Analysis

Category Package Started Completed Duration Options Log
URL ie 2020-02-14 10:56:53 2020-02-14 11:00:15 202 seconds Show Options Show Log
route = inetsim
procdump = 1
2020-02-14 11:57:05,000 [root] INFO: Date set to: 02-14-20, time set to: 10:57:05, timeout set to: 150
2020-02-14 11:57:05,046 [root] DEBUG: Starting analyzer from: C:\xyvjuegpil
2020-02-14 11:57:05,046 [root] DEBUG: Storing results at: C:\YlAKBvlhhS
2020-02-14 11:57:05,046 [root] DEBUG: Pipe server name: \\.\PIPE\jUWvPdKs
2020-02-14 11:57:05,046 [root] DEBUG: No analysis package specified, trying to detect it automagically.
2020-02-14 11:57:05,046 [root] INFO: Automatically selected analysis package "ie"
2020-02-14 11:57:29,375 [root] DEBUG: Started auxiliary module Browser
2020-02-14 11:57:29,375 [root] DEBUG: Started auxiliary module Curtain
2020-02-14 11:57:29,375 [modules.auxiliary.digisig] DEBUG: Skipping authenticode validation, analysis is not a file.
2020-02-14 11:57:29,375 [root] DEBUG: Started auxiliary module DigiSig
2020-02-14 11:57:29,375 [root] DEBUG: Started auxiliary module Disguise
2020-02-14 11:57:29,375 [root] DEBUG: Started auxiliary module Human
2020-02-14 11:57:29,375 [root] DEBUG: Started auxiliary module Screenshots
2020-02-14 11:57:29,375 [root] DEBUG: Started auxiliary module Sysmon
2020-02-14 11:57:29,375 [root] DEBUG: Started auxiliary module Usage
2020-02-14 11:57:29,390 [root] INFO: Analyzer: Package modules.packages.ie does not specify a DLL option
2020-02-14 11:57:29,390 [root] INFO: Analyzer: Package modules.packages.ie does not specify a DLL_64 option
2020-02-14 11:57:29,421 [lib.api.process] INFO: Successfully executed process from path "C:\Program Files\Internet Explorer\iexplore.exe" with arguments ""beta.bitrader.no"" with pid 2844
2020-02-14 11:57:29,467 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 11:57:29,467 [lib.api.process] INFO: 32-bit DLL to inject is C:\xyvjuegpil\dll\mxEkukDK.dll, loader C:\xyvjuegpil\bin\jDogYGh.exe
2020-02-14 11:57:29,717 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\jUWvPdKs.
2020-02-14 11:57:29,717 [root] DEBUG: Loader: Injecting process 2844 (thread 2796) with C:\xyvjuegpil\dll\mxEkukDK.dll.
2020-02-14 11:57:29,717 [root] DEBUG: Process image base: 0x00E80000
2020-02-14 11:57:29,717 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xyvjuegpil\dll\mxEkukDK.dll.
2020-02-14 11:57:29,750 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 11:57:29,750 [root] DEBUG: Successfully injected DLL C:\xyvjuegpil\dll\mxEkukDK.dll.
2020-02-14 11:57:29,750 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2844
2020-02-14 11:57:32,030 [lib.api.process] INFO: Successfully resumed process with pid 2844
2020-02-14 11:57:32,030 [root] INFO: Added new process to list with pid: 2844
2020-02-14 11:57:32,030 [root] INFO: Enabled timeout enforce, running for the full timeout.
2020-02-14 11:57:35,342 [root] DEBUG: Terminate processes on terminate_event disabled.
2020-02-14 11:57:35,405 [root] DEBUG: Process dumps enabled.
2020-02-14 11:57:35,733 [root] DEBUG: RestoreHeaders: Restored original import table.
2020-02-14 11:57:35,733 [root] INFO: Disabling sleep skipping.
2020-02-14 11:57:35,733 [root] INFO: Disabling sleep skipping.
2020-02-14 11:57:35,733 [root] INFO: Disabling sleep skipping.
2020-02-14 11:57:35,937 [root] DEBUG: CAPE initialised: 32-bit monitor loaded in process 2844 at 0x6d010000, image base 0xe80000, stack from 0x1d2000-0x1e0000
2020-02-14 11:57:35,937 [root] INFO: Disabling sleep skipping.
2020-02-14 11:57:36,421 [root] DEBUG: Commandline: C:\Users\Rebecca\AppData\Local\Temp\"C:\Program Files\Internet Explorer\iexplore.exe" "beta.bitrader.no".
2020-02-14 11:57:36,483 [root] INFO: Monitor successfully loaded in process with pid 2844.
2020-02-14 11:57:36,500 [root] DEBUG: DLL unloaded from 0x77E50000.
2020-02-14 11:57:36,515 [root] DEBUG: DLL loaded at 0x75920000: C:\Windows\system32\CRYPTBASE (0xc000 bytes).
2020-02-14 11:57:36,592 [root] DEBUG: DLL loaded at 0x6EAF0000: C:\Windows\system32\api-ms-win-downlevel-shell32-l1-1-0 (0x4000 bytes).
2020-02-14 11:57:36,640 [root] DEBUG: DLL loaded at 0x77060000: C:\Windows\system32\shell32 (0xc4c000 bytes).
2020-02-14 11:57:36,717 [root] DEBUG: DLL loaded at 0x6EE80000: C:\Windows\system32\IEFRAME (0xd12000 bytes).
2020-02-14 11:57:36,717 [root] DEBUG: DLL loaded at 0x76020000: C:\Windows\system32\OLEAUT32 (0x91000 bytes).
2020-02-14 11:57:36,717 [root] DEBUG: DLL loaded at 0x73BA0000: C:\Windows\system32\WINHTTP (0x58000 bytes).
2020-02-14 11:57:36,733 [root] DEBUG: DLL loaded at 0x73780000: C:\Windows\system32\webio (0x50000 bytes).
2020-02-14 11:57:36,733 [root] DEBUG: DLL loaded at 0x74950000: C:\Windows\WinSxS\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d\comctl32 (0x19e000 bytes).
2020-02-14 11:57:37,000 [root] DEBUG: DLL loaded at 0x6D530000: C:\Program Files\Internet Explorer\IEShims (0x4b000 bytes).
2020-02-14 11:57:37,328 [root] DEBUG: DLL loaded at 0x765E0000: C:\Windows\system32\comdlg32 (0x7b000 bytes).
2020-02-14 11:57:37,390 [root] DEBUG: DLL loaded at 0x76970000: C:\Windows\system32\urlmon (0x150000 bytes).
2020-02-14 11:57:37,390 [root] DEBUG: DLL loaded at 0x75B30000: C:\Windows\system32\api-ms-win-downlevel-ole32-l1-1-0 (0x4000 bytes).
2020-02-14 11:57:37,467 [root] DEBUG: DLL loaded at 0x76C20000: C:\Windows\system32\WININET (0x437000 bytes).
2020-02-14 11:57:37,467 [root] DEBUG: DLL loaded at 0x75AE0000: C:\Windows\system32\USERENV (0x17000 bytes).
2020-02-14 11:57:37,467 [root] DEBUG: DLL loaded at 0x75A40000: C:\Windows\system32\profapi (0xb000 bytes).
2020-02-14 11:57:37,515 [root] DEBUG: DLL loaded at 0x6D4F0000: C:\Program Files\Internet Explorer\sqmapi (0x39000 bytes).
2020-02-14 11:57:37,515 [root] DEBUG: DLL unloaded from 0x75EB0000.
2020-02-14 11:57:37,515 [root] DEBUG: DLL loaded at 0x71D70000: C:\Windows\system32\api-ms-win-downlevel-advapi32-l2-1-0 (0x4000 bytes).
2020-02-14 11:57:37,515 [root] DEBUG: DLL loaded at 0x6D870000: C:\Windows\system32\api-ms-win-downlevel-shlwapi-l2-1-0 (0x4000 bytes).
2020-02-14 11:57:37,562 [root] DEBUG: DLL loaded at 0x73EB0000: C:\Windows\system32\IPHLPAPI (0x1c000 bytes).
2020-02-14 11:57:37,562 [root] DEBUG: DLL loaded at 0x76180000: C:\Windows\system32\NSI (0x6000 bytes).
2020-02-14 11:57:37,562 [root] DEBUG: DLL loaded at 0x73E70000: C:\Windows\system32\WINNSI (0x7000 bytes).
2020-02-14 11:57:37,562 [root] DEBUG: DLL loaded at 0x73B50000: C:\Windows\system32\dhcpcsvc6 (0xd000 bytes).
2020-02-14 11:57:37,578 [root] DEBUG: DLL loaded at 0x76190000: C:\Windows\system32\WS2_32 (0x35000 bytes).
2020-02-14 11:57:37,578 [root] DEBUG: DLL loaded at 0x73B20000: C:\Windows\system32\dhcpcsvc (0x12000 bytes).
2020-02-14 11:57:37,578 [root] DEBUG: DLL unloaded from 0x77CB0000.
2020-02-14 11:57:37,578 [root] DEBUG: DLL unloaded from 0x75EB0000.
2020-02-14 11:57:37,578 [root] DEBUG: DLL loaded at 0x753F0000: C:\Windows\system32\cryptsp (0x17000 bytes).
2020-02-14 11:57:37,578 [root] DEBUG: DLL loaded at 0x750C0000: C:\Windows\system32\credssp (0x8000 bytes).
2020-02-14 11:57:37,578 [root] DEBUG: DLL unloaded from 0x753F0000.
2020-02-14 11:57:37,592 [root] DEBUG: DLL loaded at 0x75BD0000: C:\Windows\system32\CFGMGR32 (0x27000 bytes).
2020-02-14 11:57:37,625 [root] DEBUG: DLL loaded at 0x73B40000: C:\Windows\system32\SAMCLI (0xf000 bytes).
2020-02-14 11:57:37,625 [root] DEBUG: DLL loaded at 0x74780000: C:\Windows\system32\WKSCLI (0xf000 bytes).
2020-02-14 11:57:37,625 [root] DEBUG: DLL loaded at 0x74560000: C:\Windows\system32\NETAPI32 (0x11000 bytes).
2020-02-14 11:57:37,625 [root] DEBUG: DLL loaded at 0x74190000: C:\Windows\system32\netutils (0x9000 bytes).
2020-02-14 11:57:37,625 [root] DEBUG: DLL loaded at 0x75620000: C:\Windows\system32\srvcli (0x19000 bytes).
2020-02-14 11:57:37,640 [root] DEBUG: DLL unloaded from 0x77CB0000.
2020-02-14 11:57:46,937 [root] DEBUG: NtTerminateProcess hook: Attempting to dump process 2844
2020-02-14 11:57:46,937 [root] DEBUG: GetHookCallerBase: failed to get return address.
2020-02-14 11:57:46,937 [root] DEBUG: DumpInterestingRegions: Dumping Imagebase at 0x00E80000.
2020-02-14 11:57:46,937 [root] DEBUG: DumpImageInCurrentProcess: Attempting to dump virtual PE image.
2020-02-14 11:57:46,937 [root] DEBUG: DumpProcess: Instantiating PeParser with address: 0x00E80000.
2020-02-14 11:57:46,937 [root] DEBUG: DumpProcess: Module entry point VA is 0x00001E00.
2020-02-14 11:57:47,312 [root] INFO: Added new CAPE file to list with path: C:\YlAKBvlhhS\CAPE\2844_131151580847571814522020
2020-02-14 11:57:47,312 [root] DEBUG: DumpProcess: Module image dump success - dump size 0xc3c00.
2020-02-14 11:57:47,312 [root] INFO: Notified of termination of process with pid 2844.
2020-02-14 11:57:47,405 [root] DEBUG: Terminate Event: Process 2844 has already been dumped(!)
2020-02-14 12:00:02,905 [root] INFO: Analysis timeout hit (150 seconds), terminating analysis.
2020-02-14 12:00:02,905 [root] INFO: Created shutdown mutex.
2020-02-14 12:00:03,905 [root] INFO: Shutting down package.
2020-02-14 12:00:03,905 [root] INFO: Stopping auxiliary modules.
2020-02-14 12:00:04,312 [root] INFO: Finishing auxiliary modules.
2020-02-14 12:00:04,312 [root] INFO: Shutting down pipe server and dumping dropped files.
2020-02-14 12:00:04,312 [root] WARNING: File at path "C:\YlAKBvlhhS\debugger" does not exist, skip.
2020-02-14 12:00:04,312 [root] INFO: Analysis completed.

MalScore

3.0

Suspicious

Machine

Name Label Manager Started On Shutdown On
win7_2 win7_2 KVM 2020-02-14 10:56:53 2020-02-14 11:00:13

URL Details

URL
beta.bitrader.no

Signatures

Queries or connects to DNS-Over-HTTPS/DNS-Over-TLS domain or IP address
ip: 1.1.1.1
Network activity detected but not expressed in API logs

Screenshots


Hosts

Direct IP Country Name
Y 1.1.1.1 [VT] Australia

DNS

No domains contacted.


Summary

WHOIS Information

Name: None
Country: None
State: None
City: None
ZIP Code: None
Address: None

Orginization: None
Domain Name(s):
    None
Creation Date:
    None
Updated Date:
    None
Expiration Date:
    None
Email(s):
    None

Registrar(s):
    None
Name Server(s):
    None
Referral URL(s):
    None
This file is not on VirusTotal.

Process Tree


iexplore.exe, PID: 2844, Parent PID: 3032
Full Path: C:\Program Files\Internet Explorer\iexplore.exe
Command Line: "C:\Program Files\Internet Explorer\iexplore.exe" "beta.bitrader.no"

Hosts

Direct IP Country Name
Y 1.1.1.1 [VT] Australia

TCP

Source Source Port Destination Destination Port
192.168.1.2 49168 192.0.2.123 443
192.168.1.2 49170 192.0.2.123 443
192.168.1.2 49172 192.0.2.123 443
192.168.1.2 49174 192.0.2.123 443

UDP

Source Source Port Destination Destination Port
192.168.1.2 49158 1.1.1.1 53
192.168.1.2 51142 1.1.1.1 53
192.168.1.2 51584 1.1.1.1 53
192.168.1.2 51997 1.1.1.1 53
192.168.1.2 52461 1.1.1.1 53
192.168.1.2 55057 1.1.1.1 53
192.168.1.2 58036 1.1.1.1 53
192.168.1.2 58416 1.1.1.1 53
192.168.1.2 59085 1.1.1.1 53
192.168.1.2 59272 1.1.1.1 53
192.168.1.2 59508 1.1.1.1 53
192.168.1.2 61182 1.1.1.1 53
192.168.1.2 62181 1.1.1.1 53
192.168.1.2 64163 1.1.1.1 53
192.168.1.2 64425 1.1.1.1 53
192.168.1.2 64873 1.1.1.1 53
192.168.1.2 138 192.168.1.255 138

DNS

No domains contacted.

HTTP Requests

No HTTP requests performed.

SMTP traffic

No SMTP traffic performed.

IRC traffic

No IRC requests performed.

ICMP traffic

No ICMP traffic performed.

CIF Results

No CIF Results

Suricata Alerts

No Suricata Alerts

Suricata TLS

Timestamp Source IP Source Port Destination IP Destination Port Subject Issuer Fingerprint Version
2020-02-14 10:57:45.248 192.168.1.2 [VT] 49166 192.0.2.123 [VT] 443 CN=localhost a6:44:d8:14:40:2b:de:72:ea:9b:93:d1:5c:49:a9:20:4f:f9:21:0e TLSv1
2020-02-14 10:59:30.902 192.168.1.2 [VT] 49168 192.0.2.123 [VT] 443 CN=localhost a6:44:d8:14:40:2b:de:72:ea:9b:93:d1:5c:49:a9:20:4f:f9:21:0e TLS 1.2
2020-02-14 10:59:31.279 192.168.1.2 [VT] 49169 192.0.2.123 [VT] 443 CN=localhost a6:44:d8:14:40:2b:de:72:ea:9b:93:d1:5c:49:a9:20:4f:f9:21:0e TLS 1.2
2020-02-14 10:59:34.002 192.168.1.2 [VT] 49170 192.0.2.123 [VT] 443 CN=localhost a6:44:d8:14:40:2b:de:72:ea:9b:93:d1:5c:49:a9:20:4f:f9:21:0e TLS 1.2
2020-02-14 10:59:34.237 192.168.1.2 [VT] 49171 192.0.2.123 [VT] 443 CN=localhost a6:44:d8:14:40:2b:de:72:ea:9b:93:d1:5c:49:a9:20:4f:f9:21:0e TLS 1.2
2020-02-14 10:59:34.288 192.168.1.2 [VT] 49172 192.0.2.123 [VT] 443 CN=localhost a6:44:d8:14:40:2b:de:72:ea:9b:93:d1:5c:49:a9:20:4f:f9:21:0e TLS 1.2
2020-02-14 10:59:34.370 192.168.1.2 [VT] 49173 192.0.2.123 [VT] 443 CN=localhost a6:44:d8:14:40:2b:de:72:ea:9b:93:d1:5c:49:a9:20:4f:f9:21:0e TLS 1.2
2020-02-14 10:59:49.685 192.168.1.2 [VT] 49174 192.0.2.123 [VT] 443 CN=localhost a6:44:d8:14:40:2b:de:72:ea:9b:93:d1:5c:49:a9:20:4f:f9:21:0e TLS 1.2
2020-02-14 10:59:49.764 192.168.1.2 [VT] 49175 192.0.2.123 [VT] 443 CN=localhost a6:44:d8:14:40:2b:de:72:ea:9b:93:d1:5c:49:a9:20:4f:f9:21:0e TLS 1.2

Suricata HTTP

No Suricata HTTP

Sorry! No dropped Suricata Extracted files.

JA3

Source Source Port Destination Destination Port JA3 Hash JA3 Description
192.168.1.2 49166 192.0.2.123 443 26b795b92394b98210b2495089be3a26 unknown
192.168.1.2 49168 192.0.2.123 443 67f9e6835a46017b668ace14afaaac17 unknown
192.168.1.2 49169 192.0.2.123 443 67f9e6835a46017b668ace14afaaac17 unknown
192.168.1.2 49170 192.0.2.123 443 67f9e6835a46017b668ace14afaaac17 unknown
192.168.1.2 49171 192.0.2.123 443 67f9e6835a46017b668ace14afaaac17 unknown
192.168.1.2 49172 192.0.2.123 443 67f9e6835a46017b668ace14afaaac17 unknown
192.168.1.2 49173 192.0.2.123 443 67f9e6835a46017b668ace14afaaac17 unknown
192.168.1.2 49174 192.0.2.123 443 67f9e6835a46017b668ace14afaaac17 unknown
192.168.1.2 49175 192.0.2.123 443 67f9e6835a46017b668ace14afaaac17 unknown
Sorry! No dropped files.
Sorry! No CAPE files.
Process Name iexplore.exe
PID 2844
Dump Size 801792 bytes
Module Path C:\Program Files\Internet Explorer\iexplore.exe
Type PE image: 32-bit executable
MD5 2705be238f04a1cd0d793876a2b0bc62
SHA1 98cf0e00462ac3b0318d77d4893778912dd12f36
SHA256 34a80ae6179d9d8e8919db4d2d09ed7a821430b45e0dec145aa2996c01e5e830
CRC32 526A2A36
Ssdeep 24576:bmc3E7TbGLbMMHMMMvMMZMMMKzb6XmMMMiMMMz8JMMHMMM6MMZMMMeXNMMzMMMUQ:btMMHMMMvMMZMMMlmMMMiMMMYJMMHMMs
ClamAV None
Yara None matched
CAPE Yara None matched
Dump Filename 34a80ae6179d9d8e8919db4d2d09ed7a821430b45e0dec145aa2996c01e5e830
Download Download ZIP Submit file

BinGraph

JSON Report Download
MAEC Report Download

Comments



No comments posted

Processing ( 5.906 seconds )

  • 5.028 Suricata
  • 0.276 VirusTotal
  • 0.231 NetworkAnalysis
  • 0.222 ProcDump
  • 0.09 Static
  • 0.049 Deduplicate
  • 0.007 AnalysisInfo
  • 0.003 Debug

Signatures ( 0.02 seconds )

  • 0.005 ransomware_files
  • 0.003 antiav_detectreg
  • 0.002 persistence_autorun
  • 0.002 antiav_detectfile
  • 0.002 ransomware_extensions
  • 0.001 antianalysis_detectfile
  • 0.001 browser_security
  • 0.001 infostealer_bitcoin
  • 0.001 infostealer_ftp
  • 0.001 infostealer_im
  • 0.001 infostealer_mail

Reporting ( 0.915 seconds )

  • 0.907 BinGraph
  • 0.008 JsonDump
Task ID 12796
Mongo ID 5e467dcac3436de9e06673ac
Cuckoo release 1.3-CAPE
Delete