Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll

Overview

General Information

Sample Name:c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll
Analysis ID:753126
MD5:590d96a7be55240ad868ebec78ce38f2
SHA1:2aaf8acb010dfe83b808d7cc77f6821aaf44f3d2
SHA256:846a8058cda54207aebb885f99dab0eab57529eb8dd94a3d57bbde2e93c4aad4
Tags:exe
Infos:

Detection

Ursnif
Score:88
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Yara detected Ursnif
System process connects to network (likely due to code injection or exploit)
Multi AV Scanner detection for submitted file
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Snort IDS alert for network traffic
Queries the volume information (name, serial number etc) of a device
Tries to load missing DLLs
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Found evasive API chain (date check)
PE file contains sections with non-standard names
Internet Provider seen in connection with other malware
Detected potential crypto function
Registers a DLL
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to call native functions
Found large amount of non-executed APIs
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • loaddll64.exe (PID: 5252 cmdline: loaddll64.exe "C:\Users\user\Desktop\c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll" MD5: C676FC0263EDD17D4CE7D644B8F3FCD6)
    • conhost.exe (PID: 1332 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • cmd.exe (PID: 916 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll",#1 MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
      • rundll32.exe (PID: 4540 cmdline: rundll32.exe "C:\Users\user\Desktop\c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll",#1 MD5: 73C519F050C20580F8A62C849D49215A)
    • regsvr32.exe (PID: 4848 cmdline: regsvr32.exe /s C:\Users\user\Desktop\c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll MD5: D78B75FC68247E8A63ACBA846182740E)
      • cmd.exe (PID: 5680 cmdline: cmd /c "echo Commands" >> C:\Users\user\AppData\Local\Temp\2F60.tmp MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
        • conhost.exe (PID: 2356 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • cmd.exe (PID: 1380 cmdline: cmd /c "dir" >> C:\Users\user\AppData\Local\Temp\2F60.tmp MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
        • conhost.exe (PID: 1364 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • rundll32.exe (PID: 864 cmdline: rundll32.exe C:\Users\user\Desktop\c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll,DllRegisterServer MD5: 73C519F050C20580F8A62C849D49215A)
    • rundll32.exe (PID: 5052 cmdline: rundll32.exe C:\Users\user\Desktop\c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll,FgnfMvSNFULXZx MD5: 73C519F050C20580F8A62C849D49215A)
    • rundll32.exe (PID: 5904 cmdline: rundll32.exe C:\Users\user\Desktop\c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll,KVpawdrrKTUjeZuk MD5: 73C519F050C20580F8A62C849D49215A)
  • cleanup
{"c2_domain": ["https://higmon.cyou", "https://prises.cyou"], "botnet": "202208151", "aes key": "VHpr3Unea0fVqBYc", "sleep time": "1", "request time": "10", "host keep time": "2", "host shift time": "1"}
SourceRuleDescriptionAuthorStrings
Process Memory Space: loaddll64.exe PID: 5252JoeSecurity_Ursnifv4Yara detected UrsnifJoe Security
    Process Memory Space: regsvr32.exe PID: 4848JoeSecurity_Ursnifv4Yara detected UrsnifJoe Security
      Process Memory Space: rundll32.exe PID: 4540JoeSecurity_Ursnifv4Yara detected UrsnifJoe Security
        Process Memory Space: rundll32.exe PID: 864JoeSecurity_Ursnifv4Yara detected UrsnifJoe Security
          No Sigma rule has matched
          Timestamp:192.168.2.78.8.8.860326532039637 11/24/22-10:49:03.324067
          SID:2039637
          Source Port:60326
          Destination Port:53
          Protocol:UDP
          Classtype:A Network Trojan was detected

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dllVirustotal: Detection: 33%Perma Link
          Source: c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dllReversingLabs: Detection: 21%
          Source: https://higmon.cyou/index.htmlceAvira URL Cloud: Label: malware
          Source: https://higmon.cyou/index.htmlAvira URL Cloud: Label: malware
          Source: https://higmon.cyou/Avira URL Cloud: Label: malware
          Source: https://prises.cyouAvira URL Cloud: Label: malware
          Source: https://higmon.cyouAvira URL Cloud: Label: malware
          Source: higmon.cyouVirustotal: Detection: 20%Perma Link
          Source: https://prises.cyouVirustotal: Detection: 18%Perma Link
          Source: https://higmon.cyou/index.htmlVirustotal: Detection: 10%Perma Link
          Source: 3.2.regsvr32.exe.ac1e00.0.raw.unpackMalware Configuration Extractor: Ursnif {"c2_domain": ["https://higmon.cyou", "https://prises.cyou"], "botnet": "202208151", "aes key": "VHpr3Unea0fVqBYc", "sleep time": "1", "request time": "10", "host keep time": "2", "host shift time": "1"}
          Source: c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dllStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT

          Networking

          barindex
          Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 45.8.147.179 443
          Source: C:\Windows\System32\regsvr32.exeDomain query: higmon.cyou
          Source: TrafficSnort IDS: 2039637 ET TROJAN Observed DNS Query to Ursnif Domain (higmon .cyou) 192.168.2.7:60326 -> 8.8.8.8:53
          Source: Joe Sandbox ViewASN Name: VMAGE-ASRU VMAGE-ASRU
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49697
          Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49697 -> 443
          Source: loaddll64.exe, 00000000.00000002.587434823.0000023124120000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000003.00000002.701616295.00000000027E0000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000003.00000002.701604821.000000000266E000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.311124854.000002233FD80000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.311225044.0000020DA3AA0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://higmon.cyou
          Source: regsvr32.exe, 00000003.00000002.701457779.0000000000AE7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://higmon.cyou/
          Source: regsvr32.exe, 00000003.00000002.701416611.0000000000A98000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000003.00000002.701474761.0000000000B06000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://higmon.cyou/index.html
          Source: regsvr32.exe, 00000003.00000002.701416611.0000000000A98000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://higmon.cyou/index.htmlce
          Source: regsvr32.exe, 00000003.00000002.701604821.000000000266E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://higmon.cyouhttps://prises.cyou
          Source: loaddll64.exe, 00000000.00000002.587439990.0000023124122000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000003.00000002.701620342.00000000027E2000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.311135038.000002233FD82000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.311230320.0000020DA3AA2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://http://Mozilla/5.0
          Source: regsvr32.exe, regsvr32.exe, 00000003.00000002.701786113.00007FFA0AE63000.00000008.00000001.01000000.00000003.sdmp, c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dllString found in binary or memory: https://my.tealiumiq.com/urest/legacy/tagcompanion/getProfile?utid=
          Source: loaddll64.exe, 00000000.00000002.587434823.0000023124120000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000003.00000002.701616295.00000000027E0000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000003.00000002.701604821.000000000266E000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.311124854.000002233FD80000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.311225044.0000020DA3AA0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://prises.cyou
          Source: unknownDNS traffic detected: queries for: higmon.cyou

          Key, Mouse, Clipboard, Microphone and Screen Capturing

          barindex
          Source: Yara matchFile source: Process Memory Space: loaddll64.exe PID: 5252, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: regsvr32.exe PID: 4848, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 4540, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 864, type: MEMORYSTR

          E-Banking Fraud

          barindex
          Source: Yara matchFile source: Process Memory Space: loaddll64.exe PID: 5252, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: regsvr32.exe PID: 4848, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 4540, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 864, type: MEMORYSTR
          Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dll
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018000508C
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180004A14
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180003A24
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180001844
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180009C54
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180006344
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180005748
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180002B60
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180008D78
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800027D4
          Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180004A14
          Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180001844
          Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000508C
          Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180006344
          Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800027D4
          Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180003A24
          Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180009C54
          Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180005748
          Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180002B60
          Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180008D78
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018000508C
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180004A14
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180003A24
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180001844
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180009C54
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180006344
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180005748
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180002B60
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180008D78
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800027D4
          Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000000018000508C
          Source: C:\Windows\System32\rundll32.exeCode function: 5_2_0000000180004A14
          Source: C:\Windows\System32\rundll32.exeCode function: 5_2_0000000180003A24
          Source: C:\Windows\System32\rundll32.exeCode function: 5_2_0000000180001844
          Source: C:\Windows\System32\rundll32.exeCode function: 5_2_0000000180009C54
          Source: C:\Windows\System32\rundll32.exeCode function: 5_2_0000000180006344
          Source: C:\Windows\System32\rundll32.exeCode function: 5_2_0000000180005748
          Source: C:\Windows\System32\rundll32.exeCode function: 5_2_0000000180002B60
          Source: C:\Windows\System32\rundll32.exeCode function: 5_2_0000000180008D78
          Source: C:\Windows\System32\rundll32.exeCode function: 5_2_00000001800027D4
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180005CA4 CreateFileW,RtlInitUnicodeString,NtQueryDirectoryFile,CloseHandle,GetLastError,
          Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180005CA4 CreateFileW,RtlInitUnicodeString,NtQueryDirectoryFile,CloseHandle,GetLastError,
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180005CA4 CreateFileW,RtlInitUnicodeString,NtQueryDirectoryFile,CloseHandle,GetLastError,
          Source: C:\Windows\System32\rundll32.exeCode function: 5_2_0000000180005CA4 CreateFileW,RtlInitUnicodeString,NtQueryDirectoryFile,CloseHandle,GetLastError,
          Source: c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dllVirustotal: Detection: 33%
          Source: c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dllReversingLabs: Detection: 21%
          Source: c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: C:\Windows\System32\loaddll64.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll",#1
          Source: unknownProcess created: C:\Windows\System32\loaddll64.exe loaddll64.exe "C:\Users\user\Desktop\c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll"
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll",#1
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll",#1
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll,DllRegisterServer
          Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\cmd.exe cmd /c "echo Commands" >> C:\Users\user\AppData\Local\Temp\2F60.tmp
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll,FgnfMvSNFULXZx
          Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\cmd.exe cmd /c "dir" >> C:\Users\user\AppData\Local\Temp\2F60.tmp
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll,KVpawdrrKTUjeZuk
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll",#1
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll,DllRegisterServer
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll,FgnfMvSNFULXZx
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll,KVpawdrrKTUjeZuk
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll",#1
          Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\cmd.exe cmd /c "echo Commands" >> C:\Users\user\AppData\Local\Temp\2F60.tmp
          Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\cmd.exe cmd /c "dir" >> C:\Users\user\AppData\Local\Temp\2F60.tmp
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2356:120:WilError_01
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1332:120:WilError_01
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1364:120:WilError_01
          Source: C:\Windows\System32\regsvr32.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ManagerMui
          Source: C:\Windows\System32\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\2F60.tmpJump to behavior
          Source: regsvr32.exeString found in binary or memory: ute;top:50%;cursor:pointer}.ui-lightbox-nav-left{left:0}.ui-lightbox-nav-right{right:0}.ui-lightbox-loading{background:url(images/loading.gif) #000 50% no-repeat}.ui-lightbox-caption{padding:.2em .4em;display:none}.ui-lightbox-caption-text{margin:.3em 0 .1em;f
          Source: regsvr32.exeString found in binary or memory: ;padding:5px 10px;font-size:12px;line-height:1.5;border-radius:3px}select.input-group-sm>.form-control,select.input-group-sm>.input-group-addon,select.input-group-sm>.input-group-btn>.btn{height:30px;line-height:30px}select[multiple].input-group-sm>.form-contr
          Source: regsvr32.exeString found in binary or memory: cess .form-control{border-color:#3c763d;box-shadow:inset 0 1px 1px rgba(0,0,0,.075)}.has-success .form-control:focus{border-color:#2b542c;box-shadow:inset 0 1px 1px rgba(0,0,0,.075),0 0 6px #67b168}.has-success .input-group-addon{color:#3c763d;background-color
          Source: regsvr32.exeString found in binary or memory: l,select[multiple].input-group-sm>.input-group-addon,select[multiple].input-group-sm>.input-group-btn>.btn,textarea.input-group-sm>.form-control,textarea.input-group-sm>.input-group-addon,textarea.input-group-sm>.input-group-btn>.btn{height:auto}.input-group-a
          Source: regsvr32.exeString found in binary or memory: ing:3px}.ui-terminal-input{border:0 none;background-color:transparent;color:inherit;padding:0;margin:0 0 0 2px;width:75%;outline:0;vertical-align:baseline}.ui-terminal-command{margin-left:2px;-moz-margin-start:3px}.ui-terminal-input::-ms-clear{display:none}.ui
          Source: regsvr32.exeString found in binary or memory: ay:block;width:100%}.loading{position:fixed;top:0;left:0;right:0;bottom:0;background-color:#fff;background-image:url(/static/uploads/assets/images/loader.gif);background-position:50% 50%;background-repeat:no-repeat;opacity:0;visibility:hidden;z-index:100}.load
          Source: regsvr32.exeString found in binary or memory: rol,select.input-group-lg>.input-group-addon,select.input-group-lg>.input-group-btn>.btn{height:46px;line-height:46px}select[multiple].input-group-lg>.form-control,select[multiple].input-group-lg>.input-group-addon,select[multiple].input-group-lg>.input-group-
          Source: regsvr32.exeString found in binary or memory: dius:0}.input-group-addon:last-child{border-left:0}.input-group-btn{font-size:0;white-space:nowrap}.input-group-btn,.input-group-btn>.btn{position:relative}.input-group-btn>.btn+.btn{margin-left:-1px}.input-group-btn>.btn:active,.input-group-btn>.btn:focus,.in
          Source: regsvr32.exeString found in binary or memory: yphicon-play:before{content:"\e072"}.glyphicon-pause:before{content:"\e073"}.glyphicon-stop:before{content:"\e074"}.glyphicon-forward:before{content:"\e075"}.glyphicon-fast-forward:before{content:"\e076"}.glyphicon-step-forward:before{content:"\e077"}.glyphico
          Source: regsvr32.exeString found in binary or memory: tn>.btn,textarea.input-group-lg>.form-control,textarea.input-group-lg>.input-group-addon,textarea.input-group-lg>.input-group-btn>.btn{height:auto}.input-group-sm>.form-control,.input-group-sm>.input-group-addon,.input-group-sm>.input-group-btn>.btn{height:30p
          Source: regsvr32.exeString found in binary or memory: -vertical .slick-slide{display:block;height:auto;border:1px solid transparent}.slick-arrow.slick-hidden{display:none}.slick-loading .slick-list{background:#fff url(../static/uploads/assets/images/loader.gif) 50% no-repeat}@font-face{font-family:slick;src:url(.
          Source: regsvr32.exeString found in binary or memory: :inset 0 1px 1px rgba(0,0,0,.075),0 0 6px #c0a16b}.has-warning .input-group-addon{color:#8a6d3b;background-color:#fcf8e3;border-color:#8a6d3b}.has-warning .form-control-feedback{color:#8a6d3b}.has-error .checkbox,.has-error .checkbox-inline,.has-error.checkbox
          Source: regsvr32.exeString found in binary or memory: addon.input-sm{padding:5px 10px;font-size:12px;border-radius:3px}.input-group-addon.input-lg{padding:10px 16px;font-size:18px;border-radius:6px}.input-group-addon input[type=checkbox],.input-group-addon input[type=radio]{margin-top:0}.input-group-addon:first-c
          Source: regsvr32.exeString found in binary or memory: ble;vertical-align:middle}.navbar-form .input-group .form-control,.navbar-form .input-group .input-group-addon,.navbar-form .input-group .input-group-btn{width:auto}.navbar-form .input-group>.form-control{width:100%}.navbar-form .control-label{margin-bottom:0;
          Source: regsvr32.exeString found in binary or memory: don,.input-group-btn,.input-group .form-control{display:table-cell}.input-group-addon:not(:first-child):not(:last-child),.input-group-btn:not(:first-child):not(:last-child),.input-group .form-control:not(:first-child):not(:last-child){border-radius:0}.input-gr
          Source: regsvr32.exeString found in binary or memory: datatable .ui-column-resizer{display:block;position:absolute!important;top:0;right:0;margin:0;width:8px;height:100%;padding:0;cursor:col-resize;border:1px solid transparent}.ui-datatable .ui-column-resizer-helper{width:1px;position:absolute;z-index:10;display:
          Source: regsvr32.exeString found in binary or memory: up-addon,.input-group-btn{width:1%;white-space:nowrap;vertical-align:middle}.input-group-addon{padding:6px 12px;font-size:14px;font-weight:400;line-height:1;color:#555;text-align:center;background-color:#eee;border:1px solid #ccc;border-radius:4px}.input-group
          Source: regsvr32.exeString found in binary or memory: images/loader.gif);background-position:50% 50%;background-repeat:no-repeat;background-size:28px auto}.wrapper{position:relative;overflow:hidden;width:100%;height:100%;min-width:320px}.content{margin:0 auto;background-color:#fff}@media only screen and (max-widt
          Source: regsvr32.exeString found in binary or memory: rgin:0;padding:0;border:0;outline:0;line-height:1.3;text-decoration:none;font-size:100%;list-style:none}.ui-helper-clearfix:after,.ui-helper-clearfix:before{content:"";display:table}.ui-helper-clearfix:after{clear:both}.ui-helper-clearfix{zoom:1}.ui-helper-zfi
          Source: regsvr32.exeString found in binary or memory: ine .input-group .form-control,.form-inline .input-group .input-group-addon,.form-inline .input-group .input-group-btn{width:auto}.form-inline .input-group>.form-control{width:100%}.form-inline .control-label{margin-bottom:0;vertical-align:middle}.form-inline
          Source: regsvr32.exeString found in binary or memory: ,.input-group .form-control:first-child{border-top-right-radius:0;border-bottom-right-radius:0}.input-group-addon:first-child{border-right:0}.input-group-addon:last-child,.input-group-btn:first-child>.btn-group:not(:first-child)>.btn,.input-group-btn:first-chi
          Source: regsvr32.exeString found in binary or memory: 0 1px 1px rgba(0,0,0,.075)}.has-error .form-control:focus{border-color:#843534;box-shadow:inset 0 1px 1px rgba(0,0,0,.075),0 0 6px #ce8483}.has-error .input-group-addon{color:#a94442;background-color:#f2dede;border-color:#a94442}.has-error .form-control-feedba
          Source: regsvr32.exeString found in binary or memory: y:inline-block!important}}@media print{.hidden-print{display:none!important}}.ui-helper-hidden{display:none}.ui-helper-hidden-accessible{border:0;clip:rect(0 0 0 0);height:1px;margin:-1px;overflow:hidden;padding:0;position:absolute;width:1px}.ui-helper-reset{m
          Source: regsvr32.exeString found in binary or memory: nput-group .form-control:focus{z-index:3}.input-group-lg>.form-control,.input-group-lg>.input-group-addon,.input-group-lg>.input-group-btn>.btn{height:46px;padding:10px 16px;font-size:18px;line-height:1.3333333;border-radius:6px}select.input-group-lg>.form-con
          Source: classification engineClassification label: mal88.troj.evad.winDLL@20/1@1/1
          Source: C:\Windows\System32\regsvr32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Windows\System32\regsvr32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dllStatic PE information: Image base 0x180000000 > 0x60000000
          Source: c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dllStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800112EE push rax; ret
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001112F push rcx; iretd
          Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00007FFA0AE649F8 push rbx; retf
          Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800112EE push rax; ret
          Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001112F push rcx; iretd
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800112EE push rax; ret
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001112F push rcx; iretd
          Source: C:\Windows\System32\rundll32.exeCode function: 5_2_00000001800112EE push rax; ret
          Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000000018001112F push rcx; iretd
          Source: c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dllStatic PE information: section name: .sedt
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll

          Hooking and other Techniques for Hiding and Protection

          barindex
          Source: Yara matchFile source: Process Memory Space: loaddll64.exe PID: 5252, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: regsvr32.exe PID: 4848, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 4540, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 864, type: MEMORYSTR
          Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\loaddll64.exe TID: 5140Thread sleep time: -120000s >= -30000s
          Source: C:\Windows\System32\rundll32.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodes
          Source: C:\Windows\System32\loaddll64.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodes
          Source: C:\Windows\System32\regsvr32.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodes
          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
          Source: C:\Windows\System32\loaddll64.exeAPI coverage: 7.5 %
          Source: C:\Windows\System32\rundll32.exeAPI coverage: 7.5 %
          Source: C:\Windows\System32\rundll32.exeAPI coverage: 7.5 %
          Source: C:\Windows\System32\loaddll64.exeThread delayed: delay time: 120000
          Source: C:\Windows\System32\cmd.exeFile Volume queried: C:\Users\user\Desktop FullSizeInformation
          Source: regsvr32.exe, 00000003.00000002.701416611.0000000000A98000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000003.00000002.701484036.0000000000B17000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 45.8.147.179 443
          Source: C:\Windows\System32\regsvr32.exeDomain query: higmon.cyou
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll",#1
          Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformation
          Source: C:\Windows\System32\regsvr32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800045E8 GetSystemTimeAsFileTime,LeaveCriticalSection,

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: Process Memory Space: loaddll64.exe PID: 5252, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: regsvr32.exe PID: 4848, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 4540, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 864, type: MEMORYSTR

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: Process Memory Space: loaddll64.exe PID: 5252, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: regsvr32.exe PID: 4848, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 4540, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 864, type: MEMORYSTR
          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
          Valid Accounts2
          Command and Scripting Interpreter
          1
          DLL Side-Loading
          111
          Process Injection
          11
          Virtualization/Sandbox Evasion
          OS Credential Dumping1
          System Time Discovery
          Remote Services1
          Archive Collected Data
          Exfiltration Over Other Network Medium12
          Encrypted Channel
          Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
          Default Accounts1
          Native API
          Boot or Logon Initialization Scripts1
          DLL Side-Loading
          111
          Process Injection
          LSASS Memory1
          Security Software Discovery
          Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
          Non-Application Layer Protocol
          Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
          Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
          Obfuscated Files or Information
          Security Account Manager11
          Virtualization/Sandbox Evasion
          SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration2
          Application Layer Protocol
          Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
          Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
          Regsvr32
          NTDS1
          Remote System Discovery
          Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
          Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
          Rundll32
          LSA Secrets14
          System Information Discovery
          SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
          Replication Through Removable MediaLaunchdRc.commonRc.common1
          DLL Side-Loading
          Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 signatures2 2 Behavior Graph ID: 753126 Sample: c2b80b8cbd660c3208162ed596e... Startdate: 24/11/2022 Architecture: WINDOWS Score: 88 32 Snort IDS alert for network traffic 2->32 34 Multi AV Scanner detection for domain / URL 2->34 36 Antivirus detection for URL or domain 2->36 38 2 other signatures 2->38 8 loaddll64.exe 1 2->8         started        process3 process4 10 regsvr32.exe 8->10         started        14 cmd.exe 1 8->14         started        16 rundll32.exe 8->16         started        18 3 other processes 8->18 dnsIp5 30 higmon.cyou 45.8.147.179, 443, 49697, 49711 VMAGE-ASRU Russian Federation 10->30 40 System process connects to network (likely due to code injection or exploit) 10->40 20 cmd.exe 1 10->20         started        22 cmd.exe 2 10->22         started        24 rundll32.exe 14->24         started        signatures6 process7 process8 26 conhost.exe 20->26         started        28 conhost.exe 22->28         started       

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll34%VirustotalBrowse
          c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll22%ReversingLabsWin64.Trojan.IcedID
          No Antivirus matches
          No Antivirus matches
          SourceDetectionScannerLabelLink
          higmon.cyou20%VirustotalBrowse
          SourceDetectionScannerLabelLink
          https://prises.cyou19%VirustotalBrowse
          https://higmon.cyou/index.html10%VirustotalBrowse
          https://http://Mozilla/5.00%Avira URL Cloudsafe
          https://higmon.cyouhttps://prises.cyou0%Avira URL Cloudsafe
          https://higmon.cyou/index.htmlce100%Avira URL Cloudmalware
          https://higmon.cyou/index.html100%Avira URL Cloudmalware
          https://higmon.cyou/100%Avira URL Cloudmalware
          https://prises.cyou100%Avira URL Cloudmalware
          https://higmon.cyou100%Avira URL Cloudmalware
          NameIPActiveMaliciousAntivirus DetectionReputation
          higmon.cyou
          45.8.147.179
          truetrueunknown
          NameSourceMaliciousAntivirus DetectionReputation
          https://higmon.cyouhttps://prises.cyouregsvr32.exe, 00000003.00000002.701604821.000000000266E000.00000004.00000020.00020000.00000000.sdmptrue
          • Avira URL Cloud: safe
          unknown
          https://my.tealiumiq.com/urest/legacy/tagcompanion/getProfile?utid=regsvr32.exe, regsvr32.exe, 00000003.00000002.701786113.00007FFA0AE63000.00000008.00000001.01000000.00000003.sdmp, c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dllfalse
            high
            https://higmon.cyou/index.htmlregsvr32.exe, 00000003.00000002.701416611.0000000000A98000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000003.00000002.701474761.0000000000B06000.00000004.00000020.00020000.00000000.sdmptrue
            • 10%, Virustotal, Browse
            • Avira URL Cloud: malware
            unknown
            https://http://Mozilla/5.0loaddll64.exe, 00000000.00000002.587439990.0000023124122000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000003.00000002.701620342.00000000027E2000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.311135038.000002233FD82000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.311230320.0000020DA3AA2000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            low
            https://higmon.cyouloaddll64.exe, 00000000.00000002.587434823.0000023124120000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000003.00000002.701616295.00000000027E0000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000003.00000002.701604821.000000000266E000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.311124854.000002233FD80000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.311225044.0000020DA3AA0000.00000004.00000020.00020000.00000000.sdmptrue
            • Avira URL Cloud: malware
            unknown
            https://prises.cyouloaddll64.exe, 00000000.00000002.587434823.0000023124120000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000003.00000002.701616295.00000000027E0000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000003.00000002.701604821.000000000266E000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.311124854.000002233FD80000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.311225044.0000020DA3AA0000.00000004.00000020.00020000.00000000.sdmpfalse
            • 19%, Virustotal, Browse
            • Avira URL Cloud: malware
            unknown
            https://higmon.cyou/regsvr32.exe, 00000003.00000002.701457779.0000000000AE7000.00000004.00000020.00020000.00000000.sdmptrue
            • Avira URL Cloud: malware
            unknown
            https://higmon.cyou/index.htmlceregsvr32.exe, 00000003.00000002.701416611.0000000000A98000.00000004.00000020.00020000.00000000.sdmptrue
            • Avira URL Cloud: malware
            unknown
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            45.8.147.179
            higmon.cyouRussian Federation
            44676VMAGE-ASRUtrue
            Joe Sandbox Version:36.0.0 Rainbow Opal
            Analysis ID:753126
            Start date and time:2022-11-24 10:58:17 +01:00
            Joe Sandbox Product:CloudBasic
            Overall analysis duration:0h 7m 40s
            Hypervisor based Inspection enabled:false
            Report type:light
            Sample file name:c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
            Run name:Run with higher sleep bypass
            Number of analysed new started processes analysed:16
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • HDC enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Detection:MAL
            Classification:mal88.troj.evad.winDLL@20/1@1/1
            EGA Information:
            • Successful, ratio: 100%
            HDC Information:
            • Successful, ratio: 28.5% (good quality ratio 19.4%)
            • Quality average: 39.4%
            • Quality standard deviation: 34.4%
            HCA Information:
            • Successful, ratio: 100%
            • Number of executed functions: 0
            • Number of non-executed functions: 0
            Cookbook Comments:
            • Found application associated with file extension: .dll
            • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
            • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe
            • Excluded domains from analysis (whitelisted): www.bing.com, client.wns.windows.com, login.live.com, ctldl.windowsupdate.com
            • Not all processes where analyzed, report is missing behavior information
            • Report size getting too big, too many NtProtectVirtualMemory calls found.
            No simulations
            No context
            No context
            No context
            No context
            No context
            Process:C:\Windows\System32\cmd.exe
            File Type:ASCII text, with CRLF line terminators
            Category:modified
            Size (bytes):1555
            Entropy (8bit):4.637605355040898
            Encrypted:false
            SSDEEP:48:kSQIgwMlVMHVMw5HgTVvVRyoPVguO+yoVroVIMVTHdVOqpDVJAV2VRD:rQIgwUGHGQAhPdPLO+2OMHnpzAcPD
            MD5:98F0D700E30A868BC35BFC79D2EE3437
            SHA1:EB67F670F628153AE0424104B938F391298CAA94
            SHA-256:8752BBED9EA031A599EA0AD1D0747A363DA6763A5290943C74AE197CBC02EAED
            SHA-512:10AC577BB2657877328394861A19358C8401F586A9FA2D0B151104C67CADA7372FB46B555FE825D4DAF8408128E4BD3ABCC339B022595BBC8E3AB2E4CBD887DF
            Malicious:false
            Preview:Commands .. Volume in drive C has no label... Volume Serial Number is 9902-14F3.... Directory of C:\Users\user\Desktop....08/16/2022 02:23 PM <DIR> ...08/16/2022 02:23 PM <DIR> ....08/16/2022 02:23 PM 1,026 BPMLNOBVSB.jpg..08/16/2022 02:23 PM 1,026 BPMLNOBVSB.xlsx..11/24/2022 10:59 AM 538,624 c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll..08/16/2022 02:23 PM <DIR> CURQNKVOIX..07/23/2020 09:52 AM 2,660 Excel 2016.lnk..08/16/2022 02:23 PM 1,026 FENIVHOIKN.mp3..08/16/2022 02:23 PM 1,026 FENIVHOIKN.pdf..08/16/2022 02:23 PM <DIR> JSDNGYCOWY..08/16/2022 02:23 PM 1,026 JSDNGYCOWY.docx..06/27/2019 10:34 AM 1,417 Microsoft Edge.lnk..08/16/2022 02:23 PM <DIR> NEBFQQYWPS..08/16/2022 02:23 PM 1,026 NIKHQAIQAU.pdf..08/16/2022 02:23 PM 1,026 RAYHIWGKDI.png..08/16/2022 02:23 PM <DIR
            File type:PE32+ executable (DLL) (console) x86-64, for MS Windows
            Entropy (8bit):5.822863121964014
            TrID:
            • Win64 Dynamic Link Library (generic) (102004/3) 77.79%
            • Windows Screen Saver (13104/52) 9.99%
            • Win64 Executable (generic) (12005/4) 9.16%
            • Generic Win/DOS Executable (2004/3) 1.53%
            • DOS Executable Generic (2002/1) 1.53%
            File name:c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll
            File size:538624
            MD5:590d96a7be55240ad868ebec78ce38f2
            SHA1:2aaf8acb010dfe83b808d7cc77f6821aaf44f3d2
            SHA256:846a8058cda54207aebb885f99dab0eab57529eb8dd94a3d57bbde2e93c4aad4
            SHA512:9360564b79909f934db9120315d981d3b2bf5e1f853baa0145d7ff9b0ac375d452d11d86f90dfe5547fdbd8f4f04a8f4fd2f73c50eab2df7bddb8207194d126a
            SSDEEP:6144:al+x6f16rj6MrQeQap0+TMPRxWer+YeZczE72q1i6qs6Yfs:a4416SCpXMPjWce+Eqq1i6qdas
            TLSH:D8B46D60B11030FFF6ABC039B1C66BD96279B113E9524DBEF05A98D48B8878B1177F19
            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......u.}.1...1...1.......6...1...>.......0.......0.......0.......0...Rich1...........................PE..d.....2c.........." .......
            Icon Hash:74f0e4ecccdce0e4
            Entrypoint:0x180001000
            Entrypoint Section:.text
            Digitally signed:false
            Imagebase:0x180000000
            Subsystem:windows cui
            Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, DLL
            DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
            Time Stamp:0x6332D8E8 [Tue Sep 27 11:05:12 2022 UTC]
            TLS Callbacks:
            CLR (.Net) Version:
            OS Version Major:6
            OS Version Minor:0
            File Version Major:6
            File Version Minor:0
            Subsystem Version Major:6
            Subsystem Version Minor:0
            Import Hash:16a8f4e2ed702e8523beef35ae5110a0
            Instruction
            jmp 00007FB48117491Ch
            mov eax, 00000001h
            add eax, 00000000h
            jmp 00007FB481174902h
            dec eax
            add esp, 18h
            ret
            dec eax
            mov dword ptr [esp+08h], ecx
            dec eax
            sub esp, 18h
            jmp 00007FB48117490Dh
            dec esp
            mov dword ptr [esp+18h], eax
            mov dword ptr [esp+10h], edx
            jmp 00007FB4811748ECh
            mov eax, dword ptr [esp+28h]
            mov dword ptr [esp], eax
            jmp 00007FB4811748D4h
            jmp 00007FB481174AA8h
            mov byte ptr [esp+67h], 0000000Ah
            add byte ptr [esp+67h], 00000066h
            jmp 00007FB48117491Ah
            mov byte ptr [esp+64h], 00000012h
            add byte ptr [esp+64h], 00000026h
            jmp 00007FB481174954h
            mov byte ptr [esp+66h], 0000000Dh
            add byte ptr [esp+66h], 00000062h
            jmp 00007FB4811748DEh
            mov byte ptr [esp+68h], 00000034h
            add byte ptr [esp+68h], 00000030h
            jmp 00007FB481174924h
            add dx, 000Ah
            xor ecx, ecx
            jmp 00007FB481174AF3h
            mov byte ptr [esp+6Bh], 0000001Eh
            add byte ptr [esp+6Bh], 00000055h
            jmp 00007FB481174902h
            mov byte ptr [esp+6Ch], 00000000h
            mov dx, 0011h
            jmp 00007FB4811748E0h
            mov byte ptr [esp+69h], 00000032h
            add byte ptr [esp+69h], 00000047h
            jmp 00007FB481174902h
            mov byte ptr [esp+6Ah], 00000004h
            add byte ptr [esp+6Ah], 00000070h
            jmp 00007FB4811748D3h
            mov byte ptr [esp+65h], 00000041h
            add byte ptr [esp+65h], 0000002Bh
            jmp 00007FB4811748A4h
            call 00007FB481174AF3h
            xor eax, eax
            jmp 00007FB481174A00h
            call dword ptr [00000F5Bh]
            test eax, eax
            jne 00007FB4811748F1h
            jmp 00007FB481174A91h
            call dword ptr [00000000h]
            NameVirtual AddressVirtual Size Is in Section
            IMAGE_DIRECTORY_ENTRY_EXPORT0x20900x144.rdata
            IMAGE_DIRECTORY_ENTRY_IMPORT0x21d40x50.rdata
            IMAGE_DIRECTORY_ENTRY_RESOURCE0x850000x1e0.rsrc
            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
            IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IAT0x20000x90.rdata
            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
            NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
            .text0x10000xfe00x1000False0.59130859375DOS executable (COM)5.742356131814896IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            .rdata0x20000x41a0x600False0.380859375COM executable for DOS3.47027698168912IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .sedt0x30000x81ad60x81c00False0.3247832369942196data5.775703252117877IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
            .rsrc0x850000x1e00x200False0.52734375data4.719348272345726IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            NameRVASizeTypeLanguageCountry
            RT_MANIFEST0x850600x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States
            DLLImport
            KERNEL32.dllVirtualAlloc, GetConsoleMode, PeekConsoleInputA, ReadConsoleA, FlushConsoleInputBuffer, GetConsoleScreenBufferInfo, SetConsoleCursorPosition, SetConsoleTextAttribute, ReadConsoleOutputA, GetCurrentConsoleFont
            USER32.dllGetScrollBarInfo, DefMDIChildProcW
            USP10.dllScriptXtoCP, ScriptString_pSize, ScriptTextOut
            NameOrdinalAddress
            DllRegisterServer10x180001030
            FgnfMvSNFULXZx20x180001e60
            KVpawdrrKTUjeZuk30x180001e3c
            LaEiyoOgoiNTr40x180001f5c
            WOlqmpYHUmo50x180001e84
            XEuCWLzwGSc60x180001ea8
            ZdXkUtuwLqhmt70x180001f38
            aLcPpKozZItuf80x180001f14
            cNtNVfZnIZvqyMq90x180001ecc
            hbOIyYikdaBLyqU100x180001ef0
            zJhDuUvYOmGa110x180001e18
            Language of compilation systemCountry where language is spokenMap
            EnglishUnited States
            TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
            192.168.2.78.8.8.860326532039637 11/24/22-10:49:03.324067UDP2039637ET TROJAN Observed DNS Query to Ursnif Domain (higmon .cyou)6032653192.168.2.78.8.8.8
            TimestampSource PortDest PortSource IPDest IP
            Nov 24, 2022 10:59:21.393560886 CET49697443192.168.2.545.8.147.179
            Nov 24, 2022 10:59:21.393637896 CET4434969745.8.147.179192.168.2.5
            Nov 24, 2022 10:59:21.393753052 CET49697443192.168.2.545.8.147.179
            Nov 24, 2022 10:59:21.399569035 CET49697443192.168.2.545.8.147.179
            Nov 24, 2022 10:59:21.399631977 CET4434969745.8.147.179192.168.2.5
            Nov 24, 2022 11:01:30.715332985 CET4434969745.8.147.179192.168.2.5
            Nov 24, 2022 11:01:30.717338085 CET49711443192.168.2.545.8.147.179
            Nov 24, 2022 11:01:30.717417955 CET4434971145.8.147.179192.168.2.5
            Nov 24, 2022 11:01:30.717530012 CET49711443192.168.2.545.8.147.179
            Nov 24, 2022 11:01:30.718745947 CET49711443192.168.2.545.8.147.179
            Nov 24, 2022 11:01:30.718775034 CET4434971145.8.147.179192.168.2.5
            TimestampSource PortDest PortSource IPDest IP
            Nov 24, 2022 10:59:21.335097075 CET5689453192.168.2.58.8.8.8
            Nov 24, 2022 10:59:21.358067989 CET53568948.8.8.8192.168.2.5
            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
            Nov 24, 2022 10:59:21.335097075 CET192.168.2.58.8.8.80x4b47Standard query (0)higmon.cyouA (IP address)IN (0x0001)false
            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
            Nov 24, 2022 10:59:21.358067989 CET8.8.8.8192.168.2.50x4b47No error (0)higmon.cyou45.8.147.179A (IP address)IN (0x0001)false

            Click to jump to process

            Target ID:0
            Start time:10:59:17
            Start date:24/11/2022
            Path:C:\Windows\System32\loaddll64.exe
            Wow64 process (32bit):false
            Commandline:loaddll64.exe "C:\Users\user\Desktop\c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll"
            Imagebase:0x7ff68d820000
            File size:139776 bytes
            MD5 hash:C676FC0263EDD17D4CE7D644B8F3FCD6
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high

            Target ID:1
            Start time:10:59:17
            Start date:24/11/2022
            Path:C:\Windows\System32\conhost.exe
            Wow64 process (32bit):false
            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Imagebase:0x7ff7fcd70000
            File size:625664 bytes
            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high

            Target ID:2
            Start time:10:59:17
            Start date:24/11/2022
            Path:C:\Windows\System32\cmd.exe
            Wow64 process (32bit):false
            Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll",#1
            Imagebase:0x7ff627730000
            File size:273920 bytes
            MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high

            Target ID:3
            Start time:10:59:17
            Start date:24/11/2022
            Path:C:\Windows\System32\regsvr32.exe
            Wow64 process (32bit):false
            Commandline:regsvr32.exe /s C:\Users\user\Desktop\c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll
            Imagebase:0x7ff7c3220000
            File size:24064 bytes
            MD5 hash:D78B75FC68247E8A63ACBA846182740E
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high

            Target ID:4
            Start time:10:59:18
            Start date:24/11/2022
            Path:C:\Windows\System32\rundll32.exe
            Wow64 process (32bit):false
            Commandline:rundll32.exe "C:\Users\user\Desktop\c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll",#1
            Imagebase:0x7ff7454a0000
            File size:69632 bytes
            MD5 hash:73C519F050C20580F8A62C849D49215A
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high

            Target ID:5
            Start time:10:59:18
            Start date:24/11/2022
            Path:C:\Windows\System32\rundll32.exe
            Wow64 process (32bit):false
            Commandline:rundll32.exe C:\Users\user\Desktop\c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll,DllRegisterServer
            Imagebase:0x7ff7454a0000
            File size:69632 bytes
            MD5 hash:73C519F050C20580F8A62C849D49215A
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high

            Target ID:6
            Start time:10:59:20
            Start date:24/11/2022
            Path:C:\Windows\System32\cmd.exe
            Wow64 process (32bit):false
            Commandline:cmd /c "echo Commands" >> C:\Users\user\AppData\Local\Temp\2F60.tmp
            Imagebase:0x7ff627730000
            File size:273920 bytes
            MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language

            Target ID:7
            Start time:10:59:21
            Start date:24/11/2022
            Path:C:\Windows\System32\conhost.exe
            Wow64 process (32bit):false
            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Imagebase:0x7ff7fcd70000
            File size:625664 bytes
            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language

            Target ID:8
            Start time:10:59:21
            Start date:24/11/2022
            Path:C:\Windows\System32\rundll32.exe
            Wow64 process (32bit):false
            Commandline:rundll32.exe C:\Users\user\Desktop\c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll,FgnfMvSNFULXZx
            Imagebase:0x7ff7454a0000
            File size:69632 bytes
            MD5 hash:73C519F050C20580F8A62C849D49215A
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language

            Target ID:9
            Start time:10:59:22
            Start date:24/11/2022
            Path:C:\Windows\System32\cmd.exe
            Wow64 process (32bit):false
            Commandline:cmd /c "dir" >> C:\Users\user\AppData\Local\Temp\2F60.tmp
            Imagebase:0x7ff627730000
            File size:273920 bytes
            MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language

            Target ID:10
            Start time:10:59:22
            Start date:24/11/2022
            Path:C:\Windows\System32\conhost.exe
            Wow64 process (32bit):false
            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Imagebase:0x7ff7fcd70000
            File size:625664 bytes
            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language

            Target ID:11
            Start time:10:59:24
            Start date:24/11/2022
            Path:C:\Windows\System32\rundll32.exe
            Wow64 process (32bit):false
            Commandline:rundll32.exe C:\Users\user\Desktop\c2b80b8cbd660c3208162ed596e0443ea8f786b6fd1f809f2d2a1e07fe6475cd.dll,KVpawdrrKTUjeZuk
            Imagebase:0x7ff7454a0000
            File size:69632 bytes
            MD5 hash:73C519F050C20580F8A62C849D49215A
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language

            No disassembly