Loading ...

Play interactive tourEdit tour

Analysis Report kZcCqvNtWa.dll

Overview

General Information

Sample Name:kZcCqvNtWa.dll
Analysis ID:412159
MD5:b9b732dbc6f94c79b5767eb98ebd899a
SHA1:984a3ba5d4fe06265ce23cec82bda6a63b2bb3bc
SHA256:1a0d4b328438a72cee012f6387825d942463b896fadc13f2c17e8d005f510cd4
Tags:dllGoziISFBUrsnif
Infos:

Most interesting Screenshot:

Detection

Ursnif
Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected Ursnif
Machine Learning detection for sample
Writes or reads registry keys via WMI
Writes registry values via WMI
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
PE file contains an invalid checksum
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

Startup

  • System is w10x64
  • loaddll32.exe (PID: 1956 cmdline: loaddll32.exe 'C:\Users\user\Desktop\kZcCqvNtWa.dll' MD5: 542795ADF7CC08EFCF675D65310596E8)
    • cmd.exe (PID: 1720 cmdline: cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\kZcCqvNtWa.dll',#1 MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • rundll32.exe (PID: 5788 cmdline: rundll32.exe 'C:\Users\user\Desktop\kZcCqvNtWa.dll',#1 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 5820 cmdline: rundll32.exe C:\Users\user\Desktop\kZcCqvNtWa.dll,Eithernothing MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 2168 cmdline: rundll32.exe C:\Users\user\Desktop\kZcCqvNtWa.dll,Order MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 6160 cmdline: rundll32.exe C:\Users\user\Desktop\kZcCqvNtWa.dll,Smileschool MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
  • iexplore.exe (PID: 1492 cmdline: 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding MD5: 6465CB92B25A7BC1DF8E01D8AC5E7596)
    • iexplore.exe (PID: 5168 cmdline: 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:1492 CREDAT:17410 /prefetch:2 MD5: 071277CC2E3DF41EEEA8013E2AB58D5A)
  • cleanup

Malware Configuration

Threatname: Ursnif

{"RSA Public Key": "KujE77ctKyR8x3/dODwZbEsxGmck+FW9384s5u0Kacw8y1gCN+8m2bfjJPovkn+Uzufcdfss+a43eI6oHR1KgWQmvEAO6LK8tJv+Wl7iCBPJP7eef8xKeXht/Mhk1PSj7mHnJ9lcqKMtTteEdSecVvMRtb/WSKVTFfHDva9My7AJ/NbXqHdzCG7znACswLxD", "c2_domain": ["outlook.com/login", "gmail.com", "worunekulo.club", "horunekulo.website"], "botnet": "8877", "server": "12", "serpent_key": "30218409ILPAJDUR", "sleep_time": "10", "CONF_TIMEOUT": "20", "SetWaitableTimer_value": "0", "DGA_count": "10"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000000.00000002.477098512.0000000002FA8000.00000004.00000040.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
    Process Memory Space: loaddll32.exe PID: 1956JoeSecurity_UrsnifYara detected UrsnifJoe Security

      Sigma Overview

      No Sigma rule has matched

      Signature Overview

      Click to jump to signature section

      Show All Signature Results

      AV Detection:

      barindex
      Found malware configurationShow sources
      Source: 5.3.rundll32.exe.d2a427.0.raw.unpackMalware Configuration Extractor: Ursnif {"RSA Public Key": "KujE77ctKyR8x3/dODwZbEsxGmck+FW9384s5u0Kacw8y1gCN+8m2bfjJPovkn+Uzufcdfss+a43eI6oHR1KgWQmvEAO6LK8tJv+Wl7iCBPJP7eef8xKeXht/Mhk1PSj7mHnJ9lcqKMtTteEdSecVvMRtb/WSKVTFfHDva9My7AJ/NbXqHdzCG7znACswLxD", "c2_domain": ["outlook.com/login", "gmail.com", "worunekulo.club", "horunekulo.website"], "botnet": "8877", "server": "12", "serpent_key": "30218409ILPAJDUR", "sleep_time": "10", "CONF_TIMEOUT": "20", "SetWaitableTimer_value": "0", "DGA_count": "10"}
      Multi AV Scanner detection for submitted fileShow sources
      Source: kZcCqvNtWa.dllReversingLabs: Detection: 21%
      Machine Learning detection for sampleShow sources
      Source: kZcCqvNtWa.dllJoe Sandbox ML: detected
      Source: kZcCqvNtWa.dllStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
      Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeFile opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dll
      Source: Binary string: c:\Tube-meet\585\straight\lift\38_Claim\Tail.pdb source: loaddll32.exe, 00000000.00000002.480778808.000000006E289000.00000002.00020000.sdmp, rundll32.exe, 00000003.00000002.479153934.000000006E289000.00000002.00020000.sdmp, kZcCqvNtWa.dll
      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_001D4C3B RtlAllocateHeap,RtlAllocateHeap,RtlAllocateHeap,memset,CreateFileA,GetFileTime,CloseHandle,StrRChrA,lstrcat,FindFirstFileA,FindFirstFileA,CompareFileTime,CompareFileTime,FindClose,FindNextFileA,FindClose,FindFirstFileA,CompareFileTime,StrChrA,memcpy,FindNextFileA,FindClose,FindFirstFileA,CompareFileTime,FindClose,HeapFree,HeapFree,
      Source: unknownDNS traffic detected: queries for: outlook.com

      Key, Mouse, Clipboard, Microphone and Screen Capturing:

      barindex
      Yara detected UrsnifShow sources
      Source: Yara matchFile source: 00000000.00000002.477098512.0000000002FA8000.00000004.00000040.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: loaddll32.exe PID: 1956, type: MEMORY

      E-Banking Fraud:

      barindex
      Yara detected UrsnifShow sources
      Source: Yara matchFile source: 00000000.00000002.477098512.0000000002FA8000.00000004.00000040.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: loaddll32.exe PID: 1956, type: MEMORY

      System Summary:

      barindex
      Writes or reads registry keys via WMIShow sources
      Source: C:\Windows\System32\loaddll32.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::GetStringValue
      Source: C:\Windows\System32\loaddll32.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetDWORDValue
      Source: C:\Windows\System32\loaddll32.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
      Source: C:\Windows\System32\loaddll32.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue
      Writes registry values via WMIShow sources
      Source: C:\Windows\System32\loaddll32.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetDWORDValue
      Source: C:\Windows\System32\loaddll32.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
      Source: C:\Windows\System32\loaddll32.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue
      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E241F14 NtMapViewOfSection,
      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E2415F1 GetProcAddress,NtCreateSection,memset,
      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E2423A5 NtQueryVirtualMemory,
      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_001D1168 NtOpenProcess,NtOpenProcessToken,NtQueryInformationToken,NtQueryInformationToken,NtQueryInformationToken,memcpy,NtClose,NtClose,
      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_001DB2F1 NtQueryVirtualMemory,
      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E242184
      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_001DB0CC
      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_001D696A
      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_001D1B6A
      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E278960
      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E282153
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E278960
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E282153
      Source: kZcCqvNtWa.dllBinary or memory string: OriginalFilenameTail.dll0 vs kZcCqvNtWa.dll
      Source: kZcCqvNtWa.dllStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
      Source: kZcCqvNtWa.dllStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      Source: classification engineClassification label: mal76.troj.winDLL@14/4@3/0
      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_001D7F56 CreateToolhelp32Snapshot,Process32First,Process32Next,CloseHandle,
      Source: C:\Program Files\internet explorer\iexplore.exeFile created: C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\HighJump to behavior
      Source: C:\Program Files\internet explorer\iexplore.exeFile created: C:\Users\user\AppData\Local\Temp\~DFE4F68CE1A440F339.TMPJump to behavior
      Source: kZcCqvNtWa.dllStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      Source: C:\Program Files\internet explorer\iexplore.exeFile read: C:\Users\desktop.iniJump to behavior
      Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\kZcCqvNtWa.dll,Eithernothing
      Source: kZcCqvNtWa.dllReversingLabs: Detection: 21%
      Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe 'C:\Users\user\Desktop\kZcCqvNtWa.dll'
      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\kZcCqvNtWa.dll',#1
      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\kZcCqvNtWa.dll,Eithernothing
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\kZcCqvNtWa.dll',#1
      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\kZcCqvNtWa.dll,Order
      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\kZcCqvNtWa.dll,Smileschool
      Source: unknownProcess created: C:\Program Files\internet explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
      Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:1492 CREDAT:17410 /prefetch:2
      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\kZcCqvNtWa.dll',#1
      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\kZcCqvNtWa.dll,Eithernothing
      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\kZcCqvNtWa.dll,Order
      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\kZcCqvNtWa.dll,Smileschool
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\kZcCqvNtWa.dll',#1
      Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:1492 CREDAT:17410 /prefetch:2
      Source: C:\Windows\System32\loaddll32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}\InprocServer32
      Source: C:\Windows\SysWOW64\rundll32.exeAutomated click: OK
      Source: C:\Windows\SysWOW64\rundll32.exeAutomated click: OK
      Source: C:\Windows\SysWOW64\rundll32.exeAutomated click: OK
      Source: Window RecorderWindow detected: More than 3 window changes detected
      Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeFile opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dll
      Source: kZcCqvNtWa.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
      Source: kZcCqvNtWa.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
      Source: kZcCqvNtWa.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
      Source: kZcCqvNtWa.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
      Source: kZcCqvNtWa.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
      Source: kZcCqvNtWa.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
      Source: kZcCqvNtWa.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
      Source: Binary string: c:\Tube-meet\585\straight\lift\38_Claim\Tail.pdb source: loaddll32.exe, 00000000.00000002.480778808.000000006E289000.00000002.00020000.sdmp, rundll32.exe, 00000003.00000002.479153934.000000006E289000.00000002.00020000.sdmp, kZcCqvNtWa.dll
      Source: kZcCqvNtWa.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
      Source: kZcCqvNtWa.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
      Source: kZcCqvNtWa.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
      Source: kZcCqvNtWa.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
      Source: kZcCqvNtWa.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E2417FA LoadLibraryA,GetProcAddress,
      Source: kZcCqvNtWa.dllStatic PE information: real checksum: 0x84de2 should be: 0x8037c
      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E242120 push ecx; ret
      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E242173 push ecx; ret
      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_001DB0BB push ecx; ret
      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_001DAD00 push ecx; ret
      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E282761 push ecx; ret
      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E254348 push ss; ret
      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E25778D pushfd ; ret
      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E252F9A push edi; retf
      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E252C15 push ebp; retf
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E282761 push ecx; ret
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E254348 push ss; ret
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E25778D pushfd ; ret
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E252F9A push edi; retf
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E252C15 push ebp; retf

      Hooking and other Techniques for Hiding and Protection:

      barindex
      Yara detected UrsnifShow sources
      Source: Yara matchFile source: 00000000.00000002.477098512.0000000002FA8000.00000004.00000040.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: loaddll32.exe PID: 1956, type: MEMORY
      Source: C:\Windows\System32\loaddll32.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\loaddll32.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\rundll32.exeLast function: Thread delayed
      Source: C:\Windows\SysWOW64\rundll32.exeLast function: Thread delayed
      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_001D4C3B RtlAllocateHeap,RtlAllocateHeap,RtlAllocateHeap,memset,CreateFileA,GetFileTime,CloseHandle,StrRChrA,lstrcat,FindFirstFileA,FindFirstFileA,CompareFileTime,CompareFileTime,FindClose,FindNextFileA,FindClose,FindFirstFileA,CompareFileTime,StrChrA,memcpy,FindNextFileA,FindClose,FindFirstFileA,CompareFileTime,FindClose,HeapFree,HeapFree,
      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E28636F _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E2417FA LoadLibraryA,GetProcAddress,
      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E2B5770 mov eax, dword ptr fs:[00000030h]
      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E2B56A6 mov eax, dword ptr fs:[00000030h]
      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E2B52AD push dword ptr fs:[00000030h]
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E2B5770 mov eax, dword ptr fs:[00000030h]
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E2B56A6 mov eax, dword ptr fs:[00000030h]
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E2B52AD push dword ptr fs:[00000030h]
      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E282F08 __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E28636F _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E28150C IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E282F08 __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E28636F _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E28150C IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\kZcCqvNtWa.dll',#1
      Source: loaddll32.exe, 00000000.00000002.476337684.0000000001240000.00000002.00000001.sdmp, rundll32.exe, 00000003.00000002.477553156.0000000003910000.00000002.00000001.sdmpBinary or memory string: Program Manager
      Source: loaddll32.exe, 00000000.00000002.476337684.0000000001240000.00000002.00000001.sdmp, rundll32.exe, 00000003.00000002.477553156.0000000003910000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
      Source: loaddll32.exe, 00000000.00000002.476337684.0000000001240000.00000002.00000001.sdmp, rundll32.exe, 00000003.00000002.477553156.0000000003910000.00000002.00000001.sdmpBinary or memory string: Progman
      Source: loaddll32.exe, 00000000.00000002.476337684.0000000001240000.00000002.00000001.sdmp, rundll32.exe, 00000003.00000002.477553156.0000000003910000.00000002.00000001.sdmpBinary or memory string: Progmanlock
      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_001D2D6E cpuid
      Source: C:\Windows\System32\loaddll32.exeCode function: GetLocaleInfoA,
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoA,
      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E241237 SetThreadPriority,GetSystemTime,SwitchToThread,Sleep,GetLongPathNameW,GetLongPathNameW,GetLongPathNameW,GetLastError,WaitForSingleObject,GetExitCodeThread,CloseHandle,GetLastError,GetLastError,
      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_001D2D6E RtlAllocateHeap,GetUserNameW,RtlAllocateHeap,GetUserNameW,HeapFree,GetComputerNameW,GetComputerNameW,RtlAllocateHeap,GetComputerNameW,HeapFree,
      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E241CDD CreateEventA,GetVersion,GetCurrentProcessId,OpenProcess,GetLastError,

      Stealing of Sensitive Information:

      barindex
      Yara detected UrsnifShow sources
      Source: Yara matchFile source: 00000000.00000002.477098512.0000000002FA8000.00000004.00000040.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: loaddll32.exe PID: 1956, type: MEMORY

      Remote Access Functionality:

      barindex
      Yara detected UrsnifShow sources
      Source: Yara matchFile source: 00000000.00000002.477098512.0000000002FA8000.00000004.00000040.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: loaddll32.exe PID: 1956, type: MEMORY

      Mitre Att&ck Matrix

      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
      Valid AccountsWindows Management Instrumentation2Path InterceptionProcess Injection12Masquerading1OS Credential DumpingSystem Time Discovery1Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
      Default AccountsNative API1Boot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsProcess Injection12LSASS MemorySecurity Software Discovery1Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothNon-Application Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or Information1Security Account ManagerProcess Discovery2SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationApplication Layer Protocol1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Rundll321NTDSAccount Discovery1Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware Packing1LSA SecretsSystem Owner/User Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
      Replication Through Removable MediaLaunchdRc.commonRc.commonSteganographyCached Domain CredentialsFile and Directory Discovery2VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSyncSystem Information Discovery23Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact

      Behavior Graph

      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet
      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 412159 Sample: kZcCqvNtWa.dll Startdate: 12/05/2021 Architecture: WINDOWS Score: 76 25 www.outlook.com 2->25 27 outlook.office365.com 2->27 29 4 other IPs or domains 2->29 31 Found malware configuration 2->31 33 Multi AV Scanner detection for submitted file 2->33 35 Yara detected  Ursnif 2->35 37 Machine Learning detection for sample 2->37 8 loaddll32.exe 1 2->8         started        11 iexplore.exe 2 59 2->11         started        signatures3 process4 signatures5 39 Writes or reads registry keys via WMI 8->39 41 Writes registry values via WMI 8->41 13 cmd.exe 1 8->13         started        15 rundll32.exe 8->15         started        17 rundll32.exe 8->17         started        19 rundll32.exe 8->19         started        21 iexplore.exe 7 11->21         started        process6 process7 23 rundll32.exe 13->23         started       

      Screenshots

      Thumbnails

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

      windows-stand

      Antivirus, Machine Learning and Genetic Malware Detection

      Initial Sample

      SourceDetectionScannerLabelLink
      kZcCqvNtWa.dll21%ReversingLabsWin32.Trojan.Zusy
      kZcCqvNtWa.dll100%Joe Sandbox ML

      Dropped Files

      No Antivirus matches

      Unpacked PE Files

      SourceDetectionScannerLabelLinkDownload
      0.2.loaddll32.exe.1d0000.0.unpack100%AviraHEUR/AGEN.1108168Download File

      Domains

      No Antivirus matches

      URLs

      No Antivirus matches

      Domains and IPs

      Contacted Domains

      NameIPActiveMaliciousAntivirus DetectionReputation
      outlook.com
      40.97.153.146
      truefalse
        high
        HHN-efz.ms-acdc.office.com
        52.98.171.226
        truefalse
          high
          www.outlook.com
          unknown
          unknownfalse
            high
            outlook.office365.com
            unknown
            unknownfalse
              high

              Contacted IPs

              No contacted IP infos

              General Information

              Joe Sandbox Version:32.0.0 Black Diamond
              Analysis ID:412159
              Start date:12.05.2021
              Start time:13:00:39
              Joe Sandbox Product:CloudBasic
              Overall analysis duration:0h 6m 50s
              Hypervisor based Inspection enabled:false
              Report type:light
              Sample file name:kZcCqvNtWa.dll
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
              Number of analysed new started processes analysed:25
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • HDC enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Detection:MAL
              Classification:mal76.troj.winDLL@14/4@3/0
              EGA Information:Failed
              HDC Information:
              • Successful, ratio: 20.6% (good quality ratio 19.9%)
              • Quality average: 81%
              • Quality standard deviation: 27%
              HCA Information:
              • Successful, ratio: 73%
              • Number of executed functions: 0
              • Number of non-executed functions: 0
              Cookbook Comments:
              • Adjust boot time
              • Enable AMSI
              • Found application associated with file extension: .dll

              Simulations

              Behavior and APIs

              No simulations

              Joe Sandbox View / Context

              IPs

              No context

              Domains

              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
              HHN-efz.ms-acdc.office.comA5uTdwOwJ1.dllGet hashmaliciousBrowse
              • 40.101.138.210
              FuiZSHt8Hx.dllGet hashmaliciousBrowse
              • 52.98.151.242
              609a460e94791.tiff.dllGet hashmaliciousBrowse
              • 52.97.201.34
              iJdlvBxhYu.dllGet hashmaliciousBrowse
              • 52.97.150.2
              8OKQ6ogGRx.dllGet hashmaliciousBrowse
              • 40.101.138.2
              609110f2d14a6.dllGet hashmaliciousBrowse
              • 40.101.137.34
              New%20order%20contract.htmlGet hashmaliciousBrowse
              • 52.98.175.2
              outlook.comA1qhcbngFV.exeGet hashmaliciousBrowse
              • 104.47.54.36
              file.msg.exeGet hashmaliciousBrowse
              • 104.47.56.138
              Update-KB1484-x86.exeGet hashmaliciousBrowse
              • 104.47.57.138
              n6osajjc938.exeGet hashmaliciousBrowse
              • 104.47.54.36
              9b3d7f02.exeGet hashmaliciousBrowse
              • 104.47.54.36
              5zc9vbGBo3.exeGet hashmaliciousBrowse
              • 52.101.24.0
              InnAcjnAmG.exeGet hashmaliciousBrowse
              • 104.47.53.36
              8X93Tzvd7V.exeGet hashmaliciousBrowse
              • 52.101.24.0
              u8A8Qy5S7O.exeGet hashmaliciousBrowse
              • 104.47.53.36
              SecuriteInfo.com.Mal.GandCrypt-A.24654.exeGet hashmaliciousBrowse
              • 104.47.54.36
              SecuriteInfo.com.Mal.GandCrypt-A.5674.exeGet hashmaliciousBrowse
              • 104.47.54.36
              SecuriteInfo.com.W32.AIDetect.malware2.29567.exeGet hashmaliciousBrowse
              • 104.47.53.36
              lsass(1).exeGet hashmaliciousBrowse
              • 104.47.59.138

              ASN

              No context

              JA3 Fingerprints

              No context

              Dropped Files

              No context

              Created / dropped Files

              C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{20078DE0-B35D-11EB-90E4-ECF4BB862DED}.dat
              Process:C:\Program Files\internet explorer\iexplore.exe
              File Type:Microsoft Word Document
              Category:dropped
              Size (bytes):19032
              Entropy (8bit):1.7704690064419406
              Encrypted:false
              SSDEEP:48:IwBGcprEGwpLWG/ap8wGIpcVdGvnZpvVyGoSqp9VKGo49pmV:r3Z8ZU2gWV6tV8fVd9MV
              MD5:13E47D90BC1C1D71FB960BD7DBF91099
              SHA1:17385913779143F5D7281C96EAFF4EA46F7A563A
              SHA-256:0E0755C66FE657EF520818206045A6C0D2DD547A64BEBF294700E20579CD3980
              SHA-512:2CD7DFA4FA6918CCAD344592A477369BB5EBF312E5EEF21193C252F06D7A0B303CF6582FA5D9966B9634197D3BDA3BAABD7DD6A6435057C31CF2CD1B67CE3720
              Malicious:false
              Reputation:low
              Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{20078DE2-B35D-11EB-90E4-ECF4BB862DED}.dat
              Process:C:\Program Files\internet explorer\iexplore.exe
              File Type:Microsoft Word Document
              Category:dropped
              Size (bytes):14936
              Entropy (8bit):1.5448255572685763
              Encrypted:false
              SSDEEP:48:Iw0GcprdGwpaVG4pQJGrapbSaGQpB6GHHpm:roZHQH6pBSijBg
              MD5:75B9311DC327D4B60EDACD38906AAD77
              SHA1:F6936702FDCB04C1D892B8E57DD19990B802786D
              SHA-256:E7BDD1D59779EFA94418DC0D478B7D11D753157B8C20AFBCCD006CF377B3C346
              SHA-512:AF51F9501B1D91B0E1B445D6F098C0F3519272D229EB6F8016B63B6C465930900BE9ABD7D9674E40FDD777ACF45E745AEE3B505B4CD210F2E1FCED6B84324873
              Malicious:false
              Reputation:low
              Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              C:\Users\user\AppData\Local\Temp\~DF431E96C18C7F8EF8.TMP
              Process:C:\Program Files\internet explorer\iexplore.exe
              File Type:data
              Category:dropped
              Size (bytes):21349
              Entropy (8bit):0.2951707289341719
              Encrypted:false
              SSDEEP:24:c9lLh9lLh9lIn9lIn9lRg9lRA9lTS9lTy9lSSd9lSSd9lw0:kBqoxKAuvScS+0
              MD5:F9BEBD0A297294BDC7B8C6114EB819EE
              SHA1:B1B441E13DB70A0D1E0CC3A2A6190C5C1A91F3D8
              SHA-256:6A30EE99C23AA29DC94019C3BAA95B463123752680D4FE185BF5FA05BEF15F17
              SHA-512:01B70F54D5091580CA105C7F04407B48EE2FFDCD7C77BAA39F871407577F9F4F193BAB3AFB9924BE7DC50568534A226D63EA77FFE8B8F13889DAFE632DA3B498
              Malicious:false
              Reputation:low
              Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              C:\Users\user\AppData\Local\Temp\~DFE4F68CE1A440F339.TMP
              Process:C:\Program Files\internet explorer\iexplore.exe
              File Type:data
              Category:dropped
              Size (bytes):12917
              Entropy (8bit):0.39624837245012057
              Encrypted:false
              SSDEEP:24:c9lLh9lLh9lIn9lIn9lo0F9loU9lWXFhOB:kBqoIv51kB
              MD5:4762FCF754568D904969642F670EB3B1
              SHA1:75FC43D947F228DAA1EC1BA2E54562C8FC869D41
              SHA-256:8E4034726C607D15EF4ADEEC4D952A17EAE0ADC1F52AEC4A96752316D7A53060
              SHA-512:DBDF57587E7E3EC021A14FC21303A2E7EB7DDF7D66B38D69478566079C5546454C808A3A48786A7524A65ACAD54E076FE832935C5390DBF61B4AFFB0E96DA262
              Malicious:false
              Reputation:low
              Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................

              Static File Info

              General

              File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
              Entropy (8bit):6.324532607203666
              TrID:
              • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
              • Generic Win/DOS Executable (2004/3) 0.20%
              • DOS Executable Generic (2002/1) 0.20%
              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
              File name:kZcCqvNtWa.dll
              File size:478720
              MD5:b9b732dbc6f94c79b5767eb98ebd899a
              SHA1:984a3ba5d4fe06265ce23cec82bda6a63b2bb3bc
              SHA256:1a0d4b328438a72cee012f6387825d942463b896fadc13f2c17e8d005f510cd4
              SHA512:595b4429e9f13212740ac4f9e12282dc3fdf9e141041695e4fe6302acf7aac2527275cb6a98eec78049758972c946cc62971604f68f7de68ad2350d13bac497a
              SSDEEP:12288:4Z31u8+a95+CA9lROexw8P7CbxXTTbWA:4Z31P9wr9lROow8W/
              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........C...".J.".J.".J...J.".J.pwJ.".J4mrJ.".J.pqJ.".J.pgJ.".J.p`J.".J...J.".J.".J.#.J.pkJ.".J.pvJ.".J.ppJ.".J.puJ.".JRich.".J.......

              File Icon

              Icon Hash:74f0e4ecccdce0e4

              Static PE Info

              General

              Entrypoint:0x1041953
              Entrypoint Section:.text
              Digitally signed:false
              Imagebase:0x1000000
              Subsystem:windows gui
              Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
              DLL Characteristics:DYNAMIC_BASE
              Time Stamp:0x608B79B0 [Fri Apr 30 03:29:52 2021 UTC]
              TLS Callbacks:
              CLR (.Net) Version:
              OS Version Major:5
              OS Version Minor:0
              File Version Major:5
              File Version Minor:0
              Subsystem Version Major:5
              Subsystem Version Minor:0
              Import Hash:a2f0d616525ae6c643810961c7d4fdfe

              Entrypoint Preview

              Instruction
              mov edi, edi
              push ebp
              mov ebp, esp
              cmp dword ptr [ebp+0Ch], 01h
              jne 00007FEB209FAF67h
              call 00007FEB209FF8CCh
              push dword ptr [ebp+08h]
              mov ecx, dword ptr [ebp+10h]
              mov edx, dword ptr [ebp+0Ch]
              call 00007FEB209FAE51h
              pop ecx
              pop ebp
              retn 000Ch
              mov edi, edi
              push ebp
              mov ebp, esp
              mov eax, dword ptr [ebp+08h]
              xor ecx, ecx
              cmp eax, dword ptr [01073618h+ecx*8]
              je 00007FEB209FAF75h
              inc ecx
              cmp ecx, 2Dh
              jc 00007FEB209FAF53h
              lea ecx, dword ptr [eax-13h]
              cmp ecx, 11h
              jnbe 00007FEB209FAF70h
              push 0000000Dh
              pop eax
              pop ebp
              ret
              mov eax, dword ptr [0107361Ch+ecx*8]
              pop ebp
              ret
              add eax, FFFFFF44h
              push 0000000Eh
              pop ecx
              cmp ecx, eax
              sbb eax, eax
              and eax, ecx
              add eax, 08h
              pop ebp
              ret
              call 00007FEB209FC836h
              test eax, eax
              jne 00007FEB209FAF68h
              mov eax, 01073780h
              ret
              add eax, 08h
              ret
              mov edi, edi
              push ebp
              mov ebp, esp
              mov eax, dword ptr [ebp+08h]
              mov dword ptr [0108B5ACh], eax
              pop ebp
              ret
              mov edi, edi
              push ebp
              mov ebp, esp
              push dword ptr [0108B5ACh]
              call 00007FEB209FC636h
              pop ecx
              test eax, eax
              je 00007FEB209FAF71h
              push dword ptr [ebp+08h]
              call eax
              pop ecx
              test eax, eax
              je 00007FEB209FAF67h
              xor eax, eax
              inc eax
              pop ebp
              ret
              xor eax, eax
              pop ebp
              ret
              mov edi, edi
              push esi
              push edi
              xor esi, esi
              mov edi, 0108B5B8h
              cmp dword ptr [0107378Ch+esi*8], 01h
              jne 00007FEB209FAF80h
              lea eax, dword ptr [00000088h+esi*8]

              Rich Headers

              Programming Language:
              • [ C ] VS2008 build 21022
              • [LNK] VS2008 build 21022
              • [ C ] VS2005 build 50727
              • [ASM] VS2008 build 21022
              • [IMP] VS2005 build 50727
              • [RES] VS2008 build 21022
              • [C++] VS2008 build 21022
              • [IMP] VS2008 build 21022
              • [EXP] VS2008 build 21022

              Data Directories

              NameVirtual AddressVirtual Size Is in Section
              IMAGE_DIRECTORY_ENTRY_EXPORT0x726300x6f.rdata
              IMAGE_DIRECTORY_ENTRY_IMPORT0x71e640x50.rdata
              IMAGE_DIRECTORY_ENTRY_RESOURCE0x8d0000x3bc.rsrc
              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
              IMAGE_DIRECTORY_ENTRY_BASERELOC0x8e0000x1544.reloc
              IMAGE_DIRECTORY_ENTRY_DEBUG0x491900x1c.rdata
              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x70c080x40.rdata
              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IAT0x490000x15c.rdata
              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

              Sections

              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
              .text0x10000x4732e0x47400False0.745877878289data6.57407814817IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
              .rdata0x490000x2969f0x29800False0.65666768637data5.42368765721IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .data0x730000x1917c0x1400False0.2435546875data3.63177828336IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
              .rsrc0x8d0000x3bc0x400False0.4091796875data3.09285651514IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .reloc0x8e0000x25880x2600False0.456106085526data4.61056666922IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

              Resources

              NameRVASizeTypeLanguageCountry
              RT_VERSION0x8d0580x364dataEnglishUnited States

              Imports

              DLLImport
              KERNEL32.dllQueryPerformanceCounter, GetVolumeInformationW, GetSystemTime, GetModuleHandleW, GetVersionExW, OpenProcess, GetDateFormatW, FindResourceW, LockResource, GetLocalTime, HeapCreate, CreateFileW, HeapFree, HeapCompact, HeapAlloc, VirtualProtectEx, GetCurrentDirectoryW, SetConsoleCP, SetConsoleOutputCP, GetStringTypeW, GetStringTypeA, GetLocaleInfoA, LoadLibraryA, GetLastError, HeapReAlloc, RtlUnwind, GetCurrentThreadId, GetCommandLineA, DeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, HeapDestroy, VirtualFree, VirtualAlloc, Sleep, GetProcAddress, ExitProcess, WriteFile, GetStdHandle, GetModuleFileNameA, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TlsGetValue, TlsAlloc, TlsSetValue, TlsFree, InterlockedIncrement, SetLastError, InterlockedDecrement, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, LCMapStringA, WideCharToMultiByte, MultiByteToWideChar, LCMapStringW, TerminateProcess, GetCurrentProcess, IsDebuggerPresent, RaiseException, HeapSize, SetHandleCount, GetFileType, GetStartupInfoA, FreeEnvironmentStringsA, GetEnvironmentStrings, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetTickCount, GetCurrentProcessId, GetSystemTimeAsFileTime, InitializeCriticalSectionAndSpinCount
              ole32.dllCoCreateInstance, CoUninitialize, OleInitialize, OleUninitialize, CoInitialize
              WINSPOOL.DRVEnumPrintersW, GetPrinterDataW, GetPrinterW, DocumentPropertiesW, OpenPrinterW, ClosePrinter

              Exports

              NameOrdinalAddress
              Eithernothing10x103a020
              Order20x1039f40
              Smileschool30x1039b20

              Version Infos

              DescriptionData
              LegalCopyright Notice sister Corporation. All rights reserved
              InternalNameSlow
              FileVersion3.2.1.380
              CompanyNameNotice sister Corporation
              ProductNameNotice sister Soil read
              Observe38
              ProductVersion3.2.1
              FileDescriptionNotice sister Soil read Skinneed
              OriginalFilenameTail.dll
              Translation0x0409 0x04b0

              Possible Origin

              Language of compilation systemCountry where language is spokenMap
              EnglishUnited States

              Network Behavior

              Network Port Distribution

              UDP Packets

              TimestampSource PortDest PortSource IPDest IP
              May 12, 2021 13:01:22.364706993 CEST6098553192.168.2.38.8.8.8
              May 12, 2021 13:01:22.421803951 CEST53609858.8.8.8192.168.2.3
              May 12, 2021 13:01:22.644109011 CEST5020053192.168.2.38.8.8.8
              May 12, 2021 13:01:22.692748070 CEST5128153192.168.2.38.8.8.8
              May 12, 2021 13:01:22.711570978 CEST53502008.8.8.8192.168.2.3
              May 12, 2021 13:01:22.749787092 CEST53512818.8.8.8192.168.2.3
              May 12, 2021 13:01:23.860627890 CEST4919953192.168.2.38.8.8.8
              May 12, 2021 13:01:23.910384893 CEST53491998.8.8.8192.168.2.3
              May 12, 2021 13:01:24.778978109 CEST5062053192.168.2.38.8.8.8
              May 12, 2021 13:01:24.830625057 CEST53506208.8.8.8192.168.2.3
              May 12, 2021 13:01:25.658778906 CEST6493853192.168.2.38.8.8.8
              May 12, 2021 13:01:25.707258940 CEST53649388.8.8.8192.168.2.3
              May 12, 2021 13:01:26.528624058 CEST6015253192.168.2.38.8.8.8
              May 12, 2021 13:01:26.587990999 CEST53601528.8.8.8192.168.2.3
              May 12, 2021 13:01:26.948482990 CEST5754453192.168.2.38.8.8.8
              May 12, 2021 13:01:27.000016928 CEST53575448.8.8.8192.168.2.3
              May 12, 2021 13:01:27.806850910 CEST5598453192.168.2.38.8.8.8
              May 12, 2021 13:01:27.867090940 CEST53559848.8.8.8192.168.2.3
              May 12, 2021 13:01:30.044956923 CEST6418553192.168.2.38.8.8.8
              May 12, 2021 13:01:30.093739986 CEST53641858.8.8.8192.168.2.3
              May 12, 2021 13:01:32.348197937 CEST6511053192.168.2.38.8.8.8
              May 12, 2021 13:01:32.397023916 CEST53651108.8.8.8192.168.2.3
              May 12, 2021 13:01:33.171554089 CEST5836153192.168.2.38.8.8.8
              May 12, 2021 13:01:33.223162889 CEST53583618.8.8.8192.168.2.3
              May 12, 2021 13:02:08.864763975 CEST6349253192.168.2.38.8.8.8
              May 12, 2021 13:02:08.944426060 CEST53634928.8.8.8192.168.2.3
              May 12, 2021 13:02:19.656306028 CEST6083153192.168.2.38.8.8.8
              May 12, 2021 13:02:19.733886957 CEST53608318.8.8.8192.168.2.3
              May 12, 2021 13:02:57.918824911 CEST6010053192.168.2.38.8.8.8
              May 12, 2021 13:02:57.967470884 CEST53601008.8.8.8192.168.2.3
              May 12, 2021 13:02:58.847552061 CEST5319553192.168.2.38.8.8.8
              May 12, 2021 13:02:58.899087906 CEST53531958.8.8.8192.168.2.3
              May 12, 2021 13:02:59.686183929 CEST5014153192.168.2.38.8.8.8
              May 12, 2021 13:02:59.734926939 CEST53501418.8.8.8192.168.2.3
              May 12, 2021 13:03:00.798839092 CEST5302353192.168.2.38.8.8.8
              May 12, 2021 13:03:00.847754002 CEST53530238.8.8.8192.168.2.3
              May 12, 2021 13:03:01.626238108 CEST4956353192.168.2.38.8.8.8
              May 12, 2021 13:03:01.675170898 CEST53495638.8.8.8192.168.2.3
              May 12, 2021 13:03:02.806885958 CEST5135253192.168.2.38.8.8.8
              May 12, 2021 13:03:02.855701923 CEST53513528.8.8.8192.168.2.3
              May 12, 2021 13:03:03.114238024 CEST5934953192.168.2.38.8.8.8
              May 12, 2021 13:03:03.204421997 CEST53593498.8.8.8192.168.2.3
              May 12, 2021 13:03:03.577776909 CEST5708453192.168.2.38.8.8.8
              May 12, 2021 13:03:03.626724958 CEST53570848.8.8.8192.168.2.3
              May 12, 2021 13:03:04.362020016 CEST5882353192.168.2.38.8.8.8
              May 12, 2021 13:03:04.413634062 CEST53588238.8.8.8192.168.2.3
              May 12, 2021 13:03:10.289743900 CEST5756853192.168.2.38.8.8.8
              May 12, 2021 13:03:10.339876890 CEST53575688.8.8.8192.168.2.3
              May 12, 2021 13:03:11.182039022 CEST5054053192.168.2.38.8.8.8
              May 12, 2021 13:03:11.239130020 CEST53505408.8.8.8192.168.2.3
              May 12, 2021 13:03:23.390181065 CEST5436653192.168.2.38.8.8.8
              May 12, 2021 13:03:23.450407982 CEST53543668.8.8.8192.168.2.3
              May 12, 2021 13:03:32.916106939 CEST5303453192.168.2.38.8.8.8
              May 12, 2021 13:03:32.975302935 CEST53530348.8.8.8192.168.2.3
              May 12, 2021 13:03:34.283544064 CEST5776253192.168.2.38.8.8.8
              May 12, 2021 13:03:34.332479954 CEST53577628.8.8.8192.168.2.3
              May 12, 2021 13:03:35.099181890 CEST5543553192.168.2.38.8.8.8
              May 12, 2021 13:03:35.156474113 CEST53554358.8.8.8192.168.2.3
              May 12, 2021 13:03:35.310314894 CEST5071353192.168.2.38.8.8.8
              May 12, 2021 13:03:35.359015942 CEST53507138.8.8.8192.168.2.3

              DNS Queries

              TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
              May 12, 2021 13:03:34.283544064 CEST192.168.2.38.8.8.80x5e15Standard query (0)outlook.comA (IP address)IN (0x0001)
              May 12, 2021 13:03:35.099181890 CEST192.168.2.38.8.8.80x73b8Standard query (0)www.outlook.comA (IP address)IN (0x0001)
              May 12, 2021 13:03:35.310314894 CEST192.168.2.38.8.8.80x79a2Standard query (0)outlook.office365.comA (IP address)IN (0x0001)

              DNS Answers

              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
              May 12, 2021 13:03:34.332479954 CEST8.8.8.8192.168.2.30x5e15No error (0)outlook.com40.97.153.146A (IP address)IN (0x0001)
              May 12, 2021 13:03:34.332479954 CEST8.8.8.8192.168.2.30x5e15No error (0)outlook.com40.97.161.50A (IP address)IN (0x0001)
              May 12, 2021 13:03:34.332479954 CEST8.8.8.8192.168.2.30x5e15No error (0)outlook.com40.97.116.82A (IP address)IN (0x0001)
              May 12, 2021 13:03:34.332479954 CEST8.8.8.8192.168.2.30x5e15No error (0)outlook.com40.97.160.2A (IP address)IN (0x0001)
              May 12, 2021 13:03:34.332479954 CEST8.8.8.8192.168.2.30x5e15No error (0)outlook.com40.97.148.226A (IP address)IN (0x0001)
              May 12, 2021 13:03:34.332479954 CEST8.8.8.8192.168.2.30x5e15No error (0)outlook.com40.97.164.146A (IP address)IN (0x0001)
              May 12, 2021 13:03:34.332479954 CEST8.8.8.8192.168.2.30x5e15No error (0)outlook.com40.97.128.194A (IP address)IN (0x0001)
              May 12, 2021 13:03:34.332479954 CEST8.8.8.8192.168.2.30x5e15No error (0)outlook.com40.97.156.114A (IP address)IN (0x0001)
              May 12, 2021 13:03:35.156474113 CEST8.8.8.8192.168.2.30x73b8No error (0)www.outlook.comoutlook.office365.comCNAME (Canonical name)IN (0x0001)
              May 12, 2021 13:03:35.156474113 CEST8.8.8.8192.168.2.30x73b8No error (0)outlook.office365.comoutlook.ha.office365.comCNAME (Canonical name)IN (0x0001)
              May 12, 2021 13:03:35.156474113 CEST8.8.8.8192.168.2.30x73b8No error (0)outlook.ha.office365.comoutlook.ms-acdc.office.comCNAME (Canonical name)IN (0x0001)
              May 12, 2021 13:03:35.156474113 CEST8.8.8.8192.168.2.30x73b8No error (0)outlook.ms-acdc.office.comHHN-efz.ms-acdc.office.comCNAME (Canonical name)IN (0x0001)
              May 12, 2021 13:03:35.156474113 CEST8.8.8.8192.168.2.30x73b8No error (0)HHN-efz.ms-acdc.office.com52.98.171.226A (IP address)IN (0x0001)
              May 12, 2021 13:03:35.156474113 CEST8.8.8.8192.168.2.30x73b8No error (0)HHN-efz.ms-acdc.office.com40.101.137.82A (IP address)IN (0x0001)
              May 12, 2021 13:03:35.156474113 CEST8.8.8.8192.168.2.30x73b8No error (0)HHN-efz.ms-acdc.office.com40.101.136.242A (IP address)IN (0x0001)
              May 12, 2021 13:03:35.156474113 CEST8.8.8.8192.168.2.30x73b8No error (0)HHN-efz.ms-acdc.office.com52.98.152.194A (IP address)IN (0x0001)
              May 12, 2021 13:03:35.359015942 CEST8.8.8.8192.168.2.30x79a2No error (0)outlook.office365.comoutlook.ha.office365.comCNAME (Canonical name)IN (0x0001)
              May 12, 2021 13:03:35.359015942 CEST8.8.8.8192.168.2.30x79a2No error (0)outlook.ha.office365.comoutlook.ms-acdc.office.comCNAME (Canonical name)IN (0x0001)
              May 12, 2021 13:03:35.359015942 CEST8.8.8.8192.168.2.30x79a2No error (0)outlook.ms-acdc.office.comHHN-efz.ms-acdc.office.comCNAME (Canonical name)IN (0x0001)
              May 12, 2021 13:03:35.359015942 CEST8.8.8.8192.168.2.30x79a2No error (0)HHN-efz.ms-acdc.office.com40.101.137.50A (IP address)IN (0x0001)
              May 12, 2021 13:03:35.359015942 CEST8.8.8.8192.168.2.30x79a2No error (0)HHN-efz.ms-acdc.office.com40.101.136.18A (IP address)IN (0x0001)
              May 12, 2021 13:03:35.359015942 CEST8.8.8.8192.168.2.30x79a2No error (0)HHN-efz.ms-acdc.office.com52.98.171.226A (IP address)IN (0x0001)
              May 12, 2021 13:03:35.359015942 CEST8.8.8.8192.168.2.30x79a2No error (0)HHN-efz.ms-acdc.office.com52.98.152.162A (IP address)IN (0x0001)

              Code Manipulations

              Statistics

              Behavior

              Click to jump to process

              System Behavior

              General

              Start time:13:01:30
              Start date:12/05/2021
              Path:C:\Windows\System32\loaddll32.exe
              Wow64 process (32bit):true
              Commandline:loaddll32.exe 'C:\Users\user\Desktop\kZcCqvNtWa.dll'
              Imagebase:0x1210000
              File size:116736 bytes
              MD5 hash:542795ADF7CC08EFCF675D65310596E8
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000002.477098512.0000000002FA8000.00000004.00000040.sdmp, Author: Joe Security
              Reputation:high

              General

              Start time:13:01:32
              Start date:12/05/2021
              Path:C:\Windows\SysWOW64\cmd.exe
              Wow64 process (32bit):true
              Commandline:cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\kZcCqvNtWa.dll',#1
              Imagebase:0xbd0000
              File size:232960 bytes
              MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high

              General

              Start time:13:01:32
              Start date:12/05/2021
              Path:C:\Windows\SysWOW64\rundll32.exe
              Wow64 process (32bit):true
              Commandline:rundll32.exe C:\Users\user\Desktop\kZcCqvNtWa.dll,Eithernothing
              Imagebase:0x1310000
              File size:61952 bytes
              MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high

              General

              Start time:13:01:32
              Start date:12/05/2021
              Path:C:\Windows\SysWOW64\rundll32.exe
              Wow64 process (32bit):true
              Commandline:rundll32.exe 'C:\Users\user\Desktop\kZcCqvNtWa.dll',#1
              Imagebase:0x1310000
              File size:61952 bytes
              MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high

              General

              Start time:13:01:36
              Start date:12/05/2021
              Path:C:\Windows\SysWOW64\rundll32.exe
              Wow64 process (32bit):true
              Commandline:rundll32.exe C:\Users\user\Desktop\kZcCqvNtWa.dll,Order
              Imagebase:0x1310000
              File size:61952 bytes
              MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high

              General

              Start time:13:01:40
              Start date:12/05/2021
              Path:C:\Windows\SysWOW64\rundll32.exe
              Wow64 process (32bit):true
              Commandline:rundll32.exe C:\Users\user\Desktop\kZcCqvNtWa.dll,Smileschool
              Imagebase:0x1310000
              File size:61952 bytes
              MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high

              General

              Start time:13:03:32
              Start date:12/05/2021
              Path:C:\Program Files\internet explorer\iexplore.exe
              Wow64 process (32bit):false
              Commandline:'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
              Imagebase:0x7ff62b4d0000
              File size:823560 bytes
              MD5 hash:6465CB92B25A7BC1DF8E01D8AC5E7596
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high

              General

              Start time:13:03:33
              Start date:12/05/2021
              Path:C:\Program Files (x86)\Internet Explorer\iexplore.exe
              Wow64 process (32bit):true
              Commandline:'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:1492 CREDAT:17410 /prefetch:2
              Imagebase:0x1360000
              File size:822536 bytes
              MD5 hash:071277CC2E3DF41EEEA8013E2AB58D5A
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high

              Disassembly

              Code Analysis

              Reset < >