Managed XDR
Group-IB MDP Report
File info
Filename: home-cjq-hybrid_feature_gan-patched-classic_mlp_malconv0_wass_0.1_28_-50ed0329ffb7ae83f7a8042ef7f6...308e52f479965358cfe4d646b1847_04d611903ca13a24084f9f5c0a17ac8f144984fdde2f3351af937f7355e18fe9.exe
File Type: PE32 executable (GUI) Intel 80386, for MS Windows
File Size: 300.8 KB
Env info
win7/x86 en
Hashes
SHA1: 9872324e43912ef4d2ba132b0e3dd86c6b93695e
SHA256: 04d611903ca13a24084f9f5c0a17ac8f144984fdde2f3351af937f7355e18fe9
MD5: 084be9fc31f55ddd289a7f26913bd46d
Malwares
ISFB
Signatures
Privilege Escalation
T1134 opens_thread_token: Opens the access token associated with a thread
T1134 opens_process_token: Opens the access token associated with a process
Defense Evasion
T1027.002 unnamed_memory_regions_contains_pe: One or several unnamed memory regions are PE files
T1027.002 unnamed_memory_regions: Code was executed in unnamed regions
T1497.003 antisandbox_idletime: Detects Windows Idle Time to determine the uptime
T1497.003 antisandbox_sleep: The process attempted to slow down analysis
T1134 opens_thread_token: Opens the access token associated with a thread
T1134 opens_process_token: Opens the access token associated with a process
T1497.001 antivm_queries_computername: Retrieves the computer name
Credential Access
T1552 cookie_files: Accesses cookie files
T1555.003 cookie_files: Accesses cookie files
Discovery
T1497.003 antisandbox_idletime: Detects Windows Idle Time to determine the uptime
T1497.003 antisandbox_sleep: The process attempted to slow down analysis
T1497.001 antivm_queries_computername: Retrieves the computer name
Command and Control
T1071.001 wininet_https: Performs HTTP/HTTPS requests using WinInet
Exfiltration
T1022 encrypts_pc_info: Collects and encrypts information about the computer (possibly for exfiltration)
Other
yara_rules: Static rules
ce_info: Gozi static config Configuration Data found
gozi2_downloader: Detected downloader of banker GOZI(ver 2)
gozi_downloader: GOZI family trojan downloader detected (undefined version)
dns_without_resolve: DNS query without a response
hidden_ie: Starts hidden Internet Explorer
no_graphical_activity: No graphic activity
has_pdb: This executable file has a PDB path
creates_suspended_process: Creates suspended process
get_policy_info: Retrieves information about a Policy object
pe_overlay: PE file contains overlay
Managed XDR