Loading ...

Play interactive tourEdit tour

Analysis Report RuRxpMUPN7

Overview

General Information

Sample Name:RuRxpMUPN7 (renamed file extension from none to dll)
Analysis ID:392882
MD5:f6a73ad1c962b6d3d979066d37da71b5
SHA1:c19b72b1b07a8065f2a62be97cb1cccfb1d5b93f
SHA256:8d357ea7f4cbfcbbd9af86a34c421b7011204c83efa788b2527a79f9c464f287
Tags:40111Dridex
Infos:

Most interesting Screenshot:

Detection

Dridex Dropper
Score:80
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Dridex dropper found
Found malware configuration
Yara detected Dridex unpacked file
C2 URLs / IPs found in malware configuration
Machine Learning detection for sample
Tries to delay execution (extensive OutputDebugStringW loop)
Tries to detect sandboxes / dynamic malware analysis system (file name check)
Abnormal high CPU Usage
Antivirus or Machine Learning detection for unpacked file
Contains functionality to call native functions
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to query locales information (e.g. system language)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
One or more processes crash
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

Startup

  • System is w10x64
  • loaddll32.exe (PID: 1416 cmdline: loaddll32.exe 'C:\Users\user\Desktop\RuRxpMUPN7.dll' MD5: 542795ADF7CC08EFCF675D65310596E8)
    • cmd.exe (PID: 4512 cmdline: cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\RuRxpMUPN7.dll',#1 MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • rundll32.exe (PID: 4356 cmdline: rundll32.exe 'C:\Users\user\Desktop\RuRxpMUPN7.dll',#1 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 6692 cmdline: rundll32.exe 'C:\Users\user\Desktop\RuRxpMUPN7.dll',ReadLogRecord MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • WerFault.exe (PID: 6784 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 1416 -s 440 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
  • cleanup

Malware Configuration

Threatname: Dridex

{"Version": 40111, "C2 list": ["94.247.168.64:443", "159.203.93.122:8172", "50.116.27.97:2303"], "RC4 keys": ["VOw9c7u110XYjoFF2SzRWNcWNob7Sec1HxEVgBrFF", "5gZeCc8o5cQELWnF44Ik184W6MoZ25O98Rol7kPT2itFWvdxWiT70K4o4YnFUN4mL"]}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000003.00000002.513214824.0000000072AD1000.00000020.00020000.sdmpJoeSecurity_Dridex_1Yara detected Dridex unpacked fileJoe Security
    00000008.00000002.511726396.0000000072AD1000.00000020.00020000.sdmpJoeSecurity_Dridex_1Yara detected Dridex unpacked fileJoe Security

      Unpacked PEs

      SourceRuleDescriptionAuthorStrings
      3.2.rundll32.exe.72ad0000.3.unpackJoeSecurity_Dridex_1Yara detected Dridex unpacked fileJoe Security
        8.2.rundll32.exe.72ad0000.3.unpackJoeSecurity_Dridex_1Yara detected Dridex unpacked fileJoe Security

          Sigma Overview

          No Sigma rule has matched

          Signature Overview

          Click to jump to signature section

          Show All Signature Results

          AV Detection:

          barindex
          Found malware configurationShow sources
          Source: 3.2.rundll32.exe.72ad0000.3.unpackMalware Configuration Extractor: Dridex {"Version": 40111, "C2 list": ["94.247.168.64:443", "159.203.93.122:8172", "50.116.27.97:2303"], "RC4 keys": ["VOw9c7u110XYjoFF2SzRWNcWNob7Sec1HxEVgBrFF", "5gZeCc8o5cQELWnF44Ik184W6MoZ25O98Rol7kPT2itFWvdxWiT70K4o4YnFUN4mL"]}
          Machine Learning detection for sampleShow sources
          Source: RuRxpMUPN7.dllJoe Sandbox ML: detected
          Source: 3.2.rundll32.exe.2fa0000.2.unpackAvira: Label: TR/ATRAPS.Gen2
          Source: 8.2.rundll32.exe.2b90000.2.unpackAvira: Label: TR/ATRAPS.Gen2
          Source: 1.2.loaddll32.exe.640000.1.unpackAvira: Label: TR/ATRAPS.Gen2
          Source: RuRxpMUPN7.dllStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
          Source: RuRxpMUPN7.dllStatic PE information: TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
          Source: Binary string: opengl32.pdb source: WerFault.exe, 0000000B.00000003.350591843.0000000004B08000.00000004.00000040.sdmp
          Source: Binary string: wgdi32full.pdb source: WerFault.exe, 0000000B.00000003.350557586.0000000004B02000.00000004.00000040.sdmp
          Source: Binary string: wkernel32.pdb source: WerFault.exe, 0000000B.00000003.339834810.00000000008B3000.00000004.00000001.sdmp
          Source: Binary string: sechost.pdb source: WerFault.exe, 0000000B.00000003.350557586.0000000004B02000.00000004.00000040.sdmp
          Source: Binary string: ucrtbase.pdb source: WerFault.exe, 0000000B.00000003.350553195.0000000004B31000.00000004.00000001.sdmp
          Source: Binary string: wgdi32full.pdbk source: WerFault.exe, 0000000B.00000003.350557586.0000000004B02000.00000004.00000040.sdmp
          Source: Binary string: msvcrt.pdb source: WerFault.exe, 0000000B.00000003.350591843.0000000004B08000.00000004.00000040.sdmp
          Source: Binary string: wntdll.pdbUGP source: rundll32.exe, 00000003.00000003.331405195.000000004B280000.00000004.00000001.sdmp, rundll32.exe, 00000008.00000003.406325341.000000004B280000.00000004.00000001.sdmp
          Source: Binary string: glu32.pdb source: WerFault.exe, 0000000B.00000003.350591843.0000000004B08000.00000004.00000040.sdmp
          Source: Binary string: wrpcrt4.pdb source: WerFault.exe, 0000000B.00000003.350553195.0000000004B31000.00000004.00000001.sdmp
          Source: Binary string: wntdll.pdb source: rundll32.exe, 00000003.00000003.331405195.000000004B280000.00000004.00000001.sdmp, rundll32.exe, 00000008.00000003.406325341.000000004B280000.00000004.00000001.sdmp, WerFault.exe, 0000000B.00000003.339825322.00000000008AD000.00000004.00000001.sdmp
          Source: Binary string: opengl32.pdbj source: WerFault.exe, 0000000B.00000003.350591843.0000000004B08000.00000004.00000040.sdmp
          Source: Binary string: ole32.pdb source: WerFault.exe, 0000000B.00000003.350553195.0000000004B31000.00000004.00000001.sdmp
          Source: Binary string: wgdi32.pdb source: WerFault.exe, 0000000B.00000003.350557586.0000000004B02000.00000004.00000040.sdmp
          Source: Binary string: advapi32.pdb source: WerFault.exe, 0000000B.00000003.350591843.0000000004B08000.00000004.00000040.sdmp
          Source: Binary string: wsspicli.pdb source: WerFault.exe, 0000000B.00000003.350553195.0000000004B31000.00000004.00000001.sdmp
          Source: Binary string: fffp4.pdb source: WerFault.exe, 0000000B.00000003.350553195.0000000004B31000.00000004.00000001.sdmp, RuRxpMUPN7.dll
          Source: Binary string: msvcp_win.pdb source: WerFault.exe, 0000000B.00000003.350581972.0000000004B00000.00000004.00000040.sdmp
          Source: Binary string: wgdi32.pdbk source: WerFault.exe, 0000000B.00000003.350557586.0000000004B02000.00000004.00000040.sdmp
          Source: Binary string: cryptbase.pdb source: WerFault.exe, 0000000B.00000003.350553195.0000000004B31000.00000004.00000001.sdmp
          Source: Binary string: sechost.pdbk source: WerFault.exe, 0000000B.00000003.350557586.0000000004B02000.00000004.00000040.sdmp
          Source: Binary string: wimm32.pdb source: WerFault.exe, 0000000B.00000003.350591843.0000000004B08000.00000004.00000040.sdmp
          Source: Binary string: wkernelbase.pdb source: WerFault.exe, 0000000B.00000003.350553195.0000000004B31000.00000004.00000001.sdmp
          Source: Binary string: bcryptprimitives.pdb source: WerFault.exe, 0000000B.00000003.350553195.0000000004B31000.00000004.00000001.sdmp
          Source: Binary string: wkernelbase.pdb( source: WerFault.exe, 0000000B.00000003.339850217.00000000008B9000.00000004.00000001.sdmp
          Source: Binary string: msvcrt.pdbT source: WerFault.exe, 0000000B.00000003.350591843.0000000004B08000.00000004.00000040.sdmp
          Source: Binary string: combase.pdb source: WerFault.exe, 0000000B.00000003.350553195.0000000004B31000.00000004.00000001.sdmp
          Source: Binary string: wwin32u.pdb source: WerFault.exe, 0000000B.00000003.350581972.0000000004B00000.00000004.00000040.sdmp
          Source: Binary string: azojr}oCReportStore::Prune: MaxReportCount=%d MaxSizeInMb=%dRSDSwkernel32.pdb source: WerFault.exe, 0000000B.00000002.372783936.0000000000332000.00000004.00000010.sdmp
          Source: Binary string: wkernel32.pdb( source: WerFault.exe, 0000000B.00000003.339834810.00000000008B3000.00000004.00000001.sdmp
          Source: Binary string: apphelp.pdb source: WerFault.exe, 0000000B.00000003.350553195.0000000004B31000.00000004.00000001.sdmp
          Source: Binary string: wuser32.pdb source: WerFault.exe, 0000000B.00000003.350581972.0000000004B00000.00000004.00000040.sdmp
          Source: Binary string: wntdll.pdb( source: WerFault.exe, 0000000B.00000003.339825322.00000000008AD000.00000004.00000001.sdmp

          Networking:

          barindex
          C2 URLs / IPs found in malware configurationShow sources
          Source: Malware configuration extractorIPs: 94.247.168.64:443
          Source: Malware configuration extractorIPs: 159.203.93.122:8172
          Source: Malware configuration extractorIPs: 50.116.27.97:2303
          Source: Joe Sandbox ViewIP Address: 159.203.93.122 159.203.93.122
          Source: Joe Sandbox ViewIP Address: 50.116.27.97 50.116.27.97
          Source: Joe Sandbox ViewASN Name: DIGITALOCEAN-ASNUS DIGITALOCEAN-ASNUS
          Source: Joe Sandbox ViewASN Name: LINODE-APLinodeLLCUS LINODE-APLinodeLLCUS
          Source: RuRxpMUPN7.dllString found in binary or memory: http://ansicon.adoxa.vze.com/6

          E-Banking Fraud:

          barindex
          Dridex dropper foundShow sources
          Source: Initial fileSignature Results: Dridex dropper behavior
          Yara detected Dridex unpacked fileShow sources
          Source: Yara matchFile source: 00000003.00000002.513214824.0000000072AD1000.00000020.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000002.511726396.0000000072AD1000.00000020.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 3.2.rundll32.exe.72ad0000.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 8.2.rundll32.exe.72ad0000.3.unpack, type: UNPACKEDPE
          Source: C:\Windows\SysWOW64\rundll32.exeProcess Stats: CPU usage > 98%
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_72AE2790 NtAllocateVirtualMemory,
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_72AE218C NtDelayExecution,
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_72ADBC00 NtClose,
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_72AE07CC
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_72AD1494
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_72AE92DC
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_72AD84E4
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_72AE14D8
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_72ADA5A4
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_72AD9144
          Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 1416 -s 440
          Source: RuRxpMUPN7.dllBinary or memory string: OriginalFilenameANSI32.dll0 vs RuRxpMUPN7.dll
          Source: RuRxpMUPN7.dllStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
          Source: RuRxpMUPN7.dllStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: classification engineClassification label: mal80.bank.troj.evad.winDLL@8/4@0/3
          Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess1416
          Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\WER2B47.tmpJump to behavior
          Source: RuRxpMUPN7.dllStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\RuRxpMUPN7.dll',#1
          Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe 'C:\Users\user\Desktop\RuRxpMUPN7.dll'
          Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\RuRxpMUPN7.dll',#1
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\RuRxpMUPN7.dll',#1
          Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\RuRxpMUPN7.dll',ReadLogRecord
          Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 1416 -s 440
          Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\RuRxpMUPN7.dll',#1
          Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\RuRxpMUPN7.dll',ReadLogRecord
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\RuRxpMUPN7.dll',#1
          Source: RuRxpMUPN7.dllStatic PE information: TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
          Source: RuRxpMUPN7.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
          Source: Binary string: opengl32.pdb source: WerFault.exe, 0000000B.00000003.350591843.0000000004B08000.00000004.00000040.sdmp
          Source: Binary string: wgdi32full.pdb source: WerFault.exe, 0000000B.00000003.350557586.0000000004B02000.00000004.00000040.sdmp
          Source: Binary string: wkernel32.pdb source: WerFault.exe, 0000000B.00000003.339834810.00000000008B3000.00000004.00000001.sdmp
          Source: Binary string: sechost.pdb source: WerFault.exe, 0000000B.00000003.350557586.0000000004B02000.00000004.00000040.sdmp
          Source: Binary string: ucrtbase.pdb source: WerFault.exe, 0000000B.00000003.350553195.0000000004B31000.00000004.00000001.sdmp
          Source: Binary string: wgdi32full.pdbk source: WerFault.exe, 0000000B.00000003.350557586.0000000004B02000.00000004.00000040.sdmp
          Source: Binary string: msvcrt.pdb source: WerFault.exe, 0000000B.00000003.350591843.0000000004B08000.00000004.00000040.sdmp
          Source: Binary string: wntdll.pdbUGP source: rundll32.exe, 00000003.00000003.331405195.000000004B280000.00000004.00000001.sdmp, rundll32.exe, 00000008.00000003.406325341.000000004B280000.00000004.00000001.sdmp
          Source: Binary string: glu32.pdb source: WerFault.exe, 0000000B.00000003.350591843.0000000004B08000.00000004.00000040.sdmp
          Source: Binary string: wrpcrt4.pdb source: WerFault.exe, 0000000B.00000003.350553195.0000000004B31000.00000004.00000001.sdmp
          Source: Binary string: wntdll.pdb source: rundll32.exe, 00000003.00000003.331405195.000000004B280000.00000004.00000001.sdmp, rundll32.exe, 00000008.00000003.406325341.000000004B280000.00000004.00000001.sdmp, WerFault.exe, 0000000B.00000003.339825322.00000000008AD000.00000004.00000001.sdmp
          Source: Binary string: opengl32.pdbj source: WerFault.exe, 0000000B.00000003.350591843.0000000004B08000.00000004.00000040.sdmp
          Source: Binary string: ole32.pdb source: WerFault.exe, 0000000B.00000003.350553195.0000000004B31000.00000004.00000001.sdmp
          Source: Binary string: wgdi32.pdb source: WerFault.exe, 0000000B.00000003.350557586.0000000004B02000.00000004.00000040.sdmp
          Source: Binary string: advapi32.pdb source: WerFault.exe, 0000000B.00000003.350591843.0000000004B08000.00000004.00000040.sdmp
          Source: Binary string: wsspicli.pdb source: WerFault.exe, 0000000B.00000003.350553195.0000000004B31000.00000004.00000001.sdmp
          Source: Binary string: fffp4.pdb source: WerFault.exe, 0000000B.00000003.350553195.0000000004B31000.00000004.00000001.sdmp, RuRxpMUPN7.dll
          Source: Binary string: msvcp_win.pdb source: WerFault.exe, 0000000B.00000003.350581972.0000000004B00000.00000004.00000040.sdmp
          Source: Binary string: wgdi32.pdbk source: WerFault.exe, 0000000B.00000003.350557586.0000000004B02000.00000004.00000040.sdmp
          Source: Binary string: cryptbase.pdb source: WerFault.exe, 0000000B.00000003.350553195.0000000004B31000.00000004.00000001.sdmp
          Source: Binary string: sechost.pdbk source: WerFault.exe, 0000000B.00000003.350557586.0000000004B02000.00000004.00000040.sdmp
          Source: Binary string: wimm32.pdb source: WerFault.exe, 0000000B.00000003.350591843.0000000004B08000.00000004.00000040.sdmp
          Source: Binary string: wkernelbase.pdb source: WerFault.exe, 0000000B.00000003.350553195.0000000004B31000.00000004.00000001.sdmp
          Source: Binary string: bcryptprimitives.pdb source: WerFault.exe, 0000000B.00000003.350553195.0000000004B31000.00000004.00000001.sdmp
          Source: Binary string: wkernelbase.pdb( source: WerFault.exe, 0000000B.00000003.339850217.00000000008B9000.00000004.00000001.sdmp
          Source: Binary string: msvcrt.pdbT source: WerFault.exe, 0000000B.00000003.350591843.0000000004B08000.00000004.00000040.sdmp
          Source: Binary string: combase.pdb source: WerFault.exe, 0000000B.00000003.350553195.0000000004B31000.00000004.00000001.sdmp
          Source: Binary string: wwin32u.pdb source: WerFault.exe, 0000000B.00000003.350581972.0000000004B00000.00000004.00000040.sdmp
          Source: Binary string: azojr}oCReportStore::Prune: MaxReportCount=%d MaxSizeInMb=%dRSDSwkernel32.pdb source: WerFault.exe, 0000000B.00000002.372783936.0000000000332000.00000004.00000010.sdmp
          Source: Binary string: wkernel32.pdb( source: WerFault.exe, 0000000B.00000003.339834810.00000000008B3000.00000004.00000001.sdmp
          Source: Binary string: apphelp.pdb source: WerFault.exe, 0000000B.00000003.350553195.0000000004B31000.00000004.00000001.sdmp
          Source: Binary string: wuser32.pdb source: WerFault.exe, 0000000B.00000003.350581972.0000000004B00000.00000004.00000040.sdmp
          Source: Binary string: wntdll.pdb( source: WerFault.exe, 0000000B.00000003.339825322.00000000008AD000.00000004.00000001.sdmp
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_72ADF744 push esi; mov dword ptr [esp], 00000000h
          Source: initial sampleStatic PE information: section name: .text entropy: 7.55877156847
          Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX

          Malware Analysis System Evasion:

          barindex
          Tries to delay execution (extensive OutputDebugStringW loop)Show sources
          Source: C:\Windows\SysWOW64\rundll32.exeSection loaded: OutputDebugStringW count: 708
          Tries to detect sandboxes / dynamic malware analysis system (file name check)Show sources
          Source: C:\Windows\System32\loaddll32.exeSection loaded: \KnownDlls32\testapp.exe
          Source: C:\Windows\SysWOW64\rundll32.exeSection loaded: \KnownDlls32\testapp.exe
          Source: C:\Windows\SysWOW64\rundll32.exeSection loaded: \KnownDlls32\testapp.exe
          Source: C:\Windows\SysWOW64\rundll32.exeWindow / User API: threadDelayed 459
          Source: C:\Windows\SysWOW64\rundll32.exeLast function: Thread delayed
          Source: C:\Windows\SysWOW64\rundll32.exeLast function: Thread delayed
          Source: C:\Windows\SysWOW64\rundll32.exeLast function: Thread delayed
          Source: C:\Windows\SysWOW64\rundll32.exeLast function: Thread delayed
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_72AE07CC GetTokenInformation,GetSystemInfo,GetTokenInformation,
          Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 120000
          Source: WerFault.exe, 0000000B.00000002.373860434.00000000047F0000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
          Source: WerFault.exe, 0000000B.00000002.373860434.00000000047F0000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
          Source: WerFault.exe, 0000000B.00000002.373860434.00000000047F0000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
          Source: WerFault.exe, 0000000B.00000002.373860434.00000000047F0000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_72AD6DC8 GetUserNameW,MessageBoxW,GetLastError,CreateFileA,DebugBreak,FlushFileBuffers,FreeEnvironmentStringsA,GetConsoleOutputCP,GetEnvironmentStrings,GetLocaleInfoA,GetStartupInfoA,GetStringTypeA,HeapValidate,IsBadReadPtr,LCMapStringA,LoadLibraryA,OutputDebugStringA,
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_72AE3060 RtlAddVectoredExceptionHandler,
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\RuRxpMUPN7.dll',#1
          Source: rundll32.exe, 00000003.00000002.511797018.0000000003620000.00000002.00000001.sdmp, rundll32.exe, 00000008.00000002.509492989.0000000003080000.00000002.00000001.sdmpBinary or memory string: uProgram Manager
          Source: rundll32.exe, 00000003.00000002.511797018.0000000003620000.00000002.00000001.sdmp, rundll32.exe, 00000008.00000002.509492989.0000000003080000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
          Source: rundll32.exe, 00000003.00000002.511797018.0000000003620000.00000002.00000001.sdmp, rundll32.exe, 00000008.00000002.509492989.0000000003080000.00000002.00000001.sdmpBinary or memory string: Progman
          Source: rundll32.exe, 00000003.00000002.511797018.0000000003620000.00000002.00000001.sdmp, rundll32.exe, 00000008.00000002.509492989.0000000003080000.00000002.00000001.sdmpBinary or memory string: Progmanlock
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetUserNameW,MessageBoxW,GetLastError,CreateFileA,DebugBreak,FlushFileBuffers,FreeEnvironmentStringsA,GetConsoleOutputCP,GetEnvironmentStrings,GetLocaleInfoA,GetStartupInfoA,GetStringTypeA,HeapValidate,IsBadReadPtr,LCMapStringA,LoadLibraryA,OutputDebugStringA,
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_72AD6DC8 GetUserNameW,MessageBoxW,GetLastError,CreateFileA,DebugBreak,FlushFileBuffers,FreeEnvironmentStringsA,GetConsoleOutputCP,GetEnvironmentStrings,GetLocaleInfoA,GetStartupInfoA,GetStringTypeA,HeapValidate,IsBadReadPtr,LCMapStringA,LoadLibraryA,OutputDebugStringA,
          Source: C:\Windows\SysWOW64\rundll32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

          Mitre Att&ck Matrix

          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
          Valid AccountsWindows Management InstrumentationPath InterceptionProcess Injection12Virtualization/Sandbox Evasion21OS Credential DumpingSecurity Software Discovery111Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
          Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsProcess Injection12LSASS MemoryProcess Discovery1Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothApplication Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
          Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or Information2Security Account ManagerVirtualization/Sandbox Evasion21SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
          Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Rundll321NTDSApplication Window Discovery1Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
          Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware Packing3LSA SecretsAccount Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
          Replication Through Removable MediaLaunchdRc.commonRc.commonSteganographyCached Domain CredentialsSystem Owner/User Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
          External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSyncSystem Information Discovery13Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact

          Behavior Graph

          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          Screenshots

          Thumbnails

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.

          windows-stand

          Antivirus, Machine Learning and Genetic Malware Detection

          Initial Sample

          SourceDetectionScannerLabelLink
          RuRxpMUPN7.dll100%Joe Sandbox ML

          Dropped Files

          No Antivirus matches

          Unpacked PE Files

          SourceDetectionScannerLabelLinkDownload
          3.2.rundll32.exe.2fa0000.2.unpack100%AviraTR/ATRAPS.Gen2Download File
          8.2.rundll32.exe.2b90000.2.unpack100%AviraTR/ATRAPS.Gen2Download File
          1.2.loaddll32.exe.640000.1.unpack100%AviraTR/ATRAPS.Gen2Download File

          Domains

          No Antivirus matches

          URLs

          No Antivirus matches

          Domains and IPs

          Contacted Domains

          No contacted domains info

          URLs from Memory and Binaries

          NameSourceMaliciousAntivirus DetectionReputation
          http://ansicon.adoxa.vze.com/6RuRxpMUPN7.dllfalse
            high

            Contacted IPs

            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs

            Public

            IPDomainCountryFlagASNASN NameMalicious
            159.203.93.122
            unknownUnited States
            14061DIGITALOCEAN-ASNUStrue
            50.116.27.97
            unknownUnited States
            63949LINODE-APLinodeLLCUStrue
            94.247.168.64
            unknownSweden
            43948GLESYS-ASSEtrue

            General Information

            Joe Sandbox Version:31.0.0 Emerald
            Analysis ID:392882
            Start date:19.04.2021
            Start time:23:35:11
            Joe Sandbox Product:CloudBasic
            Overall analysis duration:0h 7m 13s
            Hypervisor based Inspection enabled:false
            Report type:light
            Sample file name:RuRxpMUPN7 (renamed file extension from none to dll)
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
            Number of analysed new started processes analysed:15
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • HDC enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Detection:MAL
            Classification:mal80.bank.troj.evad.winDLL@8/4@0/3
            EGA Information:Failed
            HDC Information:
            • Successful, ratio: 99.8% (good quality ratio 96.3%)
            • Quality average: 80.5%
            • Quality standard deviation: 25.5%
            HCA Information:
            • Successful, ratio: 92%
            • Number of executed functions: 0
            • Number of non-executed functions: 0
            Cookbook Comments:
            • Adjust boot time
            • Enable AMSI
            Warnings:
            Show All
            • Exclude process from analysis (whitelisted): taskhostw.exe, WerFault.exe, SgrmBroker.exe, svchost.exe

            Simulations

            Behavior and APIs

            TimeTypeDescription
            23:36:50API Interceptor1x Sleep call for process: loaddll32.exe modified

            Joe Sandbox View / Context

            IPs

            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
            159.203.93.122gsG7jGFk3I.dllGet hashmaliciousBrowse
              15sV4KdrCN.dllGet hashmaliciousBrowse
                Ce28zthEz1.dllGet hashmaliciousBrowse
                  Yvl2Gke3pv.dllGet hashmaliciousBrowse
                    1UmI5PSg3K.dllGet hashmaliciousBrowse
                      9eYYTTlVYi.dllGet hashmaliciousBrowse
                        Ce28zthEz1.dllGet hashmaliciousBrowse
                          15sV4KdrCN.dllGet hashmaliciousBrowse
                            Yvl2Gke3pv.dllGet hashmaliciousBrowse
                              1UmI5PSg3K.dllGet hashmaliciousBrowse
                                9eYYTTlVYi.dllGet hashmaliciousBrowse
                                  9JXXdpfiQm.dllGet hashmaliciousBrowse
                                    t4KzTUSzkx.dllGet hashmaliciousBrowse
                                      POQ6m91rE7.dllGet hashmaliciousBrowse
                                        4ryCxciDFA.dllGet hashmaliciousBrowse
                                          9JXXdpfiQm.dllGet hashmaliciousBrowse
                                            t4KzTUSzkx.dllGet hashmaliciousBrowse
                                              POQ6m91rE7.dllGet hashmaliciousBrowse
                                                6l18PHjcrE.dllGet hashmaliciousBrowse
                                                  4ryCxciDFA.dllGet hashmaliciousBrowse
                                                    50.116.27.97gsG7jGFk3I.dllGet hashmaliciousBrowse
                                                      15sV4KdrCN.dllGet hashmaliciousBrowse
                                                        Ce28zthEz1.dllGet hashmaliciousBrowse
                                                          Yvl2Gke3pv.dllGet hashmaliciousBrowse
                                                            1UmI5PSg3K.dllGet hashmaliciousBrowse
                                                              9eYYTTlVYi.dllGet hashmaliciousBrowse
                                                                Ce28zthEz1.dllGet hashmaliciousBrowse
                                                                  15sV4KdrCN.dllGet hashmaliciousBrowse
                                                                    Yvl2Gke3pv.dllGet hashmaliciousBrowse
                                                                      1UmI5PSg3K.dllGet hashmaliciousBrowse
                                                                        9eYYTTlVYi.dllGet hashmaliciousBrowse
                                                                          9JXXdpfiQm.dllGet hashmaliciousBrowse
                                                                            t4KzTUSzkx.dllGet hashmaliciousBrowse
                                                                              POQ6m91rE7.dllGet hashmaliciousBrowse
                                                                                4ryCxciDFA.dllGet hashmaliciousBrowse
                                                                                  9JXXdpfiQm.dllGet hashmaliciousBrowse
                                                                                    t4KzTUSzkx.dllGet hashmaliciousBrowse
                                                                                      POQ6m91rE7.dllGet hashmaliciousBrowse
                                                                                        6l18PHjcrE.dllGet hashmaliciousBrowse
                                                                                          4ryCxciDFA.dllGet hashmaliciousBrowse

                                                                                            Domains

                                                                                            No context

                                                                                            ASN

                                                                                            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                                            DIGITALOCEAN-ASNUSgsG7jGFk3I.dllGet hashmaliciousBrowse
                                                                                            • 159.203.93.122
                                                                                            15sV4KdrCN.dllGet hashmaliciousBrowse
                                                                                            • 159.203.93.122
                                                                                            Ce28zthEz1.dllGet hashmaliciousBrowse
                                                                                            • 159.203.93.122
                                                                                            Yvl2Gke3pv.dllGet hashmaliciousBrowse
                                                                                            • 159.203.93.122
                                                                                            1UmI5PSg3K.dllGet hashmaliciousBrowse
                                                                                            • 159.203.93.122
                                                                                            9eYYTTlVYi.dllGet hashmaliciousBrowse
                                                                                            • 159.203.93.122
                                                                                            Ce28zthEz1.dllGet hashmaliciousBrowse
                                                                                            • 159.203.93.122
                                                                                            15sV4KdrCN.dllGet hashmaliciousBrowse
                                                                                            • 159.203.93.122
                                                                                            Yvl2Gke3pv.dllGet hashmaliciousBrowse
                                                                                            • 159.203.93.122
                                                                                            1UmI5PSg3K.dllGet hashmaliciousBrowse
                                                                                            • 159.203.93.122
                                                                                            9eYYTTlVYi.dllGet hashmaliciousBrowse
                                                                                            • 159.203.93.122
                                                                                            9JXXdpfiQm.dllGet hashmaliciousBrowse
                                                                                            • 159.203.93.122
                                                                                            t4KzTUSzkx.dllGet hashmaliciousBrowse
                                                                                            • 159.203.93.122
                                                                                            POQ6m91rE7.dllGet hashmaliciousBrowse
                                                                                            • 159.203.93.122
                                                                                            4ryCxciDFA.dllGet hashmaliciousBrowse
                                                                                            • 159.203.93.122
                                                                                            9JXXdpfiQm.dllGet hashmaliciousBrowse
                                                                                            • 159.203.93.122
                                                                                            t4KzTUSzkx.dllGet hashmaliciousBrowse
                                                                                            • 159.203.93.122
                                                                                            POQ6m91rE7.dllGet hashmaliciousBrowse
                                                                                            • 159.203.93.122
                                                                                            6l18PHjcrE.dllGet hashmaliciousBrowse
                                                                                            • 159.203.93.122
                                                                                            4ryCxciDFA.dllGet hashmaliciousBrowse
                                                                                            • 159.203.93.122
                                                                                            LINODE-APLinodeLLCUSgsG7jGFk3I.dllGet hashmaliciousBrowse
                                                                                            • 50.116.27.97
                                                                                            15sV4KdrCN.dllGet hashmaliciousBrowse
                                                                                            • 50.116.27.97
                                                                                            Ce28zthEz1.dllGet hashmaliciousBrowse
                                                                                            • 50.116.27.97
                                                                                            Yvl2Gke3pv.dllGet hashmaliciousBrowse
                                                                                            • 50.116.27.97
                                                                                            1UmI5PSg3K.dllGet hashmaliciousBrowse
                                                                                            • 50.116.27.97
                                                                                            9eYYTTlVYi.dllGet hashmaliciousBrowse
                                                                                            • 50.116.27.97
                                                                                            Ce28zthEz1.dllGet hashmaliciousBrowse
                                                                                            • 50.116.27.97
                                                                                            15sV4KdrCN.dllGet hashmaliciousBrowse
                                                                                            • 50.116.27.97
                                                                                            Yvl2Gke3pv.dllGet hashmaliciousBrowse
                                                                                            • 50.116.27.97
                                                                                            1UmI5PSg3K.dllGet hashmaliciousBrowse
                                                                                            • 50.116.27.97
                                                                                            9eYYTTlVYi.dllGet hashmaliciousBrowse
                                                                                            • 50.116.27.97
                                                                                            9JXXdpfiQm.dllGet hashmaliciousBrowse
                                                                                            • 50.116.27.97
                                                                                            t4KzTUSzkx.dllGet hashmaliciousBrowse
                                                                                            • 50.116.27.97
                                                                                            POQ6m91rE7.dllGet hashmaliciousBrowse
                                                                                            • 50.116.27.97
                                                                                            4ryCxciDFA.dllGet hashmaliciousBrowse
                                                                                            • 50.116.27.97
                                                                                            9JXXdpfiQm.dllGet hashmaliciousBrowse
                                                                                            • 50.116.27.97
                                                                                            t4KzTUSzkx.dllGet hashmaliciousBrowse
                                                                                            • 50.116.27.97
                                                                                            POQ6m91rE7.dllGet hashmaliciousBrowse
                                                                                            • 50.116.27.97
                                                                                            6l18PHjcrE.dllGet hashmaliciousBrowse
                                                                                            • 50.116.27.97
                                                                                            4ryCxciDFA.dllGet hashmaliciousBrowse
                                                                                            • 50.116.27.97

                                                                                            JA3 Fingerprints

                                                                                            No context

                                                                                            Dropped Files

                                                                                            No context

                                                                                            Created / dropped Files

                                                                                            C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_loaddll32.exe_3aebf4f4b63c22f8e81111ea58d346011b6f5fc_160cf2be_1ad25a27\Report.wer
                                                                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                            File Type:Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                                                            Category:dropped
                                                                                            Size (bytes):9244
                                                                                            Entropy (8bit):3.761941567240768
                                                                                            Encrypted:false
                                                                                            SSDEEP:96:NbLXyyy9hA/C5Q56tpXIQcQ6c6n+hcEZcw3P+a+z+HbHgik6eugtYsaV9w72oNEs:oRHUb+hjbjMq/u7scS274Itb2o
                                                                                            MD5:17DA3DA2F76B3AD56AA7D0FA984033BD
                                                                                            SHA1:1D6203103A903428611C7F46FB723024174091B1
                                                                                            SHA-256:232C9E7DF7C05E040B28D42ACF0609A3125AEE7ABBB46BFAADA48B34F82AD9C8
                                                                                            SHA-512:3446F1DD2DFC748164A688BF8B286A5B9F2AD504AE2356B052994EE23E8726EAA5EA9D3C3D595FA22D2DA8043AA62DDB446730A82965D7FFC31A266506034518
                                                                                            Malicious:false
                                                                                            Reputation:low
                                                                                            Preview: ..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.B.E.X.....E.v.e.n.t.T.i.m.e.=.1.3.2.6.3.3.7.4.2.1.7.9.5.4.9.4.4.3.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.6.7.d.0.7.1.e.c.-.d.6.2.b.-.4.5.4.f.-.b.7.a.a.-.7.2.3.9.9.0.5.a.8.b.7.4.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.8.0.4.b.c.0.5.5.-.7.6.3.5.-.4.7.2.9.-.b.c.a.d.-.e.3.2.d.a.e.6.1.8.0.c.d.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.l.o.a.d.d.l.l.3.2...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.5.8.8.-.0.0.0.1.-.0.0.1.7.-.4.f.c.8.-.4.0.7.2.a.f.3.5.d.7.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.d.a.3.9.a.3.e.e.5.e.6.b.4.b.0.d.3.2.5.5.b.f.e.f.9.5.6.0.1.8.9.0.a.f.d.8.0.7.0.9.!.0.0.0.0.d.a.3.9.a.3.e.e.5.e.6.b.4.b.0.d.3.2.5.5.b.f.e.f.9.5.6.0.1.8.9.0.a.f.d.8.0.7.0.9.!.l.o.a.d.d.l.l.3.2...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.1././.0.4././.0.4.:.1.0.:.5.0.:.5.4.!.0.!.l.o.a.d.d.l.l.3.2...e.x.e.....B.o.o.t.I.d.=.4.2.9.4.9.6.7.2.9.
                                                                                            C:\ProgramData\Microsoft\Windows\WER\Temp\WER2B47.tmp.dmp
                                                                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                            File Type:Mini DuMP crash report, 15 streams, Tue Apr 20 06:37:00 2021, 0x1205a4 type
                                                                                            Category:dropped
                                                                                            Size (bytes):36446
                                                                                            Entropy (8bit):2.2696162828360498
                                                                                            Encrypted:false
                                                                                            SSDEEP:192:AMmV5Zd9r8d1EDuYZfWP+8PM6TyE1iOm1ucGI:fA5X9r8d1ECi/KM6Ty+QyI
                                                                                            MD5:98B20AB5414609F8F6C46ED45AE9478C
                                                                                            SHA1:0F573701D0D2A778CC3A043BBB4561121F372B92
                                                                                            SHA-256:8F5C912295DA4857649ADDA5007581FC51B86BB0E79214F9909CA5A76864ABFB
                                                                                            SHA-512:2A0C8FA629E9F2294368D968FF7896498CF079D7E562B4BC14F2455F0D283EC7C431B6904B49AB03267D70A539FEF45AD062601FFA13F12F49C93FFC50CA74E3
                                                                                            Malicious:false
                                                                                            Reputation:low
                                                                                            Preview: MDMP....... ........v~`...................U...........B..............GenuineIntelW...........T...........Xv~`.............................0..................P.a.c.i.f.i.c. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................P.a.c.i.f.i.c. .D.a.y.l.i.g.h.t. .T.i.m.e...........................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.............................................................................................................................................................................................................................................................................................................................................................................................................................................................d.b.g.c.o.r.e...i.3.8.6.,.1.0...0...1.7.1.3.4...1.........................................................................................................
                                                                                            C:\ProgramData\Microsoft\Windows\WER\Temp\WER3598.tmp.WERInternalMetadata.xml
                                                                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                            File Type:XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                                                            Category:dropped
                                                                                            Size (bytes):8366
                                                                                            Entropy (8bit):3.689598551563396
                                                                                            Encrypted:false
                                                                                            SSDEEP:192:Rrl7r3GLNiIml6UK56YgDSUumgmfAS1HCpBR89binYsfpWm:RrlsNit6UK56YUSUumgmfAS1DinLfR
                                                                                            MD5:3D24220609ADC4776B9AF8367AF2D67A
                                                                                            SHA1:BE6A948CF2D97287A0F61E3F6149E6610852D6FD
                                                                                            SHA-256:C31D482357ACC02286820A817B2CC9859E76634D1B21671CB18A62623D70BCC7
                                                                                            SHA-512:E89C8CE2AE9F9108D4B3783AAD46F5BB7FCCB46FCF96BBAEF20AE537C89E8736E5A75018C8F9CE0DBC296C22D7790A59D39BE4C2B34C694442DA119195083996
                                                                                            Malicious:false
                                                                                            Reputation:low
                                                                                            Preview: ..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.1.4.1.6.<./.P.i.d.>.......
                                                                                            C:\ProgramData\Microsoft\Windows\WER\Temp\WER4CAC.tmp.xml
                                                                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                            Category:dropped
                                                                                            Size (bytes):4658
                                                                                            Entropy (8bit):4.427855153855926
                                                                                            Encrypted:false
                                                                                            SSDEEP:48:cvIwSD8zslJgtWI93/WSC8BNT8fm8M4JVpNF1+q8v7ptIKcQIcQw6Urgd:uITf/ouSN4JdKMKkw68gd
                                                                                            MD5:F3DCC0C60B9F7BCC562A3F0B35CF73AA
                                                                                            SHA1:956A0AAED7AB21B390C8AE9CA86197D291EA2BFA
                                                                                            SHA-256:388D99A2CA96C52D2EC649BA49F8099C1E2B1457ED87E44F14E0CC6BBB74FE76
                                                                                            SHA-512:B220C2FC792B4D83D67AAA142849C91966781312C6F175E2B8214F4EAFA0284F23898754F2D7062F5B0678107B6E90761C35F3FE9A90208CC1A69DCEB12776F6
                                                                                            Malicious:false
                                                                                            Reputation:low
                                                                                            Preview: <?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="954227" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..

                                                                                            Static File Info

                                                                                            General

                                                                                            File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                            Entropy (8bit):7.548557274908702
                                                                                            TrID:
                                                                                            • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
                                                                                            • Generic Win/DOS Executable (2004/3) 0.20%
                                                                                            • DOS Executable Generic (2002/1) 0.20%
                                                                                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                            File name:RuRxpMUPN7.dll
                                                                                            File size:163840
                                                                                            MD5:f6a73ad1c962b6d3d979066d37da71b5
                                                                                            SHA1:c19b72b1b07a8065f2a62be97cb1cccfb1d5b93f
                                                                                            SHA256:8d357ea7f4cbfcbbd9af86a34c421b7011204c83efa788b2527a79f9c464f287
                                                                                            SHA512:d91d9b8de5601bb3f419ece53394fee115b5b7ff4fdf520acd3963fba03c25d6fd5ae38cc5fee79bd9afd75da34e93413b16d8d31fd45b1385f2d5047bfb1850
                                                                                            SSDEEP:3072:WWX2IjzzpM+PncPeY8+O3AU3HRIHPh3UGfXy0BHNkIv/ScbQQ2y0iNM0+y+N0tc:W42IfzNPnoeY8j3AsHGPXpHNj6rByM3
                                                                                            File Content Preview:MZ......................@...........................................[}..[}..[}..[}...}..@.2..|..=.T..}....S.z|..@..._}..|...T|..V/C..|..V/E..|..Rich[}..............PE..L.....}`...........!.........f.......D.......P....@....................................

                                                                                            File Icon

                                                                                            Icon Hash:74f0e4ecccdce0e4

                                                                                            Static PE Info

                                                                                            General

                                                                                            Entrypoint:0x424410
                                                                                            Entrypoint Section:.text
                                                                                            Digitally signed:false
                                                                                            Imagebase:0x400000
                                                                                            Subsystem:windows gui
                                                                                            Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
                                                                                            DLL Characteristics:TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                                                                            Time Stamp:0x607DE4E2 [Mon Apr 19 20:15:30 2021 UTC]
                                                                                            TLS Callbacks:
                                                                                            CLR (.Net) Version:
                                                                                            OS Version Major:5
                                                                                            OS Version Minor:0
                                                                                            File Version Major:5
                                                                                            File Version Minor:0
                                                                                            Subsystem Version Major:5
                                                                                            Subsystem Version Minor:0
                                                                                            Import Hash:b84fd50f2389cfd5bd83e2cf062986d1

                                                                                            Entrypoint Preview

                                                                                            Instruction
                                                                                            mov edx, 00000000h
                                                                                            mov edx, 00000000h
                                                                                            cmpss xmm1, xmm2, 03h
                                                                                            sub eax, 00002233h
                                                                                            mov edx, 00000000h
                                                                                            mov edx, 00000000h
                                                                                            mov edx, 00000000h
                                                                                            mov edx, 00000000h
                                                                                            mov edx, 00000000h
                                                                                            mov edx, 00000000h
                                                                                            cmpss xmm1, xmm2, 03h
                                                                                            cmp edx, 00000000h
                                                                                            mov eax, 00000000h
                                                                                            mov eax, 00000000h
                                                                                            mov eax, 00000000h
                                                                                            mov eax, 00000000h
                                                                                            mov eax, 00000000h
                                                                                            mov eax, 00000000h
                                                                                            mov eax, 00000000h
                                                                                            mov eax, 00000000h
                                                                                            mov eax, 00000000h
                                                                                            mov eax, 00000000h
                                                                                            mov eax, 00000000h
                                                                                            mov eax, 00000000h
                                                                                            mov eax, 00000000h
                                                                                            mov eax, 00000000h
                                                                                            mov eax, 00000000h
                                                                                            je 00007F30E8A3F07Bh
                                                                                            mov eax, 00000000h
                                                                                            mov eax, 00000000h
                                                                                            mov eax, 00000000h
                                                                                            mov eax, 00000000h
                                                                                            mov eax, 00000000h
                                                                                            mov eax, 00000000h
                                                                                            mov eax, 00000000h
                                                                                            mov eax, 00000000h
                                                                                            mov eax, 00000000h
                                                                                            mov eax, 00000000h
                                                                                            mov eax, 00000000h
                                                                                            mov eax, 00000000h

                                                                                            Data Directories

                                                                                            NameVirtual AddressVirtual Size Is in Section
                                                                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x10010x0.text
                                                                                            IMAGE_DIRECTORY_ENTRY_IMPORT0x2768c0x59.rdata
                                                                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x2c0000x340.rsrc
                                                                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x2d0000x14c.reloc
                                                                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x250400x38.rdata
                                                                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_IAT0x250000x3c.rdata
                                                                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                                                            Sections

                                                                                            NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                            .text0x10000x2356e0x23600False0.761560015459data7.55877156847IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                                                            .rdata0x250000x28420x2a00False0.791573660714data7.53164670284IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                            .pdata0x280000x35880x1600False0.783380681818MMDF mailbox7.34765964879IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                                                                            .rsrc0x2c0000x3400x400False0.390625data2.73456990044IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                            .reloc0x2d0000x14c0x200False0.62890625data4.21021599876IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                                                            Resources

                                                                                            NameRVASizeTypeLanguageCountry
                                                                                            RT_VERSION0x2c0600x2e0dataEnglishUnited States

                                                                                            Imports

                                                                                            DLLImport
                                                                                            KERNEL32.dllCloseHandle, OpenSemaphoreW, LoadLibraryExA, GetModuleHandleW, OutputDebugStringA, GetProfileSectionW
                                                                                            OPENGL32.dllglTexSubImage1D
                                                                                            ole32.dllCreateStreamOnHGlobal
                                                                                            USER32.dllTranslateMessage
                                                                                            ADVAPI32.dllRegLoadAppKeyW

                                                                                            Version Infos

                                                                                            DescriptionData
                                                                                            LegalCopyrightFreeware
                                                                                            InternalNameANSI32
                                                                                            FileVersion1.66
                                                                                            CompanyNameJason Hood
                                                                                            Commentshttp://ansicon.adoxa.vze.com/
                                                                                            ProductNameANSICON
                                                                                            ProductVersion1.66
                                                                                            FileDescriptionANSI Console
                                                                                            OriginalFilenameANSI32.dll
                                                                                            Translation0x0409 0x04b0

                                                                                            Possible Origin

                                                                                            Language of compilation systemCountry where language is spokenMap
                                                                                            EnglishUnited States

                                                                                            Network Behavior

                                                                                            No network behavior found

                                                                                            Code Manipulations

                                                                                            Statistics

                                                                                            Behavior

                                                                                            Click to jump to process

                                                                                            System Behavior

                                                                                            General

                                                                                            Start time:23:36:08
                                                                                            Start date:19/04/2021
                                                                                            Path:C:\Windows\System32\loaddll32.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:loaddll32.exe 'C:\Users\user\Desktop\RuRxpMUPN7.dll'
                                                                                            Imagebase:0xba0000
                                                                                            File size:116736 bytes
                                                                                            MD5 hash:542795ADF7CC08EFCF675D65310596E8
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Reputation:high

                                                                                            General

                                                                                            Start time:23:36:08
                                                                                            Start date:19/04/2021
                                                                                            Path:C:\Windows\SysWOW64\cmd.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\RuRxpMUPN7.dll',#1
                                                                                            Imagebase:0xac0000
                                                                                            File size:232960 bytes
                                                                                            MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Reputation:high

                                                                                            General

                                                                                            Start time:23:36:09
                                                                                            Start date:19/04/2021
                                                                                            Path:C:\Windows\SysWOW64\rundll32.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:rundll32.exe 'C:\Users\user\Desktop\RuRxpMUPN7.dll',#1
                                                                                            Imagebase:0x8e0000
                                                                                            File size:61952 bytes
                                                                                            MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Yara matches:
                                                                                            • Rule: JoeSecurity_Dridex_1, Description: Yara detected Dridex unpacked file, Source: 00000003.00000002.513214824.0000000072AD1000.00000020.00020000.sdmp, Author: Joe Security
                                                                                            Reputation:high

                                                                                            General

                                                                                            Start time:23:36:50
                                                                                            Start date:19/04/2021
                                                                                            Path:C:\Windows\SysWOW64\rundll32.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:rundll32.exe 'C:\Users\user\Desktop\RuRxpMUPN7.dll',ReadLogRecord
                                                                                            Imagebase:0x8e0000
                                                                                            File size:61952 bytes
                                                                                            MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Yara matches:
                                                                                            • Rule: JoeSecurity_Dridex_1, Description: Yara detected Dridex unpacked file, Source: 00000008.00000002.511726396.0000000072AD1000.00000020.00020000.sdmp, Author: Joe Security
                                                                                            Reputation:high

                                                                                            General

                                                                                            Start time:23:36:52
                                                                                            Start date:19/04/2021
                                                                                            Path:C:\Windows\SysWOW64\WerFault.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 1416 -s 440
                                                                                            Imagebase:0xe30000
                                                                                            File size:434592 bytes
                                                                                            MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Reputation:high

                                                                                            Disassembly

                                                                                            Code Analysis

                                                                                            Reset < >