File name: | Проект договора понедельник.exe |
Full analysis: | https://app.any.run/tasks/12a594f5-d553-40a4-b1cb-daca415e3781 |
Verdict: | Malicious activity |
Threats: | Ursnif is a banking Trojan that usually infects corporate victims. It is based on an old malware but was substantially updated over the years and became quite powerful. Today Ursnif is one of the most widely spread banking Trojans in the world. |
Analysis date: | February 18, 2019, 13:01:25 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MIME: | application/x-dosexec |
File info: | PE32 executable (GUI) Intel 80386, for MS Windows |
MD5: | 76C4249BAF2F212AF01E077EFB48E0D4 |
SHA1: | 17DA4164315F6B7F694E5E2083311C96F578EA1F |
SHA256: | 594246B1D38DB4949CB126C9049ABFDA6103C6CC1DD7BF0C0CAC4435842ABA95 |
SSDEEP: | 6144:D9gccdjxx0D49XtntsfWB6II0/rzm/KEr1oA3CUvO0TmDM2O9p333Tmt2T5+h5tb:pgNt/5tCuB6IIGHmiEr+ojTmy9p |
.dll | | | Win32 Dynamic Link Library (generic) (43.5) |
---|---|---|
.exe | | | Win32 Executable (generic) (29.8) |
.exe | | | Generic Win/DOS Executable (13.2) |
.exe | | | DOS Executable Generic (13.2) |
Subsystem: | Windows GUI |
---|---|
SubsystemVersion: | 4 |
ImageVersion: | - |
OSVersion: | 4 |
EntryPoint: | 0x10945 |
UninitializedDataSize: | - |
InitializedDataSize: | 410112 |
CodeSize: | 374272 |
LinkerVersion: | 8 |
PEType: | PE32 |
TimeStamp: | 2013:03:09 18:38:48+01:00 |
MachineType: | Intel 386 or later, and compatibles |
Architecture: | IMAGE_FILE_MACHINE_I386 |
---|---|
Subsystem: | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Compilation Date: | 09-Mar-2013 17:38:48 |
Detected languages: |
|
Magic number: | MZ |
---|---|
Bytes on last page of file: | 0x0090 |
Pages in file: | 0x0003 |
Relocations: | 0x0000 |
Size of header: | 0x0004 |
Min extra paragraphs: | 0x0000 |
Max extra paragraphs: | 0xFFFF |
Initial SS value: | 0x0000 |
Initial SP value: | 0x00B8 |
Checksum: | 0x0000 |
Initial IP value: | 0x0000 |
Initial CS value: | 0x0000 |
Overlay number: | 0x0000 |
OEM identifier: | 0x0000 |
OEM information: | 0x0000 |
Address of NE header: | 0x000000C0 |
Signature: | PE |
---|---|
Machine: | IMAGE_FILE_MACHINE_I386 |
Number of sections: | 4 |
Time date stamp: | 09-Mar-2013 17:38:48 |
Pointer to Symbol Table: | 0x00000000 |
Number of symbols: | 0 |
Size of Optional Header: | 0x00E0 |
Characteristics: |
|
Name | Virtual Address | Virtual Size | Raw Size | Charateristics | Entropy |
---|---|---|---|---|---|
.text | 0x00001000 | 0x0005B59E | 0x0005B600 | IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 7.7606 |
.rdata | 0x0005D000 | 0x00003410 | 0x00003600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.98037 |
.data | 0x00061000 | 0x000000D8 | 0x00000200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 1.87817 |
.rsrc | 0x00062000 | 0x00060816 | 0x00060A00 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 2.83819 |
Title | Entropy | Size | Codepage | Language | Type |
---|---|---|---|---|---|
1 | 2.54413 | 102 | UNKNOWN | UNKNOWN | RT_GROUP_ICON |
2 | 5.07578 | 1128 | UNKNOWN | UNKNOWN | RT_ICON |
3 | 3.99767 | 9640 | UNKNOWN | UNKNOWN | RT_ICON |
4 | 4.32497 | 4264 | UNKNOWN | UNKNOWN | RT_ICON |
5 | 3.12032 | 67624 | UNKNOWN | UNKNOWN | RT_ICON |
6 | 3.6279 | 16936 | UNKNOWN | UNKNOWN | RT_ICON |
certcli.dll |
cmutil.dll |
kernel32.dll |
modemui.dll |
odbctrac.dll |
shlwapi.dll |
user32.dll |
wtsapi32.dll |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
3464 | "C:\Users\admin\AppData\Local\Temp\Проект договора понедельник.exe" | C:\Users\admin\AppData\Local\Temp\Проект договора понедельник.exe | explorer.exe | |
User: admin Integrity Level: MEDIUM Exit code: 0 | ||||
2528 | rundll32.exe "C:\ProgramData\2401bf603c90\2702bc633f93.dat",DllGetClassObject root | C:\Windows\system32\rundll32.exe | taskeng.exe | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows host process (Rundll32) Version: 6.1.7600.16385 (win7_rtm.090713-1255) |
(PID) Process: | (3464) Проект договора понедельник.exe | Key: | HKEY_CURRENT_USER\Software\1e3b855a06aa |
Operation: | write | Name: | 41ecc984c611c3e873 |
Value: 05B67933 | |||
(PID) Process: | (3464) Проект договора понедельник.exe | Key: | HKEY_CURRENT_USER\Software\1e3b855a06aa |
Operation: | write | Name: | 41ecc984c611c3e873 |
Value: 8D08411DE6B0386E453ED83E2908743F7C28B4ACC90D66D4BE828756BAB87695E2132FE6EE087FBDF258CB6A532A5FB047D36E3E3B9AF9496F02543FE666D4702230F8EE47CD01A835E2E9D4DB2735D2736D37196D5847B7AA4E1A6A5A78160D49638EA7CE7DD6F7716A44AC72668ED36AB539566149804D8B23770E533A9550350855160360DE206655BC348BCAC12D826F971CF3BECE7C04183E4E82DA762859C9EAED1B6AB89AE5EE95DBA2D722E42B561D339F2353595DA0284A3CBAABD114CDB466DEE42D6B3D59A4209E113DEAC8915794B0EA781B924ECEC7169E | |||
(PID) Process: | (2528) rundll32.exe | Key: | HKEY_CURRENT_USER\Software\1e3b855a06aa |
Operation: | write | Name: | 41ecc984c611c3e873 |
Value: B090E4E1 |
PID | Process | Filename | Type | |
---|---|---|---|---|
2528 | rundll32.exe | C:\Users\admin\AppData\Local\Temp\8831.tmp | — | |
MD5:— | SHA256:— | |||
2528 | rundll32.exe | C:\Users\admin\AppData\Local\Temp\bddachkjgjefcfci | — | |
MD5:— | SHA256:— | |||
2528 | rundll32.exe | C:\Users\admin\AppData\Local\Temp\Проект договора понедельник.exe | — | |
MD5:— | SHA256:— | |||
2528 | rundll32.exe | C:\Users\admin\AppData\Local\Temp\dehackjlahiogakd | — | |
MD5:— | SHA256:— | |||
3464 | Проект договора понедельник.exe | C:\Users\admin\AppData\Local\Temp\8831.tmp | executable | |
MD5:637299B765F5790DCA95B1BF5092948C | SHA256:923E318BBB07309ED12BADBDAB53CDE98F3D2BFDE70EC27AF425319A9884C2C3 | |||
3464 | Проект договора понедельник.exe | C:\ProgramData\2401bf603c90\2702bc633f93.dat | executable | |
MD5:637299B765F5790DCA95B1BF5092948C | SHA256:923E318BBB07309ED12BADBDAB53CDE98F3D2BFDE70EC27AF425319A9884C2C3 |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
2528 | rundll32.exe | GET | 200 | 178.62.9.171:80 | http://myip.ru/index_small.php | GB | html | 319 b | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
2528 | rundll32.exe | 104.236.46.10:9001 | — | Digital Ocean, Inc. | US | suspicious |
2528 | rundll32.exe | 77.203.13.57:9001 | — | SFR | FR | suspicious |
2528 | rundll32.exe | 185.80.222.105:9001 | — | UK-2 Limited | NL | suspicious |
2528 | rundll32.exe | 145.239.85.208:443 | — | OVH SAS | PL | suspicious |
2528 | rundll32.exe | 178.62.9.171:80 | myip.ru | Digital Ocean, Inc. | GB | malicious |
2528 | rundll32.exe | 177.85.97.121:443 | — | GX INTERNET E WEB HOSTING SERV DE INFORMATICA LTDA | BR | suspicious |
2528 | rundll32.exe | 85.145.45.230:9001 | — | T-Mobile Thuis BV | NL | suspicious |
2528 | rundll32.exe | 212.8.243.229:9001 | — | Sivin Consult Ltd | RU | suspicious |
2528 | rundll32.exe | 54.36.112.234:9001 | — | OVH SAS | FR | suspicious |
Domain | IP | Reputation |
---|---|---|
myip.ru |
| unknown |
PID | Process | Class | Message |
---|---|---|---|
2528 | rundll32.exe | Potential Corporate Privacy Violation | ET POLICY myip.ru IP lookup |
2528 | rundll32.exe | Misc Attack | ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 238 |
2528 | rundll32.exe | Misc activity | ET POLICY TLS possible TOR SSL traffic |
2528 | rundll32.exe | A Network Trojan was detected | MALWARE [PTsecurity] Win32/Spy.Ursnif SSL TOR activity |
2528 | rundll32.exe | A Network Trojan was detected | MALWARE [PTsecurity] Win32/Spy.Ursnif SSL TOR activity |
2528 | rundll32.exe | Misc Attack | ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 144 |
2528 | rundll32.exe | Misc Attack | ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 199 |
2528 | rundll32.exe | Misc Attack | ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 89 |
2528 | rundll32.exe | Misc activity | ET POLICY TLS possible TOR SSL traffic |
2528 | rundll32.exe | Misc Attack | ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 340 |