Analysis

  • max time kernel
    132s
  • max time network
    134s
  • resource
    win7v191014

General

  • Target

    5abdb8b16f503976c3e726521c1f93b927931c00

  • Sample

    191018-xssrgacz7s

  • SHA256

    12ea4b688f33a5448c08c52d09b6e993b9ee293d09ba673c567c7a6d1ec7b94c

Score
N/A

Malware Config

Extracted

Family

ursnif

Botnet

1000

C2

http://alister-mathmatics.club

Attributes
  • dga_base_url

    constitution.org/usdeclar.txt

  • dga_crc

    1.320669898e+09

  • dga_season

    10

  • dga_tlds

    com

    ru

    org

  • dns_servers

    107.174.86.134

    107.175.127.22

rsa_pubkey.base64
1
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
serpent.plain
1
YQiUrgpfMGxlbXo6

Signatures

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of FindShellTrayWindow 5 IoCs
  • ursnif family

Processes

  • C:\Users\Admin\AppData\Local\Temp\5abdb8b16f503976c3e726521c1f93b927931c00.exe
    "C:\Users\Admin\AppData\Local\Temp\5abdb8b16f503976c3e726521c1f93b927931c00.exe"
    1⤵
      PID:1412
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of WriteProcessMemory
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of FindShellTrayWindow
      PID:752
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:752 CREDAT:275457 /prefetch:2
      1⤵
      • Suspicious use of SetWindowsHookEx
      PID:1116
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of WriteProcessMemory
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of FindShellTrayWindow
      PID:2116
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2116 CREDAT:275457 /prefetch:2
      1⤵
      • Suspicious use of SetWindowsHookEx
      PID:2168
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of WriteProcessMemory
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of FindShellTrayWindow
      PID:2336
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2336 CREDAT:275457 /prefetch:2
      1⤵
      • Suspicious use of SetWindowsHookEx
      PID:2388
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of WriteProcessMemory
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of FindShellTrayWindow
      PID:2576
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2576 CREDAT:275457 /prefetch:2
      1⤵
      • Suspicious use of SetWindowsHookEx
      PID:2624
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of WriteProcessMemory
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of FindShellTrayWindow
      PID:2924
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2924 CREDAT:275457 /prefetch:2
      1⤵
      • Suspicious use of SetWindowsHookEx
      PID:2976

    Network

    No results found
    • 224.0.0.252:5355
      128 B
      2
    • 224.0.0.252:5355
      132 B
      2
    • 224.0.0.252:5355
      128 B
      2
    • 8.8.8.8:53
      go.microsoft.com
      76 B
      171 B
      1
      1

      DNS Request

      go.microsoft.com

      DNS Response

      23.66.21.99

    • 224.0.0.252:5355
      128 B
      2
    • 224.0.0.252:5355
      128 B
      2
    • 224.0.0.252:5355
      132 B
      2
    • 224.0.0.252:5355
      128 B
      2
    • 8.8.8.8:53
      alister-mathmatics.club
      83 B
      153 B
      1
      1

      DNS Request

      alister-mathmatics.club

    • 8.8.8.8:53
      go.microsoft.com
      76 B
      171 B
      1
      1

      DNS Request

      go.microsoft.com

      DNS Response

      23.66.21.99

    • 224.0.0.252:5355
      128 B
      2
    • 239.255.255.250:1900
    • 10.7.0.255:137
      3.1kB
      33
    • 224.0.0.252:5355
      132 B
      2
    • 8.8.8.8:53
      go.microsoft.com
      76 B
      171 B
      1
      1

      DNS Request

      go.microsoft.com

      DNS Response

      23.66.21.99

    • 8.8.8.8:53
      go.microsoft.com
      76 B
      171 B
      1
      1

      DNS Request

      go.microsoft.com

      DNS Response

      23.66.21.99

    • 239.255.255.250:1900
      1.1kB
      6
    • 8.8.8.8:53
      go.microsoft.com
      76 B
      171 B
      1
      1

      DNS Request

      go.microsoft.com

      DNS Response

      23.66.21.99

    • 224.0.0.22
      120 B
      2

    MITRE ATT&CK Enterprise v16

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1116-3-0x00000000054F0000-0x0000000005513000-memory.dmp

      Filesize

      140KB

    • memory/1412-0-0x00000000002E9000-0x0000000000301000-memory.dmp

      Filesize

      96KB

    • memory/1412-1-0x0000000001C00000-0x0000000001C11000-memory.dmp

      Filesize

      68KB

    • memory/1412-2-0x00000000001C0000-0x00000000001CF000-memory.dmp

      Filesize

      60KB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.