{"id":2110,"date":"2024-09-25T11:35:49","date_gmt":"2024-09-25T11:35:49","guid":{"rendered":"https:\/\/xdr-mdr.lmntrix.com\/main_web\/?p=2110"},"modified":"2025-07-29T03:20:05","modified_gmt":"2025-07-29T03:20:05","slug":"analysis-of-isfb-campaign","status":"publish","type":"post","link":"https:\/\/lmntrix.com\/blog\/analysis-of-isfb-campaign\/","title":{"rendered":"Analysis of ISFB Campaign"},"content":{"rendered":"\n<figure class=\"wp-block-image size-full\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"416\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/1-isfinfectionchain-1024x416-1.webp\" alt=\"\" class=\"wp-image-2111\"\/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Introduction<\/strong><\/h2>\n\n\n\n<p>ISFB (URSnif, also known as Gozi), is one of the most widely spread banking trojans \u2013 it is aimed to steal the banking credentials and commonly targeting the corporate users. The malware was among the Top 10 malicious strains to infect the healthcare industry. ISFB\/Ursnif has undergone several development iterations since its source code was leaked in 2015\/16.<\/p>\n\n\n\n<p><strong>Other Names:<\/strong> RM3, Ursnif, Dreambot, CRM, and Snifula, Gozi can be considered as a group of malware families which are based on the same malicious codebase. Historically, it has been known as one of the most widely spread and longest-standing Banking Trojans with more than 14 years of malicious activity.<\/p>\n\n\n\n<p><strong>Target:<\/strong> Financial Institutions, Stock Exchanges, and Healthcare Industry.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Infection Chain:<\/strong><\/h3>\n\n\n\n<figure class=\"wp-block-image size-full\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"416\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/1-isfinfectionchain-1024x416-1.webp\" alt=\"\" class=\"wp-image-2111\"\/><\/figure>\n\n\n\n<p>In our current example, ISFB threat actor attacks the victim machine by initial infection vector of spam campaign with attachment (EML). It contains a Microsoft Office document (MS Excel) document with VBA macro enabled content. The threat actor has tricks the user to enable the macros to perform their action. Once the user enables the content, the malware will connect with its C2 server to perform the defined actions for an objective.<\/p>\n\n\n\n<p><strong>Sample Information<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"1024\" height=\"294\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/2-lokibot2-1024x294-1.webp\" alt=\"\" class=\"wp-image-2112\"\/><\/figure>\n\n\n\n<p><strong>Phishing Email Content<\/strong>s<\/p>\n\n\n\n<p><strong>Sample 1: <\/strong>Campaign: ISFB or Gozi&nbsp; | Category: Banking Trojan<\/p>\n\n\n\n<p>This time, the malware author sent many EML phishing content with same attachment file.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"1024\" height=\"628\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/3-sample1-1-1024x628-1.webp\" alt=\"\" class=\"wp-image-2113\"\/><\/figure>\n\n\n\n<p><strong>Sample 2:<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"618\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/4sample2-1-1024x618-1.webp\" alt=\"\" class=\"wp-image-2114\"\/><\/figure>\n\n\n\n<p><strong>Technical Analysis of XLSM attachment:<br><\/strong>XLSM: b527de9bd7fb3abab3fc4b0cd95c46ebe2524b660cb6a970042272ae07a2689e<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"242\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/5-isfb-xlsm-hash-1024x242-1.webp\" alt=\"\" class=\"wp-image-2115\"\/><\/figure>\n\n\n\n<p><strong>File Metadata \/ Properties:<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"950\" height=\"458\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/6-isf-metadata.webp\" alt=\"\" class=\"wp-image-2116\"\/><\/figure>\n\n\n\n<p><strong>Why are malware authors still using .XLSM infection?<\/strong><\/p>\n\n\n\n<p>XLSM files are spreadsheet files that support macros. A macro is a set of instructions that performs a record of steps repeatedly. XLSM files are based upon Open XLM formats that were introduced in Microsoft Office 2007. The malware authors are inserting the malicious VBA macros in the e-mail attachment files. Most of the time, macros will be in protected mode preventing regular users from viewing the code in clear text. In this sample as well, the VBA macro codes are protected mode with passcodes.<\/p>\n\n\n\n<p><strong>Enable-Editing<\/strong>:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"541\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/7-isfenabledit1-1024x541-1.webp\" alt=\"\" class=\"wp-image-2117\"\/><\/figure>\n\n\n\n<p><strong>Enabled Content:<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"530\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/8-isfenabledit2-1024x530-1.webp\" alt=\"\" class=\"wp-image-2118\"\/><\/figure>\n\n\n\n<p><strong>Once executed, the following actions will be performed by Gozi \/ URSnif malware;<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Once the user opens the attached document and enables a malicious macro which will trigger the download of a dynamic link library from a remote server.<\/li>\n\n\n\n<li>The downloaded .DLL file will be executed via RegSvr32.exe and unpack the core Gozi loader into memory, which is designed to manage all the interactions with the infected machine. (For Example: It checks the download\/launch additional modules, and system update configuration)<\/li>\n\n\n\n<li>Gozi uses Internet Explorer (IE) COM objects to communicate with its C&amp;C server and it creates a running instance through the CoCreateInstance() API.<\/li>\n\n\n\n<li>Mainly it checks for the few conditions to satisfy:<br>(a) The IP address must be located in Italy; and not be blacklisted (geofencing),<br>(b) The DLL must not have already been downloaded to create new infection.<\/li>\n<\/ul>\n\n\n\n<p><strong>Based on the sample observed, we found the following API calls,<\/strong><\/p>\n\n\n\n<p>Windows native API calls that give us an idea of the malware\u2019s capability, described in the attack sequence,<\/p>\n\n\n\n<p>\u2022&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; EnableMouseInPointer<\/p>\n\n\n\n<p>\u2022&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; TrackMouseEvent<\/p>\n\n\n\n<p>\u2022&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; GetsystemWindowsDirectory<\/p>\n\n\n\n<p>\u2022&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; GetSystemAsFileTime<\/p>\n\n\n\n<p>\u2022&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; GetVersion<\/p>\n\n\n\n<p>\u2022&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; GetUILanguageInfo<\/p>\n\n\n\n<p>\u2022&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; GetProcAddress<\/p>\n\n\n\n<p>\u2022&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; CreateRemoteThread<\/p>\n\n\n\n<p>\u2022&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; NtUserRemoteConnect<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>ISFB Trojan Attack Sequence:<\/strong><\/h3>\n\n\n\n<p>1. Arrives as an office document attachment<br>2. User tricked into opening document and executed malicious macro<br>3. Users download malicious DLL<br>4. Malicious DLL is executed<br>5. Malware steals user data and credentials from browser<br>6. Victim\u2018s computer connects to the remote C2 server<br>7. Remote C2 server is executing backdoor commands on the victim\u2019s computer<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Initial &#8211; Indicator of Compromise [IOC]:<\/strong><\/h3>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"264\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/9-isf-initial-ioc-1024x264-1.webp\" alt=\"\" class=\"wp-image-2119\"\/><\/figure>\n\n\n\n<p><strong>Virus Total Results:<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"423\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/10-isf-vtresults-1024x423-1.webp\" alt=\"\" class=\"wp-image-2120\"\/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Functionalities of ISFB:<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>In general, it will be acting as info-stealer by collecting system activities and data (including network and browser data).<\/li>\n\n\n\n<li>Recording keystrokes (keylogging).<\/li>\n\n\n\n<li>Recording the videos or else making screenshots.<\/li>\n\n\n\n<li>Performing Man-in-the-browser [MiTB] attacks on the targeted websites. Usually, it&#8217;s used to intercept and\/or modify data as it is being sent between a browser and a web server. (e.g., Form-grabbing, Web-injects).<\/li>\n\n\n\n<li>Redirect browser navigation to malicious websites.<\/li>\n\n\n\n<li>Enabling hVNC (hidden-VNC) and SOCKS proxy.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>IOC &#8211; <strong>Indicators of Compromise for detecting ISFB \/ GOZI \/ URSNIF<\/strong><\/strong><\/h3>\n\n\n\n<p><strong>Hashes<\/strong><\/p>\n\n\n\n<p>1056EA3DAD265DD554362BC0BD67F08FA2B9F3E5839E6E4FB197831A15C8ACEF<\/p>\n\n\n\n<p>C0E28D4E88C59688657C839C344E6C1289002EF0BA461EBBF3CD4B75949312E9<\/p>\n\n\n\n<p>5A8F5497F864BEAC188B72F77B22E1CBC1ECBB476E53C14403BD5A69515A2670<\/p>\n\n\n\n<p>EB0A49F46CB50FED3FF0C1EA5062F94E6BAAF367775500AF122CD48AA7B4C1EA<\/p>\n\n\n\n<p>06463378AE58AC721A6129CA3E85E743CD65ADB9E636ED95FB2C3215C2C9C754<\/p>\n\n\n\n<p>3087A86F6A90A4F8F485023CB848815BA473E607CCB96B180839CDDE847566D8<\/p>\n\n\n\n<p>ED0C5F836B3B54EEFAFCB1CC05571C27D294C50FBA036E50E030A5189735F6DD<\/p>\n\n\n\n<p>9F3AFEF4B3A589C4685F39D887725A664EC0FE78091069550402365E589F9D22<\/p>\n\n\n\n<p>E61BEE46B1B943412D7C2342EA1FA52635606105A8EC4F2341AE66ACC2121671<\/p>\n\n\n\n<p>74F057A1B3EBD62B8A352F709716C4EAC4DF8503A3D7AACE8F46EA6AA998B02B<\/p>\n\n\n\n<p>2231EA447F6F794FAE6A54479627112EBBA77DD276402F628FBE8B2BA4EC372F<\/p>\n\n\n\n<p>53619FE192047617262D8BFD02DF432156AD01896129785240E20339A0FBCD7A<\/p>\n\n\n\n<p>EEC4B7ACBF2659D738179784ABEE9009268AB135B90A19EC326CA3D4359DD014<\/p>\n\n\n\n<p>E673EED04BF609E9FE34D7129DB5F8DF5FAF941CC741C9FBCDA12DF828DCAEB0<\/p>\n\n\n\n<p>BD9EB71BAA0D28BFF80CBFA742346AA8F6D08AC463CE85BD97B9842AA6A2BBCB<\/p>\n\n\n\n<p>A650279899A57CBF1E21D1E481BB02E10715DF746F987999A67253AE8390C4D5<\/p>\n\n\n\n<p>B1DFE684B1F75E3B5AE544C82BAA9183A1F7E886CF68FF16D21FD030482AF1A2<\/p>\n\n\n\n<p>DE51BAE08FD7318C988EF54511B5C08D8C3D9BBB2FC03D76D97116A79AFB9E81<\/p>\n\n\n\n<p>104E6094EF239AAE7E4317433E868B67108B8157627DC222F996CB087795334F<\/p>\n\n\n\n<p><strong>IP Address<\/strong><\/p>\n\n\n\n<p>172(.)67(.)149(.)13<\/p>\n\n\n\n<p>93(.)94(.)199(.)139<\/p>\n\n\n\n<p>62(.)173(.)154(.)224<\/p>\n\n\n\n<p>190(.)147(.)189(.)122<\/p>\n\n\n\n<p>141(.)8(.)193(.)236<\/p>\n\n\n\n<p>5(.)62(.)38(.)208<\/p>\n\n\n\n<p>54(.)177(.)212(.)176<\/p>\n\n\n\n<p>54(.)38(.)220(.)85<\/p>\n\n\n\n<p>64(.)70(.)19(.)203<\/p>\n\n\n\n<p>5(.)79(.)79(.)212<\/p>\n\n\n\n<p>84(.)200(.)110(.)123<\/p>\n\n\n\n<p>141(.)94(.)176(.)124<\/p>\n\n\n\n<p>51(.)89(.)115(.)213<\/p>\n\n\n\n<p>185(.)53(.)178(.)7<\/p>\n\n\n\n<p>185(.)240(.)103(.)83<\/p>\n\n\n\n<p>217(.)12(.)199(.)168<\/p>\n\n\n\n<p>31(.)41(.)44(.)27<\/p>\n\n\n\n<p>162(.)255(.)119(.)93<\/p>\n\n\n\n<p>192(.)64(.)119(.)244<\/p>\n\n\n\n<p>178(.)210(.)89(.)119<\/p>\n\n\n\n<p><strong>Domains<\/strong><\/p>\n\n\n\n<p>avkit(.)org<\/p>\n\n\n\n<p>rgyui(.)top<\/p>\n\n\n\n<p>missrevolt(.)top<\/p>\n\n\n\n<p>dominikania(.)com<\/p>\n\n\n\n<p>citisec-online(.)co<\/p>\n\n\n\n<p>simple(.)oceanwp(.)org<\/p>\n\n\n\n<p>apkfab(.)com<\/p>\n\n\n\n<p>js(.)boardurl(.)de<\/p>\n\n\n\n<p>s(.)0cf(.)io<\/p>\n\n\n\n<p>mtmx(.)jp<\/p>\n\n\n\n<p>lh3(.)androidcontents(.)com<\/p>\n\n\n\n<p>americafirstcommittee(.)org<\/p>\n\n\n\n<p>filecr(.)com<\/p>\n\n\n\n<p>cdn-redirector(.)glopal(.)com<\/p>\n\n\n\n<p>profeducations(.)com<\/p>\n\n\n\n<p>html(.)design<\/p>\n\n\n\n<p>www(.)ekko-wp(.)com<\/p>\n\n\n\n<p>presets(.)kingcomposer(.)com<\/p>\n\n\n\n<p>autroliner(.)com<\/p>\n\n\n\n<p>track(.)gowithads(.)com<\/p>\n\n\n\n<p>ws(.)fakemailgenerator(.)com<\/p>\n\n\n\n<p>&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>MITRE ATT&amp;CK Mapping to ISFB \/ URSNIF Threat<\/strong><\/h3>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>Domain<\/strong><\/td><td><strong>ID<\/strong><\/td><td><strong>Name<\/strong><\/td><td><strong>Use<\/strong><\/td><td>&nbsp;<\/td><\/tr><tr><td>Enterprise<\/td><td>T1071<\/td><td>0.001<\/td><td>Application Layer Protocol:&nbsp;Web Protocols<\/td><td>Ursnif&nbsp;has used HTTPS for C2.<\/td><\/tr><tr><td>Enterprise<\/td><td>T1547<\/td><td>0.001<\/td><td>Boot or Logon Autostart Execution:&nbsp;Registry Run Keys \/ Startup Folder<\/td><td>Ursnif&nbsp;has used Registry Run keys to establish automatic execution at system startup.<\/td><\/tr><tr><td>Enterprise<\/td><td>T1185<\/td><td>&nbsp;<\/td><td>Browser Session Hijacking<\/td><td>Ursnif&nbsp;has injected HTML codes into banking sites to steal sensitive online banking information (ex: usernames and passwords).&nbsp;<\/td><\/tr><tr><td>Enterprise<\/td><td>T1059<\/td><td>0.001<\/td><td>Command and Scripting Interpreter:&nbsp;PowerShell<\/td><td>Ursnif&nbsp;droppers have used PowerShell in download cradles to download and execute the malware&#8217;s full executable payload.<\/td><\/tr><tr><td>&nbsp;<\/td><td>&nbsp;<\/td><td>0.005<\/td><td>Command and Scripting Interpreter:&nbsp;Visual Basic<\/td><td>Ursnif&nbsp;droppers have used VBA macros to download and execute the malware&#8217;s full executable payload.<\/td><\/tr><tr><td>Enterprise<\/td><td>T1543<\/td><td>0.003<\/td><td>Create or Modify System Process:&nbsp;Windows Service<\/td><td>Ursnif&nbsp;has registered itself as a system service in the Registry for automatic execution at system startup.<\/td><\/tr><tr><td>Enterprise<\/td><td>T1132<\/td><td>&nbsp;<\/td><td>Data Encoding<\/td><td>Ursnif&nbsp;has used encoded data in HTTP URLs for C2.&nbsp;<\/td><\/tr><tr><td>Enterprise<\/td><td>T1005<\/td><td>&nbsp;<\/td><td>Data from Local System<\/td><td>Ursnif&nbsp;has collected files from victim machines, including certificates and cookies.&nbsp;<\/td><\/tr><tr><td>Enterprise<\/td><td>T1074<\/td><td>0.001<\/td><td>Data Staged:&nbsp;Local Data Staging<\/td><td>Ursnif&nbsp;has used tmp files to stage gathered information.<\/td><\/tr><tr><td>Enterprise<\/td><td>T1140<\/td><td>&nbsp;<\/td><td>Deobfuscate\/Decode Files or Information<\/td><td>Ursnif&nbsp;has used crypto key information stored in the Registry to decrypt Tor clients dropped to disk.&nbsp;<\/td><\/tr><tr><td>Enterprise<\/td><td>T1568<\/td><td>0.002<\/td><td>Dynamic Resolution:&nbsp;Domain Generation Algorithms<\/td><td>Ursnif&nbsp;has used a DGA to generate domain names for C2.<\/td><\/tr><tr><td>Enterprise<\/td><td>T1041<\/td><td>&nbsp;<\/td><td>Exfiltration Over C2 Channel<\/td><td>Ursnif&nbsp;has used HTTP POSTs to exfil gathered information.&nbsp;<\/td><\/tr><tr><td>Enterprise<\/td><td>T1564<\/td><td>0.003<\/td><td>Hide Artifacts:&nbsp;Hidden Window<\/td><td>Ursnif&nbsp;droppers have used COM properties to execute malware in hidden windows.<\/td><\/tr><tr><td>Enterprise<\/td><td>T1070<\/td><td>0.004<\/td><td>Indicator Removal on Host:&nbsp;File Deletion<\/td><td>Ursnif&nbsp;has deleted data staged in tmp files after exfiltration.<\/td><\/tr><tr><td>Enterprise<\/td><td>T1105<\/td><td>&nbsp;<\/td><td>Ingress Tool Transfer<\/td><td>Ursnif&nbsp;has dropped payload and configuration files to disk.&nbsp;Ursnif&nbsp;has also been used to download and execute additional payloads.&nbsp;<\/td><\/tr><tr><td>Enterprise<\/td><td>T1056<\/td><td>0.004<\/td><td>Input Capture:&nbsp;Credential API Hooking<\/td><td>Ursnif&nbsp;has hooked APIs to perform a wide variety of information theft, such as monitoring traffic from browsers.<\/td><\/tr><tr><td>Enterprise<\/td><td>T1559<\/td><td>0.001<\/td><td>Inter-Process Communication:&nbsp;Component Object Model<\/td><td>Ursnif&nbsp;droppers have used COM objects to execute the malware&#8217;s full executable payload.<\/td><\/tr><tr><td>Enterprise<\/td><td>T1036<\/td><td>0.005<\/td><td>Masquerading:&nbsp;Match Legitimate Name or Location<\/td><td>Ursnif&nbsp;has used strings from legitimate system files and existing folders for its file, folder, and Registry entry names.<\/td><\/tr><tr><td>Enterprise<\/td><td>T1112<\/td><td>&nbsp;<\/td><td>Modify Registry<\/td><td>Ursnif&nbsp;has used Registry modifications as part of its installation routine.&nbsp;<\/td><\/tr><tr><td>Enterprise<\/td><td>T1106<\/td><td>&nbsp;<\/td><td>Native API<\/td><td>Ursnif&nbsp;has used&nbsp;CreateProcessW&nbsp;to create child processes.&nbsp;<\/td><\/tr><tr><td>Enterprise<\/td><td>T1027<\/td><td>&nbsp;<\/td><td>Obfuscated Files (OR) Information<\/td><td>Ursnif&nbsp;has used an XOR-based algorithm to encrypt Tor clients dropped to disk.[2]&nbsp;Ursnif&nbsp;droppers have also been delivered as password-protected zip files that execute base64 encoded&nbsp;PowerShell&nbsp;commands.&nbsp;<\/td><\/tr><tr><td>Enterprise<\/td><td>T1057<\/td><td>&nbsp;<\/td><td>Process Discovery<\/td><td>Ursnif&nbsp;has gathered information about running processes.&nbsp;<\/td><\/tr><tr><td>Enterprise<\/td><td>T1055<\/td><td>0.005<\/td><td>Process Injection:&nbsp;Thread Local Storage<\/td><td>Ursnif&nbsp;has injected code into target processes via thread local storage callbacks.<\/td><\/tr><tr><td>&nbsp;<\/td><td>&nbsp;<\/td><td>0.012<\/td><td>Process Injection:&nbsp;Process Hollowing<\/td><td>Ursnif&nbsp;has used process hollowing to inject into child processes.<\/td><\/tr><tr><td>Enterprise<\/td><td>T1090<\/td><td>&nbsp;<\/td><td>Proxy<\/td><td>Ursnif&nbsp;has used a peer-to-peer (P2P) network for C2.&nbsp;<\/td><\/tr><tr><td>&nbsp;<\/td><td>&nbsp;<\/td><td>0.003<\/td><td>Multi-hop Proxy<\/td><td>Ursnif&nbsp;has used&nbsp;Tor&nbsp;for C2.<\/td><\/tr><tr><td>Enterprise<\/td><td>T1012<\/td><td>&nbsp;<\/td><td>Query Registry<\/td><td>Ursnif&nbsp;has used&nbsp;Reg&nbsp;to query the Registry for installed programs.&nbsp;<\/td><\/tr><tr><td>Enterprise<\/td><td>T1091<\/td><td>&nbsp;<\/td><td>Replication Through Removable Media<\/td><td>Ursnif&nbsp;has copied itself to and infected removable drives for propagation.&nbsp;<\/td><\/tr><tr><td>Enterprise<\/td><td>T1113<\/td><td>&nbsp;<\/td><td>Screen Capture<\/td><td>Ursnif&nbsp;has used hooked APIs to take screenshots.&nbsp;<\/td><\/tr><tr><td>Enterprise<\/td><td>T1082<\/td><td>&nbsp;<\/td><td>System Information Discovery<\/td><td>Ursnif&nbsp;has used&nbsp;Systeminfo&nbsp;to gather system information.&nbsp;<\/td><\/tr><tr><td>Enterprise<\/td><td>T1007<\/td><td>&nbsp;<\/td><td>System Service Discovery<\/td><td>Ursnif&nbsp;has gathered information about running services.&nbsp;<\/td><\/tr><tr><td>Enterprise<\/td><td>T1080<\/td><td>&nbsp;<\/td><td>Taint Shared Content<\/td><td>Ursnif&nbsp;has copied itself to and infected files in network drives for propagation.&nbsp;<\/td><\/tr><tr><td>Enterprise<\/td><td>T1497<\/td><td>0.003<\/td><td>Virtualization\/Sandbox Evasion:&nbsp;Time Based Evasion<\/td><td>Ursnif&nbsp;has used a 30 minute delay after execution to evade sandbox monitoring tools.<\/td><\/tr><tr><td>Enterprise<\/td><td>T1047<\/td><td>&nbsp;<\/td><td>Windows Management Instrumentation<\/td><td>Ursnif&nbsp;droppers have used WMI classes to execute&nbsp;PowerShell&nbsp;commands.&nbsp;<\/td><\/tr><\/tbody><\/table><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Introduction ISFB (URSnif, also known as Gozi), is one of the most widely spread banking trojans &ndash; it is aimed to steal the banking credentials and commonly targeting the corporate users. The malware was among the Top 10 malicious strains to infect the healthcare industry. ISFB\/Ursnif has undergone several development iterations since its source code [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":2111,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21],"tags":[],"class_list":["post-2110","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-labs"],"_links":{"self":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/2110","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/comments?post=2110"}],"version-history":[{"count":3,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/2110\/revisions"}],"predecessor-version":[{"id":4205,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/2110\/revisions\/4205"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/media\/2111"}],"wp:attachment":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/media?parent=2110"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/categories?post=2110"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/tags?post=2110"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}