Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
15-06-2024 02:31
Static task
static1
Behavioral task
behavioral1
Sample
a6ba2e834e4429f7e13406cf5897a71f.exe
Resource
win7-20240611-en
General
-
Target
a6ba2e834e4429f7e13406cf5897a71f.exe
-
Size
1.8MB
-
MD5
a6ba2e834e4429f7e13406cf5897a71f
-
SHA1
14143fc6cc6e2b6afba16e02bbf010ce93561436
-
SHA256
dcdd775ccbbe54e21464fe274f737694641875f63157f043a7285acfdec17e2a
-
SHA512
d04c1feae157d43b2c2e165de5f66760bdd025076e4d7c2a5527def529739479916ef0c580d5299a0c5fbdd1616a68a7b2d90ac71b5a52a27319bd6a01b95327
-
SSDEEP
49152:4SuE32trqPKIO23Hlin6COYolnyJ2WR6wOHste0uIlCj790Lhf4xC0FyQ4L6nd:3L3qqPKIOson6Cslny8WR6wOHstehsC7
Malware Config
Extracted
gozi
-
build
214062
Extracted
gozi
3184
qfelicialew.city
mzg4958lc.com
gxuxwnszau.band
-
build
214062
-
dga_base_url
constitution.org/usdeclar.txt
-
dga_crc
0x4eb7d2ca
-
dga_season
10
-
dga_tlds
com
ru
org
-
exe_type
loader
-
server_id
12
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4049aa55ccbeda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{80A8C901-2ABF-11EF-A3C1-4A2B752F9250} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005ec80cf279b2564c91633e21940a8076000000000200000000001066000000010000200000005b383dbe094975347bd0c564fe34d67b1d59157c2747b40007c05a5c65163c85000000000e8000000002000020000000427ea18546f09f9f9bf4c83db0dd8ebfe6bae250fa425a8c8e176a50ced813a42000000023eee14cdfd44ed9a12072bf0ca8c6d3559ad3a96081b1538d94c64f3bae6f79400000002d84e241e4c3bd86c6f7faed758ce3d202dc02d636c0c24d41a881cdf0986b020dc97c67e2687bab780b2fae512d3cb377c17774cebf1408b5b078005dafc515 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2660 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2660 iexplore.exe 2660 iexplore.exe 2940 IEXPLORE.EXE 2940 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2660 wrote to memory of 2940 2660 iexplore.exe IEXPLORE.EXE PID 2660 wrote to memory of 2940 2660 iexplore.exe IEXPLORE.EXE PID 2660 wrote to memory of 2940 2660 iexplore.exe IEXPLORE.EXE PID 2660 wrote to memory of 2940 2660 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\a6ba2e834e4429f7e13406cf5897a71f.exe"C:\Users\Admin\AppData\Local\Temp\a6ba2e834e4429f7e13406cf5897a71f.exe"1⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2660 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD58da0d9b13dbac2242250c935074c8dbb
SHA12308e53c7c2521907b314d652dd1ee606aa17720
SHA256dcc63333d1f2ec90c552cc16e76f9aaae5c24b1592297b9ca3af79332f6cee0d
SHA512946f8d60b3ce19025310c5c77236725d5b17f95eb56aae10d840fd28f611d5252749ad8db5eb05f01681f0c5fef0428a618c86b6ec03c666218b6950ea6c54cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5697a8b30690f84c9034a4749596e75cc
SHA1618d90b5bfae638d7a1ee88d9418d8baae38e2c4
SHA2566bcf7a9ea8b4243fce8449946aed2884b98e4c6ece8381752c3f80c2e47992dd
SHA512577dba2cc04e5f468b7b9915e9be25ae17af22e9918f6d0627b6aa2ab510b8635789eda6b429b60da32fce3cf8582f6514780d6de1c088eb88a9e099b15df715
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD540723a868e94c995001df0680100f19f
SHA16d4a00b3e6e1f2b49d6324b08956f08bdadd09f0
SHA2569c950f2c3af41768b80d4edcbae7b2d1c8fcc6cec68789117dce840f185c57a1
SHA51278ca4340dac141355dd5faec4ba7a3d153db1ebb0273f285d7aaea695efc7b56b2b3a7763b1194e19bb12f4a6cc72fd7c5705585b0c65ea8cfab4a6dc1c47760
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5d74605e3ad2a6ca936884368f886da80
SHA1746151dac67e70da4054b0287510b2ffb8da52d1
SHA25691b4f3315ef66680770c2989bbb2f37fa11e0d56b171fb245aeb25905a4cc513
SHA5123b5d8cdea6109d802d8cce55ac81d330d9a5bab769e9dbfa63be005a7309217118b793d05eff634deeced5e5aa556bd6af66d0621ca15f2b1f7fcf3b732c7263
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5244f217165ab93547120ea78f3fc0eee
SHA1c6cd6b88251c2f9e6ff481362885011b90600b7e
SHA2561258d636f57916e105d6ee9721f1fc039d1f02ec75b82d44f716eea492aae72b
SHA512faa20c88243f722a3f48c84c4f34b0a1e399203acb02fdaf986fed1698f854dae042c28d9f3d6a278190bc45716d77ee9ec056bda049a106d21e7d02cff67df0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD541eccc1d8d25db021d659f9a12dd8e07
SHA178907b54db5885a566634d7e56ff5faaa041f837
SHA256776223168d05ed0375848d42ea97016e61f9d8f0a137ecfae44f327679c4da80
SHA512e83f2c5f545d9106686df2bba845dacc89c69286e8dbe9c4fd4fa9516aa5f560b1b71a6803d64dd1178550c01f3df26172428274c7cc6147906479d7119a7e97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD56f05840cc6b5c10712303212c9b85292
SHA1fe8b93f8f1cc55b54162fb78efed36810dda09bd
SHA256980e0c4cf9bc202696ddde83e3b26b104fb1c08727a3911617af1693617a7284
SHA5126f165162ff6999537f64df3c9727e5e372be715c91fafab3213b28f2866d2761d1c9d6466bc1ddf54e5d3fdd4bccbe040be5fcc02af83f002469f085da65df04
-
C:\Users\Admin\AppData\Local\Temp\Cab1E5C.tmpFilesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\Local\Temp\Tar1F69.tmpFilesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
memory/1152-0-0x0000000000400000-0x00000000005E8000-memory.dmpFilesize
1.9MB
-
memory/1152-13-0x0000000000400000-0x000000000040F000-memory.dmpFilesize
60KB
-
memory/1152-8-0x00000000002C0000-0x00000000002C2000-memory.dmpFilesize
8KB
-
memory/1152-4-0x0000000000290000-0x00000000002AB000-memory.dmpFilesize
108KB
-
memory/1152-2-0x000000000058F000-0x0000000000594000-memory.dmpFilesize
20KB
-
memory/1152-3-0x0000000000400000-0x00000000005E8000-memory.dmpFilesize
1.9MB
-
memory/1152-1-0x0000000000400000-0x00000000005E8000-memory.dmpFilesize
1.9MB