Analysis
-
max time kernel
142s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
24-06-2024 09:09
Static task
static1
Behavioral task
behavioral1
Sample
c7178b77eb74b0e4c0da1f35482ce140f5ee4bda0b6f806e8c29088812b0c3d7.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
c7178b77eb74b0e4c0da1f35482ce140f5ee4bda0b6f806e8c29088812b0c3d7.exe
Resource
win10v2004-20240226-en
General
-
Target
c7178b77eb74b0e4c0da1f35482ce140f5ee4bda0b6f806e8c29088812b0c3d7.exe
-
Size
632KB
-
MD5
222831dc032b9cd1dad652a777419574
-
SHA1
37d45f0c42caddf9516b715bbec8db679ff3cff9
-
SHA256
c7178b77eb74b0e4c0da1f35482ce140f5ee4bda0b6f806e8c29088812b0c3d7
-
SHA512
2f9778d283d5cb7467332924f7fef8e1e576a41fa4c572e6786632444f9aa82de31873e711324170e46cb7bb893ce0fa43e27d7608fa94a40eeecf4dd07a8039
-
SSDEEP
12288:wRWNcr8oxnLUiPclPA0DCQLsehJA3LQiEorgiYSsrGhtcLQaX:TNBILVIoQCoRJAke1rsrQtsJ
Malware Config
Extracted
gozi
Extracted
gozi
3000
unikymprogress.ru
ferarirecord.ru
-
exe_type
worker
-
server_id
12
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
UnRAR.exemd5.exepid process 2784 UnRAR.exe 1980 md5.exe -
Loads dropped DLL 2 IoCs
Processes:
cmd.exepid process 2480 cmd.exe 2480 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
c7178b77eb74b0e4c0da1f35482ce140f5ee4bda0b6f806e8c29088812b0c3d7.execmd.exedescription pid process target process PID 3028 wrote to memory of 2480 3028 c7178b77eb74b0e4c0da1f35482ce140f5ee4bda0b6f806e8c29088812b0c3d7.exe cmd.exe PID 3028 wrote to memory of 2480 3028 c7178b77eb74b0e4c0da1f35482ce140f5ee4bda0b6f806e8c29088812b0c3d7.exe cmd.exe PID 3028 wrote to memory of 2480 3028 c7178b77eb74b0e4c0da1f35482ce140f5ee4bda0b6f806e8c29088812b0c3d7.exe cmd.exe PID 3028 wrote to memory of 2480 3028 c7178b77eb74b0e4c0da1f35482ce140f5ee4bda0b6f806e8c29088812b0c3d7.exe cmd.exe PID 3028 wrote to memory of 2480 3028 c7178b77eb74b0e4c0da1f35482ce140f5ee4bda0b6f806e8c29088812b0c3d7.exe cmd.exe PID 3028 wrote to memory of 2480 3028 c7178b77eb74b0e4c0da1f35482ce140f5ee4bda0b6f806e8c29088812b0c3d7.exe cmd.exe PID 3028 wrote to memory of 2480 3028 c7178b77eb74b0e4c0da1f35482ce140f5ee4bda0b6f806e8c29088812b0c3d7.exe cmd.exe PID 2480 wrote to memory of 2784 2480 cmd.exe UnRAR.exe PID 2480 wrote to memory of 2784 2480 cmd.exe UnRAR.exe PID 2480 wrote to memory of 2784 2480 cmd.exe UnRAR.exe PID 2480 wrote to memory of 2784 2480 cmd.exe UnRAR.exe PID 2480 wrote to memory of 2784 2480 cmd.exe UnRAR.exe PID 2480 wrote to memory of 2784 2480 cmd.exe UnRAR.exe PID 2480 wrote to memory of 2784 2480 cmd.exe UnRAR.exe PID 2480 wrote to memory of 1980 2480 cmd.exe md5.exe PID 2480 wrote to memory of 1980 2480 cmd.exe md5.exe PID 2480 wrote to memory of 1980 2480 cmd.exe md5.exe PID 2480 wrote to memory of 1980 2480 cmd.exe md5.exe PID 2480 wrote to memory of 1980 2480 cmd.exe md5.exe PID 2480 wrote to memory of 1980 2480 cmd.exe md5.exe PID 2480 wrote to memory of 1980 2480 cmd.exe md5.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c7178b77eb74b0e4c0da1f35482ce140f5ee4bda0b6f806e8c29088812b0c3d7.exe"C:\Users\Admin\AppData\Local\Temp\c7178b77eb74b0e4c0da1f35482ce140f5ee4bda0b6f806e8c29088812b0c3d7.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\cmd.bat" "2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\UnRAR.exeUnRAR.exe e -p83102a md5.rar3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\md5.exemd5.exe3⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\UnRAR.exeFilesize
299KB
MD5f9388c6824adabb36596642ebc368db7
SHA17cf300de45e497224b4ee3a2891d961bb38cc7a0
SHA2563a8020a4a16ea37a9d6fac6bbc8345e54dea92c247f4b9d630bc32780faf4dee
SHA512db0c19d2d8e8d8879095e65f6d2216f32ed29f0832dc53023ac2c1bc3558330e7ad12cee4e74ca5bf6e65c3133b0b6f220eed9bb702e5022808f585bfcf26001
-
C:\Users\Admin\AppData\Local\Temp\cmd.batFilesize
102B
MD5d357b49de1eff9c0b92779cc4b976a81
SHA10662a967d7b462f7170882eebce4068f7a4c0fac
SHA25664c2fd677a11e309a5eb51d83eac7295be72ddca5ca234e57c3e49621f0b416d
SHA512f75903dbc4bad5e0a6b380723dc06047bdbf6da978ee2dd088231dfac761292e2d9bb762e6f5db02e50a0c26dff7836746c110e01381d0c6c1e7bcc1b9e4eeb0
-
C:\Users\Admin\AppData\Local\Temp\md5.exeFilesize
423KB
MD5199962380ea67533cbf4e28873b2444f
SHA194794d37c012a2ebff519a5a04cc38b2dd1b51f4
SHA256551dd2d44ed5c9eea686678c540851abfcccbf8ea12d669c291fc3465e708437
SHA512de4959fab7e6c0bd9b505b9e4303877bf68a427295257d93d13ea1d4de021c8a172d807f8a824f7d2f70a184b299f503fc450d070997e98ea3294abec2c30677
-
C:\Users\Admin\AppData\Local\Temp\md5.rarFilesize
300KB
MD5e68d6b097b47a80437a47cf4a3125341
SHA158bbfffbe452b71dea2df8d72ae9fbfd16d540f7
SHA256df4ea1e37bbcf10c31548a309334b740e6dd16fd159e14c501ce6eebafe6fe39
SHA51277264d9b87f11930c42f56cb9cd03419eee0e44ea6965f5ed05f90bb802da6f2fbd0118aeb01780eff44cba26f686a1692286fc57ae22e0305890b7a40b5934a
-
memory/1980-29-0x0000000000400000-0x0000000000492000-memory.dmpFilesize
584KB