Loading ...

Play interactive tourEdit tour

Analysis Report 8OKQ6ogGRx.dll

Overview

General Information

Sample Name:8OKQ6ogGRx.dll
Analysis ID:404147
MD5:e8eae1a820426a722c7cae54ed5bacd8
SHA1:4d8368f112e0c56e7caccb89724bfdad1999e706
SHA256:eb498648d17ad5250ab1f38b190dd2da8bfa8db3ee86054db991db79d15ad5cc
Tags:dll
Infos:

Most interesting Screenshot:

Detection

Ursnif
Score:64
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Yara detected Ursnif
Writes or reads registry keys via WMI
Writes registry values via WMI
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found potential string decryption / allocating functions
PE file contains an invalid checksum
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

Startup

  • System is w10x64
  • loaddll32.exe (PID: 2168 cmdline: loaddll32.exe 'C:\Users\user\Desktop\8OKQ6ogGRx.dll' MD5: 542795ADF7CC08EFCF675D65310596E8)
    • cmd.exe (PID: 3880 cmdline: cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\8OKQ6ogGRx.dll',#1 MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • rundll32.exe (PID: 6024 cmdline: rundll32.exe 'C:\Users\user\Desktop\8OKQ6ogGRx.dll',#1 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 3468 cmdline: rundll32.exe C:\Users\user\Desktop\8OKQ6ogGRx.dll,Enterbeen MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 3512 cmdline: rundll32.exe C:\Users\user\Desktop\8OKQ6ogGRx.dll,Multiply MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
  • iexplore.exe (PID: 5212 cmdline: 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding MD5: 6465CB92B25A7BC1DF8E01D8AC5E7596)
    • iexplore.exe (PID: 5240 cmdline: 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:5212 CREDAT:17410 /prefetch:2 MD5: 071277CC2E3DF41EEEA8013E2AB58D5A)
  • cleanup

Malware Configuration

Threatname: Ursnif

{"RSA Public Key": "KfAh1HjBYV5+GLf1H4+++WQcflLYE80sojTEX/uvXaLXhDxSfFOCIe7aHw1TYNxXIBvEkznlAveWMvLVTSjkgy/Hqpm47GUbXiPUxbpl0qoDhGQpz45mxRQlc+jgXQ4D03Y0gMF90NeOpBOEi497zfDlURi8Me7OHCSUNpn4Q0kQtrInhQlll9V6IFuYjZJB", "c2_domain": ["outlook.com/login", "gmail.com", "dorelunonu.us", "morelunonu.us"], "botnet": "8877", "server": "12", "serpent_key": "30218409ILPAJDUR", "sleep_time": "10", "SetWaitableTimer_value": "0", "DGA_count": "10"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000000.00000002.470954657.0000000003618000.00000004.00000040.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
    Process Memory Space: loaddll32.exe PID: 2168JoeSecurity_UrsnifYara detected UrsnifJoe Security

      Sigma Overview

      No Sigma rule has matched

      Signature Overview

      Click to jump to signature section

      Show All Signature Results

      AV Detection:

      barindex
      Found malware configurationShow sources
      Source: 3.3.rundll32.exe.30aa438.0.raw.unpackMalware Configuration Extractor: Ursnif {"RSA Public Key": "KfAh1HjBYV5+GLf1H4+++WQcflLYE80sojTEX/uvXaLXhDxSfFOCIe7aHw1TYNxXIBvEkznlAveWMvLVTSjkgy/Hqpm47GUbXiPUxbpl0qoDhGQpz45mxRQlc+jgXQ4D03Y0gMF90NeOpBOEi497zfDlURi8Me7OHCSUNpn4Q0kQtrInhQlll9V6IFuYjZJB", "c2_domain": ["outlook.com/login", "gmail.com", "dorelunonu.us", "morelunonu.us"], "botnet": "8877", "server": "12", "serpent_key": "30218409ILPAJDUR", "sleep_time": "10", "SetWaitableTimer_value": "0", "DGA_count": "10"}
      Source: 8OKQ6ogGRx.dllStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
      Source: 8OKQ6ogGRx.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT
      Source: Binary string: c:\364\Head\Fresh-Room\score_Several\turn.pdb source: loaddll32.exe, 00000000.00000002.474262084.000000006E12B000.00000002.00020000.sdmp, rundll32.exe, 00000003.00000002.473027283.000000006E12B000.00000002.00020000.sdmp, 8OKQ6ogGRx.dll
      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00BB896F RtlAllocateHeap,RtlAllocateHeap,RtlAllocateHeap,memset,CreateFileA,GetFileTime,FindCloseChangeNotification,StrRChrA,lstrcat,FindFirstFileA,FindFirstFileA,CompareFileTime,CompareFileTime,FindClose,FindNextFileA,FindClose,FindFirstFileA,CompareFileTime,StrChrA,memcpy,FindNextFileA,FindClose,FindFirstFileA,CompareFileTime,FindClose,HeapFree,HeapFree,
      Source: unknownDNS traffic detected: queries for: outlook.com

      Key, Mouse, Clipboard, Microphone and Screen Capturing:

      barindex
      Yara detected UrsnifShow sources
      Source: Yara matchFile source: 00000000.00000002.470954657.0000000003618000.00000004.00000040.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: loaddll32.exe PID: 2168, type: MEMORY

      E-Banking Fraud:

      barindex
      Yara detected UrsnifShow sources
      Source: Yara matchFile source: 00000000.00000002.470954657.0000000003618000.00000004.00000040.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: loaddll32.exe PID: 2168, type: MEMORY

      System Summary:

      barindex
      Writes or reads registry keys via WMIShow sources
      Source: C:\Windows\System32\loaddll32.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::GetStringValue
      Source: C:\Windows\System32\loaddll32.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetDWORDValue
      Source: C:\Windows\System32\loaddll32.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
      Source: C:\Windows\System32\loaddll32.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue
      Writes registry values via WMIShow sources
      Source: C:\Windows\System32\loaddll32.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetDWORDValue
      Source: C:\Windows\System32\loaddll32.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
      Source: C:\Windows\System32\loaddll32.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue
      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E0C101B NtMapViewOfSection,
      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E0C145E NtCreateSection,memset,
      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E0C23A5 NtQueryVirtualMemory,
      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00BB1724 NtOpenProcess,NtOpenProcessToken,NtQueryInformationToken,NtQueryInformationToken,NtQueryInformationToken,memcpy,NtClose,NtClose,
      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00BBB301 NtQueryVirtualMemory,
      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E0C2184
      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00BB62D8
      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00BBB0DC
      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00BB8045
      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E10AF51
      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E106700
      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E129DAE
      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E123A47
      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E127AB1
      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E114B3B
      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E12035D
      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E1228C3
      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E10C100
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E10AF51
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E106700
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E129DAE
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E123A47
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E127AB1
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E114B3B
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E12035D
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E1228C3
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E10C100
      Source: C:\Windows\System32\loaddll32.exeCode function: String function: 6E10B2D0 appears 32 times
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 6E10B2D0 appears 32 times
      Source: 8OKQ6ogGRx.dllBinary or memory string: OriginalFilenameturn.dll8 vs 8OKQ6ogGRx.dll
      Source: 8OKQ6ogGRx.dllStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
      Source: 8OKQ6ogGRx.dllStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      Source: classification engineClassification label: mal64.troj.winDLL@12/4@3/0
      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00BB24C7 CreateToolhelp32Snapshot,Process32First,Process32Next,CloseHandle,
      Source: C:\Program Files\internet explorer\iexplore.exeFile created: C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\HighJump to behavior
      Source: C:\Program Files\internet explorer\iexplore.exeFile created: C:\Users\user\AppData\Local\Temp\~DFFDCA7E35786F02EC.TMPJump to behavior
      Source: 8OKQ6ogGRx.dllStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      Source: C:\Program Files\internet explorer\iexplore.exeFile read: C:\Users\desktop.iniJump to behavior
      Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\8OKQ6ogGRx.dll,Enterbeen
      Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe 'C:\Users\user\Desktop\8OKQ6ogGRx.dll'
      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\8OKQ6ogGRx.dll',#1
      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\8OKQ6ogGRx.dll,Enterbeen
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\8OKQ6ogGRx.dll',#1
      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\8OKQ6ogGRx.dll,Multiply
      Source: unknownProcess created: C:\Program Files\internet explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
      Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:5212 CREDAT:17410 /prefetch:2
      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\8OKQ6ogGRx.dll',#1
      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\8OKQ6ogGRx.dll,Enterbeen
      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\8OKQ6ogGRx.dll,Multiply
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\8OKQ6ogGRx.dll',#1
      Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:5212 CREDAT:17410 /prefetch:2
      Source: C:\Windows\System32\loaddll32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}\InprocServer32
      Source: C:\Windows\SysWOW64\rundll32.exeAutomated click: OK
      Source: C:\Windows\SysWOW64\rundll32.exeAutomated click: OK
      Source: Window RecorderWindow detected: More than 3 window changes detected
      Source: 8OKQ6ogGRx.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
      Source: 8OKQ6ogGRx.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
      Source: 8OKQ6ogGRx.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
      Source: 8OKQ6ogGRx.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
      Source: 8OKQ6ogGRx.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
      Source: 8OKQ6ogGRx.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
      Source: 8OKQ6ogGRx.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT
      Source: 8OKQ6ogGRx.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
      Source: Binary string: c:\364\Head\Fresh-Room\score_Several\turn.pdb source: loaddll32.exe, 00000000.00000002.474262084.000000006E12B000.00000002.00020000.sdmp, rundll32.exe, 00000003.00000002.473027283.000000006E12B000.00000002.00020000.sdmp, 8OKQ6ogGRx.dll
      Source: 8OKQ6ogGRx.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
      Source: 8OKQ6ogGRx.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
      Source: 8OKQ6ogGRx.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
      Source: 8OKQ6ogGRx.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
      Source: 8OKQ6ogGRx.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E0C160D LoadLibraryA,GetProcAddress,
      Source: 8OKQ6ogGRx.dllStatic PE information: real checksum: 0x8203c should be: 0x8017c
      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E0C2120 push ecx; ret
      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E0C2173 push ecx; ret
      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00BBB0CB push ecx; ret
      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00BBAD10 push ecx; ret
      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E10B315 push ecx; ret
      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E14221D push eax; retf
      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E142BB6 push ecx; ret
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E0D420E push es; ret
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E0D423B push ebx; ret
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E10B315 push ecx; ret
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E0D43C5 push ebp; ret
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E0D5842 push esp; ret
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E14221D push eax; retf
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E142BB6 push ecx; ret

      Hooking and other Techniques for Hiding and Protection:

      barindex
      Yara detected UrsnifShow sources
      Source: Yara matchFile source: 00000000.00000002.470954657.0000000003618000.00000004.00000040.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: loaddll32.exe PID: 2168, type: MEMORY
      Source: C:\Windows\System32\loaddll32.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\loaddll32.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\rundll32.exeLast function: Thread delayed
      Source: C:\Windows\SysWOW64\rundll32.exeLast function: Thread delayed
      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00BB896F RtlAllocateHeap,RtlAllocateHeap,RtlAllocateHeap,memset,CreateFileA,GetFileTime,FindCloseChangeNotification,StrRChrA,lstrcat,FindFirstFileA,FindFirstFileA,CompareFileTime,CompareFileTime,FindClose,FindNextFileA,FindClose,FindFirstFileA,CompareFileTime,StrChrA,memcpy,FindNextFileA,FindClose,FindFirstFileA,CompareFileTime,FindClose,HeapFree,HeapFree,
      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E10C6CB _memset,IsDebuggerPresent,
      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E112CFE ___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,IsDebuggerPresent,OutputDebugStringW,RtlDecodePointer,
      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E0C160D LoadLibraryA,GetProcAddress,
      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E141302 mov eax, dword ptr fs:[00000030h]
      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E140E3F push dword ptr fs:[00000030h]
      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E141238 mov eax, dword ptr fs:[00000030h]
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E141302 mov eax, dword ptr fs:[00000030h]
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E140E3F push dword ptr fs:[00000030h]
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E141238 mov eax, dword ptr fs:[00000030h]
      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E10B830 GetProcessHeap,
      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E111090 SetUnhandledExceptionFilter,
      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E1110C1 SetUnhandledExceptionFilter,UnhandledExceptionFilter,
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E111090 SetUnhandledExceptionFilter,
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E1110C1 SetUnhandledExceptionFilter,UnhandledExceptionFilter,
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\8OKQ6ogGRx.dll',#1
      Source: loaddll32.exe, 00000000.00000002.470347990.0000000001620000.00000002.00000001.sdmp, rundll32.exe, 00000003.00000002.472110783.0000000003640000.00000002.00000001.sdmpBinary or memory string: Program Manager
      Source: loaddll32.exe, 00000000.00000002.470347990.0000000001620000.00000002.00000001.sdmp, rundll32.exe, 00000003.00000002.472110783.0000000003640000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
      Source: loaddll32.exe, 00000000.00000002.470347990.0000000001620000.00000002.00000001.sdmp, rundll32.exe, 00000003.00000002.472110783.0000000003640000.00000002.00000001.sdmpBinary or memory string: Progman
      Source: loaddll32.exe, 00000000.00000002.470347990.0000000001620000.00000002.00000001.sdmp, rundll32.exe, 00000003.00000002.472110783.0000000003640000.00000002.00000001.sdmpBinary or memory string: Progmanlock
      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00BB7EC1 cpuid
      Source: C:\Windows\System32\loaddll32.exeCode function: _wcscmp,_wcscmp,GetLocaleInfoW,GetLocaleInfoW,GetACP,
      Source: C:\Windows\System32\loaddll32.exeCode function: GetLocaleInfoW,_GetPrimaryLen,
      Source: C:\Windows\System32\loaddll32.exeCode function: _LcidFromHexString,GetLocaleInfoW,_TestDefaultLanguage,
      Source: C:\Windows\System32\loaddll32.exeCode function: EnumSystemLocalesW,
      Source: C:\Windows\System32\loaddll32.exeCode function: EnumSystemLocalesW,
      Source: C:\Windows\System32\loaddll32.exeCode function: GetLocaleInfoW,
      Source: C:\Windows\System32\loaddll32.exeCode function: _GetPrimaryLen,EnumSystemLocalesW,
      Source: C:\Windows\System32\loaddll32.exeCode function: _GetPrimaryLen,EnumSystemLocalesW,
      Source: C:\Windows\System32\loaddll32.exeCode function: _LcidFromHexString,GetLocaleInfoW,GetLocaleInfoW,__wcsnicmp,GetLocaleInfoW,_TestDefaultLanguage,
      Source: C:\Windows\System32\loaddll32.exeCode function: _TranslateName,_GetLocaleNameFromLangCountry,_GetLocaleNameFromLanguage,_TranslateName,_GetLocaleNameFromLangCountry,_GetLocaleNameFromLanguage,_GetLocaleNameFromDefault,IsValidCodePage,_wcschr,_wcschr,__itow_s,__invoke_watson,_LcidFromHexString,GetLocaleInfoW,
      Source: C:\Windows\System32\loaddll32.exeCode function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoA_stat,
      Source: C:\Windows\System32\loaddll32.exeCode function: ___crtGetLocaleInfoA,GetLastError,___crtGetLocaleInfoA,__calloc_crt,___crtGetLocaleInfoA,__calloc_crt,_free,_free,__calloc_crt,_free,__invoke_watson,
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: _wcscmp,_wcscmp,GetLocaleInfoW,GetLocaleInfoW,GetACP,
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoW,_GetPrimaryLen,
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: _LcidFromHexString,GetLocaleInfoW,_TestDefaultLanguage,
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: EnumSystemLocalesW,
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: EnumSystemLocalesW,
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoW,
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: _GetPrimaryLen,EnumSystemLocalesW,
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: _GetPrimaryLen,EnumSystemLocalesW,
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: _LcidFromHexString,GetLocaleInfoW,GetLocaleInfoW,__wcsnicmp,GetLocaleInfoW,_TestDefaultLanguage,
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: _TranslateName,_GetLocaleNameFromLangCountry,_GetLocaleNameFromLanguage,_TranslateName,_GetLocaleNameFromLangCountry,_GetLocaleNameFromLanguage,_GetLocaleNameFromDefault,IsValidCodePage,_wcschr,_wcschr,__itow_s,__invoke_watson,_LcidFromHexString,GetLocaleInfoW,
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoA_stat,
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: ___crtGetLocaleInfoA,GetLastError,___crtGetLocaleInfoA,__calloc_crt,___crtGetLocaleInfoA,__calloc_crt,_free,_free,__calloc_crt,_free,__invoke_watson,
      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E0C195D GetSystemTimeAsFileTime,_aulldiv,_snwprintf,CreateFileMappingW,GetLastError,GetLastError,MapViewOfFile,GetLastError,CloseHandle,GetLastError,
      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00BB7EC1 RtlAllocateHeap,GetUserNameW,RtlAllocateHeap,GetUserNameW,HeapFree,GetComputerNameW,GetComputerNameW,RtlAllocateHeap,GetComputerNameW,HeapFree,
      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E10CFA3 __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,
      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E0C1800 CreateEventA,GetVersion,GetCurrentProcessId,OpenProcess,GetLastError,

      Stealing of Sensitive Information:

      barindex
      Yara detected UrsnifShow sources
      Source: Yara matchFile source: 00000000.00000002.470954657.0000000003618000.00000004.00000040.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: loaddll32.exe PID: 2168, type: MEMORY

      Remote Access Functionality:

      barindex
      Yara detected UrsnifShow sources
      Source: Yara matchFile source: 00000000.00000002.470954657.0000000003618000.00000004.00000040.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: loaddll32.exe PID: 2168, type: MEMORY

      Mitre Att&ck Matrix

      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
      Valid AccountsWindows Management Instrumentation2Path InterceptionProcess Injection12Masquerading1OS Credential DumpingSystem Time Discovery2Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
      Default AccountsNative API1Boot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsProcess Injection12LSASS MemorySecurity Software Discovery3Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothNon-Application Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Deobfuscate/Decode Files or Information1Security Account ManagerProcess Discovery2SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationApplication Layer Protocol1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Obfuscated Files or Information2NTDSAccount Discovery1Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptRundll321LSA SecretsSystem Owner/User Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
      Replication Through Removable MediaLaunchdRc.commonRc.commonSoftware Packing1Cached Domain CredentialsFile and Directory Discovery2VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSyncSystem Information Discovery23Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact

      Behavior Graph

      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet
      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 404147 Sample: 8OKQ6ogGRx.dll Startdate: 04/05/2021 Architecture: WINDOWS Score: 64 23 www.outlook.com 2->23 25 outlook.office365.com 2->25 27 5 other IPs or domains 2->27 29 Found malware configuration 2->29 31 Yara detected  Ursnif 2->31 8 loaddll32.exe 1 2->8         started        11 iexplore.exe 2 59 2->11         started        signatures3 process4 signatures5 33 Writes or reads registry keys via WMI 8->33 35 Writes registry values via WMI 8->35 13 cmd.exe 1 8->13         started        15 rundll32.exe 8->15         started        17 rundll32.exe 8->17         started        19 iexplore.exe 11->19         started        process6 process7 21 rundll32.exe 13->21         started       

      Screenshots

      Thumbnails

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

      windows-stand

      Antivirus, Machine Learning and Genetic Malware Detection

      Initial Sample

      No Antivirus matches

      Dropped Files

      No Antivirus matches

      Unpacked PE Files

      SourceDetectionScannerLabelLinkDownload
      0.2.loaddll32.exe.bb0000.0.unpack100%AviraHEUR/AGEN.1108168Download File

      Domains

      No Antivirus matches

      URLs

      No Antivirus matches

      Domains and IPs

      Contacted Domains

      NameIPActiveMaliciousAntivirus DetectionReputation
      outlook.com
      40.97.161.50
      truefalse
        high
        HHN-efz.ms-acdc.office.com
        40.101.138.2
        truefalse
          high
          FRA-efz.ms-acdc.office.com
          40.101.81.162
          truefalse
            high
            www.outlook.com
            unknown
            unknownfalse
              high
              outlook.office365.com
              unknown
              unknownfalse
                high

                Contacted IPs

                No contacted IP infos

                General Information

                Joe Sandbox Version:32.0.0 Black Diamond
                Analysis ID:404147
                Start date:04.05.2021
                Start time:18:50:36
                Joe Sandbox Product:CloudBasic
                Overall analysis duration:0h 7m 14s
                Hypervisor based Inspection enabled:false
                Report type:light
                Sample file name:8OKQ6ogGRx.dll
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                Number of analysed new started processes analysed:24
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • HDC enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Detection:MAL
                Classification:mal64.troj.winDLL@12/4@3/0
                EGA Information:Failed
                HDC Information:
                • Successful, ratio: 12.7% (good quality ratio 12.1%)
                • Quality average: 79.5%
                • Quality standard deviation: 28.7%
                HCA Information:
                • Successful, ratio: 73%
                • Number of executed functions: 0
                • Number of non-executed functions: 0
                Cookbook Comments:
                • Adjust boot time
                • Enable AMSI
                • Found application associated with file extension: .dll
                Warnings:
                Show All
                • Exclude process from analysis (whitelisted): taskhostw.exe, audiodg.exe, BackgroundTransferHost.exe, ielowutil.exe, backgroundTaskHost.exe, SgrmBroker.exe, WmiPrvSE.exe, svchost.exe
                • Excluded IPs from analysis (whitelisted): 52.147.198.201, 204.79.197.200, 13.107.21.200, 20.49.157.6, 104.43.193.48, 168.61.161.212, 92.122.145.220, 184.30.24.56, 2.20.142.209, 2.20.142.210, 20.82.209.183, 92.122.213.247, 92.122.213.194, 88.221.62.148, 2.17.179.193, 84.53.167.113, 20.82.210.154
                • Excluded domains from analysis (whitelisted): au.download.windowsupdate.com.edgesuite.net, arc.msn.com.nsatc.net, store-images.s-microsoft.com-c.edgekey.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, e15275.g.akamaiedge.net, arc.msn.com, cdn.onenote.net.edgekey.net, e11290.dspg.akamaiedge.net, e12564.dspb.akamaiedge.net, go.microsoft.com, wildcard.weather.microsoft.com.edgekey.net, www-bing-com.dual-a-0001.a-msedge.net, audownload.windowsupdate.nsatc.net, arc.trafficmanager.net, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, cdn.onenote.net, au-bg-shim.trafficmanager.net, www.bing.com, fs.microsoft.com, dual-a-0001.a-msedge.net, tile-service.weather.microsoft.com, skypedataprdcolcus17.cloudapp.net, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, a767.dscg3.akamai.net, skypedataprdcolcus15.cloudapp.net, skypedataprdcoleus16.cloudapp.net, a-0001.a-afdentry.net.trafficmanager.net, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net, go.microsoft.com.edgekey.net, e1553.dspg.akamaiedge.net
                • VT rate limit hit for: /opt/package/joesandbox/database/analysis/404147/sample/8OKQ6ogGRx.dll

                Simulations

                Behavior and APIs

                No simulations

                Joe Sandbox View / Context

                IPs

                No context

                Domains

                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                outlook.comn6osajjc938.exeGet hashmaliciousBrowse
                • 104.47.54.36
                9b3d7f02.exeGet hashmaliciousBrowse
                • 104.47.54.36
                5zc9vbGBo3.exeGet hashmaliciousBrowse
                • 52.101.24.0
                InnAcjnAmG.exeGet hashmaliciousBrowse
                • 104.47.53.36
                8X93Tzvd7V.exeGet hashmaliciousBrowse
                • 52.101.24.0
                u8A8Qy5S7O.exeGet hashmaliciousBrowse
                • 104.47.53.36
                SecuriteInfo.com.Mal.GandCrypt-A.24654.exeGet hashmaliciousBrowse
                • 104.47.54.36
                SecuriteInfo.com.Mal.GandCrypt-A.5674.exeGet hashmaliciousBrowse
                • 104.47.54.36
                SecuriteInfo.com.W32.AIDetect.malware2.29567.exeGet hashmaliciousBrowse
                • 104.47.53.36
                lsass(1).exeGet hashmaliciousBrowse
                • 104.47.59.138
                rtofwqxq.exeGet hashmaliciousBrowse
                • 104.47.53.36
                VufxYArno1.exeGet hashmaliciousBrowse
                • 104.47.53.36
                FRA-efz.ms-acdc.office.comdechert-Investment078867-xlsx.HtmlGet hashmaliciousBrowse
                • 52.97.189.66
                murexltd-Investment_265386-xlsx.htmlGet hashmaliciousBrowse
                • 52.97.188.66
                z2xQEFs54b.exeGet hashmaliciousBrowse
                • 52.97.250.226
                sgs-Investment974041-xlsx.HtmlGet hashmaliciousBrowse
                • 40.101.19.162
                roccor-invoice-648133_xls.HtMlGet hashmaliciousBrowse
                • 52.97.200.162
                redwirespace-invoice-982323_xls.HtMlGet hashmaliciousBrowse
                • 40.101.12.82
                prismcosec-invoice-647718_xls.HtMlGet hashmaliciousBrowse
                • 40.101.81.130
                E848.tmp.exeGet hashmaliciousBrowse
                • 40.101.81.130
                Payment.htmlGet hashmaliciousBrowse
                • 52.97.250.194
                Remittance advice.htmGet hashmaliciousBrowse
                • 52.97.250.210
                0G2gue8shl.exeGet hashmaliciousBrowse
                • 52.97.176.2
                February Payroll.xls.htmGet hashmaliciousBrowse
                • 52.97.250.242
                PURCHASE ORDER#34556558.exeGet hashmaliciousBrowse
                • 52.97.200.178
                Proforma Invoice.exeGet hashmaliciousBrowse
                • 52.97.250.210
                E-DEKONT.exeGet hashmaliciousBrowse
                • 52.97.144.178
                DHL Notification -AWB DHL-2021011293002.exeGet hashmaliciousBrowse
                • 52.97.201.82
                DHL DOCS.exeGet hashmaliciousBrowse
                • 40.101.80.2
                ORDER REQUEST.exeGet hashmaliciousBrowse
                • 40.101.121.34
                INVOICE.exeGet hashmaliciousBrowse
                • 52.97.188.66
                RECEIPT.exeGet hashmaliciousBrowse
                • 40.101.81.146
                HHN-efz.ms-acdc.office.com609110f2d14a6.dllGet hashmaliciousBrowse
                • 40.101.137.34
                New%20order%20contract.htmlGet hashmaliciousBrowse
                • 52.98.175.2

                ASN

                No context

                JA3 Fingerprints

                No context

                Dropped Files

                No context

                Created / dropped Files

                C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{AE905FC9-AD44-11EB-90E4-ECF4BB862DED}.dat
                Process:C:\Program Files\internet explorer\iexplore.exe
                File Type:Microsoft Word Document
                Category:dropped
                Size (bytes):21592
                Entropy (8bit):1.7594977787918844
                Encrypted:false
                SSDEEP:48:IwiGcprjGwpL0qUG/ap80qGBZGIpc0qG4fGeGvnZpv0qG4fGvw3Go3qp90qG4fGm:rWZ9Za2wLWk7tkNfk4FMktH
                MD5:586DB94373650BC9E3A11F8D83A43119
                SHA1:44830C9A42A7059540F75902D8ACCCD0C2CCC110
                SHA-256:CBB34950E8F8B039E5E8A0C56C9F0409E3D51D1418EC7B6FA664F6B7598BBF15
                SHA-512:CB3756652C002D04099293D445F789B3E7466756473E5BF50A9EBE635BA65E76D6C36F1C54351A0C11CF2CD9772A70F4F4F67F498FCAD27312D4E7250CF7AE3C
                Malicious:false
                Reputation:low
                Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{AE905FCB-AD44-11EB-90E4-ECF4BB862DED}.dat
                Process:C:\Program Files\internet explorer\iexplore.exe
                File Type:Microsoft Word Document
                Category:dropped
                Size (bytes):16984
                Entropy (8bit):1.573944233836972
                Encrypted:false
                SSDEEP:48:IwMGcprRGwpapG4pQtGrapbShZGQpB2GHHpcIaTGUpG:rQZLQr6NBShzj12IqA
                MD5:3ECFC996F83DCA4AA885FF3F72B684AD
                SHA1:4D5F1BC278921B850632B9F131CEACF9F6528BAE
                SHA-256:94138719C28C299D93F3175DAC56C4A5A1097852F4410206DBDC1364FEA3C108
                SHA-512:47F4F94D461247526ECBF9999F81775CDAC82CE5FA41018ADBDCA8D2D13FF149FCB62E8BA274761AA1EB0FEFDD4CDCABE7E9A631AC00CE72BA31AD0667F360E8
                Malicious:false
                Reputation:low
                Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                C:\Users\user\AppData\Local\Temp\~DFFDCA7E35786F02EC.TMP
                Process:C:\Program Files\internet explorer\iexplore.exe
                File Type:data
                Category:dropped
                Size (bytes):12917
                Entropy (8bit):0.39862566692758644
                Encrypted:false
                SSDEEP:24:c9lLh9lLh9lIn9lIn9lo0qDF9lo0qJ9lW0qGcGvwywcGtRwi:kBqoI0qS0qM0qGcGvwywcGtRwi
                MD5:5AC667C80F587E96B1FA80C48BB205AC
                SHA1:8AE06DAFAC5BD829EBDF2585C6BE72B11645F7EC
                SHA-256:4603ADFFB302AFD33E6755000AF43E78307809BE6060D50346B41AFFB2655282
                SHA-512:DA5BB434493D5023D766CCAD26D075683F287310E2FD53E2C51EDB7B0119B4DA534223D047822E72DF4F31C5838630386575432052267BB45C2FA524E63E2951
                Malicious:false
                Reputation:low
                Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                C:\Users\user\AppData\Local\Temp\~DFFF4222CFAFFA654A.TMP
                Process:C:\Program Files\internet explorer\iexplore.exe
                File Type:data
                Category:dropped
                Size (bytes):25657
                Entropy (8bit):0.31341444137710367
                Encrypted:false
                SSDEEP:24:c9lLh9lLh9lIn9lIn9lRg9lRA9lTS9lTy9lSSd9lSSd9lwT9lwT9l2a:kBqoxKAuvScS+sKa
                MD5:B141DA2A351E435F1D185F48AC4E0FF6
                SHA1:A257DD1A9B4D1AB44020E74757AC5C9C69575588
                SHA-256:1D1C565FF314222220A0BDEADB603FCDE1A742DEA5A4210871A6C6E0AAE37C4A
                SHA-512:49E24F4266573BEC3E25D738F23A9D169F14FBA3FBC7F4C6F80A9657BBA4B5882A4477734AD04A45FE4EA57F11F1542657F1184D97AD1FD03BA659287AF18D5A
                Malicious:false
                Reputation:low
                Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................

                Static File Info

                General

                File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                Entropy (8bit):6.549322455653532
                TrID:
                • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
                • Generic Win/DOS Executable (2004/3) 0.20%
                • DOS Executable Generic (2002/1) 0.20%
                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                File name:8OKQ6ogGRx.dll
                File size:523264
                MD5:e8eae1a820426a722c7cae54ed5bacd8
                SHA1:4d8368f112e0c56e7caccb89724bfdad1999e706
                SHA256:eb498648d17ad5250ab1f38b190dd2da8bfa8db3ee86054db991db79d15ad5cc
                SHA512:b75df93529215c6003ddb86bc76a52144b29aec918a40a9dadec7446f67cc2626b67fa1738ed148e81a1c706dded69f609e1cd592cf13034ef9fd2cb21603032
                SSDEEP:12288:CdXaT8lLVrp6I7MsfHqWxSWlNTjGoLYTbgOJpXLH:CdXhp1YCMuFx/jGo0XL
                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......................^.G.......T......AN.......V.......i.......h.....^.B...............l.......U.......R.......W.....Rich...........

                File Icon

                Icon Hash:74f0e4ecccdce0e4

                Static PE Info

                General

                Entrypoint:0x104a38a
                Entrypoint Section:.text
                Digitally signed:false
                Imagebase:0x1000000
                Subsystem:windows gui
                Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT
                Time Stamp:0x6089CC25 [Wed Apr 28 20:57:09 2021 UTC]
                TLS Callbacks:
                CLR (.Net) Version:
                OS Version Major:6
                OS Version Minor:0
                File Version Major:6
                File Version Minor:0
                Subsystem Version Major:6
                Subsystem Version Minor:0
                Import Hash:61abfa6d76443dd7d018df0c9cf8b0a5

                Entrypoint Preview

                Instruction
                push ebp
                mov ebp, esp
                cmp dword ptr [ebp+0Ch], 01h
                jne 00007FCE58D690B7h
                call 00007FCE58D6F684h
                push dword ptr [ebp+10h]
                push dword ptr [ebp+0Ch]
                push dword ptr [ebp+08h]
                call 00007FCE58D690BCh
                add esp, 0Ch
                pop ebp
                retn 000Ch
                push 0000000Ch
                push 0107B4A8h
                call 00007FCE58D69FCCh
                xor eax, eax
                inc eax
                mov esi, dword ptr [ebp+0Ch]
                test esi, esi
                jne 00007FCE58D690BEh
                cmp dword ptr [0118E36Ch], esi
                je 00007FCE58D6919Ah
                and dword ptr [ebp-04h], 00000000h
                cmp esi, 01h
                je 00007FCE58D690B7h
                cmp esi, 02h
                jne 00007FCE58D690E7h
                mov ecx, dword ptr [01075238h]
                test ecx, ecx
                je 00007FCE58D690BEh
                push dword ptr [ebp+10h]
                push esi
                push dword ptr [ebp+08h]
                call ecx
                mov dword ptr [ebp-1Ch], eax
                test eax, eax
                je 00007FCE58D69167h
                push dword ptr [ebp+10h]
                push esi
                push dword ptr [ebp+08h]
                call 00007FCE58D68EC6h
                mov dword ptr [ebp-1Ch], eax
                test eax, eax
                je 00007FCE58D69150h
                mov ebx, dword ptr [ebp+10h]
                push ebx
                push esi
                push dword ptr [ebp+08h]
                call 00007FCE58D66926h
                mov edi, eax
                mov dword ptr [ebp-1Ch], edi
                cmp esi, 01h
                jne 00007FCE58D690DAh
                test edi, edi
                jne 00007FCE58D690D6h
                push ebx
                push eax
                push dword ptr [ebp+08h]
                call 00007FCE58D6690Eh
                push ebx
                push edi
                push dword ptr [ebp+08h]
                call 00007FCE58D68E8Ch
                mov eax, dword ptr [01075238h]
                test eax, eax
                je 00007FCE58D690B9h
                push ebx
                push edi
                push dword ptr [ebp+08h]
                call eax

                Data Directories

                NameVirtual AddressVirtual Size Is in Section
                IMAGE_DIRECTORY_ENTRY_EXPORT0x7bbd00x58.rdata
                IMAGE_DIRECTORY_ENTRY_IMPORT0x7bc280x64.rdata
                IMAGE_DIRECTORY_ENTRY_RESOURCE0x1910000x498.rsrc
                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                IMAGE_DIRECTORY_ENTRY_BASERELOC0x1920000x2818.reloc
                IMAGE_DIRECTORY_ENTRY_DEBUG0x6b2000x38.rdata
                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x7a9800x40.rdata
                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IAT0x6b0000x1ac.rdata
                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                Sections

                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                .text0x10000x6988d0x69a00False0.70416512574data6.62139930186IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                .rdata0x6b0000x115e00x11600False0.471967738309data5.23669501131IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                .data0x7d0000x1133000x1800False0.333984375data3.88700180982IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                .rsrc0x1910000x4980x600False0.356119791667data2.99935790597IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                .reloc0x1920000x28180x2a00False0.743117559524data6.59705049508IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                Resources

                NameRVASizeTypeLanguageCountry
                RT_VERSION0x1910a00x35cdataEnglishUnited States
                RT_MANIFEST0x1914000x91XML 1.0 document textEnglishUnited States

                Imports

                DLLImport
                KERNEL32.dllFlushFileBuffers, GetConsoleCP, GetConsoleMode, SetEnvironmentVariableA, SetStdHandle, SetFilePointerEx, WriteConsoleW, CloseHandle, GetFileAttributesW, GetWindowsDirectoryW, CreateProcessW, OpenMutexW, VirtualProtectEx, EncodePointer, DecodePointer, HeapAlloc, GetSystemTimeAsFileTime, RaiseException, RtlUnwind, GetCommandLineA, GetCurrentThreadId, IsProcessorFeaturePresent, GetLastError, HeapFree, ExitProcess, GetModuleHandleExW, GetProcAddress, AreFileApisANSI, MultiByteToWideChar, WideCharToMultiByte, HeapSize, GetStdHandle, WriteFile, GetModuleFileNameW, GetProcessHeap, IsDebuggerPresent, GetTimeZoneInformation, SetLastError, GetCurrentThread, GetFileType, DeleteCriticalSection, GetStartupInfoW, GetModuleFileNameA, QueryPerformanceCounter, GetCurrentProcessId, GetEnvironmentStringsW, FreeEnvironmentStringsW, UnhandledExceptionFilter, SetUnhandledExceptionFilter, InitializeCriticalSectionAndSpinCount, CreateEventW, Sleep, GetCurrentProcess, TerminateProcess, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetTickCount, GetModuleHandleW, CreateSemaphoreW, SetConsoleCtrlHandler, GetDateFormatW, GetTimeFormatW, CompareStringW, LCMapStringW, GetLocaleInfoW, IsValidLocale, GetUserDefaultLCID, EnumSystemLocalesW, EnterCriticalSection, LeaveCriticalSection, FatalAppExitA, FreeLibrary, LoadLibraryExW, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, HeapReAlloc, OutputDebugStringW, GetStringTypeW, CreateFileW
                USER32.dllGetPropW, CreateMenu, DeferWindowPos, BeginDeferWindowPos, UnregisterHotKey, TranslateMessage, RegisterWindowMessageW
                GDI32.dllMoveToEx, SetTextColor, SetBkMode, SetBkColor, LineTo, IntersectClipRect, GetClipBox, GetCharWidthW, CreateBitmap
                COMCTL32.dllImageList_SetDragCursorImage, ImageList_Draw, PropertySheetW, CreatePropertySheetPageA

                Exports

                NameOrdinalAddress
                Enterbeen10x1047ed0
                Multiply20x1047fb0

                Version Infos

                DescriptionData
                LegalCopyright Fingergeneral Corporation. All rights reserved
                InternalNameProbable
                FileVersion5.5.2.216 Sidedone
                CompanyNameFingergeneral Corporation
                ProductNameFingergeneral Wear twenty
                ProductVersion5.5.2.216
                FileDescriptionFingergeneral Wear twenty
                OriginalFilenameturn.dll
                Translation0x0409 0x04b0

                Possible Origin

                Language of compilation systemCountry where language is spokenMap
                EnglishUnited States

                Network Behavior

                Network Port Distribution

                UDP Packets

                TimestampSource PortDest PortSource IPDest IP
                May 4, 2021 18:51:18.333254099 CEST6098553192.168.2.38.8.8.8
                May 4, 2021 18:51:18.338377953 CEST5020053192.168.2.38.8.8.8
                May 4, 2021 18:51:18.378372908 CEST5128153192.168.2.38.8.8.8
                May 4, 2021 18:51:18.387293100 CEST53502008.8.8.8192.168.2.3
                May 4, 2021 18:51:18.408304930 CEST53609858.8.8.8192.168.2.3
                May 4, 2021 18:51:18.426934004 CEST53512818.8.8.8192.168.2.3
                May 4, 2021 18:51:19.130103111 CEST4919953192.168.2.38.8.8.8
                May 4, 2021 18:51:19.178749084 CEST53491998.8.8.8192.168.2.3
                May 4, 2021 18:51:20.001471043 CEST5062053192.168.2.38.8.8.8
                May 4, 2021 18:51:20.050255060 CEST53506208.8.8.8192.168.2.3
                May 4, 2021 18:51:21.065521002 CEST6493853192.168.2.38.8.8.8
                May 4, 2021 18:51:21.117543936 CEST53649388.8.8.8192.168.2.3
                May 4, 2021 18:51:21.394946098 CEST6015253192.168.2.38.8.8.8
                May 4, 2021 18:51:21.456048012 CEST53601528.8.8.8192.168.2.3
                May 4, 2021 18:51:21.984514952 CEST5754453192.168.2.38.8.8.8
                May 4, 2021 18:51:22.033207893 CEST53575448.8.8.8192.168.2.3
                May 4, 2021 18:51:23.754410982 CEST5598453192.168.2.38.8.8.8
                May 4, 2021 18:51:23.811686039 CEST53559848.8.8.8192.168.2.3
                May 4, 2021 18:51:24.549612045 CEST6418553192.168.2.38.8.8.8
                May 4, 2021 18:51:24.601274967 CEST53641858.8.8.8192.168.2.3
                May 4, 2021 18:51:25.503813982 CEST6511053192.168.2.38.8.8.8
                May 4, 2021 18:51:25.552414894 CEST53651108.8.8.8192.168.2.3
                May 4, 2021 18:52:03.254508972 CEST5836153192.168.2.38.8.8.8
                May 4, 2021 18:52:03.313453913 CEST53583618.8.8.8192.168.2.3
                May 4, 2021 18:52:15.317749023 CEST6349253192.168.2.38.8.8.8
                May 4, 2021 18:52:15.390950918 CEST53634928.8.8.8192.168.2.3
                May 4, 2021 18:52:20.053031921 CEST6083153192.168.2.38.8.8.8
                May 4, 2021 18:52:20.103934050 CEST53608318.8.8.8192.168.2.3
                May 4, 2021 18:52:38.655663013 CEST6010053192.168.2.38.8.8.8
                May 4, 2021 18:52:38.708623886 CEST53601008.8.8.8192.168.2.3
                May 4, 2021 18:52:56.289465904 CEST5319553192.168.2.38.8.8.8
                May 4, 2021 18:52:56.348114014 CEST53531958.8.8.8192.168.2.3
                May 4, 2021 18:53:27.666838884 CEST5014153192.168.2.38.8.8.8
                May 4, 2021 18:53:27.721466064 CEST53501418.8.8.8192.168.2.3
                May 4, 2021 18:53:28.937237978 CEST5302353192.168.2.38.8.8.8
                May 4, 2021 18:53:28.986049891 CEST53530238.8.8.8192.168.2.3
                May 4, 2021 18:53:29.070245028 CEST4956353192.168.2.38.8.8.8
                May 4, 2021 18:53:29.073194027 CEST5135253192.168.2.38.8.8.8
                May 4, 2021 18:53:29.124036074 CEST53495638.8.8.8192.168.2.3
                May 4, 2021 18:53:29.148881912 CEST53513528.8.8.8192.168.2.3
                May 4, 2021 18:53:29.954231024 CEST5934953192.168.2.38.8.8.8
                May 4, 2021 18:53:30.011257887 CEST53593498.8.8.8192.168.2.3
                May 4, 2021 18:53:30.180514097 CEST5708453192.168.2.38.8.8.8
                May 4, 2021 18:53:30.229265928 CEST53570848.8.8.8192.168.2.3
                May 4, 2021 18:53:30.661994934 CEST5882353192.168.2.38.8.8.8
                May 4, 2021 18:53:30.711884975 CEST53588238.8.8.8192.168.2.3
                May 4, 2021 18:53:32.214960098 CEST5756853192.168.2.38.8.8.8
                May 4, 2021 18:53:32.274662971 CEST53575688.8.8.8192.168.2.3

                DNS Queries

                TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                May 4, 2021 18:53:28.937237978 CEST192.168.2.38.8.8.80x4990Standard query (0)outlook.comA (IP address)IN (0x0001)
                May 4, 2021 18:53:29.954231024 CEST192.168.2.38.8.8.80xea33Standard query (0)www.outlook.comA (IP address)IN (0x0001)
                May 4, 2021 18:53:30.180514097 CEST192.168.2.38.8.8.80x30eaStandard query (0)outlook.office365.comA (IP address)IN (0x0001)

                DNS Answers

                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                May 4, 2021 18:53:28.986049891 CEST8.8.8.8192.168.2.30x4990No error (0)outlook.com40.97.161.50A (IP address)IN (0x0001)
                May 4, 2021 18:53:28.986049891 CEST8.8.8.8192.168.2.30x4990No error (0)outlook.com40.97.116.82A (IP address)IN (0x0001)
                May 4, 2021 18:53:28.986049891 CEST8.8.8.8192.168.2.30x4990No error (0)outlook.com40.97.160.2A (IP address)IN (0x0001)
                May 4, 2021 18:53:28.986049891 CEST8.8.8.8192.168.2.30x4990No error (0)outlook.com40.97.148.226A (IP address)IN (0x0001)
                May 4, 2021 18:53:28.986049891 CEST8.8.8.8192.168.2.30x4990No error (0)outlook.com40.97.164.146A (IP address)IN (0x0001)
                May 4, 2021 18:53:28.986049891 CEST8.8.8.8192.168.2.30x4990No error (0)outlook.com40.97.128.194A (IP address)IN (0x0001)
                May 4, 2021 18:53:28.986049891 CEST8.8.8.8192.168.2.30x4990No error (0)outlook.com40.97.156.114A (IP address)IN (0x0001)
                May 4, 2021 18:53:28.986049891 CEST8.8.8.8192.168.2.30x4990No error (0)outlook.com40.97.153.146A (IP address)IN (0x0001)
                May 4, 2021 18:53:30.011257887 CEST8.8.8.8192.168.2.30xea33No error (0)www.outlook.comoutlook.office365.comCNAME (Canonical name)IN (0x0001)
                May 4, 2021 18:53:30.011257887 CEST8.8.8.8192.168.2.30xea33No error (0)outlook.office365.comoutlook.ha.office365.comCNAME (Canonical name)IN (0x0001)
                May 4, 2021 18:53:30.011257887 CEST8.8.8.8192.168.2.30xea33No error (0)outlook.ha.office365.comoutlook.ms-acdc.office.comCNAME (Canonical name)IN (0x0001)
                May 4, 2021 18:53:30.011257887 CEST8.8.8.8192.168.2.30xea33No error (0)outlook.ms-acdc.office.comFRA-efz.ms-acdc.office.comCNAME (Canonical name)IN (0x0001)
                May 4, 2021 18:53:30.011257887 CEST8.8.8.8192.168.2.30xea33No error (0)FRA-efz.ms-acdc.office.com40.101.81.162A (IP address)IN (0x0001)
                May 4, 2021 18:53:30.011257887 CEST8.8.8.8192.168.2.30xea33No error (0)FRA-efz.ms-acdc.office.com40.101.12.98A (IP address)IN (0x0001)
                May 4, 2021 18:53:30.011257887 CEST8.8.8.8192.168.2.30xea33No error (0)FRA-efz.ms-acdc.office.com52.97.176.2A (IP address)IN (0x0001)
                May 4, 2021 18:53:30.229265928 CEST8.8.8.8192.168.2.30x30eaNo error (0)outlook.office365.comoutlook.ha.office365.comCNAME (Canonical name)IN (0x0001)
                May 4, 2021 18:53:30.229265928 CEST8.8.8.8192.168.2.30x30eaNo error (0)outlook.ha.office365.comoutlook.ms-acdc.office.comCNAME (Canonical name)IN (0x0001)
                May 4, 2021 18:53:30.229265928 CEST8.8.8.8192.168.2.30x30eaNo error (0)outlook.ms-acdc.office.comHHN-efz.ms-acdc.office.comCNAME (Canonical name)IN (0x0001)
                May 4, 2021 18:53:30.229265928 CEST8.8.8.8192.168.2.30x30eaNo error (0)HHN-efz.ms-acdc.office.com40.101.138.2A (IP address)IN (0x0001)
                May 4, 2021 18:53:30.229265928 CEST8.8.8.8192.168.2.30x30eaNo error (0)HHN-efz.ms-acdc.office.com40.101.137.66A (IP address)IN (0x0001)
                May 4, 2021 18:53:30.229265928 CEST8.8.8.8192.168.2.30x30eaNo error (0)HHN-efz.ms-acdc.office.com40.101.138.18A (IP address)IN (0x0001)
                May 4, 2021 18:53:30.229265928 CEST8.8.8.8192.168.2.30x30eaNo error (0)HHN-efz.ms-acdc.office.com52.97.233.66A (IP address)IN (0x0001)

                Code Manipulations

                Statistics

                Behavior

                Click to jump to process

                System Behavior

                General

                Start time:18:51:24
                Start date:04/05/2021
                Path:C:\Windows\System32\loaddll32.exe
                Wow64 process (32bit):true
                Commandline:loaddll32.exe 'C:\Users\user\Desktop\8OKQ6ogGRx.dll'
                Imagebase:0x50000
                File size:116736 bytes
                MD5 hash:542795ADF7CC08EFCF675D65310596E8
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000002.470954657.0000000003618000.00000004.00000040.sdmp, Author: Joe Security
                Reputation:high

                General

                Start time:18:51:25
                Start date:04/05/2021
                Path:C:\Windows\SysWOW64\cmd.exe
                Wow64 process (32bit):true
                Commandline:cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\8OKQ6ogGRx.dll',#1
                Imagebase:0xbd0000
                File size:232960 bytes
                MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                General

                Start time:18:51:25
                Start date:04/05/2021
                Path:C:\Windows\SysWOW64\rundll32.exe
                Wow64 process (32bit):true
                Commandline:rundll32.exe C:\Users\user\Desktop\8OKQ6ogGRx.dll,Enterbeen
                Imagebase:0x9e0000
                File size:61952 bytes
                MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                General

                Start time:18:51:25
                Start date:04/05/2021
                Path:C:\Windows\SysWOW64\rundll32.exe
                Wow64 process (32bit):true
                Commandline:rundll32.exe 'C:\Users\user\Desktop\8OKQ6ogGRx.dll',#1
                Imagebase:0x9e0000
                File size:61952 bytes
                MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                General

                Start time:18:51:28
                Start date:04/05/2021
                Path:C:\Windows\SysWOW64\rundll32.exe
                Wow64 process (32bit):true
                Commandline:rundll32.exe C:\Users\user\Desktop\8OKQ6ogGRx.dll,Multiply
                Imagebase:0x9e0000
                File size:61952 bytes
                MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                General

                Start time:18:53:26
                Start date:04/05/2021
                Path:C:\Program Files\internet explorer\iexplore.exe
                Wow64 process (32bit):false
                Commandline:'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
                Imagebase:0x7ff7e65e0000
                File size:823560 bytes
                MD5 hash:6465CB92B25A7BC1DF8E01D8AC5E7596
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                General

                Start time:18:53:27
                Start date:04/05/2021
                Path:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                Wow64 process (32bit):true
                Commandline:'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:5212 CREDAT:17410 /prefetch:2
                Imagebase:0xfd0000
                File size:822536 bytes
                MD5 hash:071277CC2E3DF41EEEA8013E2AB58D5A
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                Disassembly

                Code Analysis

                Reset < >