Loading ...

Play interactive tourEdit tour

Windows Analysis Report a3.exe

Overview

General Information

Sample Name:a3.exe
Analysis ID:498881
MD5:0cc6d274cd84b593210168f51fcd38cd
SHA1:666fc3963609f4aff528b9a32f7516feebaa6ddf
SHA256:a3bdb9880bf419f2023e4015545c6c72835dbc5c68cd14fd81d35220bf9449fa
Tags:exe
Infos:

Most interesting Screenshot:

Detection

Ursnif
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Multi AV Scanner detection for submitted file
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Yara detected Ursnif
Writes or reads registry keys via WMI
Writes registry values via WMI
Machine Learning detection for sample
Uses 32bit PE files
Antivirus or Machine Learning detection for unpacked file
Contains functionality to query locales information (e.g. system language)
Uses code obfuscation techniques (call, push, ret)
Queries the installation date of Windows
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to call native functions
IP address seen in connection with other malware

Classification

Process Tree

  • System is w10x64
  • a3.exe (PID: 6712 cmdline: 'C:\Users\user\Desktop\a3.exe' MD5: 0CC6D274CD84B593210168F51FCD38CD)
  • iexplore.exe (PID: 6308 cmdline: 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding MD5: 6465CB92B25A7BC1DF8E01D8AC5E7596)
    • iexplore.exe (PID: 4596 cmdline: 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6308 CREDAT:17410 /prefetch:2 MD5: 071277CC2E3DF41EEEA8013E2AB58D5A)
  • cleanup

Malware Configuration

Threatname: Ursnif

{"lang_id": "RU, CN", "RSA Public Key": "vM/iQI7/pNgGz6lvtI6TzQegGf2XOLfA1qF/UUWP33fhMhAMf4GRSOJmruKfOpClZgy8d4EH5nDffMSHLLCNtrR+dtN+DP25KSbfLihidE/SjbLI0hsotYZGCDBmkB8RgNy5kRipILXyv4cW0eYiLVm2e5VaCkdKBqotkaZ6t0ybzDTZn1t0o5nqHQOYtQRW", "c2_domain": ["api5.feen007.at/webstore"], "botnet": "3500", "server": "550", "serpent_key": "IpNvMMQa29KhBf3e", "sleep_time": "10", "CONF_TIMEOUT": "20", "SetWaitableTimer_value": "10", "dga_base_url": "constitution.org/usdeclar.txt", "dga_tld": "com ru org", "DGA_count": "10"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000000.00000003.357686500.0000000005E78000.00000004.00000040.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
    00000000.00000002.578224187.0000000005629000.00000004.00000040.sdmpJoeSecurity_Ursnif_1Yara detected UrsnifJoe Security
      00000000.00000003.357510029.0000000005E78000.00000004.00000040.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
        00000000.00000003.357882018.0000000005E78000.00000004.00000040.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
          00000000.00000003.357642343.0000000005E78000.00000004.00000040.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
            Click to see the 6 entries

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            0.2.a3.exe.56294a0.3.raw.unpackJoeSecurity_Ursnif_1Yara detected UrsnifJoe Security
              0.2.a3.exe.4f60000.2.unpackJoeSecurity_Ursnif_1Yara detected UrsnifJoe Security

                Sigma Overview

                No Sigma rule has matched

                Jbx Signature Overview

                Click to jump to signature section

                Show All Signature Results

                AV Detection:

                barindex
                Antivirus / Scanner detection for submitted sampleShow sources
                Source: a3.exeAvira: detected
                Found malware configurationShow sources
                Source: 00000000.00000002.576428660.0000000003410000.00000040.00000001.sdmpMalware Configuration Extractor: Ursnif {"lang_id": "RU, CN", "RSA Public Key": "vM/iQI7/pNgGz6lvtI6TzQegGf2XOLfA1qF/UUWP33fhMhAMf4GRSOJmruKfOpClZgy8d4EH5nDffMSHLLCNtrR+dtN+DP25KSbfLihidE/SjbLI0hsotYZGCDBmkB8RgNy5kRipILXyv4cW0eYiLVm2e5VaCkdKBqotkaZ6t0ybzDTZn1t0o5nqHQOYtQRW", "c2_domain": ["api5.feen007.at/webstore"], "botnet": "3500", "server": "550", "serpent_key": "IpNvMMQa29KhBf3e", "sleep_time": "10", "CONF_TIMEOUT": "20", "SetWaitableTimer_value": "10", "dga_base_url": "constitution.org/usdeclar.txt", "dga_tld": "com ru org", "DGA_count": "10"}
                Multi AV Scanner detection for submitted fileShow sources
                Source: a3.exeVirustotal: Detection: 79%Perma Link
                Source: a3.exeReversingLabs: Detection: 89%
                Machine Learning detection for sampleShow sources
                Source: a3.exeJoe Sandbox ML: detected
                Source: 0.2.a3.exe.400000.0.unpackAvira: Label: TR/Crypt.ZPACK.Gen
                Source: 0.0.a3.exe.400000.0.unpackAvira: Label: TR/Crypt.Agent.dffnu
                Source: 0.3.a3.exe.4e00000.0.unpackAvira: Label: TR/Patched.Ren.Gen
                Source: 0.2.a3.exe.3410e50.1.unpackAvira: Label: TR/Patched.Ren.Gen

                Compliance:

                barindex
                Detected unpacking (overwrites its own PE header)Show sources
                Source: C:\Users\user\Desktop\a3.exeUnpacked PE file: 0.2.a3.exe.400000.0.unpack
                Source: a3.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, RELOCS_STRIPPED
                Source: C:\Users\user\Desktop\a3.exeFile opened: C:\Windows\SysWOW64\msvcr100.dll
                Source: C:\Users\user\Desktop\a3.exeCode function: 0_2_04F63EED Wow64EnableWow64FsRedirection,RtlAllocateHeap,RtlAllocateHeap,RtlAllocateHeap,memset,CreateFileA,GetFileTime,FindCloseChangeNotification,StrRChrA,lstrcat,FindFirstFileA,FindFirstFileA,CompareFileTime,CompareFileTime,FindClose,FindNextFileA,FindClose,FindFirstFileA,CompareFileTime,StrChrA,memcpy,FindNextFileA,FindClose,FindFirstFileA,CompareFileTime,FindClose,HeapFree,HeapFree,

                Networking:

                barindex
                Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
                Source: TrafficSnort IDS: 2033204 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F) 192.168.2.3:49751 -> 87.106.18.141:80
                Source: TrafficSnort IDS: 2033203 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B) 192.168.2.3:49751 -> 87.106.18.141:80
                Source: Joe Sandbox ViewASN Name: ONEANDONE-ASBrauerstrasse48DE ONEANDONE-ASBrauerstrasse48DE
                Source: Joe Sandbox ViewIP Address: 87.106.18.141 87.106.18.141
                Source: Joe Sandbox ViewIP Address: 87.106.18.141 87.106.18.141
                Source: msapplication.xml0.7.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.facebook.com/"/><date>0xdbe7901a,0x01d7bbd1</date><accdate>0xdbe7901a,0x01d7bbd1</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig> equals www.facebook.com (Facebook)
                Source: msapplication.xml0.7.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.facebook.com/"/><date>0xdbe7901a,0x01d7bbd1</date><accdate>0xdbe7901a,0x01d7bbd1</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Facebook.url"/></tile></msapplication></browserconfig> equals www.facebook.com (Facebook)
                Source: msapplication.xml5.7.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.twitter.com/"/><date>0xdbf84054,0x01d7bbd1</date><accdate>0xdbf84054,0x01d7bbd1</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig> equals www.twitter.com (Twitter)
                Source: msapplication.xml5.7.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.twitter.com/"/><date>0xdbf84054,0x01d7bbd1</date><accdate>0xdbf84054,0x01d7bbd1</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Twitter.url"/></tile></msapplication></browserconfig> equals www.twitter.com (Twitter)
                Source: msapplication.xml7.7.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.youtube.com/"/><date>0xdbf84054,0x01d7bbd1</date><accdate>0xdbf84054,0x01d7bbd1</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig> equals www.youtube.com (Youtube)
                Source: msapplication.xml7.7.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.youtube.com/"/><date>0xdbf84054,0x01d7bbd1</date><accdate>0xdbf84054,0x01d7bbd1</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Youtube.url"/></tile></msapplication></browserconfig> equals www.youtube.com (Youtube)
                Source: {063EC3E5-27C5-11EC-90E9-ECF4BB862DED}.dat.7.dr, ~DF1728008F459C4534.TMP.7.drString found in binary or memory: http://api5.feen007.at/webstore/DcjIiNGkOSL0_2FzFS0SI/7PtL4T1ixNrirqXI/ZpdUtfjmbk9XGDI/gk7_2BOWav_2F
                Source: msapplication.xml.7.drString found in binary or memory: http://www.amazon.com/
                Source: msapplication.xml1.7.drString found in binary or memory: http://www.google.com/
                Source: msapplication.xml2.7.drString found in binary or memory: http://www.live.com/
                Source: msapplication.xml3.7.drString found in binary or memory: http://www.nytimes.com/
                Source: msapplication.xml4.7.drString found in binary or memory: http://www.reddit.com/
                Source: msapplication.xml5.7.drString found in binary or memory: http://www.twitter.com/
                Source: msapplication.xml6.7.drString found in binary or memory: http://www.wikipedia.com/
                Source: msapplication.xml7.7.drString found in binary or memory: http://www.youtube.com/
                Source: unknownDNS traffic detected: queries for: api5.feen007.at
                Source: global trafficHTTP traffic detected: GET /webstore/DcjIiNGkOSL0_2FzFS0SI/7PtL4T1ixNrirqXI/ZpdUtfjmbk9XGDI/gk7_2BOWav_2FtIxdS/vSo3lpggS/jgk05AsnNx5dVlLwmu_2/FAFwkzA53QftC8xz3wT/fnjkouYQNR37gBMDH6qXvg/zMFbyF4s1JmGD/y5Fu3aSV/TmUAsAO_2BZNh80x_2FL9QD/SJCaUL6t8y/cM9WgnTGqUY3ueTtK/VgEDjaagDntZ/uB1lRFThucd/4921ywV6NYjMkC/jnp_2BoOlFuQm1snVe_0A/_0DPF5OO0IeFwPM_/2FxPK7FahYNj2AP/3bZ4D9BzvVH_2BCtQdVgfC/l HTTP/1.1Accept: text/html, application/xhtml+xml, image/jxr, */*Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateHost: api5.feen007.atConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /favicon.ico HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoHost: api5.feen007.atConnection: Keep-Alive

                Key, Mouse, Clipboard, Microphone and Screen Capturing:

                barindex
                Yara detected UrsnifShow sources
                Source: Yara matchFile source: 00000000.00000003.357686500.0000000005E78000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.357510029.0000000005E78000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.357882018.0000000005E78000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.357642343.0000000005E78000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.357596269.0000000005E78000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.357766814.0000000005E78000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.578307195.0000000005E78000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.357549475.0000000005E78000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.357827984.0000000005E78000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: a3.exe PID: 6712, type: MEMORYSTR
                Source: Yara matchFile source: 0.2.a3.exe.56294a0.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.a3.exe.4f60000.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.578224187.0000000005629000.00000004.00000040.sdmp, type: MEMORY

                E-Banking Fraud:

                barindex
                Yara detected UrsnifShow sources
                Source: Yara matchFile source: 00000000.00000003.357686500.0000000005E78000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.357510029.0000000005E78000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.357882018.0000000005E78000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.357642343.0000000005E78000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.357596269.0000000005E78000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.357766814.0000000005E78000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.578307195.0000000005E78000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.357549475.0000000005E78000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.357827984.0000000005E78000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: a3.exe PID: 6712, type: MEMORYSTR
                Source: Yara matchFile source: 0.2.a3.exe.56294a0.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.a3.exe.4f60000.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.578224187.0000000005629000.00000004.00000040.sdmp, type: MEMORY

                System Summary:

                barindex
                Writes or reads registry keys via WMIShow sources
                Source: C:\Users\user\Desktop\a3.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::GetStringValue
                Source: C:\Users\user\Desktop\a3.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetDWORDValue
                Source: C:\Users\user\Desktop\a3.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
                Source: C:\Users\user\Desktop\a3.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue
                Writes registry values via WMIShow sources
                Source: C:\Users\user\Desktop\a3.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetDWORDValue
                Source: C:\Users\user\Desktop\a3.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
                Source: C:\Users\user\Desktop\a3.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue
                Source: a3.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, RELOCS_STRIPPED
                Source: C:\Users\user\Desktop\a3.exeCode function: 0_2_04F6AEE4
                Source: C:\Users\user\Desktop\a3.exeCode function: 0_2_04F62D68
                Source: C:\Users\user\Desktop\a3.exeCode function: 0_2_0041C47A
                Source: C:\Users\user\Desktop\a3.exeCode function: 0_2_0041E35E
                Source: C:\Users\user\Desktop\a3.exeCode function: 0_2_0041CF02
                Source: C:\Users\user\Desktop\a3.exeCode function: 0_2_0041E980
                Source: C:\Users\user\Desktop\a3.exeCode function: 0_2_0041C9BE
                Source: C:\Users\user\Desktop\a3.exeCode function: 0_2_00401000 NtMapViewOfSection,
                Source: C:\Users\user\Desktop\a3.exeCode function: 0_2_00401147 GetProcAddress,NtCreateSection,memset,
                Source: C:\Users\user\Desktop\a3.exeCode function: 0_2_04F6104E NtOpenProcess,NtOpenProcessToken,NtQueryInformationToken,NtQueryInformationToken,NtQueryInformationToken,memcpy,NtClose,NtClose,
                Source: C:\Users\user\Desktop\a3.exeCode function: 0_2_04F6B105 NtQueryVirtualMemory,
                Source: a3.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                Source: a3.exeVirustotal: Detection: 79%
                Source: a3.exeReversingLabs: Detection: 89%
                Source: a3.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\a3.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                Source: C:\Users\user\Desktop\a3.exeCode function: 0_2_04F6365A CreateToolhelp32Snapshot,Process32First,Process32Next,CloseHandle,
                Source: unknownProcess created: C:\Users\user\Desktop\a3.exe 'C:\Users\user\Desktop\a3.exe'
                Source: unknownProcess created: C:\Program Files\internet explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
                Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6308 CREDAT:17410 /prefetch:2
                Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6308 CREDAT:17410 /prefetch:2
                Source: C:\Users\user\Desktop\a3.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}\InprocServer32
                Source: C:\Program Files\internet explorer\iexplore.exeFile created: C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\HighJump to behavior
                Source: C:\Program Files\internet explorer\iexplore.exeFile created: C:\Users\user\AppData\Local\Temp\~DF8F568B21079AA7B9.TMPJump to behavior
                Source: classification engineClassification label: mal100.troj.evad.winEXE@4/14@1/1
                Source: C:\Program Files\internet explorer\iexplore.exeFile read: C:\Users\desktop.iniJump to behavior
                Source: Window RecorderWindow detected: More than 3 window changes detected
                Source: C:\Users\user\Desktop\a3.exeFile opened: C:\Windows\SysWOW64\msvcr100.dll

                Data Obfuscation:

                barindex
                Detected unpacking (changes PE section rights)Show sources
                Source: C:\Users\user\Desktop\a3.exeUnpacked PE file: 0.2.a3.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.bss:W;.rsrc:R;.reloc:R;
                Detected unpacking (overwrites its own PE header)Show sources
                Source: C:\Users\user\Desktop\a3.exeUnpacked PE file: 0.2.a3.exe.400000.0.unpack
                Source: C:\Users\user\Desktop\a3.exeCode function: 0_2_04F6AED3 push ecx; ret
                Source: C:\Users\user\Desktop\a3.exeCode function: 0_2_04F6ABA0 push ecx; ret
                Source: initial sampleStatic PE information: section name: .text entropy: 7.38003707514

                Hooking and other Techniques for Hiding and Protection:

                barindex
                Yara detected UrsnifShow sources
                Source: Yara matchFile source: 00000000.00000003.357686500.0000000005E78000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.357510029.0000000005E78000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.357882018.0000000005E78000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.357642343.0000000005E78000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.357596269.0000000005E78000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.357766814.0000000005E78000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.578307195.0000000005E78000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.357549475.0000000005E78000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.357827984.0000000005E78000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: a3.exe PID: 6712, type: MEMORYSTR
                Source: Yara matchFile source: 0.2.a3.exe.56294a0.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.a3.exe.4f60000.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.578224187.0000000005629000.00000004.00000040.sdmp, type: MEMORY
                Source: C:\Users\user\Desktop\a3.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\a3.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\a3.exeLast function: Thread delayed
                Source: C:\Users\user\Desktop\a3.exeCode function: 0_2_04F63EED Wow64EnableWow64FsRedirection,RtlAllocateHeap,RtlAllocateHeap,RtlAllocateHeap,memset,CreateFileA,GetFileTime,FindCloseChangeNotification,StrRChrA,lstrcat,FindFirstFileA,FindFirstFileA,CompareFileTime,CompareFileTime,FindClose,FindNextFileA,FindClose,FindFirstFileA,CompareFileTime,StrChrA,memcpy,FindNextFileA,FindClose,FindFirstFileA,CompareFileTime,FindClose,HeapFree,HeapFree,
                Source: a3.exe, 00000000.00000002.577880943.00000000039F0000.00000002.00020000.sdmpBinary or memory string: Program Manager
                Source: a3.exe, 00000000.00000002.577880943.00000000039F0000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
                Source: a3.exe, 00000000.00000002.577880943.00000000039F0000.00000002.00020000.sdmpBinary or memory string: Progman
                Source: a3.exe, 00000000.00000002.577880943.00000000039F0000.00000002.00020000.sdmpBinary or memory string: Progmanlock
                Source: C:\Users\user\Desktop\a3.exeCode function: GetLocaleInfoA,GetSystemDefaultUILanguage,VerLanguageNameA,
                Source: C:\Users\user\Desktop\a3.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion InstallDate
                Source: C:\Users\user\Desktop\a3.exeCode function: 0_2_04F6660B cpuid
                Source: C:\Users\user\Desktop\a3.exeCode function: 0_2_00401A35 CreateEventA,GetVersion,GetCurrentProcessId,OpenProcess,GetLastError,
                Source: C:\Users\user\Desktop\a3.exeCode function: 0_2_00419FF0 LoadLibraryExA,CreateNamedPipeA,GetVersionExA,DeactivateActCtx,WriteFile,WritePrivateProfileStructA,IsDBCSLeadByteEx,SetFileApisToOEM,TlsGetValue,GetThreadPriority,
                Source: C:\Users\user\Desktop\a3.exeCode function: 0_2_00401497 GetSystemTimeAsFileTime,_aulldiv,_snwprintf,CreateFileMappingW,GetLastError,GetLastError,MapViewOfFile,GetLastError,CloseHandle,GetLastError,
                Source: C:\Users\user\Desktop\a3.exeCode function: 0_2_04F6660B wsprintfA,RtlAllocateHeap,GetUserNameW,RtlAllocateHeap,GetUserNameW,HeapFree,GetComputerNameW,GetComputerNameW,RtlAllocateHeap,GetComputerNameW,HeapFree,

                Stealing of Sensitive Information:

                barindex
                Yara detected UrsnifShow sources
                Source: Yara matchFile source: 00000000.00000003.357686500.0000000005E78000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.357510029.0000000005E78000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.357882018.0000000005E78000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.357642343.0000000005E78000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.357596269.0000000005E78000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.357766814.0000000005E78000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.578307195.0000000005E78000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.357549475.0000000005E78000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.357827984.0000000005E78000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: a3.exe PID: 6712, type: MEMORYSTR
                Source: Yara matchFile source: 0.2.a3.exe.56294a0.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.a3.exe.4f60000.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.578224187.0000000005629000.00000004.00000040.sdmp, type: MEMORY

                Remote Access Functionality:

                barindex
                Yara detected UrsnifShow sources
                Source: Yara matchFile source: 00000000.00000003.357686500.0000000005E78000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.357510029.0000000005E78000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.357882018.0000000005E78000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.357642343.0000000005E78000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.357596269.0000000005E78000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.357766814.0000000005E78000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.578307195.0000000005E78000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.357549475.0000000005E78000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.357827984.0000000005E78000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: a3.exe PID: 6712, type: MEMORYSTR
                Source: Yara matchFile source: 0.2.a3.exe.56294a0.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.a3.exe.4f60000.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.578224187.0000000005629000.00000004.00000040.sdmp, type: MEMORY

                Mitre Att&ck Matrix

                Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                Valid AccountsWindows Management Instrumentation2Path InterceptionProcess Injection3Masquerading1OS Credential DumpingSystem Time Discovery1Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsProcess Injection3LSASS MemoryProcess Discovery2Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothIngress Tool Transfer1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or Information2Security Account ManagerAccount Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationNon-Application Layer Protocol2Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Software Packing23NTDSSystem Owner/User Discovery1Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol2SIM Card SwapCarrier Billing Fraud
                Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA SecretsFile and Directory Discovery2SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                Replication Through Removable MediaLaunchdRc.commonRc.commonSteganographyCached Domain CredentialsSystem Information Discovery33VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features

                Behavior Graph

                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet

                Screenshots

                Thumbnails

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                windows-stand

                Antivirus, Machine Learning and Genetic Malware Detection

                Initial Sample

                SourceDetectionScannerLabelLink
                a3.exe79%VirustotalBrowse
                a3.exe89%ReversingLabsWin32.Trojan.MintDreidel
                a3.exe100%AviraTR/Crypt.Agent.dffnu
                a3.exe100%Joe Sandbox ML

                Dropped Files

                No Antivirus matches

                Unpacked PE Files

                SourceDetectionScannerLabelLinkDownload
                0.2.a3.exe.400000.0.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
                0.2.a3.exe.4f60000.2.unpack100%AviraHEUR/AGEN.1108168Download File
                0.0.a3.exe.400000.0.unpack100%AviraTR/Crypt.Agent.dffnuDownload File
                0.3.a3.exe.4e00000.0.unpack100%AviraTR/Patched.Ren.GenDownload File
                0.2.a3.exe.3410e50.1.unpack100%AviraTR/Patched.Ren.GenDownload File

                Domains

                SourceDetectionScannerLabelLink
                api5.feen007.at0%VirustotalBrowse
                windowsupdate.s.llnwi.net0%VirustotalBrowse

                URLs

                SourceDetectionScannerLabelLink
                http://api5.feen007.at/favicon.ico0%Avira URL Cloudsafe
                http://www.wikipedia.com/0%URL Reputationsafe
                http://api5.feen007.at/webstore/DcjIiNGkOSL0_2FzFS0SI/7PtL4T1ixNrirqXI/ZpdUtfjmbk9XGDI/gk7_2BOWav_2F0%Avira URL Cloudsafe

                Domains and IPs

                Contacted Domains

                NameIPActiveMaliciousAntivirus DetectionReputation
                api5.feen007.at
                87.106.18.141
                truetrueunknown
                windowsupdate.s.llnwi.net
                178.79.242.0
                truefalseunknown

                Contacted URLs

                NameMaliciousAntivirus DetectionReputation
                http://api5.feen007.at/favicon.icotrue
                • Avira URL Cloud: safe
                unknown

                URLs from Memory and Binaries

                NameSourceMaliciousAntivirus DetectionReputation
                http://www.wikipedia.com/msapplication.xml6.7.drfalse
                • URL Reputation: safe
                unknown
                http://www.amazon.com/msapplication.xml.7.drfalse
                  high
                  http://www.nytimes.com/msapplication.xml3.7.drfalse
                    high
                    http://www.live.com/msapplication.xml2.7.drfalse
                      high
                      http://api5.feen007.at/webstore/DcjIiNGkOSL0_2FzFS0SI/7PtL4T1ixNrirqXI/ZpdUtfjmbk9XGDI/gk7_2BOWav_2F{063EC3E5-27C5-11EC-90E9-ECF4BB862DED}.dat.7.dr, ~DF1728008F459C4534.TMP.7.drfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.reddit.com/msapplication.xml4.7.drfalse
                        high
                        http://www.twitter.com/msapplication.xml5.7.drfalse
                          high
                          http://www.youtube.com/msapplication.xml7.7.drfalse
                            high
                            http://www.google.com/msapplication.xml1.7.drfalse
                              high

                              Contacted IPs

                              • No. of IPs < 25%
                              • 25% < No. of IPs < 50%
                              • 50% < No. of IPs < 75%
                              • 75% < No. of IPs

                              Public

                              IPDomainCountryFlagASNASN NameMalicious
                              87.106.18.141
                              api5.feen007.atGermany
                              8560ONEANDONE-ASBrauerstrasse48DEtrue

                              General Information

                              Joe Sandbox Version:33.0.0 White Diamond
                              Analysis ID:498881
                              Start date:07.10.2021
                              Start time:16:18:07
                              Joe Sandbox Product:CloudBasic
                              Overall analysis duration:0h 6m 8s
                              Hypervisor based Inspection enabled:false
                              Report type:light
                              Sample file name:a3.exe
                              Cookbook file name:default.jbs
                              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                              Number of analysed new started processes analysed:23
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • HDC enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Detection:MAL
                              Classification:mal100.troj.evad.winEXE@4/14@1/1
                              EGA Information:Failed
                              HDC Information:
                              • Successful, ratio: 30.6% (good quality ratio 29.2%)
                              • Quality average: 80.6%
                              • Quality standard deviation: 27.7%
                              HCA Information:
                              • Successful, ratio: 70%
                              • Number of executed functions: 0
                              • Number of non-executed functions: 0
                              Cookbook Comments:
                              • Adjust boot time
                              • Enable AMSI
                              • Found application associated with file extension: .exe
                              Warnings:
                              Show All
                              • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, ielowutil.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, WmiPrvSE.exe, svchost.exe, wuapihost.exe
                              • Excluded IPs from analysis (whitelisted): 20.82.209.183, 104.94.89.6, 20.199.120.151, 20.49.150.241, 95.100.218.151, 95.100.218.79, 20.82.210.154, 2.20.178.24, 2.20.178.33, 152.199.19.161, 20.199.120.85, 20.54.110.249, 40.112.88.60, 52.251.79.25
                              • Excluded domains from analysis (whitelisted): storeedgefd.dsx.mp.microsoft.com.edgekey.net.globalredir.akadns.net, consumer-displaycatalogrp-aks2aks-useast.md.mp.microsoft.com.akadns.net, store-images.s-microsoft.com-c.edgekey.net, iris-de-prod-azsc-neu-b.northeurope.cloudapp.azure.com, a1449.dscg2.akamai.net, arc.msn.com, storeedgefd.xbetservices.akadns.net, e11290.dspg.akamaiedge.net, iecvlist.microsoft.com, e12564.dspb.akamaiedge.net, wns.notify.trafficmanager.net, go.microsoft.com, consumer-displaycatalogrp-aks2aks-europe.md.mp.microsoft.com.akadns.net, arc.trafficmanager.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, storeedgefd.dsx.mp.microsoft.com, iris-de-prod-azsc-neu.northeurope.cloudapp.azure.com, client.wns.windows.com, ie9comview.vo.msecnd.net, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, wu-shim.trafficmanager.net, neu-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, ris-prod.trafficmanager.net, asf-ris-prod-neu.northeurope.cloudapp.azure.com, eus2-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, settings-win.data.microsoft.com, ctldl.windowsupdate.com, storeedgefd.dsx.mp.microsoft.com.edgekey.net, settingsfd-geo.trafficmanager.net, ris.api.iris.microsoft.com, store-images.s-microsoft.com, go.microsoft.com.edgekey.net, displaycatalog-rp-useast.md.mp.microsoft.com.akadns.net, e16646.dscg.akamaiedge.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net, cs9.wpc.v0cdn.net
                              • Not all processes where analyzed, report is missing behavior information

                              Simulations

                              Behavior and APIs

                              No simulations

                              Joe Sandbox View / Context

                              IPs

                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                              87.106.18.141a04.dllGet hashmaliciousBrowse
                              • app10.laptok.at/favicon.ico
                              50.dllGet hashmaliciousBrowse
                              • api10.laptok.at/favicon.ico
                              08dVB7v4wB6w.vbsGet hashmaliciousBrowse
                              • chat.allager.at/jvassets/xI/t64.dat
                              http://far.gaploop.at/api1/m9Nm6sQ5MZ2/kV1dHuUchwgj0p/w9B514uuWuNRu_2Fovw1B/iJjn_2FjOcMhSdO6/hY1viFbhIYH_2BS/FrMYbmCHgkAwm_2Btu/e29igvEBi/gLOHtqdBI_2B3sibC3Cg/z_2F8IFoCH_2BWJVdUY/ri7hwzyuAx2q5RHXJmbXhc/ygopWPWJKwti5/IOOS1u46/4ZXFc4Ok4SPekiO7ot2QyT_/2FJdMyYfAP/7FTqw0rQZL_2B1pan/wh8ruTp3dham/UlLIzAZ_2Fn/esHGZHp93qljV_/0A_0DvFEgD08oveRu1RDL/3nPBhZLduxccr2_2/FS5iRLSxGBo44/0xUcGet hashmaliciousBrowse
                              • far.gaploop.at/api1/m9Nm6sQ5MZ2/kV1dHuUchwgj0p/favicon.ico
                              4EyIHmLYEBBs.vbsGet hashmaliciousBrowse
                              • chat.allager.at/jvassets/xI/t64.dat

                              Domains

                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                              windowsupdate.s.llnwi.netInquiry 001742021.docGet hashmaliciousBrowse
                              • 178.79.242.0
                              3Rby9Diztd.exeGet hashmaliciousBrowse
                              • 178.79.242.0
                              a04.dllGet hashmaliciousBrowse
                              • 178.79.242.0
                              0f.dllGet hashmaliciousBrowse
                              • 178.79.242.128
                              OR3ogRDyRh.exeGet hashmaliciousBrowse
                              • 178.79.242.0
                              KVx62u3gsv.exeGet hashmaliciousBrowse
                              • 178.79.242.128
                              rKQTea8DKe.exeGet hashmaliciousBrowse
                              • 178.79.242.0
                              NESMA RFQ EQUIPMENTS AND DOCUMENTS REQUIRED.docGet hashmaliciousBrowse
                              • 178.79.242.128
                              6dfce00750c09d7a9927dab4bed6b81a4043fab36fba5.exeGet hashmaliciousBrowse
                              • 178.79.242.128
                              GT09876545678.exeGet hashmaliciousBrowse
                              • 178.79.242.0
                              REVISED PI 7-10-2021.xlsxGet hashmaliciousBrowse
                              • 178.79.242.128
                              FACTURA.exeGet hashmaliciousBrowse
                              • 178.79.242.128
                              uNCouz6hx8.exeGet hashmaliciousBrowse
                              • 178.79.242.0
                              cBPH5n4T38.exeGet hashmaliciousBrowse
                              • 178.79.242.0
                              DcF5xuhMNO.exeGet hashmaliciousBrowse
                              • 178.79.242.0
                              BSQ4wRQciB.dllGet hashmaliciousBrowse
                              • 178.79.242.128
                              Factura Pendiente.exeGet hashmaliciousBrowse
                              • 178.79.242.128
                              nEwkr1dC74.exeGet hashmaliciousBrowse
                              • 178.79.242.0
                              uN85v8VI8X.exeGet hashmaliciousBrowse
                              • 178.79.242.128
                              OXkB3xMeAr.exeGet hashmaliciousBrowse
                              • 178.79.242.128

                              ASN

                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                              ONEANDONE-ASBrauerstrasse48DEa04.dllGet hashmaliciousBrowse
                              • 87.106.18.141
                              50.dllGet hashmaliciousBrowse
                              • 87.106.18.141
                              Quote -0071021.exeGet hashmaliciousBrowse
                              • 217.160.0.7
                              DHL SHIPMENT.HTMLGet hashmaliciousBrowse
                              • 217.160.0.196
                              hwIILTIn0n.exeGet hashmaliciousBrowse
                              • 217.160.0.17
                              just.exeGet hashmaliciousBrowse
                              • 212.227.15.158
                              2WK7SGkGVZ.exeGet hashmaliciousBrowse
                              • 74.208.236.156
                              0n1pEFuGKC.exeGet hashmaliciousBrowse
                              • 74.208.236.145
                              VmbABLKNbD.exeGet hashmaliciousBrowse
                              • 74.208.236.108
                              Update-KB250-x86.exeGet hashmaliciousBrowse
                              • 74.208.5.20
                              Update-KB2984-x86.exeGet hashmaliciousBrowse
                              • 74.208.5.20
                              justifi4c.exeGet hashmaliciousBrowse
                              • 213.165.67.118
                              CY2075400.exeGet hashmaliciousBrowse
                              • 213.165.67.115
                              Justificante de la transfer.exeGet hashmaliciousBrowse
                              • 212.227.15.142
                              IMAGE1001.exeGet hashmaliciousBrowse
                              • 213.165.67.115
                              Exq3dXFDHe.exeGet hashmaliciousBrowse
                              • 217.160.0.243
                              MIN8gr0eOj.exeGet hashmaliciousBrowse
                              • 74.208.236.228
                              solicitud de presupuesto.exeGet hashmaliciousBrowse
                              • 217.160.0.21
                              Payment Requisition October 4.xlsxGet hashmaliciousBrowse
                              • 74.208.236.226
                              ZFQ06Cz6TT.exeGet hashmaliciousBrowse
                              • 217.160.0.48

                              JA3 Fingerprints

                              No context

                              Dropped Files

                              No context

                              Created / dropped Files

                              C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{063EC3E3-27C5-11EC-90E9-ECF4BB862DED}.dat
                              Process:C:\Program Files\internet explorer\iexplore.exe
                              File Type:Microsoft Word Document
                              Category:dropped
                              Size (bytes):29272
                              Entropy (8bit):1.7701344643347803
                              Encrypted:false
                              SSDEEP:96:r/ZJZR12RW2qWRW2131tRW213yUfRW213ygIFMRW213kGgwbRW2A3kGg4B:r/ZJZX241W4Yt46f4tFM4Kb4ZB
                              MD5:FE7E0B15BF69E7D5E77D3E4CBC8FD844
                              SHA1:88CF8FE6080E43CAF86E3289743F3F0F6F0264A9
                              SHA-256:2260FAEE56EC919ED892395000AEA687299096CB658CD36CFD8709A16EA9EA54
                              SHA-512:B0EB02579A0154EE33E4FE04D273D1492F90C495AE6678AE32805E0B2354838B2B5D5AB4BACDC1B15E48489918D74EEC91ACF158F72E16DC57C3848192AAB800
                              Malicious:false
                              Reputation:low
                              Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                              C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{063EC3E5-27C5-11EC-90E9-ECF4BB862DED}.dat
                              Process:C:\Program Files\internet explorer\iexplore.exe
                              File Type:Microsoft Word Document
                              Category:dropped
                              Size (bytes):28124
                              Entropy (8bit):1.9146205589171772
                              Encrypted:false
                              SSDEEP:48:IwMGcpr1Gwpa5G4pQNGrapbSGGQpBuGHHpc7TGUp8HGzYpmmGGop7k8qiPDqz3dH:rQZfQb6tBS+j92VWlMN9TC1dlTlCTA
                              MD5:5E3115DE41A4E4B1B521C97AC18813C5
                              SHA1:891FA9D6745C7F0C1810B79B0915968E9F4C2930
                              SHA-256:5F7C6F8FD48463FF43A349F5101C4A0DA17ADFB15C2B00903B64A78101A559D7
                              SHA-512:C88D3CBD0ABDF060A8AC7E0549C6425650D1647E8D803702AB616AED2F36126F2879EB76B57C529D916C065D97611E19B9406D125C0320294FF7C2A3FB50D0D7
                              Malicious:false
                              Reputation:low
                              Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                              C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-17529550060\msapplication.xml
                              Process:C:\Program Files\internet explorer\iexplore.exe
                              File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                              Category:dropped
                              Size (bytes):656
                              Entropy (8bit):5.088938170870811
                              Encrypted:false
                              SSDEEP:12:TMHdNMNxOE01OnWimI002EtM3MHdNMNxOE01OnWimI00ObVbkEtMb:2d6NxON1OSZHKd6NxON1OSZ76b
                              MD5:CFAA0C1E504623245FDEFC9528A298E2
                              SHA1:34F63675582E23949D70A2D4D1A4E1CC8C0B790A
                              SHA-256:365DBA991887E73B5B2DB0DF9A477F6455760ED25A77A251C3BE2AEEDF692C7E
                              SHA-512:BF29CFCA96818EECC3E2AFCB328E3BB4481820AFF1DC8612314F72179290E75E325BF2D9F497147047CD6C3993183936023B4D6728D2D642495E9D31500169E6
                              Malicious:false
                              Reputation:low
                              Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.twitter.com/"/><date>0xdbf84054,0x01d7bbd1</date><accdate>0xdbf84054,0x01d7bbd1</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.twitter.com/"/><date>0xdbf84054,0x01d7bbd1</date><accdate>0xdbf84054,0x01d7bbd1</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Twitter.url"/></tile></msapplication></browserconfig>..
                              C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-18270793970\msapplication.xml
                              Process:C:\Program Files\internet explorer\iexplore.exe
                              File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                              Category:dropped
                              Size (bytes):653
                              Entropy (8bit):5.065104180080743
                              Encrypted:false
                              SSDEEP:12:TMHdNMNxe2krnWimI002EtM3MHdNMNxe2krnWimI00Obkak6EtMb:2d6NxrGSZHKd6NxrGSZ7Aa7b
                              MD5:A176224E43E9EDDBFE494818028EE7AB
                              SHA1:3BB8B696F63C85AF1C0E94960D84ED6E6D6A0635
                              SHA-256:9FA1C7C516CC55D0872EA1334262A8C10BD054A2EEF71B43E1186719383F09B5
                              SHA-512:5E33C03EA206206B1ADDEDBCB34B6CD3DBC7F7FE44D6541494825CC69CA5CBAE9B76319754D66E96625540B77CFE52A12776FBB92466EDA12F5584959FA4036F
                              Malicious:false
                              Reputation:low
                              Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.amazon.com/"/><date>0xdbe7901a,0x01d7bbd1</date><accdate>0xdbe7901a,0x01d7bbd1</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.amazon.com/"/><date>0xdbe7901a,0x01d7bbd1</date><accdate>0xdbe7901a,0x01d7bbd1</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Amazon.url"/></tile></msapplication></browserconfig>..
                              C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-21706820\msapplication.xml
                              Process:C:\Program Files\internet explorer\iexplore.exe
                              File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                              Category:dropped
                              Size (bytes):662
                              Entropy (8bit):5.10663851901763
                              Encrypted:false
                              SSDEEP:12:TMHdNMNxvL01OnWimI002EtM3MHdNMNxvL01OnWimI00ObmZEtMb:2d6Nxvg1OSZHKd6Nxvg1OSZ7mb
                              MD5:4CF1FB8C2B6628E509091716B3DDD46B
                              SHA1:05911E9D90643C2EAD2FF98E816149F44A679638
                              SHA-256:5DF8D0CD00CCB850F5E85088F93E3FE2970A554B55A05B0C505BDD97C52F1B39
                              SHA-512:911D2B3A5889CA10CB012813E622A754009F7160F417B22B1534B46550B1E32DFF636D21BE76AC9C81E9A096BFA7D34A889AFD89AAB4FCD91F8E67762A4AD5C2
                              Malicious:false
                              Reputation:low
                              Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.wikipedia.com/"/><date>0xdbf84054,0x01d7bbd1</date><accdate>0xdbf84054,0x01d7bbd1</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.wikipedia.com/"/><date>0xdbf84054,0x01d7bbd1</date><accdate>0xdbf84054,0x01d7bbd1</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Wikipedia.url"/></tile></msapplication></browserconfig>..
                              C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-4759708130\msapplication.xml
                              Process:C:\Program Files\internet explorer\iexplore.exe
                              File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                              Category:dropped
                              Size (bytes):647
                              Entropy (8bit):5.055361901508745
                              Encrypted:false
                              SSDEEP:12:TMHdNMNxiJKInWimI002EtM3MHdNMNxiJKInWimI00Obd5EtMb:2d6NxuKISZHKd6NxuKISZ7Jjb
                              MD5:074BD65CAD3A43806997D815CCD310BB
                              SHA1:1D281442E0BA47A74363EC75B47D2E88B53CBF4A
                              SHA-256:1104831873D15DBE0D741CF5E1E484E7177573C254D4AEE37C05C5A7AEE69AB5
                              SHA-512:E53EDDE4294E9924EA58D744EB8039A130FED6C07C9A6688BFD674B46450ACD1029E01897BDAC1FE3933A52221B7B1703C2984BFA2D39BF123742A707C9E3FFD
                              Malicious:false
                              Reputation:low
                              Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.live.com/"/><date>0xdbf118db,0x01d7bbd1</date><accdate>0xdbf118db,0x01d7bbd1</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.live.com/"/><date>0xdbf118db,0x01d7bbd1</date><accdate>0xdbf118db,0x01d7bbd1</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Live.url"/></tile></msapplication></browserconfig>..
                              C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-6757900\msapplication.xml
                              Process:C:\Program Files\internet explorer\iexplore.exe
                              File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                              Category:dropped
                              Size (bytes):656
                              Entropy (8bit):5.1159885561659975
                              Encrypted:false
                              SSDEEP:12:TMHdNMNxhGw01OnWimI002EtM3MHdNMNxhGw01OnWimI00Ob8K075EtMb:2d6NxQR1OSZHKd6NxQR1OSZ7YKajb
                              MD5:82E6B249A578988E85BC7C6ED57C0168
                              SHA1:6AECCC4307830A7F3A27FA2951F7FD67F187FC3E
                              SHA-256:DAF909323DD36C6BE68B420AF15E76EDD67D773F0299C89D1E6D67F8994531C0
                              SHA-512:8D4DA2B26EDD870619340AAF8BF4E28D9EF830D68461873A693FAD618694811955299A19E2409FD7C302BB63BDF8E90686F5E366DF47F29A91567E31970939A7
                              Malicious:false
                              Reputation:low
                              Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.youtube.com/"/><date>0xdbf84054,0x01d7bbd1</date><accdate>0xdbf84054,0x01d7bbd1</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.youtube.com/"/><date>0xdbf84054,0x01d7bbd1</date><accdate>0xdbf84054,0x01d7bbd1</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Youtube.url"/></tile></msapplication></browserconfig>..
                              C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-8760897390\msapplication.xml
                              Process:C:\Program Files\internet explorer\iexplore.exe
                              File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                              Category:dropped
                              Size (bytes):653
                              Entropy (8bit):5.037015661281331
                              Encrypted:false
                              SSDEEP:12:TMHdNMNx0nJKInWimI002EtM3MHdNMNx0nJKInWimI00ObxEtMb:2d6Nx0JKISZHKd6Nx0JKISZ7nb
                              MD5:3CFC651E6983F1197503C958A59FF72E
                              SHA1:4B3F879C0E9841AB266A2A323B2CFB4B3E5C98D7
                              SHA-256:E5870E5F72EAEFC0405F0C9047F081A280F5B27A073E19E003B6B86ECB04724D
                              SHA-512:C3A360FEC4BEECF1DC433411E44241E42C1ABBB723EA66E331890E94FF983884D02C21B2C740FB357C716B0F3BF035394610484C186CF8A30234716B309AC6BD
                              Malicious:false
                              Reputation:low
                              Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.reddit.com/"/><date>0xdbf118db,0x01d7bbd1</date><accdate>0xdbf118db,0x01d7bbd1</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.reddit.com/"/><date>0xdbf118db,0x01d7bbd1</date><accdate>0xdbf118db,0x01d7bbd1</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Reddit.url"/></tile></msapplication></browserconfig>..
                              C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin20259167780\msapplication.xml
                              Process:C:\Program Files\internet explorer\iexplore.exe
                              File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                              Category:dropped
                              Size (bytes):656
                              Entropy (8bit):5.080777529981643
                              Encrypted:false
                              SSDEEP:12:TMHdNMNxxJKInWimI002EtM3MHdNMNxxJKInWimI00Ob6Kq5EtMb:2d6NxzKISZHKd6NxzKISZ7ob
                              MD5:3870B225A953FACDECF806D3F27F01DA
                              SHA1:03D41945033C8FBABEFA7AA1F843B8A5E7C965FD
                              SHA-256:AF22888DDE910384C19551EB62DBCE6248C221DC754B5D92A6F6403A97D4640E
                              SHA-512:BB547ECB7646A86BE073328A1F0613FA4BBF71A80890E4D6F5315FE83741D3F0E636DE846EE34A643F4F81DD87AEC7E7E7607B36A1ABB05918EB90F9D1F625C9
                              Malicious:false
                              Reputation:low
                              Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.nytimes.com/"/><date>0xdbf118db,0x01d7bbd1</date><accdate>0xdbf118db,0x01d7bbd1</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.nytimes.com/"/><date>0xdbf118db,0x01d7bbd1</date><accdate>0xdbf118db,0x01d7bbd1</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\NYTimes.url"/></tile></msapplication></browserconfig>..
                              C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin20332743330\msapplication.xml
                              Process:C:\Program Files\internet explorer\iexplore.exe
                              File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                              Category:dropped
                              Size (bytes):659
                              Entropy (8bit):5.0563074196705715
                              Encrypted:false
                              SSDEEP:12:TMHdNMNxcrnWimI002EtM3MHdNMNxcrnWimI00ObVEtMb:2d6NxOSZHKd6NxOSZ7Db
                              MD5:5BDD08733FEABBBE890D0028FAAF5E1F
                              SHA1:98092E7531A9AC8B40BBD01FE6D28C16965B8310
                              SHA-256:68C63C7F3078AB225D4916AB8C767C6D002DC05C3949E4634942BEE8F94D13E6
                              SHA-512:31548A010931122325CFBAE97AF82E69E0F02C4E46DA9A44162A8C0EF4500DCDA5571844EC990858000683B9335EB6DECCF8DCE44F5B5294227C6628867D35A7
                              Malicious:false
                              Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.facebook.com/"/><date>0xdbe7901a,0x01d7bbd1</date><accdate>0xdbe7901a,0x01d7bbd1</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.facebook.com/"/><date>0xdbe7901a,0x01d7bbd1</date><accdate>0xdbe7901a,0x01d7bbd1</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Facebook.url"/></tile></msapplication></browserconfig>..
                              C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin8215062560\msapplication.xml
                              Process:C:\Program Files\internet explorer\iexplore.exe
                              File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                              Category:dropped
                              Size (bytes):653
                              Entropy (8bit):5.044181719856586
                              Encrypted:false
                              SSDEEP:12:TMHdNMNxfnrnWimI002EtM3MHdNMNxfnrnWimI00Obe5EtMb:2d6NxzSZHKd6NxzSZ7ijb
                              MD5:CF8F543F877CB266D950DF963AD9406D
                              SHA1:2E90F1248ABF3DB1845E63828242689BDBD51B4E
                              SHA-256:88626A4E7C44B0CF6131273949CD910FE4630AADD0DAB67202C378E5C04F3A68
                              SHA-512:D375CBDF23EA8D4DFA03C8BA3BAFBFF2099C7F6761D67CAA0575F4D57DABDE743E9B786E8FE9A79CC06D3C011D5A7562518D45E70420778BBA01ECF56665810B
                              Malicious:false
                              Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.google.com/"/><date>0xdbe7901a,0x01d7bbd1</date><accdate>0xdbe7901a,0x01d7bbd1</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.google.com/"/><date>0xdbe7901a,0x01d7bbd1</date><accdate>0xdbe7901a,0x01d7bbd1</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Google.url"/></tile></msapplication></browserconfig>..
                              C:\Users\user\AppData\Local\Temp\JavaDeployReg.log
                              Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                              File Type:ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):89
                              Entropy (8bit):4.422630656681361
                              Encrypted:false
                              SSDEEP:3:oVXUYzYTM7W8JOGXnEYzYTMZun:o9UYzYTVqEYzYTV
                              MD5:F03B712BE3FF150E4E2EE180114CF20A
                              SHA1:9988A53E02D5F481CF62E78FB21BF0AC679802F7
                              SHA-256:B1E47CABBB3103F18B9086625A9F71696259DA30AFC2E93495A635F4D3144BC4
                              SHA-512:92F036490D547FD9A9A7B9002606F43B8E9FE24A9207C58D2DA8F37F436CDC7947E0174DF723C9E49FE79FE237C276BB4C0C5816117EC85866D3E7B37F0B6C5D
                              Malicious:false
                              Preview: [2021/10/07 16:19:33.153] Latest deploy version: ..[2021/10/07 16:19:33.153] 11.211.2 ..
                              C:\Users\user\AppData\Local\Temp\~DF1728008F459C4534.TMP
                              Process:C:\Program Files\internet explorer\iexplore.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):40121
                              Entropy (8bit):0.667681657124394
                              Encrypted:false
                              SSDEEP:48:kBqoxKAuvScS+XZbSmImRk8ILiPDqz3dYnk8ILiPDqz3dYok8ILiPDqz3dYF:kBqoxKAuvScS+XZbS54i2CMi2Cni2C4
                              MD5:C941466D3B30985EA0EADE7426D7C846
                              SHA1:0039736FA9FE41B250A33377E7DBDA2FE4DDC78A
                              SHA-256:07B1ACFB47135B97D5B07089B000260C617FECD4F0B264FF1534E238D5B54CA2
                              SHA-512:5DDA6E800F0DF705AE01D515076007313BBDC54FC5ADB6A7EF4E3FFB46CACDE1C500B7F5084F67801DC95FCD115D2CC273070A75F135063237C6E7884F1822F3
                              Malicious:false
                              Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                              C:\Users\user\AppData\Local\Temp\~DF8F568B21079AA7B9.TMP
                              Process:C:\Program Files\internet explorer\iexplore.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):12933
                              Entropy (8bit):0.40915964020179696
                              Encrypted:false
                              SSDEEP:24:c9lLh9lLh9lIn9lIn9loRYF9loRg9lWRW2V3ygV3kGx:kBqoIRrRNRW2V3ygV3kGx
                              MD5:E2C3A9A25DE0C27EE85FE33712B018AF
                              SHA1:AA9D7BFBC164748490A7D2C2BE569342C9AA5533
                              SHA-256:F7D913F2D4C405BA40C9B13A585F17EE2C356742D445C79C6FF718EC460472DA
                              SHA-512:11161E5C98C4C12E82DE923268277DE352FEFE35F49F6E8D9EA9069E6C83E3AEFCA13220EE59333E2171A16F1ABDD6212D198A9D6B15D278071BD4C79D692DE7
                              Malicious:false
                              Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................

                              Static File Info

                              General

                              File type:PE32 executable (GUI) Intel 80386, for MS Windows
                              Entropy (8bit):6.835334743621618
                              TrID:
                              • Win32 Executable (generic) a (10002005/4) 99.96%
                              • Generic Win/DOS Executable (2004/3) 0.02%
                              • DOS Executable Generic (2002/1) 0.02%
                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                              File name:a3.exe
                              File size:179712
                              MD5:0cc6d274cd84b593210168f51fcd38cd
                              SHA1:666fc3963609f4aff528b9a32f7516feebaa6ddf
                              SHA256:a3bdb9880bf419f2023e4015545c6c72835dbc5c68cd14fd81d35220bf9449fa
                              SHA512:7983ed74b0fc4d75f384433aa9d07354275c9565988cc0d7b3e5c5cfac3bb2fac2bf690dfb8dd2cbc1e25132c72b52bfea05cdf605b61c18c24f10e85fd62fb9
                              SSDEEP:3072:fgUV+UgG7cL89xoF+bhyExjSaftm34X/ifmA0XHDI5C4:YG+Y7cL89x/bUExPf437ul8I4
                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........5...T...T...T....V..T....G..T....@..T.......T...T..)T....I..T....Q..T....W..T....R..T..Rich.T..........................PE..L..

                              File Icon

                              Icon Hash:a8b0f8d84868687c

                              Static PE Info

                              General

                              Entrypoint:0x404423
                              Entrypoint Section:.text
                              Digitally signed:false
                              Imagebase:0x400000
                              Subsystem:windows gui
                              Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE, RELOCS_STRIPPED
                              DLL Characteristics:TERMINAL_SERVER_AWARE, NX_COMPAT
                              Time Stamp:0x5D7CADF0 [Sat Sep 14 09:08:00 2019 UTC]
                              TLS Callbacks:
                              CLR (.Net) Version:
                              OS Version Major:5
                              OS Version Minor:0
                              File Version Major:5
                              File Version Minor:0
                              Subsystem Version Major:5
                              Subsystem Version Minor:0
                              Import Hash:08b3bdf9cc3930ac93565a943e8ad0e4

                              Entrypoint Preview

                              Instruction
                              call 00007FB26C9B1B79h
                              jmp 00007FB26C9AC82Eh
                              mov edi, edi
                              push ebp
                              mov ebp, esp
                              mov eax, dword ptr [ebp+08h]
                              xor ecx, ecx
                              cmp eax, dword ptr [00426128h+ecx*8]
                              je 00007FB26C9AC9C5h
                              inc ecx
                              cmp ecx, 2Dh
                              jc 00007FB26C9AC9A3h
                              lea ecx, dword ptr [eax-13h]
                              cmp ecx, 11h
                              jnbe 00007FB26C9AC9C0h
                              push 0000000Dh
                              pop eax
                              pop ebp
                              ret
                              mov eax, dword ptr [0042612Ch+ecx*8]
                              pop ebp
                              ret
                              add eax, FFFFFF44h
                              push 0000000Eh
                              pop ecx
                              cmp ecx, eax
                              sbb eax, eax
                              and eax, ecx
                              add eax, 08h
                              pop ebp
                              ret
                              call 00007FB26C9B09B9h
                              test eax, eax
                              jne 00007FB26C9AC9B8h
                              mov eax, 00426290h
                              ret
                              add eax, 08h
                              ret
                              mov edi, edi
                              push ebp
                              mov ebp, esp
                              sub esp, 4Ch
                              mov eax, dword ptr [004262A8h]
                              xor eax, ebp
                              mov dword ptr [ebp-04h], eax
                              push ebx
                              xor ebx, ebx
                              push esi
                              mov esi, dword ptr [ebp+08h]
                              push edi
                              mov dword ptr [ebp-2Ch], ebx
                              mov dword ptr [ebp-1Ch], ebx
                              mov dword ptr [ebp-20h], ebx
                              mov dword ptr [ebp-28h], ebx
                              mov dword ptr [ebp-24h], ebx
                              mov dword ptr [ebp-4Ch], esi
                              mov dword ptr [ebp-48h], ebx
                              cmp dword ptr [esi+14h], ebx
                              je 00007FB26C9ACCCCh
                              lea eax, dword ptr [esi+04h]
                              cmp dword ptr [eax], ebx
                              jne 00007FB26C9AC9D2h
                              push eax
                              movzx eax, word ptr [esi+30h]
                              push 00001004h
                              push eax
                              lea eax, dword ptr [ebp-4Ch]
                              push ebx
                              push eax
                              call 00007FB26C9B1D5Dh
                              add esp, 14h
                              test eax, eax
                              jne 00007FB26C9ACC7Dh
                              push 00000004h
                              call 00007FB26C9AE99Eh
                              push 00000002h

                              Rich Headers

                              Programming Language:
                              • [ C ] VS2008 build 21022
                              • [LNK] VS2008 build 21022
                              • [ASM] VS2008 build 21022
                              • [IMP] VS2005 build 50727
                              • [RES] VS2008 build 21022
                              • [EXP] VS2008 build 21022
                              • [C++] VS2008 build 21022

                              Data Directories

                              NameVirtual AddressVirtual Size Is in Section
                              IMAGE_DIRECTORY_ENTRY_EXPORT0x25f500x58.rdata
                              IMAGE_DIRECTORY_ENTRY_IMPORT0x254240x3c.rdata
                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x2dd80000x5c30.rsrc
                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IAT0x200000x1e8.rdata
                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                              Sections

                              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                              .text0x10000x1e0140x1e200False0.726424727697data7.38003707514IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                              .rdata0x200000x5fa80x6000False0.459879557292data5.59572231923IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .data0x260000x2db17d80x1a00unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                              .rsrc0x2dd80000x5c300x5e00False0.376329787234data4.1399689351IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

                              Resources

                              NameRVASizeTypeLanguageCountry
                              AFX_DIALOG_LAYOUT0x2dd9f200x2data
                              AFX_DIALOG_LAYOUT0x2dd9f180x2data
                              AFX_DIALOG_LAYOUT0x2dd9f280x2data
                              RT_CURSOR0x2dd9f300x130data
                              RT_CURSOR0x2dda0600xf0data
                              RT_CURSOR0x2dda1500x10a8data
                              RT_CURSOR0x2ddb2280xea8dBase III DBT, version number 0, next free block index 40, 1st item "\251\317"
                              RT_CURSOR0x2ddc0d00x8a8dBase III DBT, version number 0, next free block index 40, 1st item "\251\317"
                              RT_ICON0x2dd85500x8a8dataFarsiIran
                              RT_ICON0x2dd85500x8a8dataFarsiAfganistan
                              RT_ICON0x2dd85500x8a8dataFarsiTajikistan
                              RT_ICON0x2dd85500x8a8dataFarsiUzbekistan
                              RT_ICON0x2dd8df80x10a8dataFarsiIran
                              RT_ICON0x2dd8df80x10a8dataFarsiAfganistan
                              RT_ICON0x2dd8df80x10a8dataFarsiTajikistan
                              RT_ICON0x2dd8df80x10a8dataFarsiUzbekistan
                              RT_STRING0x2ddcaa80x46edata
                              RT_STRING0x2ddcf180x4b6data
                              RT_STRING0x2ddd3d00x5b4data
                              RT_STRING0x2ddd9880x2a4data
                              RT_GROUP_CURSOR0x2ddb1f80x30data
                              RT_GROUP_CURSOR0x2ddc9780x22data
                              RT_GROUP_ICON0x2dd9ea00x22dataFarsiIran
                              RT_GROUP_ICON0x2dd9ea00x22dataFarsiAfganistan
                              RT_GROUP_ICON0x2dd9ea00x22dataFarsiTajikistan
                              RT_GROUP_ICON0x2dd9ea00x22dataFarsiUzbekistan
                              RT_VERSION0x2ddc9a00x104data
                              None0x2dd9ed80xadata
                              None0x2dd9ee80xadata
                              None0x2dd9ec80xadata
                              None0x2dd9ef80xadata
                              None0x2dd9f080xadata

                              Imports

                              DLLImport
                              KERNEL32.dllSetVolumeLabelA, SetDefaultCommConfigA, CreateMutexW, lstrlenA, WritePrivateProfileStructA, CopyFileExW, TlsGetValue, MoveFileExA, _llseek, GetNumberOfConsoleInputEvents, FindResourceExW, CallNamedPipeA, DeleteVolumeMountPointA, WriteTapemark, InterlockedIncrement, ReadConsoleA, CompareFileTime, WaitForSingleObject, InterlockedCompareExchange, _lclose, SetTapeParameters, GetModuleHandleW, VirtualFree, WriteFile, GlobalAlloc, Sleep, LeaveCriticalSection, GetFileAttributesW, WriteConsoleW, GetOverlappedResult, GetACP, DeactivateActCtx, GetPrivateProfileSectionNamesW, IsDBCSLeadByteEx, GetProcAddress, GetTapeStatus, BeginUpdateResourceW, CreateNamedPipeA, LocalLock, IsValidCodePage, SearchPathA, SetFileApisToOEM, GetLocalTime, LoadLibraryA, SetCalendarInfoW, IsSystemResumeAutomatic, GetProfileStringA, WriteProfileSectionW, SetNamedPipeHandleState, EnumDateFormatsA, GetThreadPriority, WaitCommEvent, LoadLibraryExA, ContinueDebugEvent, VirtualProtect, PurgeComm, ScrollConsoleScreenBufferA, OpenSemaphoreW, GetVersionExA, DeleteFileW, DebugBreak, FindActCtxSectionStringW, GetSystemTime, lstrcpyW, GetLastError, GetSystemDefaultLangID, WideCharToMultiByte, InterlockedDecrement, InterlockedExchange, MultiByteToWideChar, InitializeCriticalSection, DeleteCriticalSection, EnterCriticalSection, HeapFree, TerminateProcess, GetCurrentProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, GetStartupInfoW, GetCPInfo, RtlUnwind, RaiseException, LCMapStringW, LCMapStringA, GetStringTypeW, HeapAlloc, HeapCreate, VirtualAlloc, HeapReAlloc, TlsAlloc, TlsSetValue, TlsFree, SetLastError, GetCurrentThreadId, ExitProcess, GetStdHandle, GetModuleFileNameA, GetModuleFileNameW, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineW, SetHandleCount, GetFileType, GetStartupInfoA, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetSystemTimeAsFileTime, GetStringTypeA, HeapSize, GetOEMCP, GetUserDefaultLCID, GetLocaleInfoA, EnumSystemLocalesA, IsValidLocale, InitializeCriticalSectionAndSpinCount, GetLocaleInfoW, GetModuleHandleA
                              GDI32.dllGetBoundsRect

                              Exports

                              NameOrdinalAddress
                              _geek@810x41a2d0
                              _gekkko@820x41a2c0

                              Version Infos

                              DescriptionData
                              FileV1.0.2.26
                              Translations0x0218 0x07a1

                              Possible Origin

                              Language of compilation systemCountry where language is spokenMap
                              FarsiIran
                              FarsiAfganistan
                              FarsiTajikistan
                              FarsiUzbekistan

                              Network Behavior

                              Snort IDS Alerts

                              TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                              10/07/21-16:19:35.183837TCP2033204ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F)4975180192.168.2.387.106.18.141
                              10/07/21-16:19:35.183837TCP2033203ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B)4975180192.168.2.387.106.18.141

                              Network Port Distribution

                              TCP Packets

                              TimestampSource PortDest PortSource IPDest IP
                              Oct 7, 2021 16:19:35.160347939 CEST4975180192.168.2.387.106.18.141
                              Oct 7, 2021 16:19:35.161183119 CEST4975080192.168.2.387.106.18.141
                              Oct 7, 2021 16:19:35.180584908 CEST804975187.106.18.141192.168.2.3
                              Oct 7, 2021 16:19:35.180737972 CEST4975180192.168.2.387.106.18.141
                              Oct 7, 2021 16:19:35.181255102 CEST804975087.106.18.141192.168.2.3
                              Oct 7, 2021 16:19:35.181380033 CEST4975080192.168.2.387.106.18.141
                              Oct 7, 2021 16:19:35.183836937 CEST4975180192.168.2.387.106.18.141
                              Oct 7, 2021 16:19:35.204199076 CEST804975187.106.18.141192.168.2.3
                              Oct 7, 2021 16:19:35.229631901 CEST804975187.106.18.141192.168.2.3
                              Oct 7, 2021 16:19:35.229722023 CEST4975180192.168.2.387.106.18.141
                              Oct 7, 2021 16:19:35.598839998 CEST4975180192.168.2.387.106.18.141
                              Oct 7, 2021 16:19:35.644711971 CEST804975187.106.18.141192.168.2.3
                              Oct 7, 2021 16:19:35.645252943 CEST4975180192.168.2.387.106.18.141
                              Oct 7, 2021 16:19:36.514163017 CEST4975180192.168.2.387.106.18.141
                              Oct 7, 2021 16:19:36.514230967 CEST4975080192.168.2.387.106.18.141

                              UDP Packets

                              TimestampSource PortDest PortSource IPDest IP
                              Oct 7, 2021 16:19:35.113707066 CEST6402153192.168.2.38.8.8.8
                              Oct 7, 2021 16:19:35.146023989 CEST53640218.8.8.8192.168.2.3

                              DNS Queries

                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                              Oct 7, 2021 16:19:35.113707066 CEST192.168.2.38.8.8.80xbd3bStandard query (0)api5.feen007.atA (IP address)IN (0x0001)

                              DNS Answers

                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                              Oct 7, 2021 16:19:35.146023989 CEST8.8.8.8192.168.2.30xbd3bNo error (0)api5.feen007.at87.106.18.141A (IP address)IN (0x0001)
                              Oct 7, 2021 16:19:51.258573055 CEST8.8.8.8192.168.2.30xd3f6No error (0)windowsupdate.s.llnwi.net178.79.242.0A (IP address)IN (0x0001)

                              HTTP Request Dependency Graph

                              • api5.feen007.at

                              HTTP Packets

                              Session IDSource IPSource PortDestination IPDestination PortProcess
                              0192.168.2.34975187.106.18.14180C:\Program Files (x86)\Internet Explorer\iexplore.exe
                              TimestampkBytes transferredDirectionData
                              Oct 7, 2021 16:19:35.183836937 CEST1286OUTGET /webstore/DcjIiNGkOSL0_2FzFS0SI/7PtL4T1ixNrirqXI/ZpdUtfjmbk9XGDI/gk7_2BOWav_2FtIxdS/vSo3lpggS/jgk05AsnNx5dVlLwmu_2/FAFwkzA53QftC8xz3wT/fnjkouYQNR37gBMDH6qXvg/zMFbyF4s1JmGD/y5Fu3aSV/TmUAsAO_2BZNh80x_2FL9QD/SJCaUL6t8y/cM9WgnTGqUY3ueTtK/VgEDjaagDntZ/uB1lRFThucd/4921ywV6NYjMkC/jnp_2BoOlFuQm1snVe_0A/_0DPF5OO0IeFwPM_/2FxPK7FahYNj2AP/3bZ4D9BzvVH_2BCtQdVgfC/l HTTP/1.1
                              Accept: text/html, application/xhtml+xml, image/jxr, */*
                              Accept-Language: en-US
                              User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like Gecko
                              Accept-Encoding: gzip, deflate
                              Host: api5.feen007.at
                              Connection: Keep-Alive
                              Oct 7, 2021 16:19:35.229631901 CEST1286INHTTP/1.1 200 OK
                              Server: nginx/1.14.2
                              Date: Thu, 07 Oct 2021 14:19:35 GMT
                              Content-Type: text/plain
                              Transfer-Encoding: chunked
                              Connection: keep-alive
                              Data Raw: 30 0d 0a 0d 0a
                              Data Ascii: 0
                              Oct 7, 2021 16:19:35.598839998 CEST1286OUTGET /favicon.ico HTTP/1.1
                              Accept: */*
                              Accept-Encoding: gzip, deflate
                              User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like Gecko
                              Host: api5.feen007.at
                              Connection: Keep-Alive
                              Oct 7, 2021 16:19:35.644711971 CEST1286INHTTP/1.1 200 OK
                              Server: nginx/1.14.2
                              Date: Thu, 07 Oct 2021 14:19:35 GMT
                              Content-Type: text/plain
                              Transfer-Encoding: chunked
                              Connection: keep-alive
                              Data Raw: 30 0d 0a 0d 0a
                              Data Ascii: 0


                              Code Manipulations

                              Statistics

                              Behavior

                              Click to jump to process

                              System Behavior

                              General

                              Start time:16:19:10
                              Start date:07/10/2021
                              Path:C:\Users\user\Desktop\a3.exe
                              Wow64 process (32bit):true
                              Commandline:'C:\Users\user\Desktop\a3.exe'
                              Imagebase:0x400000
                              File size:179712 bytes
                              MD5 hash:0CC6D274CD84B593210168F51FCD38CD
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.357686500.0000000005E78000.00000004.00000040.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Ursnif_1, Description: Yara detected Ursnif, Source: 00000000.00000002.578224187.0000000005629000.00000004.00000040.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.357510029.0000000005E78000.00000004.00000040.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.357882018.0000000005E78000.00000004.00000040.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.357642343.0000000005E78000.00000004.00000040.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.357596269.0000000005E78000.00000004.00000040.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.357766814.0000000005E78000.00000004.00000040.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000002.578307195.0000000005E78000.00000004.00000040.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.357549475.0000000005E78000.00000004.00000040.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.357827984.0000000005E78000.00000004.00000040.sdmp, Author: Joe Security
                              Reputation:low

                              General

                              Start time:16:19:31
                              Start date:07/10/2021
                              Path:C:\Program Files\internet explorer\iexplore.exe
                              Wow64 process (32bit):false
                              Commandline:'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
                              Imagebase:0x7ff7e4150000
                              File size:823560 bytes
                              MD5 hash:6465CB92B25A7BC1DF8E01D8AC5E7596
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high

                              General

                              Start time:16:19:32
                              Start date:07/10/2021
                              Path:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                              Wow64 process (32bit):true
                              Commandline:'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6308 CREDAT:17410 /prefetch:2
                              Imagebase:0x1140000
                              File size:822536 bytes
                              MD5 hash:071277CC2E3DF41EEEA8013E2AB58D5A
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high

                              Disassembly

                              Code Analysis

                              Reset < >