top title background image
flash

609a460e94791.tiff.dll

Status: finished
Submission Time: 2021-05-11 11:01:17 +02:00
Malicious
Trojan
Ursnif

Comments

Tags

  • BRT
  • dll
  • geo
  • gozi
  • isfb
  • ita
  • ursnif

Details

  • Analysis ID:
    410818
  • API (Web) ID:
    778422
  • Analysis Started:
    2021-05-11 11:01:34 +02:00
  • Analysis Finished:
    2021-05-11 11:19:01 +02:00
  • MD5:
    50a299d1e92d9205e123404c8e05904d
  • SHA1:
    c188272ab757dbbf14e74781fc90fcefe4aeb615
  • SHA256:
    3b56b7298c366a323d28658a455abf0d4e78fa197a43ce13bedab05f26901d34
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
Score: 60
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
malicious
Score: 64
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Run Condition: Run with higher sleep bypass

IPs

IP Country Detection
52.97.201.34
United States
40.97.161.50
United States
40.101.12.82
United States

Domains

Name IP Detection
outlook.com
40.97.161.50
HHN-efz.ms-acdc.office.com
52.97.201.34
FRA-efz.ms-acdc.office.com
40.101.12.82
Click to see the 2 hidden entries
www.outlook.com
0.0.0.0
outlook.office365.com
0.0.0.0

URLs

Name Detection
http://outlook.com/login/greed/gx9NI4Ybpp/8F85m84ndjn4UwJSZ/KFY_2BxmUPMy/coa0QUktAbb/vjBaicl7yvyNDs/NaAVAq9mPnbNTlKz1AUy2/5aIKWQiZNRBNaijS/Tt5Vo5dnaNIMeJI/Piqfb55cpfCEI8CpHK/_2FWICMIW/YUkQnOfGVld1SPd1rTnm/w0s_2F9NNcplFjkZ_2F/ufX9zF863VCJiOMFbmL1SV/K4t8NhPa8Lg/cl7PdmL.gfk
https://outlook.office365.com/login/greed/gx9NI4Ybpp/8F85m84ndjn4UwJSZ/KFY_2BxmUPMy/coa0QUktAbb/vjBa

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{7A4756FA-B284-11EB-90E5-ECF4BB2D2496}.dat
Microsoft Word Document
#
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{7A4756FC-B284-11EB-90E5-ECF4BB2D2496}.dat
Microsoft Word Document
#
C:\Users\user\AppData\Local\Temp\JavaDeployReg.log
ASCII text, with CRLF line terminators
#
Click to see the 2 hidden entries
C:\Users\user\AppData\Local\Temp\~DF6A2029352AAD8EB0.TMP
data
#
C:\Users\user\AppData\Local\Temp\~DF745550B0ECD73E02.TMP
data
#