Loading ...

Play interactive tourEdit tour

Analysis Report qkT9fgtS2x

Overview

General Information

Sample Name:qkT9fgtS2x (renamed file extension from none to dll)
Analysis ID:330529
MD5:2c4a910a1299cdae2a4e55988a2f102e
SHA1:2f1a5a7411d015d01aaee4535835400191645023
SHA256:019085a76ba7126fff22770d71bd901c325fc68ac55aa743327984e89f4b0134

Most interesting Screenshot:

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Program does not show much activity (idle)
Sample file is different than original file name gathered from version info
Yara signature match

Classification

Startup

  • System is w10x64
  • loaddll32.exe (PID: 5568 cmdline: loaddll32.exe 'C:\Users\user\Desktop\qkT9fgtS2x.dll' MD5: 2D39D4DFDE8F7151723794029AB8A034)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Initial Sample

SourceRuleDescriptionAuthorStrings
qkT9fgtS2x.dllAPT_Backdoor_SUNBURST_1This rule is looking for portions of the SUNBURST backdoor that are vital to how it functions. The first signature fnv_xor matches a magic byte xor that the sample performs on process, service, and driver names/paths. SUNBURST is a backdoor that has the ability to spawn and kill processes, write and delete files, set and create registry keys, gather system information, and disable a set of forensic analysis tools and services.FireEye
  • 0xe5761:$cmd_regex_encoded: U4qpjjbQtUzUTdONrTY2q42pVapRgooABYxQuIZmtUoA
  • 0xe5905:$fake_orion_event_encoded: U3ItS80rCaksSFWyUvIvyszPU9IBAA==
  • 0xe5947:$fake_orion_eventmanager_encoded: U3ItS80r8UvMTVWyUgKzfRPzEtNTi5R0AA==
  • 0xe5a05:$fake_orion_message_encoded: U/JNLS5OTE9VslKqNqhVAgA=
  • 0x327c:$fnv_xor: 67 19 D8 A7 3B 90 AC 5B
qkT9fgtS2x.dllAPT_Backdoor_SUNBURST_2The SUNBURST backdoor uses a domain generation algorithm (DGA) as part of C2 communications. This rule is looking for each branch of the code that checks for which HTTP method is being used. This is in one large conjunction, and all branches are then tied together via disjunction. The grouping is intentionally designed so that if any part of the DGA is re-used in another sample, this signature should match that re-used portion. SUNBURST is a backdoor that has the ability to spawn and kill processes, write and delete files, set and create registry keys, gather system information, and disable a set of forensic analysis tools and services.FireEye
  • 0xe5ac5:$a: 0y3Kzy8BAA==
  • 0xe5e59:$aa: S8vPKynWL89PS9OvNqjVrTYEYqNa3fLUpDSgTLVxrR5IzggA
  • 0xe5ebb:$ab: S8vPKynWL89PS9OvNqjVrTYEYqPaauNaPZCYEQA=
  • 0xe5f73:$ac: C88sSs1JLS4GAA==
  • 0xe5f95:$ad: C/UEAA==
  • 0xe5fa7:$ae: C89MSU8tKQYA
  • 0xe5fc1:$af: 8wvwBQA=
  • 0xe5fd3:$ag: cyzIz8nJBwA=
  • 0xe5fed:$ah: c87JL03xzc/LLMkvysxLBwA=
  • 0xe601f:$ai: 88tPSS0GAA==
  • 0xe6039:$aj: C8vPKc1NLQYA
  • 0xe6053:$ak: 88wrSS1KS0xOLQYA
  • 0xe6075:$al: c87PLcjPS80rKQYA
  • 0xe6097:$am: Ky7PLNAvLUjRBwA=
  • 0xe60b9:$an: 06vIzQEA
  • 0xe5af9:$b: 0y3NyyxLLSpOzIlPTgQA
  • 0xe5b23:$c: 001OBAA=
  • 0xe5b35:$d: 0y0oysxNLKqMT04EAA==
  • 0xe5b5f:$e: 0y3JzE0tLknMLQAA
  • 0xe5b81:$f: 003PyU9KzAEA
  • 0xe5b9b:$h: 0y1OTS4tSk1OBAA=

Sigma Overview

No Sigma rule has matched

Signature Overview

Click to jump to signature section

Show All Signature Results

AV Detection:

barindex
Multi AV Scanner detection for submitted fileShow sources
Source: qkT9fgtS2x.dllVirustotal: Detection: 51%Perma Link
Source: qkT9fgtS2x.dllMetadefender: Detection: 21%Perma Link
Source: qkT9fgtS2x.dllReversingLabs: Detection: 60%
Source: qkT9fgtS2x.dllString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
Source: qkT9fgtS2x.dllString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
Source: qkT9fgtS2x.dllString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
Source: qkT9fgtS2x.dllString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
Source: qkT9fgtS2x.dllString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
Source: qkT9fgtS2x.dllString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
Source: qkT9fgtS2x.dllString found in binary or memory: http://ocsp.digicert.com0C
Source: qkT9fgtS2x.dllString found in binary or memory: http://ocsp.digicert.com0O
Source: qkT9fgtS2x.dllString found in binary or memory: http://s1.symcb.com/pca3-g5.crl0
Source: qkT9fgtS2x.dllString found in binary or memory: http://s2.symcb.com0
Source: qkT9fgtS2x.dllString found in binary or memory: http://solarwinds.s3.amazonaws.com/solarwinds/Release/MIB-Database/MIBs.zip
Source: qkT9fgtS2x.dllString found in binary or memory: http://sv.symcb.com/sv.crl0a
Source: qkT9fgtS2x.dllString found in binary or memory: http://sv.symcb.com/sv.crt0
Source: qkT9fgtS2x.dllString found in binary or memory: http://sv.symcd.com0&
Source: qkT9fgtS2x.dllString found in binary or memory: http://thwackfeeds.solarwinds.com/blogs/orion-product-team-blog/rss.aspxT
Source: qkT9fgtS2x.dllString found in binary or memory: http://www.solarwinds.com/contracts/IMaintUpdateNotifySvc/2009/09/IMaintUpdateNotifySvc/GetDataRespo
Source: qkT9fgtS2x.dllString found in binary or memory: http://www.solarwinds.com/contracts/IMaintUpdateNotifySvc/2009/09/IMaintUpdateNotifySvc/GetDataT
Source: qkT9fgtS2x.dllString found in binary or memory: http://www.solarwinds.com/contracts/IMaintUpdateNotifySvc/2009/09/IMaintUpdateNotifySvc/GetLocalized
Source: qkT9fgtS2x.dllString found in binary or memory: http://www.solarwinds.com/contracts/IMaintUpdateNotifySvc/2009/09L
Source: qkT9fgtS2x.dllString found in binary or memory: http://www.solarwinds.com/contracts/IMaintUpdateNotifySvc/2009/09T
Source: qkT9fgtS2x.dllString found in binary or memory: http://www.symauth.com/cps0(
Source: qkT9fgtS2x.dllString found in binary or memory: http://www.symauth.com/rpa00
Source: qkT9fgtS2x.dllString found in binary or memory: https://d.symcb.com/cps0%
Source: qkT9fgtS2x.dllString found in binary or memory: https://d.symcb.com/rpa0
Source: qkT9fgtS2x.dllString found in binary or memory: https://www.digicert.com/CPS0
Source: qkT9fgtS2x.dllString found in binary or memory: https://www.solarwinds.com/documentation/kbloader.aspx?lang=
Source: qkT9fgtS2x.dllString found in binary or memory: https://www.solarwinds.com/embedded_in_products/productLink.aspx?id=online_quote
Source: qkT9fgtS2x.dllBinary or memory string: OriginalFilenameSolarWinds.Orion.Core.BusinessLayer.dllh$ vs qkT9fgtS2x.dll
Source: qkT9fgtS2x.dll, type: SAMPLEMatched rule: APT_Backdoor_SUNBURST_1 date = 2020-12-14, author = FireEye, description = This rule is looking for portions of the SUNBURST backdoor that are vital to how it functions. The first signature fnv_xor matches a magic byte xor that the sample performs on process, service, and driver names/paths. SUNBURST is a backdoor that has the ability to spawn and kill processes, write and delete files, set and create registry keys, gather system information, and disable a set of forensic analysis tools and services., reference = https://www.fireeye.com/blog/threat-research/2020/12/evasive-attacker-leverages-solarwinds-supply-chain-compromises-with-sunburst-backdoor.html, score =
Source: qkT9fgtS2x.dll, type: SAMPLEMatched rule: APT_Backdoor_SUNBURST_2 date = 2020-12-14, author = FireEye, description = The SUNBURST backdoor uses a domain generation algorithm (DGA) as part of C2 communications. This rule is looking for each branch of the code that checks for which HTTP method is being used. This is in one large conjunction, and all branches are then tied together via disjunction. The grouping is intentionally designed so that if any part of the DGA is re-used in another sample, this signature should match that re-used portion. SUNBURST is a backdoor that has the ability to spawn and kill processes, write and delete files, set and create registry keys, gather system information, and disable a set of forensic analysis tools and services., reference = https://www.fireeye.com/blog/threat-research/2020/12/evasive-attacker-leverages-solarwinds-supply-chain-compromises-with-sunburst-backdoor.html, score =
Source: classification engineClassification label: mal48.winDLL@1/0@0/0
Source: qkT9fgtS2x.dllStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: qkT9fgtS2x.dllVirustotal: Detection: 51%
Source: qkT9fgtS2x.dllMetadefender: Detection: 21%
Source: qkT9fgtS2x.dllReversingLabs: Detection: 60%
Source: qkT9fgtS2x.dllStatic PE information: certificate valid
Source: qkT9fgtS2x.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: qkT9fgtS2x.dllStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
Source: qkT9fgtS2x.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: C:\buildAgent\temp\buildTmp\Obj\SolarWinds.Orion.Core.BusinessLayer\Release\SolarWinds.Orion.Core.BusinessLayer.pdb source: qkT9fgtS2x.dll
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: qkT9fgtS2x.dllBinary or memory string: SNMPPort#VMwareProductName)VMwareProductVersion
Source: qkT9fgtS2x.dllBinary or memory string: GetAllVMwareServiceURIs
Source: qkT9fgtS2x.dllBinary or memory string: for VMWare ESX
Source: qkT9fgtS2x.dllBinary or memory string: vmwareCredentialsID
Source: qkT9fgtS2x.dllBinary or memory string: GetVMwareCredential
Source: qkT9fgtS2x.dllBinary or memory string: ActionTypeIDYSending request for BlogItemDAL.GetBlogById.QError obtaining blog notification item: SSending request for BlogItemDAL.GetItems.]Error when obtaining blog notification items: sSending request for CoreHelper.CheckOrionProductTeamBlog.]Error forcing blog notification items update: eSending request for BlogItemDAL.GetBlogItemForPos.cError obtaining blog notification item for post: /GetAllVMwareServiceURIs'GetVMwareCredential-InsertUpdateVMHostNode
Source: qkT9fgtS2x.dllBinary or memory string: get_VMwareESXJobTimeout
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management InstrumentationPath InterceptionPath InterceptionDirect Volume AccessOS Credential DumpingSecurity Software Discovery1Remote ServicesData from Local SystemExfiltration Over Other Network MediumData ObfuscationEavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemorySystem Information Discovery1Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

Screenshots

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.