca02fdfe8d0ff9fe4f284d4700fd85c6fcff458bf7460ae0b23aa1c1c60ccc.exe

  • Size

    1.2MB

  • MD5

    00d5ae7f7fc3f77ab69da2f9c757f960

  • SHA1

    9794125c9cf362328cff5988dc7af803f38499bd

  • SHA256

    a3ca02fdfe8d0ff9fe4f284d4700fd85c6fcff458bf7460ae0b23aa1c1c60ccc

  • SHA512

    9b4b6567b9d5fa67c82383734ca820123267ac330136acaa4fb6d7291890465685cedd5153a5916c6fedc7a2ba3e25c06a860225610cfccfe27fb96e10bac6ec

  • SSDEEP

    12288:qNyahrrcXVFaXQM265f8IHj+GAULolYCbUhVGOYLG72fERatPKd1rhGSZst/tpxw:q04kuCgsSYhEo3hfZkiZabwXO

Malware Config

Extracted

Family

gozi

Signatures

  • Gozi

    Gozi is a well-known and widely distributed banking trojan.

  • Gozi family
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\a3ca02fdfe8d0ff9fe4f284d4700fd85c6fcff458bf7460ae0b23aa1c1c60ccc.exe
    "C:\Users\Admin\AppData\Local\Temp\a3ca02fdfe8d0ff9fe4f284d4700fd85c6fcff458bf7460ae0b23aa1c1c60ccc.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1736

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1736-0-0x0000000000485000-0x0000000000488000-memory.dmp

    Filesize

    12KB

  • memory/1736-2-0x0000000000400000-0x0000000000538000-memory.dmp

    Filesize

    1.2MB

  • memory/1736-1-0x0000000000400000-0x0000000000538000-memory.dmp

    Filesize

    1.2MB

  • memory/1736-3-0x0000000000400000-0x0000000000538000-memory.dmp

    Filesize

    1.2MB

  • memory/1736-5-0x0000000002620000-0x0000000002666000-memory.dmp

    Filesize

    280KB

  • memory/1736-11-0x0000000002620000-0x0000000002666000-memory.dmp

    Filesize

    280KB

  • memory/1736-12-0x0000000000485000-0x0000000000488000-memory.dmp

    Filesize

    12KB