Loading ...

Play interactive tourEdit tour

Analysis Report 606e7fb752fbd.rar.dll

Overview

General Information

Sample Name:606e7fb752fbd.rar.dll
Analysis ID:383661
MD5:8bf44d2b3b9b7c0fa2754fbe6ad14a63
SHA1:76d4ed4512d34edd5a34b917957654fedbfae23f
SHA256:cb7c95db9ce05d2304a4a98687a4b92f85081e1b7397820a52487b277ee1f2e1
Tags:BRTdllgeogoziisfbITAursnif
Infos:

Most interesting Screenshot:

Detection

Ursnif
Score:56
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Yara detected Ursnif
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found potential string decryption / allocating functions
PE file contains an invalid checksum
Program does not show much activity (idle)
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

Startup

  • System is w10x64
  • loaddll32.exe (PID: 6444 cmdline: loaddll32.exe 'C:\Users\user\Desktop\606e7fb752fbd.rar.dll' MD5: 542795ADF7CC08EFCF675D65310596E8)
    • cmd.exe (PID: 6456 cmdline: cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\606e7fb752fbd.rar.dll',#1 MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • rundll32.exe (PID: 6476 cmdline: rundll32.exe 'C:\Users\user\Desktop\606e7fb752fbd.rar.dll',#1 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 6464 cmdline: rundll32.exe C:\Users\user\Desktop\606e7fb752fbd.rar.dll,Choosethan MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 6516 cmdline: rundll32.exe C:\Users\user\Desktop\606e7fb752fbd.rar.dll,Especiallyyes MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 6532 cmdline: rundll32.exe C:\Users\user\Desktop\606e7fb752fbd.rar.dll,Guesscover MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 6552 cmdline: rundll32.exe C:\Users\user\Desktop\606e7fb752fbd.rar.dll,Learncut MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 6596 cmdline: rundll32.exe C:\Users\user\Desktop\606e7fb752fbd.rar.dll,OnceOut MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
  • cleanup

Malware Configuration

Threatname: Ursnif

[{"RSA Public Key": "YKwVOU5rJLi0k2wc/Sa//orn/I3K6zI6HgJKpraE6XyxxZAjZUdVyZ9IFso22JAAB2G4qzzp3TU2DJqhIyPO7xVeI9l7K9H9VlKfzYozAbxBQCrtZPEdPyCguw2FwPnt3aL3viJmXn26e8PXSevTHzQdNxMCe42eyfgYxlDVzbkJTLhI91j/G+/dxO1/TdYY"}, {"c2_domain": ["ocsp2.digicert.com", "aus6.mozilla.org", "durenoluneer.xyz", "surenoluneer.xyz"], "botnet": "8877", "server": "12", "serpent_key": "30218409ILPAJDUR", "sleep_time": "10", "SetWaitableTimer_value": "0", "DGA_count": "10"}]

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000003.00000003.874026586.0000000000EC0000.00000040.00000001.sdmpJoeSecurity_Ursnif_1Yara detected UrsnifJoe Security
    00000002.00000003.873095643.0000000000F10000.00000040.00000001.sdmpJoeSecurity_Ursnif_1Yara detected UrsnifJoe Security
      00000004.00000003.890597997.0000000000C50000.00000040.00000001.sdmpJoeSecurity_Ursnif_1Yara detected UrsnifJoe Security

        Unpacked PEs

        SourceRuleDescriptionAuthorStrings
        4.3.rundll32.exe.c5a4b1.0.raw.unpackJoeSecurity_Ursnif_1Yara detected UrsnifJoe Security
          4.2.rundll32.exe.6d450000.3.unpackJoeSecurity_Ursnif_1Yara detected UrsnifJoe Security
            5.2.rundll32.exe.6d450000.1.unpackJoeSecurity_Ursnif_1Yara detected UrsnifJoe Security
              2.3.rundll32.exe.f1a4b1.0.raw.unpackJoeSecurity_Ursnif_1Yara detected UrsnifJoe Security
                3.3.rundll32.exe.eca4b1.0.raw.unpackJoeSecurity_Ursnif_1Yara detected UrsnifJoe Security
                  Click to see the 2 entries

                  Sigma Overview

                  No Sigma rule has matched

                  Signature Overview

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection:

                  barindex
                  Found malware configurationShow sources
                  Source: 4.2.rundll32.exe.4cc94a0.2.raw.unpackMalware Configuration Extractor: Ursnif [{"RSA Public Key": "YKwVOU5rJLi0k2wc/Sa//orn/I3K6zI6HgJKpraE6XyxxZAjZUdVyZ9IFso22JAAB2G4qzzp3TU2DJqhIyPO7xVeI9l7K9H9VlKfzYozAbxBQCrtZPEdPyCguw2FwPnt3aL3viJmXn26e8PXSevTHzQdNxMCe42eyfgYxlDVzbkJTLhI91j/G+/dxO1/TdYY"}, {"c2_domain": ["ocsp2.digicert.com", "aus6.mozilla.org", "durenoluneer.xyz", "surenoluneer.xyz"], "botnet": "8877", "server": "12", "serpent_key": "30218409ILPAJDUR", "sleep_time": "10", "SetWaitableTimer_value": "0", "DGA_count": "10"}]
                  Source: 606e7fb752fbd.rar.dllStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
                  Source: 606e7fb752fbd.rar.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT
                  Source: Binary string: c:\hot\905_grow\310_Together\Brought.pdb source: loaddll32.exe, 00000000.00000002.901043048.000000006D500000.00000002.00020000.sdmp, rundll32.exe, 00000002.00000002.908140362.000000006D500000.00000002.00020000.sdmp, rundll32.exe, 00000003.00000002.901888879.000000006D500000.00000002.00020000.sdmp, rundll32.exe, 00000004.00000002.908539337.000000006D500000.00000002.00020000.sdmp, rundll32.exe, 00000005.00000002.910191671.000000006D500000.00000002.00020000.sdmp, rundll32.exe, 00000006.00000002.901492823.000000006D500000.00000002.00020000.sdmp, rundll32.exe, 00000009.00000002.901601437.000000006D500000.00000002.00020000.sdmp, 606e7fb752fbd.rar.dll

                  Key, Mouse, Clipboard, Microphone and Screen Capturing:

                  barindex
                  Yara detected UrsnifShow sources
                  Source: Yara matchFile source: 00000003.00000003.874026586.0000000000EC0000.00000040.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000003.873095643.0000000000F10000.00000040.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000003.890597997.0000000000C50000.00000040.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 4.3.rundll32.exe.c5a4b1.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.rundll32.exe.6d450000.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.2.rundll32.exe.6d450000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.3.rundll32.exe.f1a4b1.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.3.rundll32.exe.eca4b1.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.2.rundll32.exe.6d450000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.rundll32.exe.6d450000.2.unpack, type: UNPACKEDPE

                  E-Banking Fraud:

                  barindex
                  Yara detected UrsnifShow sources
                  Source: Yara matchFile source: 00000003.00000003.874026586.0000000000EC0000.00000040.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000003.873095643.0000000000F10000.00000040.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000003.890597997.0000000000C50000.00000040.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 4.3.rundll32.exe.c5a4b1.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.rundll32.exe.6d450000.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.2.rundll32.exe.6d450000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.3.rundll32.exe.f1a4b1.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.3.rundll32.exe.eca4b1.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.2.rundll32.exe.6d450000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.rundll32.exe.6d450000.2.unpack, type: UNPACKEDPE
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_6D452375 NtQueryVirtualMemory,
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D452375 NtQueryVirtualMemory,
                  Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6D494D40
                  Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6D492FAD
                  Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6D4C6EC9
                  Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6D4A6B40
                  Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6D456B50
                  Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6D4C3507
                  Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6D4695D0
                  Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6D465590
                  Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6D4B05A8
                  Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6D4641B0
                  Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6D4BA02F
                  Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6D4D00FC
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_6D452154
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_6D494D40
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_6D4C3507
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_6D492FAD
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_6D4641B0
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_6D4BA02F
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_6D4A6B40
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D452154
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D494D40
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D4C3507
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D492FAD
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D4641B0
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D4BA02F
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D4A6B40
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6D494D40
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6D4C3507
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6D492FAD
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6D4641B0
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6D4BA02F
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6D4A6B40
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_6D494D40
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_6D4C3507
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_6D4A4C5F
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_6D492FAD
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_6D4641B0
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_6D4BA02F
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_6D4A6B40
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_6D494D40
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_6D492FAD
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_6D4C6EC9
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_6D4A6B40
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_6D456B50
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_6D4C3507
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_6D4695D0
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_6D465590
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_6D4B05A8
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_6D4641B0
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_6D4BA02F
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_6D4D00FC
                  Source: C:\Windows\System32\loaddll32.exeCode function: String function: 6D490E9E appears 83 times
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 6D490ED2 appears 44 times
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 6D491790 appears 123 times
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 6D490E9E appears 407 times
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 6D4B491D appears 55 times
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 6D4B4776 appears 74 times
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 6D490F09 appears 35 times
                  Source: 606e7fb752fbd.rar.dllBinary or memory string: OriginalFilenameBrought.dll. vs 606e7fb752fbd.rar.dll
                  Source: 606e7fb752fbd.rar.dllStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
                  Source: classification engineClassification label: mal56.troj.winDLL@15/0@0/0
                  Source: 606e7fb752fbd.rar.dllStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                  Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                  Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\606e7fb752fbd.rar.dll,Choosethan
                  Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe 'C:\Users\user\Desktop\606e7fb752fbd.rar.dll'
                  Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\606e7fb752fbd.rar.dll',#1
                  Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\606e7fb752fbd.rar.dll,Choosethan
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\606e7fb752fbd.rar.dll',#1
                  Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\606e7fb752fbd.rar.dll,Especiallyyes
                  Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\606e7fb752fbd.rar.dll,Guesscover
                  Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\606e7fb752fbd.rar.dll,Learncut
                  Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\606e7fb752fbd.rar.dll,OnceOut
                  Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\606e7fb752fbd.rar.dll',#1
                  Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\606e7fb752fbd.rar.dll,Choosethan
                  Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\606e7fb752fbd.rar.dll,Especiallyyes
                  Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\606e7fb752fbd.rar.dll,Guesscover
                  Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\606e7fb752fbd.rar.dll,Learncut
                  Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\606e7fb752fbd.rar.dll,OnceOut
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\606e7fb752fbd.rar.dll',#1
                  Source: C:\Windows\SysWOW64\rundll32.exeAutomated click: OK
                  Source: C:\Windows\SysWOW64\rundll32.exeAutomated click: OK
                  Source: C:\Windows\SysWOW64\rundll32.exeAutomated click: OK
                  Source: C:\Windows\SysWOW64\rundll32.exeAutomated click: OK
                  Source: 606e7fb752fbd.rar.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                  Source: 606e7fb752fbd.rar.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                  Source: 606e7fb752fbd.rar.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                  Source: 606e7fb752fbd.rar.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: 606e7fb752fbd.rar.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                  Source: 606e7fb752fbd.rar.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                  Source: 606e7fb752fbd.rar.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT
                  Source: 606e7fb752fbd.rar.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: Binary string: c:\hot\905_grow\310_Together\Brought.pdb source: loaddll32.exe, 00000000.00000002.901043048.000000006D500000.00000002.00020000.sdmp, rundll32.exe, 00000002.00000002.908140362.000000006D500000.00000002.00020000.sdmp, rundll32.exe, 00000003.00000002.901888879.000000006D500000.00000002.00020000.sdmp, rundll32.exe, 00000004.00000002.908539337.000000006D500000.00000002.00020000.sdmp, rundll32.exe, 00000005.00000002.910191671.000000006D500000.00000002.00020000.sdmp, rundll32.exe, 00000006.00000002.901492823.000000006D500000.00000002.00020000.sdmp, rundll32.exe, 00000009.00000002.901601437.000000006D500000.00000002.00020000.sdmp, 606e7fb752fbd.rar.dll
                  Source: 606e7fb752fbd.rar.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                  Source: 606e7fb752fbd.rar.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                  Source: 606e7fb752fbd.rar.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                  Source: 606e7fb752fbd.rar.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                  Source: 606e7fb752fbd.rar.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_6D451745 LoadLibraryA,GetProcAddress,
                  Source: 606e7fb752fbd.rar.dllStatic PE information: real checksum: 0xfd487 should be: 0xff097
                  Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6D490E67 push ecx; ret
                  Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6D4917D6 push ecx; ret
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_6D452143 push ecx; ret
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_6D4520F0 push ecx; ret
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_6D4917D6 push ecx; ret
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_6D490E67 push ecx; ret
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D452143 push ecx; ret
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D4520F0 push ecx; ret
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D4917D6 push ecx; ret
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D490E67 push ecx; ret
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6D4917D6 push ecx; ret
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6D490E67 push ecx; ret
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_6D4917D6 push ecx; ret
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_6D490E67 push ecx; ret
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_6D490E67 push ecx; ret
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_6D4917D6 push ecx; ret

                  Hooking and other Techniques for Hiding and Protection:

                  barindex
                  Yara detected UrsnifShow sources
                  Source: Yara matchFile source: 00000003.00000003.874026586.0000000000EC0000.00000040.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000003.873095643.0000000000F10000.00000040.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000003.890597997.0000000000C50000.00000040.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 4.3.rundll32.exe.c5a4b1.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.rundll32.exe.6d450000.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.2.rundll32.exe.6d450000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.3.rundll32.exe.f1a4b1.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.3.rundll32.exe.eca4b1.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.2.rundll32.exe.6d450000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.rundll32.exe.6d450000.2.unpack, type: UNPACKEDPE
                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                  Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
                  Source: C:\Windows\System32\loaddll32.exeLast function: Thread delayed
                  Source: C:\Windows\SysWOW64\rundll32.exeLast function: Thread delayed
                  Source: C:\Windows\SysWOW64\rundll32.exeLast function: Thread delayed
                  Source: C:\Windows\SysWOW64\rundll32.exeLast function: Thread delayed
                  Source: C:\Windows\SysWOW64\rundll32.exeLast function: Thread delayed
                  Source: C:\Windows\SysWOW64\rundll32.exeLast function: Thread delayed
                  Source: C:\Windows\SysWOW64\rundll32.exeLast function: Thread delayed
                  Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6D4B3EDA IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_6D451745 LoadLibraryA,GetProcAddress,
                  Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6D4BAD71 mov eax, dword ptr fs:[00000030h]
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_6D4BAD71 mov eax, dword ptr fs:[00000030h]
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_6D541746 mov eax, dword ptr fs:[00000030h]
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_6D54167C mov eax, dword ptr fs:[00000030h]
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_6D541283 push dword ptr fs:[00000030h]
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D4BAD71 mov eax, dword ptr fs:[00000030h]
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D541746 mov eax, dword ptr fs:[00000030h]
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D54167C mov eax, dword ptr fs:[00000030h]
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D541283 push dword ptr fs:[00000030h]
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6D4BAD71 mov eax, dword ptr fs:[00000030h]
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6D541746 mov eax, dword ptr fs:[00000030h]
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6D54167C mov eax, dword ptr fs:[00000030h]
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6D541283 push dword ptr fs:[00000030h]
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_6D4BAD71 mov eax, dword ptr fs:[00000030h]
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_6D4BAD71 mov eax, dword ptr fs:[00000030h]
                  Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
                  Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6D4B3EDA IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                  Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6D491078 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                  Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6D49138C IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_6D4B3EDA IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_6D491078 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D4B3EDA IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D491078 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6D4B3EDA IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6D491078 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_6D4B3EDA IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_6D491078 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_6D4B3EDA IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_6D491078 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_6D49138C IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\606e7fb752fbd.rar.dll',#1
                  Source: loaddll32.exe, 00000000.00000002.900668496.0000000000BA0000.00000002.00000001.sdmp, rundll32.exe, 00000002.00000002.901484262.00000000033A0000.00000002.00000001.sdmp, rundll32.exe, 00000003.00000002.901496797.00000000033A0000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.901571033.00000000033A0000.00000002.00000001.sdmp, rundll32.exe, 00000005.00000002.901722448.0000000003010000.00000002.00000001.sdmp, rundll32.exe, 00000006.00000002.901100477.0000000003010000.00000002.00000001.sdmp, rundll32.exe, 00000009.00000002.901151375.0000000003600000.00000002.00000001.sdmpBinary or memory string: Program Manager
                  Source: loaddll32.exe, 00000000.00000002.900668496.0000000000BA0000.00000002.00000001.sdmp, rundll32.exe, 00000002.00000002.901484262.00000000033A0000.00000002.00000001.sdmp, rundll32.exe, 00000003.00000002.901496797.00000000033A0000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.901571033.00000000033A0000.00000002.00000001.sdmp, rundll32.exe, 00000005.00000002.901722448.0000000003010000.00000002.00000001.sdmp, rundll32.exe, 00000006.00000002.901100477.0000000003010000.00000002.00000001.sdmp, rundll32.exe, 00000009.00000002.901151375.0000000003600000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
                  Source: loaddll32.exe, 00000000.00000002.900668496.0000000000BA0000.00000002.00000001.sdmp, rundll32.exe, 00000002.00000002.901484262.00000000033A0000.00000002.00000001.sdmp, rundll32.exe, 00000003.00000002.901496797.00000000033A0000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.901571033.00000000033A0000.00000002.00000001.sdmp, rundll32.exe, 00000005.00000002.901722448.0000000003010000.00000002.00000001.sdmp, rundll32.exe, 00000006.00000002.901100477.0000000003010000.00000002.00000001.sdmp, rundll32.exe, 00000009.00000002.901151375.0000000003600000.00000002.00000001.sdmpBinary or memory string: Progman
                  Source: loaddll32.exe, 00000000.00000002.900668496.0000000000BA0000.00000002.00000001.sdmp, rundll32.exe, 00000002.00000002.901484262.00000000033A0000.00000002.00000001.sdmp, rundll32.exe, 00000003.00000002.901496797.00000000033A0000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.901571033.00000000033A0000.00000002.00000001.sdmp, rundll32.exe, 00000005.00000002.901722448.0000000003010000.00000002.00000001.sdmp, rundll32.exe, 00000006.00000002.901100477.0000000003010000.00000002.00000001.sdmp, rundll32.exe, 00000009.00000002.901151375.0000000003600000.00000002.00000001.sdmpBinary or memory string: Progmanlock
                  Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6D4906EF cpuid
                  Source: C:\Windows\System32\loaddll32.exeCode function: GetLocaleInfoW,
                  Source: C:\Windows\System32\loaddll32.exeCode function: ___crtGetLocaleInfoEx,
                  Source: C:\Windows\System32\loaddll32.exeCode function: EnumSystemLocalesW,
                  Source: C:\Windows\System32\loaddll32.exeCode function: GetLocaleInfoW,
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: EnumSystemLocalesW,
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: EnumSystemLocalesW,
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: ___crtGetLocaleInfoEx,
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: EnumSystemLocalesW,
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: EnumSystemLocalesW,
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoW,
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoW,
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: EnumSystemLocalesW,
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: EnumSystemLocalesW,
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: ___crtGetLocaleInfoEx,
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: EnumSystemLocalesW,
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: EnumSystemLocalesW,
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoW,
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoW,
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: EnumSystemLocalesW,
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: EnumSystemLocalesW,
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: ___crtGetLocaleInfoEx,
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: EnumSystemLocalesW,
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: EnumSystemLocalesW,
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoW,
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoW,
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: EnumSystemLocalesW,
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: EnumSystemLocalesW,
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: ___crtGetLocaleInfoEx,
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: EnumSystemLocalesW,
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: EnumSystemLocalesW,
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoW,
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoW,
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoW,
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: ___crtGetLocaleInfoEx,
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: EnumSystemLocalesW,
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoW,
                  Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6D47B218 GetSystemTimeAsFileTime,
                  Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6D4C8870 _free,_free,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,
                  Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_6D451850 CreateEventA,GetVersion,GetCurrentProcessId,OpenProcess,GetLastError,

                  Stealing of Sensitive Information:

                  barindex
                  Yara detected UrsnifShow sources
                  Source: Yara matchFile source: 00000003.00000003.874026586.0000000000EC0000.00000040.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000003.873095643.0000000000F10000.00000040.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000003.890597997.0000000000C50000.00000040.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 4.3.rundll32.exe.c5a4b1.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.rundll32.exe.6d450000.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.2.rundll32.exe.6d450000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.3.rundll32.exe.f1a4b1.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.3.rundll32.exe.eca4b1.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.2.rundll32.exe.6d450000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.rundll32.exe.6d450000.2.unpack, type: UNPACKEDPE

                  Remote Access Functionality:

                  barindex
                  Yara detected UrsnifShow sources
                  Source: Yara matchFile source: 00000003.00000003.874026586.0000000000EC0000.00000040.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000003.873095643.0000000000F10000.00000040.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000003.890597997.0000000000C50000.00000040.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 4.3.rundll32.exe.c5a4b1.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.rundll32.exe.6d450000.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.2.rundll32.exe.6d450000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.3.rundll32.exe.f1a4b1.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.3.rundll32.exe.eca4b1.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.2.rundll32.exe.6d450000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.rundll32.exe.6d450000.2.unpack, type: UNPACKEDPE

                  Mitre Att&ck Matrix

                  Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                  Valid AccountsNative API1Path InterceptionProcess Injection12Rundll321OS Credential DumpingSystem Time Discovery2Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                  Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsProcess Injection12LSASS MemorySecurity Software Discovery1Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                  Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Deobfuscate/Decode Files or Information1Security Account ManagerProcess Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                  Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Obfuscated Files or Information2NTDSSystem Information Discovery23Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud

                  Behavior Graph

                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet
                  behaviorgraph top1 signatures2 2 Behavior Graph ID: 383661 Sample: 606e7fb752fbd.rar.dll Startdate: 08/04/2021 Architecture: WINDOWS Score: 56 19 Found malware configuration 2->19 21 Yara detected  Ursnif 2->21 7 loaddll32.exe 1 2->7         started        process3 process4 9 cmd.exe 1 7->9         started        11 rundll32.exe 7->11         started        13 rundll32.exe 7->13         started        15 3 other processes 7->15 process5 17 rundll32.exe 9->17         started       

                  Screenshots

                  Thumbnails

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                  windows-stand

                  Antivirus, Machine Learning and Genetic Malware Detection

                  Initial Sample

                  SourceDetectionScannerLabelLink
                  606e7fb752fbd.rar.dll6%ReversingLabsWin32.Trojan.Ursnif

                  Dropped Files

                  No Antivirus matches

                  Unpacked PE Files

                  SourceDetectionScannerLabelLinkDownload
                  4.2.rundll32.exe.d10000.1.unpack100%AviraHEUR/AGEN.1108168Download File

                  Domains

                  No Antivirus matches

                  URLs

                  No Antivirus matches

                  Domains and IPs

                  Contacted Domains

                  No contacted domains info

                  Contacted IPs

                  No contacted IP infos

                  General Information

                  Joe Sandbox Version:31.0.0 Emerald
                  Analysis ID:383661
                  Start date:08.04.2021
                  Start time:06:02:11
                  Joe Sandbox Product:CloudBasic
                  Overall analysis duration:0h 10m 19s
                  Hypervisor based Inspection enabled:false
                  Report type:light
                  Sample file name:606e7fb752fbd.rar.dll
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                  Number of analysed new started processes analysed:12
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • HDC enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Detection:MAL
                  Classification:mal56.troj.winDLL@15/0@0/0
                  EGA Information:Failed
                  HDC Information:
                  • Successful, ratio: 9% (good quality ratio 8.5%)
                  • Quality average: 71.3%
                  • Quality standard deviation: 26.8%
                  HCA Information:Failed
                  Cookbook Comments:
                  • Adjust boot time
                  • Enable AMSI
                  • Found application associated with file extension: .dll
                  Warnings:
                  Show All
                  • Exclude process from analysis (whitelisted): taskhostw.exe, RuntimeBroker.exe, backgroundTaskHost.exe, UsoClient.exe
                  • Report creation exceeded maximum time and may have missing disassembly code information.

                  Simulations

                  Behavior and APIs

                  No simulations

                  Joe Sandbox View / Context

                  IPs

                  No context

                  Domains

                  No context

                  ASN

                  No context

                  JA3 Fingerprints

                  No context

                  Dropped Files

                  No context

                  Created / dropped Files

                  No created / dropped files found

                  Static File Info

                  General

                  File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                  Entropy (8bit):6.562725713508687
                  TrID:
                  • Win32 Dynamic Link Library (generic) (1002004/3) 99.40%
                  • Generic Win/DOS Executable (2004/3) 0.20%
                  • DOS Executable Generic (2002/1) 0.20%
                  • Disk Image (Macintosh), GPT (2000/0) 0.20%
                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                  File name:606e7fb752fbd.rar.dll
                  File size:1007104
                  MD5:8bf44d2b3b9b7c0fa2754fbe6ad14a63
                  SHA1:76d4ed4512d34edd5a34b917957654fedbfae23f
                  SHA256:cb7c95db9ce05d2304a4a98687a4b92f85081e1b7397820a52487b277ee1f2e1
                  SHA512:58d7912fb2486ee944cda295f80293bed6f207631fd79611a64e350f60bc6ff662fc9f66a1e57fefbe9998d081b6f92807ed7ca85dafaa7a313ff7047decede8
                  SSDEEP:24576:lLtF9jICeGoQ8T1Mk7Hv/3+MM9hbAK0uf:/FpPeGovT1t33+p9hbAK0uf
                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$......."6..fW..fW..fW....l.kW....n..W....o.{W..4?..pW..4?..PW..4?..yW..o/..oW..fW...W...>..gW...>..gW...>b.gW...>..gW..RichfW.........

                  File Icon

                  Icon Hash:74f0e4ecccdce0e4

                  Static PE Info

                  General

                  Entrypoint:0x1040e44
                  Entrypoint Section:.text
                  Digitally signed:false
                  Imagebase:0x1000000
                  Subsystem:windows gui
                  Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
                  DLL Characteristics:DYNAMIC_BASE, NX_COMPAT
                  Time Stamp:0x5AC0F310 [Sun Apr 1 14:56:16 2018 UTC]
                  TLS Callbacks:
                  CLR (.Net) Version:
                  OS Version Major:6
                  OS Version Minor:0
                  File Version Major:6
                  File Version Minor:0
                  Subsystem Version Major:6
                  Subsystem Version Minor:0
                  Import Hash:935187af3562f5148cd8683f99f748de

                  Entrypoint Preview

                  Instruction
                  push ebp
                  mov ebp, esp
                  cmp dword ptr [ebp+0Ch], 01h
                  jne 00007FB32D027867h
                  call 00007FB32D02824Bh
                  push dword ptr [ebp+10h]
                  push dword ptr [ebp+0Ch]
                  push dword ptr [ebp+08h]
                  call 00007FB32D02770Fh
                  add esp, 0Ch
                  pop ebp
                  retn 000Ch
                  mov ecx, dword ptr [ebp-0Ch]
                  mov dword ptr fs:[00000000h], ecx
                  pop ecx
                  pop edi
                  pop edi
                  pop esi
                  pop ebx
                  mov esp, ebp
                  pop ebp
                  push ecx
                  ret
                  mov ecx, dword ptr [ebp-10h]
                  xor ecx, ebp
                  call 00007FB32D026DC2h
                  jmp 00007FB32D027840h
                  mov ecx, dword ptr [ebp-14h]
                  xor ecx, ebp
                  call 00007FB32D026DB1h
                  jmp 00007FB32D02782Fh
                  push eax
                  push dword ptr fs:[00000000h]
                  lea eax, dword ptr [esp+0Ch]
                  sub esp, dword ptr [esp+0Ch]
                  push ebx
                  push esi
                  push edi
                  mov dword ptr [eax], ebp
                  mov ebp, eax
                  mov eax, dword ptr [010E4074h]
                  xor eax, ebp
                  push eax
                  push dword ptr [ebp-04h]
                  mov dword ptr [ebp-04h], FFFFFFFFh
                  lea eax, dword ptr [ebp-0Ch]
                  mov dword ptr fs:[00000000h], eax
                  ret
                  push eax
                  push dword ptr fs:[00000000h]
                  lea eax, dword ptr [esp+0Ch]
                  sub esp, dword ptr [esp+0Ch]
                  push ebx
                  push esi
                  push edi
                  mov dword ptr [eax], ebp
                  mov ebp, eax
                  mov eax, dword ptr [010E4074h]
                  xor eax, ebp
                  push eax
                  mov dword ptr [ebp-10h], eax
                  push dword ptr [ebp-04h]
                  mov dword ptr [ebp-04h], FFFFFFFFh
                  lea eax, dword ptr [ebp-0Ch]
                  mov dword ptr fs:[00000000h], eax
                  ret
                  push eax
                  inc dword ptr fs:[eax]

                  Rich Headers

                  Programming Language:
                  • [IMP] VS2008 SP1 build 30729

                  Data Directories

                  NameVirtual AddressVirtual Size Is in Section
                  IMAGE_DIRECTORY_ENTRY_EXPORT0xe2c400x9c.rdata
                  IMAGE_DIRECTORY_ENTRY_IMPORT0xe2cdc0x64.rdata
                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x10b0000x528.rsrc
                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x10c0000x703c.reloc
                  IMAGE_DIRECTORY_ENTRY_DEBUG0xd8cf00x54.rdata
                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                  IMAGE_DIRECTORY_ENTRY_TLS0xd8de80x18.rdata
                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xd8d480x40.rdata
                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IAT0xb00000x1e8.rdata
                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                  Sections

                  NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                  .text0x10000xaef210xaf000False0.524893973214data6.69988661327IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                  .rdata0xb00000x337980x33800False0.528073801578data5.1051416342IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  .data0xe40000x26b600xba00False0.562668010753data4.83370710676IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                  .rsrc0x10b0000x5280x600False0.412109375data3.76195156474IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  .reloc0x10c0000x703c0x7200False0.694421600877data6.654304142IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                  Resources

                  NameRVASizeTypeLanguageCountry
                  RT_VERSION0x10b0a00x304dataEnglishUnited States
                  RT_MANIFEST0x10b3a80x17dXML 1.0 document textEnglishUnited States

                  Imports

                  DLLImport
                  KERNEL32.dllGetShortPathNameA, WaitForMultipleObjects, GetEnvironmentVariableA, Sleep, GetTempPathA, CopyFileA, GetFileAttributesA, GetSystemDirectoryA, GetWindowsDirectoryA, VirtualProtectEx, CreateProcessA, CreateSemaphoreA, OutputDebugStringW, OutputDebugStringA, SetEndOfFile, HeapSize, WriteConsoleW, SetStdHandle, CreateFileW, GetProcessHeap, SetEnvironmentVariableW, SetEnvironmentVariableA, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineW, GetCommandLineA, GetOEMCP, IsValidCodePage, MultiByteToWideChar, GetLastError, FormatMessageW, WideCharToMultiByte, GetStringTypeW, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, SetLastError, InitializeCriticalSectionAndSpinCount, CreateEventW, SwitchToThread, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetSystemTimeAsFileTime, GetTickCount, GetModuleHandleW, GetProcAddress, EncodePointer, DecodePointer, GetCPInfo, CompareStringW, LCMapStringW, GetLocaleInfoW, CloseHandle, SetEvent, ResetEvent, WaitForSingleObjectEx, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, TerminateProcess, IsProcessorFeaturePresent, IsDebuggerPresent, GetStartupInfoW, QueryPerformanceCounter, GetCurrentProcessId, GetCurrentThreadId, InitializeSListHead, RtlUnwind, RaiseException, InterlockedPushEntrySList, InterlockedFlushSList, FreeLibrary, LoadLibraryExW, ExitProcess, GetModuleHandleExW, GetModuleFileNameA, GetModuleFileNameW, GetCurrentThread, GetACP, HeapAlloc, GetStdHandle, GetFileType, HeapFree, HeapReAlloc, ReadFile, SetFilePointerEx, WriteFile, GetConsoleCP, GetConsoleMode, GetDateFormatW, GetTimeFormatW, IsValidLocale, GetUserDefaultLCID, EnumSystemLocalesW, FlushFileBuffers, ReadConsoleW, SetConsoleCtrlHandler, GetTimeZoneInformation, FindClose, FindFirstFileExA, FindFirstFileExW, FindNextFileA, FindNextFileW, CreateThread
                  ole32.dllCoTaskMemAlloc, CoInitialize, CoUninitialize, CoTaskMemFree
                  WS2_32.dllgetprotobynumber, WSAStartup, getservbyport, WSACleanup, setsockopt, socket
                  RASAPI32.dllRasEnumConnectionsA, RasGetConnectStatusA

                  Exports

                  NameOrdinalAddress
                  Choosethan10x1086ad0
                  Especiallyyes20x10865e0
                  Guesscover30x1086ff0
                  Learncut40x1088240
                  OnceOut50x1087600

                  Version Infos

                  DescriptionData
                  LegalCopyrightCopyright 1998-2014 Had Home, Inc
                  InternalNameServe color
                  FileVersion6.7.0.400
                  CompanyNameHad Home
                  ProductNameHad Home
                  Think beatFreeHere
                  FileDescriptionServe color
                  OriginalFilenameBrought.dll
                  ProductVersion6.7.0.400
                  Translation0x0409 0x04b0

                  Possible Origin

                  Language of compilation systemCountry where language is spokenMap
                  EnglishUnited States

                  Network Behavior

                  No network behavior found

                  Code Manipulations

                  Statistics

                  Behavior

                  Click to jump to process

                  System Behavior

                  General

                  Start time:06:02:53
                  Start date:08/04/2021
                  Path:C:\Windows\System32\loaddll32.exe
                  Wow64 process (32bit):true
                  Commandline:loaddll32.exe 'C:\Users\user\Desktop\606e7fb752fbd.rar.dll'
                  Imagebase:0x360000
                  File size:116736 bytes
                  MD5 hash:542795ADF7CC08EFCF675D65310596E8
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:moderate

                  General

                  Start time:06:02:53
                  Start date:08/04/2021
                  Path:C:\Windows\SysWOW64\cmd.exe
                  Wow64 process (32bit):true
                  Commandline:cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\606e7fb752fbd.rar.dll',#1
                  Imagebase:0x11d0000
                  File size:232960 bytes
                  MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high

                  General

                  Start time:06:02:54
                  Start date:08/04/2021
                  Path:C:\Windows\SysWOW64\rundll32.exe
                  Wow64 process (32bit):true
                  Commandline:rundll32.exe C:\Users\user\Desktop\606e7fb752fbd.rar.dll,Choosethan
                  Imagebase:0xff0000
                  File size:61952 bytes
                  MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: JoeSecurity_Ursnif_1, Description: Yara detected Ursnif, Source: 00000002.00000003.873095643.0000000000F10000.00000040.00000001.sdmp, Author: Joe Security
                  Reputation:high

                  General

                  Start time:06:02:54
                  Start date:08/04/2021
                  Path:C:\Windows\SysWOW64\rundll32.exe
                  Wow64 process (32bit):true
                  Commandline:rundll32.exe 'C:\Users\user\Desktop\606e7fb752fbd.rar.dll',#1
                  Imagebase:0xff0000
                  File size:61952 bytes
                  MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: JoeSecurity_Ursnif_1, Description: Yara detected Ursnif, Source: 00000003.00000003.874026586.0000000000EC0000.00000040.00000001.sdmp, Author: Joe Security
                  Reputation:high

                  General

                  Start time:06:02:57
                  Start date:08/04/2021
                  Path:C:\Windows\SysWOW64\rundll32.exe
                  Wow64 process (32bit):true
                  Commandline:rundll32.exe C:\Users\user\Desktop\606e7fb752fbd.rar.dll,Especiallyyes
                  Imagebase:0xff0000
                  File size:61952 bytes
                  MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: JoeSecurity_Ursnif_1, Description: Yara detected Ursnif, Source: 00000004.00000003.890597997.0000000000C50000.00000040.00000001.sdmp, Author: Joe Security
                  Reputation:high

                  General

                  Start time:06:03:01
                  Start date:08/04/2021
                  Path:C:\Windows\SysWOW64\rundll32.exe
                  Wow64 process (32bit):true
                  Commandline:rundll32.exe C:\Users\user\Desktop\606e7fb752fbd.rar.dll,Guesscover
                  Imagebase:0xff0000
                  File size:61952 bytes
                  MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high

                  General

                  Start time:06:03:05
                  Start date:08/04/2021
                  Path:C:\Windows\SysWOW64\rundll32.exe
                  Wow64 process (32bit):true
                  Commandline:rundll32.exe C:\Users\user\Desktop\606e7fb752fbd.rar.dll,Learncut
                  Imagebase:0xff0000
                  File size:61952 bytes
                  MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high

                  General

                  Start time:06:03:11
                  Start date:08/04/2021
                  Path:C:\Windows\SysWOW64\rundll32.exe
                  Wow64 process (32bit):true
                  Commandline:rundll32.exe C:\Users\user\Desktop\606e7fb752fbd.rar.dll,OnceOut
                  Imagebase:0xff0000
                  File size:61952 bytes
                  MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high

                  Disassembly

                  Code Analysis

                  Reset < >