File name: | Проверить_договор_январь_февраль.exe |
Full analysis: | https://app.any.run/tasks/ecfccd5f-49e2-48d3-a974-29515bb94b20 |
Verdict: | Malicious activity |
Threats: | Ursnif is a banking Trojan that usually infects corporate victims. It is based on an old malware but was substantially updated over the years and became quite powerful. Today Ursnif is one of the most widely spread banking Trojans in the world. |
Analysis date: | February 18, 2019, 12:40:37 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MIME: | application/x-dosexec |
File info: | PE32 executable (GUI) Intel 80386, for MS Windows |
MD5: | 76C4249BAF2F212AF01E077EFB48E0D4 |
SHA1: | 17DA4164315F6B7F694E5E2083311C96F578EA1F |
SHA256: | 594246B1D38DB4949CB126C9049ABFDA6103C6CC1DD7BF0C0CAC4435842ABA95 |
SSDEEP: | 6144:D9gccdjxx0D49XtntsfWB6II0/rzm/KEr1oA3CUvO0TmDM2O9p333Tmt2T5+h5tb:pgNt/5tCuB6IIGHmiEr+ojTmy9p |
.dll | | | Win32 Dynamic Link Library (generic) (43.5) |
---|---|---|
.exe | | | Win32 Executable (generic) (29.8) |
.exe | | | Generic Win/DOS Executable (13.2) |
.exe | | | DOS Executable Generic (13.2) |
Subsystem: | Windows GUI |
---|---|
SubsystemVersion: | 4 |
ImageVersion: | - |
OSVersion: | 4 |
EntryPoint: | 0x10945 |
UninitializedDataSize: | - |
InitializedDataSize: | 410112 |
CodeSize: | 374272 |
LinkerVersion: | 8 |
PEType: | PE32 |
TimeStamp: | 2013:03:09 18:38:48+01:00 |
MachineType: | Intel 386 or later, and compatibles |
Architecture: | IMAGE_FILE_MACHINE_I386 |
---|---|
Subsystem: | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Compilation Date: | 09-Mar-2013 17:38:48 |
Detected languages: |
|
Magic number: | MZ |
---|---|
Bytes on last page of file: | 0x0090 |
Pages in file: | 0x0003 |
Relocations: | 0x0000 |
Size of header: | 0x0004 |
Min extra paragraphs: | 0x0000 |
Max extra paragraphs: | 0xFFFF |
Initial SS value: | 0x0000 |
Initial SP value: | 0x00B8 |
Checksum: | 0x0000 |
Initial IP value: | 0x0000 |
Initial CS value: | 0x0000 |
Overlay number: | 0x0000 |
OEM identifier: | 0x0000 |
OEM information: | 0x0000 |
Address of NE header: | 0x000000C0 |
Signature: | PE |
---|---|
Machine: | IMAGE_FILE_MACHINE_I386 |
Number of sections: | 4 |
Time date stamp: | 09-Mar-2013 17:38:48 |
Pointer to Symbol Table: | 0x00000000 |
Number of symbols: | 0 |
Size of Optional Header: | 0x00E0 |
Characteristics: |
|
Name | Virtual Address | Virtual Size | Raw Size | Charateristics | Entropy |
---|---|---|---|---|---|
.text | 0x00001000 | 0x0005B59E | 0x0005B600 | IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 7.7606 |
.rdata | 0x0005D000 | 0x00003410 | 0x00003600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.98037 |
.data | 0x00061000 | 0x000000D8 | 0x00000200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 1.87817 |
.rsrc | 0x00062000 | 0x00060816 | 0x00060A00 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 2.83819 |
Title | Entropy | Size | Codepage | Language | Type |
---|---|---|---|---|---|
1 | 2.54413 | 102 | UNKNOWN | UNKNOWN | RT_GROUP_ICON |
2 | 5.07578 | 1128 | UNKNOWN | UNKNOWN | RT_ICON |
3 | 3.99767 | 9640 | UNKNOWN | UNKNOWN | RT_ICON |
4 | 4.32497 | 4264 | UNKNOWN | UNKNOWN | RT_ICON |
5 | 3.12032 | 67624 | UNKNOWN | UNKNOWN | RT_ICON |
6 | 3.6279 | 16936 | UNKNOWN | UNKNOWN | RT_ICON |
certcli.dll |
cmutil.dll |
kernel32.dll |
modemui.dll |
odbctrac.dll |
shlwapi.dll |
user32.dll |
wtsapi32.dll |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
3072 | "C:\Users\admin\AppData\Local\Temp\Проверить_договор_январь_февраль.exe" | C:\Users\admin\AppData\Local\Temp\Проверить_договор_январь_февраль.exe | explorer.exe | |
User: admin Integrity Level: MEDIUM Exit code: 0 | ||||
4040 | rundll32.exe "C:\ProgramData\2401bf603c90\2702bc633f93.dat",DllGetClassObject root | C:\Windows\system32\rundll32.exe | taskeng.exe | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows host process (Rundll32) Version: 6.1.7600.16385 (win7_rtm.090713-1255) | ||||
2028 | C:\Windows\Explorer.EXE | C:\Windows\explorer.exe | — | — |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Explorer Version: 6.1.7600.16385 (win7_rtm.090713-1255) |
(PID) Process: | (3072) Проверить_договор_январь_февраль.exe | Key: | HKEY_CURRENT_USER\Software\1e3b855a06aa |
Operation: | write | Name: | 41ecc984c611c3e873 |
Value: B7CA6B75 | |||
(PID) Process: | (3072) Проверить_договор_январь_февраль.exe | Key: | HKEY_CURRENT_USER\Software\1e3b855a06aa |
Operation: | write | Name: | 41ecc984c611c3e873 |
Value: 73184CA98B2B3492522C8F5ED30E7BFAED31B1AF3D4A5C3D1A80B36B423D6FDFB8D7F399F0EC30C0D9D6017E33DFEDB3B91575AA3594DE2BFE4E6DC72ED748FD2459BA96142F82C214FA6C29EBF99CB989BAA3DE4199B81C705A660183795EADA097AE02B2B202FA23C98A491410815ABA15A0946BE0C0ED6046140E5CA561AD86ED048AE1645DA59A5EC10E4F2C85BD4283113A4ACADBB24CC77D2199C1E6AC70D495D8ECD42A689674C2A99AA8B1DA7DA5366FB47AF718E833AF0947AD30841B7E0C60701C337D564545DD39DB4AB3F7D2AEDD5230220DB0A9540866BC0737F111822AF7BDD91C | |||
(PID) Process: | (4040) rundll32.exe | Key: | HKEY_CURRENT_USER\Software\1e3b855a06aa |
Operation: | write | Name: | 41ecc984c611c3e873 |
Value: B3F001B3 | |||
(PID) Process: | (2028) explorer.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\5F\52C64B7E |
Operation: | write | Name: | LanguageList |
Value: en-US |
PID | Process | Filename | Type | |
---|---|---|---|---|
4040 | rundll32.exe | C:\Users\admin\AppData\Local\Temp\6E2C.tmp | — | |
MD5:— | SHA256:— | |||
4040 | rundll32.exe | C:\Users\admin\AppData\Local\Temp\pnpmnaegehejfceo | — | |
MD5:— | SHA256:— | |||
4040 | rundll32.exe | C:\Users\admin\AppData\Local\Temp\Проверить_договор_январь_февраль.exe | — | |
MD5:— | SHA256:— | |||
4040 | rundll32.exe | C:\Users\admin\AppData\Local\Temp\obgffifohehialmo | — | |
MD5:— | SHA256:— | |||
3072 | Проверить_договор_январь_февраль.exe | C:\Users\admin\AppData\Local\Temp\6E2C.tmp | executable | |
MD5:637299B765F5790DCA95B1BF5092948C | SHA256:923E318BBB07309ED12BADBDAB53CDE98F3D2BFDE70EC27AF425319A9884C2C3 | |||
3072 | Проверить_договор_январь_февраль.exe | C:\ProgramData\2401bf603c90\2702bc633f93.dat | executable | |
MD5:637299B765F5790DCA95B1BF5092948C | SHA256:923E318BBB07309ED12BADBDAB53CDE98F3D2BFDE70EC27AF425319A9884C2C3 |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
4040 | rundll32.exe | GET | 200 | 178.62.9.171:80 | http://myip.ru/index_small.php | GB | html | 325 b | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
4040 | rundll32.exe | 178.62.9.171:80 | myip.ru | Digital Ocean, Inc. | GB | malicious |
4040 | rundll32.exe | 37.187.118.34:9001 | — | OVH SAS | FR | suspicious |
4040 | rundll32.exe | 159.203.90.174:9001 | — | Digital Ocean, Inc. | US | suspicious |
4040 | rundll32.exe | 176.9.44.232:9001 | — | Hetzner Online GmbH | DE | suspicious |
4040 | rundll32.exe | 145.239.1.97:443 | — | OVH SAS | DE | suspicious |
4040 | rundll32.exe | 144.76.37.242:8443 | — | Hetzner Online GmbH | DE | suspicious |
4040 | rundll32.exe | 94.130.105.140:9001 | — | Hetzner Online GmbH | DE | suspicious |
Domain | IP | Reputation |
---|---|---|
myip.ru |
| unknown |
dns.msftncsi.com |
| shared |
PID | Process | Class | Message |
---|---|---|---|
4040 | rundll32.exe | Potential Corporate Privacy Violation | ET POLICY myip.ru IP lookup |
4040 | rundll32.exe | Misc Attack | ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 160 |
4040 | rundll32.exe | Misc activity | ET POLICY TLS possible TOR SSL traffic |
4040 | rundll32.exe | A Network Trojan was detected | MALWARE [PTsecurity] Win32/Spy.Ursnif SSL TOR activity |
4040 | rundll32.exe | A Network Trojan was detected | MALWARE [PTsecurity] Win32/Spy.Ursnif SSL TOR activity |
4040 | rundll32.exe | Misc Attack | ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 141 |
4040 | rundll32.exe | Misc Attack | ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 143 |
4040 | rundll32.exe | Misc Attack | ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 700 |
4040 | rundll32.exe | Misc activity | ET POLICY TLS possible TOR SSL traffic |
4040 | rundll32.exe | Misc Attack | ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 197 |