Loading ...

Play interactive tourEdit tour

Analysis Report ERRoqGpsIS

Overview

General Information

Sample Name:ERRoqGpsIS (renamed file extension from none to dll)
Analysis ID:352815
MD5:d2852a3b2a20846528cec53426fd5f9c
SHA1:1fa892f9280708e7c82e958bec516bb2b09351f3
SHA256:8e50da51386c2f267afaf1a419e4467d62c01c9704f0e17c4aa188d0c090c8b2
Tags:zloader2

Most interesting Screenshot:

Detection

Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Contains functionality to inject code into remote processes
Abnormal high CPU Usage
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to detect virtual machines (SLDT)
Contains functionality to dynamically determine API calls
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Found dropped PE file which has not been started or loaded
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
JA3 SSL client fingerprint seen in connection with other malware
Queries the product ID of Windows
Tries to load missing DLLs
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

Startup

  • System is w10x64
  • loaddll32.exe (PID: 5348 cmdline: loaddll32.exe 'C:\Users\user\Desktop\ERRoqGpsIS.dll' MD5: 99D621E00EFC0B8F396F38D5555EB078)
    • msiexec.exe (PID: 6344 cmdline: msiexec.exe MD5: 12C17B5A5C2A7B97342C362CA467E9A2)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

No Sigma rule has matched

Signature Overview

Click to jump to signature section

Show All Signature Results

AV Detection:

barindex
Multi AV Scanner detection for dropped fileShow sources
Source: C:\Users\user\AppData\Roaming\Ilgyr\inaxa.dllVirustotal: Detection: 57%Perma Link
Source: C:\Users\user\AppData\Roaming\Ilgyr\inaxa.dllMetadefender: Detection: 24%Perma Link
Source: C:\Users\user\AppData\Roaming\Ilgyr\inaxa.dllReversingLabs: Detection: 50%
Multi AV Scanner detection for submitted fileShow sources
Source: ERRoqGpsIS.dllVirustotal: Detection: 57%Perma Link
Source: ERRoqGpsIS.dllMetadefender: Detection: 24%Perma Link
Source: ERRoqGpsIS.dllReversingLabs: Detection: 50%

Compliance:

barindex
Uses 32bit PE filesShow sources
Source: ERRoqGpsIS.dllStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
Uses secure TLS version for HTTPS connectionsShow sources
Source: unknownHTTPS traffic detected: 104.21.45.75:443 -> 192.168.2.3:49728 version: TLS 1.2
Binary contains paths to debug symbolsShow sources
Source: Binary string: c:\FindHeard\EndLook\ChartBegan\WinSentence\Rain.pdb source: loaddll32.exe, 00000000.00000002.302107930.000000006E4F5000.00000002.00020000.sdmp, msiexec.exe, 0000000E.00000003.310516773.0000000001100000.00000004.00000001.sdmp, ERRoqGpsIS.dll
Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_008215D0 FindFirstFileW,FindNextFileW,
Source: C:\Windows\System32\loaddll32.exeCode function: 4x nop then mov byte ptr [ebp+edi-50h], al
Source: C:\Windows\System32\loaddll32.exeCode function: 4x nop then mov al, byte ptr [edx+ebx]
Source: C:\Windows\System32\loaddll32.exeCode function: 4x nop then mov edi, 00000002h
Source: C:\Windows\System32\loaddll32.exeCode function: 4x nop then mov edi, dword ptr [ebp+ebx*4-00000114h]
Source: C:\Windows\System32\loaddll32.exeCode function: 4x nop then xor ebx, ebx
Source: C:\Windows\System32\loaddll32.exeCode function: 4x nop then inc edi
Source: C:\Windows\System32\loaddll32.exeCode function: 4x nop then mov byte ptr [ebp+ebx-00000084h], al
Source: C:\Windows\System32\loaddll32.exeCode function: 4x nop then mov esi, dword ptr [6E4D66F0h+edi*4]
Source: C:\Windows\System32\loaddll32.exeCode function: 4x nop then movsx ebx, byte ptr [esi]
Source: C:\Windows\System32\loaddll32.exeCode function: 4x nop then push dword ptr [ebp-14h]
Source: C:\Windows\System32\loaddll32.exeCode function: 4x nop then add esi, 02h
Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then mov esi, dword ptr [008266F0h+edi*4]
Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then mov byte ptr [ebp+ebx-00000084h], al
Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then movsx ebx, byte ptr [esi]
Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then push dword ptr [ebp-14h]
Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then add esi, 02h
Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then mov al, byte ptr [edx+ebx]
Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then mov byte ptr [ebp+edi-50h], al
Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then xor ebx, ebx
Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then inc edi
Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then mov edi, dword ptr [ebp+ebx*4-00000114h]
Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then mov edi, 00000002h
Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
Source: unknownDNS traffic detected: queries for: earfetti.com
Source: loaddll32.exe, 00000000.00000002.302144785.000000006E51C000.00000002.00020000.sdmp, msiexec.exe, 0000000E.00000003.310516773.0000000001100000.00000004.00000001.sdmp, ERRoqGpsIS.dllString found in binary or memory: http://www.enoughthose.de8
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
Source: unknownHTTPS traffic detected: 104.21.45.75:443 -> 192.168.2.3:49728 version: TLS 1.2
Source: C:\Windows\System32\loaddll32.exeProcess Stats: CPU usage > 98%
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E4B2B90
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E4B3E10
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E4BB3D0
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E4CA000
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E4B68C0
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E4C88F0
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E4B2DD0
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E4BC9A0
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E4EBECF
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E4F275F
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E4F2CA3
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E4F221B
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E4F4236
Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_008068C0
Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_008188F0
Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_0081A000
Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_0080C9A0
Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_00802DD0
Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_00803E10
Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_00802B90
Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_0080B3D0
Source: C:\Windows\System32\loaddll32.exeCode function: String function: 6E4E97D8 appears 34 times
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dll
Source: ERRoqGpsIS.dllStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
Source: ERRoqGpsIS.dllStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: inaxa.dll.14.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: classification engineClassification label: mal60.evad.winDLL@3/1@1/1
Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_0080E070 AdjustTokenPrivileges,
Source: C:\Windows\SysWOW64\msiexec.exeFile created: C:\Users\user\AppData\Roaming\IlgyrJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeMutant created: \Sessions\1\BaseNamedObjects\Local\{AE3C19F7-A2D0-F8C5-70B9-D0EFD3468FD7}
Source: C:\Windows\SysWOW64\msiexec.exeMutant created: \Sessions\1\BaseNamedObjects\Local\{8E4429F7-92D0-D8BD-70B9-D0EFD3468FD7}
Source: C:\Windows\SysWOW64\msiexec.exeMutant created: \Sessions\1\BaseNamedObjects\Local\{3EAD2B6B-904C-6854-70B9-D0EFD3468FD7}
Source: ERRoqGpsIS.dllStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
Source: C:\Windows\SysWOW64\msiexec.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: ERRoqGpsIS.dllVirustotal: Detection: 57%
Source: ERRoqGpsIS.dllMetadefender: Detection: 24%
Source: ERRoqGpsIS.dllReversingLabs: Detection: 50%
Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe 'C:\Users\user\Desktop\ERRoqGpsIS.dll'
Source: unknownProcess created: C:\Windows\SysWOW64\msiexec.exe msiexec.exe
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\msiexec.exe msiexec.exe
Source: ERRoqGpsIS.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: ERRoqGpsIS.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: ERRoqGpsIS.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: ERRoqGpsIS.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: ERRoqGpsIS.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: ERRoqGpsIS.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: ERRoqGpsIS.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: c:\FindHeard\EndLook\ChartBegan\WinSentence\Rain.pdb source: loaddll32.exe, 00000000.00000002.302107930.000000006E4F5000.00000002.00020000.sdmp, msiexec.exe, 0000000E.00000003.310516773.0000000001100000.00000004.00000001.sdmp, ERRoqGpsIS.dll
Source: ERRoqGpsIS.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: ERRoqGpsIS.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: ERRoqGpsIS.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: ERRoqGpsIS.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: ERRoqGpsIS.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E4CF870 LoadLibraryA,GetProcAddress,
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E4C0380 push eax; ret
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E4DF6C6 push FFFFFFFFh; ret
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E4DDC4B push esp; ret
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E4D9C73 push es; iretd
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E4D9CB3 push es; iretd
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E4E981D push ecx; ret
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E4D98AA push esp; ret
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E509381 push eax; ret
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E509400 push eax; ret
Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_00823CEA push D85411E4h; iretd
Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_00810380 push eax; ret
Source: C:\Windows\SysWOW64\msiexec.exeFile created: C:\Users\user\AppData\Roaming\Ilgyr\inaxa.dllJump to dropped file
Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E4EDA28 sldt word ptr [eax]
Source: C:\Windows\SysWOW64\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\Ilgyr\inaxa.dllJump to dropped file
Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_008215D0 FindFirstFileW,FindNextFileW,
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E4E8B05 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E4CF870 LoadLibraryA,GetProcAddress,
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E4C3E90 mov eax, dword ptr fs:[00000030h]
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E50A2F7 mov eax, dword ptr fs:[00000030h]
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E509E34 push dword ptr fs:[00000030h]
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E50A22D mov eax, dword ptr fs:[00000030h]
Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_00813E90 mov eax, dword ptr fs:[00000030h]
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E4EFE11 __lseeki64_nolock,__lseeki64_nolock,GetProcessHeap,RtlAllocateHeap,__setmode_nolock,__write_nolock,__setmode_nolock,GetProcessHeap,HeapFree,__lseeki64_nolock,SetEndOfFile,GetLastError,__lseeki64_nolock,
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E4EAE48 __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E4E8B05 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E4E9009 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,

HIPS / PFW / Operating System Protection Evasion:

barindex
Contains functionality to inject code into remote processesShow sources
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E4CDD00 CreateProcessA,VirtualAllocEx,WriteProcessMemory,VirtualAllocEx,WriteProcessMemory,GetThreadContext,VirtualProtectEx,SetThreadContext,VirtualProtectEx,ResumeThread,ExitProcess,
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\msiexec.exe msiexec.exe
Source: msiexec.exe, 0000000E.00000002.556778882.00000000032C0000.00000002.00000001.sdmpBinary or memory string: Program Manager
Source: msiexec.exe, 0000000E.00000002.556778882.00000000032C0000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
Source: msiexec.exe, 0000000E.00000002.556778882.00000000032C0000.00000002.00000001.sdmpBinary or memory string: Progman
Source: msiexec.exe, 0000000E.00000002.556778882.00000000032C0000.00000002.00000001.sdmpBinary or memory string: Progmanlock
Source: C:\Windows\System32\loaddll32.exeCode function: GetLocaleInfoA,
Source: C:\Windows\SysWOW64\msiexec.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion DigitalProductId
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E4EF1C8 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,
Source: C:\Windows\SysWOW64\msiexec.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsNative API1DLL Side-Loading1Access Token Manipulation1Masquerading1OS Credential DumpingSystem Time Discovery1Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel12Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsProcess Injection112Virtualization/Sandbox Evasion1LSASS MemorySecurity Software Discovery12Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothNon-Application Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)DLL Side-Loading1Access Token Manipulation1Security Account ManagerVirtualization/Sandbox Evasion1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationApplication Layer Protocol2Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection112NTDSProcess Discovery1Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptDeobfuscate/Decode Files or Information1LSA SecretsRemote System Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
Replication Through Removable MediaLaunchdRc.commonRc.commonObfuscated Files or Information3Cached Domain CredentialsFile and Directory Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
External Remote ServicesScheduled TaskStartup ItemsStartup ItemsSoftware Packing1DCSyncSystem Information Discovery23Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobDLL Side-Loading1Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

Screenshots

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand

Antivirus, Machine Learning and Genetic Malware Detection

Initial Sample

SourceDetectionScannerLabelLink
ERRoqGpsIS.dll58%VirustotalBrowse
ERRoqGpsIS.dll24%MetadefenderBrowse
ERRoqGpsIS.dll50%ReversingLabsWin32.Trojan.Zeus

Dropped Files

SourceDetectionScannerLabelLink
C:\Users\user\AppData\Roaming\Ilgyr\inaxa.dll58%VirustotalBrowse
C:\Users\user\AppData\Roaming\Ilgyr\inaxa.dll24%MetadefenderBrowse
C:\Users\user\AppData\Roaming\Ilgyr\inaxa.dll50%ReversingLabsWin32.Trojan.Zeus

Unpacked PE Files

No Antivirus matches

Domains

SourceDetectionScannerLabelLink
earfetti.com1%VirustotalBrowse

URLs

SourceDetectionScannerLabelLink
http://www.enoughthose.de80%Avira URL Cloudsafe

Domains and IPs

Contacted Domains

NameIPActiveMaliciousAntivirus DetectionReputation
earfetti.com
104.21.45.75
truefalseunknown

URLs from Memory and Binaries

NameSourceMaliciousAntivirus DetectionReputation
http://www.enoughthose.de8loaddll32.exe, 00000000.00000002.302144785.000000006E51C000.00000002.00020000.sdmp, msiexec.exe, 0000000E.00000003.310516773.0000000001100000.00000004.00000001.sdmp, ERRoqGpsIS.dllfalse
  • Avira URL Cloud: safe
unknown

Contacted IPs

  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs

Public

IPDomainCountryFlagASNASN NameMalicious
104.21.45.75
unknownUnited States
13335CLOUDFLARENETUSfalse

General Information

Joe Sandbox Version:31.0.0 Emerald
Analysis ID:352815
Start date:14.02.2021
Start time:15:13:10
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 6m 42s
Hypervisor based Inspection enabled:false
Report type:light
Sample file name:ERRoqGpsIS (renamed file extension from none to dll)
Cookbook file name:default.jbs
Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
Number of analysed new started processes analysed:30
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • HDC enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Detection:MAL
Classification:mal60.evad.winDLL@3/1@1/1
EGA Information:Failed
HDC Information:
  • Successful, ratio: 60.6% (good quality ratio 59.7%)
  • Quality average: 87.8%
  • Quality standard deviation: 22.1%
HCA Information:
  • Successful, ratio: 63%
  • Number of executed functions: 0
  • Number of non-executed functions: 0
Cookbook Comments:
  • Adjust boot time
  • Enable AMSI
Warnings:
Show All
  • Exclude process from analysis (whitelisted): taskhostw.exe, MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, UsoClient.exe
  • Excluded IPs from analysis (whitelisted): 104.43.193.48, 104.43.139.144, 184.30.20.56, 20.190.160.136, 20.190.160.4, 20.190.160.75, 20.190.160.134, 20.190.160.8, 20.190.160.67, 20.190.160.71, 20.190.160.2, 51.104.139.180, 92.122.213.247, 92.122.213.194, 2.20.142.209, 2.20.142.210, 20.54.26.129, 51.11.168.160, 52.155.217.156
  • Excluded domains from analysis (whitelisted): au.download.windowsupdate.com.edgesuite.net, arc.msn.com.nsatc.net, www.tm.lg.prod.aadmsa.akadns.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, www.tm.a.prd.aadg.trafficmanager.net, db5eap.displaycatalog.md.mp.microsoft.com.akadns.net, login.live.com, audownload.windowsupdate.nsatc.net, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, au-bg-shim.trafficmanager.net, displaycatalog-europeeap.md.mp.microsoft.com.akadns.net, fs.microsoft.com, ris-prod.trafficmanager.net, displaycatalog.md.mp.microsoft.com.akadns.net, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, skypedataprdcolcus16.cloudapp.net, a767.dscg3.akamai.net, login.msa.msidentity.com, skypedataprdcolcus15.cloudapp.net, ris.api.iris.microsoft.com, blobcollector.events.data.trafficmanager.net, ams2.current.a.prd.aadg.trafficmanager.net
  • Report size getting too big, too many NtDeviceIoControlFile calls found.
  • Report size getting too big, too many NtOpenKeyEx calls found.
  • Report size getting too big, too many NtProtectVirtualMemory calls found.
  • Report size getting too big, too many NtQueryValueKey calls found.

Simulations

Behavior and APIs

No simulations

Joe Sandbox View / Context

IPs

No context

Domains

No context

ASN

MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
CLOUDFLARENETUSnotice of arrival.xlsxGet hashmaliciousBrowse
  • 172.67.8.238
LSuDNrw50J.exeGet hashmaliciousBrowse
  • 104.21.19.200
3aVBS43Xc2.exeGet hashmaliciousBrowse
  • 172.67.193.215
lumJSEHnFa.exeGet hashmaliciousBrowse
  • 172.67.184.253
A6Qom7We0l.exeGet hashmaliciousBrowse
  • 104.21.59.243
aUWqpYqmXT.exeGet hashmaliciousBrowse
  • 104.21.61.164
BHuuI8LETf.exeGet hashmaliciousBrowse
  • 104.21.59.243
m1hholPLan.exeGet hashmaliciousBrowse
  • 104.21.59.243
nyDyMJGKWD.exeGet hashmaliciousBrowse
  • 104.21.59.243
SX35.vbsGet hashmaliciousBrowse
  • 104.21.234.56
QQ56.vbsGet hashmaliciousBrowse
  • 104.21.234.56
UX74.vbsGet hashmaliciousBrowse
  • 104.21.234.56
EG45.vbsGet hashmaliciousBrowse
  • 104.21.234.57
MusicConverter.exeGet hashmaliciousBrowse
  • 172.67.160.132
SecuriteInfo.com.Gen.NN.ZevbaF.34804.fm0@aOq6Z7ci.exeGet hashmaliciousBrowse
  • 104.21.45.117
SecuriteInfo.com.Generic.mg.5229a9827d05b91b.exeGet hashmaliciousBrowse
  • 172.67.213.150
SecuriteInfo.com.Gen.NN.ZevbaF.34804.fm0@aOq6Z7ci.exeGet hashmaliciousBrowse
  • 104.21.45.117
Shipping Document PL&BL Draft (1).exeGet hashmaliciousBrowse
  • 104.21.1.20
ZRz0Aq1Rf0.dllGet hashmaliciousBrowse
  • 104.26.13.9
HA2a7FagC6.exeGet hashmaliciousBrowse
  • 172.67.185.212

JA3 Fingerprints

MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
37f463bf4616ecd445d4a1937da06e19SX35.vbsGet hashmaliciousBrowse
  • 104.21.45.75
QQ56.vbsGet hashmaliciousBrowse
  • 104.21.45.75
UX74.vbsGet hashmaliciousBrowse
  • 104.21.45.75
EG45.vbsGet hashmaliciousBrowse
  • 104.21.45.75
MusicConverter.exeGet hashmaliciousBrowse
  • 104.21.45.75
SecuriteInfo.com.Gen.NN.ZevbaF.34804.fm0@aOq6Z7ci.exeGet hashmaliciousBrowse
  • 104.21.45.75
SecuriteInfo.com.Gen.NN.ZevbaF.34804.fm0@aOq6Z7ci.exeGet hashmaliciousBrowse
  • 104.21.45.75
Document.exeGet hashmaliciousBrowse
  • 104.21.45.75
PRUEBA DE PAGO.exeGet hashmaliciousBrowse
  • 104.21.45.75
Invoice ID-(6457687).vbsGet hashmaliciousBrowse
  • 104.21.45.75
ORDEN_FH87565635456.exeGet hashmaliciousBrowse
  • 104.21.45.75
DHL_6368638172 receipt document,pdf.exeGet hashmaliciousBrowse
  • 104.21.45.75
558d9db9309b918e.exeGet hashmaliciousBrowse
  • 104.21.45.75
File_78476.xlsbGet hashmaliciousBrowse
  • 104.21.45.75
658908343Bel.htmlGet hashmaliciousBrowse
  • 104.21.45.75
#Ud83d#Udcde Herbalife.com AudioMessage_50-74981.htmGet hashmaliciousBrowse
  • 104.21.45.75
SecuriteInfo.com.Variant.Razy.292793.13062.exeGet hashmaliciousBrowse
  • 104.21.45.75
WinRAR_1845561462.exeGet hashmaliciousBrowse
  • 104.21.45.75
DHL_6368638172 receipt document,pdf.exeGet hashmaliciousBrowse
  • 104.21.45.75
SecuriteInfo.com.VB.Heur.EmoDldr.32.39676696.Gen.27336.docGet hashmaliciousBrowse
  • 104.21.45.75

Dropped Files

No context

Created / dropped Files

C:\Users\user\AppData\Roaming\Ilgyr\inaxa.dll
Process:C:\Windows\SysWOW64\msiexec.exe
File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
Category:dropped
Size (bytes):371200
Entropy (8bit):6.696631640331289
Encrypted:false
SSDEEP:6144:X5fVAHOvzY7zHY0Uxen/0TP1a2arz7JjOGG3v2WYXmpHdwpc2:X5wgmY0ZMTZIOGyv2WYWNdI
MD5:D2852A3B2A20846528CEC53426FD5F9C
SHA1:1FA892F9280708E7C82E958BEC516BB2B09351F3
SHA-256:8E50DA51386C2F267AFAF1A419E4467D62C01C9704F0E17C4AA188D0C090C8B2
SHA-512:247FAE9F2C9BDCA9D7EB4F44996E7E28D2CD9B7C87EA05A15B72ECB073750C8D9199D585771366687C43D802EB474E9486BB328D2984ABEB4AACEE62916CA2B6
Malicious:true
Antivirus:
  • Antivirus: Virustotal, Detection: 58%, Browse
  • Antivirus: Metadefender, Detection: 24%, Browse
  • Antivirus: ReversingLabs, Detection: 50%
Reputation:low
Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........8.M.V.M.V.M.V.S...Y.V.S...$.V.D...H.V.M.W.=.V.S...d.V.S...L.V.S...L.V.S...L.V.RichM.V.........................PE..L.....hK...........!.....<..........L........P............................................@..........................t..E....k..<....................................Q...............................W..@............P...............................text....:.......<.................. ..`.rdata...$...P...&...@..............@..@.data....1...........f..............@....rsrc................~..............@..@.reloc..~%.......&..................@..B........................................................................................................................................................................................................................................................................................................................

Static File Info

General

File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
Entropy (8bit):6.696631640331289
TrID:
  • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
  • Generic Win/DOS Executable (2004/3) 0.20%
  • DOS Executable Generic (2002/1) 0.20%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:ERRoqGpsIS.dll
File size:371200
MD5:d2852a3b2a20846528cec53426fd5f9c
SHA1:1fa892f9280708e7c82e958bec516bb2b09351f3
SHA256:8e50da51386c2f267afaf1a419e4467d62c01c9704f0e17c4aa188d0c090c8b2
SHA512:247fae9f2c9bdca9d7eb4f44996e7e28d2cd9b7c87ea05a15b72ecb073750c8d9199d585771366687c43d802eb474e9486bb328d2984abeb4aacee62916ca2b6
SSDEEP:6144:X5fVAHOvzY7zHY0Uxen/0TP1a2arz7JjOGG3v2WYXmpHdwpc2:X5wgmY0ZMTZIOGyv2WYWNdI
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........8.M.V.M.V.M.V.S...Y.V.S...$.V.D...H.V.M.W.=.V.S...d.V.S...L.V.S...L.V.S...L.V.RichM.V.........................PE..L.....hK...

File Icon

Icon Hash:74f0e4ecccdce0e4

Static PE Info

General

Entrypoint:0x10038f4c
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x10000000
Subsystem:windows gui
Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
DLL Characteristics:DYNAMIC_BASE
Time Stamp:0x4B688CFC [Tue Feb 2 20:37:16 2010 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:5
OS Version Minor:0
File Version Major:5
File Version Minor:0
Subsystem Version Major:5
Subsystem Version Minor:0
Import Hash:ac24111956da8096856f399aab20c9c0

Entrypoint Preview

Instruction
mov edi, edi
push ebp
mov ebp, esp
cmp dword ptr [ebp+0Ch], 01h
jne 00007FCD40E11727h
call 00007FCD40E17991h
push dword ptr [ebp+08h]
mov ecx, dword ptr [ebp+10h]
mov edx, dword ptr [ebp+0Ch]
call 00007FCD40E11611h
pop ecx
pop ebp
retn 000Ch
mov edi, edi
push ebp
mov ebp, esp
mov eax, dword ptr [ebp+08h]
xor ecx, ecx
cmp eax, dword ptr [10058628h+ecx*8]
je 00007FCD40E11735h
inc ecx
cmp ecx, 2Dh
jc 00007FCD40E11713h
lea ecx, dword ptr [eax-13h]
cmp ecx, 11h
jnbe 00007FCD40E11730h
push 0000000Dh
pop eax
pop ebp
ret
mov eax, dword ptr [1005862Ch+ecx*8]
pop ebp
ret
add eax, FFFFFF44h
push 0000000Eh
pop ecx
cmp ecx, eax
sbb eax, eax
and eax, ecx
add eax, 08h
pop ebp
ret
call 00007FCD40E13B21h
test eax, eax
jne 00007FCD40E11728h
mov eax, 10058790h
ret
add eax, 08h
ret
call 00007FCD40E13B0Eh
test eax, eax
jne 00007FCD40E11728h
mov eax, 10058794h
ret
add eax, 0Ch
ret
mov edi, edi
push ebp
mov ebp, esp
push esi
call 00007FCD40E11707h
mov ecx, dword ptr [ebp+08h]
push ecx
mov dword ptr [eax], ecx
call 00007FCD40E116A7h
pop ecx
mov esi, eax
call 00007FCD40E116E1h
mov dword ptr [eax], esi
pop esi
pop ebp
ret
mov edi, edi
push ebp
mov ebp, esp
mov eax, dword ptr [ebp+08h]
mov dword ptr [1006A5ECh], eax
pop ebp
ret
mov edi, edi
push ebp
mov ebp, esp
sub esp, 00000328h

Rich Headers

Programming Language:
  • [ C ] VS2008 build 21022
  • [ASM] VS2008 build 21022
  • [LNK] VS2008 build 21022
  • [RES] VS2008 build 21022
  • [EXP] VS2008 build 21022
  • [IMP] VS2008 SP1 build 30729
  • [C++] VS2008 build 21022

Data Directories

NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x574800x45.rdata
IMAGE_DIRECTORY_ENTRY_IMPORT0x56b9c0x3c.rdata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x6c0000x518.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x6d0000x16f8.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x451c00x1c.rdata
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x557c80x40.rdata
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x450000x18c.rdata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

Sections

NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x43abe0x43c00False0.716375259456data6.67890498403IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
.rdata0x450000x124c50x12600False0.576570471939data6.42887953464IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0x580000x131c40x1800False0.326822916667data4.20462332091IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
.rsrc0x6c0000x5180x600False0.376953125data2.9425525328IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0x6d0000x257e0x2600False0.490748355263data4.89739942249IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

Resources

NameRVASizeTypeLanguageCountry
RT_STRING0x6c3e00x138dataEnglishUnited States
RT_VERSION0x6c0a00x340dataEnglishUnited States

Imports

DLLImport
KERNEL32.dllGetFileAttributesA, GetTempFileNameA, CopyFileA, GetShortPathNameA, GetEnvironmentVariableA, WaitForMultipleObjects, QueryPerformanceCounter, CreateFileA, GetWindowsDirectoryA, GetSystemTime, OpenProcess, GetVersionExA, GetModuleHandleA, GetDateFormatA, SizeofResource, LoadResource, Sleep, GetCurrentDirectoryA, VirtualProtect, FindFirstChangeNotificationA, WriteConsoleW, GetConsoleOutputCP, WriteConsoleA, SetFileAttributesA, GetLastError, DuplicateHandle, GetCurrentProcess, CloseHandle, HeapFree, HeapReAlloc, HeapAlloc, RtlUnwind, GetCurrentThreadId, GetCommandLineA, TerminateProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, SetStdHandle, EnterCriticalSection, LeaveCriticalSection, GetFileType, SetHandleCount, GetStdHandle, GetStartupInfoA, DeleteCriticalSection, GetProcAddress, WriteFile, GetModuleFileNameA, GetModuleHandleW, TlsGetValue, TlsAlloc, TlsSetValue, TlsFree, InterlockedIncrement, SetLastError, InterlockedDecrement, HeapCreate, HeapDestroy, VirtualFree, VirtualAlloc, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, LCMapStringA, WideCharToMultiByte, MultiByteToWideChar, LCMapStringW, ExitProcess, RaiseException, HeapSize, FreeEnvironmentStringsA, GetEnvironmentStrings, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetTickCount, GetCurrentProcessId, GetSystemTimeAsFileTime, InitializeCriticalSectionAndSpinCount, GetConsoleCP, GetConsoleMode, SetFilePointer, SetEndOfFile, GetProcessHeap, ReadFile, LoadLibraryA, GetLocaleInfoA, GetStringTypeA, GetStringTypeW
WINSPOOL.DRVGetJobA, EnumPrintersA, GetPrinterDataA, AddPrinterConnectionA, OpenPrinterA, DocumentPropertiesA, ClosePrinter

Exports

NameOrdinalAddress
Knowequal10x10031210

Version Infos

DescriptionData
LegalCopyrightCopyright 2006, Pound sense Blackmiss
InternalNameRain.dll
FileVersion2.8.7.867
CompanyNamePound sense
LegalTrademarksTrade shout
Commentshttp://www.enoughthose.de
ProductNameTrade shout Modernplant
ProductVersion2.8.7.867
FileDescriptionTrade shout
Translation0x0409 0x04b0

Possible Origin

Language of compilation systemCountry where language is spokenMap
EnglishUnited States

Network Behavior

Network Port Distribution

TCP Packets

TimestampSource PortDest PortSource IPDest IP
Feb 14, 2021 15:14:49.487767935 CET49728443192.168.2.3104.21.45.75
Feb 14, 2021 15:14:49.534969091 CET44349728104.21.45.75192.168.2.3
Feb 14, 2021 15:14:49.535067081 CET49728443192.168.2.3104.21.45.75
Feb 14, 2021 15:14:49.610646009 CET49728443192.168.2.3104.21.45.75
Feb 14, 2021 15:14:49.659398079 CET44349728104.21.45.75192.168.2.3
Feb 14, 2021 15:14:49.666059971 CET44349728104.21.45.75192.168.2.3
Feb 14, 2021 15:14:49.666114092 CET44349728104.21.45.75192.168.2.3
Feb 14, 2021 15:14:49.666140079 CET49728443192.168.2.3104.21.45.75
Feb 14, 2021 15:14:49.666178942 CET49728443192.168.2.3104.21.45.75
Feb 14, 2021 15:14:49.751667023 CET49728443192.168.2.3104.21.45.75
Feb 14, 2021 15:14:49.798507929 CET44349728104.21.45.75192.168.2.3
Feb 14, 2021 15:14:49.798583984 CET44349728104.21.45.75192.168.2.3
Feb 14, 2021 15:14:49.798669100 CET49728443192.168.2.3104.21.45.75
Feb 14, 2021 15:14:49.812918901 CET49728443192.168.2.3104.21.45.75
Feb 14, 2021 15:14:49.859961033 CET44349728104.21.45.75192.168.2.3
Feb 14, 2021 15:16:29.933207989 CET44349728104.21.45.75192.168.2.3
Feb 14, 2021 15:16:29.933254957 CET44349728104.21.45.75192.168.2.3
Feb 14, 2021 15:16:29.933281898 CET44349728104.21.45.75192.168.2.3
Feb 14, 2021 15:16:29.933309078 CET44349728104.21.45.75192.168.2.3
Feb 14, 2021 15:16:29.934592962 CET49728443192.168.2.3104.21.45.75
Feb 14, 2021 15:16:29.948129892 CET49728443192.168.2.3104.21.45.75
Feb 14, 2021 15:16:29.948185921 CET49728443192.168.2.3104.21.45.75
Feb 14, 2021 15:16:29.994148016 CET49740443192.168.2.3104.21.45.75
Feb 14, 2021 15:16:29.994843960 CET44349728104.21.45.75192.168.2.3
Feb 14, 2021 15:16:29.995969057 CET49728443192.168.2.3104.21.45.75
Feb 14, 2021 15:16:30.043862104 CET44349740104.21.45.75192.168.2.3
Feb 14, 2021 15:16:30.044997931 CET49740443192.168.2.3104.21.45.75
Feb 14, 2021 15:16:30.045798063 CET49740443192.168.2.3104.21.45.75
Feb 14, 2021 15:16:30.095467091 CET44349740104.21.45.75192.168.2.3
Feb 14, 2021 15:16:30.100220919 CET44349740104.21.45.75192.168.2.3
Feb 14, 2021 15:16:30.101340055 CET49740443192.168.2.3104.21.45.75
Feb 14, 2021 15:16:30.102818966 CET49740443192.168.2.3104.21.45.75
Feb 14, 2021 15:16:30.111588001 CET49740443192.168.2.3104.21.45.75
Feb 14, 2021 15:16:30.152415991 CET44349740104.21.45.75192.168.2.3
Feb 14, 2021 15:16:30.158453941 CET44349740104.21.45.75192.168.2.3

UDP Packets

TimestampSource PortDest PortSource IPDest IP
Feb 14, 2021 15:13:53.779870987 CET5598453192.168.2.38.8.8.8
Feb 14, 2021 15:13:53.833713055 CET53559848.8.8.8192.168.2.3
Feb 14, 2021 15:13:54.783674002 CET6418553192.168.2.38.8.8.8
Feb 14, 2021 15:13:54.834642887 CET53641858.8.8.8192.168.2.3
Feb 14, 2021 15:13:55.744131088 CET6511053192.168.2.38.8.8.8
Feb 14, 2021 15:13:55.797287941 CET53651108.8.8.8192.168.2.3
Feb 14, 2021 15:13:56.768134117 CET5836153192.168.2.38.8.8.8
Feb 14, 2021 15:13:56.818962097 CET53583618.8.8.8192.168.2.3
Feb 14, 2021 15:13:58.000653028 CET6349253192.168.2.38.8.8.8
Feb 14, 2021 15:13:58.051071882 CET53634928.8.8.8192.168.2.3
Feb 14, 2021 15:13:58.969991922 CET6083153192.168.2.38.8.8.8
Feb 14, 2021 15:13:59.018657923 CET53608318.8.8.8192.168.2.3
Feb 14, 2021 15:14:02.556644917 CET6010053192.168.2.38.8.8.8
Feb 14, 2021 15:14:02.614069939 CET53601008.8.8.8192.168.2.3
Feb 14, 2021 15:14:03.568470001 CET5319553192.168.2.38.8.8.8
Feb 14, 2021 15:14:03.617177010 CET53531958.8.8.8192.168.2.3
Feb 14, 2021 15:14:04.558250904 CET5014153192.168.2.38.8.8.8
Feb 14, 2021 15:14:04.608815908 CET53501418.8.8.8192.168.2.3
Feb 14, 2021 15:14:05.496462107 CET5302353192.168.2.38.8.8.8
Feb 14, 2021 15:14:05.545178890 CET53530238.8.8.8192.168.2.3
Feb 14, 2021 15:14:06.416781902 CET4956353192.168.2.38.8.8.8
Feb 14, 2021 15:14:06.468369007 CET53495638.8.8.8192.168.2.3
Feb 14, 2021 15:14:07.459033966 CET5135253192.168.2.38.8.8.8
Feb 14, 2021 15:14:07.516412973 CET53513528.8.8.8192.168.2.3
Feb 14, 2021 15:14:27.337965012 CET5934953192.168.2.38.8.8.8
Feb 14, 2021 15:14:27.396882057 CET53593498.8.8.8192.168.2.3
Feb 14, 2021 15:14:33.424895048 CET5708453192.168.2.38.8.8.8
Feb 14, 2021 15:14:33.475251913 CET53570848.8.8.8192.168.2.3
Feb 14, 2021 15:14:34.051234007 CET5882353192.168.2.38.8.8.8
Feb 14, 2021 15:14:34.099978924 CET53588238.8.8.8192.168.2.3
Feb 14, 2021 15:14:42.394396067 CET5756853192.168.2.38.8.8.8
Feb 14, 2021 15:14:42.455096006 CET53575688.8.8.8192.168.2.3
Feb 14, 2021 15:14:43.366034031 CET5054053192.168.2.38.8.8.8
Feb 14, 2021 15:14:43.424896955 CET53505408.8.8.8192.168.2.3
Feb 14, 2021 15:14:49.401484966 CET5436653192.168.2.38.8.8.8
Feb 14, 2021 15:14:49.471363068 CET53543668.8.8.8192.168.2.3
Feb 14, 2021 15:14:55.091443062 CET5303453192.168.2.38.8.8.8
Feb 14, 2021 15:14:55.215946913 CET53530348.8.8.8192.168.2.3
Feb 14, 2021 15:15:09.721174002 CET5776253192.168.2.38.8.8.8
Feb 14, 2021 15:15:09.772667885 CET53577628.8.8.8192.168.2.3
Feb 14, 2021 15:15:12.800273895 CET5543553192.168.2.38.8.8.8
Feb 14, 2021 15:15:12.858443975 CET53554358.8.8.8192.168.2.3
Feb 14, 2021 15:15:44.174472094 CET5071353192.168.2.38.8.8.8
Feb 14, 2021 15:15:44.226191044 CET53507138.8.8.8192.168.2.3
Feb 14, 2021 15:15:46.026094913 CET5613253192.168.2.38.8.8.8
Feb 14, 2021 15:15:46.086096048 CET53561328.8.8.8192.168.2.3
Feb 14, 2021 15:16:42.294533014 CET5898753192.168.2.38.8.8.8
Feb 14, 2021 15:16:42.383766890 CET53589878.8.8.8192.168.2.3
Feb 14, 2021 15:16:43.128657103 CET5657953192.168.2.38.8.8.8
Feb 14, 2021 15:16:43.219723940 CET53565798.8.8.8192.168.2.3
Feb 14, 2021 15:16:43.708333015 CET6063353192.168.2.38.8.8.8
Feb 14, 2021 15:16:43.768307924 CET53606338.8.8.8192.168.2.3
Feb 14, 2021 15:16:44.137789965 CET6129253192.168.2.38.8.8.8
Feb 14, 2021 15:16:44.194751024 CET53612928.8.8.8192.168.2.3
Feb 14, 2021 15:16:44.588352919 CET6361953192.168.2.38.8.8.8
Feb 14, 2021 15:16:44.637173891 CET53636198.8.8.8192.168.2.3
Feb 14, 2021 15:16:45.082493067 CET6493853192.168.2.38.8.8.8
Feb 14, 2021 15:16:45.142441034 CET53649388.8.8.8192.168.2.3
Feb 14, 2021 15:16:45.608637094 CET6194653192.168.2.38.8.8.8
Feb 14, 2021 15:16:45.667982101 CET53619468.8.8.8192.168.2.3
Feb 14, 2021 15:16:46.241221905 CET6491053192.168.2.38.8.8.8
Feb 14, 2021 15:16:46.300915003 CET53649108.8.8.8192.168.2.3
Feb 14, 2021 15:16:46.914968014 CET5212353192.168.2.38.8.8.8
Feb 14, 2021 15:16:46.972372055 CET53521238.8.8.8192.168.2.3
Feb 14, 2021 15:16:47.374217987 CET5613053192.168.2.38.8.8.8
Feb 14, 2021 15:16:47.436702013 CET53561308.8.8.8192.168.2.3

DNS Queries

TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
Feb 14, 2021 15:14:49.401484966 CET192.168.2.38.8.8.80xddeStandard query (0)earfetti.comA (IP address)IN (0x0001)

DNS Answers

TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
Feb 14, 2021 15:14:33.475251913 CET8.8.8.8192.168.2.30xd5beNo error (0)prda.aadg.msidentity.comwww.tm.a.prd.aadg.trafficmanager.netCNAME (Canonical name)IN (0x0001)
Feb 14, 2021 15:14:49.471363068 CET8.8.8.8192.168.2.30xddeNo error (0)earfetti.com104.21.45.75A (IP address)IN (0x0001)
Feb 14, 2021 15:14:49.471363068 CET8.8.8.8192.168.2.30xddeNo error (0)earfetti.com172.67.211.56A (IP address)IN (0x0001)

HTTPS Packets

TimestampSource IPSource PortDest IPDest PortSubjectIssuerNot BeforeNot AfterJA3 SSL Client FingerprintJA3 SSL Client Digest
Feb 14, 2021 15:14:49.666114092 CET104.21.45.75443192.168.2.349728CN=sni.cloudflaressl.com, O="Cloudflare, Inc.", L=San Francisco, ST=CA, C=US CN=Cloudflare Inc ECC CA-3, O="Cloudflare, Inc.", C=USCN=Cloudflare Inc ECC CA-3, O="Cloudflare, Inc.", C=US CN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore, C=IEThu Jan 28 01:00:00 CET 2021 Mon Jan 27 13:48:08 CET 2020Fri Jan 28 00:59:59 CET 2022 Wed Jan 01 00:59:59 CET 2025771,49196-49195-49200-49199-49188-49187-49192-49191-49162-49161-49172-49171-157-156-61-60-53-47-10,0-10-11-13-35-23-65281,29-23-24,037f463bf4616ecd445d4a1937da06e19
CN=Cloudflare Inc ECC CA-3, O="Cloudflare, Inc.", C=USCN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore, C=IEMon Jan 27 13:48:08 CET 2020Wed Jan 01 00:59:59 CET 2025

Code Manipulations

Statistics

Behavior

Click to jump to process

System Behavior

General

Start time:15:13:59
Start date:14/02/2021
Path:C:\Windows\System32\loaddll32.exe
Wow64 process (32bit):true
Commandline:loaddll32.exe 'C:\Users\user\Desktop\ERRoqGpsIS.dll'
Imagebase:0x150000
File size:121856 bytes
MD5 hash:99D621E00EFC0B8F396F38D5555EB078
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:moderate

General

Start time:15:14:44
Start date:14/02/2021
Path:C:\Windows\SysWOW64\msiexec.exe
Wow64 process (32bit):true
Commandline:msiexec.exe
Imagebase:0x12a0000
File size:59904 bytes
MD5 hash:12C17B5A5C2A7B97342C362CA467E9A2
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high

Disassembly

Code Analysis

Reset < >