Loading ...

Play interactive tourEdit tour

Windows Analysis Report 61766fc85163a.dll

Overview

General Information

Sample Name:61766fc85163a.dll
Analysis ID:508544
MD5:5ba43bc79bff74cc56919f7fd053a284
SHA1:49256e2887cab7474a3231b289bd86773f971c16
SHA256:876666a6f9230b86577eedc94fa30f808e8e4aecce1d054131b757cfd8270989
Tags:DHLdllGoziISFBITAursnif
Infos:

Most interesting Screenshot:

Detection

Ursnif
Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Yara detected Ursnif
System process connects to network (likely due to code injection or exploit)
Writes or reads registry keys via WMI
Rundll32 performs DNS lookup (likely malicious behavior)
Writes registry values via WMI
Uses 32bit PE files
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query locales information (e.g. system language)
Uses code obfuscation techniques (call, push, ret)
Queries the installation date of Windows
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Found potential string decryption / allocating functions
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
Sample file is different than original file name gathered from version info
Contains functionality to read the PEB
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Uses Microsoft's Enhanced Cryptographic Provider
Creates a process in suspended mode (likely to inject code)

Classification

Process Tree

  • System is w10x64
  • loaddll32.exe (PID: 5276 cmdline: loaddll32.exe 'C:\Users\user\Desktop\61766fc85163a.dll' MD5: 72FCD8FB0ADC38ED9050569AD673650E)
    • cmd.exe (PID: 4968 cmdline: cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\61766fc85163a.dll',#1 MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • rundll32.exe (PID: 5692 cmdline: rundll32.exe 'C:\Users\user\Desktop\61766fc85163a.dll',#1 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 5992 cmdline: rundll32.exe C:\Users\user\Desktop\61766fc85163a.dll,Cow MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 6720 cmdline: rundll32.exe C:\Users\user\Desktop\61766fc85163a.dll,Fishdark MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 6904 cmdline: rundll32.exe C:\Users\user\Desktop\61766fc85163a.dll,Multiplyboat MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
  • cleanup

Malware Configuration

Threatname: Ursnif

{"RSA Public Key": "YO6EupUXQQEIZWr1HZwHqwbuf45UKlaaNAB4ZLiKsu7B39r6dBjtPHb2dqe22JgQrIOaO/7CSCpZ9VuPYSl5H6wuGZ1xyRSe7C3c6RxGbqnFBTgAkKFju2eS+hGTIKJvxmLB1vRcOADEbzlrK+7ALUr55Rs0VTXRrvCyjb4vTim8iSk+dIgIyxzBoPD6SBA5ACtVvAO15Nqcsl+9e+CRdtm0+oPrkvDGL2Dav9cErXo5SzqquGstuCbvnyTSPGNMjbKlPBN7/S4LoVfjxTeSJhWPjf1raeOb8pc9CSsiDTedsvpOOgXVq2c/tQr253W0mKWN0cwiXlVSxmTL1XYeHxONoXKrjIaIwjuFk+VK+lg=", "c2_domain": ["fx.rhinobuff.com", "fio.linosheart.com"], "botnet": "2500", "server": "580", "serpent_key": "GgxKJL0zm4HBTHpK", "sleep_time": "5", "CONF_TIMEOUT": "20", "SetWaitableTimer_value": "1"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000000.00000003.457883512.0000000003BF8000.00000004.00000040.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
    00000003.00000003.448559940.0000000004F68000.00000004.00000040.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
      00000002.00000003.401727363.0000000002C60000.00000040.00000010.sdmpJoeSecurity_Ursnif_1Yara detected UrsnifJoe Security
        00000003.00000003.448597664.0000000004F68000.00000004.00000040.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
          00000000.00000003.420035815.0000000002C40000.00000040.00000001.sdmpJoeSecurity_Ursnif_1Yara detected UrsnifJoe Security
            Click to see the 23 entries

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            2.3.rundll32.exe.2c68c9b.0.raw.unpackJoeSecurity_Ursnif_1Yara detected UrsnifJoe Security
              5.3.rundll32.exe.3268c9b.0.raw.unpackJoeSecurity_Ursnif_1Yara detected UrsnifJoe Security
                3.2.rundll32.exe.45394a0.1.raw.unpackJoeSecurity_Ursnif_1Yara detected UrsnifJoe Security
                  0.2.loaddll32.exe.2c80000.0.unpackJoeSecurity_Ursnif_1Yara detected UrsnifJoe Security
                    3.3.rundll32.exe.2658c9b.0.raw.unpackJoeSecurity_Ursnif_1Yara detected UrsnifJoe Security
                      Click to see the 11 entries

                      Sigma Overview

                      No Sigma rule has matched

                      Jbx Signature Overview

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection:

                      barindex
                      Found malware configurationShow sources
                      Source: 0.2.loaddll32.exe.2c80000.0.unpackMalware Configuration Extractor: Ursnif {"RSA Public Key": "YO6EupUXQQEIZWr1HZwHqwbuf45UKlaaNAB4ZLiKsu7B39r6dBjtPHb2dqe22JgQrIOaO/7CSCpZ9VuPYSl5H6wuGZ1xyRSe7C3c6RxGbqnFBTgAkKFju2eS+hGTIKJvxmLB1vRcOADEbzlrK+7ALUr55Rs0VTXRrvCyjb4vTim8iSk+dIgIyxzBoPD6SBA5ACtVvAO15Nqcsl+9e+CRdtm0+oPrkvDGL2Dav9cErXo5SzqquGstuCbvnyTSPGNMjbKlPBN7/S4LoVfjxTeSJhWPjf1raeOb8pc9CSsiDTedsvpOOgXVq2c/tQr253W0mKWN0cwiXlVSxmTL1XYeHxONoXKrjIaIwjuFk+VK+lg=", "c2_domain": ["fx.rhinobuff.com", "fio.linosheart.com"], "botnet": "2500", "server": "580", "serpent_key": "GgxKJL0zm4HBTHpK", "sleep_time": "5", "CONF_TIMEOUT": "20", "SetWaitableTimer_value": "1"}
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_02C83FAB CryptAcquireContextW,memcpy,CryptImportKey,CryptSetKeyParam,memcpy,CryptEncrypt,GetLastError,GetLastError,CryptDestroyKey,GetLastError,CryptReleaseContext,GetLastError,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02683FAB CryptAcquireContextW,memcpy,CryptImportKey,CryptSetKeyParam,memcpy,CryptEncrypt,GetLastError,GetLastError,CryptDestroyKey,GetLastError,CryptReleaseContext,GetLastError,
                      Source: 61766fc85163a.dllStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
                      Source: 61766fc85163a.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT
                      Source: Binary string: c:\939\Charge\Sense\Young\Self.pdb source: loaddll32.exe, 00000000.00000002.826085612.000000006EA6C000.00000002.00020000.sdmp, rundll32.exe, 00000003.00000002.827483917.000000006EA6C000.00000002.00020000.sdmp, 61766fc85163a.dll

                      Networking:

                      barindex
                      System process connects to network (likely due to code injection or exploit)Show sources
                      Source: C:\Windows\SysWOW64\rundll32.exeDomain query: fio.linosheart.com
                      Source: C:\Windows\SysWOW64\rundll32.exeDomain query: fx.rhinobuff.com
                      Source: unknownDNS traffic detected: query: fx.rhinobuff.com replaycode: Name error (3)
                      Source: unknownDNS traffic detected: query: fio.linosheart.com replaycode: Name error (3)
                      Source: loaddll32.exe, 00000000.00000003.803353466.00000000013F5000.00000004.00000001.sdmpString found in binary or memory: http://fx.rhinobuff.com/_2B_2FM0h60XP/tUM8FmL2/KIja2Ms5a3v6Lq_2Fudl59W/vfBorXE8AA/UUluHYFitiWcdJQtC/
                      Source: loaddll32.exe, 00000000.00000003.631196087.00000000013F5000.00000004.00000001.sdmpString found in binary or memory: http://fx.rhinobuff.com/x0ylueFuXgrpB3WJj/TF7mv4QreQVW/NyZwfSNmEuc/QVDm3PVK85XSch/TwihngzLYMfTath4pJ
                      Source: unknownDNS traffic detected: queries for: fx.rhinobuff.com

                      Key, Mouse, Clipboard, Microphone and Screen Capturing:

                      barindex
                      Yara detected UrsnifShow sources
                      Source: Yara matchFile source: 00000000.00000003.457883512.0000000003BF8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.448559940.0000000004F68000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.448597664.0000000004F68000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.458003992.0000000003BF8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.457844986.0000000003BF8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.448496716.0000000004F68000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.457961241.0000000003BF8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.457926996.0000000003BF8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.448462306.0000000004F68000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.457986489.0000000003BF8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.825811764.0000000003BF8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.448582889.0000000004F68000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.448524349.0000000004F68000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.448420040.0000000004F68000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.826711993.0000000004F68000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.458017733.0000000003BF8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.457907127.0000000003BF8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.448613025.0000000004F68000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: loaddll32.exe PID: 5276, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 5692, type: MEMORYSTR
                      Source: Yara matchFile source: 2.3.rundll32.exe.2c68c9b.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.3.rundll32.exe.3268c9b.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.45394a0.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.loaddll32.exe.2c80000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.rundll32.exe.2658c9b.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.45394a0.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.loaddll32.exe.31f94a0.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.loaddll32.exe.31f94a0.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.loaddll32.exe.2c48c9b.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.rundll32.exe.5280000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.3.rundll32.exe.51694a0.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.3.rundll32.exe.4c88c9b.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.loaddll32.exe.6e9f0000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.2680000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.6e9f0000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.3.rundll32.exe.51694a0.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000002.00000003.401727363.0000000002C60000.00000040.00000010.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.420035815.0000000002C40000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.401325815.0000000002650000.00000040.00000010.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000003.417864132.0000000004C80000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000003.449697132.0000000005169000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.826309234.0000000004539000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000003.413516631.0000000003260000.00000040.00000010.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.825738430.00000000031F9000.00000004.00000040.sdmp, type: MEMORY

                      E-Banking Fraud:

                      barindex
                      Yara detected UrsnifShow sources
                      Source: Yara matchFile source: 00000000.00000003.457883512.0000000003BF8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.448559940.0000000004F68000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.448597664.0000000004F68000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.458003992.0000000003BF8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.457844986.0000000003BF8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.448496716.0000000004F68000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.457961241.0000000003BF8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.457926996.0000000003BF8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.448462306.0000000004F68000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.457986489.0000000003BF8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.825811764.0000000003BF8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.448582889.0000000004F68000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.448524349.0000000004F68000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.448420040.0000000004F68000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.826711993.0000000004F68000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.458017733.0000000003BF8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.457907127.0000000003BF8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.448613025.0000000004F68000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: loaddll32.exe PID: 5276, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 5692, type: MEMORYSTR
                      Source: Yara matchFile source: 2.3.rundll32.exe.2c68c9b.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.3.rundll32.exe.3268c9b.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.45394a0.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.loaddll32.exe.2c80000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.rundll32.exe.2658c9b.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.45394a0.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.loaddll32.exe.31f94a0.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.loaddll32.exe.31f94a0.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.loaddll32.exe.2c48c9b.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.rundll32.exe.5280000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.3.rundll32.exe.51694a0.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.3.rundll32.exe.4c88c9b.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.loaddll32.exe.6e9f0000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.2680000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.6e9f0000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.3.rundll32.exe.51694a0.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000002.00000003.401727363.0000000002C60000.00000040.00000010.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.420035815.0000000002C40000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.401325815.0000000002650000.00000040.00000010.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000003.417864132.0000000004C80000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000003.449697132.0000000005169000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.826309234.0000000004539000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000003.413516631.0000000003260000.00000040.00000010.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.825738430.00000000031F9000.00000004.00000040.sdmp, type: MEMORY
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_02C83FAB CryptAcquireContextW,memcpy,CryptImportKey,CryptSetKeyParam,memcpy,CryptEncrypt,GetLastError,GetLastError,CryptDestroyKey,GetLastError,CryptReleaseContext,GetLastError,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02683FAB CryptAcquireContextW,memcpy,CryptImportKey,CryptSetKeyParam,memcpy,CryptEncrypt,GetLastError,GetLastError,CryptDestroyKey,GetLastError,CryptReleaseContext,GetLastError,

                      System Summary:

                      barindex
                      Writes or reads registry keys via WMIShow sources
                      Source: C:\Windows\System32\loaddll32.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::GetStringValue
                      Source: C:\Windows\System32\loaddll32.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetDWORDValue
                      Source: C:\Windows\System32\loaddll32.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
                      Source: C:\Windows\System32\loaddll32.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue
                      Rundll32 performs DNS lookup (likely malicious behavior)Show sources
                      Source: C:\Windows\SysWOW64\rundll32.exeDNS query: name: fx.rhinobuff.com
                      Source: C:\Windows\SysWOW64\rundll32.exeDNS query: name: fio.linosheart.com
                      Source: C:\Windows\SysWOW64\rundll32.exeDNS query: name: fx.rhinobuff.com
                      Source: C:\Windows\SysWOW64\rundll32.exeDNS query: name: fio.linosheart.com
                      Source: C:\Windows\SysWOW64\rundll32.exeDNS query: name: fx.rhinobuff.com
                      Source: C:\Windows\SysWOW64\rundll32.exeDNS query: name: fio.linosheart.com
                      Source: C:\Windows\SysWOW64\rundll32.exeDNS query: name: fx.rhinobuff.com
                      Source: C:\Windows\SysWOW64\rundll32.exeDNS query: name: fio.linosheart.com
                      Source: C:\Windows\SysWOW64\rundll32.exeDNS query: name: fx.rhinobuff.com
                      Writes registry values via WMIShow sources
                      Source: C:\Windows\System32\loaddll32.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetDWORDValue
                      Source: C:\Windows\System32\loaddll32.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
                      Source: C:\Windows\System32\loaddll32.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue
                      Source: C:\Windows\SysWOW64\rundll32.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetDWORDValue
                      Source: C:\Windows\SysWOW64\rundll32.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
                      Source: C:\Windows\SysWOW64\rundll32.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue
                      Source: 61766fc85163a.dllStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E9F2274
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_02C82654
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_02C87E30
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_02C84FA7
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6EA41EE0
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6EA48E07
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6EA56E61
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6EA34DC0
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6EA31D72
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6EA4E8BB
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02682654
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02687E30
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02684FA7
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6EA41EE0
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6EA56E61
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6EA34DC0
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6EA31D72
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6EA4E8BB
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_05284FA7
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_05287E30
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_05282654
                      Source: C:\Windows\System32\loaddll32.exeCode function: String function: 6EA31211 appears 86 times
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 6EA31211 appears 86 times
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E9F121F NtMapViewOfSection,
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E9F1A1C SetThreadPriority,NtQuerySystemInformation,Sleep,GetLongPathNameW,GetLongPathNameW,GetLongPathNameW,WaitForSingleObject,GetExitCodeThread,CloseHandle,GetLastError,GetLastError,
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E9F2013 GetProcAddress,NtCreateSection,memset,
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E9F2495 NtQueryVirtualMemory,
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_02C822EC NtOpenProcess,NtOpenProcessToken,NtQueryInformationToken,NtQueryInformationToken,NtQueryInformationToken,memcpy,NtClose,NtClose,
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_02C88055 NtQueryVirtualMemory,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_026822EC NtOpenProcess,NtOpenProcessToken,NtQueryInformationToken,NtQueryInformationToken,NtQueryInformationToken,memcpy,NtClose,NtClose,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02688055 NtQueryVirtualMemory,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_052822EC NtOpenProcess,NtOpenProcessToken,NtQueryInformationToken,NtQueryInformationToken,NtQueryInformationToken,memcpy,NtClose,NtClose,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_05288055 NtQueryVirtualMemory,
                      Source: 61766fc85163a.dllBinary or memory string: OriginalFilenameSelf.dllD vs 61766fc85163a.dll
                      Source: 61766fc85163a.dllStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                      Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe 'C:\Users\user\Desktop\61766fc85163a.dll'
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\61766fc85163a.dll',#1
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\61766fc85163a.dll,Cow
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\61766fc85163a.dll',#1
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\61766fc85163a.dll,Fishdark
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\61766fc85163a.dll,Multiplyboat
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\61766fc85163a.dll',#1
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\61766fc85163a.dll,Cow
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\61766fc85163a.dll,Fishdark
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\61766fc85163a.dll,Multiplyboat
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\61766fc85163a.dll',#1
                      Source: C:\Windows\System32\loaddll32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}\InprocServer32
                      Source: classification engineClassification label: mal84.troj.evad.winDLL@11/0@19/1
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_02C811B8 CreateToolhelp32Snapshot,Process32First,Process32Next,CloseHandle,
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\61766fc85163a.dll,Cow
                      Source: 61766fc85163a.dllJoe Sandbox Cloud Basic: Detection: clean Score: 0Perma Link
                      Source: loaddll32.exeString found in binary or memory: tHomePremium~31bf3856ad364e35~x86~~6.1.7601.17514" update="Server-Help-Package.ClientHomePremium-Update"/> <Stage pac
                      Source: loaddll32.exeString found in binary or memory: 6~~6.1.7601.17514" update="CoreClientHomePremium"/> <Stage package="Microsoft-Windows-Help-CoreClientUAHP-Package~31b
                      Source: loaddll32.exeString found in binary or memory: osoft-Windows-Help-CoreClientUAPS-Package~31bf3856ad364e35~x86~~6.1.7601.17514" update="CoreClientBusiness"/> <Stage
                      Source: loaddll32.exeString found in binary or memory: <Stage package="Server-Help-Package.ClientProfessional~31bf3856ad364e35~x86~~6.1.7601.17514" update="Server-Help-Pac
                      Source: loaddll32.exeString found in binary or memory: 601.17514" update="BHPC Namespace"/> <Stage package="Microsoft-Windows-Help-CoreClientUAHP-Package~31bf3856ad364e35~x
                      Source: loaddll32.exeString found in binary or memory: 3856ad364e35~x86~~6.1.7601.17514" update="CoreClientCollectionHomePremium"/> <Stage package="Server-Help-Package.Clie
                      Source: loaddll32.exeString found in binary or memory: ackage="Microsoft-Windows-Help-CoreClientUAPS-Package~31bf3856ad364e35~x86~~6.1.7601.17514" update="CoreClientCollectionBusiness"/
                      Source: rundll32.exeString found in binary or memory: tHomePremium~31bf3856ad364e35~x86~~6.1.7601.17514" update="Server-Help-Package.ClientHomePremium-Update"/> <Stage pac
                      Source: rundll32.exeString found in binary or memory: 6~~6.1.7601.17514" update="CoreClientHomePremium"/> <Stage package="Microsoft-Windows-Help-CoreClientUAHP-Package~31b
                      Source: rundll32.exeString found in binary or memory: osoft-Windows-Help-CoreClientUAPS-Package~31bf3856ad364e35~x86~~6.1.7601.17514" update="CoreClientBusiness"/> <Stage
                      Source: rundll32.exeString found in binary or memory: <Stage package="Server-Help-Package.ClientProfessional~31bf3856ad364e35~x86~~6.1.7601.17514" update="Server-Help-Pac
                      Source: rundll32.exeString found in binary or memory: 601.17514" update="BHPC Namespace"/> <Stage package="Microsoft-Windows-Help-CoreClientUAHP-Package~31bf3856ad364e35~x
                      Source: rundll32.exeString found in binary or memory: 3856ad364e35~x86~~6.1.7601.17514" update="CoreClientCollectionHomePremium"/> <Stage package="Server-Help-Package.Clie
                      Source: rundll32.exeString found in binary or memory: ackage="Microsoft-Windows-Help-CoreClientUAPS-Package~31bf3856ad364e35~x86~~6.1.7601.17514" update="CoreClientCollectionBusiness"/
                      Source: C:\Windows\System32\loaddll32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\loaddll32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeAutomated click: OK
                      Source: C:\Windows\SysWOW64\rundll32.exeAutomated click: OK
                      Source: C:\Windows\SysWOW64\rundll32.exeAutomated click: OK
                      Source: C:\Windows\SysWOW64\rundll32.exeAutomated click: OK
                      Source: 61766fc85163a.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                      Source: 61766fc85163a.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                      Source: 61766fc85163a.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                      Source: 61766fc85163a.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                      Source: 61766fc85163a.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                      Source: 61766fc85163a.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                      Source: 61766fc85163a.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT
                      Source: 61766fc85163a.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                      Source: Binary string: c:\939\Charge\Sense\Young\Self.pdb source: loaddll32.exe, 00000000.00000002.826085612.000000006EA6C000.00000002.00020000.sdmp, rundll32.exe, 00000003.00000002.827483917.000000006EA6C000.00000002.00020000.sdmp, 61766fc85163a.dll
                      Source: 61766fc85163a.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                      Source: 61766fc85163a.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                      Source: 61766fc85163a.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                      Source: 61766fc85163a.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                      Source: 61766fc85163a.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E9F2210 push ecx; ret
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E9F2263 push ecx; ret
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_02C87AB0 push ecx; ret
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_02C87E1F push ecx; ret
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6EA317F6 push ecx; ret
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6EA311DA push ecx; ret
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02687E1F push ecx; ret
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02687AB0 push ecx; ret
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6EA317F6 push ecx; ret
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6EA311DA push ecx; ret
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_05287E1F push ecx; ret
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_05287AB0 push ecx; ret
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E9F1552 LoadLibraryA,GetProcAddress,

                      Hooking and other Techniques for Hiding and Protection:

                      barindex
                      Yara detected UrsnifShow sources
                      Source: Yara matchFile source: 00000000.00000003.457883512.0000000003BF8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.448559940.0000000004F68000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.448597664.0000000004F68000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.458003992.0000000003BF8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.457844986.0000000003BF8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.448496716.0000000004F68000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.457961241.0000000003BF8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.457926996.0000000003BF8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.448462306.0000000004F68000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.457986489.0000000003BF8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.825811764.0000000003BF8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.448582889.0000000004F68000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.448524349.0000000004F68000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.448420040.0000000004F68000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.826711993.0000000004F68000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.458017733.0000000003BF8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.457907127.0000000003BF8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.448613025.0000000004F68000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: loaddll32.exe PID: 5276, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 5692, type: MEMORYSTR
                      Source: Yara matchFile source: 2.3.rundll32.exe.2c68c9b.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.3.rundll32.exe.3268c9b.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.45394a0.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.loaddll32.exe.2c80000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.rundll32.exe.2658c9b.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.45394a0.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.loaddll32.exe.31f94a0.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.loaddll32.exe.31f94a0.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.loaddll32.exe.2c48c9b.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.rundll32.exe.5280000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.3.rundll32.exe.51694a0.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.3.rundll32.exe.4c88c9b.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.loaddll32.exe.6e9f0000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.2680000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.6e9f0000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.3.rundll32.exe.51694a0.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000002.00000003.401727363.0000000002C60000.00000040.00000010.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.420035815.0000000002C40000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.401325815.0000000002650000.00000040.00000010.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000003.417864132.0000000004C80000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000003.449697132.0000000005169000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.826309234.0000000004539000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000003.413516631.0000000003260000.00000040.00000010.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.825738430.00000000031F9000.00000004.00000040.sdmp, type: MEMORY
                      Source: C:\Windows\System32\loaddll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\loaddll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\loaddll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\loaddll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6EA3C7F4 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E9F1552 LoadLibraryA,GetProcAddress,
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6EA50329 mov eax, dword ptr fs:[00000030h]
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6EA950A2 mov eax, dword ptr fs:[00000030h]
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6EA94F72 mov eax, dword ptr fs:[00000030h]
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6EA94C7D push dword ptr fs:[00000030h]
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6EA50329 mov eax, dword ptr fs:[00000030h]
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6EA950A2 mov eax, dword ptr fs:[00000030h]
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6EA94C7D push dword ptr fs:[00000030h]
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6EA94F72 mov eax, dword ptr fs:[00000030h]
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6EA3C7F4 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6EA3180B SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6EA3C7F4 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6EA3180B SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,

                      HIPS / PFW / Operating System Protection Evasion:

                      barindex
                      System process connects to network (likely due to code injection or exploit)Show sources
                      Source: C:\Windows\SysWOW64\rundll32.exeDomain query: fio.linosheart.com
                      Source: C:\Windows\SysWOW64\rundll32.exeDomain query: fx.rhinobuff.com
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\61766fc85163a.dll',#1
                      Source: loaddll32.exe, 00000000.00000002.825439439.0000000001820000.00000002.00020000.sdmp, rundll32.exe, 00000003.00000002.826048701.0000000002C50000.00000002.00020000.sdmpBinary or memory string: Program Manager
                      Source: loaddll32.exe, 00000000.00000002.825439439.0000000001820000.00000002.00020000.sdmp, rundll32.exe, 00000003.00000002.826048701.0000000002C50000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
                      Source: loaddll32.exe, 00000000.00000002.825439439.0000000001820000.00000002.00020000.sdmp, rundll32.exe, 00000003.00000002.826048701.0000000002C50000.00000002.00020000.sdmpBinary or memory string: Progman
                      Source: loaddll32.exe, 00000000.00000002.825439439.0000000001820000.00000002.00020000.sdmp, rundll32.exe, 00000003.00000002.826048701.0000000002C50000.00000002.00020000.sdmpBinary or memory string: Progmanlock
                      Source: C:\Windows\System32\loaddll32.exeCode function: GetLocaleInfoA,GetSystemDefaultUILanguage,VerLanguageNameA,
                      Source: C:\Windows\System32\loaddll32.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,
                      Source: C:\Windows\System32\loaddll32.exeCode function: ___crtGetLocaleInfoEx,
                      Source: C:\Windows\System32\loaddll32.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,
                      Source: C:\Windows\System32\loaddll32.exeCode function: GetLocaleInfoW,
                      Source: C:\Windows\System32\loaddll32.exeCode function: EnumSystemLocalesW,
                      Source: C:\Windows\System32\loaddll32.exeCode function: GetLocaleInfoW,
                      Source: C:\Windows\System32\loaddll32.exeCode function: EnumSystemLocalesW,
                      Source: C:\Windows\System32\loaddll32.exeCode function: EnumSystemLocalesW,
                      Source: C:\Windows\System32\loaddll32.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,
                      Source: C:\Windows\System32\loaddll32.exeCode function: EnumSystemLocalesW,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: ___crtGetLocaleInfoEx,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoW,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: EnumSystemLocalesW,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoW,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: EnumSystemLocalesW,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: EnumSystemLocalesW,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: EnumSystemLocalesW,
                      Source: C:\Windows\System32\loaddll32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion InstallDate
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_02C82E33 cpuid
                      Source: C:\Windows\System32\loaddll32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E9F109B GetSystemTimeAsFileTime,_aulldiv,_snwprintf,CreateFileMappingW,GetLastError,GetLastError,MapViewOfFile,GetLastError,CloseHandle,GetLastError,
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6EA5B6BE _free,_free,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E9F1C6F CreateEventA,GetVersion,GetCurrentProcessId,OpenProcess,GetLastError,
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_02C82E33 wsprintfA,RtlAllocateHeap,GetUserNameW,RtlAllocateHeap,GetUserNameW,HeapFree,GetComputerNameW,GetComputerNameW,RtlAllocateHeap,GetComputerNameW,HeapFree,

                      Stealing of Sensitive Information:

                      barindex
                      Yara detected UrsnifShow sources
                      Source: Yara matchFile source: 00000000.00000003.457883512.0000000003BF8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.448559940.0000000004F68000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.448597664.0000000004F68000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.458003992.0000000003BF8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.457844986.0000000003BF8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.448496716.0000000004F68000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.457961241.0000000003BF8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.457926996.0000000003BF8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.448462306.0000000004F68000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.457986489.0000000003BF8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.825811764.0000000003BF8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.448582889.0000000004F68000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.448524349.0000000004F68000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.448420040.0000000004F68000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.826711993.0000000004F68000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.458017733.0000000003BF8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.457907127.0000000003BF8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.448613025.0000000004F68000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: loaddll32.exe PID: 5276, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 5692, type: MEMORYSTR
                      Source: Yara matchFile source: 2.3.rundll32.exe.2c68c9b.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.3.rundll32.exe.3268c9b.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.45394a0.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.loaddll32.exe.2c80000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.rundll32.exe.2658c9b.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.45394a0.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.loaddll32.exe.31f94a0.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.loaddll32.exe.31f94a0.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.loaddll32.exe.2c48c9b.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.rundll32.exe.5280000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.3.rundll32.exe.51694a0.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.3.rundll32.exe.4c88c9b.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.loaddll32.exe.6e9f0000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.2680000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.6e9f0000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.3.rundll32.exe.51694a0.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000002.00000003.401727363.0000000002C60000.00000040.00000010.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.420035815.0000000002C40000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.401325815.0000000002650000.00000040.00000010.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000003.417864132.0000000004C80000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000003.449697132.0000000005169000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.826309234.0000000004539000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000003.413516631.0000000003260000.00000040.00000010.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.825738430.00000000031F9000.00000004.00000040.sdmp, type: MEMORY

                      Remote Access Functionality:

                      barindex
                      Yara detected UrsnifShow sources
                      Source: Yara matchFile source: 00000000.00000003.457883512.0000000003BF8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.448559940.0000000004F68000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.448597664.0000000004F68000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.458003992.0000000003BF8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.457844986.0000000003BF8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.448496716.0000000004F68000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.457961241.0000000003BF8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.457926996.0000000003BF8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.448462306.0000000004F68000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.457986489.0000000003BF8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.825811764.0000000003BF8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.448582889.0000000004F68000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.448524349.0000000004F68000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.448420040.0000000004F68000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.826711993.0000000004F68000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.458017733.0000000003BF8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.457907127.0000000003BF8000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.448613025.0000000004F68000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: loaddll32.exe PID: 5276, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 5692, type: MEMORYSTR
                      Source: Yara matchFile source: 2.3.rundll32.exe.2c68c9b.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.3.rundll32.exe.3268c9b.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.45394a0.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.loaddll32.exe.2c80000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.rundll32.exe.2658c9b.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.45394a0.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.loaddll32.exe.31f94a0.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.loaddll32.exe.31f94a0.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.loaddll32.exe.2c48c9b.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.rundll32.exe.5280000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.3.rundll32.exe.51694a0.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.3.rundll32.exe.4c88c9b.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.loaddll32.exe.6e9f0000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.2680000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.6e9f0000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.3.rundll32.exe.51694a0.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000002.00000003.401727363.0000000002C60000.00000040.00000010.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.420035815.0000000002C40000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.401325815.0000000002650000.00000040.00000010.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000003.417864132.0000000004C80000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000003.449697132.0000000005169000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.826309234.0000000004539000.00000004.00000040.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000003.413516631.0000000003260000.00000040.00000010.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.825738430.00000000031F9000.00000004.00000040.sdmp, type: MEMORY

                      Mitre Att&ck Matrix

                      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                      Valid AccountsWindows Management Instrumentation2Path InterceptionProcess Injection112Process Injection112OS Credential DumpingSystem Time Discovery2Remote ServicesArchive Collected Data11Exfiltration Over Other Network MediumEncrypted Channel2Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationData Encrypted for Impact1
                      Default AccountsCommand and Scripting Interpreter2Boot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsDeobfuscate/Decode Files or Information1LSASS MemorySecurity Software Discovery1Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothNon-Application Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                      Domain AccountsNative API1Logon Script (Windows)Logon Script (Windows)Obfuscated Files or Information2Security Account ManagerProcess Discovery2SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationApplication Layer Protocol1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Rundll3211NTDSAccount Discovery1Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA SecretsSystem Owner/User Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                      Replication Through Removable MediaLaunchdRc.commonRc.commonSteganographyCached Domain CredentialsRemote System Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSyncSystem Information Discovery34Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact

                      Behavior Graph

                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 508544 Sample: 61766fc85163a.dll Startdate: 25/10/2021 Architecture: WINDOWS Score: 84 24 fio.linosheart.com 2->24 36 Found malware configuration 2->36 38 Yara detected  Ursnif 2->38 8 loaddll32.exe 1 2->8         started        signatures3 process4 dnsIp5 32 fx.rhinobuff.com 8->32 34 fio.linosheart.com 8->34 40 Writes or reads registry keys via WMI 8->40 42 Writes registry values via WMI 8->42 12 rundll32.exe 8->12         started        15 cmd.exe 1 8->15         started        17 rundll32.exe 8->17         started        19 rundll32.exe 8->19         started        signatures6 process7 signatures8 44 System process connects to network (likely due to code injection or exploit) 12->44 46 Rundll32 performs DNS lookup (likely malicious behavior) 12->46 48 Writes registry values via WMI 12->48 21 rundll32.exe 15->21         started        process9 dnsIp10 26 fx.rhinobuff.com 21->26 28 fio.linosheart.com 21->28 30 192.168.2.1 unknown unknown 21->30

                      Screenshots

                      Thumbnails

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                      windows-stand

                      Antivirus, Machine Learning and Genetic Malware Detection

                      Initial Sample

                      No Antivirus matches

                      Dropped Files

                      No Antivirus matches

                      Unpacked PE Files

                      SourceDetectionScannerLabelLinkDownload
                      0.2.loaddll32.exe.2c80000.0.unpack100%AviraHEUR/AGEN.1108168Download File
                      3.2.rundll32.exe.2680000.0.unpack100%AviraHEUR/AGEN.1108168Download File
                      6.2.rundll32.exe.5280000.0.unpack100%AviraHEUR/AGEN.1108168Download File

                      Domains

                      No Antivirus matches

                      URLs

                      SourceDetectionScannerLabelLink
                      http://fx.rhinobuff.com/x0ylueFuXgrpB3WJj/TF7mv4QreQVW/NyZwfSNmEuc/QVDm3PVK85XSch/TwihngzLYMfTath4pJ0%Avira URL Cloudsafe

                      Domains and IPs

                      Contacted Domains

                      NameIPActiveMaliciousAntivirus DetectionReputation
                      fx.rhinobuff.com
                      unknown
                      unknowntrue
                        unknown
                        fio.linosheart.com
                        unknown
                        unknowntrue
                          unknown

                          URLs from Memory and Binaries

                          NameSourceMaliciousAntivirus DetectionReputation
                          http://fx.rhinobuff.com/x0ylueFuXgrpB3WJj/TF7mv4QreQVW/NyZwfSNmEuc/QVDm3PVK85XSch/TwihngzLYMfTath4pJloaddll32.exe, 00000000.00000003.631196087.00000000013F5000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown

                          Contacted IPs

                          • No. of IPs < 25%
                          • 25% < No. of IPs < 50%
                          • 50% < No. of IPs < 75%
                          • 75% < No. of IPs

                          Public

                          IPDomainCountryFlagASNASN NameMalicious

                          Private

                          IP
                          192.168.2.1

                          General Information

                          Joe Sandbox Version:33.0.0 White Diamond
                          Analysis ID:508544
                          Start date:25.10.2021
                          Start time:10:55:24
                          Joe Sandbox Product:CloudBasic
                          Overall analysis duration:0h 9m 1s
                          Hypervisor based Inspection enabled:false
                          Report type:light
                          Sample file name:61766fc85163a.dll
                          Cookbook file name:default.jbs
                          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                          Number of analysed new started processes analysed:23
                          Number of new started drivers analysed:0
                          Number of existing processes analysed:0
                          Number of existing drivers analysed:0
                          Number of injected processes analysed:0
                          Technologies:
                          • HCA enabled
                          • EGA enabled
                          • HDC enabled
                          • AMSI enabled
                          Analysis Mode:default
                          Analysis stop reason:Timeout
                          Detection:MAL
                          Classification:mal84.troj.evad.winDLL@11/0@19/1
                          EGA Information:Failed
                          HDC Information:
                          • Successful, ratio: 21.3% (good quality ratio 20.5%)
                          • Quality average: 79.7%
                          • Quality standard deviation: 28.3%
                          HCA Information:
                          • Successful, ratio: 73%
                          • Number of executed functions: 0
                          • Number of non-executed functions: 0
                          Cookbook Comments:
                          • Adjust boot time
                          • Enable AMSI
                          • Found application associated with file extension: .dll
                          • Override analysis time to 240s for rundll32
                          Warnings:
                          Show All
                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, RuntimeBroker.exe, WMIADAP.exe, conhost.exe, backgroundTaskHost.exe, WmiPrvSE.exe, svchost.exe, wuapihost.exe
                          • Excluded IPs from analysis (whitelisted): 20.50.102.62, 20.82.210.154, 80.67.82.211, 80.67.82.235, 20.54.110.249, 40.91.112.76, 40.112.88.60
                          • Excluded domains from analysis (whitelisted): displaycatalog-rp-uswest.md.mp.microsoft.com.akadns.net, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, neu-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, ris-prod.trafficmanager.net, asf-ris-prod-neu.northeurope.cloudapp.azure.com, iris-de-prod-azsc-neu-b.northeurope.cloudapp.azure.com, iris-de-prod-azsc-uks.uksouth.cloudapp.azure.com, a1449.dscg2.akamai.net, wus2-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, arc.msn.com, ris.api.iris.microsoft.com, consumer-displaycatalogrp-aks2aks-europe.md.mp.microsoft.com.akadns.net, arc.trafficmanager.net, consumer-displaycatalogrp-aks2aks-uswest.md.mp.microsoft.com.akadns.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
                          • Not all processes where analyzed, report is missing behavior information
                          • Report size getting too big, too many NtProtectVirtualMemory calls found.
                          • Report size getting too big, too many NtQueryValueKey calls found.

                          Simulations

                          Behavior and APIs

                          TimeTypeDescription
                          10:57:35API Interceptor9x Sleep call for process: rundll32.exe modified
                          10:57:39API Interceptor9x Sleep call for process: loaddll32.exe modified

                          Joe Sandbox View / Context

                          IPs

                          No context

                          Domains

                          No context

                          ASN

                          No context

                          JA3 Fingerprints

                          No context

                          Dropped Files

                          No context

                          Created / dropped Files

                          No created / dropped files found

                          Static File Info

                          General

                          File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                          Entropy (8bit):6.697119689004969
                          TrID:
                          • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
                          • Generic Win/DOS Executable (2004/3) 0.20%
                          • DOS Executable Generic (2002/1) 0.20%
                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                          File name:61766fc85163a.dll
                          File size:685056
                          MD5:5ba43bc79bff74cc56919f7fd053a284
                          SHA1:49256e2887cab7474a3231b289bd86773f971c16
                          SHA256:876666a6f9230b86577eedc94fa30f808e8e4aecce1d054131b757cfd8270989
                          SHA512:1769052a70e78f70777019b9eea9326adb1b88a219477a83f8a446111b561c5bfa66b281229440125dcdde697f2485afd99f432b6e3c193f19ddbc21bc08b4a5
                          SSDEEP:12288:Dm/ZzH8Y9R1XuntqkXGKOy1Ks7iGQrI0iM+Yvmpdrbid1q1ck2B0CWhFbTouKt4v:DmhbRRunAkXGKOy1Ks7iGQrI0iM+Yvmo
                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........................].......>.........j...........................................................Rich...........................

                          File Icon

                          Icon Hash:74f0e4ecccdce0e4

                          Static PE Info

                          General

                          Entrypoint:0x100411b7
                          Entrypoint Section:.text
                          Digitally signed:false
                          Imagebase:0x10000000
                          Subsystem:windows gui
                          Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
                          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT
                          Time Stamp:0x5BC239CB [Sat Oct 13 18:30:35 2018 UTC]
                          TLS Callbacks:
                          CLR (.Net) Version:
                          OS Version Major:6
                          OS Version Minor:0
                          File Version Major:6
                          File Version Minor:0
                          Subsystem Version Major:6
                          Subsystem Version Minor:0
                          Import Hash:7fbcde9b0ceaa34f5b9ba966c49456aa

                          Entrypoint Preview

                          Instruction
                          push ebp
                          mov ebp, esp
                          cmp dword ptr [ebp+0Ch], 01h
                          jne 00007FC9E8A97D47h
                          call 00007FC9E8A986E7h
                          push dword ptr [ebp+10h]
                          push dword ptr [ebp+0Ch]
                          push dword ptr [ebp+08h]
                          call 00007FC9E8A97BEFh
                          add esp, 0Ch
                          pop ebp
                          retn 000Ch
                          mov ecx, dword ptr [ebp-0Ch]
                          mov dword ptr fs:[00000000h], ecx
                          pop ecx
                          pop edi
                          pop edi
                          pop esi
                          pop ebx
                          mov esp, ebp
                          pop ebp
                          push ecx
                          ret
                          mov ecx, dword ptr [ebp-10h]
                          xor ecx, ebp
                          call 00007FC9E8A9795Eh
                          jmp 00007FC9E8A97D20h
                          mov ecx, dword ptr [ebp-14h]
                          xor ecx, ebp
                          call 00007FC9E8A9794Dh
                          jmp 00007FC9E8A97D0Fh
                          push eax
                          push dword ptr fs:[00000000h]
                          lea eax, dword ptr [esp+0Ch]
                          sub esp, dword ptr [esp+0Ch]
                          push ebx
                          push esi
                          push edi
                          mov dword ptr [eax], ebp
                          mov ebp, eax
                          mov eax, dword ptr [100A20F4h]
                          xor eax, ebp
                          push eax
                          push dword ptr [ebp-04h]
                          mov dword ptr [ebp-04h], FFFFFFFFh
                          lea eax, dword ptr [ebp-0Ch]
                          mov dword ptr fs:[00000000h], eax
                          ret
                          push eax
                          push dword ptr fs:[00000000h]
                          lea eax, dword ptr [esp+0Ch]
                          sub esp, dword ptr [esp+0Ch]
                          push ebx
                          push esi
                          push edi
                          mov dword ptr [eax], ebp
                          mov ebp, eax
                          mov eax, dword ptr [100A20F4h]
                          xor eax, ebp
                          push eax
                          mov dword ptr [ebp-10h], eax
                          push dword ptr [ebp-04h]
                          mov dword ptr [ebp-04h], FFFFFFFFh
                          lea eax, dword ptr [ebp-0Ch]
                          mov dword ptr fs:[00000000h], eax
                          ret
                          push eax
                          inc dword ptr fs:[eax]

                          Rich Headers

                          Programming Language:
                          • [IMP] VS2008 SP1 build 30729

                          Data Directories

                          NameVirtual AddressVirtual Size Is in Section
                          IMAGE_DIRECTORY_ENTRY_EXPORT0xa0ef00x80.rdata
                          IMAGE_DIRECTORY_ENTRY_IMPORT0xa0f700x8c.rdata
                          IMAGE_DIRECTORY_ENTRY_RESOURCE0xb90000x360.rsrc
                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                          IMAGE_DIRECTORY_ENTRY_BASERELOC0xba0000x521c.reloc
                          IMAGE_DIRECTORY_ENTRY_DEBUG0x9ccd00x54.rdata
                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x9cd280x40.rdata
                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IAT0x7c0000x240.rdata
                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                          Sections

                          NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                          .text0x10000x7a0130x7a200False0.525452597236data6.76479443466IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                          .rdata0x7c0000x25c980x25e00False0.527221276815data5.51438291305IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          .data0xa20000x1648c0x1800False0.197591145833data4.17350541835IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                          .rsrc0xb90000x3600x400False0.388671875data2.88168607856IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          .reloc0xba0000x521c0x5400False0.739164806548data6.67826245353IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                          Resources

                          NameRVASizeTypeLanguageCountry
                          RT_VERSION0xb90600x2fcdataEnglishUnited States

                          Imports

                          DLLImport
                          KERNEL32.dllGetStartupInfoA, GetSystemDirectoryA, GetTempPathA, GetCurrentDirectoryA, RemoveDirectoryA, DeleteFileA, CreateThread, WaitForSingleObjectEx, OutputDebugStringW, OutputDebugStringA, WriteConsoleW, FlushFileBuffers, CreateProcessA, GetConsoleMode, GetConsoleCP, WriteFile, HeapSize, SetStdHandle, GetProcessHeap, GetTickCount, SetEnvironmentVariableA, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineW, GetCommandLineA, GetModuleFileNameA, CreateSemaphoreA, CreateEventA, TlsSetValue, SetFilePointerEx, TlsAlloc, GetOEMCP, IsValidCodePage, FindNextFileW, FindNextFileA, FindFirstFileExW, FindFirstFileExA, FindClose, GetTimeZoneInformation, SetConsoleCtrlHandler, GetFileType, GetStdHandle, HeapReAlloc, EnumSystemLocalesW, GetUserDefaultLCID, FileTimeToSystemTime, CloseHandle, VirtualProtect, SetEnvironmentVariableW, GetVersion, EncodePointer, DecodePointer, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, WideCharToMultiByte, SetLastError, InitializeCriticalSectionAndSpinCount, CreateEventW, SwitchToThread, TlsGetValue, TlsFree, GetSystemTimeAsFileTime, GetModuleHandleW, GetProcAddress, MultiByteToWideChar, GetStringTypeW, CompareStringW, LCMapStringW, GetLocaleInfoW, GetCPInfo, IsProcessorFeaturePresent, IsDebuggerPresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetStartupInfoW, GetCurrentProcess, TerminateProcess, QueryPerformanceCounter, GetCurrentProcessId, GetCurrentThreadId, InitializeSListHead, RaiseException, RtlUnwind, InterlockedPushEntrySList, InterlockedFlushSList, GetLastError, FreeLibrary, LoadLibraryExW, ExitProcess, GetModuleHandleExW, GetModuleFileNameW, GetCurrentThread, HeapAlloc, GetACP, HeapFree, GetDateFormatW, GetTimeFormatW, IsValidLocale, CreateFileW
                          USER32.dllRegisterWindowMessageA, TranslateMessage, UnregisterHotKey, BeginDeferWindowPos, DeferWindowPos, IsIconic, GetDlgItem, CreateMenu, GetMenuItemCount, ScrollWindow, SetPropA, GetPropA, SetWindowTextA, GetWindow, FindWindowA, GetParent, SetWindowLongA
                          GDI32.dllStretchBlt, SetPixel, CreateCompatibleBitmap, PatBlt, GetTextExtentPoint32A
                          ole32.dllOleInitialize, CLSIDFromString, CoCreateInstance, CoUninitialize, CoInitialize, OleUninitialize
                          WINSPOOL.DRVEnumPrintersA, ClosePrinter, OpenPrinterA, GetPrinterDataA, AddPrinterConnectionA, DocumentPropertiesA
                          COMCTL32.dllImageList_Draw, PropertySheetA, CreatePropertySheetPageA, ImageList_SetDragCursorImage

                          Exports

                          NameOrdinalAddress
                          Cow10x1001ddd0
                          Fishdark20x1001e080
                          Multiplyboat30x1001e240
                          Supportcheck40x1001e5e0

                          Version Infos

                          DescriptionData
                          LegalCopyrightCopyright Stone continent 1994-2018
                          FileVersion0.3.3.610
                          CompanyNameStone continent
                          Enter16-3489-2801
                          ProductNameCaughtbird Ablelive
                          ProductVersion0.3.3.610
                          FileDescriptionCaughtbird Ablelive
                          OriginalFilenameSelf.dll
                          Translation0x0409 0x04e4

                          Possible Origin

                          Language of compilation systemCountry where language is spokenMap
                          EnglishUnited States

                          Network Behavior

                          Network Port Distribution

                          UDP Packets

                          TimestampSource PortDest PortSource IPDest IP
                          Oct 25, 2021 10:57:36.541914940 CEST5787553192.168.2.38.8.8.8
                          Oct 25, 2021 10:57:36.565784931 CEST53578758.8.8.8192.168.2.3
                          Oct 25, 2021 10:57:40.855165958 CEST5415453192.168.2.38.8.8.8
                          Oct 25, 2021 10:57:40.873775005 CEST53541548.8.8.8192.168.2.3
                          Oct 25, 2021 10:57:56.723613977 CEST5391053192.168.2.38.8.8.8
                          Oct 25, 2021 10:57:56.741938114 CEST53539108.8.8.8192.168.2.3
                          Oct 25, 2021 10:58:00.911278009 CEST6402153192.168.2.38.8.8.8
                          Oct 25, 2021 10:58:00.930002928 CEST53640218.8.8.8192.168.2.3
                          Oct 25, 2021 10:58:16.870439053 CEST5114353192.168.2.38.8.8.8
                          Oct 25, 2021 10:58:16.891081095 CEST53511438.8.8.8192.168.2.3
                          Oct 25, 2021 10:58:20.979888916 CEST5600953192.168.2.38.8.8.8
                          Oct 25, 2021 10:58:21.002942085 CEST53560098.8.8.8192.168.2.3
                          Oct 25, 2021 10:58:37.030309916 CEST5361553192.168.2.38.8.8.8
                          Oct 25, 2021 10:58:37.048883915 CEST53536158.8.8.8192.168.2.3
                          Oct 25, 2021 10:58:41.226304054 CEST5072853192.168.2.38.8.8.8
                          Oct 25, 2021 10:58:41.244290113 CEST53507288.8.8.8192.168.2.3
                          Oct 25, 2021 10:58:57.148864031 CEST5377753192.168.2.38.8.8.8
                          Oct 25, 2021 10:58:57.167082071 CEST53537778.8.8.8192.168.2.3
                          Oct 25, 2021 10:59:01.448348045 CEST5710653192.168.2.38.8.8.8
                          Oct 25, 2021 10:59:01.468022108 CEST53571068.8.8.8192.168.2.3
                          Oct 25, 2021 10:59:17.336637974 CEST6035253192.168.2.38.8.8.8
                          Oct 25, 2021 10:59:17.355292082 CEST53603528.8.8.8192.168.2.3
                          Oct 25, 2021 10:59:21.556047916 CEST5677353192.168.2.38.8.8.8
                          Oct 25, 2021 10:59:21.580013037 CEST53567738.8.8.8192.168.2.3
                          Oct 25, 2021 10:59:37.439332008 CEST6098253192.168.2.38.8.8.8
                          Oct 25, 2021 10:59:37.468489885 CEST53609828.8.8.8192.168.2.3
                          Oct 25, 2021 10:59:41.620507956 CEST5805853192.168.2.38.8.8.8
                          Oct 25, 2021 10:59:41.654719114 CEST53580588.8.8.8192.168.2.3
                          Oct 25, 2021 10:59:57.579947948 CEST6436753192.168.2.38.8.8.8
                          Oct 25, 2021 10:59:57.609849930 CEST53643678.8.8.8192.168.2.3
                          Oct 25, 2021 11:00:01.702646971 CEST5153953192.168.2.38.8.8.8
                          Oct 25, 2021 11:00:01.721030951 CEST53515398.8.8.8192.168.2.3
                          Oct 25, 2021 11:00:17.731142998 CEST5539353192.168.2.38.8.8.8
                          Oct 25, 2021 11:00:17.749828100 CEST53553938.8.8.8192.168.2.3
                          Oct 25, 2021 11:00:21.766000986 CEST5058553192.168.2.38.8.8.8
                          Oct 25, 2021 11:00:21.784363985 CEST53505858.8.8.8192.168.2.3
                          Oct 25, 2021 11:00:37.792159081 CEST6345653192.168.2.38.8.8.8
                          Oct 25, 2021 11:00:37.811698914 CEST53634568.8.8.8192.168.2.3

                          DNS Queries

                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                          Oct 25, 2021 10:57:36.541914940 CEST192.168.2.38.8.8.80x253bStandard query (0)fx.rhinobuff.comA (IP address)IN (0x0001)
                          Oct 25, 2021 10:57:40.855165958 CEST192.168.2.38.8.8.80x2558Standard query (0)fx.rhinobuff.comA (IP address)IN (0x0001)
                          Oct 25, 2021 10:57:56.723613977 CEST192.168.2.38.8.8.80x3124Standard query (0)fio.linosheart.comA (IP address)IN (0x0001)
                          Oct 25, 2021 10:58:00.911278009 CEST192.168.2.38.8.8.80x57c2Standard query (0)fio.linosheart.comA (IP address)IN (0x0001)
                          Oct 25, 2021 10:58:16.870439053 CEST192.168.2.38.8.8.80x4145Standard query (0)fx.rhinobuff.comA (IP address)IN (0x0001)
                          Oct 25, 2021 10:58:20.979888916 CEST192.168.2.38.8.8.80x4b47Standard query (0)fx.rhinobuff.comA (IP address)IN (0x0001)
                          Oct 25, 2021 10:58:37.030309916 CEST192.168.2.38.8.8.80xa53cStandard query (0)fio.linosheart.comA (IP address)IN (0x0001)
                          Oct 25, 2021 10:58:41.226304054 CEST192.168.2.38.8.8.80x21f5Standard query (0)fio.linosheart.comA (IP address)IN (0x0001)
                          Oct 25, 2021 10:58:57.148864031 CEST192.168.2.38.8.8.80xc861Standard query (0)fx.rhinobuff.comA (IP address)IN (0x0001)
                          Oct 25, 2021 10:59:01.448348045 CEST192.168.2.38.8.8.80xaa06Standard query (0)fx.rhinobuff.comA (IP address)IN (0x0001)
                          Oct 25, 2021 10:59:17.336637974 CEST192.168.2.38.8.8.80xd5efStandard query (0)fio.linosheart.comA (IP address)IN (0x0001)
                          Oct 25, 2021 10:59:21.556047916 CEST192.168.2.38.8.8.80x395dStandard query (0)fio.linosheart.comA (IP address)IN (0x0001)
                          Oct 25, 2021 10:59:37.439332008 CEST192.168.2.38.8.8.80xd02aStandard query (0)fx.rhinobuff.comA (IP address)IN (0x0001)
                          Oct 25, 2021 10:59:41.620507956 CEST192.168.2.38.8.8.80x21f2Standard query (0)fx.rhinobuff.comA (IP address)IN (0x0001)
                          Oct 25, 2021 10:59:57.579947948 CEST192.168.2.38.8.8.80xe050Standard query (0)fio.linosheart.comA (IP address)IN (0x0001)
                          Oct 25, 2021 11:00:01.702646971 CEST192.168.2.38.8.8.80x1fdStandard query (0)fio.linosheart.comA (IP address)IN (0x0001)
                          Oct 25, 2021 11:00:17.731142998 CEST192.168.2.38.8.8.80x8d27Standard query (0)fx.rhinobuff.comA (IP address)IN (0x0001)
                          Oct 25, 2021 11:00:21.766000986 CEST192.168.2.38.8.8.80x96dcStandard query (0)fx.rhinobuff.comA (IP address)IN (0x0001)
                          Oct 25, 2021 11:00:37.792159081 CEST192.168.2.38.8.8.80xae73Standard query (0)fio.linosheart.comA (IP address)IN (0x0001)

                          DNS Answers

                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                          Oct 25, 2021 10:57:36.565784931 CEST8.8.8.8192.168.2.30x253bName error (3)fx.rhinobuff.comnonenoneA (IP address)IN (0x0001)
                          Oct 25, 2021 10:57:40.873775005 CEST8.8.8.8192.168.2.30x2558Name error (3)fx.rhinobuff.comnonenoneA (IP address)IN (0x0001)
                          Oct 25, 2021 10:57:56.741938114 CEST8.8.8.8192.168.2.30x3124Name error (3)fio.linosheart.comnonenoneA (IP address)IN (0x0001)
                          Oct 25, 2021 10:58:00.930002928 CEST8.8.8.8192.168.2.30x57c2Name error (3)fio.linosheart.comnonenoneA (IP address)IN (0x0001)
                          Oct 25, 2021 10:58:16.891081095 CEST8.8.8.8192.168.2.30x4145Name error (3)fx.rhinobuff.comnonenoneA (IP address)IN (0x0001)
                          Oct 25, 2021 10:58:21.002942085 CEST8.8.8.8192.168.2.30x4b47Name error (3)fx.rhinobuff.comnonenoneA (IP address)IN (0x0001)
                          Oct 25, 2021 10:58:37.048883915 CEST8.8.8.8192.168.2.30xa53cName error (3)fio.linosheart.comnonenoneA (IP address)IN (0x0001)
                          Oct 25, 2021 10:58:41.244290113 CEST8.8.8.8192.168.2.30x21f5Name error (3)fio.linosheart.comnonenoneA (IP address)IN (0x0001)
                          Oct 25, 2021 10:58:57.167082071 CEST8.8.8.8192.168.2.30xc861Name error (3)fx.rhinobuff.comnonenoneA (IP address)IN (0x0001)
                          Oct 25, 2021 10:59:01.468022108 CEST8.8.8.8192.168.2.30xaa06Name error (3)fx.rhinobuff.comnonenoneA (IP address)IN (0x0001)
                          Oct 25, 2021 10:59:17.355292082 CEST8.8.8.8192.168.2.30xd5efName error (3)fio.linosheart.comnonenoneA (IP address)IN (0x0001)
                          Oct 25, 2021 10:59:21.580013037 CEST8.8.8.8192.168.2.30x395dName error (3)fio.linosheart.comnonenoneA (IP address)IN (0x0001)
                          Oct 25, 2021 10:59:37.468489885 CEST8.8.8.8192.168.2.30xd02aName error (3)fx.rhinobuff.comnonenoneA (IP address)IN (0x0001)
                          Oct 25, 2021 10:59:41.654719114 CEST8.8.8.8192.168.2.30x21f2Name error (3)fx.rhinobuff.comnonenoneA (IP address)IN (0x0001)
                          Oct 25, 2021 10:59:57.609849930 CEST8.8.8.8192.168.2.30xe050Name error (3)fio.linosheart.comnonenoneA (IP address)IN (0x0001)
                          Oct 25, 2021 11:00:01.721030951 CEST8.8.8.8192.168.2.30x1fdName error (3)fio.linosheart.comnonenoneA (IP address)IN (0x0001)
                          Oct 25, 2021 11:00:17.749828100 CEST8.8.8.8192.168.2.30x8d27Name error (3)fx.rhinobuff.comnonenoneA (IP address)IN (0x0001)
                          Oct 25, 2021 11:00:21.784363985 CEST8.8.8.8192.168.2.30x96dcName error (3)fx.rhinobuff.comnonenoneA (IP address)IN (0x0001)
                          Oct 25, 2021 11:00:37.811698914 CEST8.8.8.8192.168.2.30xae73Name error (3)fio.linosheart.comnonenoneA (IP address)IN (0x0001)

                          Code Manipulations

                          Statistics

                          Behavior

                          Click to jump to process

                          System Behavior

                          General

                          Start time:10:56:24
                          Start date:25/10/2021
                          Path:C:\Windows\System32\loaddll32.exe
                          Wow64 process (32bit):true
                          Commandline:loaddll32.exe 'C:\Users\user\Desktop\61766fc85163a.dll'
                          Imagebase:0x80000
                          File size:893440 bytes
                          MD5 hash:72FCD8FB0ADC38ED9050569AD673650E
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Yara matches:
                          • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.457883512.0000000003BF8000.00000004.00000040.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_Ursnif_1, Description: Yara detected Ursnif, Source: 00000000.00000003.420035815.0000000002C40000.00000040.00000001.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.458003992.0000000003BF8000.00000004.00000040.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.457844986.0000000003BF8000.00000004.00000040.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.457961241.0000000003BF8000.00000004.00000040.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.457926996.0000000003BF8000.00000004.00000040.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.457986489.0000000003BF8000.00000004.00000040.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000002.825811764.0000000003BF8000.00000004.00000040.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.458017733.0000000003BF8000.00000004.00000040.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.457907127.0000000003BF8000.00000004.00000040.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_Ursnif_1, Description: Yara detected Ursnif, Source: 00000000.00000002.825738430.00000000031F9000.00000004.00000040.sdmp, Author: Joe Security
                          Reputation:moderate

                          General

                          Start time:10:56:25
                          Start date:25/10/2021
                          Path:C:\Windows\SysWOW64\cmd.exe
                          Wow64 process (32bit):true
                          Commandline:cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\61766fc85163a.dll',#1
                          Imagebase:0xd80000
                          File size:232960 bytes
                          MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high

                          General

                          Start time:10:56:25
                          Start date:25/10/2021
                          Path:C:\Windows\SysWOW64\rundll32.exe
                          Wow64 process (32bit):true
                          Commandline:rundll32.exe C:\Users\user\Desktop\61766fc85163a.dll,Cow
                          Imagebase:0x3d0000
                          File size:61952 bytes
                          MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Yara matches:
                          • Rule: JoeSecurity_Ursnif_1, Description: Yara detected Ursnif, Source: 00000002.00000003.401727363.0000000002C60000.00000040.00000010.sdmp, Author: Joe Security
                          Reputation:high

                          General

                          Start time:10:56:25
                          Start date:25/10/2021
                          Path:C:\Windows\SysWOW64\rundll32.exe
                          Wow64 process (32bit):true
                          Commandline:rundll32.exe 'C:\Users\user\Desktop\61766fc85163a.dll',#1
                          Imagebase:0x3d0000
                          File size:61952 bytes
                          MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Yara matches:
                          • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000003.00000003.448559940.0000000004F68000.00000004.00000040.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000003.00000003.448597664.0000000004F68000.00000004.00000040.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000003.00000003.448496716.0000000004F68000.00000004.00000040.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000003.00000003.448462306.0000000004F68000.00000004.00000040.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_Ursnif_1, Description: Yara detected Ursnif, Source: 00000003.00000003.401325815.0000000002650000.00000040.00000010.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000003.00000003.448582889.0000000004F68000.00000004.00000040.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_Ursnif_1, Description: Yara detected Ursnif, Source: 00000003.00000002.826309234.0000000004539000.00000004.00000040.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000003.00000003.448524349.0000000004F68000.00000004.00000040.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000003.00000003.448420040.0000000004F68000.00000004.00000040.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000003.00000002.826711993.0000000004F68000.00000004.00000040.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000003.00000003.448613025.0000000004F68000.00000004.00000040.sdmp, Author: Joe Security
                          Reputation:high

                          General

                          Start time:10:56:29
                          Start date:25/10/2021
                          Path:C:\Windows\SysWOW64\rundll32.exe
                          Wow64 process (32bit):true
                          Commandline:rundll32.exe C:\Users\user\Desktop\61766fc85163a.dll,Fishdark
                          Imagebase:0x3d0000
                          File size:61952 bytes
                          MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Yara matches:
                          • Rule: JoeSecurity_Ursnif_1, Description: Yara detected Ursnif, Source: 00000005.00000003.413516631.0000000003260000.00000040.00000010.sdmp, Author: Joe Security
                          Reputation:high

                          General

                          Start time:10:56:33
                          Start date:25/10/2021
                          Path:C:\Windows\SysWOW64\rundll32.exe
                          Wow64 process (32bit):true
                          Commandline:rundll32.exe C:\Users\user\Desktop\61766fc85163a.dll,Multiplyboat
                          Imagebase:0x3d0000
                          File size:61952 bytes
                          MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Yara matches:
                          • Rule: JoeSecurity_Ursnif_1, Description: Yara detected Ursnif, Source: 00000006.00000003.417864132.0000000004C80000.00000040.00000001.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_Ursnif_1, Description: Yara detected Ursnif, Source: 00000006.00000003.449697132.0000000005169000.00000004.00000040.sdmp, Author: Joe Security
                          Reputation:high

                          Disassembly

                          Code Analysis

                          Reset < >