Analysis Report kS5hYPcgm8.dll

Overview

General Information

Sample Name: kS5hYPcgm8.dll
Analysis ID: 408913
MD5: 68fc6441db6c5539573adf08f210c39b
SHA1: c67a6a85716e0f1439cae1c1cdf259c271515e85
SHA256: 802a752fca3ded051f0655c68012c769232d098d4a57c9887da39fa89070235a
Tags: dllGozi
Infos:

Most interesting Screenshot:

Detection

Ursnif
Score: 56
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected Ursnif
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found potential string decryption / allocating functions
PE file contains an invalid checksum
Program does not show much activity (idle)
Sample execution stops while process was sleeping (likely an evasion)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

AV Detection:

barindex
Multi AV Scanner detection for submitted file
Source: kS5hYPcgm8.dll Virustotal: Detection: 51% Perma Link

Compliance:

barindex
Uses 32bit PE files
Source: kS5hYPcgm8.dll Static PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
Source: kS5hYPcgm8.dll Static PE information: DYNAMIC_BASE, NX_COMPAT
Source: Binary string: c:\938\follow-Record\Suffix\observe-element\force.pdb source: loaddll32.exe, 00000000.00000002.608295285.000000006DD7A000.00000002.00020000.sdmp, rundll32.exe, 00000002.00000002.534934724.000000006DD7A000.00000002.00020000.sdmp, rundll32.exe, 00000003.00000002.619699878.000000006DD7A000.00000002.00020000.sdmp, rundll32.exe, 0000000C.00000002.537317652.000000006DD7A000.00000002.00020000.sdmp, rundll32.exe, 0000000F.00000002.575775840.000000006DD7A000.00000002.00020000.sdmp, rundll32.exe, 00000014.00000002.619037007.000000006DD7A000.00000002.00020000.sdmp, rundll32.exe, 00000019.00000002.574975507.000000006DD7A000.00000002.00020000.sdmp, kS5hYPcgm8.dll

Key, Mouse, Clipboard, Microphone and Screen Capturing:

barindex
Yara detected Ursnif
Source: Yara match File source: 3.2.rundll32.exe.6dcf0000.1.unpack, type: UNPACKEDPE

E-Banking Fraud:

barindex
Yara detected Ursnif
Source: Yara match File source: 3.2.rundll32.exe.6dcf0000.1.unpack, type: UNPACKEDPE

System Summary:

barindex
Contains functionality to call native functions
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_6DCF2485 NtQueryVirtualMemory, 3_2_6DCF2485
Detected potential crypto function
Source: C:\Windows\System32\loaddll32.exe Code function: 0_2_6DD31C3C 0_2_6DD31C3C
Source: C:\Windows\System32\loaddll32.exe Code function: 0_2_6DD33E00 0_2_6DD33E00
Source: C:\Windows\System32\loaddll32.exe Code function: 0_2_6DD584BB 0_2_6DD584BB
Source: C:\Windows\System32\loaddll32.exe Code function: 0_2_6DD667D9 0_2_6DD667D9
Source: C:\Windows\System32\loaddll32.exe Code function: 0_2_6DD45150 0_2_6DD45150
Source: C:\Windows\System32\loaddll32.exe Code function: 0_2_6DD4E079 0_2_6DD4E079
Source: C:\Windows\System32\loaddll32.exe Code function: 0_2_6DD60396 0_2_6DD60396
Source: C:\Windows\System32\loaddll32.exe Code function: 0_2_6DD702BC 0_2_6DD702BC
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_6DD584BB 2_2_6DD584BB
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_6DD31C3C 2_2_6DD31C3C
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_6DD667D9 2_2_6DD667D9
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_6DD33E00 2_2_6DD33E00
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_6DD45150 2_2_6DD45150
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_6DD4E079 2_2_6DD4E079
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_6DD60396 2_2_6DD60396
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_6DD702BC 2_2_6DD702BC
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_6DCF2264 3_2_6DCF2264
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_6DD584BB 3_2_6DD584BB
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_6DD31C3C 3_2_6DD31C3C
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_6DD33E00 3_2_6DD33E00
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_6DD45150 3_2_6DD45150
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_6DD60396 3_2_6DD60396
Found potential string decryption / allocating functions
Source: C:\Windows\System32\loaddll32.exe Code function: String function: 6DD30990 appears 34 times
Source: C:\Windows\System32\loaddll32.exe Code function: String function: 6DD300AC appears 100 times
Source: C:\Windows\SysWOW64\rundll32.exe Code function: String function: 6DD30990 appears 56 times
Source: C:\Windows\SysWOW64\rundll32.exe Code function: String function: 6DD300AC appears 193 times
Source: C:\Windows\SysWOW64\rundll32.exe Code function: String function: 6DD300E0 appears 47 times
Source: C:\Windows\SysWOW64\rundll32.exe Code function: String function: 6DD523A9 appears 33 times
Uses 32bit PE files
Source: kS5hYPcgm8.dll Static PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
Source: classification engine Classification label: mal56.troj.winDLL@55/0@0/0
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6404:120:WilError_01
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6248:120:WilError_01
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7036:120:WilError_01
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6512:120:WilError_01
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7104:120:WilError_01
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6260:120:WilError_01
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6348:120:WilError_01
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4228:120:WilError_01
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6148:120:WilError_01
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6924:120:WilError_01
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6428:120:WilError_01
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6728:120:WilError_01
Source: kS5hYPcgm8.dll Static PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: C:\Windows\System32\loaddll32.exe Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\kS5hYPcgm8.dll,Connectdark
Source: kS5hYPcgm8.dll Virustotal: Detection: 51%
Source: unknown Process created: C:\Windows\System32\loaddll32.exe loaddll32.exe 'C:\Users\user\Desktop\kS5hYPcgm8.dll'
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\kS5hYPcgm8.dll',#1
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\kS5hYPcgm8.dll,Connectdark
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\kS5hYPcgm8.dll',#1
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c cd Island
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c cd Island
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c cd Matter m
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c cd Matter m
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\kS5hYPcgm8.dll,Mindlake
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c cd Island
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\kS5hYPcgm8.dll,Porthigh
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c cd Matter m
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c cd Island
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\kS5hYPcgm8.dll,Problemscale
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c cd Matter m
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c cd Island
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\kS5hYPcgm8.dll,WingGrass
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c cd Island
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c cd Island
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c cd Matter m
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c cd Matter m
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c cd Matter m
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\kS5hYPcgm8.dll',#1 Jump to behavior
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\kS5hYPcgm8.dll,Connectdark Jump to behavior
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\kS5hYPcgm8.dll,Mindlake Jump to behavior
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\kS5hYPcgm8.dll,Porthigh Jump to behavior
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\kS5hYPcgm8.dll,Problemscale Jump to behavior
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\kS5hYPcgm8.dll,WingGrass Jump to behavior
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c cd Island Jump to behavior
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c cd Matter m Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\kS5hYPcgm8.dll',#1 Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c cd Island Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c cd Matter m Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c cd Island Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c cd Matter m Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c cd Island Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c cd Matter m Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c cd Island Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c cd Matter m Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c cd Island Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c cd Matter m Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c cd Island Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c cd Matter m Jump to behavior
Source: Window Recorder Window detected: More than 3 window changes detected
Source: kS5hYPcgm8.dll Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: kS5hYPcgm8.dll Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: kS5hYPcgm8.dll Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: kS5hYPcgm8.dll Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: kS5hYPcgm8.dll Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: kS5hYPcgm8.dll Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: kS5hYPcgm8.dll Static PE information: DYNAMIC_BASE, NX_COMPAT
Source: kS5hYPcgm8.dll Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: c:\938\follow-Record\Suffix\observe-element\force.pdb source: loaddll32.exe, 00000000.00000002.608295285.000000006DD7A000.00000002.00020000.sdmp, rundll32.exe, 00000002.00000002.534934724.000000006DD7A000.00000002.00020000.sdmp, rundll32.exe, 00000003.00000002.619699878.000000006DD7A000.00000002.00020000.sdmp, rundll32.exe, 0000000C.00000002.537317652.000000006DD7A000.00000002.00020000.sdmp, rundll32.exe, 0000000F.00000002.575775840.000000006DD7A000.00000002.00020000.sdmp, rundll32.exe, 00000014.00000002.619037007.000000006DD7A000.00000002.00020000.sdmp, rundll32.exe, 00000019.00000002.574975507.000000006DD7A000.00000002.00020000.sdmp, kS5hYPcgm8.dll
Source: kS5hYPcgm8.dll Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: kS5hYPcgm8.dll Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: kS5hYPcgm8.dll Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: kS5hYPcgm8.dll Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: kS5hYPcgm8.dll Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

Data Obfuscation:

barindex
Contains functionality to dynamically determine API calls
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_6DCF1F31 LoadLibraryA,GetProcAddress, 3_2_6DCF1F31
PE file contains an invalid checksum
Source: kS5hYPcgm8.dll Static PE information: real checksum: 0xf3990 should be: 0xf169d
Uses code obfuscation techniques (call, push, ret)
Source: C:\Windows\System32\loaddll32.exe Code function: 0_2_6DD309D6 push ecx; ret 0_2_6DD309E9
Source: C:\Windows\System32\loaddll32.exe Code function: 0_2_6DD30075 push ecx; ret 0_2_6DD30088
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_6DD309D6 push ecx; ret 2_2_6DD309E9
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_6DD30075 push ecx; ret 2_2_6DD30088
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_6DCF2253 push ecx; ret 3_2_6DCF2263
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_6DCF2200 push ecx; ret 3_2_6DCF2209
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_6DD309D6 push ecx; ret 3_2_6DD309E9
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_6DD30075 push ecx; ret 3_2_6DD30088

Hooking and other Techniques for Hiding and Protection:

barindex
Yara detected Ursnif
Source: Yara match File source: 3.2.rundll32.exe.6dcf0000.1.unpack, type: UNPACKEDPE
Source: C:\Windows\SysWOW64\cmd.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\conhost.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\conhost.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\conhost.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\conhost.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\conhost.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\conhost.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\conhost.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\conhost.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\conhost.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\conhost.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\conhost.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\conhost.exe Process information set: NOOPENFILEERRORBOX Jump to behavior

Malware Analysis System Evasion:

barindex
Program does not show much activity (idle)
Source: all processes Thread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Sample execution stops while process was sleeping (likely an evasion)
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed

Anti Debugging:

barindex
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Source: C:\Windows\System32\loaddll32.exe Code function: 0_2_6DD51F6D IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 0_2_6DD51F6D
Contains functionality to dynamically determine API calls
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_6DCF1F31 LoadLibraryA,GetProcAddress, 3_2_6DCF1F31
Contains functionality to read the PEB
Source: C:\Windows\System32\loaddll32.exe Code function: 0_2_6DD5966F mov eax, dword ptr fs:[00000030h] 0_2_6DD5966F
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_6DD5966F mov eax, dword ptr fs:[00000030h] 2_2_6DD5966F
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_6DD5966F mov eax, dword ptr fs:[00000030h] 3_2_6DD5966F
Program does not show much activity (idle)
Source: all processes Thread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Windows\System32\loaddll32.exe Code function: 0_2_6DD51F6D IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 0_2_6DD51F6D
Source: C:\Windows\System32\loaddll32.exe Code function: 0_2_6DD307A7 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 0_2_6DD307A7
Source: C:\Windows\System32\loaddll32.exe Code function: 0_2_6DD30288 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, 0_2_6DD30288
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_6DD307A7 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 2_2_6DD307A7
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_6DD51F6D IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 2_2_6DD51F6D
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_6DD30288 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, 2_2_6DD30288
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_6DD51F6D IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 3_2_6DD51F6D
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_6DD30288 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, 3_2_6DD30288

HIPS / PFW / Operating System Protection Evasion:

barindex
Creates a process in suspended mode (likely to inject code)
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c cd Island Jump to behavior
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c cd Matter m Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\kS5hYPcgm8.dll',#1 Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c cd Island Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c cd Matter m Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c cd Island Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c cd Matter m Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c cd Island Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c cd Matter m Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c cd Island Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c cd Matter m Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c cd Island Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c cd Matter m Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c cd Island Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c cd Matter m Jump to behavior
Source: loaddll32.exe, 00000000.00000002.576781232.0000000000EE0000.00000002.00000001.sdmp, rundll32.exe, 00000002.00000002.534853952.00000000034B0000.00000002.00000001.sdmp, rundll32.exe, 00000003.00000002.610554445.0000000002D90000.00000002.00000001.sdmp, rundll32.exe, 0000000C.00000002.534015445.00000000030F0000.00000002.00000001.sdmp, rundll32.exe, 0000000F.00000002.526747254.0000000002D90000.00000002.00000001.sdmp, rundll32.exe, 00000014.00000002.610139527.00000000038A0000.00000002.00000001.sdmp, rundll32.exe, 00000019.00000002.525740389.0000000002D90000.00000002.00000001.sdmp Binary or memory string: Shell_TrayWnd
Source: loaddll32.exe, 00000000.00000002.576781232.0000000000EE0000.00000002.00000001.sdmp, rundll32.exe, 00000002.00000002.534853952.00000000034B0000.00000002.00000001.sdmp, rundll32.exe, 00000003.00000002.610554445.0000000002D90000.00000002.00000001.sdmp, rundll32.exe, 0000000C.00000002.534015445.00000000030F0000.00000002.00000001.sdmp, rundll32.exe, 0000000F.00000002.526747254.0000000002D90000.00000002.00000001.sdmp, rundll32.exe, 00000014.00000002.610139527.00000000038A0000.00000002.00000001.sdmp, rundll32.exe, 00000019.00000002.525740389.0000000002D90000.00000002.00000001.sdmp Binary or memory string: Progman
Source: loaddll32.exe, 00000000.00000002.576781232.0000000000EE0000.00000002.00000001.sdmp, rundll32.exe, 00000002.00000002.534853952.00000000034B0000.00000002.00000001.sdmp, rundll32.exe, 00000003.00000002.610554445.0000000002D90000.00000002.00000001.sdmp, rundll32.exe, 0000000C.00000002.534015445.00000000030F0000.00000002.00000001.sdmp, rundll32.exe, 0000000F.00000002.526747254.0000000002D90000.00000002.00000001.sdmp, rundll32.exe, 00000014.00000002.610139527.00000000038A0000.00000002.00000001.sdmp, rundll32.exe, 00000019.00000002.525740389.0000000002D90000.00000002.00000001.sdmp Binary or memory string: SProgram Managerl
Source: loaddll32.exe, 00000000.00000002.576781232.0000000000EE0000.00000002.00000001.sdmp, rundll32.exe, 00000002.00000002.534853952.00000000034B0000.00000002.00000001.sdmp, rundll32.exe, 00000003.00000002.610554445.0000000002D90000.00000002.00000001.sdmp, rundll32.exe, 0000000C.00000002.534015445.00000000030F0000.00000002.00000001.sdmp, rundll32.exe, 0000000F.00000002.526747254.0000000002D90000.00000002.00000001.sdmp, rundll32.exe, 00000014.00000002.610139527.00000000038A0000.00000002.00000001.sdmp, rundll32.exe, 00000019.00000002.525740389.0000000002D90000.00000002.00000001.sdmp Binary or memory string: Shell_TrayWnd,
Source: loaddll32.exe, 00000000.00000002.576781232.0000000000EE0000.00000002.00000001.sdmp, rundll32.exe, 00000002.00000002.534853952.00000000034B0000.00000002.00000001.sdmp, rundll32.exe, 00000003.00000002.610554445.0000000002D90000.00000002.00000001.sdmp, rundll32.exe, 0000000C.00000002.534015445.00000000030F0000.00000002.00000001.sdmp, rundll32.exe, 0000000F.00000002.526747254.0000000002D90000.00000002.00000001.sdmp, rundll32.exe, 00000014.00000002.610139527.00000000038A0000.00000002.00000001.sdmp, rundll32.exe, 00000019.00000002.525740389.0000000002D90000.00000002.00000001.sdmp Binary or memory string: Progmanlock

Language, Device and Operating System Detection:

barindex
Contains functionality to query CPU information (cpuid)
Source: C:\Windows\System32\loaddll32.exe Code function: 0_2_6DD30604 cpuid 0_2_6DD30604
Contains functionality to query locales information (e.g. system language)
Source: C:\Windows\System32\loaddll32.exe Code function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW, 0_2_6DD6DD96
Source: C:\Windows\System32\loaddll32.exe Code function: GetLocaleInfoW, 0_2_6DD6DF65
Source: C:\Windows\System32\loaddll32.exe Code function: EnumSystemLocalesW, 0_2_6DD63952
Source: C:\Windows\System32\loaddll32.exe Code function: GetLocaleInfoW,GetLocaleInfoW,GetACP, 0_2_6DD6E518
Source: C:\Windows\System32\loaddll32.exe Code function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW, 0_2_6DD6E6EC
Source: C:\Windows\System32\loaddll32.exe Code function: GetLocaleInfoW, 0_2_6DD6E61F
Source: C:\Windows\System32\loaddll32.exe Code function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW, 0_2_6DD6E19F
Source: C:\Windows\System32\loaddll32.exe Code function: GetLocaleInfoW, 0_2_6DD2F1B7
Source: C:\Windows\System32\loaddll32.exe Code function: EnumSystemLocalesW, 0_2_6DD6E112
Source: C:\Windows\System32\loaddll32.exe Code function: EnumSystemLocalesW, 0_2_6DD6E077
Source: C:\Windows\System32\loaddll32.exe Code function: EnumSystemLocalesW, 0_2_6DD6E00E
Source: C:\Windows\System32\loaddll32.exe Code function: GetLocaleInfoW, 0_2_6DD6E3EF
Source: C:\Windows\System32\loaddll32.exe Code function: ___crtGetLocaleInfoEx, 0_2_6DD2F364
Source: C:\Windows\System32\loaddll32.exe Code function: GetLocaleInfoW, 0_2_6DD64323
Source: C:\Windows\SysWOW64\rundll32.exe Code function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW, 2_2_6DD6DD96
Source: C:\Windows\SysWOW64\rundll32.exe Code function: GetLocaleInfoW,GetLocaleInfoW,GetACP, 2_2_6DD6E518
Source: C:\Windows\SysWOW64\rundll32.exe Code function: GetLocaleInfoW, 2_2_6DD6DF65
Source: C:\Windows\SysWOW64\rundll32.exe Code function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW, 2_2_6DD6E6EC
Source: C:\Windows\SysWOW64\rundll32.exe Code function: GetLocaleInfoW, 2_2_6DD6E61F
Source: C:\Windows\SysWOW64\rundll32.exe Code function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW, 2_2_6DD6E19F
Source: C:\Windows\SysWOW64\rundll32.exe Code function: GetLocaleInfoW, 2_2_6DD2F1B7
Source: C:\Windows\SysWOW64\rundll32.exe Code function: EnumSystemLocalesW, 2_2_6DD63952
Source: C:\Windows\SysWOW64\rundll32.exe Code function: EnumSystemLocalesW, 2_2_6DD6E112
Source: C:\Windows\SysWOW64\rundll32.exe Code function: EnumSystemLocalesW, 2_2_6DD6E077
Source: C:\Windows\SysWOW64\rundll32.exe Code function: EnumSystemLocalesW, 2_2_6DD6E00E
Source: C:\Windows\SysWOW64\rundll32.exe Code function: GetLocaleInfoW, 2_2_6DD6E3EF
Source: C:\Windows\SysWOW64\rundll32.exe Code function: ___crtGetLocaleInfoEx, 2_2_6DD2F364
Source: C:\Windows\SysWOW64\rundll32.exe Code function: GetLocaleInfoW, 2_2_6DD64323
Source: C:\Windows\SysWOW64\rundll32.exe Code function: GetLocaleInfoA,GetSystemDefaultUILanguage,VerLanguageNameA, 3_2_6DCF1566
Source: C:\Windows\SysWOW64\rundll32.exe Code function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW, 3_2_6DD6DD96
Source: C:\Windows\SysWOW64\rundll32.exe Code function: GetLocaleInfoW,GetLocaleInfoW,GetACP, 3_2_6DD6E518
Source: C:\Windows\SysWOW64\rundll32.exe Code function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW, 3_2_6DD6E6EC
Source: C:\Windows\SysWOW64\rundll32.exe Code function: GetLocaleInfoW, 3_2_6DD2F1B7
Source: C:\Windows\SysWOW64\rundll32.exe Code function: EnumSystemLocalesW, 3_2_6DD63952
Source: C:\Windows\SysWOW64\rundll32.exe Code function: EnumSystemLocalesW, 3_2_6DD6E112
Source: C:\Windows\SysWOW64\rundll32.exe Code function: EnumSystemLocalesW, 3_2_6DD6E077
Source: C:\Windows\SysWOW64\rundll32.exe Code function: EnumSystemLocalesW, 3_2_6DD6E00E
Source: C:\Windows\SysWOW64\rundll32.exe Code function: ___crtGetLocaleInfoEx, 3_2_6DD2F364
Source: C:\Windows\SysWOW64\rundll32.exe Code function: GetLocaleInfoW, 3_2_6DD64323
Source: C:\Windows\System32\loaddll32.exe Code function: 0_2_6DD309F0 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter, 0_2_6DD309F0
Source: C:\Windows\System32\loaddll32.exe Code function: 0_2_6DD68951 _free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free, 0_2_6DD68951
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_6DCF146C CreateEventA,GetVersion,GetCurrentProcessId,OpenProcess,GetLastError, 3_2_6DCF146C

Stealing of Sensitive Information:

barindex
Yara detected Ursnif
Source: Yara match File source: 3.2.rundll32.exe.6dcf0000.1.unpack, type: UNPACKEDPE

Remote Access Functionality:

barindex
Yara detected Ursnif
Source: Yara match File source: 3.2.rundll32.exe.6dcf0000.1.unpack, type: UNPACKEDPE
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Source: C:\Windows\System32\loaddll32.exe Code function: 0_2_6DCF16BC __ehhandler$??1_Scoped_lock@?$SafeRWList@UListEntry@details@Concurrency@@VNoCount@CollectionTypes@23@V_ReaderWriterLock@23@@details@Concurrency@@QAE@XZ, 0_2_6DCF16BC
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 2_2_6DCF16BC __ehhandler$??1_Scoped_lock@?$SafeRWList@UListEntry@details@Concurrency@@VNoCount@CollectionTypes@23@V_ReaderWriterLock@23@@details@Concurrency@@QAE@XZ, 2_2_6DCF16BC
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 408913 Sample: kS5hYPcgm8.dll Startdate: 09/05/2021 Architecture: WINDOWS Score: 56 59 Multi AV Scanner detection for submitted file 2->59 61 Yara detected  Ursnif 2->61 9 loaddll32.exe 1 2->9         started        process3 process4 11 cmd.exe 1 9->11         started        13 rundll32.exe 9->13         started        15 rundll32.exe 9->15         started        17 5 other processes 9->17 process5 19 rundll32.exe 11->19         started        21 cmd.exe 1 13->21         started        23 cmd.exe 1 13->23         started        25 cmd.exe 1 15->25         started        27 cmd.exe 1 15->27         started        29 cmd.exe 1 17->29         started        31 cmd.exe 1 17->31         started        33 cmd.exe 1 17->33         started        35 3 other processes 17->35 process6 51 2 other processes 19->51 37 conhost.exe 21->37         started        39 conhost.exe 23->39         started        41 conhost.exe 25->41         started        43 conhost.exe 27->43         started        45 conhost.exe 29->45         started        47 conhost.exe 31->47         started        49 conhost.exe 33->49         started        53 3 other processes 35->53 process7 55 conhost.exe 51->55         started        57 conhost.exe 51->57         started       
No contacted IP infos