Resubmissions

22-01-2021 08:00

210122-gm8njs1zdn 5

03-12-2020 11:22

201203-8vnj2wyrex 10

Analysis

  • max time kernel
    51s
  • max time network
    115s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    03-12-2020 11:22

General

  • Target

    15870ef831ecc0908e86ca4ff0987ff42049bbaf96ee96db2761018854b7647f.dll

  • Size

    507KB

  • MD5

    b916ccb2a2bf0381133e5b8ef9782e1f

  • SHA1

    4a740790a645000119070122c710e1bac020bd25

  • SHA256

    15870ef831ecc0908e86ca4ff0987ff42049bbaf96ee96db2761018854b7647f

  • SHA512

    04f973bf5606bc585e9eacd2937503047b27530dfdf9a5b830fa2deb679fbbf84a9494504de6c37a8b48785dc7ccc74a1ab50b34a860729f66cdeb3bcfd2bcc8

Score
10/10

Malware Config

Extracted

Family

ursnif

Attributes
  • dga_base_url

  • dga_crc

    0

  • dga_season

    0

  • dga_tlds

  • dns_servers

Signatures

  • Ursnif, Dreambot

    Ursnif is a variant of the Gozi IFSB with more capabilities.

  • ServiceHost packer 6 IoCs

    Detects ServiceHost packer used for .NET malware

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 15 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\15870ef831ecc0908e86ca4ff0987ff42049bbaf96ee96db2761018854b7647f.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4076
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\15870ef831ecc0908e86ca4ff0987ff42049bbaf96ee96db2761018854b7647f.dll,#1
      2⤵
        PID:4052
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4052 -s 644
          3⤵
          • Program crash
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2680

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2680-10-0x0000000004C60000-0x0000000004C61000-memory.dmp

      Filesize

      4KB

    • memory/2680-3-0x00000000045A0000-0x00000000045A1000-memory.dmp

      Filesize

      4KB

    • memory/4052-5-0x0000000000000000-mapping.dmp

    • memory/4052-12-0x0000000000000000-mapping.dmp

    • memory/4052-2-0x0000000000000000-mapping.dmp

    • memory/4052-7-0x0000000000000000-mapping.dmp

    • memory/4052-8-0x0000000000000000-mapping.dmp

    • memory/4052-9-0x0000000000000000-mapping.dmp

    • memory/4052-4-0x0000000000000000-mapping.dmp

    • memory/4052-6-0x0000000000000000-mapping.dmp

    • memory/4052-11-0x0000000000000000-mapping.dmp

    • memory/4052-13-0x0000000000000000-mapping.dmp

    • memory/4052-14-0x0000000000000000-mapping.dmp

    • memory/4052-15-0x0000000000000000-mapping.dmp

    • memory/4052-16-0x0000000000000000-mapping.dmp

    • memory/4052-17-0x0000000000000000-mapping.dmp