Loading ...

Play interactive tourEdit tour

Analysis Report shorefront.eps

Overview

General Information

Sample Name:shorefront.eps (renamed file extension from eps to dll)
Analysis ID:429225
MD5:b3526bc3c4a61f9f09ac31ee9a5fc8a5
SHA1:d92ac3fa9cca4ed8273111f767e24d8f53896787
SHA256:f4a464c2e5f14cd4c391a9b5ba60deca36ccaa6c1503a097eeb0c5070945d1fb
Tags:dllGozi
Infos:

Most interesting Screenshot:

Detection

Ursnif
Score:92
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Yara detected Ursnif
Yara detected Ursnif
Machine Learning detection for sample
Writes or reads registry keys via WMI
Writes registry values via WMI
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to detect virtual machines (STR)
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found potential string decryption / allocating functions
PE file contains an invalid checksum
Queries the installation date of Windows
Sample execution stops while process was sleeping (likely an evasion)
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)

Classification

Process Tree

  • System is w10x64
  • loaddll32.exe (PID: 6604 cmdline: loaddll32.exe 'C:\Users\user\Desktop\shorefront.dll' MD5: 542795ADF7CC08EFCF675D65310596E8)
    • cmd.exe (PID: 6612 cmdline: cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\shorefront.dll',#1 MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • rundll32.exe (PID: 6640 cmdline: rundll32.exe 'C:\Users\user\Desktop\shorefront.dll',#1 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 6628 cmdline: rundll32.exe C:\Users\user\Desktop\shorefront.dll,Child MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 6700 cmdline: rundll32.exe C:\Users\user\Desktop\shorefront.dll,Forcearea MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 6720 cmdline: rundll32.exe C:\Users\user\Desktop\shorefront.dll,Stationmeat MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
  • iexplore.exe (PID: 816 cmdline: 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding MD5: 6465CB92B25A7BC1DF8E01D8AC5E7596)
    • iexplore.exe (PID: 6476 cmdline: 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:816 CREDAT:17410 /prefetch:2 MD5: 071277CC2E3DF41EEEA8013E2AB58D5A)
    • iexplore.exe (PID: 4136 cmdline: 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:816 CREDAT:17414 /prefetch:2 MD5: 071277CC2E3DF41EEEA8013E2AB58D5A)
  • cleanup

Malware Configuration

Threatname: Ursnif

{"lang_id": "RU, CN", "RSA Public Key": "YO4ItoAHj27nQHcek0ajLmmby9wzIPBRe+hTTGA+vdmBx9WHGSmH+27G6fUvU8FIdumcsGzdR3nVucsR89Hrym0hEi/6912U3fz8nLZTmfMNITP1haHrjk4931u8AJbwFobO2OROdhnUSaxTMA4bUUhDQ512s4Mw9dwF+RVgzByOOXZjTb/8c7RAb5TF3S9udlcSUcG0UgRjjerDAkFDNoGfvrRUbQdmhzdTQTVlAQndB1/gGmNmYRjiDY3ZPIgGCxRg+L7+cRtLwnqkaPMhiWWYFszaBPeJgqFJ28z3OWmw84N+FITvVekj/sQLKPQHnW1Axm22vEhQb3UNvpyJEVFYrda06XMVSGm1E2H2wkQ=", "c2_domain": ["app.buboleinov.com", "chat.veminiare.com", "chat.billionady.com", "app3.maintorna.com"], "botnet": "4500", "server": "580", "serpent_key": "46uoXhSnsCfVUpSs", "sleep_time": "10", "CONF_TIMEOUT": "20", "SetWaitableTimer_value": "10"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000000.00000003.827452979.0000000000530000.00000040.00000001.sdmpJoeSecurity_Ursnif_1Yara detected UrsnifJoe Security
    00000000.00000003.874866712.0000000002FE8000.00000004.00000040.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
      00000003.00000003.876330514.00000000050E8000.00000004.00000040.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
        00000000.00000003.874909818.0000000002FE8000.00000004.00000040.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
          00000000.00000003.874494648.0000000002FE8000.00000004.00000040.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
            Click to see the 20 entries

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            5.3.rundll32.exe.3218d26.0.raw.unpackJoeSecurity_Ursnif_1Yara detected UrsnifJoe Security
              0.2.loaddll32.exe.6c500000.2.unpackJoeSecurity_Ursnif_1Yara detected UrsnifJoe Security
                0.3.loaddll32.exe.538d26.0.raw.unpackJoeSecurity_Ursnif_1Yara detected UrsnifJoe Security
                  6.3.rundll32.exe.30e8d26.0.raw.unpackJoeSecurity_Ursnif_1Yara detected UrsnifJoe Security
                    2.3.rundll32.exe.2228d26.0.raw.unpackJoeSecurity_Ursnif_1Yara detected UrsnifJoe Security
                      Click to see the 2 entries

                      Sigma Overview

                      No Sigma rule has matched

                      Signature Overview

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection:

                      barindex
                      Found malware configurationShow sources
                      Source: 00000000.00000003.827452979.0000000000530000.00000040.00000001.sdmpMalware Configuration Extractor: Ursnif {"lang_id": "RU, CN", "RSA Public Key": "YO4ItoAHj27nQHcek0ajLmmby9wzIPBRe+hTTGA+vdmBx9WHGSmH+27G6fUvU8FIdumcsGzdR3nVucsR89Hrym0hEi/6912U3fz8nLZTmfMNITP1haHrjk4931u8AJbwFobO2OROdhnUSaxTMA4bUUhDQ512s4Mw9dwF+RVgzByOOXZjTb/8c7RAb5TF3S9udlcSUcG0UgRjjerDAkFDNoGfvrRUbQdmhzdTQTVlAQndB1/gGmNmYRjiDY3ZPIgGCxRg+L7+cRtLwnqkaPMhiWWYFszaBPeJgqFJ28z3OWmw84N+FITvVekj/sQLKPQHnW1Axm22vEhQb3UNvpyJEVFYrda06XMVSGm1E2H2wkQ=", "c2_domain": ["app.buboleinov.com", "chat.veminiare.com", "chat.billionady.com", "app3.maintorna.com"], "botnet": "4500", "server": "580", "serpent_key": "46uoXhSnsCfVUpSs", "sleep_time": "10", "CONF_TIMEOUT": "20", "SetWaitableTimer_value": "10"}
                      Multi AV Scanner detection for domain / URLShow sources
                      Source: app.buboleinov.comVirustotal: Detection: 6%Perma Link
                      Multi AV Scanner detection for submitted fileShow sources
                      Source: shorefront.dllVirustotal: Detection: 46%Perma Link
                      Source: shorefront.dllReversingLabs: Detection: 54%
                      Machine Learning detection for sampleShow sources
                      Source: shorefront.dllJoe Sandbox ML: detected
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_005035A1 CryptAcquireContextW,memcpy,CryptImportKey,CryptSetKeyParam,memcpy,CryptEncrypt,CryptDecrypt,GetLastError,GetLastError,CryptDestroyKey,GetLastError,CryptReleaseContext,GetLastError,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_047735A1 CryptAcquireContextW,memcpy,CryptImportKey,CryptSetKeyParam,memcpy,CryptEncrypt,CryptDecrypt,GetLastError,GetLastError,CryptDestroyKey,GetLastError,CryptReleaseContext,GetLastError,
                      Source: shorefront.dllStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
                      Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeFile opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dll
                      Source: shorefront.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT
                      Source: Binary string: c:\Original-shine\bat\Cat\page\Seven\Design.pdb source: loaddll32.exe, rundll32.exe, shorefront.dll
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00504E9C Wow64EnableWow64FsRedirection,RtlAllocateHeap,RtlAllocateHeap,RtlAllocateHeap,memset,CreateFileA,GetFileTime,FindCloseChangeNotification,StrRChrA,lstrcat,FindFirstFileA,FindFirstFileA,CompareFileTime,CompareFileTime,FindClose,FindNextFileA,FindClose,FindFirstFileA,CompareFileTime,StrChrA,memcpy,FindNextFileA,FindClose,FindFirstFileA,CompareFileTime,FindClose,HeapFree,HeapFree,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04774E9C Wow64EnableWow64FsRedirection,RtlAllocateHeap,RtlAllocateHeap,RtlAllocateHeap,memset,CreateFileA,GetFileTime,FindCloseChangeNotification,StrRChrA,lstrcat,FindFirstFileA,FindFirstFileA,CompareFileTime,CompareFileTime,FindClose,FindNextFileA,FindClose,FindFirstFileA,CompareFileTime,StrChrA,memcpy,FindNextFileA,FindClose,FindFirstFileA,CompareFileTime,FindClose,HeapFree,HeapFree,
                      Source: unknownDNS traffic detected: queries for: app.buboleinov.com
                      Source: ~DF762A57E90D6A65CD.TMP.12.dr, {B147A470-C485-11EB-90EB-ECF4BBEA1588}.dat.12.drString found in binary or memory: http://app.buboleinov.com/7dGVcD7hOw3lYt5/1yqoO_2BT5cAFQCvp3/7fGu2bPOM/Y70HlHuovLn2gp_2B2GH/4_2FYxaP
                      Source: {B147A472-C485-11EB-90EB-ECF4BBEA1588}.dat.12.drString found in binary or memory: http://app.buboleinov.com/BHxjQVeA3bCRL3A0U_2Bhx/6Mf2XW6xM9nlO/OBBDiHLG/gVHcEz5iH6i5Er6PkMAnMWX/IOi2

                      Key, Mouse, Clipboard, Microphone and Screen Capturing:

                      barindex
                      Yara detected UrsnifShow sources
                      Source: Yara matchFile source: 00000000.00000003.874866712.0000000002FE8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.876330514.00000000050E8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.874909818.0000000002FE8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.874494648.0000000002FE8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.876188239.00000000050E8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.874791903.0000000002FE8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.874837013.0000000002FE8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.919920945.00000000050E8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.876373518.00000000050E8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.874942139.0000000002FE8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.876356161.00000000050E8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.876088782.00000000050E8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.874588381.0000000002FE8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.876229416.00000000050E8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.874885116.0000000002FE8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.917892757.0000000002FE8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.876297207.00000000050E8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.876268229.00000000050E8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 6640, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: loaddll32.exe PID: 6604, type: MEMORY
                      Yara detected UrsnifShow sources
                      Source: Yara matchFile source: 00000000.00000003.827452979.0000000000530000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000003.821591213.00000000030E0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.794830642.00000000027F0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000003.797710729.0000000002220000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000003.813086420.0000000003210000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 5.3.rundll32.exe.3218d26.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.loaddll32.exe.6c500000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.loaddll32.exe.538d26.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.3.rundll32.exe.30e8d26.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.3.rundll32.exe.2228d26.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.rundll32.exe.27f8d26.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.6c500000.3.unpack, type: UNPACKEDPE

                      E-Banking Fraud:

                      barindex
                      Yara detected UrsnifShow sources
                      Source: Yara matchFile source: 00000000.00000003.874866712.0000000002FE8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.876330514.00000000050E8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.874909818.0000000002FE8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.874494648.0000000002FE8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.876188239.00000000050E8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.874791903.0000000002FE8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.874837013.0000000002FE8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.919920945.00000000050E8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.876373518.00000000050E8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.874942139.0000000002FE8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.876356161.00000000050E8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.876088782.00000000050E8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.874588381.0000000002FE8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.876229416.00000000050E8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.874885116.0000000002FE8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.917892757.0000000002FE8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.876297207.00000000050E8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.876268229.00000000050E8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 6640, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: loaddll32.exe PID: 6604, type: MEMORY
                      Yara detected UrsnifShow sources
                      Source: Yara matchFile source: 00000000.00000003.827452979.0000000000530000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000003.821591213.00000000030E0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.794830642.00000000027F0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000003.797710729.0000000002220000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000003.813086420.0000000003210000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 5.3.rundll32.exe.3218d26.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.loaddll32.exe.6c500000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.loaddll32.exe.538d26.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.3.rundll32.exe.30e8d26.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.3.rundll32.exe.2228d26.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.rundll32.exe.27f8d26.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.6c500000.3.unpack, type: UNPACKEDPE
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_005035A1 CryptAcquireContextW,memcpy,CryptImportKey,CryptSetKeyParam,memcpy,CryptEncrypt,CryptDecrypt,GetLastError,GetLastError,CryptDestroyKey,GetLastError,CryptReleaseContext,GetLastError,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_047735A1 CryptAcquireContextW,memcpy,CryptImportKey,CryptSetKeyParam,memcpy,CryptEncrypt,CryptDecrypt,GetLastError,GetLastError,CryptDestroyKey,GetLastError,CryptReleaseContext,GetLastError,

                      System Summary:

                      barindex
                      Writes or reads registry keys via WMIShow sources
                      Source: C:\Windows\System32\loaddll32.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::GetStringValue
                      Source: C:\Windows\System32\loaddll32.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetDWORDValue
                      Source: C:\Windows\System32\loaddll32.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
                      Source: C:\Windows\System32\loaddll32.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue
                      Writes registry values via WMIShow sources
                      Source: C:\Windows\System32\loaddll32.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetDWORDValue
                      Source: C:\Windows\System32\loaddll32.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
                      Source: C:\Windows\System32\loaddll32.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue
                      Source: C:\Windows\SysWOW64\rundll32.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetDWORDValue
                      Source: C:\Windows\SysWOW64\rundll32.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
                      Source: C:\Windows\SysWOW64\rundll32.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6C5018D1 GetProcAddress,NtCreateSection,memset,
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6C501B89 NtMapViewOfSection,
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6C502485 NtQueryVirtualMemory,
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00503CA1 NtOpenProcess,NtOpenProcessToken,NtQueryInformationToken,NtQueryInformationToken,NtQueryInformationToken,memcpy,NtClose,NtClose,
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_005081CD NtQueryVirtualMemory,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04773CA1 NtOpenProcess,NtOpenProcessToken,NtQueryInformationToken,NtQueryInformationToken,NtQueryInformationToken,memcpy,NtClose,NtClose,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_047781CD NtQueryVirtualMemory,
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6C502264
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00506609
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00507FA8
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6C558C07
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6C55A588
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6C548ED8
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6C54C8D4
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6C55139D
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04776609
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04777FA8
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6C558C07
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6C55A588
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6C548ED8
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6C54C8D4
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6C55139D
                      Source: C:\Windows\System32\loaddll32.exeCode function: String function: 6C54B330 appears 40 times
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 6C54B330 appears 40 times
                      Source: shorefront.dllStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
                      Source: classification engineClassification label: mal92.troj.winDLL@16/17@6/0
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_005019E7 CreateToolhelp32Snapshot,Process32First,Process32Next,CloseHandle,
                      Source: C:\Program Files\internet explorer\iexplore.exeFile created: C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{B147A46E-C485-11EB-90EB-ECF4BBEA1588}.datJump to behavior
                      Source: C:\Program Files\internet explorer\iexplore.exeFile created: C:\Users\user\AppData\Local\Temp\~DF896FBAE33087E32E.TMPJump to behavior
                      Source: shorefront.dllStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: C:\Program Files\internet explorer\iexplore.exeFile read: C:\Users\desktop.iniJump to behavior
                      Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\shorefront.dll,Child
                      Source: shorefront.dllVirustotal: Detection: 46%
                      Source: shorefront.dllReversingLabs: Detection: 54%
                      Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe 'C:\Users\user\Desktop\shorefront.dll'
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\shorefront.dll',#1
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\shorefront.dll,Child
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\shorefront.dll',#1
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\shorefront.dll,Forcearea
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\shorefront.dll,Stationmeat
                      Source: unknownProcess created: C:\Program Files\internet explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
                      Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:816 CREDAT:17410 /prefetch:2
                      Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:816 CREDAT:17414 /prefetch:2
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\shorefront.dll',#1
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\shorefront.dll,Child
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\shorefront.dll,Forcearea
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\shorefront.dll,Stationmeat
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\shorefront.dll',#1
                      Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:816 CREDAT:17410 /prefetch:2
                      Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:816 CREDAT:17414 /prefetch:2
                      Source: C:\Windows\System32\loaddll32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79eac9d0-baf9-11ce-8c82-00aa004ba90b}\InprocServer32
                      Source: C:\Windows\SysWOW64\rundll32.exeAutomated click: OK
                      Source: C:\Windows\SysWOW64\rundll32.exeAutomated click: OK
                      Source: C:\Windows\SysWOW64\rundll32.exeAutomated click: OK
                      Source: Window RecorderWindow detected: More than 3 window changes detected
                      Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeFile opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dll
                      Source: shorefront.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT
                      Source: shorefront.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                      Source: Binary string: c:\Original-shine\bat\Cat\page\Seven\Design.pdb source: loaddll32.exe, rundll32.exe, shorefront.dll
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6C501F31 LoadLibraryA,GetProcAddress,
                      Source: shorefront.dllStatic PE information: real checksum: 0x6f44b should be: 0x6430b
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6C502253 push ecx; ret
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6C502200 push ecx; ret
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_0050B67C push ss; retf
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00507C20 push ecx; ret
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_0050B163 push edx; iretd
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00507F97 push ecx; ret
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6C51242B pushad ; ret
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6C510DDC push edi; ret
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6C511F8E push esp; ret
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6C546847 push ecx; ret
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6C54B375 push ecx; ret
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_0477B67C push ss; retf
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04777C20 push ecx; ret
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_0477B163 push edx; iretd
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04777F97 push ecx; ret
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6C51242B pushad ; ret
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6C510DDC push edi; ret
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6C511F8E push esp; ret
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6C546847 push ecx; ret
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6C54B375 push ecx; ret

                      Hooking and other Techniques for Hiding and Protection:

                      barindex
                      Yara detected UrsnifShow sources
                      Source: Yara matchFile source: 00000000.00000003.874866712.0000000002FE8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.876330514.00000000050E8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.874909818.0000000002FE8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.874494648.0000000002FE8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.876188239.00000000050E8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.874791903.0000000002FE8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.874837013.0000000002FE8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.919920945.00000000050E8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.876373518.00000000050E8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.874942139.0000000002FE8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.876356161.00000000050E8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.876088782.00000000050E8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.874588381.0000000002FE8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.876229416.00000000050E8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.874885116.0000000002FE8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.917892757.0000000002FE8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.876297207.00000000050E8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.876268229.00000000050E8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 6640, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: loaddll32.exe PID: 6604, type: MEMORY
                      Yara detected UrsnifShow sources
                      Source: Yara matchFile source: 00000000.00000003.827452979.0000000000530000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000003.821591213.00000000030E0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.794830642.00000000027F0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000003.797710729.0000000002220000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000003.813086420.0000000003210000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 5.3.rundll32.exe.3218d26.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.loaddll32.exe.6c500000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.loaddll32.exe.538d26.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.3.rundll32.exe.30e8d26.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.3.rundll32.exe.2228d26.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.rundll32.exe.27f8d26.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.6c500000.3.unpack, type: UNPACKEDPE
                      Source: C:\Windows\System32\loaddll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\loaddll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6C50FC64 str word ptr [eax+00h]
                      Source: C:\Windows\System32\loaddll32.exeLast function: Thread delayed
                      Source: C:\Windows\SysWOW64\rundll32.exeLast function: Thread delayed
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00504E9C Wow64EnableWow64FsRedirection,RtlAllocateHeap,RtlAllocateHeap,RtlAllocateHeap,memset,CreateFileA,GetFileTime,FindCloseChangeNotification,StrRChrA,lstrcat,FindFirstFileA,FindFirstFileA,CompareFileTime,CompareFileTime,FindClose,FindNextFileA,FindClose,FindFirstFileA,CompareFileTime,StrChrA,memcpy,FindNextFileA,FindClose,FindFirstFileA,CompareFileTime,FindClose,HeapFree,HeapFree,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04774E9C Wow64EnableWow64FsRedirection,RtlAllocateHeap,RtlAllocateHeap,RtlAllocateHeap,memset,CreateFileA,GetFileTime,FindCloseChangeNotification,StrRChrA,lstrcat,FindFirstFileA,FindFirstFileA,CompareFileTime,CompareFileTime,FindClose,FindNextFileA,FindClose,FindFirstFileA,CompareFileTime,StrChrA,memcpy,FindNextFileA,FindClose,FindFirstFileA,CompareFileTime,FindClose,HeapFree,HeapFree,
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6C54DD9B IsDebuggerPresent,
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6C55603F ___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,IsDebuggerPresent,OutputDebugStringW,RtlDecodePointer,
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6C501F31 LoadLibraryA,GetProcAddress,
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6C55F1E7 mov eax, dword ptr fs:[00000030h]
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6C55F11D mov eax, dword ptr fs:[00000030h]
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6C55ED24 push dword ptr fs:[00000030h]
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6C55F11D mov eax, dword ptr fs:[00000030h]
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6C55ED24 push dword ptr fs:[00000030h]
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6C54B524 GetProcessHeap,
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6C548B1A __call_reportfault,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6C548B1A __call_reportfault,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\shorefront.dll',#1
                      Source: loaddll32.exe, 00000000.00000002.916973157.0000000000D20000.00000002.00000001.sdmp, rundll32.exe, 00000003.00000002.917409862.0000000002D40000.00000002.00000001.sdmpBinary or memory string: Program Manager
                      Source: loaddll32.exe, 00000000.00000002.916973157.0000000000D20000.00000002.00000001.sdmp, rundll32.exe, 00000003.00000002.917409862.0000000002D40000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
                      Source: loaddll32.exe, 00000000.00000002.916973157.0000000000D20000.00000002.00000001.sdmp, rundll32.exe, 00000003.00000002.917409862.0000000002D40000.00000002.00000001.sdmpBinary or memory string: Progman
                      Source: loaddll32.exe, 00000000.00000002.916973157.0000000000D20000.00000002.00000001.sdmp, rundll32.exe, 00000003.00000002.917409862.0000000002D40000.00000002.00000001.sdmpBinary or memory string: Progmanlock
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00503946 cpuid
                      Source: C:\Windows\System32\loaddll32.exeCode function: GetLocaleInfoA,GetSystemDefaultUILanguage,VerLanguageNameA,
                      Source: C:\Windows\System32\loaddll32.exeCode function: ___crtGetLocaleInfoA,GetLastError,___crtGetLocaleInfoA,__calloc_crt,___crtGetLocaleInfoA,__calloc_crt,_free,_free,__calloc_crt,_free,__invoke_watson,
                      Source: C:\Windows\System32\loaddll32.exeCode function: _LcidFromHexString,GetLocaleInfoW,_TestDefaultLanguage,
                      Source: C:\Windows\System32\loaddll32.exeCode function: _wcscmp,_wcscmp,GetLocaleInfoW,GetLocaleInfoW,GetACP,
                      Source: C:\Windows\System32\loaddll32.exeCode function: GetLocaleInfoW,_GetPrimaryLen,
                      Source: C:\Windows\System32\loaddll32.exeCode function: _TranslateName,_GetLocaleNameFromLangCountry,_GetLocaleNameFromLanguage,_TranslateName,_GetLocaleNameFromLangCountry,_GetLocaleNameFromLanguage,_GetLocaleNameFromDefault,IsValidCodePage,_wcschr,_wcschr,__itow_s,__invoke_watson,_LcidFromHexString,GetLocaleInfoW,
                      Source: C:\Windows\System32\loaddll32.exeCode function: ___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,
                      Source: C:\Windows\System32\loaddll32.exeCode function: ___getlocaleinfo,__malloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,GetCPInfo,___crtLCMapStringA,___crtLCMapStringA,___crtGetStringTypeA,_memmove,_memmove,_memmove,_free,_free,_free,_free,_free,_free,_free,_free,_free,
                      Source: C:\Windows\System32\loaddll32.exeCode function: __calloc_crt,__malloc_crt,_free,__malloc_crt,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_num,_free,_free,_free,_free,
                      Source: C:\Windows\System32\loaddll32.exeCode function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoA_stat,
                      Source: C:\Windows\System32\loaddll32.exeCode function: EnumSystemLocalesW,
                      Source: C:\Windows\System32\loaddll32.exeCode function: _GetPrimaryLen,EnumSystemLocalesW,
                      Source: C:\Windows\System32\loaddll32.exeCode function: GetLocaleInfoW,
                      Source: C:\Windows\System32\loaddll32.exeCode function: EnumSystemLocalesW,
                      Source: C:\Windows\System32\loaddll32.exeCode function: _GetPrimaryLen,EnumSystemLocalesW,
                      Source: C:\Windows\System32\loaddll32.exeCode function: _LcidFromHexString,GetLocaleInfoW,GetLocaleInfoW,__wcsnicmp,GetLocaleInfoW,_TestDefaultLanguage,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: ___crtGetLocaleInfoA,GetLastError,___crtGetLocaleInfoA,__calloc_crt,___crtGetLocaleInfoA,__calloc_crt,_free,_free,__calloc_crt,_free,__invoke_watson,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: _LcidFromHexString,GetLocaleInfoW,_TestDefaultLanguage,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: _wcscmp,_wcscmp,GetLocaleInfoW,GetLocaleInfoW,GetACP,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoW,_GetPrimaryLen,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: _TranslateName,_GetLocaleNameFromLangCountry,_GetLocaleNameFromLanguage,_TranslateName,_GetLocaleNameFromLangCountry,_GetLocaleNameFromLanguage,_GetLocaleNameFromDefault,IsValidCodePage,_wcschr,_wcschr,__itow_s,__invoke_watson,_LcidFromHexString,GetLocaleInfoW,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: ___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: ___getlocaleinfo,__malloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,GetCPInfo,___crtLCMapStringA,___crtLCMapStringA,___crtGetStringTypeA,_memmove,_memmove,_memmove,_free,_free,_free,_free,_free,_free,_free,_free,_free,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: __calloc_crt,__malloc_crt,_free,__malloc_crt,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_num,_free,_free,_free,_free,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoA_stat,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: EnumSystemLocalesW,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: _GetPrimaryLen,EnumSystemLocalesW,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoW,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: EnumSystemLocalesW,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: _GetPrimaryLen,EnumSystemLocalesW,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: _LcidFromHexString,GetLocaleInfoW,GetLocaleInfoW,__wcsnicmp,GetLocaleInfoW,_TestDefaultLanguage,
                      Source: C:\Windows\System32\loaddll32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion InstallDate
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6C501979 GetSystemTimeAsFileTime,_aulldiv,_snwprintf,CreateFileMappingW,GetLastError,GetLastError,MapViewOfFile,GetLastError,CloseHandle,GetLastError,
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00503946 wsprintfA,RtlAllocateHeap,GetUserNameW,RtlAllocateHeap,GetUserNameW,HeapFree,GetComputerNameW,GetComputerNameW,RtlAllocateHeap,GetComputerNameW,HeapFree,
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6C50146C CreateEventA,GetVersion,GetCurrentProcessId,OpenProcess,GetLastError,
                      Source: C:\Windows\System32\loaddll32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

                      Stealing of Sensitive Information:

                      barindex
                      Yara detected UrsnifShow sources
                      Source: Yara matchFile source: 00000000.00000003.874866712.0000000002FE8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.876330514.00000000050E8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.874909818.0000000002FE8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.874494648.0000000002FE8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.876188239.00000000050E8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.874791903.0000000002FE8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.874837013.0000000002FE8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.919920945.00000000050E8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.876373518.00000000050E8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.874942139.0000000002FE8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.876356161.00000000050E8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.876088782.00000000050E8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.874588381.0000000002FE8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.876229416.00000000050E8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.874885116.0000000002FE8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.917892757.0000000002FE8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.876297207.00000000050E8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.876268229.00000000050E8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 6640, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: loaddll32.exe PID: 6604, type: MEMORY
                      Yara detected UrsnifShow sources
                      Source: Yara matchFile source: 00000000.00000003.827452979.0000000000530000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000003.821591213.00000000030E0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.794830642.00000000027F0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000003.797710729.0000000002220000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000003.813086420.0000000003210000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 5.3.rundll32.exe.3218d26.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.loaddll32.exe.6c500000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.loaddll32.exe.538d26.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.3.rundll32.exe.30e8d26.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.3.rundll32.exe.2228d26.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.rundll32.exe.27f8d26.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.6c500000.3.unpack, type: UNPACKEDPE

                      Remote Access Functionality:

                      barindex
                      Yara detected UrsnifShow sources
                      Source: Yara matchFile source: 00000000.00000003.874866712.0000000002FE8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.876330514.00000000050E8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.874909818.0000000002FE8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.874494648.0000000002FE8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.876188239.00000000050E8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.874791903.0000000002FE8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.874837013.0000000002FE8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.919920945.00000000050E8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.876373518.00000000050E8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.874942139.0000000002FE8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.876356161.00000000050E8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.876088782.00000000050E8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.874588381.0000000002FE8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.876229416.00000000050E8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.874885116.0000000002FE8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.917892757.0000000002FE8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.876297207.00000000050E8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.876268229.00000000050E8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 6640, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: loaddll32.exe PID: 6604, type: MEMORY
                      Yara detected UrsnifShow sources
                      Source: Yara matchFile source: 00000000.00000003.827452979.0000000000530000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000003.821591213.00000000030E0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.794830642.00000000027F0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000003.797710729.0000000002220000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000003.813086420.0000000003210000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 5.3.rundll32.exe.3218d26.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.loaddll32.exe.6c500000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.loaddll32.exe.538d26.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.3.rundll32.exe.30e8d26.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.3.rundll32.exe.2228d26.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.rundll32.exe.27f8d26.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.6c500000.3.unpack, type: UNPACKEDPE

                      Mitre Att&ck Matrix

                      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                      Valid AccountsWindows Management Instrumentation2Path InterceptionProcess Injection12Masquerading1OS Credential DumpingSystem Time Discovery1Remote ServicesArchive Collected Data11Exfiltration Over Other Network MediumEncrypted Channel2Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationData Encrypted for Impact1
                      Default AccountsNative API1Boot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsVirtualization/Sandbox Evasion1LSASS MemorySecurity Software Discovery3Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothNon-Application Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Process Injection12Security Account ManagerVirtualization/Sandbox Evasion1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationApplication Layer Protocol1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Deobfuscate/Decode Files or Information1NTDSProcess Discovery2Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptObfuscated Files or Information2LSA SecretsAccount Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                      Replication Through Removable MediaLaunchdRc.commonRc.commonRundll321Cached Domain CredentialsSystem Owner/User Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSyncFile and Directory Discovery2Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc FilesystemSystem Information Discovery34Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

                      Behavior Graph

                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 signatures2 2 Behavior Graph ID: 429225 Sample: shorefront.eps Startdate: 03/06/2021 Architecture: WINDOWS Score: 92 32 Multi AV Scanner detection for domain / URL 2->32 34 Found malware configuration 2->34 36 Multi AV Scanner detection for submitted file 2->36 38 3 other signatures 2->38 7 loaddll32.exe 1 2->7         started        10 iexplore.exe 1 53 2->10         started        process3 signatures4 40 Writes or reads registry keys via WMI 7->40 42 Writes registry values via WMI 7->42 12 rundll32.exe 7->12         started        15 cmd.exe 1 7->15         started        17 rundll32.exe 7->17         started        19 rundll32.exe 7->19         started        21 iexplore.exe 35 10->21         started        24 iexplore.exe 29 10->24         started        process5 dnsIp6 44 Writes registry values via WMI 12->44 26 rundll32.exe 15->26         started        28 app.buboleinov.com 21->28 30 app.buboleinov.com 24->30 signatures7 process8

                      Screenshots

                      Thumbnails

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                      windows-stand

                      Antivirus, Machine Learning and Genetic Malware Detection

                      Initial Sample

                      SourceDetectionScannerLabelLink
                      shorefront.dll46%VirustotalBrowse
                      shorefront.dll54%ReversingLabsWin32.Trojan.Sdum
                      shorefront.dll100%Joe Sandbox ML

                      Dropped Files

                      No Antivirus matches

                      Unpacked PE Files

                      SourceDetectionScannerLabelLinkDownload
                      3.2.rundll32.exe.4770000.2.unpack100%AviraHEUR/AGEN.1108168Download File
                      0.2.loaddll32.exe.500000.0.unpack100%AviraHEUR/AGEN.1108168Download File
                      6.2.rundll32.exe.3180000.1.unpack100%AviraHEUR/AGEN.1108168Download File

                      Domains

                      SourceDetectionScannerLabelLink
                      app.buboleinov.com7%VirustotalBrowse

                      URLs

                      SourceDetectionScannerLabelLink
                      http://app.buboleinov.com/7dGVcD7hOw3lYt5/1yqoO_2BT5cAFQCvp3/7fGu2bPOM/Y70HlHuovLn2gp_2B2GH/4_2FYxaP0%Avira URL Cloudsafe
                      http://app.buboleinov.com/BHxjQVeA3bCRL3A0U_2Bhx/6Mf2XW6xM9nlO/OBBDiHLG/gVHcEz5iH6i5Er6PkMAnMWX/IOi20%Avira URL Cloudsafe

                      Domains and IPs

                      Contacted Domains

                      NameIPActiveMaliciousAntivirus DetectionReputation
                      app.buboleinov.com
                      unknown
                      unknowntrueunknown

                      URLs from Memory and Binaries

                      NameSourceMaliciousAntivirus DetectionReputation
                      http://app.buboleinov.com/7dGVcD7hOw3lYt5/1yqoO_2BT5cAFQCvp3/7fGu2bPOM/Y70HlHuovLn2gp_2B2GH/4_2FYxaP~DF762A57E90D6A65CD.TMP.12.dr, {B147A470-C485-11EB-90EB-ECF4BBEA1588}.dat.12.drtrue
                      • Avira URL Cloud: safe
                      unknown
                      http://app.buboleinov.com/BHxjQVeA3bCRL3A0U_2Bhx/6Mf2XW6xM9nlO/OBBDiHLG/gVHcEz5iH6i5Er6PkMAnMWX/IOi2{B147A472-C485-11EB-90EB-ECF4BBEA1588}.dat.12.drtrue
                      • Avira URL Cloud: safe
                      unknown

                      Contacted IPs

                      No contacted IP infos

                      General Information

                      Joe Sandbox Version:32.0.0 Black Diamond
                      Analysis ID:429225
                      Start date:03.06.2021
                      Start time:18:04:14
                      Joe Sandbox Product:CloudBasic
                      Overall analysis duration:0h 7m 26s
                      Hypervisor based Inspection enabled:false
                      Report type:light
                      Sample file name:shorefront.eps (renamed file extension from eps to dll)
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                      Number of analysed new started processes analysed:15
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • HDC enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Detection:MAL
                      Classification:mal92.troj.winDLL@16/17@6/0
                      EGA Information:Failed
                      HDC Information:
                      • Successful, ratio: 16.6% (good quality ratio 15.8%)
                      • Quality average: 79.5%
                      • Quality standard deviation: 28.7%
                      HCA Information:
                      • Successful, ratio: 80%
                      • Number of executed functions: 0
                      • Number of non-executed functions: 0
                      Cookbook Comments:
                      • Adjust boot time
                      • Enable AMSI
                      Warnings:
                      Show All
                      • Exclude process from analysis (whitelisted): BackgroundTransferHost.exe, ielowutil.exe, backgroundTaskHost.exe, WmiPrvSE.exe, svchost.exe
                      • Excluded IPs from analysis (whitelisted): 52.255.188.83, 13.107.5.88, 13.107.42.23, 168.61.161.212, 184.30.25.218, 92.122.145.220, 104.42.151.234, 2.20.142.210, 2.20.142.209, 40.126.31.139, 40.126.31.6, 40.126.31.141, 40.126.31.137, 20.190.159.138, 40.126.31.143, 40.126.31.1, 40.126.31.4, 20.82.209.183, 40.88.32.150, 104.43.193.48, 88.221.62.148, 92.122.213.247, 92.122.213.194
                      • Excluded domains from analysis (whitelisted): storeedgefd.dsx.mp.microsoft.com.edgekey.net.globalredir.akadns.net, au.download.windowsupdate.com.edgesuite.net, ocos-office365-s2s.msedge.net, client-office365-tas.msedge.net, config.edge.skype.com.trafficmanager.net, store-images.s-microsoft.com-c.edgekey.net, e-0009.e-msedge.net, config-edge-skype.l-0014.l-msedge.net, l-0014.config.skype.com, a1449.dscg2.akamai.net, storeedgefd.xbetservices.akadns.net, arc.msn.com, e11290.dspg.akamaiedge.net, e12564.dspb.akamaiedge.net, skypedataprdcoleus15.cloudapp.net, go.microsoft.com, login.live.com, audownload.windowsupdate.nsatc.net, arc.trafficmanager.net, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, config.edge.skype.com, au-bg-shim.trafficmanager.net, storeedgefd.dsx.mp.microsoft.com, iris-de-prod-azsc-neu.northeurope.cloudapp.azure.com, afdo-tas-offload.trafficmanager.net, skypedataprdcolcus17.cloudapp.net, ctldl.windowsupdate.com, a767.dscg3.akamai.net, www.tm.a.prd.aadg.akadns.net, storeedgefd.dsx.mp.microsoft.com.edgekey.net, login.msa.msidentity.com, skypedataprdcolcus15.cloudapp.net, ocos-office365-s2s-msedge-net.e-0009.e-msedge.net, skypedataprdcoleus17.cloudapp.net, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net, go.microsoft.com.edgekey.net, l-0014.l-msedge.net, e16646.dscg.akamaiedge.net, skypedataprdcolwus16.cloudapp.net, www.tm.lg.prod.aadmsa.trafficmanager.net
                      • Not all processes where analyzed, report is missing behavior information
                      • Report size getting too big, too many NtOpenKeyEx calls found.

                      Simulations

                      Behavior and APIs

                      TimeTypeDescription
                      18:06:28API Interceptor1x Sleep call for process: rundll32.exe modified

                      Joe Sandbox View / Context

                      IPs

                      No context

                      Domains

                      No context

                      ASN

                      No context

                      JA3 Fingerprints

                      No context

                      Dropped Files

                      No context

                      Created / dropped Files

                      C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{B147A46E-C485-11EB-90EB-ECF4BBEA1588}.dat
                      Process:C:\Program Files\internet explorer\iexplore.exe
                      File Type:Microsoft Word Document
                      Category:dropped
                      Size (bytes):50344
                      Entropy (8bit):1.9993845315328929
                      Encrypted:false
                      SSDEEP:192:r7ZYZdg2QjW0StiifcBPzMgHB+HDMKzcIwpSuM62pSbKpif8qpitkwNkimRwxkES:rN4FdxL900tk+dY1
                      MD5:7978357DDA034C05E56F55DA35366205
                      SHA1:48E4CABD925132F6A720DBF850A937DFCCC69152
                      SHA-256:6B8EEF1FA301C04940AA30E7958CFA1C07D64E11423141A358089F78E59A2F6A
                      SHA-512:1EEDC44DAFC7B64B1D1A1F26CBC74940EE74451114AA089D2C2B5C6B130A3C52E86B6137B4723D74066F57A50A1F2714C28AC7FAFD6AFF32A4D1FCDE53C8AC41
                      Malicious:false
                      Reputation:low
                      Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{B147A470-C485-11EB-90EB-ECF4BBEA1588}.dat
                      Process:C:\Program Files\internet explorer\iexplore.exe
                      File Type:Microsoft Word Document
                      Category:dropped
                      Size (bytes):27588
                      Entropy (8bit):1.9124316644431674
                      Encrypted:false
                      SSDEEP:192:rIZvQf6hkOjt2lWeMGVwmJ06ibFVwmJ06ixmmA:rIoSSIk83qhIbhIwx
                      MD5:2E09A548EF11126190EFD8E8398EFBB9
                      SHA1:17B8746C47A049ACAA52C304C607FC7E2F192F2B
                      SHA-256:80ABDEBCCF9BCFC80CAE6DB09CB39304A8338B6927C70E988258FCE27FB8D74D
                      SHA-512:C827881750C667D70195CD98D9279DC92C4EDFEC76925A4CF12969F00DBA76B63B5B89BF6ECF88A2D803B3351C46ED78DE8BC2D1BE5E12CB8884376A63BDEE62
                      Malicious:false
                      Reputation:low
                      Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{B147A472-C485-11EB-90EB-ECF4BBEA1588}.dat
                      Process:C:\Program Files\internet explorer\iexplore.exe
                      File Type:Microsoft Word Document
                      Category:dropped
                      Size (bytes):28156
                      Entropy (8bit):1.922108016741325
                      Encrypted:false
                      SSDEEP:96:roZvQr69BS/jl2FW1MpdphCuQbKolpIK9hCuQeOA:roZvQr69k/jl2FW1Mpdpw9lpfwnA
                      MD5:99B43810D1B0B8FB2D4795325EBFF699
                      SHA1:2BEA2EB826754881F2135787DE63991849271614
                      SHA-256:891910C972C0E0B618F60AE4B2ACDE679390016D197D089D3DAD579BBB31EB46
                      SHA-512:B17DFCDE50DACF718C2CC975DE6F5725FD4E64ED73402D04512318F5F4D6EFA092E80E58ADEFC5BFA58695969AF98BB7A286E715F35BD5BD5C437FC6211AB7D2
                      Malicious:false
                      Reputation:low
                      Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\NewErrorPageTemplate[1]
                      Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                      File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                      Category:downloaded
                      Size (bytes):1612
                      Entropy (8bit):4.869554560514657
                      Encrypted:false
                      SSDEEP:24:5Y0bQ573pHpACtUZtJD0lFBopZleqw87xTe4D8FaFJ/Doz9AtjJgbCzg:5m73jcJqQep89TEw7Uxkk
                      MD5:DFEABDE84792228093A5A270352395B6
                      SHA1:E41258C9576721025926326F76063C2305586F76
                      SHA-256:77B138AB5D0A90FF04648C26ADDD5E414CC178165E3B54A4CB3739DA0F58E075
                      SHA-512:E256F603E67335151BB709294749794E2E3085F4063C623461A0B3DECBCCA8E620807B707EC9BCBE36DCD7D639C55753DA0495BE85B4AE5FB6BFC52AB4B284FD
                      Malicious:false
                      IE Cache URL:res://ieframe.dll/NewErrorPageTemplate.css
                      Preview: .body..{.. background-repeat: repeat-x;.. background-color: white;.. font-family: "Segoe UI", "verdana", "arial";.. margin: 0em;.. color: #1f1f1f;..}.....mainContent..{.. margin-top:80px;.. width: 700px;.. margin-left: 120px;.. margin-right: 120px;..}.....title..{.. color: #54b0f7;.. font-size: 36px;.. font-weight: 300;.. line-height: 40px;.. margin-bottom: 24px;.. font-family: "Segoe UI", "verdana";.. position: relative;..}.....errorExplanation..{.. color: #000000;.. font-size: 12pt;.. font-family: "Segoe UI", "verdana", "arial";.. text-decoration: none;..}.....taskSection..{.. margin-top: 20px;.. margin-bottom: 28px;.. position: relative; ..}.....tasks..{.. color: #000000;.. font-family: "Segoe UI", "verdana";.. font-weight:200;.. font-size: 12pt;..}....li..{.. margin-top: 8px;..}.....diagnoseButton..{.. outline: none;.. font-size: 9pt;..}.....launchInternetOptionsButton..{.. outline: none;
                      C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\dnserror[1]
                      Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                      File Type:HTML document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):2997
                      Entropy (8bit):4.4885437940628465
                      Encrypted:false
                      SSDEEP:48:u7u5V4VyhhV2lFUW29vj0RkpNc7KpAP8Rra:vIlJ6G7Ao8Ra
                      MD5:2DC61EB461DA1436F5D22BCE51425660
                      SHA1:E1B79BCAB0F073868079D807FAEC669596DC46C1
                      SHA-256:ACDEB4966289B6CE46ECC879531F85E9C6F94B718AAB521D38E2E00F7F7F7993
                      SHA-512:A88BECB4FBDDC5AFC55E4DC0135AF714A3EEC4A63810AE5A989F2CECB824A686165D3CEDB8CBD8F35C7E5B9F4136C29DEA32736AABB451FE8088B978B493AC6D
                      Malicious:false
                      Preview: .<!DOCTYPE HTML>..<html>.. <head>.. <link rel="stylesheet" type="text/css" href="NewErrorPageTemplate.css" >.. <meta http-equiv="Content-Type" content="text/html; charset=UTF-8">.. <title>Can&rsquo;t reach this page</title>.. <script src="errorPageStrings.js" language="javascript" type="text/javascript">.. </script>.. <script src="httpErrorPagesScripts.js" language="javascript" type="text/javascript">.. </script>.. </head>.... <body onLoad="getInfo(); initMoreInfo('infoBlockID');">.. <div id="contentContainer" class="mainContent">.. <div id="mainTitle" class="title">Can&rsquo;t reach this page</div>.. <div class="taskSection" id="taskSection">.. <ul id="cantDisplayTasks" class="tasks">.. <li id="task1-1">Make sure the web address <span id="webpage" class="webpageURL"></span>is correct</li>.. <li id="task1-2">Search for this site on Bing</li>..
                      C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\down[1]
                      Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                      File Type:PNG image data, 15 x 15, 8-bit colormap, non-interlaced
                      Category:dropped
                      Size (bytes):748
                      Entropy (8bit):7.249606135668305
                      Encrypted:false
                      SSDEEP:12:6v/7/2QeZ7HVJ6o6yiq1p4tSQfAVFcm6R2HkZuU4fB4CsY4NJlrvMezoW2uONroc:GeZ6oLiqkbDuU4fqzTrvMeBBlE
                      MD5:C4F558C4C8B56858F15C09037CD6625A
                      SHA1:EE497CC061D6A7A59BB66DEFEA65F9A8145BA240
                      SHA-256:39E7DE847C9F731EAA72338AD9053217B957859DE27B50B6474EC42971530781
                      SHA-512:D60353D3FBEA2992D96795BA30B20727B022B9164B2094B922921D33CA7CE1634713693AC191F8F5708954544F7648F4840BCD5B62CB6A032EF292A8B0E52A44
                      Malicious:false
                      Preview: .PNG........IHDR...............ex....PLTE....W..W..W..W..W..W..W..W..W..W..W..W..W.U..............W..W.!Y.#Z.$\.'].<r.=s.P..Q..Q..U..o..p..r..x..z..~.............................................b.............................................................................................................................................................................................................$..s...7tRNS.a.o(,.s....e......q*...................................F.Z....IDATx^%.S..@.C..jm.mTk...m.?|;.y..S....F.t...,.......D.>..LpX=f.M...H4........=...=..xy.[h..7....7.....<.q.kH....#+....I..z.....'.ksC...X<.+..J>....%3BmqaV...h..Z._.:<.Y_jG...vN^.<>.Nu.u@.....M....?...1D.m~)s8..&....IEND.B`.
                      C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9026IKNJ\errorPageStrings[1]
                      Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                      File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):4720
                      Entropy (8bit):5.164796203267696
                      Encrypted:false
                      SSDEEP:96:z9UUiqRxqH211CUIRgRLnRynjZbRXkRPRk6C87Apsat/5/+mhPcF+5g+mOQb7A9o:JsUOG1yNlX6ZzWpHOWLia16Cb7bk
                      MD5:D65EC06F21C379C87040B83CC1ABAC6B
                      SHA1:208D0A0BB775661758394BE7E4AFB18357E46C8B
                      SHA-256:A1270E90CEA31B46432EC44731BF4400D22B38EB2855326BF934FE8F1B169A4F
                      SHA-512:8A166D26B49A5D95AEA49BC649E5EA58786A2191F4D2ADAC6F5FBB7523940CE4482D6A2502AA870A931224F215CB2010A8C9B99A2C1820150E4D365CAB28299E
                      Malicious:false
                      Preview: .//Split out for localization...var L_GOBACK_TEXT = "Go back to the previous page.";..var L_REFRESH_TEXT = "Refresh the page.";..var L_MOREINFO_TEXT = "More information";..var L_OFFLINE_USERS_TEXT = "For offline users";..var L_RELOAD_TEXT = "Retype the address.";..var L_HIDE_HOTKEYS_TEXT = "Hide tab shortcuts";..var L_SHOW_HOTKEYS_TEXT = "Show more tab shortcuts";..var L_CONNECTION_OFF_TEXT = "You are not connected to the Internet. Check your Internet connection.";..var L_CONNECTION_ON_TEXT = "It appears you are connected to the Internet, but you might want to try to reconnect to the Internet.";....//used by invalidcert.js and hstscerterror.js..var L_CertUnknownCA_TEXT = "Your PC doesn\u2019t trust this website\u2019s security certificate.";..var L_CertExpired_TEXT = "The website\u2019s security certificate is not yet valid or has expired.";..var L_CertCNMismatch_TEXT = "The hostname in the website\u2019s security certificate differs from the website you are trying to visit.";..var L
                      C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9026IKNJ\httpErrorPagesScripts[1]
                      Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                      File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                      Category:downloaded
                      Size (bytes):12105
                      Entropy (8bit):5.451485481468043
                      Encrypted:false
                      SSDEEP:192:x20iniOciwd1BtvjrG8tAGGGVWnvyJVUrUiki3ayimi5ezLCvJG1gwm3z:xPini/i+1Btvjy815ZVUwiki3ayimi5f
                      MD5:9234071287E637F85D721463C488704C
                      SHA1:CCA09B1E0FBA38BA29D3972ED8DCECEFDEF8C152
                      SHA-256:65CC039890C7CEB927CE40F6F199D74E49B8058C3F8A6E22E8F916AD90EA8649
                      SHA-512:87D691987E7A2F69AD8605F35F94241AB7E68AD4F55AD384F1F0D40DC59FFD1432C758123661EE39443D624C881B01DCD228A67AFB8700FE5E66FC794A6C0384
                      Malicious:false
                      IE Cache URL:res://ieframe.dll/httpErrorPagesScripts.js
                      Preview: ...function isExternalUrlSafeForNavigation(urlStr)..{..var regEx = new RegExp("^(http(s?)|ftp|file)://", "i");..return regEx.exec(urlStr);..}..function clickRefresh()..{..var location = window.location.href;..var poundIndex = location.indexOf('#');..if (poundIndex != -1 && poundIndex+1 < location.length && isExternalUrlSafeForNavigation(location.substring(poundIndex+1)))..{..window.location.replace(location.substring(poundIndex+1));..}..}..function navCancelInit()..{..var location = window.location.href;..var poundIndex = location.indexOf('#');..if (poundIndex != -1 && poundIndex+1 < location.length && isExternalUrlSafeForNavigation(location.substring(poundIndex+1)))..{..var bElement = document.createElement("A");..bElement.innerText = L_REFRESH_TEXT;..bElement.href = 'javascript:clickRefresh()';..navCancelContainer.appendChild(bElement);..}..else..{..var textNode = document.createTextNode(L_RELOAD_TEXT);..navCancelContainer.appendChild(textNode);..}..}..function getDisplayValue(elem
                      C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\CS6IXJW6\down[1]
                      Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                      File Type:PNG image data, 15 x 15, 8-bit colormap, non-interlaced
                      Category:downloaded
                      Size (bytes):748
                      Entropy (8bit):7.249606135668305
                      Encrypted:false
                      SSDEEP:12:6v/7/2QeZ7HVJ6o6yiq1p4tSQfAVFcm6R2HkZuU4fB4CsY4NJlrvMezoW2uONroc:GeZ6oLiqkbDuU4fqzTrvMeBBlE
                      MD5:C4F558C4C8B56858F15C09037CD6625A
                      SHA1:EE497CC061D6A7A59BB66DEFEA65F9A8145BA240
                      SHA-256:39E7DE847C9F731EAA72338AD9053217B957859DE27B50B6474EC42971530781
                      SHA-512:D60353D3FBEA2992D96795BA30B20727B022B9164B2094B922921D33CA7CE1634713693AC191F8F5708954544F7648F4840BCD5B62CB6A032EF292A8B0E52A44
                      Malicious:false
                      IE Cache URL:res://ieframe.dll/down.png
                      Preview: .PNG........IHDR...............ex....PLTE....W..W..W..W..W..W..W..W..W..W..W..W..W.U..............W..W.!Y.#Z.$\.'].<r.=s.P..Q..Q..U..o..p..r..x..z..~.............................................b.............................................................................................................................................................................................................$..s...7tRNS.a.o(,.s....e......q*...................................F.Z....IDATx^%.S..@.C..jm.mTk...m.?|;.y..S....F.t...,.......D.>..LpX=f.M...H4........=...=..xy.[h..7....7.....<.q.kH....#+....I..z.....'.ksC...X<.+..J>....%3BmqaV...h..Z._.:<.Y_jG...vN^.<>.Nu.u@.....M....?...1D.m~)s8..&....IEND.B`.
                      C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\CS6IXJW6\httpErrorPagesScripts[1]
                      Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                      File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):12105
                      Entropy (8bit):5.451485481468043
                      Encrypted:false
                      SSDEEP:192:x20iniOciwd1BtvjrG8tAGGGVWnvyJVUrUiki3ayimi5ezLCvJG1gwm3z:xPini/i+1Btvjy815ZVUwiki3ayimi5f
                      MD5:9234071287E637F85D721463C488704C
                      SHA1:CCA09B1E0FBA38BA29D3972ED8DCECEFDEF8C152
                      SHA-256:65CC039890C7CEB927CE40F6F199D74E49B8058C3F8A6E22E8F916AD90EA8649
                      SHA-512:87D691987E7A2F69AD8605F35F94241AB7E68AD4F55AD384F1F0D40DC59FFD1432C758123661EE39443D624C881B01DCD228A67AFB8700FE5E66FC794A6C0384
                      Malicious:false
                      Preview: ...function isExternalUrlSafeForNavigation(urlStr)..{..var regEx = new RegExp("^(http(s?)|ftp|file)://", "i");..return regEx.exec(urlStr);..}..function clickRefresh()..{..var location = window.location.href;..var poundIndex = location.indexOf('#');..if (poundIndex != -1 && poundIndex+1 < location.length && isExternalUrlSafeForNavigation(location.substring(poundIndex+1)))..{..window.location.replace(location.substring(poundIndex+1));..}..}..function navCancelInit()..{..var location = window.location.href;..var poundIndex = location.indexOf('#');..if (poundIndex != -1 && poundIndex+1 < location.length && isExternalUrlSafeForNavigation(location.substring(poundIndex+1)))..{..var bElement = document.createElement("A");..bElement.innerText = L_REFRESH_TEXT;..bElement.href = 'javascript:clickRefresh()';..navCancelContainer.appendChild(bElement);..}..else..{..var textNode = document.createTextNode(L_RELOAD_TEXT);..navCancelContainer.appendChild(textNode);..}..}..function getDisplayValue(elem
                      C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\OR0WKIO1\NewErrorPageTemplate[1]
                      Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                      File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):1612
                      Entropy (8bit):4.869554560514657
                      Encrypted:false
                      SSDEEP:24:5Y0bQ573pHpACtUZtJD0lFBopZleqw87xTe4D8FaFJ/Doz9AtjJgbCzg:5m73jcJqQep89TEw7Uxkk
                      MD5:DFEABDE84792228093A5A270352395B6
                      SHA1:E41258C9576721025926326F76063C2305586F76
                      SHA-256:77B138AB5D0A90FF04648C26ADDD5E414CC178165E3B54A4CB3739DA0F58E075
                      SHA-512:E256F603E67335151BB709294749794E2E3085F4063C623461A0B3DECBCCA8E620807B707EC9BCBE36DCD7D639C55753DA0495BE85B4AE5FB6BFC52AB4B284FD
                      Malicious:false
                      Preview: .body..{.. background-repeat: repeat-x;.. background-color: white;.. font-family: "Segoe UI", "verdana", "arial";.. margin: 0em;.. color: #1f1f1f;..}.....mainContent..{.. margin-top:80px;.. width: 700px;.. margin-left: 120px;.. margin-right: 120px;..}.....title..{.. color: #54b0f7;.. font-size: 36px;.. font-weight: 300;.. line-height: 40px;.. margin-bottom: 24px;.. font-family: "Segoe UI", "verdana";.. position: relative;..}.....errorExplanation..{.. color: #000000;.. font-size: 12pt;.. font-family: "Segoe UI", "verdana", "arial";.. text-decoration: none;..}.....taskSection..{.. margin-top: 20px;.. margin-bottom: 28px;.. position: relative; ..}.....tasks..{.. color: #000000;.. font-family: "Segoe UI", "verdana";.. font-weight:200;.. font-size: 12pt;..}....li..{.. margin-top: 8px;..}.....diagnoseButton..{.. outline: none;.. font-size: 9pt;..}.....launchInternetOptionsButton..{.. outline: none;
                      C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\OR0WKIO1\dnserror[1]
                      Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                      File Type:HTML document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
                      Category:downloaded
                      Size (bytes):2997
                      Entropy (8bit):4.4885437940628465
                      Encrypted:false
                      SSDEEP:48:u7u5V4VyhhV2lFUW29vj0RkpNc7KpAP8Rra:vIlJ6G7Ao8Ra
                      MD5:2DC61EB461DA1436F5D22BCE51425660
                      SHA1:E1B79BCAB0F073868079D807FAEC669596DC46C1
                      SHA-256:ACDEB4966289B6CE46ECC879531F85E9C6F94B718AAB521D38E2E00F7F7F7993
                      SHA-512:A88BECB4FBDDC5AFC55E4DC0135AF714A3EEC4A63810AE5A989F2CECB824A686165D3CEDB8CBD8F35C7E5B9F4136C29DEA32736AABB451FE8088B978B493AC6D
                      Malicious:false
                      IE Cache URL:res://ieframe.dll/dnserror.htm?ErrorStatus=0x800C0005&DNSError=9003
                      Preview: .<!DOCTYPE HTML>..<html>.. <head>.. <link rel="stylesheet" type="text/css" href="NewErrorPageTemplate.css" >.. <meta http-equiv="Content-Type" content="text/html; charset=UTF-8">.. <title>Can&rsquo;t reach this page</title>.. <script src="errorPageStrings.js" language="javascript" type="text/javascript">.. </script>.. <script src="httpErrorPagesScripts.js" language="javascript" type="text/javascript">.. </script>.. </head>.... <body onLoad="getInfo(); initMoreInfo('infoBlockID');">.. <div id="contentContainer" class="mainContent">.. <div id="mainTitle" class="title">Can&rsquo;t reach this page</div>.. <div class="taskSection" id="taskSection">.. <ul id="cantDisplayTasks" class="tasks">.. <li id="task1-1">Make sure the web address <span id="webpage" class="webpageURL"></span>is correct</li>.. <li id="task1-2">Search for this site on Bing</li>..
                      C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\OR0WKIO1\errorPageStrings[1]
                      Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                      File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                      Category:downloaded
                      Size (bytes):4720
                      Entropy (8bit):5.164796203267696
                      Encrypted:false
                      SSDEEP:96:z9UUiqRxqH211CUIRgRLnRynjZbRXkRPRk6C87Apsat/5/+mhPcF+5g+mOQb7A9o:JsUOG1yNlX6ZzWpHOWLia16Cb7bk
                      MD5:D65EC06F21C379C87040B83CC1ABAC6B
                      SHA1:208D0A0BB775661758394BE7E4AFB18357E46C8B
                      SHA-256:A1270E90CEA31B46432EC44731BF4400D22B38EB2855326BF934FE8F1B169A4F
                      SHA-512:8A166D26B49A5D95AEA49BC649E5EA58786A2191F4D2ADAC6F5FBB7523940CE4482D6A2502AA870A931224F215CB2010A8C9B99A2C1820150E4D365CAB28299E
                      Malicious:false
                      IE Cache URL:res://ieframe.dll/errorPageStrings.js
                      Preview: .//Split out for localization...var L_GOBACK_TEXT = "Go back to the previous page.";..var L_REFRESH_TEXT = "Refresh the page.";..var L_MOREINFO_TEXT = "More information";..var L_OFFLINE_USERS_TEXT = "For offline users";..var L_RELOAD_TEXT = "Retype the address.";..var L_HIDE_HOTKEYS_TEXT = "Hide tab shortcuts";..var L_SHOW_HOTKEYS_TEXT = "Show more tab shortcuts";..var L_CONNECTION_OFF_TEXT = "You are not connected to the Internet. Check your Internet connection.";..var L_CONNECTION_ON_TEXT = "It appears you are connected to the Internet, but you might want to try to reconnect to the Internet.";....//used by invalidcert.js and hstscerterror.js..var L_CertUnknownCA_TEXT = "Your PC doesn\u2019t trust this website\u2019s security certificate.";..var L_CertExpired_TEXT = "The website\u2019s security certificate is not yet valid or has expired.";..var L_CertCNMismatch_TEXT = "The hostname in the website\u2019s security certificate differs from the website you are trying to visit.";..var L
                      C:\Users\user\AppData\Local\Temp\JavaDeployReg.log
                      Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                      File Type:ASCII text, with CRLF line terminators
                      Category:modified
                      Size (bytes):89
                      Entropy (8bit):4.457498499025032
                      Encrypted:false
                      SSDEEP:3:oVXUbVCE9Ts4T48JOGXnEbVCE9Ts4uk+n:o9Urn4qErq
                      MD5:330A46A120DAA4AA27765FF48C17CFA2
                      SHA1:D64846D9E5996A84A50FE3522DF95B8D995D187C
                      SHA-256:4C01D98C1E31356C9F8DDB63A2320560DF77C8A37B6215E8C51E4440AFFECC12
                      SHA-512:3DD1DED3DDE41C97ED2C1D32E9065F58D9FC8272D403D0BD7B2DFEEEE064A924AE80049DEF6917EFF2861F795F741AA7FCBE281E7D17EF49B0A26F0CD50C5245
                      Malicious:false
                      Preview: [2021/06/03 18:06:46.920] Latest deploy version: ..[2021/06/03 18:06:46.920] 11.211.2 ..
                      C:\Users\user\AppData\Local\Temp\~DF2325E3FA7AA39907.TMP
                      Process:C:\Program Files\internet explorer\iexplore.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):40185
                      Entropy (8bit):0.6775647831808976
                      Encrypted:false
                      SSDEEP:96:kBqoxKAuvScS+EiIZCPphCuQbKephCuQbKZphCuQbK6:kBqoxKAuqR+EiIZCPpwVpwOpwT
                      MD5:69940C57E758F61ED876E80B30613A47
                      SHA1:643EE6264C9C8B4B54B84A83B7FCFF57B07F3B94
                      SHA-256:85E2C83108205161715618459450AEA91475F42DE1B577CE9E2BA86B0FE1BB8F
                      SHA-512:4353AFCF37B8DBD3E0B99D737F385125D3BF072A8ACB1FE27A57D08E239162AED77D2C6184297D553D61ACE72C2A1F1299E006BAAE9F65AC3E9FDC50808C2781
                      Malicious:false
                      Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      C:\Users\user\AppData\Local\Temp\~DF762A57E90D6A65CD.TMP
                      Process:C:\Program Files\internet explorer\iexplore.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):40073
                      Entropy (8bit):0.6558580738443309
                      Encrypted:false
                      SSDEEP:192:kBqoxKAuqR+tzxQTWwmJ06iRwmJ06iqwmJ06if:kBqoxKAuqR+tzxQTWhIRhIqhIf
                      MD5:BED294CA39E721D92EE7C908AFAA80A9
                      SHA1:E3B390F086560AF18F1C96F3633448B5B431C6D3
                      SHA-256:52A5530CAFACE2F1C8A1D6D9B4E4B7A315236B316C6EF2C491278A9719F0B599
                      SHA-512:740F9AE6B38ECC70861E1D4B746238D970EA40EA84B17276897ABCBA19D90D93DFFFDEF811D5F0D053EACEBD4A0B400E2B70BB3BCC41539DA707E44DF4A89781
                      Malicious:false
                      Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      C:\Users\user\AppData\Local\Temp\~DF896FBAE33087E32E.TMP
                      Process:C:\Program Files\internet explorer\iexplore.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):13237
                      Entropy (8bit):0.5972692611662705
                      Encrypted:false
                      SSDEEP:24:c9lLh9lLh9lIn9lIn9loJ9lop9lWnxTV929:kBqoIysrG
                      MD5:E96BA0BC747494236BC0429356C61A71
                      SHA1:50C56F2FB54ACF0D56C65C1F92B43894B8247773
                      SHA-256:0FCB065D36956D9134F1DEAFE195677B90F3143C534147A4E91FB53DBFE1A301
                      SHA-512:139FF4AB662834360F7D752A01ED0D14308FC85E782DEF0D10CCFBF0C2999DC1EBE105B5B1938BD5A34709D2A55C812D43D79F7DD3F0276F575BB2DF07A67A40
                      Malicious:false
                      Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................

                      Static File Info

                      General

                      File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                      Entropy (8bit):6.166903919730553
                      TrID:
                      • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
                      • Generic Win/DOS Executable (2004/3) 0.20%
                      • DOS Executable Generic (2002/1) 0.20%
                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                      File name:shorefront.dll
                      File size:393728
                      MD5:b3526bc3c4a61f9f09ac31ee9a5fc8a5
                      SHA1:d92ac3fa9cca4ed8273111f767e24d8f53896787
                      SHA256:f4a464c2e5f14cd4c391a9b5ba60deca36ccaa6c1503a097eeb0c5070945d1fb
                      SHA512:0583e811619ea1ce40c430436e91b8b216fc509e7c75ed7132fdccc9f52f1828f50dbca6cd4b973090962fe6e8b76e298b0fe43b56ea2485810d4dc52e033fdb
                      SSDEEP:6144:hC5FUWwNmY036ua+71w5uJEr+AitTdyh+a6R+/ZQWdB:0FBwNuKu4umqAinyh+7+h1H
                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....pS...........!.........$.......W..............................................K.....@.............................m..

                      File Icon

                      Icon Hash:74f0e4ecccdce0e4

                      Static PE Info

                      General

                      Entrypoint:0x1045798
                      Entrypoint Section:.text
                      Digitally signed:false
                      Imagebase:0x1000000
                      Subsystem:windows gui
                      Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT
                      Time Stamp:0x53700FF7 [Mon May 12 00:04:07 2014 UTC]
                      TLS Callbacks:
                      CLR (.Net) Version:
                      OS Version Major:6
                      OS Version Minor:0
                      File Version Major:6
                      File Version Minor:0
                      Subsystem Version Major:6
                      Subsystem Version Minor:0
                      Import Hash:f97da13a5df33dbcb72f17527b1d6819

                      Entrypoint Preview

                      Instruction
                      push ebp
                      mov ebp, esp
                      cmp dword ptr [ebp+0Ch], 01h
                      jne 00007F6174C5A777h
                      call 00007F6174C64340h
                      push dword ptr [ebp+10h]
                      push dword ptr [ebp+0Ch]
                      push dword ptr [ebp+08h]
                      call 00007F6174C5A77Ch
                      add esp, 0Ch
                      pop ebp
                      retn 000Ch
                      push 0000000Ch
                      push 0105B7D8h
                      call 00007F6174C602DEh
                      xor eax, eax
                      inc eax
                      mov esi, dword ptr [ebp+0Ch]
                      test esi, esi
                      jne 00007F6174C5A77Eh
                      cmp dword ptr [020691B4h], esi
                      je 00007F6174C5A85Ah
                      and dword ptr [ebp-04h], 00000000h
                      cmp esi, 01h
                      je 00007F6174C5A777h
                      cmp esi, 02h
                      jne 00007F6174C5A7A7h
                      mov ecx, dword ptr [010137A0h]
                      test ecx, ecx
                      je 00007F6174C5A77Eh
                      push dword ptr [ebp+10h]
                      push esi
                      push dword ptr [ebp+08h]
                      call ecx
                      mov dword ptr [ebp-1Ch], eax
                      test eax, eax
                      je 00007F6174C5A827h
                      push dword ptr [ebp+10h]
                      push esi
                      push dword ptr [ebp+08h]
                      call 00007F6174C5A586h
                      mov dword ptr [ebp-1Ch], eax
                      test eax, eax
                      je 00007F6174C5A810h
                      mov ebx, dword ptr [ebp+10h]
                      push ebx
                      push esi
                      push dword ptr [ebp+08h]
                      call 00007F6174C52768h
                      mov edi, eax
                      mov dword ptr [ebp-1Ch], edi
                      cmp esi, 01h
                      jne 00007F6174C5A79Ah
                      test edi, edi
                      jne 00007F6174C5A796h
                      push ebx
                      push eax
                      push dword ptr [ebp+08h]
                      call 00007F6174C52750h
                      push ebx
                      push edi
                      push dword ptr [ebp+08h]
                      call 00007F6174C5A54Ch
                      mov eax, dword ptr [010137A0h]
                      test eax, eax
                      je 00007F6174C5A779h
                      push ebx
                      push edi
                      push dword ptr [ebp+08h]
                      call eax

                      Data Directories

                      NameVirtual AddressVirtual Size Is in Section
                      IMAGE_DIRECTORY_ENTRY_EXPORT0x5bdf00x6d.text
                      IMAGE_DIRECTORY_ENTRY_IMPORT0x106c2000x64.idata
                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x106d0000x2334.reloc
                      IMAGE_DIRECTORY_ENTRY_DEBUG0x10800x38.text
                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x18b680x40.text
                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IAT0x106c0000x200.idata
                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                      Sections

                      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                      .text0x10000x5ae5d0x5b000False0.629630623283data6.14182941666IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      .data0x5c0000x100f10c0x1c00unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                      .idata0x106c0000xc340xe00False0.399832589286data5.23220949273IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .reloc0x106d0000x23340x2400False0.759331597222data6.62458632125IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                      Imports

                      DLLImport
                      KERNEL32.dllSetStdHandle, WriteConsoleW, ReadConsoleW, CreateFileW, SetSystemPowerState, CreateFileA, GetWindowsDirectoryA, GetCommandLineA, CreateSemaphoreA, FormatMessageA, GetLocalTime, GetSystemTimeAsFileTime, HeapWalk, HeapCompact, HeapFree, HeapAlloc, VirtualProtectEx, OutputDebugStringW, LoadLibraryExW, SetFilePointerEx, ReadFile, GetConsoleMode, GetConsoleCP, FlushFileBuffers, CloseHandle, HeapReAlloc, GetModuleFileNameW, WriteFile, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCurrentProcessId, QueryPerformanceCounter, GetModuleFileNameA, GetFileType, GetStdHandle, WideCharToMultiByte, MultiByteToWideChar, GetStringTypeW, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, EncodePointer, DecodePointer, GetLastError, RaiseException, RtlUnwind, GetCurrentThreadId, GetCPInfo, UnhandledExceptionFilter, SetUnhandledExceptionFilter, SetLastError, InitializeCriticalSectionAndSpinCount, Sleep, GetCurrentProcess, TerminateProcess, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetStartupInfoW, GetModuleHandleW, GetProcAddress, IsProcessorFeaturePresent, CompareStringW, LCMapStringW, GetLocaleInfoW, IsValidLocale, GetUserDefaultLCID, EnumSystemLocalesW, ExitProcess, GetModuleHandleExW, HeapSize, GetProcessHeap, IsDebuggerPresent, IsValidCodePage, GetACP, GetOEMCP
                      ole32.dllOleUninitialize, OleInitialize, OleSetContainedObject
                      ADVAPI32.dllAllocateAndInitializeSid, SetEntriesInAclA, StartServiceCtrlDispatcherW, SetServiceStatus, RegisterServiceCtrlHandlerA, QueryServiceStatus, OpenServiceA, OpenSCManagerA, DeleteService, RegSetValueExA, RegQueryValueExA, RegOpenKeyExA, RegOpenKeyA, RegEnumKeyA, RegDeleteKeyA, RegCreateKeyExA, RegCloseKey, LookupPrivilegeValueA, OpenProcessToken, OpenThreadToken, GetTokenInformation, FreeSid, InitializeSecurityDescriptor, SetSecurityDescriptorDacl
                      hlink.dll

                      Exports

                      NameOrdinalAddress
                      Child10x103dbb0
                      Forcearea20x103dc60
                      Stationmeat30x103d3d0

                      Network Behavior

                      Network Port Distribution

                      UDP Packets

                      TimestampSource PortDest PortSource IPDest IP
                      Jun 3, 2021 18:04:57.835787058 CEST5057953192.168.2.48.8.8.8
                      Jun 3, 2021 18:04:57.877228022 CEST53505798.8.8.8192.168.2.4
                      Jun 3, 2021 18:04:58.193685055 CEST5170353192.168.2.48.8.8.8
                      Jun 3, 2021 18:04:58.194834948 CEST6524853192.168.2.48.8.8.8
                      Jun 3, 2021 18:04:58.195405006 CEST5372353192.168.2.48.8.8.8
                      Jun 3, 2021 18:04:58.235152006 CEST53517038.8.8.8192.168.2.4
                      Jun 3, 2021 18:04:58.236143112 CEST53652488.8.8.8192.168.2.4
                      Jun 3, 2021 18:04:58.236301899 CEST53537238.8.8.8192.168.2.4
                      Jun 3, 2021 18:04:58.640815020 CEST6464653192.168.2.48.8.8.8
                      Jun 3, 2021 18:04:58.690197945 CEST53646468.8.8.8192.168.2.4
                      Jun 3, 2021 18:04:59.577861071 CEST6529853192.168.2.48.8.8.8
                      Jun 3, 2021 18:04:59.626797915 CEST53652988.8.8.8192.168.2.4
                      Jun 3, 2021 18:04:59.664598942 CEST5912353192.168.2.48.8.8.8
                      Jun 3, 2021 18:04:59.737924099 CEST53591238.8.8.8192.168.2.4
                      Jun 3, 2021 18:05:00.287354946 CEST5453153192.168.2.48.8.8.8
                      Jun 3, 2021 18:05:00.341882944 CEST53545318.8.8.8192.168.2.4
                      Jun 3, 2021 18:05:00.524528980 CEST4971453192.168.2.48.8.8.8
                      Jun 3, 2021 18:05:00.574057102 CEST53497148.8.8.8192.168.2.4
                      Jun 3, 2021 18:05:01.698822021 CEST5802853192.168.2.48.8.8.8
                      Jun 3, 2021 18:05:01.747279882 CEST53580288.8.8.8192.168.2.4
                      Jun 3, 2021 18:05:03.097371101 CEST5309753192.168.2.48.8.8.8
                      Jun 3, 2021 18:05:03.139079094 CEST53530978.8.8.8192.168.2.4
                      Jun 3, 2021 18:05:04.113044977 CEST4925753192.168.2.48.8.8.8
                      Jun 3, 2021 18:05:04.161500931 CEST53492578.8.8.8192.168.2.4
                      Jun 3, 2021 18:05:05.240236998 CEST6238953192.168.2.48.8.8.8
                      Jun 3, 2021 18:05:05.283468008 CEST53623898.8.8.8192.168.2.4
                      Jun 3, 2021 18:05:54.963553905 CEST4991053192.168.2.48.8.8.8
                      Jun 3, 2021 18:05:55.027280092 CEST53499108.8.8.8192.168.2.4
                      Jun 3, 2021 18:06:26.936666965 CEST5585453192.168.2.48.8.8.8
                      Jun 3, 2021 18:06:26.978046894 CEST53558548.8.8.8192.168.2.4
                      Jun 3, 2021 18:06:28.175432920 CEST6454953192.168.2.48.8.8.8
                      Jun 3, 2021 18:06:28.218729019 CEST53645498.8.8.8192.168.2.4
                      Jun 3, 2021 18:06:29.277987003 CEST6315353192.168.2.48.8.8.8
                      Jun 3, 2021 18:06:29.328186989 CEST53631538.8.8.8192.168.2.4
                      Jun 3, 2021 18:06:29.367486954 CEST5299153192.168.2.48.8.8.8
                      Jun 3, 2021 18:06:29.416198969 CEST53529918.8.8.8192.168.2.4
                      Jun 3, 2021 18:06:30.062048912 CEST5370053192.168.2.48.8.8.8
                      Jun 3, 2021 18:06:30.127419949 CEST53537008.8.8.8192.168.2.4
                      Jun 3, 2021 18:06:30.666662931 CEST5172653192.168.2.48.8.8.8
                      Jun 3, 2021 18:06:30.715130091 CEST53517268.8.8.8192.168.2.4
                      Jun 3, 2021 18:06:31.485276937 CEST5679453192.168.2.48.8.8.8
                      Jun 3, 2021 18:06:31.534965038 CEST53567948.8.8.8192.168.2.4
                      Jun 3, 2021 18:06:33.046251059 CEST5653453192.168.2.48.8.8.8
                      Jun 3, 2021 18:06:33.096560955 CEST53565348.8.8.8192.168.2.4
                      Jun 3, 2021 18:06:37.884838104 CEST5662753192.168.2.48.8.8.8
                      Jun 3, 2021 18:06:37.934593916 CEST53566278.8.8.8192.168.2.4
                      Jun 3, 2021 18:06:39.378293037 CEST5662153192.168.2.48.8.8.8
                      Jun 3, 2021 18:06:39.420027018 CEST53566218.8.8.8192.168.2.4
                      Jun 3, 2021 18:06:40.316010952 CEST6311653192.168.2.48.8.8.8
                      Jun 3, 2021 18:06:40.365956068 CEST53631168.8.8.8192.168.2.4
                      Jun 3, 2021 18:06:41.262558937 CEST6407853192.168.2.48.8.8.8
                      Jun 3, 2021 18:06:41.314126015 CEST53640788.8.8.8192.168.2.4
                      Jun 3, 2021 18:06:43.233447075 CEST6480153192.168.2.48.8.8.8
                      Jun 3, 2021 18:06:43.282026052 CEST53648018.8.8.8192.168.2.4
                      Jun 3, 2021 18:06:46.981379986 CEST6172153192.168.2.48.8.8.8
                      Jun 3, 2021 18:06:47.032116890 CEST53617218.8.8.8192.168.2.4
                      Jun 3, 2021 18:06:48.251032114 CEST5125553192.168.2.48.8.8.8
                      Jun 3, 2021 18:06:48.301836967 CEST53512558.8.8.8192.168.2.4
                      Jun 3, 2021 18:06:48.314477921 CEST6152253192.168.2.48.8.8.8
                      Jun 3, 2021 18:06:48.377386093 CEST53615228.8.8.8192.168.2.4
                      Jun 3, 2021 18:06:48.390541077 CEST5233753192.168.2.48.8.8.8
                      Jun 3, 2021 18:06:48.439580917 CEST53523378.8.8.8192.168.2.4
                      Jun 3, 2021 18:06:49.089580059 CEST5504653192.168.2.48.8.8.8
                      Jun 3, 2021 18:06:49.138902903 CEST53550468.8.8.8192.168.2.4
                      Jun 3, 2021 18:06:49.145909071 CEST4961253192.168.2.48.8.8.8
                      Jun 3, 2021 18:06:49.194487095 CEST53496128.8.8.8192.168.2.4
                      Jun 3, 2021 18:06:49.201268911 CEST4928553192.168.2.48.8.8.8
                      Jun 3, 2021 18:06:49.252738953 CEST53492858.8.8.8192.168.2.4
                      Jun 3, 2021 18:07:10.306181908 CEST5060153192.168.2.48.8.8.8
                      Jun 3, 2021 18:07:10.375230074 CEST53506018.8.8.8192.168.2.4
                      Jun 3, 2021 18:07:14.013451099 CEST6087553192.168.2.48.8.8.8
                      Jun 3, 2021 18:07:14.063872099 CEST53608758.8.8.8192.168.2.4

                      DNS Queries

                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                      Jun 3, 2021 18:06:48.251032114 CEST192.168.2.48.8.8.80xd976Standard query (0)app.buboleinov.comA (IP address)IN (0x0001)
                      Jun 3, 2021 18:06:48.314477921 CEST192.168.2.48.8.8.80x65f0Standard query (0)app.buboleinov.comA (IP address)IN (0x0001)
                      Jun 3, 2021 18:06:48.390541077 CEST192.168.2.48.8.8.80xf05aStandard query (0)app.buboleinov.comA (IP address)IN (0x0001)
                      Jun 3, 2021 18:06:49.089580059 CEST192.168.2.48.8.8.80x72bcStandard query (0)app.buboleinov.comA (IP address)IN (0x0001)
                      Jun 3, 2021 18:06:49.145909071 CEST192.168.2.48.8.8.80x2930Standard query (0)app.buboleinov.comA (IP address)IN (0x0001)
                      Jun 3, 2021 18:06:49.201268911 CEST192.168.2.48.8.8.80xd559Standard query (0)app.buboleinov.comA (IP address)IN (0x0001)

                      DNS Answers

                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                      Jun 3, 2021 18:06:29.328186989 CEST8.8.8.8192.168.2.40xbf1eNo error (0)prda.aadg.msidentity.comwww.tm.a.prd.aadg.akadns.netCNAME (Canonical name)IN (0x0001)
                      Jun 3, 2021 18:06:48.301836967 CEST8.8.8.8192.168.2.40xd976Name error (3)app.buboleinov.comnonenoneA (IP address)IN (0x0001)
                      Jun 3, 2021 18:06:48.377386093 CEST8.8.8.8192.168.2.40x65f0Name error (3)app.buboleinov.comnonenoneA (IP address)IN (0x0001)
                      Jun 3, 2021 18:06:48.439580917 CEST8.8.8.8192.168.2.40xf05aName error (3)app.buboleinov.comnonenoneA (IP address)IN (0x0001)
                      Jun 3, 2021 18:06:49.138902903 CEST8.8.8.8192.168.2.40x72bcName error (3)app.buboleinov.comnonenoneA (IP address)IN (0x0001)
                      Jun 3, 2021 18:06:49.194487095 CEST8.8.8.8192.168.2.40x2930Name error (3)app.buboleinov.comnonenoneA (IP address)IN (0x0001)
                      Jun 3, 2021 18:06:49.252738953 CEST8.8.8.8192.168.2.40xd559Name error (3)app.buboleinov.comnonenoneA (IP address)IN (0x0001)

                      Code Manipulations

                      Statistics

                      Behavior

                      Click to jump to process

                      System Behavior

                      General

                      Start time:18:05:03
                      Start date:03/06/2021
                      Path:C:\Windows\System32\loaddll32.exe
                      Wow64 process (32bit):true
                      Commandline:loaddll32.exe 'C:\Users\user\Desktop\shorefront.dll'
                      Imagebase:0x960000
                      File size:116736 bytes
                      MD5 hash:542795ADF7CC08EFCF675D65310596E8
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_Ursnif_1, Description: Yara detected Ursnif, Source: 00000000.00000003.827452979.0000000000530000.00000040.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.874866712.0000000002FE8000.00000004.00000040.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.874909818.0000000002FE8000.00000004.00000040.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.874494648.0000000002FE8000.00000004.00000040.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.874791903.0000000002FE8000.00000004.00000040.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.874837013.0000000002FE8000.00000004.00000040.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.874942139.0000000002FE8000.00000004.00000040.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.874588381.0000000002FE8000.00000004.00000040.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.874885116.0000000002FE8000.00000004.00000040.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000002.917892757.0000000002FE8000.00000004.00000040.sdmp, Author: Joe Security
                      Reputation:high

                      General

                      Start time:18:05:04
                      Start date:03/06/2021
                      Path:C:\Windows\SysWOW64\cmd.exe
                      Wow64 process (32bit):true
                      Commandline:cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\shorefront.dll',#1
                      Imagebase:0x11d0000
                      File size:232960 bytes
                      MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high

                      General

                      Start time:18:05:04
                      Start date:03/06/2021
                      Path:C:\Windows\SysWOW64\rundll32.exe
                      Wow64 process (32bit):true
                      Commandline:rundll32.exe C:\Users\user\Desktop\shorefront.dll,Child
                      Imagebase:0x200000
                      File size:61952 bytes
                      MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_Ursnif_1, Description: Yara detected Ursnif, Source: 00000002.00000003.797710729.0000000002220000.00000040.00000001.sdmp, Author: Joe Security
                      Reputation:high

                      General

                      Start time:18:05:04
                      Start date:03/06/2021
                      Path:C:\Windows\SysWOW64\rundll32.exe
                      Wow64 process (32bit):true
                      Commandline:rundll32.exe 'C:\Users\user\Desktop\shorefront.dll',#1
                      Imagebase:0x200000
                      File size:61952 bytes
                      MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000003.00000003.876330514.00000000050E8000.00000004.00000040.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000003.00000003.876188239.00000000050E8000.00000004.00000040.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000003.00000002.919920945.00000000050E8000.00000004.00000040.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000003.00000003.876373518.00000000050E8000.00000004.00000040.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Ursnif_1, Description: Yara detected Ursnif, Source: 00000003.00000003.794830642.00000000027F0000.00000040.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000003.00000003.876356161.00000000050E8000.00000004.00000040.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000003.00000003.876088782.00000000050E8000.00000004.00000040.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000003.00000003.876229416.00000000050E8000.00000004.00000040.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000003.00000003.876297207.00000000050E8000.00000004.00000040.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000003.00000003.876268229.00000000050E8000.00000004.00000040.sdmp, Author: Joe Security
                      Reputation:high

                      General

                      Start time:18:05:08
                      Start date:03/06/2021
                      Path:C:\Windows\SysWOW64\rundll32.exe
                      Wow64 process (32bit):true
                      Commandline:rundll32.exe C:\Users\user\Desktop\shorefront.dll,Forcearea
                      Imagebase:0x200000
                      File size:61952 bytes
                      MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_Ursnif_1, Description: Yara detected Ursnif, Source: 00000005.00000003.813086420.0000000003210000.00000040.00000001.sdmp, Author: Joe Security
                      Reputation:high

                      General

                      Start time:18:05:14
                      Start date:03/06/2021
                      Path:C:\Windows\SysWOW64\rundll32.exe
                      Wow64 process (32bit):true
                      Commandline:rundll32.exe C:\Users\user\Desktop\shorefront.dll,Stationmeat
                      Imagebase:0x200000
                      File size:61952 bytes
                      MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_Ursnif_1, Description: Yara detected Ursnif, Source: 00000006.00000003.821591213.00000000030E0000.00000040.00000001.sdmp, Author: Joe Security
                      Reputation:high

                      General

                      Start time:18:06:45
                      Start date:03/06/2021
                      Path:C:\Program Files\internet explorer\iexplore.exe
                      Wow64 process (32bit):false
                      Commandline:'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
                      Imagebase:0x7ff601e70000
                      File size:823560 bytes
                      MD5 hash:6465CB92B25A7BC1DF8E01D8AC5E7596
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high

                      General

                      Start time:18:06:46
                      Start date:03/06/2021
                      Path:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                      Wow64 process (32bit):true
                      Commandline:'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:816 CREDAT:17410 /prefetch:2
                      Imagebase:0x8a0000
                      File size:822536 bytes
                      MD5 hash:071277CC2E3DF41EEEA8013E2AB58D5A
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high

                      General

                      Start time:18:06:47
                      Start date:03/06/2021
                      Path:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                      Wow64 process (32bit):true
                      Commandline:'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:816 CREDAT:17414 /prefetch:2
                      Imagebase:0x8a0000
                      File size:822536 bytes
                      MD5 hash:071277CC2E3DF41EEEA8013E2AB58D5A
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high

                      Disassembly

                      Code Analysis

                      Reset < >