Loading ...

Play interactive tourEdit tour

Analysis Report Vjvj9F0fTc

Overview

General Information

Sample Name:Vjvj9F0fTc (renamed file extension from none to dll)
Analysis ID:330003
MD5:b91ce2fa41029f6955bff20079468448
SHA1:76640508b1e7759e548771a5359eaed353bf1eec
SHA256:32519b85c0b422e4656de6e6c41878e95fd95026267daab4215ee59c107d6c77

Most interesting Screenshot:

Detection

Score:1
Range:0 - 100
Whitelisted:false
Confidence:80%

Signatures

Program does not show much activity (idle)
Sample file is different than original file name gathered from version info

Classification

Startup

  • System is w10x64
  • loaddll32.exe (PID: 7080 cmdline: loaddll32.exe 'C:\Users\user\Desktop\Vjvj9F0fTc.dll' MD5: 2D39D4DFDE8F7151723794029AB8A034)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

No Sigma rule has matched

Signature Overview

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: Vjvj9F0fTc.dllString found in binary or memory: http://s.symcb.com/universal-root.crl0
Source: Vjvj9F0fTc.dllString found in binary or memory: http://s.symcd.com06
Source: Vjvj9F0fTc.dllString found in binary or memory: http://s1.symcb.com/pca3-g5.crl0
Source: Vjvj9F0fTc.dllString found in binary or memory: http://s2.symcb.com0
Source: Vjvj9F0fTc.dllString found in binary or memory: http://solarwinds.s3.amazonaws.com/solarwinds/Release/MIB-Database/MIBs.zip
Source: Vjvj9F0fTc.dllString found in binary or memory: http://sv.symcb.com/sv.crl0a
Source: Vjvj9F0fTc.dllString found in binary or memory: http://sv.symcb.com/sv.crt0
Source: Vjvj9F0fTc.dllString found in binary or memory: http://sv.symcd.com0&
Source: Vjvj9F0fTc.dllString found in binary or memory: http://thwackfeeds.solarwinds.com/blogs/orion-product-team-blog/rss.aspxT
Source: Vjvj9F0fTc.dllString found in binary or memory: http://ts-aia.ws.symantec.com/sha256-tss-ca.cer0(
Source: Vjvj9F0fTc.dllString found in binary or memory: http://ts-crl.ws.symantec.com/sha256-tss-ca.crl0
Source: Vjvj9F0fTc.dllString found in binary or memory: http://ts-ocsp.ws.symantec.com0;
Source: Vjvj9F0fTc.dllString found in binary or memory: http://www.solarwinds.com/contracts/IMaintUpdateNotifySvc/2009/09/IMaintUpdateNotifySvc/GetDataRespo
Source: Vjvj9F0fTc.dllString found in binary or memory: http://www.solarwinds.com/contracts/IMaintUpdateNotifySvc/2009/09/IMaintUpdateNotifySvc/GetDataT
Source: Vjvj9F0fTc.dllString found in binary or memory: http://www.solarwinds.com/contracts/IMaintUpdateNotifySvc/2009/09/IMaintUpdateNotifySvc/GetLocalized
Source: Vjvj9F0fTc.dllString found in binary or memory: http://www.solarwinds.com/contracts/IMaintUpdateNotifySvc/2009/09L
Source: Vjvj9F0fTc.dllString found in binary or memory: http://www.solarwinds.com/contracts/IMaintUpdateNotifySvc/2009/09T
Source: Vjvj9F0fTc.dllString found in binary or memory: http://www.solarwinds.com/documentation/kbloader.aspx?lang=
Source: Vjvj9F0fTc.dllString found in binary or memory: http://www.solarwinds.com/embedded_in_products/productLink.aspx?id=online_quote
Source: Vjvj9F0fTc.dllString found in binary or memory: http://www.symauth.com/cps0(
Source: Vjvj9F0fTc.dllString found in binary or memory: http://www.symauth.com/rpa00
Source: Vjvj9F0fTc.dllString found in binary or memory: https://d.symcb.com/cps0%
Source: Vjvj9F0fTc.dllString found in binary or memory: https://d.symcb.com/rpa0
Source: Vjvj9F0fTc.dllString found in binary or memory: https://d.symcb.com/rpa0.
Source: Vjvj9F0fTc.dllBinary or memory string: OriginalFilenameSolarWinds.Orion.Core.BusinessLayer.dllh$ vs Vjvj9F0fTc.dll
Source: classification engineClassification label: clean1.winDLL@1/0@0/0
Source: Vjvj9F0fTc.dllStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: Vjvj9F0fTc.dllStatic PE information: certificate valid
Source: Vjvj9F0fTc.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: Vjvj9F0fTc.dllStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
Source: Vjvj9F0fTc.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: C:\buildAgent\temp\buildTmp\Obj\SolarWinds.Orion.Core.BusinessLayer\Release\SolarWinds.Orion.Core.BusinessLayer.pdb source: Vjvj9F0fTc.dll
Source: Binary string: C:\buildAgent\temp\buildTmp\Obj\SolarWinds.Orion.Core.BusinessLayer\Release\SolarWinds.Orion.Core.BusinessLayer.pdb|a source: Vjvj9F0fTc.dll
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: Vjvj9F0fTc.dllBinary or memory string: SNMPPort#VMwareProductName)VMwareProductVersion
Source: Vjvj9F0fTc.dllBinary or memory string: GetAllVMwareServiceURIs
Source: Vjvj9F0fTc.dllBinary or memory string: for VMWare ESX
Source: Vjvj9F0fTc.dllBinary or memory string: vmwareCredentialsID
Source: Vjvj9F0fTc.dllBinary or memory string: GetVMwareCredential
Source: Vjvj9F0fTc.dllBinary or memory string: ActionTypeIDYSending request for BlogItemDAL.GetBlogById.QError obtaining blog notification item: SSending request for BlogItemDAL.GetItems.]Error when obtaining blog notification items: sSending request for CoreHelper.CheckOrionProductTeamBlog.]Error forcing blog notification items update: eSending request for BlogItemDAL.GetBlogItemForPos.cError obtaining blog notification item for post: /GetAllVMwareServiceURIs'GetVMwareCredential-InsertUpdateVMHostNode
Source: Vjvj9F0fTc.dllBinary or memory string: get_VMwareESXJobTimeout
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management InstrumentationPath InterceptionPath InterceptionDirect Volume AccessOS Credential DumpingSecurity Software Discovery1Remote ServicesData from Local SystemExfiltration Over Other Network MediumData ObfuscationEavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemorySystem Information Discovery1Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

Screenshots

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand

Antivirus, Machine Learning and Genetic Malware Detection

Initial Sample

SourceDetectionScannerLabelLink
Vjvj9F0fTc.dll6%VirustotalBrowse
Vjvj9F0fTc.dll2%ReversingLabs

Dropped Files

No Antivirus matches

Unpacked PE Files

No Antivirus matches

Domains

No Antivirus matches

URLs

No Antivirus matches

Domains and IPs

Contacted Domains

No contacted domains info

URLs from Memory and Binaries

NameSourceMaliciousAntivirus DetectionReputation
http://www.solarwinds.com/embedded_in_products/productLink.aspx?id=online_quoteVjvj9F0fTc.dllfalse
    high
    http://www.solarwinds.com/contracts/IMaintUpdateNotifySvc/2009/09LVjvj9F0fTc.dllfalse
      high
      http://www.solarwinds.com/contracts/IMaintUpdateNotifySvc/2009/09/IMaintUpdateNotifySvc/GetDataRespoVjvj9F0fTc.dllfalse
        high
        http://www.solarwinds.com/contracts/IMaintUpdateNotifySvc/2009/09/IMaintUpdateNotifySvc/GetDataTVjvj9F0fTc.dllfalse
          high
          http://www.solarwinds.com/contracts/IMaintUpdateNotifySvc/2009/09TVjvj9F0fTc.dllfalse
            high
            http://www.symauth.com/cps0(Vjvj9F0fTc.dllfalse
              high
              http://www.symauth.com/rpa00Vjvj9F0fTc.dllfalse
                high
                http://thwackfeeds.solarwinds.com/blogs/orion-product-team-blog/rss.aspxTVjvj9F0fTc.dllfalse
                  high
                  http://www.solarwinds.com/documentation/kbloader.aspx?lang=Vjvj9F0fTc.dllfalse
                    high
                    http://solarwinds.s3.amazonaws.com/solarwinds/Release/MIB-Database/MIBs.zipVjvj9F0fTc.dllfalse
                      high

                      Contacted IPs

                      No contacted IP infos

                      General Information

                      Joe Sandbox Version:31.0.0 Red Diamond
                      Analysis ID:330003
                      Start date:14.12.2020
                      Start time:08:15:26
                      Joe Sandbox Product:CloudBasic
                      Overall analysis duration:0h 1m 59s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Sample file name:Vjvj9F0fTc (renamed file extension from none to dll)
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                      Number of analysed new started processes analysed:2
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • HDC enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Detection:CLEAN
                      Classification:clean1.winDLL@1/0@0/0
                      EGA Information:Failed
                      HDC Information:Failed
                      HCA Information:
                      • Successful, ratio: 100%
                      • Number of executed functions: 0
                      • Number of non-executed functions: 0
                      Cookbook Comments:
                      • Adjust boot time
                      • Enable AMSI
                      • Stop behavior analysis, all processes terminated
                      Warnings:
                      Show All
                      • Exclude process from analysis (whitelisted): taskhostw.exe

                      Simulations

                      Behavior and APIs

                      TimeTypeDescription
                      08:16:20API Interceptor1x Sleep call for process: loaddll32.exe modified

                      Joe Sandbox View / Context

                      IPs

                      No context

                      Domains

                      No context

                      ASN

                      No context

                      JA3 Fingerprints

                      No context

                      Dropped Files

                      No context

                      Created / dropped Files

                      No created / dropped files found

                      Static File Info

                      General

                      File type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                      Entropy (8bit):5.582826996737924
                      TrID:
                      • Win32 Dynamic Link Library (generic) Net Framework (1011504/3) 49.81%
                      • Win32 Dynamic Link Library (generic) (1002004/3) 49.34%
                      • Windows Screen Saver (13104/52) 0.65%
                      • Generic Win/DOS Executable (2004/3) 0.10%
                      • DOS Executable Generic (2002/1) 0.10%
                      File name:Vjvj9F0fTc.dll
                      File size:1011032
                      MD5:b91ce2fa41029f6955bff20079468448
                      SHA1:76640508b1e7759e548771a5359eaed353bf1eec
                      SHA256:32519b85c0b422e4656de6e6c41878e95fd95026267daab4215ee59c107d6c77
                      SHA512:6a81f082f36ccbda48070772c5a97e1d7de61ad77465e7befe8cbd97df40dcc5da09c461311708e3d57527e323484b05cfd3e72a3c70e106e47f44cc77584bd7
                      SSDEEP:12288:Zx7m/z9aEBzvnvLtYAi6uLlYQ69BBpIvF1tjpH7BKi+0A8vca9owQ:6aEBTvRBi6uL6dIvDtjpH9+0A8vca9oD
                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...R.y^.........." ..0..H...........a... ........... ..............................bz....`................................

                      File Icon

                      Icon Hash:74f0e4ecccdce0e4

                      Static PE Info

                      General

                      Entrypoint:0x100f61a6
                      Entrypoint Section:.text
                      Digitally signed:true
                      Imagebase:0x10000000
                      Subsystem:windows cui
                      Image File Characteristics:EXECUTABLE_IMAGE, DLL, LARGE_ADDRESS_AWARE
                      DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
                      Time Stamp:0x5E79CA52 [Tue Mar 24 08:52:34 2020 UTC]
                      TLS Callbacks:
                      CLR (.Net) Version:v4.0.30319
                      OS Version Major:4
                      OS Version Minor:0
                      File Version Major:4
                      File Version Minor:0
                      Subsystem Version Major:4
                      Subsystem Version Minor:0
                      Import Hash:dae02f32a21e03ce65412f6e56942daa

                      Authenticode Signature

                      Signature Valid:true
                      Signature Issuer:CN=Symantec Class 3 SHA256 Code Signing CA, OU=Symantec Trust Network, O=Symantec Corporation, C=US
                      Signature Validation Error:The operation completed successfully
                      Error Number:0
                      Not Before, Not After
                      • 1/20/2020 4:00:00 PM 1/20/2023 3:59:59 PM
                      Subject Chain
                      • CN="Solarwinds Worldwide, LLC", O="Solarwinds Worldwide, LLC", L=Austin, S=Texas, C=US
                      Version:3
                      Thumbprint MD5:08E35543D6110ED11FDF558BB093D401
                      Thumbprint SHA-1:47D92D49E6F7F296260DA1AF355F941EB25360C4
                      Thumbprint SHA-256:53F8DFC65169CCDA021B72A62E0C22A4DB7C4077F002FA742717D41B3C40F2C7
                      Serial:0FE973752022A606ADF2A36E345DC0ED

                      Entrypoint Preview

                      Instruction
                      jmp dword ptr [10002000h]
                      xor dl, byte ptr [eax]
                      xchg al, ch
                      pop ebx
                      fisubr word ptr [ecx+2Ch]
                      mov dl, 3Dh
                      retn 95BCh
                      push FFFFFFC9h
                      cld
                      xor dword ptr [ebp-63h], ecx
                      pop ebx
                      xor ebp, dword ptr [ebp+08h]
                      jno 00007F3998813906h
                      fcomp3 st(2)
                      rol dword ptr [ebp+6EBD073Bh], 51h
                      or ecx, dword ptr [ebp-4F69303Ah]
                      add byte ptr [esi-2Ch], ah
                      jnc 00007F399881399Ch
                      xchg eax, edx
                      ficom word ptr [ecx+7Eh]
                      add byte ptr [ecx+edi-26D72F48h], 00000044h
                      mov cl, 41h
                      push cs
                      ret
                      xlatb
                      mov ch, byte ptr [ecx+ebp]
                      lea edi, ebp
                      mov cl, byte ptr [ebp+2Ch]
                      and eax, 2770CE61h
                      mov dh, ACh
                      inc edi
                      fstp tbyte ptr [ebp-7E8F69D3h]
                      stc
                      jmp 00007F399881393Ah
                      rcl byte ptr [ecx], 0000001Fh
                      iretd
                      sub ebp, esp
                      int3
                      sal dword ptr [esi], 1
                      xchg eax, edx
                      cdq
                      xor ah, byte ptr [edi+ecx-24h]
                      cwde
                      sbb ebp, eax
                      mov bl, al
                      loop 00007F3998813915h
                      mov dl, BDh
                      dec esp
                      int1
                      call 00007F3A0CF58999h
                      jmp 00007F39234E28F1h
                      scasd
                      xor al, ECh
                      jnl 00007F3998813910h
                      mov cs, dx
                      cmp bl, byte ptr [esi]
                      jns 00007F39988138DCh
                      test eax, 47A375F1h
                      not dword ptr [edx+edi*8-7F505A3Dh]
                      xor al, ACh
                      cdq
                      cmpsb
                      call ebp
                      push edi
                      stosb
                      inc esi
                      out dx, al
                      aaa
                      int A5h
                      jnle 00007F3998813984h
                      and esp, eax
                      loope 00007F39988139ACh
                      in eax, dx
                      pop esi
                      add dword ptr [ecx+34h], 3F473970h
                      add eax, 3A0B0FF3h
                      jnbe 00007F3998813994h
                      xchg eax, esi
                      and al, FFh
                      arpl word ptr [edx], dx
                      or byte ptr [edx+0060F23Fh], cl

                      Data Directories

                      NameVirtual AddressVirtual Size Is in Section
                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IMPORT0xf61540x4f.text
                      IMAGE_DIRECTORY_ENTRY_RESOURCE0xf80000x520.rsrc
                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                      IMAGE_DIRECTORY_ENTRY_SECURITY0xf52000x1b58
                      IMAGE_DIRECTORY_ENTRY_BASERELOC0xfa0000xc.reloc
                      IMAGE_DIRECTORY_ENTRY_DEBUG0xf601c0x1c.text
                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                      Sections

                      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                      .text0x20000xf477c0xf4800False0.336901081608data5.56921920539IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      .rsrc0xf80000x5200x600False0.305338541667data3.01571277024IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .reloc0xfa0000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                      Resources

                      NameRVASizeTypeLanguageCountry
                      RT_VERSION0xf80580x4c2data

                      Imports

                      DLLImport
                      mscoree.dll_CorDllMain

                      Version Infos

                      DescriptionData
                      Translation0x0000 0x04b0
                      LegalCopyrightCopyright 1999-2020 SolarWinds Worldwide, LLC. All Rights Reserved.
                      Assembly Version2019.4.5200.9083
                      InternalNameSolarWinds.Orion.Core.BusinessLayer.dll
                      FileVersion2019.4.5200.9083
                      CompanyNameSolarWinds Worldwide, LLC.
                      LegalTrademarks
                      Comments
                      ProductNameSolarWinds.Orion.Core.BusinessLayer
                      ProductVersion2019.4.5200.9083
                      FileDescriptionSolarWinds.Orion.Core.BusinessLayer
                      OriginalFilenameSolarWinds.Orion.Core.BusinessLayer.dll

                      Network Behavior

                      No network behavior found

                      Code Manipulations

                      Statistics

                      CPU Usage

                      Click to jump to process

                      Memory Usage

                      Click to jump to process

                      System Behavior

                      General

                      Start time:08:16:20
                      Start date:14/12/2020
                      Path:C:\Windows\System32\loaddll32.exe
                      Wow64 process (32bit):true
                      Commandline:loaddll32.exe 'C:\Users\user\Desktop\Vjvj9F0fTc.dll'
                      Imagebase:0x2a0000
                      File size:120832 bytes
                      MD5 hash:2D39D4DFDE8F7151723794029AB8A034
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:moderate

                      Disassembly

                      Code Analysis

                      Reset < >