Analysis

  • max time kernel
    140s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/03/2025, 21:02

General

  • Target

    d7fafabbb381c34185ad30f0d5337ec8072d0705e0e9fb1d91e7358ed934fff3.dll

  • Size

    234KB

  • MD5

    c9d954b3f1c512e6804fd8f5637b58b6

  • SHA1

    b452040d8072117ddbe1adf9e1eab5e4bdb150bd

  • SHA256

    d7fafabbb381c34185ad30f0d5337ec8072d0705e0e9fb1d91e7358ed934fff3

  • SHA512

    a4e949017016c1cfaa9bdff664c8ee20b2a34fe78788de9a4338ae5ad9a8a2623ccafe6d4584ef4f6cb29bc05dbcb3a71cbcd4051560287fbe74fb5a5738c09b

  • SSDEEP

    6144:SCY2oo127AHBPr4CggrMbPMdsf5LLNBU94nzKE:SSD6w4bKsf5PUomE

Malware Config

Extracted

Family

gozi

Extracted

Family

gozi

Botnet

3050

C2

c.s-microsoft.com

ajax.googleapis.com

groovcerl.xyz

Attributes
  • build

    250166

  • dga_base_url

    constitution.org/usdeclar.txt

  • dga_crc

    0x4eb7d2ca

  • dga_season

    10

  • dga_tlds

    com

    ru

    org

  • dns_servers

    107.174.86.134

    107.175.127.22

  • exe_type

    loader

  • server_id

    12

rsa_pubkey.plain
serpent.plain

Signatures

  • Gozi

    Gozi is a well-known and widely distributed banking trojan.

  • Gozi family
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SetWindowsHookEx 16 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\d7fafabbb381c34185ad30f0d5337ec8072d0705e0e9fb1d91e7358ed934fff3.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4872
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\d7fafabbb381c34185ad30f0d5337ec8072d0705e0e9fb1d91e7358ed934fff3.dll
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4264
  • C:\Program Files (x86)\Internet Explorer\ielowutil.exe
    "C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1176
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1908
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1908 CREDAT:17410 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1444
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4572
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4572 CREDAT:17410 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2236
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4092
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4092 CREDAT:17410 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2676
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4172
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4172 CREDAT:17410 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2316

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_0FB9553B978E7F00C6B2309507DEB64A

    Filesize

    471B

    MD5

    a7bdbc839b37be41f3f97eace5a7a837

    SHA1

    d29d93311999f94110ad379847c146e4999c2bc7

    SHA256

    ae7d1a6f478f0451b1a0323ce4e49c2fa6f2024fde64c2faac9d177f33a1472f

    SHA512

    e17333c9b10e6542bf05e6769996ee83a39c5773ce6896aa4b2be4b09c552f760f4a78e86edbc4e93c4ce66c8790338e6ae009f7bebfb13453afa17164806ba9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_0FB9553B978E7F00C6B2309507DEB64A

    Filesize

    412B

    MD5

    a29ddbf1bfaebd20b3918895e62dd58d

    SHA1

    34f60b76770d5bf4b96611ef96c2db737f4ba42a

    SHA256

    95dc7505c07c5c9be122101a781839acfb1fadf06ff92346ff3c3381357d4b43

    SHA512

    7be3411661ba0b5c22620d47d0aad069d6392b2fcf02f45568fa8bca23d8d005ee8f8a9cc2f03c5fe2c95ca1d47203009e177e9f6ce6652738cb952eade07de9

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\EAO45EME\mwfmdl2-v3.54[1].woff

    Filesize

    25KB

    MD5

    d0263dc03be4c393a90bda733c57d6db

    SHA1

    8a032b6deab53a33234c735133b48518f8643b92

    SHA256

    22b4df5c33045b645cafa45b04685f4752e471a2e933bff5bf14324d87deee12

    SHA512

    9511bef269ae0797addf4cd6f2fec4ad0c4a4e06b3e5bf6138c7678a203022ac4818c7d446d154594504c947da3061030e82472d2708149c0709b1a070fdd0e3

  • C:\Users\Admin\AppData\Local\Temp\~DF1FBF2006C6D75F05.TMP

    Filesize

    16KB

    MD5

    5be0505cd8d8dde0fbfad91292e9f72d

    SHA1

    94971261f53572d70e30c5308cef7b05a5e8cfe6

    SHA256

    47bce5219157a220d070b30c926bb7e33c28fdf7935141efdc9a9c6fdcbb409f

    SHA512

    5da9a21a03113797ea90d95f58868486a43dcb383dcbf76c16f0c9ca6f3e92a0f23665187f07bbbc9dc05d4072d94ac42d4f4e578a1ff19755ba26f65fc748fe

  • memory/4264-0-0x0000000000880000-0x00000000008C5000-memory.dmp

    Filesize

    276KB

  • memory/4264-1-0x0000000000880000-0x00000000008C5000-memory.dmp

    Filesize

    276KB

  • memory/4264-2-0x0000000002940000-0x0000000002950000-memory.dmp

    Filesize

    64KB

  • memory/4264-13-0x0000000000880000-0x00000000008C5000-memory.dmp

    Filesize

    276KB