Loading ...

Play interactive tourEdit tour

Analysis Report SecuriteInfo.com..7135.20767

Overview

General Information

Sample Name:SecuriteInfo.com..7135.20767 (renamed file extension from 20767 to dll)
Analysis ID:432910
MD5:5ba7ac7fa4f9e831679832b6cc22aee8
SHA1:813df24ac22c2666b28bc3e7fb9bd1eef2a7f395
SHA256:d2c19ac3eace29239bf919c442556abf782da5953325ee6b2626482fbf442f29
Tags:dllGozi
Infos:

Most interesting Screenshot:

Detection

Ursnif
Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found malware configuration
Multi AV Scanner detection for domain / URL
Yara detected Ursnif
Writes registry values via WMI
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to dynamically determine API calls
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries the installation date of Windows
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

Process Tree

  • System is w10x64
  • loaddll32.exe (PID: 4712 cmdline: loaddll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com..7135.dll' MD5: 542795ADF7CC08EFCF675D65310596E8)
    • cmd.exe (PID: 6116 cmdline: cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com..7135.dll',#1 MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • rundll32.exe (PID: 5328 cmdline: rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com..7135.dll',#1 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 68 cmdline: rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com..7135.dll,Paragraphbell MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 4604 cmdline: rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com..7135.dll,Sharptwo MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
  • iexplore.exe (PID: 4456 cmdline: 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding MD5: 6465CB92B25A7BC1DF8E01D8AC5E7596)
    • iexplore.exe (PID: 6012 cmdline: 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:4456 CREDAT:17410 /prefetch:2 MD5: 071277CC2E3DF41EEEA8013E2AB58D5A)
  • cleanup

Malware Configuration

Threatname: Ursnif

{"lang_id": "RU, CN", "RSA Public Key": "oUnY8+/8G/QjijBEa03/PDDCyhbZrtKtx8eYSXLSbmKpR2omzPKPDVDiaj+dBCVC5Sp5s16D5EsjkO+S9MLdqEPK+/EAZI0qxYwv0GmWkXSlJi4jyYyJKc5a5Nek5/cWbmHSXPW+Rq2S8QAD5SioqB8j4ScC8nSuqcxPZwTdEUXuTG36kAdjIfamPdH5DlrmzxdodFTkShIE2IKM5O/dCTIwhTSQIj7YF2w9akzONLDoXT8cJE2CEp0UrlGkTtCcRTWQr67rMF2nSqm+ctweTZRfgBKtrDgiEDrXnhmUscy59twRBz1A7dRDpJryotUEkXjZHrb6gv4q0NjsbeCK4Jw4zYJf7CO+eANF3Bou0fo=", "c2_domain": ["authd.feronok.com", "app.bighomegl.at"], "botnet": "1500", "server": "580", "serpent_key": "jT7xNsiVSW2IugIq", "sleep_time": "10", "CONF_TIMEOUT": "20", "SetWaitableTimer_value": "10"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000004.00000003.430352092.0000000005A58000.00000004.00000040.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
    00000004.00000002.464198146.0000000005A58000.00000004.00000040.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
      00000004.00000003.430424986.0000000005A58000.00000004.00000040.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
        00000004.00000003.430241635.0000000005A58000.00000004.00000040.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
          00000004.00000003.430313705.0000000005A58000.00000004.00000040.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
            Click to see the 5 entries

            Sigma Overview

            No Sigma rule has matched

            Signature Overview

            Click to jump to signature section

            Show All Signature Results

            AV Detection:

            barindex
            Antivirus detection for URL or domainShow sources
            Source: http://authd.feronok.com/INsgiuDpuLw85PPWCNwmsmw/LyIcaMF9BW/RDuesN3193oziv6jZ/21yngUSJZxlB/5U99_2BFqAvira URL Cloud: Label: malware
            Source: http://authd.feronok.com/INsgiuDpuLw85PPWCNwmsmw/LyIcaMF9BW/RDuesN3193oziv6jZ/21yngUSJZxlB/5U99_2BFq39/C9yL3XEqjGdzvV/F4wrCEliEtubK_2BQN3v0/mpD0sYBWj1_2BOoZ/MhYNZMroasOcyRm/Y7cgiiYGTmIYClS1bt/R_2BrGpes/V0WKbm6yczDyoBvOW06Z/_2FVUJ_2BtBEMJQ2mZ0/eqMRxCIXxJwUIjVA7qTLlE/f_2FwC5tmUPbh/r76jmp6x/obp7g2x_2BpjxmD9q5fMhKl/Y1cOMUM_2F/x9ahGBENuH7csdR7_/2FySnpeWZizz/XD203nXIqoX/COsoX4qlT56/jcBfJkpoAvira URL Cloud: Label: malware
            Found malware configurationShow sources
            Source: 00000005.00000003.323666044.0000000002AB0000.00000040.00000001.sdmpMalware Configuration Extractor: Ursnif {"lang_id": "RU, CN", "RSA Public Key": "oUnY8+/8G/QjijBEa03/PDDCyhbZrtKtx8eYSXLSbmKpR2omzPKPDVDiaj+dBCVC5Sp5s16D5EsjkO+S9MLdqEPK+/EAZI0qxYwv0GmWkXSlJi4jyYyJKc5a5Nek5/cWbmHSXPW+Rq2S8QAD5SioqB8j4ScC8nSuqcxPZwTdEUXuTG36kAdjIfamPdH5DlrmzxdodFTkShIE2IKM5O/dCTIwhTSQIj7YF2w9akzONLDoXT8cJE2CEp0UrlGkTtCcRTWQr67rMF2nSqm+ctweTZRfgBKtrDgiEDrXnhmUscy59twRBz1A7dRDpJryotUEkXjZHrb6gv4q0NjsbeCK4Jw4zYJf7CO+eANF3Bou0fo=", "c2_domain": ["authd.feronok.com", "app.bighomegl.at"], "botnet": "1500", "server": "580", "serpent_key": "jT7xNsiVSW2IugIq", "sleep_time": "10", "CONF_TIMEOUT": "20", "SetWaitableTimer_value": "10"}
            Multi AV Scanner detection for domain / URLShow sources
            Source: authd.feronok.comVirustotal: Detection: 11%Perma Link
            Source: SecuriteInfo.com..7135.dllStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeFile opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dll
            Source: SecuriteInfo.com..7135.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT
            Source: Binary string: c:\571\bar\Nature\industry\Son.pdb source: loaddll32.exe, rundll32.exe, SecuriteInfo.com..7135.dll
            Source: Joe Sandbox ViewASN Name: SUPERSERVERSDATACENTERRU SUPERSERVERSDATACENTERRU
            Source: global trafficHTTP traffic detected: GET /INsgiuDpuLw85PPWCNwmsmw/LyIcaMF9BW/RDuesN3193oziv6jZ/21yngUSJZxlB/5U99_2BFq39/C9yL3XEqjGdzvV/F4wrCEliEtubK_2BQN3v0/mpD0sYBWj1_2BOoZ/MhYNZMroasOcyRm/Y7cgiiYGTmIYClS1bt/R_2BrGpes/V0WKbm6yczDyoBvOW06Z/_2FVUJ_2BtBEMJQ2mZ0/eqMRxCIXxJwUIjVA7qTLlE/f_2FwC5tmUPbh/r76jmp6x/obp7g2x_2BpjxmD9q5fMhKl/Y1cOMUM_2F/x9ahGBENuH7csdR7_/2FySnpeWZizz/XD203nXIqoX/COsoX4qlT56/jcBfJkpo HTTP/1.1Accept: text/html, application/xhtml+xml, image/jxr, */*Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateHost: authd.feronok.comConnection: Keep-Alive
            Source: unknownDNS traffic detected: queries for: authd.feronok.com
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Thu, 10 Jun 2021 20:50:54 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: closeVary: Accept-EncodingContent-Encoding: gzipData Raw: 36 61 0d 0a 1f 8b 08 00 00 00 00 00 00 03 b3 c9 28 c9 cd b1 e3 e5 b2 c9 48 4d 4c b1 b3 29 c9 2c c9 49 b5 33 31 30 51 f0 cb 2f 51 70 cb 2f cd 4b b1 d1 87 08 da e8 83 95 00 95 26 e5 a7 54 82 e8 e4 d4 bc 92 d4 22 3b 9b 0c 43 74 1d 40 11 1b 7d a8 34 c8 6c a0 22 28 2f 2f 3d 33 af 02 59 4e 1f 66 9a 3e d4 25 00 0b d9 61 33 92 00 00 00 0d 0a 30 0d 0a 0d 0a Data Ascii: 6a(HML),I310Q/Qp/K&T";Ct@}4l"(//=3YNf>%a30
            Source: {FA4B99A6-CA78-11EB-90E4-ECF4BB862DED}.dat.23.dr, ~DF80E1CCC67DA5CD93.TMP.23.drString found in binary or memory: http://authd.feronok.com/INsgiuDpuLw85PPWCNwmsmw/LyIcaMF9BW/RDuesN3193oziv6jZ/21yngUSJZxlB/5U99_2BFq

            Key, Mouse, Clipboard, Microphone and Screen Capturing:

            barindex
            Yara detected UrsnifShow sources
            Source: Yara matchFile source: 00000004.00000003.430352092.0000000005A58000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.464198146.0000000005A58000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.430424986.0000000005A58000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.430241635.0000000005A58000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.430313705.0000000005A58000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.430450163.0000000005A58000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.430406711.0000000005A58000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.430285928.0000000005A58000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.430372927.0000000005A58000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 5328, type: MEMORY
            Source: loaddll32.exe, 00000000.00000002.460078435.000000000073B000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

            E-Banking Fraud:

            barindex
            Yara detected UrsnifShow sources
            Source: Yara matchFile source: 00000004.00000003.430352092.0000000005A58000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.464198146.0000000005A58000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.430424986.0000000005A58000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.430241635.0000000005A58000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.430313705.0000000005A58000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.430450163.0000000005A58000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.430406711.0000000005A58000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.430285928.0000000005A58000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.430372927.0000000005A58000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 5328, type: MEMORY

            System Summary:

            barindex
            Writes registry values via WMIShow sources
            Source: C:\Windows\SysWOW64\rundll32.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetDWORDValue
            Source: C:\Windows\SysWOW64\rundll32.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
            Source: C:\Windows\SysWOW64\rundll32.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E1C2485 NtQueryVirtualMemory,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6E1C1B9C GetProcAddress,NtCreateSection,memset,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6E1C1EC7 NtMapViewOfSection,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6E1C2485 NtQueryVirtualMemory,
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E1C2264
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E2237EA
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E23F1F0
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E23D7C5
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E23DFD2
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E224510
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E291D40
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E237200
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E23A216
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E221010
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E2308E5
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E22A9D3
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6E1C2264
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6E2237EA
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6E23F1F0
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6E23D7C5
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6E23DFD2
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6E224510
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6E291D40
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6E237200
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6E23A216
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6E221010
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6E2308E5
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6E22A9D3
            Source: C:\Windows\System32\loaddll32.exeCode function: String function: 6E220F70 appears 31 times
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 6E220F70 appears 31 times
            Source: SecuriteInfo.com..7135.dllBinary or memory string: OriginalFilenameSon.dll8 vs SecuriteInfo.com..7135.dll
            Source: SecuriteInfo.com..7135.dllStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
            Source: classification engineClassification label: mal76.troj.winDLL@12/13@1/1
            Source: C:\Program Files\internet explorer\iexplore.exeFile created: C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\HighJump to behavior
            Source: C:\Program Files\internet explorer\iexplore.exeFile created: C:\Users\user\AppData\Local\Temp\~DF00D3A9B95DF089AC.TMPJump to behavior
            Source: SecuriteInfo.com..7135.dllStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: C:\Program Files\internet explorer\iexplore.exeFile read: C:\Users\desktop.iniJump to behavior
            Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com..7135.dll,Paragraphbell
            Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com..7135.dll'
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com..7135.dll',#1
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com..7135.dll,Paragraphbell
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com..7135.dll',#1
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com..7135.dll,Sharptwo
            Source: unknownProcess created: C:\Program Files\internet explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
            Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:4456 CREDAT:17410 /prefetch:2
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com..7135.dll',#1
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com..7135.dll,Paragraphbell
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com..7135.dll,Sharptwo
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com..7135.dll',#1
            Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:4456 CREDAT:17410 /prefetch:2
            Source: C:\Windows\SysWOW64\rundll32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}\InprocServer32
            Source: C:\Windows\SysWOW64\rundll32.exeAutomated click: OK
            Source: C:\Windows\SysWOW64\rundll32.exeAutomated click: OK
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeFile opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dll
            Source: SecuriteInfo.com..7135.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
            Source: SecuriteInfo.com..7135.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
            Source: SecuriteInfo.com..7135.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
            Source: SecuriteInfo.com..7135.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
            Source: SecuriteInfo.com..7135.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
            Source: SecuriteInfo.com..7135.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
            Source: SecuriteInfo.com..7135.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT
            Source: SecuriteInfo.com..7135.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
            Source: Binary string: c:\571\bar\Nature\industry\Son.pdb source: loaddll32.exe, rundll32.exe, SecuriteInfo.com..7135.dll
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E1C1F7C LoadLibraryA,GetProcAddress,
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E1C2200 push ecx; ret
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E1C2253 push ecx; ret
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E220FB5 push ecx; ret
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E1D0B16 pushad ; iretd
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E1CEBB5 pushfd ; iretd
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E1D2807 pushad ; retf
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E1D10D4 push 04853024h; retf
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6E1C2200 push ecx; ret
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6E1C2253 push ecx; ret
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6E220FB5 push ecx; ret
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6E1D0B16 pushad ; iretd
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6E1CEBB5 pushfd ; iretd
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6E1D2807 pushad ; retf
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6E1D10D4 push 04853024h; retf

            Hooking and other Techniques for Hiding and Protection:

            barindex
            Yara detected UrsnifShow sources
            Source: Yara matchFile source: 00000004.00000003.430352092.0000000005A58000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.464198146.0000000005A58000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.430424986.0000000005A58000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.430241635.0000000005A58000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.430313705.0000000005A58000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.430450163.0000000005A58000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.430406711.0000000005A58000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.430285928.0000000005A58000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.430372927.0000000005A58000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 5328, type: MEMORY
            Source: C:\Windows\SysWOW64\rundll32.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
            Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\loaddll32.exeLast function: Thread delayed
            Source: C:\Windows\System32\loaddll32.exeLast function: Thread delayed
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E238402 ___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,IsDebuggerPresent,OutputDebugStringW,RtlDecodePointer,
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E238402 ___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,IsDebuggerPresent,OutputDebugStringW,RtlDecodePointer,
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E1C1F7C LoadLibraryA,GetProcAddress,
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E297188 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E2970BE mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E296CC5 push dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6E297188 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6E2970BE mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6E296CC5 push dword ptr fs:[00000030h]
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E225139 GetProcessHeap,
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E225EA1 SetUnhandledExceptionFilter,
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E225ED2 SetUnhandledExceptionFilter,UnhandledExceptionFilter,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6E225EA1 SetUnhandledExceptionFilter,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6E225ED2 SetUnhandledExceptionFilter,UnhandledExceptionFilter,
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com..7135.dll',#1
            Source: loaddll32.exe, 00000000.00000002.460172900.0000000000CD0000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.461520126.0000000003680000.00000002.00000001.sdmpBinary or memory string: Program Manager
            Source: loaddll32.exe, 00000000.00000002.460172900.0000000000CD0000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.461520126.0000000003680000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
            Source: loaddll32.exe, 00000000.00000002.460172900.0000000000CD0000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.461520126.0000000003680000.00000002.00000001.sdmpBinary or memory string: Progman
            Source: loaddll32.exe, 00000000.00000002.460172900.0000000000CD0000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.461520126.0000000003680000.00000002.00000001.sdmpBinary or memory string: Progmanlock
            Source: C:\Windows\System32\loaddll32.exeCode function: GetLocaleInfoA,GetSystemDefaultUILanguage,VerLanguageNameA,
            Source: C:\Windows\System32\loaddll32.exeCode function: _LcidFromHexString,GetLocaleInfoW,_TestDefaultLanguage,
            Source: C:\Windows\System32\loaddll32.exeCode function: _GetPrimaryLen,EnumSystemLocalesW,
            Source: C:\Windows\System32\loaddll32.exeCode function: _GetPrimaryLen,EnumSystemLocalesW,
            Source: C:\Windows\System32\loaddll32.exeCode function: _LcidFromHexString,GetLocaleInfoW,GetLocaleInfoW,__wcsnicmp,GetLocaleInfoW,_TestDefaultLanguage,
            Source: C:\Windows\System32\loaddll32.exeCode function: EnumSystemLocalesW,
            Source: C:\Windows\System32\loaddll32.exeCode function: GetLocaleInfoW,
            Source: C:\Windows\System32\loaddll32.exeCode function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoA_stat,
            Source: C:\Windows\System32\loaddll32.exeCode function: ___crtGetLocaleInfoA,GetLastError,___crtGetLocaleInfoA,__calloc_crt,___crtGetLocaleInfoA,__calloc_crt,_free,_free,__calloc_crt,_free,__invoke_watson,
            Source: C:\Windows\System32\loaddll32.exeCode function: EnumSystemLocalesW,
            Source: C:\Windows\System32\loaddll32.exeCode function: _wcscmp,_wcscmp,GetLocaleInfoW,GetLocaleInfoW,GetACP,
            Source: C:\Windows\System32\loaddll32.exeCode function: GetLocaleInfoW,_GetPrimaryLen,
            Source: C:\Windows\System32\loaddll32.exeCode function: _TranslateName,_GetLocaleNameFromLangCountry,_GetLocaleNameFromLanguage,_TranslateName,_GetLocaleNameFromLangCountry,_GetLocaleNameFromLanguage,_GetLocaleNameFromDefault,IsValidCodePage,_wcschr,_wcschr,__itow_s,__invoke_watson,_LcidFromHexString,GetLocaleInfoW,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoA,GetSystemDefaultUILanguage,VerLanguageNameA,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: _LcidFromHexString,GetLocaleInfoW,_TestDefaultLanguage,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: _GetPrimaryLen,EnumSystemLocalesW,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: _GetPrimaryLen,EnumSystemLocalesW,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: _LcidFromHexString,GetLocaleInfoW,GetLocaleInfoW,__wcsnicmp,GetLocaleInfoW,_TestDefaultLanguage,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: EnumSystemLocalesW,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoW,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoA_stat,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: ___crtGetLocaleInfoA,GetLastError,___crtGetLocaleInfoA,__calloc_crt,___crtGetLocaleInfoA,__calloc_crt,_free,_free,__calloc_crt,_free,__invoke_watson,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: EnumSystemLocalesW,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: _wcscmp,_wcscmp,GetLocaleInfoW,GetLocaleInfoW,GetACP,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoW,_GetPrimaryLen,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: _TranslateName,_GetLocaleNameFromLangCountry,_GetLocaleNameFromLanguage,_TranslateName,_GetLocaleNameFromLangCountry,_GetLocaleNameFromLanguage,_GetLocaleNameFromDefault,IsValidCodePage,_wcschr,_wcschr,__itow_s,__invoke_watson,_LcidFromHexString,GetLocaleInfoW,
            Source: C:\Windows\SysWOW64\rundll32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion InstallDate
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E1C1C7D SetThreadPriority,GetSystemTime,SwitchToThread,Sleep,GetLongPathNameW,GetLongPathNameW,GetLongPathNameW,WaitForSingleObject,GetExitCodeThread,CloseHandle,GetLastError,GetLastError,
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E1C1F10 CreateEventA,GetVersion,GetCurrentProcessId,OpenProcess,GetLastError,
            Source: C:\Windows\SysWOW64\rundll32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

            Stealing of Sensitive Information:

            barindex
            Yara detected UrsnifShow sources
            Source: Yara matchFile source: 00000004.00000003.430352092.0000000005A58000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.464198146.0000000005A58000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.430424986.0000000005A58000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.430241635.0000000005A58000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.430313705.0000000005A58000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.430450163.0000000005A58000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.430406711.0000000005A58000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.430285928.0000000005A58000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.430372927.0000000005A58000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 5328, type: MEMORY

            Remote Access Functionality:

            barindex
            Yara detected UrsnifShow sources
            Source: Yara matchFile source: 00000004.00000003.430352092.0000000005A58000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.464198146.0000000005A58000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.430424986.0000000005A58000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.430241635.0000000005A58000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.430313705.0000000005A58000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.430450163.0000000005A58000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.430406711.0000000005A58000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.430285928.0000000005A58000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000003.430372927.0000000005A58000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 5328, type: MEMORY

            Mitre Att&ck Matrix

            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            Valid AccountsWindows Management Instrumentation1Path InterceptionProcess Injection12Masquerading1Input Capture1System Time Discovery1Remote ServicesInput Capture1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
            Default AccountsNative API1Boot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsProcess Injection12LSASS MemoryQuery Registry1Remote Desktop ProtocolArchive Collected Data1Exfiltration Over BluetoothIngress Tool Transfer3Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Deobfuscate/Decode Files or Information1Security Account ManagerSecurity Software Discovery3SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationNon-Application Layer Protocol3Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
            Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Obfuscated Files or Information2NTDSProcess Discovery1Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol3SIM Card SwapCarrier Billing Fraud
            Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptRundll321LSA SecretsFile and Directory Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
            Replication Through Removable MediaLaunchdRc.commonRc.commonSteganographyCached Domain CredentialsSystem Information Discovery24VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features

            Behavior Graph

            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 signatures2 2 Behavior Graph ID: 432910 Sample: SecuriteInfo.com..7135.20767 Startdate: 10/06/2021 Architecture: WINDOWS Score: 76 25 Multi AV Scanner detection for domain / URL 2->25 27 Found malware configuration 2->27 29 Antivirus detection for URL or domain 2->29 31 Yara detected  Ursnif 2->31 7 loaddll32.exe 1 2->7         started        9 iexplore.exe 2 60 2->9         started        process3 process4 11 rundll32.exe 7->11         started        14 cmd.exe 1 7->14         started        16 rundll32.exe 7->16         started        18 iexplore.exe 39 9->18         started        dnsIp5 33 Writes registry values via WMI 11->33 21 rundll32.exe 14->21         started        23 authd.feronok.com 185.233.80.31, 49748, 49749, 80 SUPERSERVERSDATACENTERRU Russian Federation 18->23 signatures6 process7

            Screenshots

            Thumbnails

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.

            windows-stand

            Antivirus, Machine Learning and Genetic Malware Detection

            Initial Sample

            SourceDetectionScannerLabelLink
            SecuriteInfo.com..7135.dll4%VirustotalBrowse
            SecuriteInfo.com..7135.dll4%ReversingLabs

            Dropped Files

            No Antivirus matches

            Unpacked PE Files

            SourceDetectionScannerLabelLinkDownload
            5.2.rundll32.exe.4540000.1.unpack100%AviraHEUR/AGEN.1108168Download File
            4.2.rundll32.exe.3190000.1.unpack100%AviraHEUR/AGEN.1108168Download File

            Domains

            SourceDetectionScannerLabelLink
            authd.feronok.com11%VirustotalBrowse

            URLs

            SourceDetectionScannerLabelLink
            http://authd.feronok.com/INsgiuDpuLw85PPWCNwmsmw/LyIcaMF9BW/RDuesN3193oziv6jZ/21yngUSJZxlB/5U99_2BFq100%Avira URL Cloudmalware
            http://authd.feronok.com/INsgiuDpuLw85PPWCNwmsmw/LyIcaMF9BW/RDuesN3193oziv6jZ/21yngUSJZxlB/5U99_2BFq39/C9yL3XEqjGdzvV/F4wrCEliEtubK_2BQN3v0/mpD0sYBWj1_2BOoZ/MhYNZMroasOcyRm/Y7cgiiYGTmIYClS1bt/R_2BrGpes/V0WKbm6yczDyoBvOW06Z/_2FVUJ_2BtBEMJQ2mZ0/eqMRxCIXxJwUIjVA7qTLlE/f_2FwC5tmUPbh/r76jmp6x/obp7g2x_2BpjxmD9q5fMhKl/Y1cOMUM_2F/x9ahGBENuH7csdR7_/2FySnpeWZizz/XD203nXIqoX/COsoX4qlT56/jcBfJkpo100%Avira URL Cloudmalware

            Domains and IPs

            Contacted Domains

            NameIPActiveMaliciousAntivirus DetectionReputation
            authd.feronok.com
            185.233.80.31
            truetrueunknown

            Contacted URLs

            NameMaliciousAntivirus DetectionReputation
            http://authd.feronok.com/INsgiuDpuLw85PPWCNwmsmw/LyIcaMF9BW/RDuesN3193oziv6jZ/21yngUSJZxlB/5U99_2BFq39/C9yL3XEqjGdzvV/F4wrCEliEtubK_2BQN3v0/mpD0sYBWj1_2BOoZ/MhYNZMroasOcyRm/Y7cgiiYGTmIYClS1bt/R_2BrGpes/V0WKbm6yczDyoBvOW06Z/_2FVUJ_2BtBEMJQ2mZ0/eqMRxCIXxJwUIjVA7qTLlE/f_2FwC5tmUPbh/r76jmp6x/obp7g2x_2BpjxmD9q5fMhKl/Y1cOMUM_2F/x9ahGBENuH7csdR7_/2FySnpeWZizz/XD203nXIqoX/COsoX4qlT56/jcBfJkpotrue
            • Avira URL Cloud: malware
            unknown

            URLs from Memory and Binaries

            NameSourceMaliciousAntivirus DetectionReputation
            http://authd.feronok.com/INsgiuDpuLw85PPWCNwmsmw/LyIcaMF9BW/RDuesN3193oziv6jZ/21yngUSJZxlB/5U99_2BFq{FA4B99A6-CA78-11EB-90E4-ECF4BB862DED}.dat.23.dr, ~DF80E1CCC67DA5CD93.TMP.23.drtrue
            • Avira URL Cloud: malware
            unknown

            Contacted IPs

            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs

            Public

            IPDomainCountryFlagASNASN NameMalicious
            185.233.80.31
            authd.feronok.comRussian Federation
            50113SUPERSERVERSDATACENTERRUtrue

            General Information

            Joe Sandbox Version:32.0.0 Black Diamond
            Analysis ID:432910
            Start date:10.06.2021
            Start time:22:48:16
            Joe Sandbox Product:CloudBasic
            Overall analysis duration:0h 6m 35s
            Hypervisor based Inspection enabled:false
            Report type:light
            Sample file name:SecuriteInfo.com..7135.20767 (renamed file extension from 20767 to dll)
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
            Number of analysed new started processes analysed:27
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • HDC enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Detection:MAL
            Classification:mal76.troj.winDLL@12/13@1/1
            EGA Information:Failed
            HDC Information:
            • Successful, ratio: 4.7% (good quality ratio 4.5%)
            • Quality average: 79.6%
            • Quality standard deviation: 28.5%
            HCA Information:
            • Successful, ratio: 71%
            • Number of executed functions: 0
            • Number of non-executed functions: 0
            Cookbook Comments:
            • Adjust boot time
            • Enable AMSI
            Warnings:
            Show All
            • Exclude process from analysis (whitelisted): taskhostw.exe, audiodg.exe, BackgroundTransferHost.exe, ielowutil.exe, RuntimeBroker.exe, backgroundTaskHost.exe, SgrmBroker.exe, WmiPrvSE.exe, svchost.exe, UsoClient.exe
            • Excluded IPs from analysis (whitelisted): 204.79.197.200, 13.107.21.200, 104.43.193.48, 13.88.21.125, 23.57.80.111, 205.185.216.10, 205.185.216.42, 51.103.5.159, 40.126.31.143, 40.126.31.6, 40.126.31.4, 20.190.159.132, 20.190.159.136, 40.126.31.135, 40.126.31.8, 40.126.31.139, 20.50.102.62, 20.54.26.129, 20.82.210.154, 92.122.213.247, 92.122.213.194, 88.221.62.148
            • Excluded domains from analysis (whitelisted): iris-de-prod-azsc-neu-b.northeurope.cloudapp.azure.com, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, e11290.dspg.akamaiedge.net, wns.notify.trafficmanager.net, go.microsoft.com, login.live.com, www-bing-com.dual-a-0001.a-msedge.net, audownload.windowsupdate.nsatc.net, au.download.windowsupdate.com.hwcdn.net, arc.trafficmanager.net, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, au-bg-shim.trafficmanager.net, www.bing.com, client.wns.windows.com, fs.microsoft.com, dual-a-0001.a-msedge.net, ris-prod.trafficmanager.net, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, cds.d2s7q6s2.hwcdn.net, www.tm.a.prd.aadg.akadns.net, iris-de-prod-azsc-uks.uksouth.cloudapp.azure.com, login.msa.msidentity.com, skypedataprdcolcus15.cloudapp.net, ris.api.iris.microsoft.com, a-0001.a-afdentry.net.trafficmanager.net, blobcollector.events.data.trafficmanager.net, go.microsoft.com.edgekey.net, skypedataprdcolwus15.cloudapp.net, www.tm.lg.prod.aadmsa.trafficmanager.net
            • Not all processes where analyzed, report is missing behavior information
            • Report size getting too big, too many NtOpenKeyEx calls found.

            Simulations

            Behavior and APIs

            TimeTypeDescription
            22:50:25API Interceptor1x Sleep call for process: rundll32.exe modified

            Joe Sandbox View / Context

            IPs

            No context

            Domains

            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
            authd.feronok.comHP7cjYBnlS.dllGet hashmaliciousBrowse
            • 47.254.173.212
            1.dllGet hashmaliciousBrowse
            • 34.95.62.189
            racial.dllGet hashmaliciousBrowse
            • 35.199.86.111
            racial.dllGet hashmaliciousBrowse
            • 35.199.86.111
            racial.dllGet hashmaliciousBrowse
            • 35.199.86.111
            racial.dllGet hashmaliciousBrowse
            • 35.199.86.111
            racial.dllGet hashmaliciousBrowse
            • 35.199.86.111
            racial.dllGet hashmaliciousBrowse
            • 35.199.86.111
            info_71411.vbsGet hashmaliciousBrowse
            • 35.199.86.111
            racial.dllGet hashmaliciousBrowse
            • 35.199.86.111
            racial.dllGet hashmaliciousBrowse
            • 35.199.86.111
            soft.dllGet hashmaliciousBrowse
            • 35.199.86.111
            racial.dllGet hashmaliciousBrowse
            • 35.199.86.111
            racial.dllGet hashmaliciousBrowse
            • 35.199.86.111
            Know.dllGet hashmaliciousBrowse
            • 35.199.86.111

            ASN

            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
            SUPERSERVERSDATACENTERRU2 - #U041c#U0412#U0421 #U0423#U041a#U0420#U0410#U0407#U041d#U0418 - signed - (8uy).cplGet hashmaliciousBrowse
            • 46.17.104.120
            2 - #U041c#U0412#U0421 #U0423#U041a#U0420#U0410#U0407#U041d#U0418 - signed - (8uy).cplGet hashmaliciousBrowse
            • 46.17.104.120
            8s5P8pdch5.exeGet hashmaliciousBrowse
            • 185.233.81.8
            0CUmIGFwMf.exeGet hashmaliciousBrowse
            • 185.232.170.88
            y1e1FV1UWs.exeGet hashmaliciousBrowse
            • 185.232.170.88
            091WJ1BnKf.exeGet hashmaliciousBrowse
            • 45.144.64.230
            svchost10.exeGet hashmaliciousBrowse
            • 45.144.65.97
            index.exeGet hashmaliciousBrowse
            • 185.232.170.29
            NATO_042021-1re4.docGet hashmaliciousBrowse
            • 185.232.170.29
            8UOSzpl9E1.exeGet hashmaliciousBrowse
            • 185.180.231.94
            UWbkgpAQuS.exeGet hashmaliciousBrowse
            • 147.78.67.95
            9MyoOYNXKe.exeGet hashmaliciousBrowse
            • 185.195.27.245
            LJiW5jWnuA.exeGet hashmaliciousBrowse
            • 147.78.67.95
            tFqfAPK60I.exeGet hashmaliciousBrowse
            • 147.78.67.95
            svchost.exeGet hashmaliciousBrowse
            • 45.144.65.97
            m2.exeGet hashmaliciousBrowse
            • 45.144.64.88
            2.exeGet hashmaliciousBrowse
            • 45.144.64.88
            m4.exeGet hashmaliciousBrowse
            • 45.144.64.88
            4.exeGet hashmaliciousBrowse
            • 45.144.64.88
            YoOr2QDrm0.exeGet hashmaliciousBrowse
            • 185.255.132.7

            JA3 Fingerprints

            No context

            Dropped Files

            No context

            Created / dropped Files

            C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{FA4B99A4-CA78-11EB-90E4-ECF4BB862DED}.dat
            Process:C:\Program Files\internet explorer\iexplore.exe
            File Type:Microsoft Word Document
            Category:dropped
            Size (bytes):29272
            Entropy (8bit):1.7724986024352953
            Encrypted:false
            SSDEEP:384:rQt0h0zs0zNa0zNIy0zNIul0zNaMuXr0zuaMuB:Dm
            MD5:BB2CC967C3C6EDA44A69083EB767C117
            SHA1:DAC9F7F3B92917522249C29E661CF7ACF78847C2
            SHA-256:88AB7F2C9FAD173136BD458EB3523BCED520C008EC9208F4D665934C16BEED5C
            SHA-512:BFF393D1FF52DB8EB802AB96DB705CC3D05026156EEC92801C6697D1B383E8C051F85E313BD60EA73782CD1A63D1E7CE356E986C60CBA5C44C633E148EFC161A
            Malicious:false
            Reputation:low
            Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
            C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{FA4B99A6-CA78-11EB-90E4-ECF4BB862DED}.dat
            Process:C:\Program Files\internet explorer\iexplore.exe
            File Type:Microsoft Word Document
            Category:dropped
            Size (bytes):28148
            Entropy (8bit):1.924668728375893
            Encrypted:false
            SSDEEP:192:rVZ6Qe64kHjx25W6MOFL7fj4vd1L75Q7fje7MA:rb3pFDgo7SLjSHLyjAn
            MD5:14655AB8FC1D47B0C5998041E1946C6F
            SHA1:BF8356158D90869DE775D3EBAC100BD449C872E9
            SHA-256:4C387E86AA95C86898A353AAAF18A2E2BF0CA0A6F686641D280D5032A840DEFB
            SHA-512:078C5676E57A790B2BEC74462AFF7BECCEECB6C659F8BD6272D5A49C63DB56C335732DBC10E8210260CD09AD9C8CC7E839E36B2E5A0BEE4881BF4293701B439F
            Malicious:false
            Reputation:low
            Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
            C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0W10PBUV\down[1]
            Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
            File Type:PNG image data, 15 x 15, 8-bit colormap, non-interlaced
            Category:downloaded
            Size (bytes):748
            Entropy (8bit):7.249606135668305
            Encrypted:false
            SSDEEP:12:6v/7/2QeZ7HVJ6o6yiq1p4tSQfAVFcm6R2HkZuU4fB4CsY4NJlrvMezoW2uONroc:GeZ6oLiqkbDuU4fqzTrvMeBBlE
            MD5:C4F558C4C8B56858F15C09037CD6625A
            SHA1:EE497CC061D6A7A59BB66DEFEA65F9A8145BA240
            SHA-256:39E7DE847C9F731EAA72338AD9053217B957859DE27B50B6474EC42971530781
            SHA-512:D60353D3FBEA2992D96795BA30B20727B022B9164B2094B922921D33CA7CE1634713693AC191F8F5708954544F7648F4840BCD5B62CB6A032EF292A8B0E52A44
            Malicious:false
            Reputation:high, very likely benign file
            IE Cache URL:res://ieframe.dll/down.png
            Preview: .PNG........IHDR...............ex....PLTE....W..W..W..W..W..W..W..W..W..W..W..W..W.U..............W..W.!Y.#Z.$\.'].<r.=s.P..Q..Q..U..o..p..r..x..z..~.............................................b.............................................................................................................................................................................................................$..s...7tRNS.a.o(,.s....e......q*...................................F.Z....IDATx^%.S..@.C..jm.mTk...m.?|;.y..S....F.t...,.......D.>..LpX=f.M...H4........=...=..xy.[h..7....7.....<.q.kH....#+....I..z.....'.ksC...X<.+..J>....%3BmqaV...h..Z._.:<.Y_jG...vN^.<>.Nu.u@.....M....?...1D.m~)s8..&....IEND.B`.
            C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0W10PBUV\errorPageStrings[1]
            Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
            File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
            Category:downloaded
            Size (bytes):4720
            Entropy (8bit):5.164796203267696
            Encrypted:false
            SSDEEP:96:z9UUiqRxqH211CUIRgRLnRynjZbRXkRPRk6C87Apsat/5/+mhPcF+5g+mOQb7A9o:JsUOG1yNlX6ZzWpHOWLia16Cb7bk
            MD5:D65EC06F21C379C87040B83CC1ABAC6B
            SHA1:208D0A0BB775661758394BE7E4AFB18357E46C8B
            SHA-256:A1270E90CEA31B46432EC44731BF4400D22B38EB2855326BF934FE8F1B169A4F
            SHA-512:8A166D26B49A5D95AEA49BC649E5EA58786A2191F4D2ADAC6F5FBB7523940CE4482D6A2502AA870A931224F215CB2010A8C9B99A2C1820150E4D365CAB28299E
            Malicious:false
            Reputation:high, very likely benign file
            IE Cache URL:res://ieframe.dll/errorPageStrings.js
            Preview: .//Split out for localization...var L_GOBACK_TEXT = "Go back to the previous page.";..var L_REFRESH_TEXT = "Refresh the page.";..var L_MOREINFO_TEXT = "More information";..var L_OFFLINE_USERS_TEXT = "For offline users";..var L_RELOAD_TEXT = "Retype the address.";..var L_HIDE_HOTKEYS_TEXT = "Hide tab shortcuts";..var L_SHOW_HOTKEYS_TEXT = "Show more tab shortcuts";..var L_CONNECTION_OFF_TEXT = "You are not connected to the Internet. Check your Internet connection.";..var L_CONNECTION_ON_TEXT = "It appears you are connected to the Internet, but you might want to try to reconnect to the Internet.";....//used by invalidcert.js and hstscerterror.js..var L_CertUnknownCA_TEXT = "Your PC doesn\u2019t trust this website\u2019s security certificate.";..var L_CertExpired_TEXT = "The website\u2019s security certificate is not yet valid or has expired.";..var L_CertCNMismatch_TEXT = "The hostname in the website\u2019s security certificate differs from the website you are trying to visit.";..var L
            C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\MEEXW4H4\ErrorPageTemplate[1]
            Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
            File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
            Category:downloaded
            Size (bytes):2168
            Entropy (8bit):5.207912016937144
            Encrypted:false
            SSDEEP:24:5+j5xU5k5N0ndgvoyeP0yyiyQCDr3nowMVworDtX3orKxWxDnCMA0da+hieyuSQK:5Q5K5k5pvFehWrrarrZIrHd3FIQfOS6
            MD5:F4FE1CB77E758E1BA56B8A8EC20417C5
            SHA1:F4EDA06901EDB98633A686B11D02F4925F827BF0
            SHA-256:8D018639281B33DA8EB3CE0B21D11E1D414E59024C3689F92BE8904EB5779B5F
            SHA-512:62514AB345B6648C5442200A8E9530DFB88A0355E262069E0A694289C39A4A1C06C6143E5961074BFAC219949102A416C09733F24E8468984B96843DC222B436
            Malicious:false
            Reputation:high, very likely benign file
            IE Cache URL:res://ieframe.dll/ErrorPageTemplate.css
            Preview: .body..{...font-family: "Segoe UI", "verdana", "arial";...background-image: url(background_gradient.jpg);...background-repeat: repeat-x;...background-color: #E8EAEF;...margin-top: 20px;...margin-left: 20px;...color: #575757;..}....body.securityError..{...font-family: "Segoe UI", "verdana" , "Arial";...background-image: url(background_gradient_red.jpg);...background-repeat: repeat-x;...background-color: #E8EAEF;...margin-top: 20px;...margin-left: 20px;..}....body.tabInfo..{...background-image: none;...background-color: #F4F4F4;..}.. ..a..{...color: rgb(19,112,171);.font-size: 1em;...font-weight: normal;...text-decoration: none;...margin-left: 0px;...vertical-align: top;..}....a:link, a:visited..{...color: rgb(19,112,171);...text-decoration: none;...vertical-align: top;..}....a:hover..{...color: rgb(7,74,229);...text-decoration: underline;..}....p..{...font-size: 0.9em;..}.....h1 /* used for Title */..{...color: #4465A2;...font-size: 1.1em;...font-weight: normal;...vertical-align
            C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\MEEXW4H4\bullet[1]
            Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
            File Type:PNG image data, 15 x 15, 8-bit colormap, non-interlaced
            Category:downloaded
            Size (bytes):447
            Entropy (8bit):7.304718288205936
            Encrypted:false
            SSDEEP:12:6v/71Cyt/JNTWxGdr+kZDWO7+4dKIv0b1GKuxu+R:/yBJNTqsSk9BTwE05su+R
            MD5:26F971D87CA00E23BD2D064524AEF838
            SHA1:7440BEFF2F4F8FABC9315608A13BF26CABAD27D9
            SHA-256:1D8E5FD3C1FD384C0A7507E7283C7FE8F65015E521B84569132A7EABEDC9D41D
            SHA-512:C62EB51BE301BB96C80539D66A73CD17CA2021D5D816233853A37DB72E04050271E581CC99652F3D8469B390003CA6C62DAD2A9D57164C620B7777AE99AA1B15
            Malicious:false
            IE Cache URL:res://ieframe.dll/bullet.png
            Preview: .PNG........IHDR...............ex....PLTE...(EkFRp&@e&@e)Af)AgANjBNjDNjDNj2Vv-Xz-Y{3XyC\}E_.2j.3l.8p.7q.;j.;l.Zj.\l.5o.7q.<..aw.<..dz.E...........1..@.7..~.....9..:.....A..B..E..9..:..a..c..b..g.#M.%O.#r.#s.%y.2..4..+..-..?..@..;..p..s...G..H..M.........z`....#tRNS................................../,....mIDATx^..C..`.......S....y'...05...|..k.X......*`.F.K....JQ..u.<.}.. ..[U..m....'r%.......yn.`.7F..).5..b..rX.T.....IEND.B`.
            C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PSUEOSZZ\background_gradient[1]
            Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
            File Type:JPEG image data, JFIF standard 1.02, aspect ratio, density 100x100, segment length 16, baseline, precision 8, 1x800, frames 3
            Category:downloaded
            Size (bytes):453
            Entropy (8bit):5.019973044227213
            Encrypted:false
            SSDEEP:6:3llVuiPjlXJYhg5suRd8PImMo23C/kHrJ8yA/NIeYoWg78C/vTFvbKLAh3:V/XPYhiPRd8j7+9LoIrobtHTdbKi
            MD5:20F0110ED5E4E0D5384A496E4880139B
            SHA1:51F5FC61D8BF19100DF0F8AADAA57FCD9C086255
            SHA-256:1471693BE91E53C2640FE7BAEECBC624530B088444222D93F2815DFCE1865D5B
            SHA-512:5F52C117E346111D99D3B642926139178A80B9EC03147C00E27F07AAB47FE38E9319FE983444F3E0E36DEF1E86DD7C56C25E44B14EFDC3F13B45EDEDA064DB5A
            Malicious:false
            IE Cache URL:res://ieframe.dll/background_gradient.jpg
            Preview: ......JFIF.....d.d......Ducky.......P......Adobe.d................................................................................................................................................. ...............W..............................................................Qa.................................?......%.....x......s...Z.......j.T.wz.6...X.@... V.3tM...P@.u.%...m..D.25...T...F.........p......A..........BP..qD.(.........ntH.@......h?..
            C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PSUEOSZZ\httpErrorPagesScripts[1]
            Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
            File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
            Category:downloaded
            Size (bytes):12105
            Entropy (8bit):5.451485481468043
            Encrypted:false
            SSDEEP:192:x20iniOciwd1BtvjrG8tAGGGVWnvyJVUrUiki3ayimi5ezLCvJG1gwm3z:xPini/i+1Btvjy815ZVUwiki3ayimi5f
            MD5:9234071287E637F85D721463C488704C
            SHA1:CCA09B1E0FBA38BA29D3972ED8DCECEFDEF8C152
            SHA-256:65CC039890C7CEB927CE40F6F199D74E49B8058C3F8A6E22E8F916AD90EA8649
            SHA-512:87D691987E7A2F69AD8605F35F94241AB7E68AD4F55AD384F1F0D40DC59FFD1432C758123661EE39443D624C881B01DCD228A67AFB8700FE5E66FC794A6C0384
            Malicious:false
            IE Cache URL:res://ieframe.dll/httpErrorPagesScripts.js
            Preview: ...function isExternalUrlSafeForNavigation(urlStr)..{..var regEx = new RegExp("^(http(s?)|ftp|file)://", "i");..return regEx.exec(urlStr);..}..function clickRefresh()..{..var location = window.location.href;..var poundIndex = location.indexOf('#');..if (poundIndex != -1 && poundIndex+1 < location.length && isExternalUrlSafeForNavigation(location.substring(poundIndex+1)))..{..window.location.replace(location.substring(poundIndex+1));..}..}..function navCancelInit()..{..var location = window.location.href;..var poundIndex = location.indexOf('#');..if (poundIndex != -1 && poundIndex+1 < location.length && isExternalUrlSafeForNavigation(location.substring(poundIndex+1)))..{..var bElement = document.createElement("A");..bElement.innerText = L_REFRESH_TEXT;..bElement.href = 'javascript:clickRefresh()';..navCancelContainer.appendChild(bElement);..}..else..{..var textNode = document.createTextNode(L_RELOAD_TEXT);..navCancelContainer.appendChild(textNode);..}..}..function getDisplayValue(elem
            C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WJ8I2OL4\http_404[1]
            Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
            File Type:HTML document, UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
            Category:downloaded
            Size (bytes):6495
            Entropy (8bit):3.8998802417135856
            Encrypted:false
            SSDEEP:48:up4d0yV4VkBXvLutC5N9J/1a5TI7kZ3GUXn3GFa7K083GJehBu01kptk7KwyBwpM:uKp6yN9JaKktZX36a7x05hwW7RM
            MD5:F65C729DC2D457B7A1093813F1253192
            SHA1:5006C9B50108CF582BE308411B157574E5A893FC
            SHA-256:B82BFB6FA37FD5D56AC7C00536F150C0F244C81F1FC2D4FEFBBDC5E175C71B4F
            SHA-512:717AFF18F105F342103D36270D642CC17BD9921FF0DBC87E3E3C2D897F490F4ECFAB29CF998D6D99C4951C3EABB356FE759C3483A33704CE9FCC1F546EBCBBC7
            Malicious:false
            IE Cache URL:res://ieframe.dll/http_404.htm
            Preview: .<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">....<html dir="ltr">.... <head>.. <link rel="stylesheet" type="text/css" href="ErrorPageTemplate.css">.... <meta http-equiv="Content-Type" content="text/html; charset=UTF-8">.... <title>HTTP 404 Not Found</title>.... <script src="errorPageStrings.js" language="javascript" type="text/javascript">.. </script>.. <script src="httpErrorPagesScripts.js" language="javascript" type="text/javascript">.. </script>.. </head>.... <body onLoad="javascript:initHomepage(); expandCollapse('infoBlockID', true); initGoBack(); initMoreInfo('infoBlockID');">.... <table width="730" cellpadding="0" cellspacing="0" border="0">.... Error title -->.. <tr>.. <td id="infoIconAlign" width="60" align="left" valign="top" rowspan="2">.. <img src="info_48.png" id="infoIcon" alt="Info icon">..
            C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WJ8I2OL4\info_48[1]
            Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
            File Type:PNG image data, 47 x 48, 8-bit/color RGBA, non-interlaced
            Category:downloaded
            Size (bytes):4113
            Entropy (8bit):7.9370830126943375
            Encrypted:false
            SSDEEP:96:WNTJL8szf79M8FUjE39KJoUUuJPnvmKacs6Uq7qDMj1XPL:WNrzFoQSJPnvzs6rL
            MD5:5565250FCC163AA3A79F0B746416CE69
            SHA1:B97CC66471FCDEE07D0EE36C7FB03F342C231F8F
            SHA-256:51129C6C98A82EA491F89857C31146ECEC14C4AF184517450A7A20C699C84859
            SHA-512:E60EA153B0FECE4D311769391D3B763B14B9A140105A36A13DAD23C2906735EAAB9092236DEB8C68EF078E8864D6E288BEF7EF1731C1E9F1AD9B0170B95AC134
            Malicious:false
            IE Cache URL:res://ieframe.dll/info_48.png
            Preview: .PNG........IHDR.../...0.......#.....IDATx^...pUU..{....KB........!....F......jp.Q.......Vg.F..m.Q....{...,m.@.56D...&$d!.<..}....s..K9.....{............[./<..T..I.I..JR)).9.k.N.%.E.W^}....Po..............X..;.=.P......./...+...9./..s.....9..|.......*.7v.`..V.....-^.$S[[[......K..z......3..3....5 ...0.."/n/.c...&.{.ht..?....A..I{.n.....|....t......N}..%.v...:.E..i....`....a.k.mg.LX..fcFU.fO-..YEfd.}...~."......}l$....^.re..'^X..*}.?.^U.G..... .30...X......f[.l0.P`..KC...[..[..6....~..i..Q.|;x..T ..........s.5...n+.0..;...H#.2..#.M..m[^3x&E.Ya..\K..{[..M..g...yf0..~....M.]7..ZZZ:..a.O.G64]....9..l[..a....N,,.h......5...f*.y...}...BX{.G^...?.c.......s^..P.(..G...t.0.:.X.DCs.....]vf...py).........x..>-..Be.a...G...Y!...z...g.{....d.s.o.....%.x......R.W.....Z.b,....!..6Ub....U.qY(/v..m.a...4.`Qr\.E.G..a)..t..e.j.W........C<.1.....c..l1w....]3%....tR;.,..3..-.NW.5...t..H..h..D..b......M....)B..2J...)..o..m..M.t....wn./....+Wv....xkg..*..
            C:\Users\user\AppData\Local\Temp\JavaDeployReg.log
            Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
            File Type:ASCII text, with CRLF line terminators
            Category:dropped
            Size (bytes):89
            Entropy (8bit):4.357175050784355
            Encrypted:false
            SSDEEP:3:oVXUbUvXkIi8JOGXnEbUvXkINLun:o9UwvXkBqEwvXkB
            MD5:178A01ED015C601590BBEC374F63BA4E
            SHA1:60027051467C6F595B05EE96B3F462A5347A1386
            SHA-256:008E01001F033E85A43FB4222C9D49A536730F53E20CA5B6000FF2208C7EB11C
            SHA-512:18190A74EFB6054F400B89B40F692A27D1D2367631EE8BA6043A6A1D7B306EDF6F47F8EC16E9A96C278885F4EF08487FAB28323A86FF5A06857BF93034C91E7A
            Malicious:false
            Preview: [2021/06/10 22:50:53.017] Latest deploy version: ..[2021/06/10 22:50:53.017] 11.211.2 ..
            C:\Users\user\AppData\Local\Temp\~DF00D3A9B95DF089AC.TMP
            Process:C:\Program Files\internet explorer\iexplore.exe
            File Type:data
            Category:dropped
            Size (bytes):12933
            Entropy (8bit):0.4112137916224424
            Encrypted:false
            SSDEEP:24:c9lLh9lLh9lIn9lIn9lo0/VF9lo0/P9lW0/b/l/cX/m/l/cp/k/o:kBqoI0I020zNkXuNkpMA
            MD5:05B04A30B7A55791319C4F71771CF16A
            SHA1:2C6404B854340AB4675377DA01707CD122A8B0CF
            SHA-256:589607C9B026909DF546D1EC625408F36A64662A30971317540738E6FF09F154
            SHA-512:7822A4FB8477CA20F1F15787DAB449BEBE39D8C97E1A855008A9FF79386906CFE6195165750F11AE7C79FC0A54ECDCF47AC8EE106E4E8898EBB09F935DAD0353
            Malicious:false
            Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
            C:\Users\user\AppData\Local\Temp\~DF80E1CCC67DA5CD93.TMP
            Process:C:\Program Files\internet explorer\iexplore.exe
            File Type:data
            Category:dropped
            Size (bytes):40169
            Entropy (8bit):0.6776367657920739
            Encrypted:false
            SSDEEP:192:kBqoxKAuqR+eYSbIZL7fj4rL7fj48L7fj4p:kBqoxKAuqR+eYSbIZLj6LjFLjm
            MD5:BB6D7F6068DA37F8EAC557E8224E9DA4
            SHA1:FB0E3897C467217EF4BCD46E8E22723E28A734C9
            SHA-256:2E68651AAB4451D174A526B8DC3C253810F8DBF4848C0AECBAAF4E167E84D035
            SHA-512:A5D8DF746DFABA3F048E3A63EA10773395670DBAEDFEF3E49E6684ED73374C55E0B6670D39D8635CBE97E5DE606E3D8307854624D3E3542999E49FA732EF6946
            Malicious:false
            Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................

            Static File Info

            General

            File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
            Entropy (8bit):5.674513513570937
            TrID:
            • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
            • Generic Win/DOS Executable (2004/3) 0.20%
            • DOS Executable Generic (2002/1) 0.20%
            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
            File name:SecuriteInfo.com..7135.dll
            File size:886272
            MD5:5ba7ac7fa4f9e831679832b6cc22aee8
            SHA1:813df24ac22c2666b28bc3e7fb9bd1eef2a7f395
            SHA256:d2c19ac3eace29239bf919c442556abf782da5953325ee6b2626482fbf442f29
            SHA512:a345b0749d5745640fd7908cdb142960da22ac6029bafddc0666d11eb5033756c3cfde84d2fb94dcbf418df40d2ce49ec4a18b919714402b7045b96e619a27cd
            SSDEEP:24576:Ydk22FB2tfgklpVM5HdBcvLrXmF63WaSc:YdkDT29zaVg3WaSc
            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......~];V:<U.:<U.:<U.....><U.....;<U.7n..<<U.7n..+<U.7n..+<U.7n..,<U.....1<U.:<T.c=U.7n...<U.7n..;<U.7n..;<U.7n..;<U.Rich:<U........

            File Icon

            Icon Hash:74f0e4ecccdce0e4

            Static PE Info

            General

            Entrypoint:0x105cab1
            Entrypoint Section:.text
            Digitally signed:false
            Imagebase:0x1000000
            Subsystem:windows gui
            Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT
            Time Stamp:0x538835D4 [Fri May 30 07:40:04 2014 UTC]
            TLS Callbacks:
            CLR (.Net) Version:
            OS Version Major:6
            OS Version Minor:0
            File Version Major:6
            File Version Minor:0
            Subsystem Version Major:6
            Subsystem Version Minor:0
            Import Hash:1bcf1a17040e578ef3e6fe0888b5a0a4

            Entrypoint Preview

            Instruction
            push ebp
            mov ebp, esp
            cmp dword ptr [ebp+0Ch], 01h
            jne 00007FD318806407h
            call 00007FD31880F0BFh
            push dword ptr [ebp+10h]
            push dword ptr [ebp+0Ch]
            push dword ptr [ebp+08h]
            call 00007FD31880640Ch
            add esp, 0Ch
            pop ebp
            retn 000Ch
            push 0000000Ch
            push 010D37B8h
            call 00007FD31880A895h
            xor eax, eax
            inc eax
            mov esi, dword ptr [ebp+0Ch]
            test esi, esi
            jne 00007FD31880640Eh
            cmp dword ptr [010D5608h], esi
            je 00007FD3188064EAh
            and dword ptr [ebp-04h], 00000000h
            cmp esi, 01h
            je 00007FD318806407h
            cmp esi, 02h
            jne 00007FD318806437h
            mov ecx, dword ptr [010028F0h]
            test ecx, ecx
            je 00007FD31880640Eh
            push dword ptr [ebp+10h]
            push esi
            push dword ptr [ebp+08h]
            call ecx
            mov dword ptr [ebp-1Ch], eax
            test eax, eax
            je 00007FD3188064B7h
            push dword ptr [ebp+10h]
            push esi
            push dword ptr [ebp+08h]
            call 00007FD318806216h
            mov dword ptr [ebp-1Ch], eax
            test eax, eax
            je 00007FD3188064A0h
            mov ebx, dword ptr [ebp+10h]
            push ebx
            push esi
            push dword ptr [ebp+08h]
            call 00007FD31882841Fh
            mov edi, eax
            mov dword ptr [ebp-1Ch], edi
            cmp esi, 01h
            jne 00007FD31880642Ah
            test edi, edi
            jne 00007FD318806426h
            push ebx
            push eax
            push dword ptr [ebp+08h]
            call 00007FD318828407h
            push ebx
            push edi
            push dword ptr [ebp+08h]
            call 00007FD3188061DCh
            mov eax, dword ptr [010028F0h]
            test eax, eax
            je 00007FD318806409h
            push ebx
            push edi
            push dword ptr [ebp+08h]
            call eax

            Rich Headers

            Programming Language:
            • [EXP] VS2013 build 21005
            • [IMP] VS2013 build 21005
            • [ C ] VS2013 build 21005
            • [C++] VS2013 build 21005
            • [LNK] VS2013 build 21005
            • [ASM] VS2013 build 21005
            • [RES] VS2013 build 21005

            Data Directories

            NameVirtual AddressVirtual Size Is in Section
            IMAGE_DIRECTORY_ENTRY_EXPORT0xd3e200x5b.text
            IMAGE_DIRECTORY_ENTRY_IMPORT0xec1e80x50.idata
            IMAGE_DIRECTORY_ENTRY_RESOURCE0xed0000x518.rsrc
            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
            IMAGE_DIRECTORY_ENTRY_BASERELOC0xee0000x270c.reloc
            IMAGE_DIRECTORY_ENTRY_DEBUG0x10500x38.text
            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x59ae00x40.text
            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IAT0xec0000x1e8.idata
            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

            Sections

            NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
            .text0x10000xd2e7b0xd3000False0.615229746742data5.64357184369IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            .data0xd40000x1782c0x1600False0.347478693182data3.91320304109IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
            .idata0xec0000xd0e0xe00False0.430803571429data5.29299062625IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .rsrc0xed0000x5180x600False0.381510416667data2.93540035637IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .reloc0xee0000x270c0x2800False0.7810546875data6.65386529971IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

            Resources

            NameRVASizeTypeLanguageCountry
            RT_STRING0xed3c00x156dataEnglishUnited States
            RT_VERSION0xed0a00x320dataEnglishUnited States

            Imports

            DLLImport
            KERNEL32.dllGetSystemTime, GetTempPathA, GetVersionExA, GetCurrentDirectoryA, VirtualProtect, FindFirstChangeNotificationA, GetModuleHandleA, LockResource, GetEnvironmentVariableA, GetVolumeInformationA, OpenProcess, GetDateFormatA, QueryPerformanceCounter, FindResourceA, CreateFileA, EncodePointer, DecodePointer, GetCommandLineA, GetCurrentThreadId, RaiseException, RtlUnwind, IsDebuggerPresent, IsProcessorFeaturePresent, EnterCriticalSection, LeaveCriticalSection, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, GetLastError, SetLastError, GetCurrentThread, MultiByteToWideChar, ExitProcess, GetModuleHandleExW, GetProcAddress, AreFileApisANSI, WideCharToMultiByte, HeapSize, HeapFree, HeapAlloc, GetProcessHeap, GetStdHandle, GetFileType, DeleteCriticalSection, GetStartupInfoW, GetModuleFileNameA, GetCurrentProcessId, GetSystemTimeAsFileTime, GetEnvironmentStringsW, FreeEnvironmentStringsW, UnhandledExceptionFilter, SetUnhandledExceptionFilter, InitializeCriticalSectionAndSpinCount, CreateEventW, Sleep, GetCurrentProcess, TerminateProcess, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetTickCount, GetModuleHandleW, CreateSemaphoreW, FatalAppExitA, GetStringTypeW, GetLocaleInfoW, IsValidLocale, GetUserDefaultLCID, EnumSystemLocalesW, GetDateFormatW, GetTimeFormatW, CompareStringW, LCMapStringW, WriteFile, GetModuleFileNameW, SetConsoleCtrlHandler, FreeLibrary, LoadLibraryExW, HeapReAlloc, FlushFileBuffers, GetConsoleCP, GetConsoleMode, SetFilePointerEx, OutputDebugStringW, CloseHandle, SetStdHandle, WriteConsoleW, CreateFileW
            ADVAPI32.dllRegisterServiceCtrlHandlerA, RegOpenKeyExA, LookupPrivilegeValueA, SetSecurityDescriptorDacl, InitializeSecurityDescriptor, CreateServiceA, RegQueryValueExA, RegSetValueExA, GetTokenInformation, RegCloseKey, AdjustTokenPrivileges, RegEnumKeyA, ControlService, FreeSid, SetServiceStatus, CloseServiceHandle, OpenProcessToken, StartServiceCtrlDispatcherA, DeleteService, SetEntriesInAclA, AllocateAndInitializeSid
            COMCTL32.dllDestroyPropertySheetPage, ImageList_SetOverlayImage, ImageList_Destroy, ImageList_Add, CreateToolbarEx, PropertySheetA

            Exports

            NameOrdinalAddress
            Paragraphbell10x107f020
            Sharptwo20x107e9f0

            Version Infos

            DescriptionData
            LegalCopyright Too far Corporation. All rights reserved
            InternalNameCaptain apple
            FileVersion0.3.8.218 Couldbaby
            CompanyNameToo far Corporation
            ProductNameToo far Feelsaw
            ProductVersion0.3.8.218
            FileDescriptionToo far Feelsaw
            OriginalFilenameSon.dll
            Translation0x0409 0x04b0

            Possible Origin

            Language of compilation systemCountry where language is spokenMap
            EnglishUnited States

            Network Behavior

            Network Port Distribution

            TCP Packets

            TimestampSource PortDest PortSource IPDest IP
            Jun 10, 2021 22:50:53.780543089 CEST4974880192.168.2.3185.233.80.31
            Jun 10, 2021 22:50:53.781248093 CEST4974980192.168.2.3185.233.80.31
            Jun 10, 2021 22:50:53.824312925 CEST8049748185.233.80.31192.168.2.3
            Jun 10, 2021 22:50:53.824376106 CEST8049749185.233.80.31192.168.2.3
            Jun 10, 2021 22:50:53.824549913 CEST4974880192.168.2.3185.233.80.31
            Jun 10, 2021 22:50:53.824747086 CEST4974980192.168.2.3185.233.80.31
            Jun 10, 2021 22:50:53.826638937 CEST4974880192.168.2.3185.233.80.31
            Jun 10, 2021 22:50:53.914755106 CEST8049748185.233.80.31192.168.2.3
            Jun 10, 2021 22:50:54.366725922 CEST8049748185.233.80.31192.168.2.3
            Jun 10, 2021 22:50:54.366909027 CEST4974880192.168.2.3185.233.80.31
            Jun 10, 2021 22:50:54.368772030 CEST4974880192.168.2.3185.233.80.31
            Jun 10, 2021 22:50:54.411453009 CEST8049748185.233.80.31192.168.2.3
            Jun 10, 2021 22:50:56.019642115 CEST4974980192.168.2.3185.233.80.31

            UDP Packets

            TimestampSource PortDest PortSource IPDest IP
            Jun 10, 2021 22:48:53.817890882 CEST53601008.8.8.8192.168.2.3
            Jun 10, 2021 22:48:54.483824015 CEST5319553192.168.2.38.8.8.8
            Jun 10, 2021 22:48:54.544796944 CEST53531958.8.8.8192.168.2.3
            Jun 10, 2021 22:48:55.423032045 CEST5014153192.168.2.38.8.8.8
            Jun 10, 2021 22:48:55.473484039 CEST53501418.8.8.8192.168.2.3
            Jun 10, 2021 22:48:56.358875036 CEST5302353192.168.2.38.8.8.8
            Jun 10, 2021 22:48:56.409626007 CEST53530238.8.8.8192.168.2.3
            Jun 10, 2021 22:48:57.242597103 CEST4956353192.168.2.38.8.8.8
            Jun 10, 2021 22:48:57.296063900 CEST53495638.8.8.8192.168.2.3
            Jun 10, 2021 22:48:58.168931007 CEST5135253192.168.2.38.8.8.8
            Jun 10, 2021 22:48:58.219233036 CEST53513528.8.8.8192.168.2.3
            Jun 10, 2021 22:48:59.328725100 CEST5934953192.168.2.38.8.8.8
            Jun 10, 2021 22:48:59.378864050 CEST53593498.8.8.8192.168.2.3
            Jun 10, 2021 22:49:00.218533039 CEST5708453192.168.2.38.8.8.8
            Jun 10, 2021 22:49:00.268677950 CEST53570848.8.8.8192.168.2.3
            Jun 10, 2021 22:49:01.448626995 CEST5882353192.168.2.38.8.8.8
            Jun 10, 2021 22:49:01.498785973 CEST53588238.8.8.8192.168.2.3
            Jun 10, 2021 22:49:42.156111002 CEST5756853192.168.2.38.8.8.8
            Jun 10, 2021 22:49:42.245258093 CEST53575688.8.8.8192.168.2.3
            Jun 10, 2021 22:49:51.908005953 CEST5054053192.168.2.38.8.8.8
            Jun 10, 2021 22:49:51.971951962 CEST53505408.8.8.8192.168.2.3
            Jun 10, 2021 22:49:53.067883968 CEST5436653192.168.2.38.8.8.8
            Jun 10, 2021 22:49:53.137187004 CEST53543668.8.8.8192.168.2.3
            Jun 10, 2021 22:50:05.169744968 CEST5303453192.168.2.38.8.8.8
            Jun 10, 2021 22:50:05.254148006 CEST53530348.8.8.8192.168.2.3
            Jun 10, 2021 22:50:08.353154898 CEST5776253192.168.2.38.8.8.8
            Jun 10, 2021 22:50:08.421194077 CEST53577628.8.8.8192.168.2.3
            Jun 10, 2021 22:50:27.186853886 CEST5543553192.168.2.38.8.8.8
            Jun 10, 2021 22:50:27.253873110 CEST53554358.8.8.8192.168.2.3
            Jun 10, 2021 22:50:44.954138041 CEST5071353192.168.2.38.8.8.8
            Jun 10, 2021 22:50:45.027595043 CEST53507138.8.8.8192.168.2.3
            Jun 10, 2021 22:50:48.981637001 CEST5613253192.168.2.38.8.8.8
            Jun 10, 2021 22:50:49.042764902 CEST53561328.8.8.8192.168.2.3
            Jun 10, 2021 22:50:52.026371956 CEST5898753192.168.2.38.8.8.8
            Jun 10, 2021 22:50:52.089713097 CEST53589878.8.8.8192.168.2.3
            Jun 10, 2021 22:50:53.411917925 CEST5657953192.168.2.38.8.8.8
            Jun 10, 2021 22:50:53.769078016 CEST53565798.8.8.8192.168.2.3
            Jun 10, 2021 22:50:58.710943937 CEST6063353192.168.2.38.8.8.8
            Jun 10, 2021 22:50:58.782740116 CEST53606338.8.8.8192.168.2.3
            Jun 10, 2021 22:50:59.185627937 CEST6129253192.168.2.38.8.8.8
            Jun 10, 2021 22:50:59.262943983 CEST53612928.8.8.8192.168.2.3

            DNS Queries

            TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
            Jun 10, 2021 22:50:53.411917925 CEST192.168.2.38.8.8.80x6f8cStandard query (0)authd.feronok.comA (IP address)IN (0x0001)

            DNS Answers

            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
            Jun 10, 2021 22:50:05.254148006 CEST8.8.8.8192.168.2.30xc900No error (0)prda.aadg.msidentity.comwww.tm.a.prd.aadg.akadns.netCNAME (Canonical name)IN (0x0001)
            Jun 10, 2021 22:50:53.769078016 CEST8.8.8.8192.168.2.30x6f8cNo error (0)authd.feronok.com185.233.80.31A (IP address)IN (0x0001)

            HTTP Request Dependency Graph

            • authd.feronok.com

            HTTP Packets

            Session IDSource IPSource PortDestination IPDestination PortProcess
            0192.168.2.349748185.233.80.3180C:\Program Files (x86)\Internet Explorer\iexplore.exe
            TimestampkBytes transferredDirectionData
            Jun 10, 2021 22:50:53.826638937 CEST4316OUTGET /INsgiuDpuLw85PPWCNwmsmw/LyIcaMF9BW/RDuesN3193oziv6jZ/21yngUSJZxlB/5U99_2BFq39/C9yL3XEqjGdzvV/F4wrCEliEtubK_2BQN3v0/mpD0sYBWj1_2BOoZ/MhYNZMroasOcyRm/Y7cgiiYGTmIYClS1bt/R_2BrGpes/V0WKbm6yczDyoBvOW06Z/_2FVUJ_2BtBEMJQ2mZ0/eqMRxCIXxJwUIjVA7qTLlE/f_2FwC5tmUPbh/r76jmp6x/obp7g2x_2BpjxmD9q5fMhKl/Y1cOMUM_2F/x9ahGBENuH7csdR7_/2FySnpeWZizz/XD203nXIqoX/COsoX4qlT56/jcBfJkpo HTTP/1.1
            Accept: text/html, application/xhtml+xml, image/jxr, */*
            Accept-Language: en-US
            User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like Gecko
            Accept-Encoding: gzip, deflate
            Host: authd.feronok.com
            Connection: Keep-Alive
            Jun 10, 2021 22:50:54.366725922 CEST4317INHTTP/1.1 404 Not Found
            Server: nginx
            Date: Thu, 10 Jun 2021 20:50:54 GMT
            Content-Type: text/html; charset=utf-8
            Transfer-Encoding: chunked
            Connection: close
            Vary: Accept-Encoding
            Content-Encoding: gzip
            Data Raw: 36 61 0d 0a 1f 8b 08 00 00 00 00 00 00 03 b3 c9 28 c9 cd b1 e3 e5 b2 c9 48 4d 4c b1 b3 29 c9 2c c9 49 b5 33 31 30 51 f0 cb 2f 51 70 cb 2f cd 4b b1 d1 87 08 da e8 83 95 00 95 26 e5 a7 54 82 e8 e4 d4 bc 92 d4 22 3b 9b 0c 43 74 1d 40 11 1b 7d a8 34 c8 6c a0 22 28 2f 2f 3d 33 af 02 59 4e 1f 66 9a 3e d4 25 00 0b d9 61 33 92 00 00 00 0d 0a 30 0d 0a 0d 0a
            Data Ascii: 6a(HML),I310Q/Qp/K&T";Ct@}4l"(//=3YNf>%a30


            Code Manipulations

            Statistics

            Behavior

            Click to jump to process

            System Behavior

            General

            Start time:22:49:00
            Start date:10/06/2021
            Path:C:\Windows\System32\loaddll32.exe
            Wow64 process (32bit):true
            Commandline:loaddll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com..7135.dll'
            Imagebase:0x830000
            File size:116736 bytes
            MD5 hash:542795ADF7CC08EFCF675D65310596E8
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high

            General

            Start time:22:49:00
            Start date:10/06/2021
            Path:C:\Windows\SysWOW64\cmd.exe
            Wow64 process (32bit):true
            Commandline:cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com..7135.dll',#1
            Imagebase:0xbd0000
            File size:232960 bytes
            MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high

            General

            Start time:22:49:01
            Start date:10/06/2021
            Path:C:\Windows\SysWOW64\rundll32.exe
            Wow64 process (32bit):true
            Commandline:rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com..7135.dll,Paragraphbell
            Imagebase:0x220000
            File size:61952 bytes
            MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high

            General

            Start time:22:49:01
            Start date:10/06/2021
            Path:C:\Windows\SysWOW64\rundll32.exe
            Wow64 process (32bit):true
            Commandline:rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com..7135.dll',#1
            Imagebase:0x220000
            File size:61952 bytes
            MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Yara matches:
            • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000004.00000003.430352092.0000000005A58000.00000004.00000040.sdmp, Author: Joe Security
            • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000004.00000002.464198146.0000000005A58000.00000004.00000040.sdmp, Author: Joe Security
            • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000004.00000003.430424986.0000000005A58000.00000004.00000040.sdmp, Author: Joe Security
            • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000004.00000003.430241635.0000000005A58000.00000004.00000040.sdmp, Author: Joe Security
            • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000004.00000003.430313705.0000000005A58000.00000004.00000040.sdmp, Author: Joe Security
            • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000004.00000003.430450163.0000000005A58000.00000004.00000040.sdmp, Author: Joe Security
            • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000004.00000003.430406711.0000000005A58000.00000004.00000040.sdmp, Author: Joe Security
            • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000004.00000003.430285928.0000000005A58000.00000004.00000040.sdmp, Author: Joe Security
            • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000004.00000003.430372927.0000000005A58000.00000004.00000040.sdmp, Author: Joe Security
            Reputation:high

            General

            Start time:22:49:05
            Start date:10/06/2021
            Path:C:\Windows\SysWOW64\rundll32.exe
            Wow64 process (32bit):true
            Commandline:rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com..7135.dll,Sharptwo
            Imagebase:0x220000
            File size:61952 bytes
            MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high

            General

            Start time:22:50:51
            Start date:10/06/2021
            Path:C:\Program Files\internet explorer\iexplore.exe
            Wow64 process (32bit):false
            Commandline:'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
            Imagebase:0x7ff7dea60000
            File size:823560 bytes
            MD5 hash:6465CB92B25A7BC1DF8E01D8AC5E7596
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high

            General

            Start time:22:50:52
            Start date:10/06/2021
            Path:C:\Program Files (x86)\Internet Explorer\iexplore.exe
            Wow64 process (32bit):true
            Commandline:'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:4456 CREDAT:17410 /prefetch:2
            Imagebase:0x8e0000
            File size:822536 bytes
            MD5 hash:071277CC2E3DF41EEEA8013E2AB58D5A
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high

            Disassembly

            Code Analysis

            Reset < >