Loading ...

Play interactive tourEdit tour

Analysis Report 609a460e94791.tiff.dll

Overview

General Information

Sample Name:609a460e94791.tiff.dll
Analysis ID:410818
MD5:50a299d1e92d9205e123404c8e05904d
SHA1:c188272ab757dbbf14e74781fc90fcefe4aeb615
SHA256:3b56b7298c366a323d28658a455abf0d4e78fa197a43ce13bedab05f26901d34
Tags:BRTdllgeogoziisfbitaursnif
Infos:

Most interesting Screenshot:

Detection

Ursnif
Score:64
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Yara detected Ursnif
Writes or reads registry keys via WMI
Writes registry values via WMI
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
IP address seen in connection with other malware
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains an invalid checksum
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

Startup

  • System is w10x64
  • loaddll32.exe (PID: 6660 cmdline: loaddll32.exe 'C:\Users\user\Desktop\609a460e94791.tiff.dll' MD5: 542795ADF7CC08EFCF675D65310596E8)
    • cmd.exe (PID: 6672 cmdline: cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\609a460e94791.tiff.dll',#1 MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • rundll32.exe (PID: 6700 cmdline: rundll32.exe 'C:\Users\user\Desktop\609a460e94791.tiff.dll',#1 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 6688 cmdline: rundll32.exe C:\Users\user\Desktop\609a460e94791.tiff.dll,Hundredpopulate@@8 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 6736 cmdline: rundll32.exe C:\Users\user\Desktop\609a460e94791.tiff.dll,Mark@@12 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 6760 cmdline: rundll32.exe C:\Users\user\Desktop\609a460e94791.tiff.dll,Seefit@@8 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
  • iexplore.exe (PID: 5436 cmdline: 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding MD5: 6465CB92B25A7BC1DF8E01D8AC5E7596)
    • iexplore.exe (PID: 5924 cmdline: 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:5436 CREDAT:17410 /prefetch:2 MD5: 071277CC2E3DF41EEEA8013E2AB58D5A)
  • cleanup

Malware Configuration

Threatname: Ursnif

{"RSA Public Key": "KujE77ctKyR8x3/dODwZbEsxGmck+FW9384s5u0Kacw8y1gCN+8m2bfjJPovkn+Uzufcdfss+a43eI6oHR1KgWQmvEAO6LK8tJv+Wl7iCBPJP7eef8xKeXht/Mhk1PSj7mHnJ9lcqKMtTteEdSecVvMRtb/WSKVTFfHDva9My7AJ/NbXqHdzCG7znACswLxD", "c2_domain": ["outlook.com/login", "gmail.com", "worunekulo.club", "horunekulo.website"], "botnet": "8877", "server": "12", "serpent_key": "30218409ILPAJDUR", "sleep_time": "10", "CONF_TIMEOUT": "20", "SetWaitableTimer_value": "0", "DGA_count": "10"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000001.00000003.662417377.0000000003EA8000.00000004.00000040.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
    00000004.00000003.681209868.0000000005148000.00000004.00000040.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
      00000001.00000002.724251151.0000000003EA8000.00000004.00000040.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
        00000001.00000003.662378098.0000000003EA8000.00000004.00000040.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
          00000001.00000003.662456772.0000000003EA8000.00000004.00000040.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
            Click to see the 15 entries

            Sigma Overview

            No Sigma rule has matched

            Signature Overview

            Click to jump to signature section

            Show All Signature Results

            AV Detection:

            barindex
            Found malware configurationShow sources
            Source: 4.2.rundll32.exe.4c894a0.3.raw.unpackMalware Configuration Extractor: Ursnif {"RSA Public Key": "KujE77ctKyR8x3/dODwZbEsxGmck+FW9384s5u0Kacw8y1gCN+8m2bfjJPovkn+Uzufcdfss+a43eI6oHR1KgWQmvEAO6LK8tJv+Wl7iCBPJP7eef8xKeXht/Mhk1PSj7mHnJ9lcqKMtTteEdSecVvMRtb/WSKVTFfHDva9My7AJ/NbXqHdzCG7znACswLxD", "c2_domain": ["outlook.com/login", "gmail.com", "worunekulo.club", "horunekulo.website"], "botnet": "8877", "server": "12", "serpent_key": "30218409ILPAJDUR", "sleep_time": "10", "CONF_TIMEOUT": "20", "SetWaitableTimer_value": "0", "DGA_count": "10"}
            Source: 609a460e94791.tiff.dllStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeFile opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dll
            Source: 609a460e94791.tiff.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT
            Source: Binary string: c:\die\Oh\ease_Slip\Suffix\fall.pdb source: loaddll32.exe, 00000001.00000002.727825463.000000006E20B000.00000002.00020000.sdmp, rundll32.exe, 00000004.00000002.730325292.000000006E20B000.00000002.00020000.sdmp, 609a460e94791.tiff.dll
            Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_6E1E5AB0 FindFirstFileExW,std::_Timevec::_Timevec,FindNextFileW,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_02C94C3B RtlAllocateHeap,RtlAllocateHeap,RtlAllocateHeap,memset,CreateFileA,GetFileTime,FindCloseChangeNotification,StrRChrA,lstrcat,FindFirstFileA,FindFirstFileA,CompareFileTime,CompareFileTime,FindClose,FindNextFileA,FindClose,FindFirstFileA,CompareFileTime,StrChrA,memcpy,FindNextFileA,FindClose,FindFirstFileA,CompareFileTime,FindClose,HeapFree,HeapFree,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6E1E5AB0 FindFirstFileExW,std::_Timevec::_Timevec,FindNextFileW,
            Source: Joe Sandbox ViewIP Address: 40.97.161.50 40.97.161.50
            Source: global trafficHTTP traffic detected: GET /login/greed/gx9NI4Ybpp/8F85m84ndjn4UwJSZ/KFY_2BxmUPMy/coa0QUktAbb/vjBaicl7yvyNDs/NaAVAq9mPnbNTlKz1AUy2/5aIKWQiZNRBNaijS/Tt5Vo5dnaNIMeJI/Piqfb55cpfCEI8CpHK/_2FWICMIW/YUkQnOfGVld1SPd1rTnm/w0s_2F9NNcplFjkZ_2F/ufX9zF863VCJiOMFbmL1SV/K4t8NhPa8Lg/cl7PdmL.gfk HTTP/1.1Accept: text/html, application/xhtml+xml, image/jxr, */*Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateHost: outlook.comConnection: Keep-Alive
            Source: unknownDNS traffic detected: queries for: outlook.com
            Source: ~DF6A2029352AAD8EB0.TMP.18.dr, {7A4756FC-B284-11EB-90E5-ECF4BB2D2496}.dat.18.drString found in binary or memory: https://outlook.office365.com/login/greed/gx9NI4Ybpp/8F85m84ndjn4UwJSZ/KFY_2BxmUPMy/coa0QUktAbb/vjBa
            Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
            Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
            Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
            Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
            Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443

            Key, Mouse, Clipboard, Microphone and Screen Capturing:

            barindex
            Yara detected UrsnifShow sources
            Source: Yara matchFile source: 00000001.00000003.662417377.0000000003EA8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.681209868.0000000005148000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.724251151.0000000003EA8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000003.662378098.0000000003EA8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000003.662456772.0000000003EA8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.681069818.0000000005148000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000003.662317153.0000000003EA8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.681166678.0000000005148000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000003.662182472.0000000003EA8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000003.662498468.0000000003EA8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.681184112.0000000005148000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.681198469.0000000005148000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000003.662484640.0000000003EA8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.681099453.0000000005148000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.681146524.0000000005148000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000003.662019943.0000000003EA8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.681124435.0000000005148000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.725706595.0000000005148000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: loaddll32.exe PID: 6660, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 6700, type: MEMORY
            Source: loaddll32.exe, 00000001.00000002.722729913.00000000016AB000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

            E-Banking Fraud:

            barindex
            Yara detected UrsnifShow sources
            Source: Yara matchFile source: 00000001.00000003.662417377.0000000003EA8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.681209868.0000000005148000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.724251151.0000000003EA8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000003.662378098.0000000003EA8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000003.662456772.0000000003EA8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.681069818.0000000005148000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000003.662317153.0000000003EA8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.681166678.0000000005148000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000003.662182472.0000000003EA8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000003.662498468.0000000003EA8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.681184112.0000000005148000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.681198469.0000000005148000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000003.662484640.0000000003EA8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.681099453.0000000005148000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.681146524.0000000005148000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000003.662019943.0000000003EA8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.681124435.0000000005148000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.725706595.0000000005148000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: loaddll32.exe PID: 6660, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 6700, type: MEMORY

            System Summary:

            barindex
            Writes or reads registry keys via WMIShow sources
            Source: C:\Windows\System32\loaddll32.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::GetStringValue
            Source: C:\Windows\System32\loaddll32.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetDWORDValue
            Source: C:\Windows\System32\loaddll32.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
            Source: C:\Windows\System32\loaddll32.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue
            Writes registry values via WMIShow sources
            Source: C:\Windows\System32\loaddll32.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetDWORDValue
            Source: C:\Windows\System32\loaddll32.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
            Source: C:\Windows\System32\loaddll32.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue
            Source: C:\Windows\SysWOW64\rundll32.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetDWORDValue
            Source: C:\Windows\SysWOW64\rundll32.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
            Source: C:\Windows\SysWOW64\rundll32.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue
            Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_6E171F14 NtMapViewOfSection,
            Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_6E1715F1 GetProcAddress,NtCreateSection,memset,
            Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_6E1723A5 NtQueryVirtualMemory,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_02C91168 NtOpenProcess,NtOpenProcessToken,NtQueryInformationToken,NtQueryInformationToken,NtQueryInformationToken,memcpy,NtClose,NtClose,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_02C9B2F1 NtQueryVirtualMemory,
            Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_6E172184
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_02C9B0CC
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_02C9696A
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_02C91B6A
            Source: 609a460e94791.tiff.dllBinary or memory string: OriginalFilenamefall.dll8 vs 609a460e94791.tiff.dll
            Source: 609a460e94791.tiff.dllStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
            Source: classification engineClassification label: mal64.troj.winDLL@14/5@3/3
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_02C97F56 CreateToolhelp32Snapshot,Process32First,Process32Next,CloseHandle,
            Source: C:\Program Files\internet explorer\iexplore.exeFile created: C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{7A4756FA-B284-11EB-90E5-ECF4BB2D2496}.datJump to behavior
            Source: C:\Program Files\internet explorer\iexplore.exeFile created: C:\Users\user\AppData\Local\Temp\~DF745550B0ECD73E02.TMPJump to behavior
            Source: 609a460e94791.tiff.dllStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: C:\Program Files\internet explorer\iexplore.exeFile read: C:\Users\desktop.iniJump to behavior
            Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\609a460e94791.tiff.dll,Hundredpopulate@@8
            Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe 'C:\Users\user\Desktop\609a460e94791.tiff.dll'
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\609a460e94791.tiff.dll',#1
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\609a460e94791.tiff.dll,Hundredpopulate@@8
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\609a460e94791.tiff.dll',#1
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\609a460e94791.tiff.dll,Mark@@12
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\609a460e94791.tiff.dll,Seefit@@8
            Source: unknownProcess created: C:\Program Files\internet explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
            Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:5436 CREDAT:17410 /prefetch:2
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\609a460e94791.tiff.dll',#1
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\609a460e94791.tiff.dll,Hundredpopulate@@8
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\609a460e94791.tiff.dll,Mark@@12
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\609a460e94791.tiff.dll,Seefit@@8
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\609a460e94791.tiff.dll',#1
            Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:5436 CREDAT:17410 /prefetch:2
            Source: C:\Windows\System32\loaddll32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}\InprocServer32
            Source: C:\Windows\SysWOW64\rundll32.exeAutomated click: OK
            Source: C:\Windows\SysWOW64\rundll32.exeAutomated click: OK
            Source: C:\Windows\SysWOW64\rundll32.exeAutomated click: OK
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeFile opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dll
            Source: 609a460e94791.tiff.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
            Source: 609a460e94791.tiff.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
            Source: 609a460e94791.tiff.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
            Source: 609a460e94791.tiff.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
            Source: 609a460e94791.tiff.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
            Source: 609a460e94791.tiff.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
            Source: 609a460e94791.tiff.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT
            Source: 609a460e94791.tiff.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
            Source: Binary string: c:\die\Oh\ease_Slip\Suffix\fall.pdb source: loaddll32.exe, 00000001.00000002.727825463.000000006E20B000.00000002.00020000.sdmp, rundll32.exe, 00000004.00000002.730325292.000000006E20B000.00000002.00020000.sdmp, 609a460e94791.tiff.dll
            Source: 609a460e94791.tiff.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
            Source: 609a460e94791.tiff.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
            Source: 609a460e94791.tiff.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
            Source: 609a460e94791.tiff.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
            Source: 609a460e94791.tiff.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
            Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_6E1717FA LoadLibraryA,GetProcAddress,
            Source: 609a460e94791.tiff.dllStatic PE information: real checksum: 0xdacb0 should be: 0xd1c24
            Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_6E172120 push ecx; ret
            Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_6E172173 push ecx; ret
            Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_6E2406DB push ebp; retf 0000h
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_02C9B0BB push ecx; ret
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_02C9AD00 push ecx; ret
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6E2406DB push ebp; retf 0000h

            Hooking and other Techniques for Hiding and Protection:

            barindex
            Yara detected UrsnifShow sources
            Source: Yara matchFile source: 00000001.00000003.662417377.0000000003EA8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.681209868.0000000005148000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.724251151.0000000003EA8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000003.662378098.0000000003EA8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000003.662456772.0000000003EA8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.681069818.0000000005148000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000003.662317153.0000000003EA8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.681166678.0000000005148000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000003.662182472.0000000003EA8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000003.662498468.0000000003EA8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.681184112.0000000005148000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.681198469.0000000005148000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000003.662484640.0000000003EA8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.681099453.0000000005148000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.681146524.0000000005148000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000003.662019943.0000000003EA8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.681124435.0000000005148000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.725706595.0000000005148000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: loaddll32.exe PID: 6660, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 6700, type: MEMORY
            Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_6E1A11D0 GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,
            Source: C:\Windows\System32\loaddll32.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
            Source: C:\Windows\System32\loaddll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\loaddll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_6E1E5AB0 FindFirstFileExW,std::_Timevec::_Timevec,FindNextFileW,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_02C94C3B RtlAllocateHeap,RtlAllocateHeap,RtlAllocateHeap,memset,CreateFileA,GetFileTime,FindCloseChangeNotification,StrRChrA,lstrcat,FindFirstFileA,FindFirstFileA,CompareFileTime,CompareFileTime,FindClose,FindNextFileA,FindClose,FindFirstFileA,CompareFileTime,StrChrA,memcpy,FindNextFileA,FindClose,FindFirstFileA,CompareFileTime,FindClose,HeapFree,HeapFree,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6E1E5AB0 FindFirstFileExW,std::_Timevec::_Timevec,FindNextFileW,
            Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_6E1A36C0 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
            Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_6E1E0480 __invoke_watson_if_error,OutputDebugStringW,OutputDebugStringW,OutputDebugStringW,OutputDebugStringW,OutputDebugStringW,__aligned_msize,__invoke_watson_if_error,__aligned_msize,__invoke_watson_if_error,__aligned_msize,__invoke_watson_if_error,__aligned_msize,__invoke_watson_if_error,__aligned_msize,__invoke_watson_if_error,__aligned_msize,__invoke_watson_if_error,__aligned_msize,__invoke_watson_if_error,__cftoe,__aligned_msize,__invoke_watson_if_error,GetFileType,WriteConsoleW,GetLastError,__cftoe,WriteFile,WriteFile,OutputDebugStringW,__invoke_watson_if_error,__CrtDbgReportWV,
            Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_6E1717FA LoadLibraryA,GetProcAddress,
            Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_6E1E4E20 mov ecx, dword ptr fs:[00000030h]
            Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_6E1E4CE0 mov ecx, dword ptr fs:[00000030h]
            Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_6E1E4D80 mov ecx, dword ptr fs:[00000030h]
            Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_6E1B7960 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_6E23C536 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_6E23C46C mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_6E23C073 push dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6E1E4E20 mov ecx, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6E1E4CE0 mov ecx, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6E1E4D80 mov ecx, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6E1B7960 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6E23C536 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6E23C46C mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6E23C073 push dword ptr fs:[00000030h]
            Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_6E1A36C0 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
            Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_6E1B4F60 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
            Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_6E1A38F0 SetUnhandledExceptionFilter,
            Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_6E1A3990 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6E1A36C0 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6E1B4F60 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6E1A38F0 SetUnhandledExceptionFilter,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6E1A3990 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\609a460e94791.tiff.dll',#1
            Source: loaddll32.exe, 00000001.00000002.723307341.0000000001CF0000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.724383239.00000000031B0000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
            Source: loaddll32.exe, 00000001.00000002.723307341.0000000001CF0000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.724383239.00000000031B0000.00000002.00000001.sdmpBinary or memory string: Progman
            Source: loaddll32.exe, 00000001.00000002.723307341.0000000001CF0000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.724383239.00000000031B0000.00000002.00000001.sdmpBinary or memory string: &Program Manager
            Source: loaddll32.exe, 00000001.00000002.723307341.0000000001CF0000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.724383239.00000000031B0000.00000002.00000001.sdmpBinary or memory string: Progmanlock
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_02C92D6E cpuid
            Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_6E171237 SetThreadPriority,GetSystemTime,SwitchToThread,Sleep,GetLongPathNameW,GetLongPathNameW,GetLongPathNameW,GetLastError,WaitForSingleObject,GetExitCodeThread,CloseHandle,GetLastError,GetLastError,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_02C92D6E RtlAllocateHeap,GetUserNameW,RtlAllocateHeap,GetUserNameW,HeapFree,GetComputerNameW,GetComputerNameW,RtlAllocateHeap,GetComputerNameW,HeapFree,
            Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_6E171CDD CreateEventA,GetVersion,GetCurrentProcessId,OpenProcess,GetLastError,

            Stealing of Sensitive Information:

            barindex
            Yara detected UrsnifShow sources
            Source: Yara matchFile source: 00000001.00000003.662417377.0000000003EA8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.681209868.0000000005148000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.724251151.0000000003EA8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000003.662378098.0000000003EA8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000003.662456772.0000000003EA8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.681069818.0000000005148000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000003.662317153.0000000003EA8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.681166678.0000000005148000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000003.662182472.0000000003EA8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000003.662498468.0000000003EA8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.681184112.0000000005148000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.681198469.0000000005148000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000003.662484640.0000000003EA8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.681099453.0000000005148000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.681146524.0000000005148000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000003.662019943.0000000003EA8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.681124435.0000000005148000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.725706595.0000000005148000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: loaddll32.exe PID: 6660, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 6700, type: MEMORY

            Remote Access Functionality:

            barindex
            Yara detected UrsnifShow sources
            Source: Yara matchFile source: 00000001.00000003.662417377.0000000003EA8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.681209868.0000000005148000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.724251151.0000000003EA8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000003.662378098.0000000003EA8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000003.662456772.0000000003EA8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.681069818.0000000005148000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000003.662317153.0000000003EA8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.681166678.0000000005148000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000003.662182472.0000000003EA8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000003.662498468.0000000003EA8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.681184112.0000000005148000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.681198469.0000000005148000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000003.662484640.0000000003EA8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.681099453.0000000005148000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.681146524.0000000005148000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000003.662019943.0000000003EA8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.681124435.0000000005148000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.725706595.0000000005148000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: loaddll32.exe PID: 6660, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 6700, type: MEMORY

            Mitre Att&ck Matrix

            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            Valid AccountsWindows Management Instrumentation2Application Shimming1Process Injection12Masquerading1Input Capture1System Time Discovery1Remote ServicesInput Capture1Exfiltration Over Other Network MediumEncrypted Channel12Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
            Default AccountsNative API1Boot or Logon Initialization ScriptsApplication Shimming1Process Injection12LSASS MemoryQuery Registry1Remote Desktop ProtocolArchive Collected Data1Exfiltration Over BluetoothIngress Tool Transfer1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or Information1Security Account ManagerSecurity Software Discovery2SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationNon-Application Layer Protocol2Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
            Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Rundll321NTDSProcess Discovery2Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol3SIM Card SwapCarrier Billing Fraud
            Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA SecretsAccount Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
            Replication Through Removable MediaLaunchdRc.commonRc.commonSteganographyCached Domain CredentialsSystem Owner/User Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
            External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSyncFile and Directory Discovery2Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
            Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc FilesystemSystem Information Discovery13Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

            Behavior Graph

            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 signatures2 2 Behavior Graph ID: 410818 Sample: 609a460e94791.tiff.dll Startdate: 11/05/2021 Architecture: WINDOWS Score: 64 32 Found malware configuration 2->32 34 Yara detected  Ursnif 2->34 7 loaddll32.exe 1 2->7         started        10 iexplore.exe 1 51 2->10         started        process3 signatures4 36 Writes or reads registry keys via WMI 7->36 38 Writes registry values via WMI 7->38 12 rundll32.exe 7->12         started        15 cmd.exe 1 7->15         started        17 rundll32.exe 7->17         started        19 rundll32.exe 7->19         started        21 iexplore.exe 24 10->21         started        process5 dnsIp6 40 Writes registry values via WMI 12->40 24 rundll32.exe 15->24         started        26 FRA-efz.ms-acdc.office.com 40.101.12.82, 443, 49737, 49738 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 21->26 28 outlook.com 40.97.161.50, 443, 49732, 49733 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 21->28 30 5 other IPs or domains 21->30 signatures7 process8

            Screenshots

            Thumbnails

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.

            windows-stand

            Antivirus, Machine Learning and Genetic Malware Detection

            Initial Sample

            SourceDetectionScannerLabelLink
            609a460e94791.tiff.dll0%ReversingLabs

            Dropped Files

            No Antivirus matches

            Unpacked PE Files

            SourceDetectionScannerLabelLinkDownload
            4.2.rundll32.exe.2c90000.1.unpack100%AviraHEUR/AGEN.1108168Download File
            1.2.loaddll32.exe.1620000.0.unpack100%AviraHEUR/AGEN.1108168Download File

            Domains

            No Antivirus matches

            URLs

            No Antivirus matches

            Domains and IPs

            Contacted Domains

            NameIPActiveMaliciousAntivirus DetectionReputation
            outlook.com
            40.97.161.50
            truefalse
              high
              HHN-efz.ms-acdc.office.com
              52.97.201.34
              truefalse
                high
                FRA-efz.ms-acdc.office.com
                40.101.12.82
                truefalse
                  high
                  www.outlook.com
                  unknown
                  unknownfalse
                    high
                    outlook.office365.com
                    unknown
                    unknownfalse
                      high

                      Contacted URLs

                      NameMaliciousAntivirus DetectionReputation
                      http://outlook.com/login/greed/gx9NI4Ybpp/8F85m84ndjn4UwJSZ/KFY_2BxmUPMy/coa0QUktAbb/vjBaicl7yvyNDs/NaAVAq9mPnbNTlKz1AUy2/5aIKWQiZNRBNaijS/Tt5Vo5dnaNIMeJI/Piqfb55cpfCEI8CpHK/_2FWICMIW/YUkQnOfGVld1SPd1rTnm/w0s_2F9NNcplFjkZ_2F/ufX9zF863VCJiOMFbmL1SV/K4t8NhPa8Lg/cl7PdmL.gfkfalse
                        high

                        URLs from Memory and Binaries

                        NameSourceMaliciousAntivirus DetectionReputation
                        https://outlook.office365.com/login/greed/gx9NI4Ybpp/8F85m84ndjn4UwJSZ/KFY_2BxmUPMy/coa0QUktAbb/vjBa~DF6A2029352AAD8EB0.TMP.18.dr, {7A4756FC-B284-11EB-90E5-ECF4BB2D2496}.dat.18.drfalse
                          high

                          Contacted IPs

                          • No. of IPs < 25%
                          • 25% < No. of IPs < 50%
                          • 50% < No. of IPs < 75%
                          • 75% < No. of IPs

                          Public

                          IPDomainCountryFlagASNASN NameMalicious
                          52.97.201.34
                          HHN-efz.ms-acdc.office.comUnited States
                          8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                          40.97.161.50
                          outlook.comUnited States
                          8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                          40.101.12.82
                          FRA-efz.ms-acdc.office.comUnited States
                          8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse

                          General Information

                          Joe Sandbox Version:32.0.0 Black Diamond
                          Analysis ID:410818
                          Start date:11.05.2021
                          Start time:11:09:21
                          Joe Sandbox Product:CloudBasic
                          Overall analysis duration:0h 8m 34s
                          Hypervisor based Inspection enabled:false
                          Report type:light
                          Sample file name:609a460e94791.tiff.dll
                          Cookbook file name:default.jbs
                          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                          Run name:Run with higher sleep bypass
                          Number of analysed new started processes analysed:29
                          Number of new started drivers analysed:0
                          Number of existing processes analysed:0
                          Number of existing drivers analysed:0
                          Number of injected processes analysed:0
                          Technologies:
                          • HCA enabled
                          • EGA enabled
                          • HDC enabled
                          • AMSI enabled
                          Analysis Mode:default
                          Analysis stop reason:Timeout
                          Detection:MAL
                          Classification:mal64.troj.winDLL@14/5@3/3
                          EGA Information:Failed
                          HDC Information:
                          • Successful, ratio: 10.3% (good quality ratio 9.7%)
                          • Quality average: 79.1%
                          • Quality standard deviation: 29.2%
                          HCA Information:
                          • Successful, ratio: 64%
                          • Number of executed functions: 0
                          • Number of non-executed functions: 0
                          Cookbook Comments:
                          • Adjust boot time
                          • Enable AMSI
                          • Sleeps bigger than 120000ms are automatically reduced to 1000ms
                          • Found application associated with file extension: .dll
                          Warnings:
                          Show All
                          • Excluded IPs from analysis (whitelisted): 52.147.198.201, 92.122.145.220, 168.61.161.212, 52.255.188.83, 205.185.216.42, 205.185.216.10, 184.30.24.56, 13.64.90.137, 40.126.31.141, 20.190.159.136, 20.190.159.138, 40.126.31.4, 40.126.31.143, 40.126.31.139, 40.126.31.1, 40.126.31.137, 20.50.102.62, 13.88.21.125, 92.122.213.194, 92.122.213.247, 88.221.62.148, 152.199.19.161, 52.155.217.156
                          • Excluded domains from analysis (whitelisted): www.tm.lg.prod.aadmsa.akadns.net, store-images.s-microsoft.com-c.edgekey.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, consumerrp-displaycatalog-aks2eap-europe.md.mp.microsoft.com.akadns.net, e11290.dspg.akamaiedge.net, iecvlist.microsoft.com, db5eap.displaycatalog.md.mp.microsoft.com.akadns.net, e12564.dspb.akamaiedge.net, go.microsoft.com, login.live.com, audownload.windowsupdate.nsatc.net, au.download.windowsupdate.com.hwcdn.net, arc.trafficmanager.net, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, au-bg-shim.trafficmanager.net, displaycatalog-europeeap.md.mp.microsoft.com.akadns.net, skypedataprdcolwus17.cloudapp.net, fs.microsoft.com, ie9comview.vo.msecnd.net, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, skypedataprdcolcus17.cloudapp.net, ctldl.windowsupdate.com, e1723.g.akamaiedge.net, cds.d2s7q6s2.hwcdn.net, www.tm.a.prd.aadg.akadns.net, iris-de-prod-azsc-uks.uksouth.cloudapp.azure.com, login.msa.msidentity.com, skypedataprdcoleus16.cloudapp.net, skypedataprdcoleus17.cloudapp.net, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net, go.microsoft.com.edgekey.net, skypedataprdcolwus15.cloudapp.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net, cs9.wpc.v0cdn.net
                          • Report size getting too big, too many NtOpenKeyEx calls found.

                          Simulations

                          Behavior and APIs

                          No simulations

                          Joe Sandbox View / Context

                          IPs

                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                          52.97.201.34New%20order%20contract.htmlGet hashmaliciousBrowse
                            40.97.161.5013fil.exeGet hashmaliciousBrowse
                              24messag.exeGet hashmaliciousBrowse
                                .exeGet hashmaliciousBrowse
                                  .exeGet hashmaliciousBrowse
                                    66documen.exeGet hashmaliciousBrowse
                                      9messag.exeGet hashmaliciousBrowse
                                        40.101.12.82redwirespace-invoice-982323_xls.HtMlGet hashmaliciousBrowse
                                          https://user74359648.ts.r.appspot.com/#jodymontgomery@technologyunderstood.comGet hashmaliciousBrowse
                                            https:\\bit.ly/3bulbTy#eric.tuliao@ibo.orgGet hashmaliciousBrowse
                                              https://iau-maskan.irGet hashmaliciousBrowse

                                                Domains

                                                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                outlook.comfile.msg.exeGet hashmaliciousBrowse
                                                • 104.47.56.138
                                                Update-KB1484-x86.exeGet hashmaliciousBrowse
                                                • 104.47.57.138
                                                n6osajjc938.exeGet hashmaliciousBrowse
                                                • 104.47.54.36
                                                9b3d7f02.exeGet hashmaliciousBrowse
                                                • 104.47.54.36
                                                5zc9vbGBo3.exeGet hashmaliciousBrowse
                                                • 52.101.24.0
                                                InnAcjnAmG.exeGet hashmaliciousBrowse
                                                • 104.47.53.36
                                                8X93Tzvd7V.exeGet hashmaliciousBrowse
                                                • 52.101.24.0
                                                u8A8Qy5S7O.exeGet hashmaliciousBrowse
                                                • 104.47.53.36
                                                SecuriteInfo.com.Mal.GandCrypt-A.24654.exeGet hashmaliciousBrowse
                                                • 104.47.54.36
                                                SecuriteInfo.com.Mal.GandCrypt-A.5674.exeGet hashmaliciousBrowse
                                                • 104.47.54.36
                                                SecuriteInfo.com.W32.AIDetect.malware2.29567.exeGet hashmaliciousBrowse
                                                • 104.47.53.36
                                                lsass(1).exeGet hashmaliciousBrowse
                                                • 104.47.59.138
                                                rtofwqxq.exeGet hashmaliciousBrowse
                                                • 104.47.53.36
                                                VufxYArno1.exeGet hashmaliciousBrowse
                                                • 104.47.53.36
                                                HHN-efz.ms-acdc.office.comiJdlvBxhYu.dllGet hashmaliciousBrowse
                                                • 52.97.150.2
                                                8OKQ6ogGRx.dllGet hashmaliciousBrowse
                                                • 40.101.138.2
                                                609110f2d14a6.dllGet hashmaliciousBrowse
                                                • 40.101.137.34
                                                New%20order%20contract.htmlGet hashmaliciousBrowse
                                                • 52.98.175.2
                                                FRA-efz.ms-acdc.office.comiJdlvBxhYu.dllGet hashmaliciousBrowse
                                                • 52.97.201.82
                                                8OKQ6ogGRx.dllGet hashmaliciousBrowse
                                                • 40.101.81.162
                                                dechert-Investment078867-xlsx.HtmlGet hashmaliciousBrowse
                                                • 52.97.189.66
                                                murexltd-Investment_265386-xlsx.htmlGet hashmaliciousBrowse
                                                • 52.97.188.66
                                                z2xQEFs54b.exeGet hashmaliciousBrowse
                                                • 52.97.250.226
                                                sgs-Investment974041-xlsx.HtmlGet hashmaliciousBrowse
                                                • 40.101.19.162
                                                roccor-invoice-648133_xls.HtMlGet hashmaliciousBrowse
                                                • 52.97.200.162
                                                redwirespace-invoice-982323_xls.HtMlGet hashmaliciousBrowse
                                                • 40.101.12.82
                                                prismcosec-invoice-647718_xls.HtMlGet hashmaliciousBrowse
                                                • 40.101.81.130
                                                E848.tmp.exeGet hashmaliciousBrowse
                                                • 40.101.81.130
                                                Payment.htmlGet hashmaliciousBrowse
                                                • 52.97.250.194
                                                Remittance advice.htmGet hashmaliciousBrowse
                                                • 52.97.250.210
                                                0G2gue8shl.exeGet hashmaliciousBrowse
                                                • 52.97.176.2
                                                February Payroll.xls.htmGet hashmaliciousBrowse
                                                • 52.97.250.242
                                                PURCHASE ORDER#34556558.exeGet hashmaliciousBrowse
                                                • 52.97.200.178
                                                Proforma Invoice.exeGet hashmaliciousBrowse
                                                • 52.97.250.210
                                                E-DEKONT.exeGet hashmaliciousBrowse
                                                • 52.97.144.178
                                                DHL Notification -AWB DHL-2021011293002.exeGet hashmaliciousBrowse
                                                • 52.97.201.82
                                                DHL DOCS.exeGet hashmaliciousBrowse
                                                • 40.101.80.2
                                                ORDER REQUEST.exeGet hashmaliciousBrowse
                                                • 40.101.121.34

                                                ASN

                                                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                MICROSOFT-CORP-MSN-AS-BLOCKUSiIoO9qC8yj.exeGet hashmaliciousBrowse
                                                • 13.107.4.50
                                                qLi9sAxeSm.exeGet hashmaliciousBrowse
                                                • 204.95.99.243
                                                f1a5fbd3e946e8db1c18bd1d30d0f8b41a873cbb76769.exeGet hashmaliciousBrowse
                                                • 20.194.35.6
                                                tgix.exeGet hashmaliciousBrowse
                                                • 137.117.64.85
                                                Protiviti.htmGet hashmaliciousBrowse
                                                • 52.240.156.143
                                                hn80vhR3y1.exeGet hashmaliciousBrowse
                                                • 13.69.222.243
                                                file.msg.exeGet hashmaliciousBrowse
                                                • 104.47.56.161
                                                SCB_MT103_31951R2105050031_200505.PDF.exeGet hashmaliciousBrowse
                                                • 157.55.136.23
                                                Windows_Update.exeGet hashmaliciousBrowse
                                                • 20.52.178.148
                                                NcLDA3J4Kp.apkGet hashmaliciousBrowse
                                                • 204.79.197.200
                                                LIau1wwvy5.exeGet hashmaliciousBrowse
                                                • 20.43.33.61
                                                Update-KB1484-x86.exeGet hashmaliciousBrowse
                                                • 104.47.37.36
                                                iJdlvBxhYu.dllGet hashmaliciousBrowse
                                                • 52.97.201.82
                                                2f50000.exeGet hashmaliciousBrowse
                                                • 52.141.33.89
                                                609110f2d14a6.dllGet hashmaliciousBrowse
                                                • 40.101.137.34
                                                EBqJhAymeE.rtfGet hashmaliciousBrowse
                                                • 157.55.173.72
                                                QXfU5ZSUpd.exeGet hashmaliciousBrowse
                                                • 20.194.35.6
                                                813oo3jeWE.exeGet hashmaliciousBrowse
                                                • 20.184.2.45
                                                pog.exeGet hashmaliciousBrowse
                                                • 40.124.7.222
                                                8UsA.shGet hashmaliciousBrowse
                                                • 20.233.3.158
                                                MICROSOFT-CORP-MSN-AS-BLOCKUSiIoO9qC8yj.exeGet hashmaliciousBrowse
                                                • 13.107.4.50
                                                qLi9sAxeSm.exeGet hashmaliciousBrowse
                                                • 204.95.99.243
                                                f1a5fbd3e946e8db1c18bd1d30d0f8b41a873cbb76769.exeGet hashmaliciousBrowse
                                                • 20.194.35.6
                                                tgix.exeGet hashmaliciousBrowse
                                                • 137.117.64.85
                                                Protiviti.htmGet hashmaliciousBrowse
                                                • 52.240.156.143
                                                hn80vhR3y1.exeGet hashmaliciousBrowse
                                                • 13.69.222.243
                                                file.msg.exeGet hashmaliciousBrowse
                                                • 104.47.56.161
                                                SCB_MT103_31951R2105050031_200505.PDF.exeGet hashmaliciousBrowse
                                                • 157.55.136.23
                                                Windows_Update.exeGet hashmaliciousBrowse
                                                • 20.52.178.148
                                                NcLDA3J4Kp.apkGet hashmaliciousBrowse
                                                • 204.79.197.200
                                                LIau1wwvy5.exeGet hashmaliciousBrowse
                                                • 20.43.33.61
                                                Update-KB1484-x86.exeGet hashmaliciousBrowse
                                                • 104.47.37.36
                                                iJdlvBxhYu.dllGet hashmaliciousBrowse
                                                • 52.97.201.82
                                                2f50000.exeGet hashmaliciousBrowse
                                                • 52.141.33.89
                                                609110f2d14a6.dllGet hashmaliciousBrowse
                                                • 40.101.137.34
                                                EBqJhAymeE.rtfGet hashmaliciousBrowse
                                                • 157.55.173.72
                                                QXfU5ZSUpd.exeGet hashmaliciousBrowse
                                                • 20.194.35.6
                                                813oo3jeWE.exeGet hashmaliciousBrowse
                                                • 20.184.2.45
                                                pog.exeGet hashmaliciousBrowse
                                                • 40.124.7.222
                                                8UsA.shGet hashmaliciousBrowse
                                                • 20.233.3.158

                                                JA3 Fingerprints

                                                No context

                                                Dropped Files

                                                No context

                                                Created / dropped Files

                                                C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{7A4756FA-B284-11EB-90E5-ECF4BB2D2496}.dat
                                                Process:C:\Program Files\internet explorer\iexplore.exe
                                                File Type:Microsoft Word Document
                                                Category:dropped
                                                Size (bytes):29272
                                                Entropy (8bit):1.767330112336001
                                                Encrypted:false
                                                SSDEEP:48:IwhGcprYGwpLdjG/ap8nGIpcFmQGvnZpvFkaGocnRqp9F0jGo4gnsn1pm6GWcnzA:rXZAZdD2ZWkJtGAfBeS1Mj6GICKT/NDB
                                                MD5:156D3CAF9E8A794ADFC20BEF63EEA127
                                                SHA1:AF7F7711A0A50AC466904AF1088B915D447CC937
                                                SHA-256:52D1E225E5A48663A4E782CEE505EF4EFCB03B57D86EB1AEAE2BCB514D55FA88
                                                SHA-512:E5F0BF27719A6BE7C63C2D1976443B37CCE0741EE08096BF7757B7501CDE2EF28B2183CB5DEB5A34B514D5EFD36D40EAD7F4599EAC060613ED12F05C928833C2
                                                Malicious:false
                                                Reputation:low
                                                Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{7A4756FC-B284-11EB-90E5-ECF4BB2D2496}.dat
                                                Process:C:\Program Files\internet explorer\iexplore.exe
                                                File Type:Microsoft Word Document
                                                Category:dropped
                                                Size (bytes):27428
                                                Entropy (8bit):1.864673958093044
                                                Encrypted:false
                                                SSDEEP:96:rrZYQ06AHBSYjB/2RWBkMyG2NXLER2NXLnA:rrZYQ06AHkYjB/2RWBkMyG2NbER2NbnA
                                                MD5:AD45202875B5B3222E4A0FA70E557E36
                                                SHA1:262462EB28F2EE5AA4AB87168782A3225D7C2766
                                                SHA-256:322B18772F6CEE64ACF8D3DF9A5B5E189FC5C11ED8113396D3E8A080C6F73F57
                                                SHA-512:8B4786EDCC10EB81485BB689D2FEAADBECDC52E7DA026E7D6201D77D84D86C5CC368F844FAB8B1AA7E95B7418599A11E63719EFD1F3772E6594F99C69C8C7C48
                                                Malicious:false
                                                Reputation:low
                                                Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                C:\Users\user\AppData\Local\Temp\JavaDeployReg.log
                                                Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                File Type:ASCII text, with CRLF line terminators
                                                Category:modified
                                                Size (bytes):89
                                                Entropy (8bit):4.21211232961955
                                                Encrypted:false
                                                SSDEEP:3:oVXUXhXf7Tz8JOGXnEXhXf7T4LX+n:o9UXhP7vqEXhP7Su
                                                MD5:D37E17C754DC8265F6B19F375B3B2A7B
                                                SHA1:DB6EB0959B70CB613479E0C56B4B298F120A12C5
                                                SHA-256:98D3B53E62F7515A00599868EC0299B37D4A3F09B2C864023EC62A52CE8A8356
                                                SHA-512:B0AE75F39E8D1EFB9ED6136F128166053A01E3FE9A971DA55993FBEE36ECCF09D8747E912C1D98D69634454ECD93E29A7546F8ADE9D1B5157052009359C882C8
                                                Malicious:false
                                                Reputation:low
                                                Preview: [2021/05/11 11:12:44.310] Latest deploy version: ..[2021/05/11 11:12:44.310] 11.211.2 ..
                                                C:\Users\user\AppData\Local\Temp\~DF6A2029352AAD8EB0.TMP
                                                Process:C:\Program Files\internet explorer\iexplore.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):39753
                                                Entropy (8bit):0.5952183110788842
                                                Encrypted:false
                                                SSDEEP:96:kBqoxKAuvScS+lLpY7t2NXLY2NXLk2NXLd:kBqoxKAuqR+lLpY7t2NbY2Nbk2Nbd
                                                MD5:3332CE02133F1A2B17659763DD9F9ED8
                                                SHA1:2CCFF0E9B9AC268A48483F244C2549AC30046A95
                                                SHA-256:9EB41D80206763DADE5A30133DF5EDEBA27E69BAFDFA96FC9C438933A7B93518
                                                SHA-512:06AD119BF6B0ECF2397AED8527A4BD69057E52365B10129408DFB61DC62C6D8B7CEC88EC54E360CFADC7BAEB785B5652FD27C0F255AEEDD056D66FC5B1C777B7
                                                Malicious:false
                                                Reputation:low
                                                Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                C:\Users\user\AppData\Local\Temp\~DF745550B0ECD73E02.TMP
                                                Process:C:\Program Files\internet explorer\iexplore.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):12933
                                                Entropy (8bit):0.4106988703667074
                                                Encrypted:false
                                                SSDEEP:24:c9lLh9lLh9lIn9lIn9lo19loV9lWGOyqyN4:kBqoI+glt9
                                                MD5:B7796152E2D67FE2A933DE459C627111
                                                SHA1:ADDA7FFAC9F85AAF9ADD7FFED33C359333CF2017
                                                SHA-256:8FE8BAB0CBA61FF6244059D467FE8A550F96650FA9B247DA1C5C99F64C68AC2E
                                                SHA-512:CB66D870F71B7BCB93B74276733079062BCDD216183D64C5624235C797887BFEA7DCAAB002A0ED2B644C118636B7B45C279B0CB7F0ADA8338DC2FE724DCD67AE
                                                Malicious:false
                                                Reputation:low
                                                Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................

                                                Static File Info

                                                General

                                                File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                Entropy (8bit):6.388590209681191
                                                TrID:
                                                • Win32 Dynamic Link Library (generic) (1002004/3) 99.40%
                                                • Win16/32 Executable Delphi generic (2074/23) 0.21%
                                                • Generic Win/DOS Executable (2004/3) 0.20%
                                                • DOS Executable Generic (2002/1) 0.20%
                                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                File name:609a460e94791.tiff.dll
                                                File size:841216
                                                MD5:50a299d1e92d9205e123404c8e05904d
                                                SHA1:c188272ab757dbbf14e74781fc90fcefe4aeb615
                                                SHA256:3b56b7298c366a323d28658a455abf0d4e78fa197a43ce13bedab05f26901d34
                                                SHA512:ec30f36d70ddbb6ba4aaccb3342e0a0ffbd586d2784370500a94e33aa650d1c56d3712ffc3a9e15a0558194ce26d1b76d9f2a8953220684bef634e57f4579df1
                                                SSDEEP:12288:mzCoYRvNZrA8Res/TPUOjUUGcqcoWEx9kMGUS6vOV5y4gnuD5wtqqB7ol:VdNZr5RLL1AZ/clUnHvk5hgU
                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...L..`...........!.................0....................................................@..........................{..x..

                                                File Icon

                                                Icon Hash:74f0e4ecccdce0e4

                                                Static PE Info

                                                General

                                                Entrypoint:0x1033080
                                                Entrypoint Section:.text
                                                Digitally signed:false
                                                Imagebase:0x1000000
                                                Subsystem:windows gui
                                                Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
                                                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT
                                                Time Stamp:0x6092C34C [Wed May 5 16:09:48 2021 UTC]
                                                TLS Callbacks:
                                                CLR (.Net) Version:
                                                OS Version Major:6
                                                OS Version Minor:0
                                                File Version Major:6
                                                File Version Minor:0
                                                Subsystem Version Major:6
                                                Subsystem Version Minor:0
                                                Import Hash:dc55991f7b8a912c780d10d352635290

                                                Entrypoint Preview

                                                Instruction
                                                push ebp
                                                mov ebp, esp
                                                cmp dword ptr [ebp+0Ch], 01h
                                                jne 00007FC658BC9A27h
                                                call 00007FC658BCA6F7h
                                                mov eax, dword ptr [ebp+10h]
                                                push eax
                                                mov ecx, dword ptr [ebp+0Ch]
                                                push ecx
                                                mov edx, dword ptr [ebp+08h]
                                                push edx
                                                call 00007FC658BC9806h
                                                add esp, 0Ch
                                                pop ebp
                                                retn 000Ch
                                                int3
                                                int3
                                                int3
                                                int3
                                                int3
                                                int3
                                                int3
                                                int3
                                                int3
                                                int3
                                                push ebp
                                                mov ebp, esp
                                                push ecx
                                                mov dword ptr [ebp-04h], ecx
                                                mov esp, ebp
                                                pop ebp
                                                ret
                                                int3
                                                int3
                                                int3
                                                int3
                                                int3
                                                push ebp
                                                mov ebp, esp
                                                push ecx
                                                mov eax, dword ptr [ebp+08h]
                                                mov ecx, dword ptr [eax]
                                                mov dword ptr [ebp-04h], ecx
                                                mov eax, dword ptr [ebp-04h]
                                                mov esp, ebp
                                                pop ebp
                                                ret
                                                int3
                                                int3
                                                int3
                                                int3
                                                int3
                                                int3
                                                int3
                                                int3
                                                int3
                                                int3
                                                int3
                                                int3
                                                int3
                                                push ebp
                                                mov ebp, esp
                                                mov eax, dword ptr [ebp+08h]
                                                push eax
                                                call 00007FC658BC99F9h
                                                add esp, 04h
                                                pop ebp
                                                ret
                                                int3
                                                int3
                                                int3
                                                int3
                                                int3
                                                int3
                                                int3
                                                int3
                                                int3
                                                int3
                                                int3
                                                int3
                                                int3
                                                int3
                                                int3
                                                push ebp
                                                mov ebp, esp
                                                mov eax, dword ptr [ebp+08h]
                                                push eax
                                                call 00007FC658BC9A99h
                                                add esp, 04h
                                                test eax, eax
                                                je 00007FC658BC9A23h
                                                int3
                                                pop ebp
                                                ret
                                                int3
                                                int3
                                                int3
                                                int3
                                                int3
                                                int3
                                                int3
                                                int3
                                                int3
                                                int3
                                                push ebp
                                                mov ebp, esp
                                                mov eax, dword ptr [ebp+08h]
                                                push eax
                                                call 00007FC658BC9A79h
                                                add esp, 04h
                                                test eax, eax
                                                je 00007FC658BC9A29h
                                                mov ecx, 00000041h
                                                int 29h
                                                pop ebp
                                                ret
                                                int3
                                                int3
                                                int3
                                                int3
                                                push ebp
                                                mov ebp, esp
                                                push ecx
                                                mov eax, dword ptr [ebp+08h]

                                                Data Directories

                                                NameVirtual AddressVirtual Size Is in Section
                                                IMAGE_DIRECTORY_ENTRY_EXPORT0xc7bb00x78.rdata
                                                IMAGE_DIRECTORY_ENTRY_IMPORT0xc7c280x64.rdata
                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0xe80000x3a0.rsrc
                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0xe90000x51e0.reloc
                                                IMAGE_DIRECTORY_ENTRY_DEBUG0xc5ecc0x54.rdata
                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xc5f200x40.rdata
                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IAT0x9b0000x1a4.rdata
                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                Sections

                                                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                .text0x10000x997af0x99800False0.488934942488data6.50079371898IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                .rdata0x9b0000x2d5aa0x2d600False0.326892863292data4.74980452387IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                .data0xc90000x1efdc0xe00False0.209821428571data3.01039741419IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                                .rsrc0xe80000x3a00x400False0.404296875data3.03375733203IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                .reloc0xe90000x51e00x5200False0.770293445122data6.74990882481IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                Resources

                                                NameRVASizeTypeLanguageCountry
                                                RT_VERSION0xe80600x340dataEnglishUnited States

                                                Imports

                                                DLLImport
                                                KERNEL32.dllCreateFileW, GetWindowsDirectoryW, ReadFile, GetConsoleMode, OpenMutexW, CloseHandle, GetFileSize, DeleteCriticalSection, ReadConsoleW, VirtualProtectEx, GetConsoleCP, FlushFileBuffers, SetFilePointerEx, GetFileSizeEx, SetStdHandle, GetStringTypeW, EnterCriticalSection, LeaveCriticalSection, SetLastError, InitializeCriticalSectionAndSpinCount, CreateEventW, SwitchToThread, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetSystemTimeAsFileTime, GetTickCount, GetModuleHandleW, GetProcAddress, IsProcessorFeaturePresent, IsDebuggerPresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetStartupInfoW, GetCurrentProcess, TerminateProcess, QueryPerformanceCounter, GetCurrentProcessId, GetCurrentThreadId, InitializeSListHead, RaiseException, RtlUnwind, InterlockedPushEntrySList, InterlockedFlushSList, GetLastError, EncodePointer, FreeLibrary, LoadLibraryExW, GetModuleFileNameW, GetModuleHandleExW, ExitProcess, HeapAlloc, HeapValidate, GetSystemInfo, GetCurrentThread, GetStdHandle, GetFileType, WriteFile, OutputDebugStringW, WriteConsoleW, SetConsoleCtrlHandler, GetDateFormatW, GetTimeFormatW, CompareStringW, LCMapStringW, GetLocaleInfoW, IsValidLocale, GetUserDefaultLCID, EnumSystemLocalesW, FindClose, FindFirstFileExW, FindNextFileW, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, MultiByteToWideChar, WideCharToMultiByte, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableW, GetProcessHeap, HeapFree, HeapReAlloc, HeapSize, HeapQueryInformation, DecodePointer
                                                UxTheme.dllCloseThemeData
                                                AVIFIL32.dllAVIFileGetStream, AVIFileOpenW, AVIFileExit, AVIFileInit, AVIFileEndRecord
                                                TAPI32.dlllineRedirectW, lineInitialize, lineHold, lineShutdown, lineTranslateAddressW

                                                Exports

                                                NameOrdinalAddress
                                                Hundredpopulate@@810x1030208
                                                Mark@@1220x10303fe
                                                Seefit@@830x103046c

                                                Version Infos

                                                DescriptionData
                                                LegalCopyright Dad plan Corporation. All rights reserved
                                                InternalNameTeam Lonesell
                                                FileVersion7.2.6.201
                                                CompanyNameDad plan Corporation
                                                These95
                                                ProductNameDad plan Fair fell
                                                ProductVersion7.2.6.201
                                                FileDescriptionDad plan Fair fell
                                                OriginalFilenamefall.dll
                                                Translation0x0409 0x04b0

                                                Possible Origin

                                                Language of compilation systemCountry where language is spokenMap
                                                EnglishUnited States

                                                Network Behavior

                                                Network Port Distribution

                                                TCP Packets

                                                TimestampSource PortDest PortSource IPDest IP
                                                May 11, 2021 11:12:44.427018881 CEST4973280192.168.2.640.97.161.50
                                                May 11, 2021 11:12:44.427045107 CEST4973380192.168.2.640.97.161.50
                                                May 11, 2021 11:12:44.607211113 CEST804973240.97.161.50192.168.2.6
                                                May 11, 2021 11:12:44.607337952 CEST4973280192.168.2.640.97.161.50
                                                May 11, 2021 11:12:44.608804941 CEST4973280192.168.2.640.97.161.50
                                                May 11, 2021 11:12:44.612221003 CEST804973340.97.161.50192.168.2.6
                                                May 11, 2021 11:12:44.612348080 CEST4973380192.168.2.640.97.161.50
                                                May 11, 2021 11:12:44.792617083 CEST804973240.97.161.50192.168.2.6
                                                May 11, 2021 11:12:44.792712927 CEST4973280192.168.2.640.97.161.50
                                                May 11, 2021 11:12:44.792838097 CEST4973280192.168.2.640.97.161.50
                                                May 11, 2021 11:12:44.806026936 CEST49734443192.168.2.640.97.161.50
                                                May 11, 2021 11:12:44.971962929 CEST804973240.97.161.50192.168.2.6
                                                May 11, 2021 11:12:44.987812042 CEST4434973440.97.161.50192.168.2.6
                                                May 11, 2021 11:12:44.987920046 CEST49734443192.168.2.640.97.161.50
                                                May 11, 2021 11:12:44.997282028 CEST49734443192.168.2.640.97.161.50
                                                May 11, 2021 11:12:45.180705070 CEST4434973440.97.161.50192.168.2.6
                                                May 11, 2021 11:12:45.180744886 CEST4434973440.97.161.50192.168.2.6
                                                May 11, 2021 11:12:45.180768013 CEST4434973440.97.161.50192.168.2.6
                                                May 11, 2021 11:12:45.180855989 CEST49734443192.168.2.640.97.161.50
                                                May 11, 2021 11:12:45.276611090 CEST49734443192.168.2.640.97.161.50
                                                May 11, 2021 11:12:45.285624981 CEST49734443192.168.2.640.97.161.50
                                                May 11, 2021 11:12:45.459654093 CEST4434973440.97.161.50192.168.2.6
                                                May 11, 2021 11:12:45.460292101 CEST49734443192.168.2.640.97.161.50
                                                May 11, 2021 11:12:45.470313072 CEST4434973440.97.161.50192.168.2.6
                                                May 11, 2021 11:12:45.472281933 CEST49734443192.168.2.640.97.161.50
                                                May 11, 2021 11:12:45.576265097 CEST49734443192.168.2.640.97.161.50
                                                May 11, 2021 11:12:45.659774065 CEST49735443192.168.2.652.97.201.34
                                                May 11, 2021 11:12:45.661045074 CEST49736443192.168.2.652.97.201.34
                                                May 11, 2021 11:12:45.708501101 CEST4434973552.97.201.34192.168.2.6
                                                May 11, 2021 11:12:45.709875107 CEST4434973652.97.201.34192.168.2.6
                                                May 11, 2021 11:12:45.710011959 CEST49735443192.168.2.652.97.201.34
                                                May 11, 2021 11:12:45.710911989 CEST49735443192.168.2.652.97.201.34
                                                May 11, 2021 11:12:45.710912943 CEST49736443192.168.2.652.97.201.34
                                                May 11, 2021 11:12:45.711765051 CEST49736443192.168.2.652.97.201.34
                                                May 11, 2021 11:12:45.757880926 CEST4434973440.97.161.50192.168.2.6
                                                May 11, 2021 11:12:45.760519028 CEST4434973552.97.201.34192.168.2.6
                                                May 11, 2021 11:12:45.760541916 CEST4434973552.97.201.34192.168.2.6
                                                May 11, 2021 11:12:45.760556936 CEST4434973552.97.201.34192.168.2.6
                                                May 11, 2021 11:12:45.760607958 CEST49735443192.168.2.652.97.201.34
                                                May 11, 2021 11:12:45.760670900 CEST49735443192.168.2.652.97.201.34
                                                May 11, 2021 11:12:45.761409998 CEST4434973652.97.201.34192.168.2.6
                                                May 11, 2021 11:12:45.761429071 CEST4434973652.97.201.34192.168.2.6
                                                May 11, 2021 11:12:45.761445045 CEST4434973652.97.201.34192.168.2.6
                                                May 11, 2021 11:12:45.761499882 CEST49736443192.168.2.652.97.201.34
                                                May 11, 2021 11:12:45.761563063 CEST49736443192.168.2.652.97.201.34
                                                May 11, 2021 11:12:45.774986029 CEST49735443192.168.2.652.97.201.34
                                                May 11, 2021 11:12:45.776258945 CEST49735443192.168.2.652.97.201.34
                                                May 11, 2021 11:12:45.784162045 CEST49736443192.168.2.652.97.201.34
                                                May 11, 2021 11:12:45.826571941 CEST4434973552.97.201.34192.168.2.6
                                                May 11, 2021 11:12:45.827660084 CEST4434973552.97.201.34192.168.2.6
                                                May 11, 2021 11:12:45.827770948 CEST49735443192.168.2.652.97.201.34
                                                May 11, 2021 11:12:45.835220098 CEST4434973552.97.201.34192.168.2.6
                                                May 11, 2021 11:12:45.835249901 CEST4434973652.97.201.34192.168.2.6
                                                May 11, 2021 11:12:45.835447073 CEST49735443192.168.2.652.97.201.34
                                                May 11, 2021 11:12:45.835484028 CEST49736443192.168.2.652.97.201.34
                                                May 11, 2021 11:12:45.835897923 CEST49735443192.168.2.652.97.201.34
                                                May 11, 2021 11:12:45.886379957 CEST4434973552.97.201.34192.168.2.6
                                                May 11, 2021 11:12:45.918647051 CEST49737443192.168.2.640.101.12.82
                                                May 11, 2021 11:12:45.922597885 CEST49738443192.168.2.640.101.12.82
                                                May 11, 2021 11:12:45.965564966 CEST4434973740.101.12.82192.168.2.6
                                                May 11, 2021 11:12:45.965801001 CEST49737443192.168.2.640.101.12.82
                                                May 11, 2021 11:12:45.966717958 CEST49737443192.168.2.640.101.12.82
                                                May 11, 2021 11:12:45.974643946 CEST4434973840.101.12.82192.168.2.6
                                                May 11, 2021 11:12:45.974823952 CEST49738443192.168.2.640.101.12.82
                                                May 11, 2021 11:12:45.975717068 CEST49738443192.168.2.640.101.12.82
                                                May 11, 2021 11:12:46.017079115 CEST4434973740.101.12.82192.168.2.6
                                                May 11, 2021 11:12:46.017102003 CEST4434973740.101.12.82192.168.2.6
                                                May 11, 2021 11:12:46.017115116 CEST4434973740.101.12.82192.168.2.6
                                                May 11, 2021 11:12:46.017225027 CEST49737443192.168.2.640.101.12.82
                                                May 11, 2021 11:12:46.031157017 CEST49737443192.168.2.640.101.12.82
                                                May 11, 2021 11:12:46.031497955 CEST4434973840.101.12.82192.168.2.6
                                                May 11, 2021 11:12:46.031522036 CEST4434973840.101.12.82192.168.2.6
                                                May 11, 2021 11:12:46.031536102 CEST4434973840.101.12.82192.168.2.6
                                                May 11, 2021 11:12:46.031650066 CEST49738443192.168.2.640.101.12.82
                                                May 11, 2021 11:12:46.031689882 CEST49738443192.168.2.640.101.12.82
                                                May 11, 2021 11:12:46.032501936 CEST49737443192.168.2.640.101.12.82
                                                May 11, 2021 11:12:46.039944887 CEST49738443192.168.2.640.101.12.82
                                                May 11, 2021 11:12:46.079329014 CEST4434973740.101.12.82192.168.2.6
                                                May 11, 2021 11:12:46.079353094 CEST4434973740.101.12.82192.168.2.6
                                                May 11, 2021 11:12:46.079552889 CEST49737443192.168.2.640.101.12.82
                                                May 11, 2021 11:12:46.085823059 CEST4434973740.101.12.82192.168.2.6
                                                May 11, 2021 11:12:46.085839987 CEST4434973740.101.12.82192.168.2.6
                                                May 11, 2021 11:12:46.085958958 CEST49737443192.168.2.640.101.12.82
                                                May 11, 2021 11:12:46.094058990 CEST4434973840.101.12.82192.168.2.6
                                                May 11, 2021 11:12:46.094203949 CEST49738443192.168.2.640.101.12.82
                                                May 11, 2021 11:12:48.734452009 CEST49737443192.168.2.640.101.12.82
                                                May 11, 2021 11:12:48.734502077 CEST4973380192.168.2.640.97.161.50
                                                May 11, 2021 11:12:48.734641075 CEST49736443192.168.2.652.97.201.34
                                                May 11, 2021 11:12:48.734688997 CEST49738443192.168.2.640.101.12.82

                                                UDP Packets

                                                TimestampSource PortDest PortSource IPDest IP
                                                May 11, 2021 11:10:04.627749920 CEST6204453192.168.2.68.8.8.8
                                                May 11, 2021 11:10:04.688019037 CEST53620448.8.8.8192.168.2.6
                                                May 11, 2021 11:10:05.065530062 CEST6379153192.168.2.68.8.8.8
                                                May 11, 2021 11:10:05.119048119 CEST53637918.8.8.8192.168.2.6
                                                May 11, 2021 11:10:05.514097929 CEST6426753192.168.2.68.8.8.8
                                                May 11, 2021 11:10:05.565658092 CEST53642678.8.8.8192.168.2.6
                                                May 11, 2021 11:10:06.473062992 CEST4944853192.168.2.68.8.8.8
                                                May 11, 2021 11:10:06.521815062 CEST53494488.8.8.8192.168.2.6
                                                May 11, 2021 11:10:07.315968037 CEST6034253192.168.2.68.8.8.8
                                                May 11, 2021 11:10:07.366607904 CEST53603428.8.8.8192.168.2.6
                                                May 11, 2021 11:10:08.172081947 CEST6134653192.168.2.68.8.8.8
                                                May 11, 2021 11:10:08.222429991 CEST53613468.8.8.8192.168.2.6
                                                May 11, 2021 11:10:09.185693026 CEST5177453192.168.2.68.8.8.8
                                                May 11, 2021 11:10:09.235651016 CEST53517748.8.8.8192.168.2.6
                                                May 11, 2021 11:10:12.379355907 CEST5602353192.168.2.68.8.8.8
                                                May 11, 2021 11:10:12.445902109 CEST53560238.8.8.8192.168.2.6
                                                May 11, 2021 11:11:01.546735048 CEST5838453192.168.2.68.8.8.8
                                                May 11, 2021 11:11:01.606127977 CEST53583848.8.8.8192.168.2.6
                                                May 11, 2021 11:11:56.163331985 CEST6026153192.168.2.68.8.8.8
                                                May 11, 2021 11:11:56.240215063 CEST53602618.8.8.8192.168.2.6
                                                May 11, 2021 11:12:09.364795923 CEST5606153192.168.2.68.8.8.8
                                                May 11, 2021 11:12:09.416450024 CEST53560618.8.8.8192.168.2.6
                                                May 11, 2021 11:12:13.470910072 CEST5833653192.168.2.68.8.8.8
                                                May 11, 2021 11:12:13.550908089 CEST53583368.8.8.8192.168.2.6
                                                May 11, 2021 11:12:14.031019926 CEST5378153192.168.2.68.8.8.8
                                                May 11, 2021 11:12:14.105607033 CEST53537818.8.8.8192.168.2.6
                                                May 11, 2021 11:12:14.831053019 CEST5406453192.168.2.68.8.8.8
                                                May 11, 2021 11:12:14.882730961 CEST53540648.8.8.8192.168.2.6
                                                May 11, 2021 11:12:16.026129007 CEST5281153192.168.2.68.8.8.8
                                                May 11, 2021 11:12:16.076328039 CEST53528118.8.8.8192.168.2.6
                                                May 11, 2021 11:12:16.941219091 CEST5529953192.168.2.68.8.8.8
                                                May 11, 2021 11:12:17.005312920 CEST53552998.8.8.8192.168.2.6
                                                May 11, 2021 11:12:17.129851103 CEST6374553192.168.2.68.8.8.8
                                                May 11, 2021 11:12:17.178631067 CEST53637458.8.8.8192.168.2.6
                                                May 11, 2021 11:12:18.321643114 CEST5005553192.168.2.68.8.8.8
                                                May 11, 2021 11:12:18.373451948 CEST53500558.8.8.8192.168.2.6
                                                May 11, 2021 11:12:19.467077017 CEST6137453192.168.2.68.8.8.8
                                                May 11, 2021 11:12:19.518699884 CEST53613748.8.8.8192.168.2.6
                                                May 11, 2021 11:12:21.247014046 CEST5033953192.168.2.68.8.8.8
                                                May 11, 2021 11:12:21.301250935 CEST53503398.8.8.8192.168.2.6
                                                May 11, 2021 11:12:24.820668936 CEST6330753192.168.2.68.8.8.8
                                                May 11, 2021 11:12:24.873788118 CEST53633078.8.8.8192.168.2.6
                                                May 11, 2021 11:12:25.939068079 CEST4969453192.168.2.68.8.8.8
                                                May 11, 2021 11:12:25.987807989 CEST53496948.8.8.8192.168.2.6
                                                May 11, 2021 11:12:27.270266056 CEST5498253192.168.2.68.8.8.8
                                                May 11, 2021 11:12:27.319264889 CEST53549828.8.8.8192.168.2.6
                                                May 11, 2021 11:12:42.907170057 CEST5001053192.168.2.68.8.8.8
                                                May 11, 2021 11:12:42.967122078 CEST53500108.8.8.8192.168.2.6
                                                May 11, 2021 11:12:44.360722065 CEST6371853192.168.2.68.8.8.8
                                                May 11, 2021 11:12:44.412343025 CEST53637188.8.8.8192.168.2.6
                                                May 11, 2021 11:12:45.587485075 CEST6211653192.168.2.68.8.8.8
                                                May 11, 2021 11:12:45.647985935 CEST53621168.8.8.8192.168.2.6
                                                May 11, 2021 11:12:45.865833044 CEST6381653192.168.2.68.8.8.8
                                                May 11, 2021 11:12:45.916495085 CEST53638168.8.8.8192.168.2.6
                                                May 11, 2021 11:12:50.559823990 CEST5501453192.168.2.68.8.8.8
                                                May 11, 2021 11:12:50.628758907 CEST53550148.8.8.8192.168.2.6
                                                May 11, 2021 11:12:53.348803043 CEST6220853192.168.2.68.8.8.8
                                                May 11, 2021 11:12:53.413844109 CEST53622088.8.8.8192.168.2.6
                                                May 11, 2021 11:12:58.119138956 CEST5757453192.168.2.68.8.8.8
                                                May 11, 2021 11:12:58.181350946 CEST53575748.8.8.8192.168.2.6
                                                May 11, 2021 11:13:12.908103943 CEST5181853192.168.2.68.8.8.8
                                                May 11, 2021 11:13:12.966835022 CEST53518188.8.8.8192.168.2.6
                                                May 11, 2021 11:13:13.940148115 CEST5181853192.168.2.68.8.8.8
                                                May 11, 2021 11:13:13.998016119 CEST53518188.8.8.8192.168.2.6
                                                May 11, 2021 11:13:14.508028984 CEST5662853192.168.2.68.8.8.8
                                                May 11, 2021 11:13:14.608186960 CEST53566288.8.8.8192.168.2.6
                                                May 11, 2021 11:13:14.986512899 CEST5181853192.168.2.68.8.8.8
                                                May 11, 2021 11:13:15.043967009 CEST53518188.8.8.8192.168.2.6
                                                May 11, 2021 11:13:15.190351009 CEST6077853192.168.2.68.8.8.8
                                                May 11, 2021 11:13:15.330728054 CEST53607788.8.8.8192.168.2.6
                                                May 11, 2021 11:13:15.921439886 CEST5379953192.168.2.68.8.8.8
                                                May 11, 2021 11:13:16.058612108 CEST53537998.8.8.8192.168.2.6
                                                May 11, 2021 11:13:17.004277945 CEST5181853192.168.2.68.8.8.8
                                                May 11, 2021 11:13:17.061121941 CEST53518188.8.8.8192.168.2.6
                                                May 11, 2021 11:13:21.021867037 CEST5181853192.168.2.68.8.8.8
                                                May 11, 2021 11:13:21.079363108 CEST53518188.8.8.8192.168.2.6

                                                DNS Queries

                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                May 11, 2021 11:12:44.360722065 CEST192.168.2.68.8.8.80x5036Standard query (0)outlook.comA (IP address)IN (0x0001)
                                                May 11, 2021 11:12:45.587485075 CEST192.168.2.68.8.8.80xd3a9Standard query (0)www.outlook.comA (IP address)IN (0x0001)
                                                May 11, 2021 11:12:45.865833044 CEST192.168.2.68.8.8.80x6381Standard query (0)outlook.office365.comA (IP address)IN (0x0001)

                                                DNS Answers

                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                May 11, 2021 11:12:13.550908089 CEST8.8.8.8192.168.2.60x1017No error (0)prda.aadg.msidentity.comwww.tm.a.prd.aadg.akadns.netCNAME (Canonical name)IN (0x0001)
                                                May 11, 2021 11:12:44.412343025 CEST8.8.8.8192.168.2.60x5036No error (0)outlook.com40.97.161.50A (IP address)IN (0x0001)
                                                May 11, 2021 11:12:44.412343025 CEST8.8.8.8192.168.2.60x5036No error (0)outlook.com40.97.116.82A (IP address)IN (0x0001)
                                                May 11, 2021 11:12:44.412343025 CEST8.8.8.8192.168.2.60x5036No error (0)outlook.com40.97.160.2A (IP address)IN (0x0001)
                                                May 11, 2021 11:12:44.412343025 CEST8.8.8.8192.168.2.60x5036No error (0)outlook.com40.97.148.226A (IP address)IN (0x0001)
                                                May 11, 2021 11:12:44.412343025 CEST8.8.8.8192.168.2.60x5036No error (0)outlook.com40.97.164.146A (IP address)IN (0x0001)
                                                May 11, 2021 11:12:44.412343025 CEST8.8.8.8192.168.2.60x5036No error (0)outlook.com40.97.128.194A (IP address)IN (0x0001)
                                                May 11, 2021 11:12:44.412343025 CEST8.8.8.8192.168.2.60x5036No error (0)outlook.com40.97.156.114A (IP address)IN (0x0001)
                                                May 11, 2021 11:12:44.412343025 CEST8.8.8.8192.168.2.60x5036No error (0)outlook.com40.97.153.146A (IP address)IN (0x0001)
                                                May 11, 2021 11:12:45.647985935 CEST8.8.8.8192.168.2.60xd3a9No error (0)www.outlook.comoutlook.office365.comCNAME (Canonical name)IN (0x0001)
                                                May 11, 2021 11:12:45.647985935 CEST8.8.8.8192.168.2.60xd3a9No error (0)outlook.office365.comoutlook.ha.office365.comCNAME (Canonical name)IN (0x0001)
                                                May 11, 2021 11:12:45.647985935 CEST8.8.8.8192.168.2.60xd3a9No error (0)outlook.ha.office365.comoutlook.ms-acdc.office.comCNAME (Canonical name)IN (0x0001)
                                                May 11, 2021 11:12:45.647985935 CEST8.8.8.8192.168.2.60xd3a9No error (0)outlook.ms-acdc.office.comHHN-efz.ms-acdc.office.comCNAME (Canonical name)IN (0x0001)
                                                May 11, 2021 11:12:45.647985935 CEST8.8.8.8192.168.2.60xd3a9No error (0)HHN-efz.ms-acdc.office.com52.97.201.34A (IP address)IN (0x0001)
                                                May 11, 2021 11:12:45.647985935 CEST8.8.8.8192.168.2.60xd3a9No error (0)HHN-efz.ms-acdc.office.com52.97.233.50A (IP address)IN (0x0001)
                                                May 11, 2021 11:12:45.647985935 CEST8.8.8.8192.168.2.60xd3a9No error (0)HHN-efz.ms-acdc.office.com40.101.136.2A (IP address)IN (0x0001)
                                                May 11, 2021 11:12:45.647985935 CEST8.8.8.8192.168.2.60xd3a9No error (0)HHN-efz.ms-acdc.office.com40.101.137.66A (IP address)IN (0x0001)
                                                May 11, 2021 11:12:45.916495085 CEST8.8.8.8192.168.2.60x6381No error (0)outlook.office365.comoutlook.ha.office365.comCNAME (Canonical name)IN (0x0001)
                                                May 11, 2021 11:12:45.916495085 CEST8.8.8.8192.168.2.60x6381No error (0)outlook.ha.office365.comoutlook.ms-acdc.office.comCNAME (Canonical name)IN (0x0001)
                                                May 11, 2021 11:12:45.916495085 CEST8.8.8.8192.168.2.60x6381No error (0)outlook.ms-acdc.office.comFRA-efz.ms-acdc.office.comCNAME (Canonical name)IN (0x0001)
                                                May 11, 2021 11:12:45.916495085 CEST8.8.8.8192.168.2.60x6381No error (0)FRA-efz.ms-acdc.office.com40.101.12.82A (IP address)IN (0x0001)
                                                May 11, 2021 11:12:45.916495085 CEST8.8.8.8192.168.2.60x6381No error (0)FRA-efz.ms-acdc.office.com52.97.179.194A (IP address)IN (0x0001)
                                                May 11, 2021 11:12:45.916495085 CEST8.8.8.8192.168.2.60x6381No error (0)FRA-efz.ms-acdc.office.com52.97.189.98A (IP address)IN (0x0001)

                                                HTTP Request Dependency Graph

                                                • outlook.com

                                                HTTP Packets

                                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                                0192.168.2.64973240.97.161.5080C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                TimestampkBytes transferredDirectionData
                                                May 11, 2021 11:12:44.608804941 CEST1261OUTGET /login/greed/gx9NI4Ybpp/8F85m84ndjn4UwJSZ/KFY_2BxmUPMy/coa0QUktAbb/vjBaicl7yvyNDs/NaAVAq9mPnbNTlKz1AUy2/5aIKWQiZNRBNaijS/Tt5Vo5dnaNIMeJI/Piqfb55cpfCEI8CpHK/_2FWICMIW/YUkQnOfGVld1SPd1rTnm/w0s_2F9NNcplFjkZ_2F/ufX9zF863VCJiOMFbmL1SV/K4t8NhPa8Lg/cl7PdmL.gfk HTTP/1.1
                                                Accept: text/html, application/xhtml+xml, image/jxr, */*
                                                Accept-Language: en-US
                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like Gecko
                                                Accept-Encoding: gzip, deflate
                                                Host: outlook.com
                                                Connection: Keep-Alive
                                                May 11, 2021 11:12:44.792617083 CEST1262INHTTP/1.1 301 Moved Permanently
                                                Cache-Control: no-cache
                                                Pragma: no-cache
                                                Location: https://outlook.com/login/greed/gx9NI4Ybpp/8F85m84ndjn4UwJSZ/KFY_2BxmUPMy/coa0QUktAbb/vjBaicl7yvyNDs/NaAVAq9mPnbNTlKz1AUy2/5aIKWQiZNRBNaijS/Tt5Vo5dnaNIMeJI/Piqfb55cpfCEI8CpHK/_2FWICMIW/YUkQnOfGVld1SPd1rTnm/w0s_2F9NNcplFjkZ_2F/ufX9zF863VCJiOMFbmL1SV/K4t8NhPa8Lg/cl7PdmL.gfk
                                                Server: Microsoft-IIS/10.0
                                                request-id: 4ac60139-0bd7-4775-a037-e7043fcc077c
                                                X-FEServer: MWHPR11CA0031
                                                X-RequestId: 7ab3053c-dc2b-4421-bab2-11ad718bac2f
                                                X-Powered-By: ASP.NET
                                                X-FEServer: MWHPR11CA0031
                                                Date: Tue, 11 May 2021 09:12:44 GMT
                                                Connection: close
                                                Content-Length: 0


                                                Code Manipulations

                                                Statistics

                                                Behavior

                                                Click to jump to process

                                                System Behavior

                                                General

                                                Start time:11:10:12
                                                Start date:11/05/2021
                                                Path:C:\Windows\System32\loaddll32.exe
                                                Wow64 process (32bit):true
                                                Commandline:loaddll32.exe 'C:\Users\user\Desktop\609a460e94791.tiff.dll'
                                                Imagebase:0xe70000
                                                File size:116736 bytes
                                                MD5 hash:542795ADF7CC08EFCF675D65310596E8
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Yara matches:
                                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000001.00000003.662417377.0000000003EA8000.00000004.00000040.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000001.00000002.724251151.0000000003EA8000.00000004.00000040.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000001.00000003.662378098.0000000003EA8000.00000004.00000040.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000001.00000003.662456772.0000000003EA8000.00000004.00000040.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000001.00000003.662317153.0000000003EA8000.00000004.00000040.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000001.00000003.662182472.0000000003EA8000.00000004.00000040.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000001.00000003.662498468.0000000003EA8000.00000004.00000040.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000001.00000003.662484640.0000000003EA8000.00000004.00000040.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000001.00000003.662019943.0000000003EA8000.00000004.00000040.sdmp, Author: Joe Security
                                                Reputation:high

                                                General

                                                Start time:11:10:12
                                                Start date:11/05/2021
                                                Path:C:\Windows\SysWOW64\cmd.exe
                                                Wow64 process (32bit):true
                                                Commandline:cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\609a460e94791.tiff.dll',#1
                                                Imagebase:0x2a0000
                                                File size:232960 bytes
                                                MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high

                                                General

                                                Start time:11:10:12
                                                Start date:11/05/2021
                                                Path:C:\Windows\SysWOW64\rundll32.exe
                                                Wow64 process (32bit):true
                                                Commandline:rundll32.exe C:\Users\user\Desktop\609a460e94791.tiff.dll,Hundredpopulate@@8
                                                Imagebase:0xa40000
                                                File size:61952 bytes
                                                MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high

                                                General

                                                Start time:11:10:12
                                                Start date:11/05/2021
                                                Path:C:\Windows\SysWOW64\rundll32.exe
                                                Wow64 process (32bit):true
                                                Commandline:rundll32.exe 'C:\Users\user\Desktop\609a460e94791.tiff.dll',#1
                                                Imagebase:0xa40000
                                                File size:61952 bytes
                                                MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Yara matches:
                                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000004.00000003.681209868.0000000005148000.00000004.00000040.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000004.00000003.681069818.0000000005148000.00000004.00000040.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000004.00000003.681166678.0000000005148000.00000004.00000040.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000004.00000003.681184112.0000000005148000.00000004.00000040.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000004.00000003.681198469.0000000005148000.00000004.00000040.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000004.00000003.681099453.0000000005148000.00000004.00000040.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000004.00000003.681146524.0000000005148000.00000004.00000040.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000004.00000003.681124435.0000000005148000.00000004.00000040.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000004.00000002.725706595.0000000005148000.00000004.00000040.sdmp, Author: Joe Security
                                                Reputation:high

                                                General

                                                Start time:11:10:16
                                                Start date:11/05/2021
                                                Path:C:\Windows\SysWOW64\rundll32.exe
                                                Wow64 process (32bit):true
                                                Commandline:rundll32.exe C:\Users\user\Desktop\609a460e94791.tiff.dll,Mark@@12
                                                Imagebase:0xa40000
                                                File size:61952 bytes
                                                MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high

                                                General

                                                Start time:11:10:20
                                                Start date:11/05/2021
                                                Path:C:\Windows\SysWOW64\rundll32.exe
                                                Wow64 process (32bit):true
                                                Commandline:rundll32.exe C:\Users\user\Desktop\609a460e94791.tiff.dll,Seefit@@8
                                                Imagebase:0xa40000
                                                File size:61952 bytes
                                                MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high

                                                General

                                                Start time:11:12:42
                                                Start date:11/05/2021
                                                Path:C:\Program Files\internet explorer\iexplore.exe
                                                Wow64 process (32bit):false
                                                Commandline:'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
                                                Imagebase:0x7ff721e20000
                                                File size:823560 bytes
                                                MD5 hash:6465CB92B25A7BC1DF8E01D8AC5E7596
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high

                                                General

                                                Start time:11:12:43
                                                Start date:11/05/2021
                                                Path:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                Wow64 process (32bit):true
                                                Commandline:'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:5436 CREDAT:17410 /prefetch:2
                                                Imagebase:0x3e0000
                                                File size:822536 bytes
                                                MD5 hash:071277CC2E3DF41EEEA8013E2AB58D5A
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high

                                                Disassembly

                                                Code Analysis

                                                Reset < >