Loading ...

Play interactive tourEdit tour

Analysis Report A5uTdwOwJ1.dll

Overview

General Information

Sample Name:A5uTdwOwJ1.dll
Analysis ID:410913
MD5:1752fe2b8419be8241ecd08859a5800f
SHA1:eb7346a6d5a53ddaf8fd073f266c64d642b40a7d
SHA256:e81869620b9a18c3702c7be2fcf2e170cbc5c3de1ddbc84ae1fe190b57e917a0
Tags:dllGoziISFBUrsnif
Infos:

Most interesting Screenshot:

Detection

Ursnif
Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Yara detected Ursnif
Writes registry values via WMI
Allocates a big amount of memory (probably used for heap spraying)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
PE file contains an invalid checksum
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

Startup

  • System is w10x64
  • loaddll32.exe (PID: 7048 cmdline: loaddll32.exe 'C:\Users\user\Desktop\A5uTdwOwJ1.dll' MD5: 542795ADF7CC08EFCF675D65310596E8)
    • cmd.exe (PID: 7056 cmdline: cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\A5uTdwOwJ1.dll',#1 MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • rundll32.exe (PID: 7076 cmdline: rundll32.exe 'C:\Users\user\Desktop\A5uTdwOwJ1.dll',#1 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 7064 cmdline: rundll32.exe C:\Users\user\Desktop\A5uTdwOwJ1.dll,Hundredpopulate@@8 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 7132 cmdline: rundll32.exe C:\Users\user\Desktop\A5uTdwOwJ1.dll,Mark@@12 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 7148 cmdline: rundll32.exe C:\Users\user\Desktop\A5uTdwOwJ1.dll,Seefit@@8 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
  • iexplore.exe (PID: 4640 cmdline: 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding MD5: 6465CB92B25A7BC1DF8E01D8AC5E7596)
    • iexplore.exe (PID: 1668 cmdline: 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:4640 CREDAT:17410 /prefetch:2 MD5: 071277CC2E3DF41EEEA8013E2AB58D5A)
  • cleanup

Malware Configuration

Threatname: Ursnif

{"RSA Public Key": "KujE77ctKyR8x3/dODwZbEsxGmck+FW9384s5u0Kacw8y1gCN+8m2bfjJPovkn+Uzufcdfss+a43eI6oHR1KgWQmvEAO6LK8tJv+Wl7iCBPJP7eef8xKeXht/Mhk1PSj7mHnJ9lcqKMtTteEdSecVvMRtb/WSKVTFfHDva9My7AJ/NbXqHdzCG7znACswLxD", "c2_domain": ["outlook.com/login", "gmail.com", "worunekulo.club", "horunekulo.website"], "botnet": "8877", "server": "12", "serpent_key": "30218409ILPAJDUR", "sleep_time": "10", "CONF_TIMEOUT": "20", "SetWaitableTimer_value": "0", "DGA_count": "10"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000003.00000002.933933475.00000000050E8000.00000004.00000040.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
    Process Memory Space: rundll32.exe PID: 7076JoeSecurity_UrsnifYara detected UrsnifJoe Security

      Sigma Overview

      No Sigma rule has matched

      Signature Overview

      Click to jump to signature section

      Show All Signature Results

      AV Detection:

      barindex
      Found malware configurationShow sources
      Source: 0.3.loaddll32.exe.f9a427.0.raw.unpackMalware Configuration Extractor: Ursnif {"RSA Public Key": "KujE77ctKyR8x3/dODwZbEsxGmck+FW9384s5u0Kacw8y1gCN+8m2bfjJPovkn+Uzufcdfss+a43eI6oHR1KgWQmvEAO6LK8tJv+Wl7iCBPJP7eef8xKeXht/Mhk1PSj7mHnJ9lcqKMtTteEdSecVvMRtb/WSKVTFfHDva9My7AJ/NbXqHdzCG7znACswLxD", "c2_domain": ["outlook.com/login", "gmail.com", "worunekulo.club", "horunekulo.website"], "botnet": "8877", "server": "12", "serpent_key": "30218409ILPAJDUR", "sleep_time": "10", "CONF_TIMEOUT": "20", "SetWaitableTimer_value": "0", "DGA_count": "10"}
      Source: A5uTdwOwJ1.dllStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
      Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeFile opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dll
      Source: A5uTdwOwJ1.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT
      Source: Binary string: c:\die\Oh\ease_Slip\Suffix\fall.pdb source: loaddll32.exe, 00000000.00000002.933350818.000000006D4CB000.00000002.00020000.sdmp, rundll32.exe, 00000003.00000002.934697634.000000006D4CB000.00000002.00020000.sdmp, A5uTdwOwJ1.dll
      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6D4A5AB0 FindFirstFileExW,std::_Timevec::_Timevec,FindNextFileW,
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02B64C3B RtlAllocateHeap,RtlAllocateHeap,RtlAllocateHeap,memset,CreateFileA,GetFileTime,FindCloseChangeNotification,StrRChrA,lstrcat,FindFirstFileA,FindFirstFileA,CompareFileTime,CompareFileTime,FindClose,FindNextFileA,FindClose,FindFirstFileA,CompareFileTime,StrChrA,memcpy,FindNextFileA,FindClose,FindFirstFileA,CompareFileTime,FindClose,HeapFree,HeapFree,
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D4A5AB0 FindFirstFileExW,std::_Timevec::_Timevec,FindNextFileW,
      Source: iexplore.exeMemory has grown: Private usage: 0MB later: 5MB
      Source: unknownDNS traffic detected: queries for: outlook.com

      Key, Mouse, Clipboard, Microphone and Screen Capturing:

      barindex
      Yara detected UrsnifShow sources
      Source: Yara matchFile source: 00000003.00000002.933933475.00000000050E8000.00000004.00000040.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 7076, type: MEMORY
      Source: loaddll32.exe, 00000000.00000002.932987717.000000000106B000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

      E-Banking Fraud:

      barindex
      Yara detected UrsnifShow sources
      Source: Yara matchFile source: 00000003.00000002.933933475.00000000050E8000.00000004.00000040.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 7076, type: MEMORY

      System Summary:

      barindex
      Writes registry values via WMIShow sources
      Source: C:\Windows\SysWOW64\rundll32.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetDWORDValue
      Source: C:\Windows\SysWOW64\rundll32.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
      Source: C:\Windows\SysWOW64\rundll32.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue
      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6D4323A5 NtQueryVirtualMemory,
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D4315F1 GetProcAddress,NtCreateSection,memset,
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D431F14 NtMapViewOfSection,
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D4323A5 NtQueryVirtualMemory,
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02B61168 NtOpenProcess,NtOpenProcessToken,NtQueryInformationToken,NtQueryInformationToken,NtQueryInformationToken,memcpy,NtClose,NtClose,
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02B6B2F1 NtQueryVirtualMemory,
      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6D432184
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D432184
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02B6B0CC
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02B6696A
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02B61B6A
      Source: A5uTdwOwJ1.dllBinary or memory string: OriginalFilenamefall.dll8 vs A5uTdwOwJ1.dll
      Source: A5uTdwOwJ1.dllStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
      Source: classification engineClassification label: mal60.troj.winDLL@14/4@3/0
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02B67F56 CreateToolhelp32Snapshot,Process32First,Process32Next,CloseHandle,
      Source: C:\Program Files\internet explorer\iexplore.exeFile created: C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{FA9A4670-B247-11EB-90EB-ECF4BBEA1588}.datJump to behavior
      Source: C:\Program Files\internet explorer\iexplore.exeFile created: C:\Users\user\AppData\Local\Temp\~DF7A757557FCA01EC0.TMPJump to behavior
      Source: A5uTdwOwJ1.dllStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      Source: C:\Program Files\internet explorer\iexplore.exeFile read: C:\Users\desktop.iniJump to behavior
      Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\A5uTdwOwJ1.dll,Hundredpopulate@@8
      Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe 'C:\Users\user\Desktop\A5uTdwOwJ1.dll'
      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\A5uTdwOwJ1.dll',#1
      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\A5uTdwOwJ1.dll,Hundredpopulate@@8
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\A5uTdwOwJ1.dll',#1
      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\A5uTdwOwJ1.dll,Mark@@12
      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\A5uTdwOwJ1.dll,Seefit@@8
      Source: unknownProcess created: C:\Program Files\internet explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
      Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:4640 CREDAT:17410 /prefetch:2
      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\A5uTdwOwJ1.dll',#1
      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\A5uTdwOwJ1.dll,Hundredpopulate@@8
      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\A5uTdwOwJ1.dll,Mark@@12
      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\A5uTdwOwJ1.dll,Seefit@@8
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\A5uTdwOwJ1.dll',#1
      Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:4640 CREDAT:17410 /prefetch:2
      Source: C:\Windows\SysWOW64\rundll32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}\InprocServer32
      Source: C:\Windows\SysWOW64\rundll32.exeAutomated click: OK
      Source: C:\Windows\SysWOW64\rundll32.exeAutomated click: OK
      Source: C:\Windows\SysWOW64\rundll32.exeAutomated click: OK
      Source: Window RecorderWindow detected: More than 3 window changes detected
      Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeFile opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dll
      Source: A5uTdwOwJ1.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
      Source: A5uTdwOwJ1.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
      Source: A5uTdwOwJ1.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
      Source: A5uTdwOwJ1.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
      Source: A5uTdwOwJ1.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
      Source: A5uTdwOwJ1.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
      Source: A5uTdwOwJ1.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT
      Source: A5uTdwOwJ1.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
      Source: Binary string: c:\die\Oh\ease_Slip\Suffix\fall.pdb source: loaddll32.exe, 00000000.00000002.933350818.000000006D4CB000.00000002.00020000.sdmp, rundll32.exe, 00000003.00000002.934697634.000000006D4CB000.00000002.00020000.sdmp, A5uTdwOwJ1.dll
      Source: A5uTdwOwJ1.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
      Source: A5uTdwOwJ1.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
      Source: A5uTdwOwJ1.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
      Source: A5uTdwOwJ1.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
      Source: A5uTdwOwJ1.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6D4317FA LoadLibraryA,GetProcAddress,
      Source: A5uTdwOwJ1.dllStatic PE information: real checksum: 0xdacb0 should be: 0xd9de3
      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6D432173 push ecx; ret
      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6D432120 push ecx; ret
      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6D5006DB push ebp; retf 0000h
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D432173 push ecx; ret
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D432120 push ecx; ret
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02B6B0BB push ecx; ret
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02B6AD00 push ecx; ret
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D5006DB push ebp; retf 0000h

      Hooking and other Techniques for Hiding and Protection:

      barindex
      Yara detected UrsnifShow sources
      Source: Yara matchFile source: 00000003.00000002.933933475.00000000050E8000.00000004.00000040.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 7076, type: MEMORY
      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6D4611D0 GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,
      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\loaddll32.exeLast function: Thread delayed
      Source: C:\Windows\System32\loaddll32.exeLast function: Thread delayed
      Source: C:\Windows\SysWOW64\rundll32.exeLast function: Thread delayed
      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6D4A5AB0 FindFirstFileExW,std::_Timevec::_Timevec,FindNextFileW,
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02B64C3B RtlAllocateHeap,RtlAllocateHeap,RtlAllocateHeap,memset,CreateFileA,GetFileTime,FindCloseChangeNotification,StrRChrA,lstrcat,FindFirstFileA,FindFirstFileA,CompareFileTime,CompareFileTime,FindClose,FindNextFileA,FindClose,FindFirstFileA,CompareFileTime,StrChrA,memcpy,FindNextFileA,FindClose,FindFirstFileA,CompareFileTime,FindClose,HeapFree,HeapFree,
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D4A5AB0 FindFirstFileExW,std::_Timevec::_Timevec,FindNextFileW,
      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6D474F60 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6D4A0480 __invoke_watson_if_error,OutputDebugStringW,OutputDebugStringW,OutputDebugStringW,OutputDebugStringW,OutputDebugStringW,__aligned_msize,__invoke_watson_if_error,__aligned_msize,__invoke_watson_if_error,__aligned_msize,__invoke_watson_if_error,__aligned_msize,__invoke_watson_if_error,__aligned_msize,__invoke_watson_if_error,__aligned_msize,__invoke_watson_if_error,__aligned_msize,__invoke_watson_if_error,__cftoe,__aligned_msize,__invoke_watson_if_error,GetFileType,WriteConsoleW,GetLastError,__cftoe,WriteFile,WriteFile,OutputDebugStringW,__invoke_watson_if_error,__CrtDbgReportWV,
      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6D4317FA LoadLibraryA,GetProcAddress,
      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6D4A4D80 mov ecx, dword ptr fs:[00000030h]
      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6D4A4CE0 mov ecx, dword ptr fs:[00000030h]
      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6D4A4E20 mov ecx, dword ptr fs:[00000030h]
      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6D477960 mov eax, dword ptr fs:[00000030h]
      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6D4FC536 mov eax, dword ptr fs:[00000030h]
      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6D4FC46C mov eax, dword ptr fs:[00000030h]
      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6D4FC073 push dword ptr fs:[00000030h]
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D4A4D80 mov ecx, dword ptr fs:[00000030h]
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D4A4CE0 mov ecx, dword ptr fs:[00000030h]
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D4A4E20 mov ecx, dword ptr fs:[00000030h]
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D477960 mov eax, dword ptr fs:[00000030h]
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D4FC536 mov eax, dword ptr fs:[00000030h]
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D4FC46C mov eax, dword ptr fs:[00000030h]
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D4FC073 push dword ptr fs:[00000030h]
      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6D474F60 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6D4636C0 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6D463990 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6D4638F0 SetUnhandledExceptionFilter,
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D474F60 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D4636C0 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D463990 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D4638F0 SetUnhandledExceptionFilter,
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\A5uTdwOwJ1.dll',#1
      Source: loaddll32.exe, 00000000.00000002.933070548.0000000001620000.00000002.00000001.sdmp, rundll32.exe, 00000003.00000002.933475448.0000000002FF0000.00000002.00000001.sdmpBinary or memory string: Program Manager
      Source: loaddll32.exe, 00000000.00000002.933070548.0000000001620000.00000002.00000001.sdmp, rundll32.exe, 00000003.00000002.933475448.0000000002FF0000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
      Source: loaddll32.exe, 00000000.00000002.933070548.0000000001620000.00000002.00000001.sdmp, rundll32.exe, 00000003.00000002.933475448.0000000002FF0000.00000002.00000001.sdmpBinary or memory string: Progman
      Source: loaddll32.exe, 00000000.00000002.933070548.0000000001620000.00000002.00000001.sdmp, rundll32.exe, 00000003.00000002.933475448.0000000002FF0000.00000002.00000001.sdmpBinary or memory string: Progmanlock
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02B62D6E cpuid
      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6D431237 SetThreadPriority,GetSystemTime,SwitchToThread,Sleep,GetLongPathNameW,GetLongPathNameW,GetLongPathNameW,GetLastError,WaitForSingleObject,GetExitCodeThread,CloseHandle,GetLastError,GetLastError,
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02B62D6E RtlAllocateHeap,GetUserNameW,RtlAllocateHeap,GetUserNameW,HeapFree,GetComputerNameW,GetComputerNameW,RtlAllocateHeap,GetComputerNameW,HeapFree,
      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6D431CDD CreateEventA,GetVersion,GetCurrentProcessId,OpenProcess,GetLastError,

      Stealing of Sensitive Information:

      barindex
      Yara detected UrsnifShow sources
      Source: Yara matchFile source: 00000003.00000002.933933475.00000000050E8000.00000004.00000040.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 7076, type: MEMORY

      Remote Access Functionality:

      barindex
      Yara detected UrsnifShow sources
      Source: Yara matchFile source: 00000003.00000002.933933475.00000000050E8000.00000004.00000040.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 7076, type: MEMORY

      Mitre Att&ck Matrix

      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
      Valid AccountsWindows Management Instrumentation1Application Shimming1Process Injection12Masquerading1Input Capture1System Time Discovery1Remote ServicesInput Capture1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
      Default AccountsNative API1Boot or Logon Initialization ScriptsApplication Shimming1Process Injection12LSASS MemorySecurity Software Discovery2Remote Desktop ProtocolArchive Collected Data1Exfiltration Over BluetoothNon-Application Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
      Domain AccountsAt (Linux)Logon Script (Windows)Extra Window Memory Injection1Obfuscated Files or Information1Security Account ManagerProcess Discovery2SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationApplication Layer Protocol1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Rundll321NTDSAccount Discovery1Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptExtra Window Memory Injection1LSA SecretsSystem Owner/User Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
      Replication Through Removable MediaLaunchdRc.commonRc.commonSteganographyCached Domain CredentialsFile and Directory Discovery2VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSyncSystem Information Discovery13Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact

      Behavior Graph

      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet
      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 410913 Sample: A5uTdwOwJ1.dll Startdate: 11/05/2021 Architecture: WINDOWS Score: 60 25 www.outlook.com 2->25 27 outlook.office365.com 2->27 29 4 other IPs or domains 2->29 31 Found malware configuration 2->31 33 Yara detected  Ursnif 2->33 8 loaddll32.exe 1 2->8         started        10 iexplore.exe 1 49 2->10         started        signatures3 process4 process5 12 rundll32.exe 8->12         started        15 cmd.exe 1 8->15         started        17 rundll32.exe 8->17         started        19 rundll32.exe 8->19         started        21 iexplore.exe 24 10->21         started        signatures6 35 Writes registry values via WMI 12->35 23 rundll32.exe 15->23         started        process7

      Screenshots

      Thumbnails

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

      windows-stand

      Antivirus, Machine Learning and Genetic Malware Detection

      Initial Sample

      No Antivirus matches

      Dropped Files

      No Antivirus matches

      Unpacked PE Files

      SourceDetectionScannerLabelLinkDownload
      3.2.rundll32.exe.2b60000.2.unpack100%AviraHEUR/AGEN.1108168Download File
      4.2.rundll32.exe.2d40000.1.unpack100%AviraHEUR/AGEN.1108168Download File

      Domains

      No Antivirus matches

      URLs

      No Antivirus matches

      Domains and IPs

      Contacted Domains

      NameIPActiveMaliciousAntivirus DetectionReputation
      outlook.com
      40.97.116.82
      truefalse
        high
        HHN-efz.ms-acdc.office.com
        40.101.138.210
        truefalse
          high
          www.outlook.com
          unknown
          unknownfalse
            high
            outlook.office365.com
            unknown
            unknownfalse
              high

              Contacted IPs

              No contacted IP infos

              General Information

              Joe Sandbox Version:32.0.0 Black Diamond
              Analysis ID:410913
              Start date:11.05.2021
              Start time:12:56:38
              Joe Sandbox Product:CloudBasic
              Overall analysis duration:0h 7m 42s
              Hypervisor based Inspection enabled:false
              Report type:light
              Sample file name:A5uTdwOwJ1.dll
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
              Number of analysed new started processes analysed:14
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • HDC enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Detection:MAL
              Classification:mal60.troj.winDLL@14/4@3/0
              EGA Information:Failed
              HDC Information:
              • Successful, ratio: 8.9% (good quality ratio 8.5%)
              • Quality average: 79.5%
              • Quality standard deviation: 28.6%
              HCA Information:
              • Successful, ratio: 69%
              • Number of executed functions: 0
              • Number of non-executed functions: 0
              Cookbook Comments:
              • Adjust boot time
              • Enable AMSI
              • Found application associated with file extension: .dll
              Warnings:
              Show All
              • Excluded IPs from analysis (whitelisted): 13.107.3.254, 104.43.193.48, 13.107.246.254, 40.88.32.150, 13.64.90.137, 131.253.33.200, 13.107.22.200, 104.43.139.144, 20.190.160.133, 20.190.160.70, 20.190.160.9, 20.190.160.5, 20.190.160.72, 20.190.160.7, 20.190.160.74, 20.190.160.68, 20.50.102.62, 92.122.213.247, 92.122.213.194, 88.221.62.148
              • Excluded domains from analysis (whitelisted): s-ring.msedge.net, www.tm.lg.prod.aadmsa.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, www.tm.a.prd.aadg.trafficmanager.net, e11290.dspg.akamaiedge.net, skypedataprdcoleus15.cloudapp.net, go.microsoft.com, login.live.com, www-bing-com.dual-a-0001.a-msedge.net, arc.trafficmanager.net, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, www.bing.com, skypedataprdcolwus17.cloudapp.net, skypedataprdcolcus16.cloudapp.net, iris-de-prod-azsc-uks.uksouth.cloudapp.azure.com, s-ring.s-9999.s-msedge.net, t-ring.msedge.net, login.msa.msidentity.com, skypedataprdcolcus15.cloudapp.net, dual-a-0001.dc-msedge.net, t-9999.t-msedge.net, a-0001.a-afdentry.net.trafficmanager.net, s-9999.s-msedge.net, blobcollector.events.data.trafficmanager.net, go.microsoft.com.edgekey.net, t-ring.t-9999.t-msedge.net
              • Report size getting too big, too many NtOpenKeyEx calls found.

              Simulations

              Behavior and APIs

              TimeTypeDescription
              12:59:18API Interceptor1x Sleep call for process: rundll32.exe modified

              Joe Sandbox View / Context

              IPs

              No context

              Domains

              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
              HHN-efz.ms-acdc.office.comFuiZSHt8Hx.dllGet hashmaliciousBrowse
              • 52.98.151.242
              609a460e94791.tiff.dllGet hashmaliciousBrowse
              • 52.97.201.34
              iJdlvBxhYu.dllGet hashmaliciousBrowse
              • 52.97.150.2
              8OKQ6ogGRx.dllGet hashmaliciousBrowse
              • 40.101.138.2
              609110f2d14a6.dllGet hashmaliciousBrowse
              • 40.101.137.34
              New%20order%20contract.htmlGet hashmaliciousBrowse
              • 52.98.175.2
              outlook.comfile.msg.exeGet hashmaliciousBrowse
              • 104.47.56.138
              Update-KB1484-x86.exeGet hashmaliciousBrowse
              • 104.47.57.138
              n6osajjc938.exeGet hashmaliciousBrowse
              • 104.47.54.36
              9b3d7f02.exeGet hashmaliciousBrowse
              • 104.47.54.36
              5zc9vbGBo3.exeGet hashmaliciousBrowse
              • 52.101.24.0
              InnAcjnAmG.exeGet hashmaliciousBrowse
              • 104.47.53.36
              8X93Tzvd7V.exeGet hashmaliciousBrowse
              • 52.101.24.0
              u8A8Qy5S7O.exeGet hashmaliciousBrowse
              • 104.47.53.36
              SecuriteInfo.com.Mal.GandCrypt-A.24654.exeGet hashmaliciousBrowse
              • 104.47.54.36
              SecuriteInfo.com.Mal.GandCrypt-A.5674.exeGet hashmaliciousBrowse
              • 104.47.54.36
              SecuriteInfo.com.W32.AIDetect.malware2.29567.exeGet hashmaliciousBrowse
              • 104.47.53.36
              lsass(1).exeGet hashmaliciousBrowse
              • 104.47.59.138
              rtofwqxq.exeGet hashmaliciousBrowse
              • 104.47.53.36
              VufxYArno1.exeGet hashmaliciousBrowse
              • 104.47.53.36

              ASN

              No context

              JA3 Fingerprints

              No context

              Dropped Files

              No context

              Created / dropped Files

              C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{FA9A4670-B247-11EB-90EB-ECF4BBEA1588}.dat
              Process:C:\Program Files\internet explorer\iexplore.exe
              File Type:Microsoft Word Document
              Category:dropped
              Size (bytes):21592
              Entropy (8bit):1.7538928547404984
              Encrypted:false
              SSDEEP:48:IwVGcpr8GwpL/G/ap8hGIpcWGvnZpvUoGokPqp9RGo4wqzpmpGWk5YTR:rLZ0Zn2jWztUxifiwqzMYCV
              MD5:B9765F08D46BFC88BBFDCCFC0D775FF6
              SHA1:8160BFAE549AB412C71C7AB0DD67FE046F8BE085
              SHA-256:0AA48A18F107E6EA8C938E35497041F02B8389C6F763AC2B43EF55C7C38EBCB2
              SHA-512:7C86AE85DC93DC7D0BEFBA30C6B7A9794145E35633E5722C9726AA755E58973FEAEBF07ECDD03744F9E88FF0E121F93DED4780C00C3E8437EB884C99CFC55315
              Malicious:false
              Reputation:low
              Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{FA9A4672-B247-11EB-90EB-ECF4BBEA1588}.dat
              Process:C:\Program Files\internet explorer\iexplore.exe
              File Type:Microsoft Word Document
              Category:dropped
              Size (bytes):16984
              Entropy (8bit):1.5736827119957864
              Encrypted:false
              SSDEEP:48:Iwa7GcprHGwpaUG4pQoGrapbS7GQpBSGHHpcvTGUpG:rahZRQk62BS1jp25A
              MD5:5EAB8D7BB7320BB13DEB73905A1A53FB
              SHA1:4B28FC7F388C96242071D35AD7E75D928508C311
              SHA-256:901D4FD58A650A36B0F17605AF165FDA50C6B9F26C44DBA3C940C0BCE0C0689F
              SHA-512:19D5128ABD62B212D4E445405BA6257632CA2DCD0A794DD0D9733FBD108EA76D8BB657E4134E71178577FD1C38DA825378628D3FAA01573C82E6C58193DA53D7
              Malicious:false
              Reputation:low
              Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              C:\Users\user\AppData\Local\Temp\~DF1B654EC27DD768D2.TMP
              Process:C:\Program Files\internet explorer\iexplore.exe
              File Type:data
              Category:dropped
              Size (bytes):25657
              Entropy (8bit):0.3144468490138463
              Encrypted:false
              SSDEEP:24:c9lLh9lLh9lIn9lIn9lRg9lRA9lTS9lTy9lSSd9lSSd9lwSz9lwSz9l2S6:kBqoxKAuvScS+1bN
              MD5:82A8AF58D95219C47E4A30F27A7C206E
              SHA1:C20BBE085E1EDA657B8E68E513C2A10E3235BE54
              SHA-256:F1BAB6976EAEDB52338DE2D26B481D9C33EDA97219D5238FF5A3F3482F2AC385
              SHA-512:A729B550BBDA1DE7C946CE4AF0715D88E082E0AC287C95AD146D9D189E6EE33D5B6686741009FC35B856BCC7A6727420DE11BFFA23B5C81044907FA1801C6EB5
              Malicious:false
              Reputation:low
              Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              C:\Users\user\AppData\Local\Temp\~DF7A757557FCA01EC0.TMP
              Process:C:\Program Files\internet explorer\iexplore.exe
              File Type:data
              Category:dropped
              Size (bytes):12917
              Entropy (8bit):0.39582328508219533
              Encrypted:false
              SSDEEP:24:c9lLh9lLh9lIn9lIn9logi9logS9lWgfE:kBqoIC85
              MD5:857EE0C1FAE8C14013D145E688ECCCE8
              SHA1:E692896F7D7BFF731D73C947851F3C1C1E26FA08
              SHA-256:4DA381D3C5014EE7A29C1BF58AA4C4B5BF5225A3AE40A3021A2A2E6976380BD5
              SHA-512:FA43E3BE7959D040AB1EED343E350271892A5A8DAC4972143F1AAD092E77B1C6AD1B071E9AAE45AEC92DC4CD742A988F102646385C98273121C683F8BBA71985
              Malicious:false
              Reputation:low
              Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................

              Static File Info

              General

              File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
              Entropy (8bit):6.388583358089739
              TrID:
              • Win32 Dynamic Link Library (generic) (1002004/3) 99.40%
              • Win16/32 Executable Delphi generic (2074/23) 0.21%
              • Generic Win/DOS Executable (2004/3) 0.20%
              • DOS Executable Generic (2002/1) 0.20%
              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
              File name:A5uTdwOwJ1.dll
              File size:841216
              MD5:1752fe2b8419be8241ecd08859a5800f
              SHA1:eb7346a6d5a53ddaf8fd073f266c64d642b40a7d
              SHA256:e81869620b9a18c3702c7be2fcf2e170cbc5c3de1ddbc84ae1fe190b57e917a0
              SHA512:0718e566bdec828d59890818a65af53f467d1bab92abbdd2ecfe3eca55be7ad3692793e4310ea41f2ab2a9f5e9fe6d29e1873cacc1614c6f2cceaf6b320c8f15
              SSDEEP:12288:mzCoXRvNZrA8Res/TPUOjUUGcqcoWEx9kMGUS6vOV5y4gnuD5wtqqB7ol:udNZr5RLL1AZ/clUnHvk5hgU
              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...L..`...........!.................0....................................................@..........................{..x..

              File Icon

              Icon Hash:74f0e4ecccdce0e4

              Static PE Info

              General

              Entrypoint:0x1033080
              Entrypoint Section:.text
              Digitally signed:false
              Imagebase:0x1000000
              Subsystem:windows gui
              Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
              DLL Characteristics:DYNAMIC_BASE, NX_COMPAT
              Time Stamp:0x6092C34C [Wed May 5 16:09:48 2021 UTC]
              TLS Callbacks:
              CLR (.Net) Version:
              OS Version Major:6
              OS Version Minor:0
              File Version Major:6
              File Version Minor:0
              Subsystem Version Major:6
              Subsystem Version Minor:0
              Import Hash:dc55991f7b8a912c780d10d352635290

              Entrypoint Preview

              Instruction
              push ebp
              mov ebp, esp
              cmp dword ptr [ebp+0Ch], 01h
              jne 00007FDB40955B47h
              call 00007FDB40956817h
              mov eax, dword ptr [ebp+10h]
              push eax
              mov ecx, dword ptr [ebp+0Ch]
              push ecx
              mov edx, dword ptr [ebp+08h]
              push edx
              call 00007FDB40955926h
              add esp, 0Ch
              pop ebp
              retn 000Ch
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              push ebp
              mov ebp, esp
              push ecx
              mov dword ptr [ebp-04h], ecx
              mov esp, ebp
              pop ebp
              ret
              int3
              int3
              int3
              int3
              int3
              push ebp
              mov ebp, esp
              push ecx
              mov eax, dword ptr [ebp+08h]
              mov ecx, dword ptr [eax]
              mov dword ptr [ebp-04h], ecx
              mov eax, dword ptr [ebp-04h]
              mov esp, ebp
              pop ebp
              ret
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              push ebp
              mov ebp, esp
              mov eax, dword ptr [ebp+08h]
              push eax
              call 00007FDB40955B19h
              add esp, 04h
              pop ebp
              ret
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              push ebp
              mov ebp, esp
              mov eax, dword ptr [ebp+08h]
              push eax
              call 00007FDB40955BB9h
              add esp, 04h
              test eax, eax
              je 00007FDB40955B43h
              int3
              pop ebp
              ret
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              push ebp
              mov ebp, esp
              mov eax, dword ptr [ebp+08h]
              push eax
              call 00007FDB40955B99h
              add esp, 04h
              test eax, eax
              je 00007FDB40955B49h
              mov ecx, 00000041h
              int 29h
              pop ebp
              ret
              int3
              int3
              int3
              int3
              push ebp
              mov ebp, esp
              push ecx
              mov eax, dword ptr [ebp+08h]

              Data Directories

              NameVirtual AddressVirtual Size Is in Section
              IMAGE_DIRECTORY_ENTRY_EXPORT0xc7bb00x78.rdata
              IMAGE_DIRECTORY_ENTRY_IMPORT0xc7c280x64.rdata
              IMAGE_DIRECTORY_ENTRY_RESOURCE0xe80000x3a0.rsrc
              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
              IMAGE_DIRECTORY_ENTRY_BASERELOC0xe90000x51e0.reloc
              IMAGE_DIRECTORY_ENTRY_DEBUG0xc5ecc0x54.rdata
              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xc5f200x40.rdata
              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IAT0x9b0000x1a4.rdata
              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

              Sections

              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
              .text0x10000x997af0x99800False0.488931761502data6.50078545852IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
              .rdata0x9b0000x2d5aa0x2d600False0.326892863292data4.74980452387IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .data0xc90000x1efdc0xe00False0.209821428571data3.01039741419IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
              .rsrc0xe80000x3a00x400False0.404296875data3.03375733203IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .reloc0xe90000x51e00x5200False0.770293445122data6.74990882481IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

              Resources

              NameRVASizeTypeLanguageCountry
              RT_VERSION0xe80600x340dataEnglishUnited States

              Imports

              DLLImport
              KERNEL32.dllCreateFileW, GetWindowsDirectoryW, ReadFile, GetConsoleMode, OpenMutexW, CloseHandle, GetFileSize, DeleteCriticalSection, ReadConsoleW, VirtualProtectEx, GetConsoleCP, FlushFileBuffers, SetFilePointerEx, GetFileSizeEx, SetStdHandle, GetStringTypeW, EnterCriticalSection, LeaveCriticalSection, SetLastError, InitializeCriticalSectionAndSpinCount, CreateEventW, SwitchToThread, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetSystemTimeAsFileTime, GetTickCount, GetModuleHandleW, GetProcAddress, IsProcessorFeaturePresent, IsDebuggerPresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetStartupInfoW, GetCurrentProcess, TerminateProcess, QueryPerformanceCounter, GetCurrentProcessId, GetCurrentThreadId, InitializeSListHead, RaiseException, RtlUnwind, InterlockedPushEntrySList, InterlockedFlushSList, GetLastError, EncodePointer, FreeLibrary, LoadLibraryExW, GetModuleFileNameW, GetModuleHandleExW, ExitProcess, HeapAlloc, HeapValidate, GetSystemInfo, GetCurrentThread, GetStdHandle, GetFileType, WriteFile, OutputDebugStringW, WriteConsoleW, SetConsoleCtrlHandler, GetDateFormatW, GetTimeFormatW, CompareStringW, LCMapStringW, GetLocaleInfoW, IsValidLocale, GetUserDefaultLCID, EnumSystemLocalesW, FindClose, FindFirstFileExW, FindNextFileW, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, MultiByteToWideChar, WideCharToMultiByte, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableW, GetProcessHeap, HeapFree, HeapReAlloc, HeapSize, HeapQueryInformation, DecodePointer
              UxTheme.dllCloseThemeData
              AVIFIL32.dllAVIFileGetStream, AVIFileOpenW, AVIFileExit, AVIFileInit, AVIFileEndRecord
              TAPI32.dlllineRedirectW, lineInitialize, lineHold, lineShutdown, lineTranslateAddressW

              Exports

              NameOrdinalAddress
              Hundredpopulate@@810x1030208
              Mark@@1220x10303fe
              Seefit@@830x103046c

              Version Infos

              DescriptionData
              LegalCopyright Dad plan Corporation. All rights reserved
              InternalNameTeam Lonesell
              FileVersion7.2.6.201
              CompanyNameDad plan Corporation
              These95
              ProductNameDad plan Fair fell
              ProductVersion7.2.6.201
              FileDescriptionDad plan Fair fell
              OriginalFilenamefall.dll
              Translation0x0409 0x04b0

              Possible Origin

              Language of compilation systemCountry where language is spokenMap
              EnglishUnited States

              Network Behavior

              Network Port Distribution

              UDP Packets

              TimestampSource PortDest PortSource IPDest IP
              May 11, 2021 12:57:28.205221891 CEST5309753192.168.2.48.8.8.8
              May 11, 2021 12:57:28.254018068 CEST53530978.8.8.8192.168.2.4
              May 11, 2021 12:57:28.258095980 CEST4925753192.168.2.48.8.8.8
              May 11, 2021 12:57:28.309806108 CEST53492578.8.8.8192.168.2.4
              May 11, 2021 12:57:28.481270075 CEST6238953192.168.2.48.8.8.8
              May 11, 2021 12:57:28.541296959 CEST53623898.8.8.8192.168.2.4
              May 11, 2021 12:57:30.231909990 CEST4991053192.168.2.48.8.8.8
              May 11, 2021 12:57:30.283821106 CEST53499108.8.8.8192.168.2.4
              May 11, 2021 12:57:31.195168018 CEST5585453192.168.2.48.8.8.8
              May 11, 2021 12:57:31.249306917 CEST53558548.8.8.8192.168.2.4
              May 11, 2021 12:57:31.965966940 CEST6454953192.168.2.48.8.8.8
              May 11, 2021 12:57:32.017632961 CEST53645498.8.8.8192.168.2.4
              May 11, 2021 12:57:33.175950050 CEST6315353192.168.2.48.8.8.8
              May 11, 2021 12:57:33.234396935 CEST53631538.8.8.8192.168.2.4
              May 11, 2021 12:57:34.227926016 CEST5299153192.168.2.48.8.8.8
              May 11, 2021 12:57:34.276879072 CEST53529918.8.8.8192.168.2.4
              May 11, 2021 12:57:35.045386076 CEST5370053192.168.2.48.8.8.8
              May 11, 2021 12:57:35.094764948 CEST53537008.8.8.8192.168.2.4
              May 11, 2021 12:58:05.709156036 CEST5172653192.168.2.48.8.8.8
              May 11, 2021 12:58:05.766822100 CEST53517268.8.8.8192.168.2.4
              May 11, 2021 12:59:10.954557896 CEST5679453192.168.2.48.8.8.8
              May 11, 2021 12:59:11.003338099 CEST53567948.8.8.8192.168.2.4
              May 11, 2021 12:59:13.758358955 CEST5653453192.168.2.48.8.8.8
              May 11, 2021 12:59:13.819736958 CEST53565348.8.8.8192.168.2.4
              May 11, 2021 12:59:13.830044985 CEST5662753192.168.2.48.8.8.8
              May 11, 2021 12:59:13.878669024 CEST53566278.8.8.8192.168.2.4
              May 11, 2021 12:59:14.270876884 CEST5662153192.168.2.48.8.8.8
              May 11, 2021 12:59:14.339066982 CEST53566218.8.8.8192.168.2.4
              May 11, 2021 12:59:14.962776899 CEST6311653192.168.2.48.8.8.8
              May 11, 2021 12:59:15.016153097 CEST53631168.8.8.8192.168.2.4
              May 11, 2021 12:59:15.930468082 CEST6407853192.168.2.48.8.8.8
              May 11, 2021 12:59:15.979353905 CEST53640788.8.8.8192.168.2.4
              May 11, 2021 12:59:16.595551014 CEST6480153192.168.2.48.8.8.8
              May 11, 2021 12:59:16.655761003 CEST53648018.8.8.8192.168.2.4
              May 11, 2021 12:59:16.871294975 CEST6172153192.168.2.48.8.8.8
              May 11, 2021 12:59:16.920097113 CEST53617218.8.8.8192.168.2.4
              May 11, 2021 12:59:17.917881966 CEST5125553192.168.2.48.8.8.8
              May 11, 2021 12:59:17.968229055 CEST53512558.8.8.8192.168.2.4
              May 11, 2021 12:59:18.826654911 CEST6152253192.168.2.48.8.8.8
              May 11, 2021 12:59:18.887479067 CEST53615228.8.8.8192.168.2.4
              May 11, 2021 12:59:19.947118998 CEST5233753192.168.2.48.8.8.8
              May 11, 2021 12:59:19.998945951 CEST53523378.8.8.8192.168.2.4
              May 11, 2021 12:59:21.046000957 CEST5504653192.168.2.48.8.8.8
              May 11, 2021 12:59:21.094729900 CEST53550468.8.8.8192.168.2.4
              May 11, 2021 12:59:22.124907017 CEST4961253192.168.2.48.8.8.8
              May 11, 2021 12:59:22.173950911 CEST53496128.8.8.8192.168.2.4
              May 11, 2021 12:59:23.050267935 CEST4928553192.168.2.48.8.8.8
              May 11, 2021 12:59:23.099495888 CEST53492858.8.8.8192.168.2.4
              May 11, 2021 12:59:23.971749067 CEST5060153192.168.2.48.8.8.8
              May 11, 2021 12:59:24.020672083 CEST53506018.8.8.8192.168.2.4
              May 11, 2021 12:59:39.877810955 CEST6087553192.168.2.48.8.8.8
              May 11, 2021 12:59:39.939281940 CEST53608758.8.8.8192.168.2.4
              May 11, 2021 12:59:41.132989883 CEST5644853192.168.2.48.8.8.8
              May 11, 2021 12:59:41.183327913 CEST53564488.8.8.8192.168.2.4
              May 11, 2021 12:59:42.164243937 CEST5917253192.168.2.48.8.8.8
              May 11, 2021 12:59:42.221401930 CEST53591728.8.8.8192.168.2.4
              May 11, 2021 12:59:42.400079012 CEST6242053192.168.2.48.8.8.8
              May 11, 2021 12:59:42.448762894 CEST53624208.8.8.8192.168.2.4

              DNS Queries

              TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
              May 11, 2021 12:59:41.132989883 CEST192.168.2.48.8.8.80x8bf7Standard query (0)outlook.comA (IP address)IN (0x0001)
              May 11, 2021 12:59:42.164243937 CEST192.168.2.48.8.8.80xdcadStandard query (0)www.outlook.comA (IP address)IN (0x0001)
              May 11, 2021 12:59:42.400079012 CEST192.168.2.48.8.8.80xb7afStandard query (0)outlook.office365.comA (IP address)IN (0x0001)

              DNS Answers

              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
              May 11, 2021 12:59:13.819736958 CEST8.8.8.8192.168.2.40xb976No error (0)prda.aadg.msidentity.comwww.tm.a.prd.aadg.trafficmanager.netCNAME (Canonical name)IN (0x0001)
              May 11, 2021 12:59:41.183327913 CEST8.8.8.8192.168.2.40x8bf7No error (0)outlook.com40.97.116.82A (IP address)IN (0x0001)
              May 11, 2021 12:59:41.183327913 CEST8.8.8.8192.168.2.40x8bf7No error (0)outlook.com40.97.160.2A (IP address)IN (0x0001)
              May 11, 2021 12:59:41.183327913 CEST8.8.8.8192.168.2.40x8bf7No error (0)outlook.com40.97.148.226A (IP address)IN (0x0001)
              May 11, 2021 12:59:41.183327913 CEST8.8.8.8192.168.2.40x8bf7No error (0)outlook.com40.97.164.146A (IP address)IN (0x0001)
              May 11, 2021 12:59:41.183327913 CEST8.8.8.8192.168.2.40x8bf7No error (0)outlook.com40.97.128.194A (IP address)IN (0x0001)
              May 11, 2021 12:59:41.183327913 CEST8.8.8.8192.168.2.40x8bf7No error (0)outlook.com40.97.156.114A (IP address)IN (0x0001)
              May 11, 2021 12:59:41.183327913 CEST8.8.8.8192.168.2.40x8bf7No error (0)outlook.com40.97.153.146A (IP address)IN (0x0001)
              May 11, 2021 12:59:41.183327913 CEST8.8.8.8192.168.2.40x8bf7No error (0)outlook.com40.97.161.50A (IP address)IN (0x0001)
              May 11, 2021 12:59:42.221401930 CEST8.8.8.8192.168.2.40xdcadNo error (0)www.outlook.comoutlook.office365.comCNAME (Canonical name)IN (0x0001)
              May 11, 2021 12:59:42.221401930 CEST8.8.8.8192.168.2.40xdcadNo error (0)outlook.office365.comoutlook.ha.office365.comCNAME (Canonical name)IN (0x0001)
              May 11, 2021 12:59:42.221401930 CEST8.8.8.8192.168.2.40xdcadNo error (0)outlook.ha.office365.comoutlook.ms-acdc.office.comCNAME (Canonical name)IN (0x0001)
              May 11, 2021 12:59:42.221401930 CEST8.8.8.8192.168.2.40xdcadNo error (0)outlook.ms-acdc.office.comHHN-efz.ms-acdc.office.comCNAME (Canonical name)IN (0x0001)
              May 11, 2021 12:59:42.221401930 CEST8.8.8.8192.168.2.40xdcadNo error (0)HHN-efz.ms-acdc.office.com40.101.138.210A (IP address)IN (0x0001)
              May 11, 2021 12:59:42.221401930 CEST8.8.8.8192.168.2.40xdcadNo error (0)HHN-efz.ms-acdc.office.com52.98.151.242A (IP address)IN (0x0001)
              May 11, 2021 12:59:42.221401930 CEST8.8.8.8192.168.2.40xdcadNo error (0)HHN-efz.ms-acdc.office.com40.101.136.18A (IP address)IN (0x0001)
              May 11, 2021 12:59:42.221401930 CEST8.8.8.8192.168.2.40xdcadNo error (0)HHN-efz.ms-acdc.office.com52.97.233.34A (IP address)IN (0x0001)
              May 11, 2021 12:59:42.448762894 CEST8.8.8.8192.168.2.40xb7afNo error (0)outlook.office365.comoutlook.ha.office365.comCNAME (Canonical name)IN (0x0001)
              May 11, 2021 12:59:42.448762894 CEST8.8.8.8192.168.2.40xb7afNo error (0)outlook.ha.office365.comoutlook.ms-acdc.office.comCNAME (Canonical name)IN (0x0001)
              May 11, 2021 12:59:42.448762894 CEST8.8.8.8192.168.2.40xb7afNo error (0)outlook.ms-acdc.office.comHHN-efz.ms-acdc.office.comCNAME (Canonical name)IN (0x0001)
              May 11, 2021 12:59:42.448762894 CEST8.8.8.8192.168.2.40xb7afNo error (0)HHN-efz.ms-acdc.office.com40.101.137.50A (IP address)IN (0x0001)
              May 11, 2021 12:59:42.448762894 CEST8.8.8.8192.168.2.40xb7afNo error (0)HHN-efz.ms-acdc.office.com52.97.233.66A (IP address)IN (0x0001)
              May 11, 2021 12:59:42.448762894 CEST8.8.8.8192.168.2.40xb7afNo error (0)HHN-efz.ms-acdc.office.com52.97.233.34A (IP address)IN (0x0001)
              May 11, 2021 12:59:42.448762894 CEST8.8.8.8192.168.2.40xb7afNo error (0)HHN-efz.ms-acdc.office.com52.98.152.178A (IP address)IN (0x0001)

              Code Manipulations

              Statistics

              Behavior

              Click to jump to process

              System Behavior

              General

              Start time:12:57:34
              Start date:11/05/2021
              Path:C:\Windows\System32\loaddll32.exe
              Wow64 process (32bit):true
              Commandline:loaddll32.exe 'C:\Users\user\Desktop\A5uTdwOwJ1.dll'
              Imagebase:0x8a0000
              File size:116736 bytes
              MD5 hash:542795ADF7CC08EFCF675D65310596E8
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high

              General

              Start time:12:57:35
              Start date:11/05/2021
              Path:C:\Windows\SysWOW64\cmd.exe
              Wow64 process (32bit):true
              Commandline:cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\A5uTdwOwJ1.dll',#1
              Imagebase:0x11d0000
              File size:232960 bytes
              MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high

              General

              Start time:12:57:35
              Start date:11/05/2021
              Path:C:\Windows\SysWOW64\rundll32.exe
              Wow64 process (32bit):true
              Commandline:rundll32.exe C:\Users\user\Desktop\A5uTdwOwJ1.dll,Hundredpopulate@@8
              Imagebase:0x3c0000
              File size:61952 bytes
              MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high

              General

              Start time:12:57:35
              Start date:11/05/2021
              Path:C:\Windows\SysWOW64\rundll32.exe
              Wow64 process (32bit):true
              Commandline:rundll32.exe 'C:\Users\user\Desktop\A5uTdwOwJ1.dll',#1
              Imagebase:0x3c0000
              File size:61952 bytes
              MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000003.00000002.933933475.00000000050E8000.00000004.00000040.sdmp, Author: Joe Security
              Reputation:high

              General

              Start time:12:57:39
              Start date:11/05/2021
              Path:C:\Windows\SysWOW64\rundll32.exe
              Wow64 process (32bit):true
              Commandline:rundll32.exe C:\Users\user\Desktop\A5uTdwOwJ1.dll,Mark@@12
              Imagebase:0x3c0000
              File size:61952 bytes
              MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high

              General

              Start time:12:57:42
              Start date:11/05/2021
              Path:C:\Windows\SysWOW64\rundll32.exe
              Wow64 process (32bit):true
              Commandline:rundll32.exe C:\Users\user\Desktop\A5uTdwOwJ1.dll,Seefit@@8
              Imagebase:0x3c0000
              File size:61952 bytes
              MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high

              General

              Start time:12:59:38
              Start date:11/05/2021
              Path:C:\Program Files\internet explorer\iexplore.exe
              Wow64 process (32bit):false
              Commandline:'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
              Imagebase:0x7ff621d60000
              File size:823560 bytes
              MD5 hash:6465CB92B25A7BC1DF8E01D8AC5E7596
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high

              General

              Start time:12:59:39
              Start date:11/05/2021
              Path:C:\Program Files (x86)\Internet Explorer\iexplore.exe
              Wow64 process (32bit):true
              Commandline:'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:4640 CREDAT:17410 /prefetch:2
              Imagebase:0x850000
              File size:822536 bytes
              MD5 hash:071277CC2E3DF41EEEA8013E2AB58D5A
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high

              Disassembly

              Code Analysis

              Reset < >