Windows
Analysis Report
pzG0rkIchr.dll
Overview
General Information
Detection
Ursnif
Score: | 92 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Yara detected Ursnif
Multi AV Scanner detection for submitted file
System process connects to network (likely due to code injection or exploit)
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Snort IDS alert for network traffic
Performs DNS queries to domains with low reputation
One or more processes crash
Contains functionality to check if a debugger is running (IsDebuggerPresent)
May sleep (evasive loops) to hinder dynamic analysis
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
Contains functionality which may be used to detect a debugger (GetProcessHeap)
IP address seen in connection with other malware
Tries to load missing DLLs
Checks if the current process is being debugged
Registers a DLL
Launches processes in debugging mode, may be used to hinder debugging
Found large amount of non-executed APIs
Creates a process in suspended mode (likely to inject code)
Classification
- System is w10x64
loaddll64.exe (PID: 1556 cmdline:
loaddll64. exe "C:\Us ers\user\D esktop\pzG 0rkIchr.dl l" MD5: C676FC0263EDD17D4CE7D644B8F3FCD6) conhost.exe (PID: 4696 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) cmd.exe (PID: 1076 cmdline:
cmd.exe /C rundll32. exe "C:\Us ers\user\D esktop\pzG 0rkIchr.dl l",#1 MD5: 4E2ACF4F8A396486AB4268C94A6A245F) rundll32.exe (PID: 5268 cmdline:
rundll32.e xe "C:\Use rs\user\De sktop\pzG0 rkIchr.dll ",#1 MD5: 73C519F050C20580F8A62C849D49215A) regsvr32.exe (PID: 2356 cmdline:
regsvr32.e xe /s C:\U sers\user\ Desktop\pz G0rkIchr.d ll MD5: D78B75FC68247E8A63ACBA846182740E) rundll32.exe (PID: 5264 cmdline:
rundll32.e xe C:\User s\user\Des ktop\pzG0r kIchr.dll, DllRegiste rServer MD5: 73C519F050C20580F8A62C849D49215A) rundll32.exe (PID: 6044 cmdline:
rundll32.e xe C:\User s\user\Des ktop\pzG0r kIchr.dll, ItsnPq5v MD5: 73C519F050C20580F8A62C849D49215A) WerFault.exe (PID: 5572 cmdline:
C:\Windows \system32\ WerFault.e xe -u -p 6 044 -s 276 MD5: 2AFFE478D86272288BBEF5A00BBEF6A0) rundll32.exe (PID: 6136 cmdline:
rundll32.e xe C:\User s\user\Des ktop\pzG0r kIchr.dll, QlqYo259k MD5: 73C519F050C20580F8A62C849D49215A) WerFault.exe (PID: 5404 cmdline:
C:\Windows \system32\ WerFault.e xe -u -p 6 136 -s 304 MD5: 2AFFE478D86272288BBEF5A00BBEF6A0) WerFault.exe (PID: 680 cmdline:
C:\Windows \system32\ WerFault.e xe -u -p 6 136 -s 304 MD5: 2AFFE478D86272288BBEF5A00BBEF6A0)
- cleanup
{"c2_domain": ["https://gigimas.xyz", "https://reaso.xyz"], "botnet": "202206061", "aes key": "eq2opFFpGzpd2p9t", "sleep time": "20", "request time": "30", "host keep time": "120", "host shift time": "120"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Ursnifv4 | Yara detected Ursnif | Joe Security | ||
JoeSecurity_Ursnifv4 | Yara detected Ursnif | Joe Security | ||
JoeSecurity_Ursnifv4 | Yara detected Ursnif | Joe Security | ||
JoeSecurity_Ursnifv4 | Yara detected Ursnif | Joe Security |
⊘No Sigma rule has matched
Timestamp: | 192.168.2.48.8.8.864906532039645 11/24/22-05:22:35.810533 |
SID: | 2039645 |
Source Port: | 64906 |
Destination Port: | 53 |
Protocol: | UDP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.48.8.8.861007532039645 11/24/22-05:20:02.978332 |
SID: | 2039645 |
Source Port: | 61007 |
Destination Port: | 53 |
Protocol: | UDP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.48.8.8.861124532039645 11/24/22-05:21:04.451832 |
SID: | 2039645 |
Source Port: | 61124 |
Destination Port: | 53 |
Protocol: | UDP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.48.8.8.859444532039645 11/24/22-05:21:34.871041 |
SID: | 2039645 |
Source Port: | 59444 |
Destination Port: | 53 |
Protocol: | UDP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.48.8.8.855570532039645 11/24/22-05:22:05.359167 |
SID: | 2039645 |
Source Port: | 55570 |
Destination Port: | 53 |
Protocol: | UDP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.48.8.8.860686532039645 11/24/22-05:20:33.386749 |
SID: | 2039645 |
Source Port: | 60686 |
Destination Port: | 53 |
Protocol: | UDP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.48.8.8.859446532039645 11/24/22-05:23:06.390786 |
SID: | 2039645 |
Source Port: | 59446 |
Destination Port: | 53 |
Protocol: | UDP |
Classtype: | A Network Trojan was detected |
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: |
Source: | Avira URL Cloud: |
Source: | Virustotal: | Perma Link | ||
Source: | Virustotal: | Perma Link |
Source: | Malware Configuration Extractor: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |