Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
hzQNazOx3Z.dll

Overview

General Information

Sample name:hzQNazOx3Z.dll
renamed because original name is a hash value
Original sample name:ee045d4a29953db46e39799dd601691a.dll
Analysis ID:1591361
MD5:ee045d4a29953db46e39799dd601691a
SHA1:ed9a43cdbf5906b29005cd4f5b82a90f974c167c
SHA256:b1950a1ca8fe42f6a5cf96f993ae3b77bde0611a220a8a8505beffc7839aaffd
Tags:dllexeuser-mentality
Infos:

Detection

Wannacry
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Tries to download HTTP data from a sinkholed server
Yara detected Wannacry ransomware
AI detected suspicious sample
Drops executables to the windows directory (C:\Windows) and starts them
Machine Learning detection for sample
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Sample execution stops while process was sleeping (likely an evasion)
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Yara signature match

Classification

  • System is w10x64
  • loaddll32.exe (PID: 7744 cmdline: loaddll32.exe "C:\Users\user\Desktop\hzQNazOx3Z.dll" MD5: 51E6071F9CBA48E79F10C84515AAE618)
    • conhost.exe (PID: 7752 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 7800 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\hzQNazOx3Z.dll",#1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • rundll32.exe (PID: 7824 cmdline: rundll32.exe "C:\Users\user\Desktop\hzQNazOx3Z.dll",#1 MD5: 889B99C52A60DD49227C5E485A016679)
        • mssecsvc.exe (PID: 7888 cmdline: C:\WINDOWS\mssecsvc.exe MD5: F107A717F76F4F910AE9CB4DC5290594)
    • rundll32.exe (PID: 7808 cmdline: rundll32.exe C:\Users\user\Desktop\hzQNazOx3Z.dll,PlayGame MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 8008 cmdline: rundll32.exe "C:\Users\user\Desktop\hzQNazOx3Z.dll",PlayGame MD5: 889B99C52A60DD49227C5E485A016679)
      • mssecsvc.exe (PID: 8024 cmdline: C:\WINDOWS\mssecsvc.exe MD5: F107A717F76F4F910AE9CB4DC5290594)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
hzQNazOx3Z.dllJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
    hzQNazOx3Z.dllWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
    • 0x45604:$x1: icacls . /grant Everyone:F /T /C /Q
    • 0x353d0:$x3: tasksche.exe
    • 0x455e0:$x3: tasksche.exe
    • 0x455bc:$x4: Global\MsWinZonesCacheCounterMutexA
    • 0x45634:$x5: WNcry@2ol7
    • 0x3543b:$x6: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
    • 0x3028:$x7: mssecsvc.exe
    • 0x120ac:$x7: mssecsvc.exe
    • 0x1b3b4:$x7: mssecsvc.exe
    • 0x353a8:$x8: C:\%s\qeriuwjhrf
    • 0x45604:$x9: icacls . /grant Everyone:F /T /C /Q
    • 0x3014:$s1: C:\%s\%s
    • 0x12098:$s1: C:\%s\%s
    • 0x1b39c:$s1: C:\%s\%s
    • 0x353bc:$s1: C:\%s\%s
    • 0x45534:$s3: cmd.exe /c "%s"
    • 0x77a88:$s4: msg/m_portuguese.wnry
    • 0x326f0:$s5: \\192.168.56.20\IPC$
    • 0x1fae5:$s6: \\172.16.99.5\IPC$
    • 0xd195:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
    • 0x78da:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
    hzQNazOx3Z.dllwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
    • 0x455e0:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
    • 0x45608:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
    SourceRuleDescriptionAuthorStrings
    00000009.00000000.1427895423.000000000040F000.00000008.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
      00000009.00000002.1434677406.000000000040F000.00000008.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
        00000006.00000000.1397411031.000000000040F000.00000008.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
          00000006.00000002.1411463143.000000000040F000.00000008.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
            00000009.00000002.1435202859.0000000000710000.00000002.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
              Click to see the 9 entries
              SourceRuleDescriptionAuthorStrings
              9.0.mssecsvc.exe.7100a4.1.unpackJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
                9.0.mssecsvc.exe.7100a4.1.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
                • 0xf4fc:$x1: icacls . /grant Everyone:F /T /C /Q
                • 0xf4d8:$x3: tasksche.exe
                • 0xf4b4:$x4: Global\MsWinZonesCacheCounterMutexA
                • 0xf52c:$x5: WNcry@2ol7
                • 0xf4fc:$x9: icacls . /grant Everyone:F /T /C /Q
                • 0xf42c:$s3: cmd.exe /c "%s"
                • 0x41980:$s4: msg/m_portuguese.wnry
                • 0x2a02:$op4: 09 FF 76 30 50 FF 56 2C 59 59 47 3B 7E 0C 7C
                • 0x26dc:$op5: C1 EA 1D C1 EE 1E 83 E2 01 83 E6 01 8D 14 56
                • 0x22c8:$op6: 8D 48 FF F7 D1 8D 44 10 FF 23 F1 23 C1
                9.0.mssecsvc.exe.7100a4.1.unpackwanna_cry_ransomware_genericdetects wannacry ransomware on disk and in virtual pageus-cert code analysis team
                • 0xf4d8:$s11: 74 61 73 6B 73 63 68 65 2E 65 78 65 00 00 00 00 54 61 73 6B 53 74 61 72 74 00 00 00 74 2E 77 6E 72 79 00 00 69 63 61 63
                • 0xf500:$s12: 6C 73 20 2E 20 2F 67 72 61 6E 74 20 45 76 65 72 79 6F 6E 65 3A 46 20 2F 54 20 2F 43 20 2F 51 00 61 74 74 72 69 62 20 2B 68
                9.0.mssecsvc.exe.7100a4.1.unpackWin32_Ransomware_WannaCryunknownReversingLabs
                • 0x2016:$main_2: 68 08 02 00 00 33 DB 50 53 FF 15 8C 80 40 00 68 AC F8 40 00 E8 F6 F1 FF FF 59 FF 15 6C 81 40 00 83 38 02 75 53 68 38 F5 40 00 FF 15 68 81 40 00 8B 00 FF 70 04 E8 F0 56 00 00 59 85 C0 59 75 38 ...
                • 0x77ba:$entrypoint_all: 55 8B EC 6A FF 68 88 D4 40 00 68 F4 76 40 00 64 A1 00 00 00 00 50 64 89 25 00 00 00 00 83 EC 68 53 56 57 89 65 E8 33 DB 89 5D FC 6A 02 FF 15 C4 81 40 00 59 83 0D 4C F9 40 00 FF 83 0D 50 F9 40 ...
                6.2.mssecsvc.exe.7100a4.1.unpackJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
                  Click to see the 47 entries
                  No Sigma rule has matched
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2025-01-14T22:42:27.642828+010020315153Misc activity104.16.167.22880192.168.2.749744TCP
                  2025-01-14T22:42:29.967249+010020315153Misc activity104.16.167.22880192.168.2.749759TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2025-01-14T22:42:27.096177+010020242911A Network Trojan was detected192.168.2.7512331.1.1.153UDP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2025-01-14T22:42:27.641168+010020242981A Network Trojan was detected192.168.2.749744104.16.167.22880TCP
                  2025-01-14T22:42:29.958569+010020242981A Network Trojan was detected192.168.2.749759104.16.167.22880TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2025-01-14T22:42:27.641168+010020242991A Network Trojan was detected192.168.2.749744104.16.167.22880TCP
                  2025-01-14T22:42:29.958569+010020242991A Network Trojan was detected192.168.2.749759104.16.167.22880TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2025-01-14T22:42:27.641168+010020243011A Network Trojan was detected192.168.2.749744104.16.167.22880TCP
                  2025-01-14T22:42:29.958569+010020243011A Network Trojan was detected192.168.2.749759104.16.167.22880TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2025-01-14T22:42:27.641168+010020243021A Network Trojan was detected192.168.2.749744104.16.167.22880TCP
                  2025-01-14T22:42:29.958569+010020243021A Network Trojan was detected192.168.2.749759104.16.167.22880TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2025-01-14T22:42:27.641168+010028033043Unknown Traffic192.168.2.749744104.16.167.22880TCP
                  2025-01-14T22:42:29.958569+010028033043Unknown Traffic192.168.2.749759104.16.167.22880TCP

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: hzQNazOx3Z.dllAvira: detected
                  Source: hzQNazOx3Z.dllReversingLabs: Detection: 94%
                  Source: hzQNazOx3Z.dllVirustotal: Detection: 93%Perma Link
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.0% probability
                  Source: hzQNazOx3Z.dllJoe Sandbox ML: detected
                  Source: hzQNazOx3Z.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL

                  Networking

                  barindex
                  Source: Network trafficSuricata IDS: 2024298 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1 : 192.168.2.7:49759 -> 104.16.167.228:80
                  Source: Network trafficSuricata IDS: 2024299 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 2 : 192.168.2.7:49759 -> 104.16.167.228:80
                  Source: Network trafficSuricata IDS: 2024301 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 4 : 192.168.2.7:49759 -> 104.16.167.228:80
                  Source: Network trafficSuricata IDS: 2024302 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 5 : 192.168.2.7:49759 -> 104.16.167.228:80
                  Source: Network trafficSuricata IDS: 2024298 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1 : 192.168.2.7:49744 -> 104.16.167.228:80
                  Source: Network trafficSuricata IDS: 2024299 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 2 : 192.168.2.7:49744 -> 104.16.167.228:80
                  Source: Network trafficSuricata IDS: 2024301 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 4 : 192.168.2.7:49744 -> 104.16.167.228:80
                  Source: Network trafficSuricata IDS: 2024302 - Severity 1 - ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 5 : 192.168.2.7:49744 -> 104.16.167.228:80
                  Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Tue, 14 Jan 2025 21:42:27 GMTContent-Type: text/htmlContent-Length: 607Connection: closeServer: cloudflareCF-RAY: 9020cbc6687f8c7e-EWRData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 20 63 6c 61 73 73 3d 22 66 6c 61 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 2d 62 6f 78 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 62 69 67 2d 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6c 65 61 72 22 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 68 31 3e 53 69 6e 6b 68 6f 6c 65 64 21 3c 2f 68 31 3e 3c 70 3e 54 68 69 73 20 64 6f 6d 61 69 6e 20 68 61 73 20 62 65 65 6e 20 73 69 6e 6b 68 6f 6c 65 64 20 62 79 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 2e 63 6f 6d 22 3e 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 61 3e 2e 3c 2f 70 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>
                  Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Tue, 14 Jan 2025 21:42:29 GMTContent-Type: text/htmlContent-Length: 607Connection: closeServer: cloudflareCF-RAY: 9020cbd4dc7a1871-EWRData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 20 63 6c 61 73 73 3d 22 66 6c 61 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 2d 62 6f 78 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 62 69 67 2d 63 6f 6e 74 65 6e 74 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6c 65 61 72 22 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 68 31 3e 53 69 6e 6b 68 6f 6c 65 64 21 3c 2f 68 31 3e 3c 70 3e 54 68 69 73 20 64 6f 6d 61 69 6e 20 68 61 73 20 62 65 65 6e 20 73 69 6e 6b 68 6f 6c 65 64 20 62 79 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 2e 63 6f 6d 22 3e 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 61 3e 2e 3c 2f 70 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
                  Source: Joe Sandbox ViewIP Address: 104.16.167.228 104.16.167.228
                  Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.7:49759 -> 104.16.167.228:80
                  Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.7:49744 -> 104.16.167.228:80
                  Source: Network trafficSuricata IDS: 2024291 - Severity 1 - ET MALWARE Possible WannaCry DNS Lookup 1 : 192.168.2.7:51233 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2031515 - Severity 3 - ET MALWARE Known Sinkhole Response Kryptos Logic : 104.16.167.228:80 -> 192.168.2.7:49759
                  Source: Network trafficSuricata IDS: 2031515 - Severity 3 - ET MALWARE Known Sinkhole Response Kryptos Logic : 104.16.167.228:80 -> 192.168.2.7:49744
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comCache-Control: no-cache
                  Source: global trafficDNS traffic detected: DNS query: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                  Source: hzQNazOx3Z.dllString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                  Source: mssecsvc.exe, 00000009.00000002.1437637472.0000000000C18000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com#R
                  Source: mssecsvc.exe, 00000006.00000002.1412147533.0000000000C7E000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000006.00000002.1412147533.0000000000CE5000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000006.00000002.1412147533.0000000000CBE000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000009.00000002.1437637472.0000000000C18000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000009.00000002.1437637472.0000000000C4E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/
                  Source: mssecsvc.exe, 00000006.00000002.1412147533.0000000000C7E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comI
                  Source: mssecsvc.exe, 00000009.00000002.1437637472.0000000000C6B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.kryptoslogic.com

                  Spam, unwanted Advertisements and Ransom Demands

                  barindex
                  Source: Yara matchFile source: hzQNazOx3Z.dll, type: SAMPLE
                  Source: Yara matchFile source: 9.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 9.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 9.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 9.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 9.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 9.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000009.00000000.1427895423.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000009.00000002.1434677406.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000006.00000000.1397411031.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000006.00000002.1411463143.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000009.00000002.1435202859.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000006.00000000.1397563865.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000009.00000000.1428057212.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000006.00000002.1411628374.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: mssecsvc.exe PID: 7888, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: mssecsvc.exe PID: 8024, type: MEMORYSTR

                  System Summary

                  barindex
                  Source: hzQNazOx3Z.dll, type: SAMPLEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: hzQNazOx3Z.dll, type: SAMPLEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 9.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 9.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 9.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                  Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                  Source: 9.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 9.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 9.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                  Source: 9.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 9.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 9.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                  Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                  Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                  Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                  Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                  Source: 9.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 9.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 9.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                  Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                  Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                  Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                  Source: 9.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 9.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                  Source: 9.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 9.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                  Source: 9.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                  Source: 9.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                  Source: 9.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 9.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry Author: ReversingLabs
                  Source: 00000009.00000002.1435202859.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 00000006.00000000.1397563865.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 00000009.00000000.1428057212.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: 00000006.00000002.1411628374.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: detects wannacry ransomware on disk and in virtual page Author: us-cert code analysis team
                  Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\WINDOWS\mssecsvc.exeJump to behavior
                  Source: hzQNazOx3Z.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
                  Source: hzQNazOx3Z.dll, type: SAMPLEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: hzQNazOx3Z.dll, type: SAMPLEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 9.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 9.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 9.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                  Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 6.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                  Source: 9.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 9.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 9.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                  Source: 9.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 9.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 9.2.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                  Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                  Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 6.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                  Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                  Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 6.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                  Source: 9.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 9.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 9.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                  Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 6.0.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                  Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 6.0.mssecsvc.exe.7100a4.1.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                  Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 6.2.mssecsvc.exe.7100a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                  Source: 9.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 9.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                  Source: 9.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 9.0.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                  Source: 9.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                  Source: 9.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                  Source: 9.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 9.2.mssecsvc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_WannaCry tc_detection_name = WannaCry, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                  Source: 00000009.00000002.1435202859.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 00000006.00000000.1397563865.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 00000009.00000000.1428057212.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: 00000006.00000002.1411628374.0000000000710000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: wanna_cry_ransomware_generic date = 2017/05/12, hash0 = 4da1f312a214c07143abeeafb695d904, author = us-cert code analysis team, description = detects wannacry ransomware on disk and in virtual page, reference = not set
                  Source: hzQNazOx3Z.dllBinary or memory string: @.der.pfx.key.crt.csr.p12.pem.odt.ott.sxw.stw.uot.3ds.max.3dm.ods.ots.sxc.stc.dif.slk.wb2.odp.otp.sxd.std.uop.odg.otg.sxm.mml.lay.lay6.asc.sqlite3.sqlitedb.sql.accdb.mdb.db.dbf.odb.frm.myd.myi.ibd.mdf.ldf.sln.suo.cs.c.cpp.pas.h.asm.js.cmd.bat.ps1.vbs.vb.pl.dip.dch.sch.brd.jsp.php.asp.rb.java.jar.class.sh.mp3.wav.swf.fla.wmv.mpg.vob.mpeg.asf.avi.mov.mp4.3gp.mkv.3g2.flv.wma.mid.m3u.m4u.djvu.svg.ai.psd.nef.tiff.tif.cgm.raw.gif.png.bmp.jpg.jpeg.vcd.iso.backup.zip.rar.7z.gz.tgz.tar.bak.tbk.bz2.PAQ.ARC.aes.gpg.vmx.vmdk.vdi.sldm.sldx.sti.sxi.602.hwp.snt.onetoc2.dwg.pdf.wk1.wks.123.rtf.csv.txt.vsdx.vsd.edb.eml.msg.ost.pst.potm.potx.ppam.ppsx.ppsm.pps.pot.pptm.pptx.ppt.xltm.xltx.xlc.xlm.xlt.xlw.xlsb.xlsm.xlsx.xls.dotx.dotm.dot.docm.docb.docx.docWANACRY!%s\%sCloseHandleDeleteFileWMoveFileExWMoveFileWReadFileWriteFileCreateFileWkernel32.dll
                  Source: classification engineClassification label: mal100.rans.evad.winDLL@15/0@1/1
                  Source: C:\Windows\mssecsvc.exeCode function: sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,6_2_00407C40
                  Source: C:\Windows\mssecsvc.exeCode function: 6_2_00407CE0 InternetCloseHandle,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,FindResourceA,LoadResource,LockResource,SizeofResource,sprintf,sprintf,sprintf,MoveFileExA,6_2_00407CE0
                  Source: C:\Windows\mssecsvc.exeCode function: 6_2_00407C40 sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,6_2_00407C40
                  Source: C:\Windows\mssecsvc.exeCode function: 6_2_00408090 GetModuleFileNameA,__p___argc,OpenSCManagerA,InternetCloseHandle,OpenServiceA,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherA,6_2_00408090
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7752:120:WilError_03
                  Source: hzQNazOx3Z.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\hzQNazOx3Z.dll,PlayGame
                  Source: hzQNazOx3Z.dllReversingLabs: Detection: 94%
                  Source: hzQNazOx3Z.dllVirustotal: Detection: 93%
                  Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\hzQNazOx3Z.dll"
                  Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\hzQNazOx3Z.dll",#1
                  Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\hzQNazOx3Z.dll,PlayGame
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\hzQNazOx3Z.dll",#1
                  Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exe
                  Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\hzQNazOx3Z.dll",PlayGame
                  Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exe
                  Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\hzQNazOx3Z.dll",#1Jump to behavior
                  Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\hzQNazOx3Z.dll,PlayGameJump to behavior
                  Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\hzQNazOx3Z.dll",PlayGameJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\hzQNazOx3Z.dll",#1Jump to behavior
                  Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exeJump to behavior
                  Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvc.exe C:\WINDOWS\mssecsvc.exeJump to behavior
                  Source: C:\Windows\System32\loaddll32.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Windows\System32\loaddll32.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Windows\mssecsvc.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Windows\mssecsvc.exeSection loaded: msvcp60.dllJump to behavior
                  Source: C:\Windows\mssecsvc.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Windows\mssecsvc.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Windows\mssecsvc.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Windows\mssecsvc.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\mssecsvc.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\mssecsvc.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\mssecsvc.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\mssecsvc.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\mssecsvc.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Windows\mssecsvc.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Windows\mssecsvc.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Windows\mssecsvc.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Windows\mssecsvc.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Windows\mssecsvc.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Windows\mssecsvc.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\mssecsvc.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Windows\mssecsvc.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Windows\mssecsvc.exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Windows\mssecsvc.exeSection loaded: msvcp60.dllJump to behavior
                  Source: C:\Windows\mssecsvc.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Windows\mssecsvc.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Windows\mssecsvc.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Windows\mssecsvc.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\mssecsvc.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\mssecsvc.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\mssecsvc.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\mssecsvc.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\mssecsvc.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Windows\mssecsvc.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Windows\mssecsvc.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Windows\mssecsvc.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Windows\mssecsvc.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Windows\mssecsvc.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Windows\mssecsvc.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\mssecsvc.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Windows\mssecsvc.exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Windows\mssecsvc.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Windows\mssecsvc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
                  Source: hzQNazOx3Z.dllStatic file information: File size 5267459 > 1048576
                  Source: hzQNazOx3Z.dllStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x501000

                  Persistence and Installation Behavior

                  barindex
                  Source: C:\Windows\SysWOW64\rundll32.exeExecutable created and started: C:\WINDOWS\mssecsvc.exeJump to behavior
                  Source: C:\Windows\mssecsvc.exeCode function: 6_2_00407C40 sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,6_2_00407C40
                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\mssecsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                  Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 120000Jump to behavior
                  Source: mssecsvc.exe, 00000006.00000002.1412147533.0000000000CA6000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000006.00000002.1412147533.0000000000CF9000.00000004.00000020.00020000.00000000.sdmp, mssecsvc.exe, 00000009.00000002.1437637472.0000000000C6B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                  Source: mssecsvc.exe, 00000009.00000002.1437637472.0000000000C6B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWG
                  Source: mssecsvc.exe, 00000009.00000002.1437637472.0000000000C34000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWX"
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\hzQNazOx3Z.dll",#1Jump to behavior
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
                  Service Execution
                  4
                  Windows Service
                  4
                  Windows Service
                  11
                  Masquerading
                  OS Credential Dumping1
                  Security Software Discovery
                  Remote ServicesData from Local System2
                  Non-Application Layer Protocol
                  Exfiltration Over Other Network MediumAbuse Accessibility Features
                  CredentialsDomainsDefault AccountsScheduled Task/Job1
                  DLL Side-Loading
                  11
                  Process Injection
                  1
                  Rundll32
                  LSASS Memory1
                  Virtualization/Sandbox Evasion
                  Remote Desktop ProtocolData from Removable Media2
                  Application Layer Protocol
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                  DLL Side-Loading
                  1
                  Virtualization/Sandbox Evasion
                  Security Account Manager1
                  System Information Discovery
                  SMB/Windows Admin SharesData from Network Shared Drive11
                  Ingress Tool Transfer
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
                  Process Injection
                  NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                  DLL Side-Loading
                  LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet
                  behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1591361 Sample: hzQNazOx3Z.dll Startdate: 14/01/2025 Architecture: WINDOWS Score: 100 27 www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com 2->27 31 Tries to download HTTP data from a sinkholed server 2->31 33 Suricata IDS alerts for network traffic 2->33 35 Malicious sample detected (through community Yara rule) 2->35 37 5 other signatures 2->37 9 loaddll32.exe 1 2->9         started        signatures3 process4 process5 11 rundll32.exe 9->11         started        14 cmd.exe 1 9->14         started        16 conhost.exe 9->16         started        18 rundll32.exe 1 9->18         started        signatures6 39 Drops executables to the windows directory (C:\Windows) and starts them 11->39 20 mssecsvc.exe 6 11->20         started        22 rundll32.exe 14->22         started        process7 process8 24 mssecsvc.exe 6 22->24         started        dnsIp9 29 www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com 104.16.167.228, 49744, 49759, 80 CLOUDFLARENETUS United States 24->29

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  hzQNazOx3Z.dll95%ReversingLabsWin32.Ransomware.WannaCry
                  hzQNazOx3Z.dll93%VirustotalBrowse
                  hzQNazOx3Z.dll100%AviraTR/AD.WannaCry.zbqny
                  hzQNazOx3Z.dll100%Joe Sandbox ML
                  No Antivirus matches
                  No Antivirus matches
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  https://www.kryptoslogic.com0%Avira URL Cloudsafe
                  http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comI0%Avira URL Cloudsafe
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                  104.16.167.228
                  truefalse
                    high
                    s-part-0017.t-0009.t-msedge.net
                    13.107.246.45
                    truefalse
                      high
                      NameMaliciousAntivirus DetectionReputation
                      http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/false
                        high
                        NameSourceMaliciousAntivirus DetectionReputation
                        http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comhzQNazOx3Z.dllfalse
                          high
                          https://www.kryptoslogic.commssecsvc.exe, 00000009.00000002.1437637472.0000000000C6B000.00000004.00000020.00020000.00000000.sdmptrue
                          • Avira URL Cloud: safe
                          unknown
                          http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com#Rmssecsvc.exe, 00000009.00000002.1437637472.0000000000C18000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comImssecsvc.exe, 00000006.00000002.1412147533.0000000000C7E000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs
                            IPDomainCountryFlagASNASN NameMalicious
                            104.16.167.228
                            www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comUnited States
                            13335CLOUDFLARENETUSfalse
                            Joe Sandbox version:42.0.0 Malachite
                            Analysis ID:1591361
                            Start date and time:2025-01-14 22:41:15 +01:00
                            Joe Sandbox product:CloudBasic
                            Overall analysis duration:0h 3m 43s
                            Hypervisor based Inspection enabled:false
                            Report type:full
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                            Number of analysed new started processes analysed:13
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Sample name:hzQNazOx3Z.dll
                            renamed because original name is a hash value
                            Original Sample Name:ee045d4a29953db46e39799dd601691a.dll
                            Detection:MAL
                            Classification:mal100.rans.evad.winDLL@15/0@1/1
                            EGA Information:
                            • Successful, ratio: 100%
                            HCA Information:
                            • Successful, ratio: 100%
                            • Number of executed functions: 2
                            • Number of non-executed functions: 3
                            Cookbook Comments:
                            • Found application associated with file extension: .dll
                            • Stop behavior analysis, all processes terminated
                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, SIHClient.exe, conhost.exe
                            • Excluded IPs from analysis (whitelisted): 13.107.246.45, 4.175.87.197
                            • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, otelrules.azureedge.net, otelrules.afd.azureedge.net, ctldl.windowsupdate.com, azureedge-t-prod.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
                            • Not all processes where analyzed, report is missing behavior information
                            • Report size getting too big, too many NtQueryValueKey calls found.
                            TimeTypeDescription
                            16:42:28API Interceptor1x Sleep call for process: loaddll32.exe modified
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            104.16.167.228hsmSW6Eifl.dllGet hashmaliciousWannacryBrowse
                            • www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/
                            Yx3rRuVx3c.dllGet hashmaliciousWannacryBrowse
                            • www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/
                            k6fBkyS1R6.dllGet hashmaliciousWannacryBrowse
                            • www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/
                            mCgW5qofxC.dllGet hashmaliciousWannacryBrowse
                            • www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/
                            6KJ3FjgeLv.dllGet hashmaliciousWannacryBrowse
                            • www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/
                            LisectAVT_2403002A_26.exeGet hashmaliciousWannacryBrowse
                            • www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/
                            zbRmQrzaHY.dllGet hashmaliciousWannacryBrowse
                            • www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/
                            qt680eucI4.dllGet hashmaliciousWannacryBrowse
                            • www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            s-part-0017.t-0009.t-msedge.neteIZi481eP6.dllGet hashmaliciousWannacryBrowse
                            • 13.107.246.45
                            Yx3rRuVx3c.dllGet hashmaliciousWannacryBrowse
                            • 13.107.246.45
                            sUlHfYQxNw.dllGet hashmaliciousWannacryBrowse
                            • 13.107.246.45
                            logitix.pdfGet hashmaliciousHTMLPhisherBrowse
                            • 13.107.246.45
                            DHL AWB CUSTOM CLEARANCE.xlsGet hashmaliciousUnknownBrowse
                            • 13.107.246.45
                            DHL AWB CUSTOM CLEARANCE.xlsGet hashmaliciousUnknownBrowse
                            • 13.107.246.45
                            EFT_Payment_Notification_Gheenirrigation.htmlGet hashmaliciousHTMLPhisherBrowse
                            • 13.107.246.45
                            Document_31055.pdfGet hashmaliciousUnknownBrowse
                            • 13.107.246.45
                            MissedCall_Record_3295935663.htmlGet hashmaliciousUnknownBrowse
                            • 13.107.246.45
                            62.122.184.98 (2).ps1Get hashmaliciousUnknownBrowse
                            • 13.107.246.45
                            www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comsEVVq8g1dJ.dllGet hashmaliciousWannacryBrowse
                            • 104.16.166.228
                            hsmSW6Eifl.dllGet hashmaliciousWannacryBrowse
                            • 104.16.167.228
                            87c6RORO31.dllGet hashmaliciousWannacryBrowse
                            • 104.16.166.228
                            Yx3rRuVx3c.dllGet hashmaliciousWannacryBrowse
                            • 104.16.167.228
                            5Q6ffmX9tQ.dllGet hashmaliciousWannacryBrowse
                            • 104.16.166.228
                            9nNO3SHiV1.dllGet hashmaliciousWannacryBrowse
                            • 104.16.166.228
                            k6fBkyS1R6.dllGet hashmaliciousWannacryBrowse
                            • 104.16.167.228
                            mCgW5qofxC.dllGet hashmaliciousWannacryBrowse
                            • 104.16.167.228
                            6KJ3FjgeLv.dllGet hashmaliciousWannacryBrowse
                            • 104.16.167.228
                            http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comGet hashmaliciousUnknownBrowse
                            • 104.16.166.228
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            CLOUDFLARENETUSsEVVq8g1dJ.dllGet hashmaliciousWannacryBrowse
                            • 104.16.166.228
                            K064a7Rfk7.msiGet hashmaliciousUnknownBrowse
                            • 104.21.37.86
                            http://monitor.linkwhat.com/tl4tl4726Qz107cK770xR10599lj360px17lb07468gl70015oV95328Kn41253VG39381FP5605427918==aru2826664Get hashmaliciousPhisherBrowse
                            • 104.22.8.215
                            https://gm.zonimathor.ru/qNd7Get hashmaliciousUnknownBrowse
                            • 104.21.48.1
                            logitix.pdfGet hashmaliciousHTMLPhisherBrowse
                            • 104.17.25.14
                            XML-702.msiGet hashmaliciousAteraAgentBrowse
                            • 104.18.18.106
                            Default3.aspxGet hashmaliciousUnknownBrowse
                            • 104.21.83.41
                            EFT_Payment_Notification_Gheenirrigation.htmlGet hashmaliciousHTMLPhisherBrowse
                            • 104.17.25.14
                            Document_31055.pdfGet hashmaliciousUnknownBrowse
                            • 104.17.25.14
                            https://drive.google.com/file/d/1TF-huc4s6nOnHpT977ywO8Fj-NERebnm/view?usp=sharing_eip&ts=6786926eGet hashmaliciousUnknownBrowse
                            • 1.1.1.1
                            No context
                            No context
                            No created / dropped files found
                            File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                            Entropy (8bit):6.412630681942534
                            TrID:
                            • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
                            • Generic Win/DOS Executable (2004/3) 0.20%
                            • DOS Executable Generic (2002/1) 0.20%
                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                            File name:hzQNazOx3Z.dll
                            File size:5'267'459 bytes
                            MD5:ee045d4a29953db46e39799dd601691a
                            SHA1:ed9a43cdbf5906b29005cd4f5b82a90f974c167c
                            SHA256:b1950a1ca8fe42f6a5cf96f993ae3b77bde0611a220a8a8505beffc7839aaffd
                            SHA512:b801769ba498c21eb3593026e911aa83e27da9a9e1262f02902feccc0302a45a1e521ecfec64c6210c0bfcc3583944307a7468fe8e928800ba6c530b4d88543e
                            SSDEEP:98304:MDqPoBhz1aRxcSUDk36SAEdhvxWa9P593R8yAVp2H:MDqPe1Cxcxk3ZAEUadzR8yc4H
                            TLSH:ED363394622CB2FCF0440EB44463896BB7B33C6967BA5E1F8BC086670D43B5BAFD0641
                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......}.r_9...9...9.......=...9...6.....A.:.......8.......8.......:...Rich9...........................PE..L...QW.Y...........!.......
                            Icon Hash:7ae282899bbab082
                            Entrypoint:0x100011e9
                            Entrypoint Section:.text
                            Digitally signed:false
                            Imagebase:0x10000000
                            Subsystem:windows gui
                            Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
                            DLL Characteristics:
                            Time Stamp:0x59145751 [Thu May 11 12:21:37 2017 UTC]
                            TLS Callbacks:
                            CLR (.Net) Version:
                            OS Version Major:4
                            OS Version Minor:0
                            File Version Major:4
                            File Version Minor:0
                            Subsystem Version Major:4
                            Subsystem Version Minor:0
                            Import Hash:2e5708ae5fed0403e8117c645fb23e5b
                            Instruction
                            push ebp
                            mov ebp, esp
                            push ebx
                            mov ebx, dword ptr [ebp+08h]
                            push esi
                            mov esi, dword ptr [ebp+0Ch]
                            push edi
                            mov edi, dword ptr [ebp+10h]
                            test esi, esi
                            jne 00007F568D10D51Bh
                            cmp dword ptr [10003140h], 00000000h
                            jmp 00007F568D10D538h
                            cmp esi, 01h
                            je 00007F568D10D517h
                            cmp esi, 02h
                            jne 00007F568D10D534h
                            mov eax, dword ptr [10003150h]
                            test eax, eax
                            je 00007F568D10D51Bh
                            push edi
                            push esi
                            push ebx
                            call eax
                            test eax, eax
                            je 00007F568D10D51Eh
                            push edi
                            push esi
                            push ebx
                            call 00007F568D10D42Ah
                            test eax, eax
                            jne 00007F568D10D516h
                            xor eax, eax
                            jmp 00007F568D10D560h
                            push edi
                            push esi
                            push ebx
                            call 00007F568D10D2DCh
                            cmp esi, 01h
                            mov dword ptr [ebp+0Ch], eax
                            jne 00007F568D10D51Eh
                            test eax, eax
                            jne 00007F568D10D549h
                            push edi
                            push eax
                            push ebx
                            call 00007F568D10D406h
                            test esi, esi
                            je 00007F568D10D517h
                            cmp esi, 03h
                            jne 00007F568D10D538h
                            push edi
                            push esi
                            push ebx
                            call 00007F568D10D3F5h
                            test eax, eax
                            jne 00007F568D10D515h
                            and dword ptr [ebp+0Ch], eax
                            cmp dword ptr [ebp+0Ch], 00000000h
                            je 00007F568D10D523h
                            mov eax, dword ptr [10003150h]
                            test eax, eax
                            je 00007F568D10D51Ah
                            push edi
                            push esi
                            push ebx
                            call eax
                            mov dword ptr [ebp+0Ch], eax
                            mov eax, dword ptr [ebp+0Ch]
                            pop edi
                            pop esi
                            pop ebx
                            pop ebp
                            retn 000Ch
                            jmp dword ptr [10002028h]
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            Programming Language:
                            • [ C ] VS98 (6.0) build 8168
                            • [C++] VS98 (6.0) build 8168
                            • [RES] VS98 (6.0) cvtres build 1720
                            • [LNK] VS98 (6.0) imp/exp build 8168
                            NameVirtual AddressVirtual Size Is in Section
                            IMAGE_DIRECTORY_ENTRY_EXPORT0x21900x48.rdata
                            IMAGE_DIRECTORY_ENTRY_IMPORT0x203c0x3c.rdata
                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x40000x500060.rsrc
                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x5050000x5c.reloc
                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IAT0x20000x3c.rdata
                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                            .text0x10000x28c0x10008de9a2cb31e4c74bd008b871d14bfafcFalse0.13037109375data1.4429971244731552IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                            .rdata0x20000x1d80x10003dd394f95ab218593f2bc8eb65184db4False0.072509765625data0.7346018133622799IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .data0x30000x1540x1000fe5022c5b5d015ad38b2b77fc437a5cbFalse0.016845703125Matlab v4 mat-file (little endian) C:\%s\%s, numeric, rows 0, columns 00.085238686413312IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            .rsrc0x40000x5000600x501000a2cdf0a4e5c2bddc547d0bad891a82adunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .reloc0x5050000x2ac0x1000620f0b67a91f7f74151bc5be745b7110False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                            NameRVASizeTypeLanguageCountryZLIB Complexity
                            W0x40600x500000dataEnglishUnited States0.8770952224731445
                            DLLImport
                            KERNEL32.dllCloseHandle, WriteFile, CreateFileA, SizeofResource, LockResource, LoadResource, FindResourceA, CreateProcessA
                            MSVCRT.dllfree, _initterm, malloc, _adjust_fdiv, sprintf
                            NameOrdinalAddress
                            PlayGame10x10001114
                            Language of compilation systemCountry where language is spokenMap
                            EnglishUnited States
                            TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                            2025-01-14T22:42:27.096177+01002024291ET MALWARE Possible WannaCry DNS Lookup 11192.168.2.7512331.1.1.153UDP
                            2025-01-14T22:42:27.641168+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.749744104.16.167.22880TCP
                            2025-01-14T22:42:27.641168+01002024298ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 11192.168.2.749744104.16.167.22880TCP
                            2025-01-14T22:42:27.641168+01002024299ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 21192.168.2.749744104.16.167.22880TCP
                            2025-01-14T22:42:27.641168+01002024301ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 41192.168.2.749744104.16.167.22880TCP
                            2025-01-14T22:42:27.641168+01002024302ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 51192.168.2.749744104.16.167.22880TCP
                            2025-01-14T22:42:27.642828+01002031515ET MALWARE Known Sinkhole Response Kryptos Logic3104.16.167.22880192.168.2.749744TCP
                            2025-01-14T22:42:29.958569+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.749759104.16.167.22880TCP
                            2025-01-14T22:42:29.958569+01002024298ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 11192.168.2.749759104.16.167.22880TCP
                            2025-01-14T22:42:29.958569+01002024299ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 21192.168.2.749759104.16.167.22880TCP
                            2025-01-14T22:42:29.958569+01002024301ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 41192.168.2.749759104.16.167.22880TCP
                            2025-01-14T22:42:29.958569+01002024302ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 51192.168.2.749759104.16.167.22880TCP
                            2025-01-14T22:42:29.967249+01002031515ET MALWARE Known Sinkhole Response Kryptos Logic3104.16.167.22880192.168.2.749759TCP
                            TimestampSource PortDest PortSource IPDest IP
                            Jan 14, 2025 22:42:27.157691002 CET4974480192.168.2.7104.16.167.228
                            Jan 14, 2025 22:42:27.162442923 CET8049744104.16.167.228192.168.2.7
                            Jan 14, 2025 22:42:27.162511110 CET4974480192.168.2.7104.16.167.228
                            Jan 14, 2025 22:42:27.163461924 CET4974480192.168.2.7104.16.167.228
                            Jan 14, 2025 22:42:27.168245077 CET8049744104.16.167.228192.168.2.7
                            Jan 14, 2025 22:42:27.640986919 CET8049744104.16.167.228192.168.2.7
                            Jan 14, 2025 22:42:27.641168118 CET4974480192.168.2.7104.16.167.228
                            Jan 14, 2025 22:42:27.641168118 CET4974480192.168.2.7104.16.167.228
                            Jan 14, 2025 22:42:27.642827988 CET8049744104.16.167.228192.168.2.7
                            Jan 14, 2025 22:42:27.643347025 CET4974480192.168.2.7104.16.167.228
                            Jan 14, 2025 22:42:27.645986080 CET8049744104.16.167.228192.168.2.7
                            Jan 14, 2025 22:42:29.473299026 CET4975980192.168.2.7104.16.167.228
                            Jan 14, 2025 22:42:29.478096962 CET8049759104.16.167.228192.168.2.7
                            Jan 14, 2025 22:42:29.478166103 CET4975980192.168.2.7104.16.167.228
                            Jan 14, 2025 22:42:29.478554964 CET4975980192.168.2.7104.16.167.228
                            Jan 14, 2025 22:42:29.483299971 CET8049759104.16.167.228192.168.2.7
                            Jan 14, 2025 22:42:29.957840919 CET8049759104.16.167.228192.168.2.7
                            Jan 14, 2025 22:42:29.958163023 CET8049759104.16.167.228192.168.2.7
                            Jan 14, 2025 22:42:29.958569050 CET4975980192.168.2.7104.16.167.228
                            Jan 14, 2025 22:42:29.958569050 CET4975980192.168.2.7104.16.167.228
                            Jan 14, 2025 22:42:29.962184906 CET4975980192.168.2.7104.16.167.228
                            Jan 14, 2025 22:42:29.967248917 CET8049759104.16.167.228192.168.2.7
                            TimestampSource PortDest PortSource IPDest IP
                            Jan 14, 2025 22:42:27.096177101 CET5123353192.168.2.71.1.1.1
                            Jan 14, 2025 22:42:27.106957912 CET53512331.1.1.1192.168.2.7
                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                            Jan 14, 2025 22:42:27.096177101 CET192.168.2.71.1.1.10xc48cStandard query (0)www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.comA (IP address)IN (0x0001)false
                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                            Jan 14, 2025 22:42:19.496128082 CET1.1.1.1192.168.2.70x496No error (0)shed.dual-low.s-part-0017.t-0009.t-msedge.nets-part-0017.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
                            Jan 14, 2025 22:42:19.496128082 CET1.1.1.1192.168.2.70x496No error (0)s-part-0017.t-0009.t-msedge.net13.107.246.45A (IP address)IN (0x0001)false
                            Jan 14, 2025 22:42:27.106957912 CET1.1.1.1192.168.2.70xc48cNo error (0)www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com104.16.167.228A (IP address)IN (0x0001)false
                            Jan 14, 2025 22:42:27.106957912 CET1.1.1.1192.168.2.70xc48cNo error (0)www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com104.16.166.228A (IP address)IN (0x0001)false
                            • www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            0192.168.2.749744104.16.167.228807888C:\Windows\mssecsvc.exe
                            TimestampBytes transferredDirectionData
                            Jan 14, 2025 22:42:27.163461924 CET100OUTGET / HTTP/1.1
                            Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                            Cache-Control: no-cache
                            Jan 14, 2025 22:42:27.640986919 CET778INHTTP/1.1 200 OK
                            Date: Tue, 14 Jan 2025 21:42:27 GMT
                            Content-Type: text/html
                            Content-Length: 607
                            Connection: close
                            Server: cloudflare
                            CF-RAY: 9020cbc6687f8c7e-EWR
                            Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f [TRUNCATED]
                            Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            1192.168.2.749759104.16.167.228808024C:\Windows\mssecsvc.exe
                            TimestampBytes transferredDirectionData
                            Jan 14, 2025 22:42:29.478554964 CET100OUTGET / HTTP/1.1
                            Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                            Cache-Control: no-cache
                            Jan 14, 2025 22:42:29.957840919 CET778INHTTP/1.1 200 OK
                            Date: Tue, 14 Jan 2025 21:42:29 GMT
                            Content-Type: text/html
                            Content-Length: 607
                            Connection: close
                            Server: cloudflare
                            CF-RAY: 9020cbd4dc7a1871-EWR
                            Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 53 69 6e 6b 68 6f 6c 65 64 20 62 79 20 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 72 79 70 74 6f 73 20 4c 6f 67 69 63 20 53 69 6e 6b 68 6f 6c 65 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 73 74 61 74 69 63 2e 6b 72 79 70 74 6f 73 6c 6f 67 69 63 73 69 6e 6b 68 6f 6c 65 2e 63 6f 6d 2f 73 74 79 6c 65 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 2f 3e 3c 2f [TRUNCATED]
                            Data Ascii: <!DOCTYPE html><html lang="en-us" class="no-js"><head><meta charset="utf-8"><title>Sinkholed by Kryptos Logic</title><meta name="description" content="Kryptos Logic Sinkhole"><meta name="viewport" content="width=device-width, initial-scale=1.0"><link href="//static.kryptoslogicsinkhole.com/style.css" rel="stylesheet" type="text/css"/></head><body class="flat"><div class="content"><div class="content-box"><div class="big-content"><div class="clear"></div></div><h1>Sinkholed!</h1><p>This domain has been sinkholed by <a href="https://www.kryptoslogic.com">Kryptos Logic</a>.</p></div></div></body></html>


                            Click to jump to process

                            Click to jump to process

                            Click to jump to process

                            Target ID:0
                            Start time:16:42:25
                            Start date:14/01/2025
                            Path:C:\Windows\System32\loaddll32.exe
                            Wow64 process (32bit):true
                            Commandline:loaddll32.exe "C:\Users\user\Desktop\hzQNazOx3Z.dll"
                            Imagebase:0x630000
                            File size:126'464 bytes
                            MD5 hash:51E6071F9CBA48E79F10C84515AAE618
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:1
                            Start time:16:42:25
                            Start date:14/01/2025
                            Path:C:\Windows\System32\conhost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Imagebase:0x7ff75da10000
                            File size:862'208 bytes
                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:2
                            Start time:16:42:25
                            Start date:14/01/2025
                            Path:C:\Windows\SysWOW64\cmd.exe
                            Wow64 process (32bit):true
                            Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\hzQNazOx3Z.dll",#1
                            Imagebase:0x410000
                            File size:236'544 bytes
                            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:3
                            Start time:16:42:25
                            Start date:14/01/2025
                            Path:C:\Windows\SysWOW64\rundll32.exe
                            Wow64 process (32bit):true
                            Commandline:rundll32.exe C:\Users\user\Desktop\hzQNazOx3Z.dll,PlayGame
                            Imagebase:0xb00000
                            File size:61'440 bytes
                            MD5 hash:889B99C52A60DD49227C5E485A016679
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:4
                            Start time:16:42:25
                            Start date:14/01/2025
                            Path:C:\Windows\SysWOW64\rundll32.exe
                            Wow64 process (32bit):true
                            Commandline:rundll32.exe "C:\Users\user\Desktop\hzQNazOx3Z.dll",#1
                            Imagebase:0xb00000
                            File size:61'440 bytes
                            MD5 hash:889B99C52A60DD49227C5E485A016679
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:6
                            Start time:16:42:25
                            Start date:14/01/2025
                            Path:C:\Windows\mssecsvc.exe
                            Wow64 process (32bit):true
                            Commandline:C:\WINDOWS\mssecsvc.exe
                            Imagebase:0x400000
                            File size:3'723'264 bytes
                            MD5 hash:F107A717F76F4F910AE9CB4DC5290594
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000000.1397411031.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000002.1411463143.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000000.1397563865.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                            • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000006.00000000.1397563865.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                            • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000002.1411628374.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                            • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000006.00000002.1411628374.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                            Reputation:low
                            Has exited:true

                            Target ID:8
                            Start time:16:42:28
                            Start date:14/01/2025
                            Path:C:\Windows\SysWOW64\rundll32.exe
                            Wow64 process (32bit):true
                            Commandline:rundll32.exe "C:\Users\user\Desktop\hzQNazOx3Z.dll",PlayGame
                            Imagebase:0xc60000
                            File size:61'440 bytes
                            MD5 hash:889B99C52A60DD49227C5E485A016679
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:9
                            Start time:16:42:28
                            Start date:14/01/2025
                            Path:C:\Windows\mssecsvc.exe
                            Wow64 process (32bit):true
                            Commandline:C:\WINDOWS\mssecsvc.exe
                            Imagebase:0x400000
                            File size:3'723'264 bytes
                            MD5 hash:F107A717F76F4F910AE9CB4DC5290594
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000009.00000000.1427895423.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000009.00000002.1434677406.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000009.00000002.1435202859.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                            • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000009.00000002.1435202859.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                            • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000009.00000000.1428057212.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                            • Rule: wanna_cry_ransomware_generic, Description: detects wannacry ransomware on disk and in virtual page, Source: 00000009.00000000.1428057212.0000000000710000.00000002.00000001.01000000.00000004.sdmp, Author: us-cert code analysis team
                            Reputation:low
                            Has exited:true

                            Reset < >

                              Execution Graph

                              Execution Coverage:36.3%
                              Dynamic/Decrypted Code Coverage:0%
                              Signature Coverage:57.9%
                              Total number of Nodes:38
                              Total number of Limit Nodes:2

                              Callgraph

                              Control-flow Graph

                              APIs
                              Memory Dump Source
                              • Source File: 00000006.00000002.1411405790.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000006.00000002.1411365492.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000006.00000002.1411433210.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000006.00000002.1411463143.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000006.00000002.1411463143.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000006.00000002.1411523469.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000006.00000002.1411628374.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                              Yara matches
                              Similarity
                              • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                              • String ID:
                              • API String ID: 801014965-0
                              • Opcode ID: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                              • Instruction ID: f220c78e044b43db95b39954543cb8470338bddc8e57b6bf74c51ec52977e19a
                              • Opcode Fuzzy Hash: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                              • Instruction Fuzzy Hash: AF415E71800348EFDB24DFA4ED45AAA7BB8FB09720F20413BE451A72D2D7786841CB59

                              Control-flow Graph

                              APIs
                              • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0040817B
                              • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,84000000,00000000), ref: 00408194
                              • InternetCloseHandle.WININET(00000000), ref: 004081A7
                              • InternetCloseHandle.WININET(00000000), ref: 004081AB
                                • Part of subcall function 00408090: GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                • Part of subcall function 00408090: __p___argc.MSVCRT ref: 004080A5
                              • InternetCloseHandle.WININET(00000000), ref: 004081BC
                              • InternetCloseHandle.WININET(00000000), ref: 004081BF
                              Strings
                              • http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com, xrefs: 0040814A
                              Memory Dump Source
                              • Source File: 00000006.00000002.1411405790.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000006.00000002.1411365492.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000006.00000002.1411433210.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000006.00000002.1411463143.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000006.00000002.1411463143.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000006.00000002.1411523469.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000006.00000002.1411628374.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                              Yara matches
                              Similarity
                              • API ID: Internet$CloseHandle$Open$FileModuleName__p___argc
                              • String ID: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
                              • API String ID: 2010709392-2942426231
                              • Opcode ID: ec133b43de4331460eff2a0b2c8cd404513b79e1c5a5deea9d12a904249ad51c
                              • Instruction ID: e18cae5e57e59901b1837d80ae8654563a660de2be6bc36b6f573cb3739cdf66
                              • Opcode Fuzzy Hash: ec133b43de4331460eff2a0b2c8cd404513b79e1c5a5deea9d12a904249ad51c
                              • Instruction Fuzzy Hash: AB0175719043206EE310EF749C01BAF7BE9EF85750F01042FF984E6280EAB5981487A7

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 26 407ce0-407cfb GetModuleHandleW 27 407d01-407d43 GetProcAddress * 4 26->27 28 407f08-407f14 26->28 27->28 29 407d49-407d4f 27->29 29->28 30 407d55-407d5b 29->30 30->28 31 407d61-407d63 30->31 31->28 32 407d69-407d7e FindResourceA 31->32 32->28 33 407d84-407d8e LoadResource 32->33 33->28 34 407d94-407da1 LockResource 33->34 34->28 35 407da7-407db3 SizeofResource 34->35 35->28 36 407db9-407e4e sprintf * 2 MoveFileExA 35->36 36->28 38 407e54-407ef0 36->38 38->28 42 407ef2-407f01 38->42 42->28
                              APIs
                              • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,6FBD0EF0,?,00000000), ref: 00407CEF
                              • GetProcAddress.KERNEL32(00000000,CreateProcessA), ref: 00407D0D
                              • GetProcAddress.KERNEL32(00000000,CreateFileA), ref: 00407D1A
                              • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00407D27
                              • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00407D34
                              • FindResourceA.KERNEL32(00000000,00000727,0043137C), ref: 00407D74
                              • LoadResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407D86
                              • LockResource.KERNEL32(00000000,?,00000000), ref: 00407D95
                              • SizeofResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407DA9
                              • sprintf.MSVCRT ref: 00407E01
                              • sprintf.MSVCRT ref: 00407E18
                              • MoveFileExA.KERNEL32(?,?,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 00407E2C
                              Strings
                              Memory Dump Source
                              • Source File: 00000006.00000002.1411405790.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000006.00000002.1411365492.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000006.00000002.1411433210.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000006.00000002.1411463143.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000006.00000002.1411463143.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000006.00000002.1411523469.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000006.00000002.1411628374.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                              Yara matches
                              Similarity
                              • API ID: AddressProcResource$sprintf$FileFindHandleLoadLockModuleMoveSizeof
                              • String ID: /i$C:\%s\%s$C:\%s\qeriuwjhrf$CloseHandle$CreateFileA$CreateProcessA$D$WINDOWS$WriteFile$kernel32.dll$tasksche.exe
                              • API String ID: 4072214828-1507730452
                              • Opcode ID: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                              • Instruction ID: 13a48b3e7e70fc1f7524b3ea2ca00aec236584d0bbebcf852995d03268f4a9c8
                              • Opcode Fuzzy Hash: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                              • Instruction Fuzzy Hash: B15197715043496FE7109F74DC84AAB7B98EB88354F14493EF651A32E0DA7898088BAA

                              Control-flow Graph

                              APIs
                              • sprintf.MSVCRT ref: 00407C56
                              • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00407C68
                              • CreateServiceA.ADVAPI32(00000000,mssecsvc2.0,Microsoft Security Center (2.0) Service,000F01FF,00000010,00000002,00000001,?,00000000,00000000,00000000,00000000,00000000,6FBD0EF0,00000000), ref: 00407C9B
                              • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00407CB2
                              • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CB9
                              • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CBC
                              Strings
                              Memory Dump Source
                              • Source File: 00000006.00000002.1411405790.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000006.00000002.1411365492.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000006.00000002.1411433210.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000006.00000002.1411463143.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000006.00000002.1411463143.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000006.00000002.1411523469.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000006.00000002.1411628374.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                              Yara matches
                              Similarity
                              • API ID: Service$CloseHandle$CreateManagerOpenStartsprintf
                              • String ID: %s -m security$Microsoft Security Center (2.0) Service$mssecsvc2.0
                              • API String ID: 3340711343-4063779371
                              • Opcode ID: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                              • Instruction ID: 2288e5cc66680fabefb91112cf05624c6df81315eb9d87428618c258e2ee617f
                              • Opcode Fuzzy Hash: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                              • Instruction Fuzzy Hash: AD01D1717C43043BF2305B149D8BFEB3658AB84F01F500025FB44B92D0DAF9A81491AF

                              Control-flow Graph

                              APIs
                              • GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                              • __p___argc.MSVCRT ref: 004080A5
                              • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,00000000,?,004081B2), ref: 004080C3
                              • OpenServiceA.ADVAPI32(00000000,mssecsvc2.0,000F01FF,6FBD0EF0,00000000,?,004081B2), ref: 004080DC
                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,004081B2), ref: 004080FA
                              • CloseServiceHandle.ADVAPI32(00000000,?,004081B2), ref: 004080FD
                              • StartServiceCtrlDispatcherA.ADVAPI32(?,?,?), ref: 00408126
                              Strings
                              Memory Dump Source
                              • Source File: 00000006.00000002.1411405790.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000006.00000002.1411365492.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000006.00000002.1411433210.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000006.00000002.1411463143.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000006.00000002.1411463143.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000006.00000002.1411523469.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000006.00000002.1411628374.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_6_2_400000_mssecsvc.jbxd
                              Yara matches
                              Similarity
                              • API ID: Service$CloseHandleOpen$CtrlDispatcherFileManagerModuleNameStart__p___argc
                              • String ID: mssecsvc2.0
                              • API String ID: 4274534310-3729025388
                              • Opcode ID: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                              • Instruction ID: 0eddf8d8cc97b5ba853ece0b0f9ce4fe0dc31dc3004373c78c05f92e851b2f94
                              • Opcode Fuzzy Hash: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                              • Instruction Fuzzy Hash: 4A014775640315BBE3117F149E4AF6F3AA4EF80B19F404429F544762D2DFB888188AAF