Click to jump to signature section
Source: 00000003.00000003.1591519881.0000000002B70000.00000004.00001000.00020000.00000000.sdmp | Malware Configuration Extractor: Ursnif {"RSA Public Key": "ScCitKVnthsrIejolA7zuBWvwII2di/DH3GlyTtkQAl5+NYn11P8hoApgIAx8QgiEaRicK3ETZq3j2ua44XjJevEH0XzzTqZAT3wkYswDxrBkgZMCwo6YXkhXitvoh3eARDtRDEkQsoLHZ9GnSskgPPZhcXZcW5DEVGUxmtbXgDaTXEEASp94TxsSTq8LcHFcoUD/3qCUIKISKD7sIV0hgpJQ8kx5Fr/zREoX54YDyuxKi/xJ3SBIavWF9UPU+YwvxpBDYMFrMsKJrjGUlpoQZehisJjttb1cTtggelEGnFr5O2GXefQUuwrSizDeVnMRSAHdds+AiqlPxEl1nFzSfnHhHtw7Ql8JtPTws7Z1Ho=", "c2_domain": ["checklist.skype.com", "5.44.43.17", "31.41.44.108", "62.173.138.213", "109.248.11.174"], "botnet": "7714", "server": "50", "serpent_key": "lk8hY4nisKQzZKXE", "sleep_time": "1", "CONF_TIMEOUT": "20", "SetWaitableTimer_value": "0"} |
Source: \Device\Mup\46.8.19.120\Agenzia\server.exe | Code function: 3_2_02B81508 CryptAcquireContextW,memcpy,CryptImportKey,CryptSetKeyParam,memcpy,CryptEncrypt,GetLastError,GetLastError,CryptDestroyKey,GetLastError,CryptReleaseContext,GetLastError, | 3_2_02B81508 |
Source: \Device\Mup\46.8.19.120\Agenzia\server.exe | Code function: 5_2_02BE1508 CryptAcquireContextW,memcpy,CryptImportKey,CryptSetKeyParam,memcpy,CryptEncrypt,GetLastError,GetLastError,CryptDestroyKey,GetLastError,CryptReleaseContext,GetLastError, | 5_2_02BE1508 |
Source: unknown | TCP traffic detected without corresponding DNS query: 192.229.221.95 |
Source: unknown | TCP traffic detected without corresponding DNS query: 192.229.221.95 |
Source: unknown | TCP traffic detected without corresponding DNS query: 192.229.221.95 |
Source: unknown | TCP traffic detected without corresponding DNS query: 192.229.221.95 |
Source: unknown | TCP traffic detected without corresponding DNS query: 192.229.221.95 |
Source: unknown | TCP traffic detected without corresponding DNS query: 192.229.221.95 |
Source: unknown | TCP traffic detected without corresponding DNS query: 192.229.221.95 |
Source: unknown | TCP traffic detected without corresponding DNS query: 5.44.43.17 |
Source: unknown | TCP traffic detected without corresponding DNS query: 5.44.43.17 |
Source: unknown | TCP traffic detected without corresponding DNS query: 5.44.43.17 |
Source: unknown | TCP traffic detected without corresponding DNS query: 5.44.43.17 |
Source: unknown | TCP traffic detected without corresponding DNS query: 5.44.43.17 |
Source: unknown | UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown | UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: server.exe, 00000003.00000002.2850791743.0000000002D87000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://5.44.43.17/ |
Source: server.exe, 00000003.00000002.2850791743.0000000002D87000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://5.44.43.17/b2c5-fe065076e0a1 |
Source: server.exe, 00000003.00000002.2850791743.0000000002DA6000.00000004.00000020.00020000.00000000.sdmp, server.exe, 00000003.00000002.2850791743.0000000002DBB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://5.44.43.17/drew/ZSasVN0fLMcptc05TEVCa/mWgPW7Eo_2Fhz8Y6/Fz7ovUnPPN6ieZv/4FY_2FkRwgHKarRxmu/cK8 |
Source: server.exe, 00000003.00000002.2850791743.0000000002DA6000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://5.44.43.17/~ |
Source: server.exe, 00000003.00000002.2850791743.0000000002DA6000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://checklist.skype.com/drew/XaKJ910OZ6OkzOiEp1j_2/BGdUIBHp_2FM8Z2X/fEGunvRWGFrRGJ9/FM827N5CFAo37 |
Source: server.exe, 00000005.00000002.2850719337.0000000002CB4000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://checklist.skype.com/drew/p8a6EJ5vt4U/NrIUl_2BZrXy6_/2BoMtuVkg7FYSQnXs7vFZ/T_2BtMhNb_2F_2Bq/Vr |
Source: Yara match | File source: 00000005.00000002.2851808327.0000000005458000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000003.00000003.2478797463.0000000005588000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000003.00000002.2851937676.0000000005588000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: server.exe PID: 6612, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: server.exe PID: 6832, type: MEMORYSTR |
Source: Yara match | File source: 00000005.00000002.2851808327.0000000005458000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000003.00000003.2478797463.0000000005588000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000003.00000002.2851937676.0000000005588000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: server.exe PID: 6612, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: server.exe PID: 6832, type: MEMORYSTR |
Source: \Device\Mup\46.8.19.120\Agenzia\server.exe | Code function: 3_2_02B81508 CryptAcquireContextW,memcpy,CryptImportKey,CryptSetKeyParam,memcpy,CryptEncrypt,GetLastError,GetLastError,CryptDestroyKey,GetLastError,CryptReleaseContext,GetLastError, | 3_2_02B81508 |
Source: \Device\Mup\46.8.19.120\Agenzia\server.exe | Code function: 5_2_02BE1508 CryptAcquireContextW,memcpy,CryptImportKey,CryptSetKeyParam,memcpy,CryptEncrypt,GetLastError,GetLastError,CryptDestroyKey,GetLastError,CryptReleaseContext,GetLastError, | 5_2_02BE1508 |
Source: 00000005.00000002.2851808327.0000000005458000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Gozi_fd494041 Author: unknown |
Source: 00000005.00000002.2851808327.0000000005458000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown |
Source: 00000003.00000003.2478797463.0000000005588000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Gozi_fd494041 Author: unknown |
Source: 00000003.00000003.2478797463.0000000005588000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown |
Source: 00000005.00000002.2850616986.0000000002C51000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown |
Source: 00000003.00000002.2850703923.0000000002D4C000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown |
Source: 00000003.00000002.2851937676.0000000005588000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Gozi_fd494041 Author: unknown |
Source: 00000003.00000002.2851937676.0000000005588000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown |
Source: 00000003.00000002.2849985060.0000000002B60000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown |
Source: Process Memory Space: server.exe PID: 6612, type: MEMORYSTR | Matched rule: Windows_Trojan_Gozi_fd494041 Author: unknown |
Source: Process Memory Space: server.exe PID: 6612, type: MEMORYSTR | Matched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown |
Source: Process Memory Space: server.exe PID: 6832, type: MEMORYSTR | Matched rule: Windows_Trojan_Gozi_fd494041 Author: unknown |
Source: Process Memory Space: server.exe PID: 6832, type: MEMORYSTR | Matched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown |
Source: \Device\Mup\46.8.19.120\Agenzia\server.exe | WMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::GetStringValue |
Source: \Device\Mup\46.8.19.120\Agenzia\server.exe | WMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetDWORDValue |
Source: \Device\Mup\46.8.19.120\Agenzia\server.exe | WMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue |
Source: \Device\Mup\46.8.19.120\Agenzia\server.exe | WMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue |
Source: \Device\Mup\46.8.19.120\Agenzia\server.exe | WMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::GetStringValue |
Source: \Device\Mup\46.8.19.120\Agenzia\server.exe | WMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetDWORDValue |
Source: \Device\Mup\46.8.19.120\Agenzia\server.exe | WMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue |
Source: \Device\Mup\46.8.19.120\Agenzia\server.exe | WMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue |
Source: \Device\Mup\46.8.19.120\Agenzia\server.exe | WMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetDWORDValue |
Source: \Device\Mup\46.8.19.120\Agenzia\server.exe | WMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue |
Source: \Device\Mup\46.8.19.120\Agenzia\server.exe | WMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue |
Source: \Device\Mup\46.8.19.120\Agenzia\server.exe | WMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetDWORDValue |
Source: \Device\Mup\46.8.19.120\Agenzia\server.exe | WMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue |
Source: \Device\Mup\46.8.19.120\Agenzia\server.exe | WMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue |
Source: marzo.txt.url, type: SAMPLE | Matched rule: Methodology_Suspicious_Shortcut_SMB_URL author = @itsreallynick (Nick Carr), @QW5kcmV3 (Andrew Thompson), description = Detects remote SMB path for .URL persistence, score = 27.09.2019, sample = e0bef7497fcb284edb0c65b59d511830, reference = https://twitter.com/cglyer/status/1176184798248919044 |
Source: 00000005.00000002.2851808327.0000000005458000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23 |
Source: 00000005.00000002.2851808327.0000000005458000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23 |
Source: 00000003.00000003.2478797463.0000000005588000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23 |
Source: 00000003.00000003.2478797463.0000000005588000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23 |
Source: 00000005.00000002.2850616986.0000000002C51000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12 |
Source: 00000003.00000002.2850703923.0000000002D4C000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12 |
Source: 00000003.00000002.2851937676.0000000005588000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23 |
Source: 00000003.00000002.2851937676.0000000005588000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23 |
Source: 00000003.00000002.2849985060.0000000002B60000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23 |
Source: Process Memory Space: server.exe PID: 6612, type: MEMORYSTR | Matched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23 |
Source: Process Memory Space: server.exe PID: 6612, type: MEMORYSTR | Matched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23 |
Source: Process Memory Space: server.exe PID: 6832, type: MEMORYSTR | Matched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23 |
Source: Process Memory Space: server.exe PID: 6832, type: MEMORYSTR | Matched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23 |
Source: \Device\Mup\46.8.19.120\Agenzia\server.exe | Code function: 3_2_02B816DF | 3_2_02B816DF |
Source: \Device\Mup\46.8.19.120\Agenzia\server.exe | Code function: 3_2_02B81D8A | 3_2_02B81D8A |
Source: \Device\Mup\46.8.19.120\Agenzia\server.exe | Code function: 3_2_02B8832C | 3_2_02B8832C |
Source: \Device\Mup\46.8.19.120\Agenzia\server.exe | Code function: 5_2_02BE16DF | 5_2_02BE16DF |
Source: \Device\Mup\46.8.19.120\Agenzia\server.exe | Code function: 5_2_02BE1D8A | 5_2_02BE1D8A |
Source: \Device\Mup\46.8.19.120\Agenzia\server.exe | Code function: 5_2_02BE832C | 5_2_02BE832C |
Source: \Device\Mup\46.8.19.120\Agenzia\server.exe | Code function: 3_2_02B8421F NtOpenProcess,NtOpenProcessToken,NtQueryInformationToken,NtQueryInformationToken,NtQueryInformationToken,memcpy,NtClose,NtClose, | 3_2_02B8421F |
Source: \Device\Mup\46.8.19.120\Agenzia\server.exe | Code function: 3_2_02B88551 NtQueryVirtualMemory, | 3_2_02B88551 |
Source: \Device\Mup\46.8.19.120\Agenzia\server.exe | Code function: 5_2_02BE421F NtOpenProcess,NtOpenProcessToken,NtQueryInformationToken,NtQueryInformationToken,memcpy,NtClose,NtClose, | 5_2_02BE421F |
Source: \Device\Mup\46.8.19.120\Agenzia\server.exe | Code function: 3_2_02B87F30 push ecx; ret | 3_2_02B87F39 |
Source: \Device\Mup\46.8.19.120\Agenzia\server.exe | Code function: 3_2_02B8831B push ecx; ret | 3_2_02B8832B |
Source: \Device\Mup\46.8.19.120\Agenzia\server.exe | Code function: 3_2_02D54EDB push 8B8751D0h; retf | 3_2_02D54EE0 |
Source: \Device\Mup\46.8.19.120\Agenzia\server.exe | Code function: 3_2_02D5A167 push edi; ret | 3_2_02D5A168 |
Source: \Device\Mup\46.8.19.120\Agenzia\server.exe | Code function: 3_2_02D4FC2D pushad ; ret | 3_2_02D4FC81 |
Source: \Device\Mup\46.8.19.120\Agenzia\server.exe | Code function: 5_2_02BE7F30 push ecx; ret | 5_2_02BE7F39 |
Source: \Device\Mup\46.8.19.120\Agenzia\server.exe | Code function: 5_2_02BE831B push ecx; ret | 5_2_02BE832B |
Source: \Device\Mup\46.8.19.120\Agenzia\server.exe | Code function: 5_2_02C59883 push 8B8751D0h; retf | 5_2_02C59888 |
Source: \Device\Mup\46.8.19.120\Agenzia\server.exe | Code function: 5_2_02C545D5 pushad ; ret | 5_2_02C54629 |
Source: \Device\Mup\46.8.19.120\Agenzia\server.exe | Code function: 5_2_02C5EB0F push edi; ret | 5_2_02C5EB10 |
Source: Yara match | File source: 00000005.00000002.2851808327.0000000005458000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000003.00000003.2478797463.0000000005588000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000003.00000002.2851937676.0000000005588000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: server.exe PID: 6612, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: server.exe PID: 6832, type: MEMORYSTR |
Source: C:\Program Files\Microsoft Office\root\Office16\OUTLOOK.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\root\Office16\OUTLOOK.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\root\Office16\OUTLOOK.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\root\Office16\OUTLOOK.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\root\Office16\OUTLOOK.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\root\Office16\OUTLOOK.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\root\Office16\OUTLOOK.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\root\Office16\OUTLOOK.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: \Device\Mup\46.8.19.120\Agenzia\server.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: \Device\Mup\46.8.19.120\Agenzia\server.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: \Device\Mup\46.8.19.120\Agenzia\server.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: \Device\Mup\46.8.19.120\Agenzia\server.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: \Device\Mup\46.8.19.120\Agenzia\server.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: \Device\Mup\46.8.19.120\Agenzia\server.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: \Device\Mup\46.8.19.120\Agenzia\server.exe TID: 6632 | Thread sleep count: 75 > 30 | Jump to behavior |
Source: \Device\Mup\46.8.19.120\Agenzia\server.exe TID: 6632 | Thread sleep count: 313 > 30 | Jump to behavior |
Source: \Device\Mup\46.8.19.120\Agenzia\server.exe TID: 6632 | Thread sleep count: 268 > 30 | Jump to behavior |
Source: \Device\Mup\46.8.19.120\Agenzia\server.exe TID: 6632 | Thread sleep count: 36 > 30 | Jump to behavior |
Source: \Device\Mup\46.8.19.120\Agenzia\server.exe TID: 6852 | Thread sleep count: 40 > 30 | Jump to behavior |
Source: \Device\Mup\46.8.19.120\Agenzia\server.exe TID: 6852 | Thread sleep count: 472 > 30 | Jump to behavior |
Source: \Device\Mup\46.8.19.120\Agenzia\server.exe TID: 6852 | Thread sleep count: 47 > 30 | Jump to behavior |
Source: \Device\Mup\46.8.19.120\Agenzia\server.exe TID: 6852 | Thread sleep count: 97 > 30 | Jump to behavior |
Source: \Device\Mup\46.8.19.120\Agenzia\server.exe TID: 6852 | Thread sleep count: 39 > 30 | Jump to behavior |
Source: \Device\Mup\46.8.19.120\Agenzia\server.exe TID: 6852 | Thread sleep count: 40 > 30 | Jump to behavior |
Source: \Device\Mup\46.8.19.120\Agenzia\server.exe TID: 6852 | Thread sleep count: 601 > 30 | Jump to behavior |
Source: \Device\Mup\46.8.19.120\Agenzia\server.exe TID: 6852 | Thread sleep count: 210 > 30 | Jump to behavior |
Source: server.exe, 00000003.00000002.2850791743.0000000002D87000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAWX7 |
Source: server.exe, 00000003.00000002.2850791743.0000000002DA6000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW& |
Source: server.exe, 00000003.00000002.2850791743.0000000002DBB000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW |
Source: server.exe, 00000005.00000002.2850719337.0000000002C8D000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll |
Source: \Device\Mup\46.8.19.120\Agenzia\server.exe | Code function: 3_2_02B60D90 mov eax, dword ptr fs:[00000030h] | 3_2_02B60D90 |
Source: \Device\Mup\46.8.19.120\Agenzia\server.exe | Code function: 3_2_02B6092B mov eax, dword ptr fs:[00000030h] | 3_2_02B6092B |
Source: \Device\Mup\46.8.19.120\Agenzia\server.exe | Code function: 3_2_02D523B0 push dword ptr fs:[00000030h] | 3_2_02D523B0 |
Source: \Device\Mup\46.8.19.120\Agenzia\server.exe | Code function: 5_2_02C56D58 push dword ptr fs:[00000030h] | 5_2_02C56D58 |
Source: \Device\Mup\46.8.19.120\Agenzia\server.exe | Code function: 3_2_02B83BD3 RtlAllocateHeap,GetUserNameW,RtlAllocateHeap,GetUserNameW,HeapFree,GetComputerNameW,GetComputerNameW,RtlAllocateHeap,GetComputerNameW,HeapFree, | 3_2_02B83BD3 |
Source: Yara match | File source: 00000005.00000002.2851808327.0000000005458000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000003.00000003.2478797463.0000000005588000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000003.00000002.2851937676.0000000005588000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: server.exe PID: 6612, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: server.exe PID: 6832, type: MEMORYSTR |
Source: \Device\Mup\46.8.19.120\Agenzia\server.exe | File opened: \\46.8.19.120\Agenzia\server.exe | Jump to behavior |
Source: \Device\Mup\46.8.19.120\Agenzia\server.exe | File opened: \\46.8.19.120\Agenzia\server.exe | Jump to behavior |
Source: \Device\Mup\46.8.19.120\Agenzia\server.exe | File opened: \\46.8.19.120\Agenzia\server.exe | Jump to behavior |
Source: \Device\Mup\46.8.19.120\Agenzia\server.exe | File opened: \\46.8.19.120\SystemResources\server.exe.mun | Jump to behavior |
Source: \Device\Mup\46.8.19.120\Agenzia\server.exe | File opened: \\46.8.19.120\Agenzia\ | Jump to behavior |
Source: \Device\Mup\46.8.19.120\Agenzia\server.exe | File opened: \\46.8.19.120\Agenzia\ | Jump to behavior |
Source: \Device\Mup\46.8.19.120\Agenzia\server.exe | File opened: \\46.8.19.120\SystemResources\server.exe.mun | Jump to behavior |
Source: \Device\Mup\46.8.19.120\Agenzia\server.exe | File opened: \\46.8.19.120\Agenzia\ | Jump to behavior |
Source: \Device\Mup\46.8.19.120\Agenzia\server.exe | File opened: \\46.8.19.120\Agenzia\ | Jump to behavior |
Source: Yara match | File source: 00000005.00000002.2851808327.0000000005458000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000003.00000003.2478797463.0000000005588000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000003.00000002.2851937676.0000000005588000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: server.exe PID: 6612, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: server.exe PID: 6832, type: MEMORYSTR |