Loading ...

Play interactive tourEdit tour

Analysis Report 87324661_by_Libranalysis

Overview

General Information

Sample Name:87324661_by_Libranalysis (renamed file extension from none to dll)
Analysis ID:413043
MD5:873246614925eed7eb818ffa6f785b75
SHA1:b92a017964f94fa7cf2c77a95ea1095513c5431d
SHA256:78bad82ee0230454a48cc41c1a951c304027ffc7d1b5d2c1b5bc4567db455109
Infos:

Most interesting Screenshot:

Detection

Dridex
Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected Dridex unpacked file
C2 URLs / IPs found in malware configuration
Machine Learning detection for sample
Tries to detect sandboxes / dynamic malware analysis system (file name check)
Antivirus or Machine Learning detection for unpacked file
Checks if the current process is being debugged
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to query locales information (e.g. system language)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
One or more processes crash
PE / OLE file has an invalid certificate
PE file contains an invalid checksum
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

Startup

  • System is w10x64
  • loaddll32.exe (PID: 5424 cmdline: loaddll32.exe 'C:\Users\user\Desktop\87324661_by_Libranalysis.dll' MD5: 542795ADF7CC08EFCF675D65310596E8)
    • cmd.exe (PID: 5416 cmdline: cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\87324661_by_Libranalysis.dll',#1 MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • rundll32.exe (PID: 1232 cmdline: rundll32.exe 'C:\Users\user\Desktop\87324661_by_Libranalysis.dll',#1 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
        • WerFault.exe (PID: 5384 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 1232 -s 764 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
  • cleanup

Malware Configuration

Threatname: Dridex

{"Version": 22202, "C2 list": ["203.114.109.124:443", "82.165.145.100:6601", "94.177.255.18:8172"], "RC4 keys": ["BwjTiXD0nMT8wuL0lzuDMT1lwajgYLnSPMpMch1H2fk8H", "q9kldr5IysNmmZqCx9jFzlSDl8TYcZm1jGiJKdnQ5Lg6QzqUnZo1jkSGDQVP1"]}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000003.00000002.329383594.0000000010001000.00000020.00020000.sdmpJoeSecurity_Dridex_1Yara detected Dridex unpacked fileJoe Security

    Unpacked PEs

    SourceRuleDescriptionAuthorStrings
    3.2.rundll32.exe.10000000.3.unpackJoeSecurity_Dridex_1Yara detected Dridex unpacked fileJoe Security

      Sigma Overview

      No Sigma rule has matched

      Signature Overview

      Click to jump to signature section

      Show All Signature Results

      AV Detection:

      barindex
      Found malware configurationShow sources
      Source: 3.2.rundll32.exe.10000000.3.unpackMalware Configuration Extractor: Dridex {"Version": 22202, "C2 list": ["203.114.109.124:443", "82.165.145.100:6601", "94.177.255.18:8172"], "RC4 keys": ["BwjTiXD0nMT8wuL0lzuDMT1lwajgYLnSPMpMch1H2fk8H", "q9kldr5IysNmmZqCx9jFzlSDl8TYcZm1jGiJKdnQ5Lg6QzqUnZo1jkSGDQVP1"]}
      Multi AV Scanner detection for submitted fileShow sources
      Source: 87324661_by_Libranalysis.dllReversingLabs: Detection: 68%
      Machine Learning detection for sampleShow sources
      Source: 87324661_by_Libranalysis.dllJoe Sandbox ML: detected
      Source: 3.2.rundll32.exe.900000.2.unpackAvira: Label: TR/ATRAPS.Gen2
      Source: 87324661_by_Libranalysis.dllStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
      Source: 87324661_by_Libranalysis.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT
      Source: Binary string: bcrypt.pdb+( source: WerFault.exe, 00000010.00000003.310620787.00000000051D6000.00000004.00000040.sdmp
      Source: Binary string: ClusApi.pdb source: WerFault.exe, 00000010.00000003.310620787.00000000051D6000.00000004.00000040.sdmp
      Source: Binary string: wkernel32.pdb source: WerFault.exe, 00000010.00000003.310596406.0000000005201000.00000004.00000001.sdmp
      Source: Binary string: sfc_os.pdb source: WerFault.exe, 00000010.00000003.310620787.00000000051D6000.00000004.00000040.sdmp
      Source: Binary string: bcrypt.pdb source: WerFault.exe, 00000010.00000003.310620787.00000000051D6000.00000004.00000040.sdmp
      Source: Binary string: ucrtbase.pdb source: WerFault.exe, 00000010.00000003.310596406.0000000005201000.00000004.00000001.sdmp
      Source: Binary string: msvcrt.pdb source: WerFault.exe, 00000010.00000003.310596406.0000000005201000.00000004.00000001.sdmp
      Source: Binary string: glu32.pdb source: WerFault.exe, 00000010.00000003.310620787.00000000051D6000.00000004.00000040.sdmp
      Source: Binary string: wrpcrt4.pdb source: WerFault.exe, 00000010.00000003.310608360.00000000051D0000.00000004.00000040.sdmp
      Source: Binary string: wntdll.pdb source: WerFault.exe, 00000010.00000003.310596406.0000000005201000.00000004.00000001.sdmp
      Source: Binary string: shcore.pdb source: WerFault.exe, 00000010.00000003.310608360.00000000051D0000.00000004.00000040.sdmp
      Source: Binary string: wgdi32.pdb source: WerFault.exe, 00000010.00000003.310596406.0000000005201000.00000004.00000001.sdmp
      Source: Binary string: fltLib.pdb source: WerFault.exe, 00000010.00000003.310620787.00000000051D6000.00000004.00000040.sdmp
      Source: Binary string: profapi.pdb!( source: WerFault.exe, 00000010.00000003.310620787.00000000051D6000.00000004.00000040.sdmp
      Source: Binary string: advapi32.pdb source: WerFault.exe, 00000010.00000003.310620787.00000000051D6000.00000004.00000040.sdmp
      Source: Binary string: rundll32.pdbk source: WerFault.exe, 00000010.00000003.310596406.0000000005201000.00000004.00000001.sdmp
      Source: Binary string: wsspicli.pdb source: WerFault.exe, 00000010.00000003.310620787.00000000051D6000.00000004.00000040.sdmp
      Source: Binary string: shell32.pdb source: WerFault.exe, 00000010.00000003.310608360.00000000051D0000.00000004.00000040.sdmp
      Source: Binary string: msvcp_win.pdb source: WerFault.exe, 00000010.00000003.310596406.0000000005201000.00000004.00000001.sdmp
      Source: Binary string: dnsapi.pdb source: WerFault.exe, 00000010.00000003.310620787.00000000051D6000.00000004.00000040.sdmp
      Source: Binary string: rasapi32.pdb source: WerFault.exe, 00000010.00000003.310620787.00000000051D6000.00000004.00000040.sdmp
      Source: Binary string: wimm32.pdb source: WerFault.exe, 00000010.00000003.310620787.00000000051D6000.00000004.00000040.sdmp
      Source: Binary string: wkernelbase.pdb source: WerFault.exe, 00000010.00000003.310596406.0000000005201000.00000004.00000001.sdmp
      Source: Binary string: mpr.pdb source: WerFault.exe, 00000010.00000003.310608360.00000000051D0000.00000004.00000040.sdmp
      Source: Binary string: shlwapi.pdb source: WerFault.exe, 00000010.00000003.310620787.00000000051D6000.00000004.00000040.sdmp
      Source: Binary string: wwin32u.pdb source: WerFault.exe, 00000010.00000003.310596406.0000000005201000.00000004.00000001.sdmp
      Source: Binary string: setupapi.pdb source: WerFault.exe, 00000010.00000003.310620787.00000000051D6000.00000004.00000040.sdmp
      Source: Binary string: combase.pdb#-8[VE source: WerFault.exe, 00000010.00000003.310620787.00000000051D6000.00000004.00000040.sdmp
      Source: Binary string: imagehlp.pdb source: WerFault.exe, 00000010.00000003.310620787.00000000051D6000.00000004.00000040.sdmp
      Source: Binary string: wUxTheme.pdb source: WerFault.exe, 00000010.00000003.310620787.00000000051D6000.00000004.00000040.sdmp
      Source: Binary string: dwmapi.pdb source: WerFault.exe, 00000010.00000003.310620787.00000000051D6000.00000004.00000040.sdmp
      Source: Binary string: fltLib.pdb5( source: WerFault.exe, 00000010.00000003.310620787.00000000051D6000.00000004.00000040.sdmp
      Source: Binary string: shcore.pdbk source: WerFault.exe, 00000010.00000003.310608360.00000000051D0000.00000004.00000040.sdmp
      Source: Binary string: opengl32.pdb source: WerFault.exe, 00000010.00000003.310620787.00000000051D6000.00000004.00000040.sdmp
      Source: Binary string: profapi.pdb source: WerFault.exe, 00000010.00000003.310620787.00000000051D6000.00000004.00000040.sdmp
      Source: Binary string: propsys.pdb'( source: WerFault.exe, 00000010.00000003.310620787.00000000051D6000.00000004.00000040.sdmp
      Source: Binary string: ws2_32.pdb source: WerFault.exe, 00000010.00000003.310620787.00000000051D6000.00000004.00000040.sdmp
      Source: Binary string: winspool.pdb source: WerFault.exe, 00000010.00000003.310620787.00000000051D6000.00000004.00000040.sdmp
      Source: Binary string: wgdi32full.pdb source: WerFault.exe, 00000010.00000003.310596406.0000000005201000.00000004.00000001.sdmp
      Source: Binary string: shell32.pdbk source: WerFault.exe, 00000010.00000003.310608360.00000000051D0000.00000004.00000040.sdmp
      Source: Binary string: sechost.pdb source: WerFault.exe, 00000010.00000003.310620787.00000000051D6000.00000004.00000040.sdmp
      Source: Binary string: iphlpapi.pdb source: WerFault.exe, 00000010.00000003.310620787.00000000051D6000.00000004.00000040.sdmp
      Source: Binary string: rasman.pdb source: WerFault.exe, 00000010.00000003.310620787.00000000051D6000.00000004.00000040.sdmp
      Source: Binary string: nsi.pdb source: WerFault.exe, 00000010.00000003.310620787.00000000051D6000.00000004.00000040.sdmp
      Source: Binary string: propsys.pdb source: WerFault.exe, 00000010.00000003.310620787.00000000051D6000.00000004.00000040.sdmp
      Source: Binary string: cfgmgr32.pdbk source: WerFault.exe, 00000010.00000003.310608360.00000000051D0000.00000004.00000040.sdmp
      Source: Binary string: powrprof.pdb source: WerFault.exe, 00000010.00000003.310620787.00000000051D6000.00000004.00000040.sdmp
      Source: Binary string: fpmvppp.pdb source: loaddll32.exe, 00000000.00000002.231135027.0000000010024000.00000002.00020000.sdmp, WerFault.exe, 00000010.00000002.325705287.0000000005130000.00000002.00000001.sdmp, 87324661_by_Libranalysis.dll
      Source: Binary string: msctf.pdb source: WerFault.exe, 00000010.00000003.310620787.00000000051D6000.00000004.00000040.sdmp
      Source: Binary string: ole32.pdb source: WerFault.exe, 00000010.00000003.310620787.00000000051D6000.00000004.00000040.sdmp
      Source: Binary string: AcLayers.pdb source: WerFault.exe, 00000010.00000003.310596406.0000000005201000.00000004.00000001.sdmp
      Source: Binary string: Kernel.Appcore.pdb source: WerFault.exe, 00000010.00000003.310608360.00000000051D0000.00000004.00000040.sdmp
      Source: Binary string: rasapi32.pdb( source: WerFault.exe, 00000010.00000003.310620787.00000000051D6000.00000004.00000040.sdmp
      Source: Binary string: powrprof.pdb?( source: WerFault.exe, 00000010.00000003.310620787.00000000051D6000.00000004.00000040.sdmp
      Source: Binary string: cryptbase.pdb source: WerFault.exe, 00000010.00000003.310620787.00000000051D6000.00000004.00000040.sdmp
      Source: Binary string: bcryptprimitives.pdb source: WerFault.exe, 00000010.00000003.310608360.00000000051D0000.00000004.00000040.sdmp
      Source: Binary string: cfgmgr32.pdb source: WerFault.exe, 00000010.00000003.310608360.00000000051D0000.00000004.00000040.sdmp
      Source: Binary string: combase.pdb source: WerFault.exe, 00000010.00000003.310620787.00000000051D6000.00000004.00000040.sdmp
      Source: Binary string: Windows.Storage.pdb source: WerFault.exe, 00000010.00000003.310608360.00000000051D0000.00000004.00000040.sdmp
      Source: Binary string: rundll32.pdb source: WerFault.exe, 00000010.00000003.310596406.0000000005201000.00000004.00000001.sdmp
      Source: Binary string: oleaut32.pdb source: WerFault.exe, 00000010.00000003.310620787.00000000051D6000.00000004.00000040.sdmp
      Source: Binary string: sfc.pdb source: WerFault.exe, 00000010.00000003.310620787.00000000051D6000.00000004.00000040.sdmp
      Source: Binary string: apphelp.pdb source: WerFault.exe, 00000010.00000003.310596406.0000000005201000.00000004.00000001.sdmp
      Source: Binary string: wuser32.pdb source: WerFault.exe, 00000010.00000003.310596406.0000000005201000.00000004.00000001.sdmp

      Networking:

      barindex
      C2 URLs / IPs found in malware configurationShow sources
      Source: Malware configuration extractorIPs: 203.114.109.124:443
      Source: Malware configuration extractorIPs: 82.165.145.100:6601
      Source: Malware configuration extractorIPs: 94.177.255.18:8172
      Source: Joe Sandbox ViewIP Address: 94.177.255.18 94.177.255.18
      Source: Joe Sandbox ViewIP Address: 203.114.109.124 203.114.109.124
      Source: Joe Sandbox ViewASN Name: ARUBACLOUDLTD-ASNGB ARUBACLOUDLTD-ASNGB
      Source: Joe Sandbox ViewASN Name: TOT-LLI-AS-APTOTPublicCompanyLimitedTH TOT-LLI-AS-APTOTPublicCompanyLimitedTH
      Source: WerFault.exe, 00000010.00000002.325705287.0000000005130000.00000002.00000001.sdmp, 87324661_by_Libranalysis.dllString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
      Source: WerFault.exe, 00000010.00000002.325705287.0000000005130000.00000002.00000001.sdmp, 87324661_by_Libranalysis.dllString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
      Source: WerFault.exe, 00000010.00000002.325705287.0000000005130000.00000002.00000001.sdmp, 87324661_by_Libranalysis.dllString found in binary or memory: http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s
      Source: WerFault.exe, 00000010.00000002.325705287.0000000005130000.00000002.00000001.sdmp, 87324661_by_Libranalysis.dllString found in binary or memory: http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#
      Source: WerFault.exe, 00000010.00000002.325705287.0000000005130000.00000002.00000001.sdmp, 87324661_by_Libranalysis.dllString found in binary or memory: http://ocsp.comodoca.com0
      Source: WerFault.exe, 00000010.00000002.325705287.0000000005130000.00000002.00000001.sdmp, 87324661_by_Libranalysis.dllString found in binary or memory: http://ocsp.sectigo.com0
      Source: WerFault.exe, 00000010.00000002.325705287.0000000005130000.00000002.00000001.sdmp, 87324661_by_Libranalysis.dllString found in binary or memory: https://sectigo.com/CPS0

      E-Banking Fraud:

      barindex
      Yara detected Dridex unpacked fileShow sources
      Source: Yara matchFile source: 00000003.00000002.329383594.0000000010001000.00000020.00020000.sdmp, type: MEMORY
      Source: Yara matchFile source: 3.2.rundll32.exe.10000000.3.unpack, type: UNPACKEDPE
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10001494
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10011460
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1000846C
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1000A52C
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10011D58
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10019348
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10010754
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_100090CC
      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 1232 -s 764
      Source: 87324661_by_Libranalysis.dllStatic PE information: invalid certificate
      Source: 87324661_by_Libranalysis.dllBinary or memory string: OriginalFilenamex2otfb.dllN vs 87324661_by_Libranalysis.dll
      Source: 87324661_by_Libranalysis.dllStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
      Source: 87324661_by_Libranalysis.dllStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      Source: classification engineClassification label: mal76.troj.evad.winDLL@6/4@0/3
      Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess1232
      Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\WERA09F.tmpJump to behavior
      Source: 87324661_by_Libranalysis.dllStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
      Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\87324661_by_Libranalysis.dll',#1
      Source: 87324661_by_Libranalysis.dllReversingLabs: Detection: 68%
      Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe 'C:\Users\user\Desktop\87324661_by_Libranalysis.dll'
      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\87324661_by_Libranalysis.dll',#1
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\87324661_by_Libranalysis.dll',#1
      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 1232 -s 764
      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\87324661_by_Libranalysis.dll',#1
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\87324661_by_Libranalysis.dll',#1
      Source: 87324661_by_Libranalysis.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT
      Source: 87324661_by_Libranalysis.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
      Source: Binary string: bcrypt.pdb+( source: WerFault.exe, 00000010.00000003.310620787.00000000051D6000.00000004.00000040.sdmp
      Source: Binary string: ClusApi.pdb source: WerFault.exe, 00000010.00000003.310620787.00000000051D6000.00000004.00000040.sdmp
      Source: Binary string: wkernel32.pdb source: WerFault.exe, 00000010.00000003.310596406.0000000005201000.00000004.00000001.sdmp
      Source: Binary string: sfc_os.pdb source: WerFault.exe, 00000010.00000003.310620787.00000000051D6000.00000004.00000040.sdmp
      Source: Binary string: bcrypt.pdb source: WerFault.exe, 00000010.00000003.310620787.00000000051D6000.00000004.00000040.sdmp
      Source: Binary string: ucrtbase.pdb source: WerFault.exe, 00000010.00000003.310596406.0000000005201000.00000004.00000001.sdmp
      Source: Binary string: msvcrt.pdb source: WerFault.exe, 00000010.00000003.310596406.0000000005201000.00000004.00000001.sdmp
      Source: Binary string: glu32.pdb source: WerFault.exe, 00000010.00000003.310620787.00000000051D6000.00000004.00000040.sdmp
      Source: Binary string: wrpcrt4.pdb source: WerFault.exe, 00000010.00000003.310608360.00000000051D0000.00000004.00000040.sdmp
      Source: Binary string: wntdll.pdb source: WerFault.exe, 00000010.00000003.310596406.0000000005201000.00000004.00000001.sdmp
      Source: Binary string: shcore.pdb source: WerFault.exe, 00000010.00000003.310608360.00000000051D0000.00000004.00000040.sdmp
      Source: Binary string: wgdi32.pdb source: WerFault.exe, 00000010.00000003.310596406.0000000005201000.00000004.00000001.sdmp
      Source: Binary string: fltLib.pdb source: WerFault.exe, 00000010.00000003.310620787.00000000051D6000.00000004.00000040.sdmp
      Source: Binary string: profapi.pdb!( source: WerFault.exe, 00000010.00000003.310620787.00000000051D6000.00000004.00000040.sdmp
      Source: Binary string: advapi32.pdb source: WerFault.exe, 00000010.00000003.310620787.00000000051D6000.00000004.00000040.sdmp
      Source: Binary string: rundll32.pdbk source: WerFault.exe, 00000010.00000003.310596406.0000000005201000.00000004.00000001.sdmp
      Source: Binary string: wsspicli.pdb source: WerFault.exe, 00000010.00000003.310620787.00000000051D6000.00000004.00000040.sdmp
      Source: Binary string: shell32.pdb source: WerFault.exe, 00000010.00000003.310608360.00000000051D0000.00000004.00000040.sdmp
      Source: Binary string: msvcp_win.pdb source: WerFault.exe, 00000010.00000003.310596406.0000000005201000.00000004.00000001.sdmp
      Source: Binary string: dnsapi.pdb source: WerFault.exe, 00000010.00000003.310620787.00000000051D6000.00000004.00000040.sdmp
      Source: Binary string: rasapi32.pdb source: WerFault.exe, 00000010.00000003.310620787.00000000051D6000.00000004.00000040.sdmp
      Source: Binary string: wimm32.pdb source: WerFault.exe, 00000010.00000003.310620787.00000000051D6000.00000004.00000040.sdmp
      Source: Binary string: wkernelbase.pdb source: WerFault.exe, 00000010.00000003.310596406.0000000005201000.00000004.00000001.sdmp
      Source: Binary string: mpr.pdb source: WerFault.exe, 00000010.00000003.310608360.00000000051D0000.00000004.00000040.sdmp
      Source: Binary string: shlwapi.pdb source: WerFault.exe, 00000010.00000003.310620787.00000000051D6000.00000004.00000040.sdmp
      Source: Binary string: wwin32u.pdb source: WerFault.exe, 00000010.00000003.310596406.0000000005201000.00000004.00000001.sdmp
      Source: Binary string: setupapi.pdb source: WerFault.exe, 00000010.00000003.310620787.00000000051D6000.00000004.00000040.sdmp
      Source: Binary string: combase.pdb#-8[VE source: WerFault.exe, 00000010.00000003.310620787.00000000051D6000.00000004.00000040.sdmp
      Source: Binary string: imagehlp.pdb source: WerFault.exe, 00000010.00000003.310620787.00000000051D6000.00000004.00000040.sdmp
      Source: Binary string: wUxTheme.pdb source: WerFault.exe, 00000010.00000003.310620787.00000000051D6000.00000004.00000040.sdmp
      Source: Binary string: dwmapi.pdb source: WerFault.exe, 00000010.00000003.310620787.00000000051D6000.00000004.00000040.sdmp
      Source: Binary string: fltLib.pdb5( source: WerFault.exe, 00000010.00000003.310620787.00000000051D6000.00000004.00000040.sdmp
      Source: Binary string: shcore.pdbk source: WerFault.exe, 00000010.00000003.310608360.00000000051D0000.00000004.00000040.sdmp
      Source: Binary string: opengl32.pdb source: WerFault.exe, 00000010.00000003.310620787.00000000051D6000.00000004.00000040.sdmp
      Source: Binary string: profapi.pdb source: WerFault.exe, 00000010.00000003.310620787.00000000051D6000.00000004.00000040.sdmp
      Source: Binary string: propsys.pdb'( source: WerFault.exe, 00000010.00000003.310620787.00000000051D6000.00000004.00000040.sdmp
      Source: Binary string: ws2_32.pdb source: WerFault.exe, 00000010.00000003.310620787.00000000051D6000.00000004.00000040.sdmp
      Source: Binary string: winspool.pdb source: WerFault.exe, 00000010.00000003.310620787.00000000051D6000.00000004.00000040.sdmp
      Source: Binary string: wgdi32full.pdb source: WerFault.exe, 00000010.00000003.310596406.0000000005201000.00000004.00000001.sdmp
      Source: Binary string: shell32.pdbk source: WerFault.exe, 00000010.00000003.310608360.00000000051D0000.00000004.00000040.sdmp
      Source: Binary string: sechost.pdb source: WerFault.exe, 00000010.00000003.310620787.00000000051D6000.00000004.00000040.sdmp
      Source: Binary string: iphlpapi.pdb source: WerFault.exe, 00000010.00000003.310620787.00000000051D6000.00000004.00000040.sdmp
      Source: Binary string: rasman.pdb source: WerFault.exe, 00000010.00000003.310620787.00000000051D6000.00000004.00000040.sdmp
      Source: Binary string: nsi.pdb source: WerFault.exe, 00000010.00000003.310620787.00000000051D6000.00000004.00000040.sdmp
      Source: Binary string: propsys.pdb source: WerFault.exe, 00000010.00000003.310620787.00000000051D6000.00000004.00000040.sdmp
      Source: Binary string: cfgmgr32.pdbk source: WerFault.exe, 00000010.00000003.310608360.00000000051D0000.00000004.00000040.sdmp
      Source: Binary string: powrprof.pdb source: WerFault.exe, 00000010.00000003.310620787.00000000051D6000.00000004.00000040.sdmp
      Source: Binary string: fpmvppp.pdb source: loaddll32.exe, 00000000.00000002.231135027.0000000010024000.00000002.00020000.sdmp, WerFault.exe, 00000010.00000002.325705287.0000000005130000.00000002.00000001.sdmp, 87324661_by_Libranalysis.dll
      Source: Binary string: msctf.pdb source: WerFault.exe, 00000010.00000003.310620787.00000000051D6000.00000004.00000040.sdmp
      Source: Binary string: ole32.pdb source: WerFault.exe, 00000010.00000003.310620787.00000000051D6000.00000004.00000040.sdmp
      Source: Binary string: AcLayers.pdb source: WerFault.exe, 00000010.00000003.310596406.0000000005201000.00000004.00000001.sdmp
      Source: Binary string: Kernel.Appcore.pdb source: WerFault.exe, 00000010.00000003.310608360.00000000051D0000.00000004.00000040.sdmp
      Source: Binary string: rasapi32.pdb( source: WerFault.exe, 00000010.00000003.310620787.00000000051D6000.00000004.00000040.sdmp
      Source: Binary string: powrprof.pdb?( source: WerFault.exe, 00000010.00000003.310620787.00000000051D6000.00000004.00000040.sdmp
      Source: Binary string: cryptbase.pdb source: WerFault.exe, 00000010.00000003.310620787.00000000051D6000.00000004.00000040.sdmp
      Source: Binary string: bcryptprimitives.pdb source: WerFault.exe, 00000010.00000003.310608360.00000000051D0000.00000004.00000040.sdmp
      Source: Binary string: cfgmgr32.pdb source: WerFault.exe, 00000010.00000003.310608360.00000000051D0000.00000004.00000040.sdmp
      Source: Binary string: combase.pdb source: WerFault.exe, 00000010.00000003.310620787.00000000051D6000.00000004.00000040.sdmp
      Source: Binary string: Windows.Storage.pdb source: WerFault.exe, 00000010.00000003.310608360.00000000051D0000.00000004.00000040.sdmp
      Source: Binary string: rundll32.pdb source: WerFault.exe, 00000010.00000003.310596406.0000000005201000.00000004.00000001.sdmp
      Source: Binary string: oleaut32.pdb source: WerFault.exe, 00000010.00000003.310620787.00000000051D6000.00000004.00000040.sdmp
      Source: Binary string: sfc.pdb source: WerFault.exe, 00000010.00000003.310620787.00000000051D6000.00000004.00000040.sdmp
      Source: Binary string: apphelp.pdb source: WerFault.exe, 00000010.00000003.310596406.0000000005201000.00000004.00000001.sdmp
      Source: Binary string: wuser32.pdb source: WerFault.exe, 00000010.00000003.310596406.0000000005201000.00000004.00000001.sdmp
      Source: 87324661_by_Libranalysis.dllStatic PE information: real checksum: 0x341fe should be: 0x2c024
      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_10003625 push ecx; ret
      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_1000657D push ecx; iretd
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1000F6CC push esi; mov dword ptr [esp], 00000000h
      Source: initial sampleStatic PE information: section name: .text entropy: 7.58615299723
      Source: C:\Windows\SysWOW64\WerFault.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX

      Malware Analysis System Evasion:

      barindex
      Tries to detect sandboxes / dynamic malware analysis system (file name check)Show sources
      Source: C:\Windows\SysWOW64\rundll32.exeSection loaded: \KnownDlls32\TESTAPP.exe
      Source: WerFault.exe, 00000010.00000002.325002595.0000000004C77000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW(
      Source: WerFault.exe, 00000010.00000002.325097662.0000000004E90000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
      Source: WerFault.exe, 00000010.00000002.325062640.0000000004C9D000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW
      Source: WerFault.exe, 00000010.00000002.325097662.0000000004E90000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
      Source: WerFault.exe, 00000010.00000002.325097662.0000000004E90000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
      Source: WerFault.exe, 00000010.00000002.325097662.0000000004E90000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
      Source: C:\Windows\System32\loaddll32.exeProcess queried: DebugPort
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10006D50 GetUserNameW,MessageBoxW,GetLastError,CreateFileA,DebugBreak,FlushFileBuffers,FreeEnvironmentStringsA,GetConsoleOutputCP,GetEnvironmentStrings,GetLocaleInfoA,GetStartupInfoA,GetStringTypeA,HeapValidate,IsBadReadPtr,LCMapStringA,LoadLibraryA,OutputDebugStringA,
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\87324661_by_Libranalysis.dll',#1
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetUserNameW,MessageBoxW,GetLastError,CreateFileA,DebugBreak,FlushFileBuffers,FreeEnvironmentStringsA,GetConsoleOutputCP,GetEnvironmentStrings,GetLocaleInfoA,GetStartupInfoA,GetStringTypeA,HeapValidate,IsBadReadPtr,LCMapStringA,LoadLibraryA,OutputDebugStringA,
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10006D50 GetUserNameW,MessageBoxW,GetLastError,CreateFileA,DebugBreak,FlushFileBuffers,FreeEnvironmentStringsA,GetConsoleOutputCP,GetEnvironmentStrings,GetLocaleInfoA,GetStartupInfoA,GetStringTypeA,HeapValidate,IsBadReadPtr,LCMapStringA,LoadLibraryA,OutputDebugStringA,

      Mitre Att&ck Matrix

      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
      Valid AccountsWindows Management InstrumentationPath InterceptionProcess Injection11Virtualization/Sandbox Evasion11OS Credential DumpingQuery Registry1Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
      Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsProcess Injection11LSASS MemorySecurity Software Discovery121Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothApplication Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or Information2Security Account ManagerVirtualization/Sandbox Evasion11SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Rundll321NTDSAccount Discovery1Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware Packing3LSA SecretsSystem Owner/User Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
      Replication Through Removable MediaLaunchdRc.commonRc.commonSteganographyCached Domain CredentialsRemote System Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSyncSystem Information Discovery11Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact

      Behavior Graph

      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      Screenshots

      Thumbnails

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

      windows-stand

      Antivirus, Machine Learning and Genetic Malware Detection

      Initial Sample

      SourceDetectionScannerLabelLink
      87324661_by_Libranalysis.dll68%ReversingLabsWin32.Infostealer.Dridex
      87324661_by_Libranalysis.dll100%Joe Sandbox ML

      Dropped Files

      No Antivirus matches

      Unpacked PE Files

      SourceDetectionScannerLabelLinkDownload
      3.2.rundll32.exe.8e07fa.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
      3.2.rundll32.exe.900000.2.unpack100%AviraTR/ATRAPS.Gen2Download File

      Domains

      No Antivirus matches

      URLs

      SourceDetectionScannerLabelLink
      http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s0%URL Reputationsafe
      http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s0%URL Reputationsafe
      http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s0%URL Reputationsafe
      http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s0%URL Reputationsafe
      https://sectigo.com/CPS00%URL Reputationsafe
      https://sectigo.com/CPS00%URL Reputationsafe
      https://sectigo.com/CPS00%URL Reputationsafe
      https://sectigo.com/CPS00%URL Reputationsafe
      http://ocsp.sectigo.com00%URL Reputationsafe
      http://ocsp.sectigo.com00%URL Reputationsafe
      http://ocsp.sectigo.com00%URL Reputationsafe
      http://ocsp.sectigo.com00%URL Reputationsafe
      http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#0%URL Reputationsafe
      http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#0%URL Reputationsafe
      http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#0%URL Reputationsafe
      http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#0%URL Reputationsafe

      Domains and IPs

      Contacted Domains

      No contacted domains info

      URLs from Memory and Binaries

      NameSourceMaliciousAntivirus DetectionReputation
      http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0sWerFault.exe, 00000010.00000002.325705287.0000000005130000.00000002.00000001.sdmp, 87324661_by_Libranalysis.dllfalse
      • URL Reputation: safe
      • URL Reputation: safe
      • URL Reputation: safe
      • URL Reputation: safe
      unknown
      https://sectigo.com/CPS0WerFault.exe, 00000010.00000002.325705287.0000000005130000.00000002.00000001.sdmp, 87324661_by_Libranalysis.dllfalse
      • URL Reputation: safe
      • URL Reputation: safe
      • URL Reputation: safe
      • URL Reputation: safe
      unknown
      http://ocsp.sectigo.com0WerFault.exe, 00000010.00000002.325705287.0000000005130000.00000002.00000001.sdmp, 87324661_by_Libranalysis.dllfalse
      • URL Reputation: safe
      • URL Reputation: safe
      • URL Reputation: safe
      • URL Reputation: safe
      unknown
      http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#WerFault.exe, 00000010.00000002.325705287.0000000005130000.00000002.00000001.sdmp, 87324661_by_Libranalysis.dllfalse
      • URL Reputation: safe
      • URL Reputation: safe
      • URL Reputation: safe
      • URL Reputation: safe
      unknown

      Contacted IPs

      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs

      Public

      IPDomainCountryFlagASNASN NameMalicious
      94.177.255.18
      unknownItaly
      199883ARUBACLOUDLTD-ASNGBtrue
      203.114.109.124
      unknownThailand
      131293TOT-LLI-AS-APTOTPublicCompanyLimitedTHtrue
      82.165.145.100
      unknownGermany
      8560ONEANDONE-ASBrauerstrasse48DEtrue

      General Information

      Joe Sandbox Version:32.0.0 Black Diamond
      Analysis ID:413043
      Start date:13.05.2021
      Start time:06:52:21
      Joe Sandbox Product:CloudBasic
      Overall analysis duration:0h 6m 23s
      Hypervisor based Inspection enabled:false
      Report type:light
      Sample file name:87324661_by_Libranalysis (renamed file extension from none to dll)
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
      Number of analysed new started processes analysed:33
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • HDC enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Detection:MAL
      Classification:mal76.troj.evad.winDLL@6/4@0/3
      EGA Information:Failed
      HDC Information:
      • Successful, ratio: 58.1% (good quality ratio 50.1%)
      • Quality average: 67%
      • Quality standard deviation: 35.5%
      HCA Information:
      • Successful, ratio: 71%
      • Number of executed functions: 0
      • Number of non-executed functions: 0
      Cookbook Comments:
      • Adjust boot time
      • Enable AMSI

      Simulations

      Behavior and APIs

      TimeTypeDescription
      06:53:53API Interceptor1x Sleep call for process: WerFault.exe modified

      Joe Sandbox View / Context

      IPs

      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
      94.177.255.18931f389a_by_Libranalysis.dllGet hashmaliciousBrowse
        ed938820_by_Libranalysis.dllGet hashmaliciousBrowse
          931f389a_by_Libranalysis.dllGet hashmaliciousBrowse
            ed938820_by_Libranalysis.dllGet hashmaliciousBrowse
              ab44ae30_by_Libranalysis.dllGet hashmaliciousBrowse
                ab44ae30_by_Libranalysis.dllGet hashmaliciousBrowse
                  e442fdd8_by_Libranalysis.dllGet hashmaliciousBrowse
                    e442fdd8_by_Libranalysis.dllGet hashmaliciousBrowse
                      8ca7a263_by_Libranalysis.dllGet hashmaliciousBrowse
                        8ca7a263_by_Libranalysis.dllGet hashmaliciousBrowse
                          2617efd0_by_Libranalysis.dllGet hashmaliciousBrowse
                            ec120f08_by_Libranalysis.dllGet hashmaliciousBrowse
                              2617efd0_by_Libranalysis.dllGet hashmaliciousBrowse
                                83832e74_by_Libranalysis.dllGet hashmaliciousBrowse
                                  cce7d578_by_Libranalysis.dllGet hashmaliciousBrowse
                                    ec120f08_by_Libranalysis.dllGet hashmaliciousBrowse
                                      83832e74_by_Libranalysis.dllGet hashmaliciousBrowse
                                        cce7d578_by_Libranalysis.dllGet hashmaliciousBrowse
                                          be825cf1_by_Libranalysis.dllGet hashmaliciousBrowse
                                            be825cf1_by_Libranalysis.dllGet hashmaliciousBrowse
                                              203.114.109.124931f389a_by_Libranalysis.dllGet hashmaliciousBrowse
                                                ed938820_by_Libranalysis.dllGet hashmaliciousBrowse
                                                  931f389a_by_Libranalysis.dllGet hashmaliciousBrowse
                                                    ed938820_by_Libranalysis.dllGet hashmaliciousBrowse
                                                      ab44ae30_by_Libranalysis.dllGet hashmaliciousBrowse
                                                        ab44ae30_by_Libranalysis.dllGet hashmaliciousBrowse
                                                          e442fdd8_by_Libranalysis.dllGet hashmaliciousBrowse
                                                            e442fdd8_by_Libranalysis.dllGet hashmaliciousBrowse
                                                              8ca7a263_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                8ca7a263_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                  2617efd0_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                    ec120f08_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                      2617efd0_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                        83832e74_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                          cce7d578_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                            ec120f08_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                              83832e74_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                cce7d578_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                  be825cf1_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                    be825cf1_by_Libranalysis.dllGet hashmaliciousBrowse

                                                                                      Domains

                                                                                      No context

                                                                                      ASN

                                                                                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                                      TOT-LLI-AS-APTOTPublicCompanyLimitedTH931f389a_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                      • 203.114.109.124
                                                                                      ed938820_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                      • 203.114.109.124
                                                                                      931f389a_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                      • 203.114.109.124
                                                                                      ed938820_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                      • 203.114.109.124
                                                                                      ab44ae30_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                      • 203.114.109.124
                                                                                      ab44ae30_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                      • 203.114.109.124
                                                                                      e442fdd8_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                      • 203.114.109.124
                                                                                      e442fdd8_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                      • 203.114.109.124
                                                                                      8ca7a263_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                      • 203.114.109.124
                                                                                      8ca7a263_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                      • 203.114.109.124
                                                                                      2617efd0_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                      • 203.114.109.124
                                                                                      ec120f08_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                      • 203.114.109.124
                                                                                      2617efd0_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                      • 203.114.109.124
                                                                                      83832e74_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                      • 203.114.109.124
                                                                                      cce7d578_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                      • 203.114.109.124
                                                                                      ec120f08_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                      • 203.114.109.124
                                                                                      83832e74_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                      • 203.114.109.124
                                                                                      cce7d578_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                      • 203.114.109.124
                                                                                      be825cf1_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                      • 203.114.109.124
                                                                                      be825cf1_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                      • 203.114.109.124
                                                                                      ARUBACLOUDLTD-ASNGB931f389a_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                      • 94.177.255.18
                                                                                      ed938820_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                      • 94.177.255.18
                                                                                      931f389a_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                      • 94.177.255.18
                                                                                      ed938820_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                      • 94.177.255.18
                                                                                      ab44ae30_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                      • 94.177.255.18
                                                                                      ab44ae30_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                      • 94.177.255.18
                                                                                      e442fdd8_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                      • 94.177.255.18
                                                                                      e442fdd8_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                      • 94.177.255.18
                                                                                      8ca7a263_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                      • 94.177.255.18
                                                                                      8ca7a263_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                      • 94.177.255.18
                                                                                      2617efd0_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                      • 94.177.255.18
                                                                                      ec120f08_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                      • 94.177.255.18
                                                                                      2617efd0_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                      • 94.177.255.18
                                                                                      83832e74_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                      • 94.177.255.18
                                                                                      cce7d578_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                      • 94.177.255.18
                                                                                      ec120f08_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                      • 94.177.255.18
                                                                                      83832e74_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                      • 94.177.255.18
                                                                                      cce7d578_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                      • 94.177.255.18
                                                                                      be825cf1_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                      • 94.177.255.18
                                                                                      be825cf1_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                      • 94.177.255.18

                                                                                      JA3 Fingerprints

                                                                                      No context

                                                                                      Dropped Files

                                                                                      No context

                                                                                      Created / dropped Files

                                                                                      C:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_rundll32.exe_8312e17df74c6535839b6a3ab171c47136d6e399_82810a17_154bbd7d\Report.wer
                                                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                      File Type:Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):12688
                                                                                      Entropy (8bit):3.76777862063572
                                                                                      Encrypted:false
                                                                                      SSDEEP:192:x+6iM0oXprYRHBUZMX4jed+0YwR/u7saS274ItWck:U6iKXVWBUZMX4jeb7/u7saX4ItWck
                                                                                      MD5:1256256EA6A39E799376E56238EC9099
                                                                                      SHA1:14D1CC8EE890E72F193982A08A9044A3EE8E4019
                                                                                      SHA-256:28342B0B2EFEBB88CF401D5D7A6C4028F4E560FD2647470CBC5FBD2F99FE017C
                                                                                      SHA-512:FF14D76D186E2D97D9EF3794A12587EF99561E3E8D57F5DBCB71C8429687C96C045CEF3AD8BB68441FD0F1C74AE583149858551041894E30434DC9CF1B225E9E
                                                                                      Malicious:false
                                                                                      Reputation:low
                                                                                      Preview: ..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.2.6.5.3.8.7.6.2.6.1.1.8.7.2.4.7.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.2.6.5.3.8.7.6.3.1.4.1.5.5.8.3.1.....R.e.p.o.r.t.S.t.a.t.u.s.=.2.6.8.4.3.5.4.5.6.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.1.8.a.1.0.b.8.0.-.1.c.a.4.-.4.4.7.9.-.a.7.7.e.-.8.5.4.a.8.6.1.9.7.e.1.c.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.7.0.0.5.8.2.a.c.-.8.a.e.7.-.4.3.e.1.-.8.3.0.a.-.b.d.4.7.c.e.1.4.a.1.2.8.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.4.d.0.-.0.0.0.1.-.0.0.1.7.-.3.e.e.a.-.9.4.4.f.f.f.4.7.d.7.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.b.c.c.5.d.c.3.2.2.2.0.3.4.d.3.f.2.5.7.f.1.f.d.3.5.8.8.9.e.5.b.e.9.0.
                                                                                      C:\ProgramData\Microsoft\Windows\WER\Temp\WERA09F.tmp.dmp
                                                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                      File Type:Mini DuMP crash report, 14 streams, Thu May 13 13:53:47 2021, 0x1205a4 type
                                                                                      Category:dropped
                                                                                      Size (bytes):40860
                                                                                      Entropy (8bit):2.4130070038902205
                                                                                      Encrypted:false
                                                                                      SSDEEP:192:pb8Z42iIjusSocgMEU7G3aLDc4YQ9aP1LdyD8PhR:S3LmGeA4Hu1LdyDGR
                                                                                      MD5:C063AFF7BDFA3074088905422B00388D
                                                                                      SHA1:AA47847CFB6B72D4E012F13EB1203068A57477F3
                                                                                      SHA-256:81039B7FFA0E0FDE21D0CD0A9B0885F69889FB64CBE2685F1C12D7211BEEBADB
                                                                                      SHA-512:7E52A69AE88F2EACFD2BC493976044B28DBFF35B773E9506F6F0755AB9E4928BAA712BE518449C74DB0341ED773F7743B6A1885208CEDE225EAE7040B0CC61D5
                                                                                      Malicious:false
                                                                                      Reputation:low
                                                                                      Preview: MDMP....... .......k/.`...................U...........B......P ......GenuineIntelW...........T...........F/.`.............................0..=...............P.a.c.i.f.i.c. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................P.a.c.i.f.i.c. .D.a.y.l.i.g.h.t. .T.i.m.e...........................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.............................................................................................................................................................................................................................................................................................................................................................................................................................................................d.b.g.c.o.r.e...i.3.8.6.,.1.0...0...1.7.1.3.4...1.........................................................................................................
                                                                                      C:\ProgramData\Microsoft\Windows\WER\Temp\WERA7D4.tmp.WERInternalMetadata.xml
                                                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                      File Type:XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):8292
                                                                                      Entropy (8bit):3.692604650550988
                                                                                      Encrypted:false
                                                                                      SSDEEP:192:Rrl7r3GLNivo6nQQ06YNV6egKGgmfTUYuSVCprf89bMnZCsfLEm:RrlsNiw6c6Y/6eEgmfTU/SNMnZBft
                                                                                      MD5:788C5E2F33ED0137284CAB89A44F043F
                                                                                      SHA1:8B2C4CF539F36D75DD888800665C2CF9CC8D85E0
                                                                                      SHA-256:24EBCB636C8C1D25399070350AC2C8BECAE0573A65CA27AAAC7442109F07754E
                                                                                      SHA-512:9B09F15D2847FBB5766CC6EE57A0C7B8D30206E6FDFBC1E345AB05A3AD8E3558DCE6785C8229E221604ECE49B4499D81151ED04DE46C43462F7F9740CFC67430
                                                                                      Malicious:false
                                                                                      Reputation:low
                                                                                      Preview: ..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.1.2.3.2.<./.P.i.d.>.......
                                                                                      C:\ProgramData\Microsoft\Windows\WER\Temp\WERAA65.tmp.xml
                                                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):4663
                                                                                      Entropy (8bit):4.472044710158667
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:cvIwSD8zshrJgtWI9ESWSC8Bz8fm8M4JCdsDNCFQI+q8/KNFwi54SrSVd:uITfD3zSNOJBNZIxNmi5DWVd
                                                                                      MD5:27E573A2A68D586CF24B3916F9CDB96F
                                                                                      SHA1:B6156BF3D6FB3EC1F5DC520C9B7317B4D6EB8504
                                                                                      SHA-256:93DF4769AFAD409511CD849738658BDBE0BF28602E87A3D82A418EC92CC80219
                                                                                      SHA-512:47062DEEB539F15EF6C7192667A5DCB7C7209E5685CEF7A0B6DF7FBC56478B3EE0176038320E216EA12E932C96729FF80A2C6130EF7C667A82713B0CC1B36190
                                                                                      Malicious:false
                                                                                      Reputation:low
                                                                                      Preview: <?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="987784" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..

                                                                                      Static File Info

                                                                                      General

                                                                                      File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                      Entropy (8bit):7.585730266072232
                                                                                      TrID:
                                                                                      • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
                                                                                      • Generic Win/DOS Executable (2004/3) 0.20%
                                                                                      • DOS Executable Generic (2002/1) 0.20%
                                                                                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                      File name:87324661_by_Libranalysis.dll
                                                                                      File size:166856
                                                                                      MD5:873246614925eed7eb818ffa6f785b75
                                                                                      SHA1:b92a017964f94fa7cf2c77a95ea1095513c5431d
                                                                                      SHA256:78bad82ee0230454a48cc41c1a951c304027ffc7d1b5d2c1b5bc4567db455109
                                                                                      SHA512:92bca7ae32d548dfaaae3ae78de2f07d7dca1b43fc1039fd32a6a751662d4e3a8b7b2d56577d1c18b64d4b7d286f7025dfdc9787706c8cf100f339fc61e55013
                                                                                      SSDEEP:3072:besl4+VdlY+01jb5SA5hg9PTEfPa1x+pq0KbuFicLiV:f4+VZQpt5hyPsa1ekiE9V
                                                                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......t.%.0zK.0zK.0zK.0zJ.}{K...3..{K.....P{K...3..zK.V....zK...1..{K......zK.Rich0zK.........................................PE..L..

                                                                                      File Icon

                                                                                      Icon Hash:74f0e4ecccdce0e4

                                                                                      Static PE Info

                                                                                      General

                                                                                      Entrypoint:0x10023140
                                                                                      Entrypoint Section:.text
                                                                                      Digitally signed:true
                                                                                      Imagebase:0x10000000
                                                                                      Subsystem:windows gui
                                                                                      Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
                                                                                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT
                                                                                      Time Stamp:0x609C7F8E [Thu May 13 01:23:26 2021 UTC]
                                                                                      TLS Callbacks:
                                                                                      CLR (.Net) Version:
                                                                                      OS Version Major:5
                                                                                      OS Version Minor:0
                                                                                      File Version Major:5
                                                                                      File Version Minor:0
                                                                                      Subsystem Version Major:5
                                                                                      Subsystem Version Minor:0
                                                                                      Import Hash:a86a1220a8aaf2bed0594d018b59c83f

                                                                                      Authenticode Signature

                                                                                      Signature Valid:false
                                                                                      Signature Issuer:CN=Sectigo RSA Code Signing CA, O=Sectigo Limited, L=Salford, S=Greater Manchester, C=GB
                                                                                      Signature Validation Error:The digital signature of the object did not verify
                                                                                      Error Number:-2146869232
                                                                                      Not Before, Not After
                                                                                      • 12/6/2020 4:00:00 PM 12/7/2021 3:59:59 PM
                                                                                      Subject Chain
                                                                                      • CN=STAND ALONE MUSIC LTD, O=STAND ALONE MUSIC LTD, STREET="23 Cameo House, 11 Bear Street", L=LONDON, PostalCode=WC2H 7AS, C=GB
                                                                                      Version:3
                                                                                      Thumbprint MD5:BE49CFBB4B6B5F4638C9EC0872B04B7C
                                                                                      Thumbprint SHA-1:A5887C72B22F81884E714EDEC711E52FDC60EA37
                                                                                      Thumbprint SHA-256:F680FAB6A9D21E8E76003C5C28B3C5084866D7AC85CF0CFB5AAA02F69EE99F1E
                                                                                      Serial:3B777165B125BCCC181D0BAC3F5B55B3

                                                                                      Entrypoint Preview

                                                                                      Instruction
                                                                                      xor eax, eax
                                                                                      add eax, 00002234h
                                                                                      cmpss xmm1, xmm2, 03h
                                                                                      sub eax, 00002233h
                                                                                      mov edx, 00000000h
                                                                                      mov edx, 00000000h
                                                                                      mov edx, 00000000h
                                                                                      mov edx, 00000000h
                                                                                      mov edx, 00000000h
                                                                                      mov edx, 00000000h
                                                                                      cmpss xmm1, xmm2, 03h
                                                                                      cmp eax, 02h
                                                                                      jne 00007F96248A1E29h
                                                                                      mov eax, 00000000h
                                                                                      mov eax, 00000000h
                                                                                      mov eax, 00000000h
                                                                                      mov eax, 00000000h
                                                                                      mov eax, 00000000h
                                                                                      mov eax, 00000000h
                                                                                      mov eax, 00000000h
                                                                                      mov eax, 00000000h
                                                                                      mov eax, 00000000h
                                                                                      mov eax, 00000000h
                                                                                      mov eax, 00000000h
                                                                                      mov eax, 00000000h
                                                                                      mov eax, 00000000h
                                                                                      mov eax, 00000000h
                                                                                      mov eax, 00000000h
                                                                                      mov eax, 00000000h
                                                                                      mov eax, 00000000h
                                                                                      mov eax, 00000000h
                                                                                      mov eax, 00000000h
                                                                                      mov eax, 00000000h
                                                                                      mov eax, 00000000h
                                                                                      mov eax, 00000000h
                                                                                      mov eax, 00000000h
                                                                                      mov eax, 00000000h
                                                                                      mov eax, 00000000h
                                                                                      mov eax, 00000000h
                                                                                      mov eax, 00000000h
                                                                                      mov eax, 00000000h

                                                                                      Rich Headers

                                                                                      Programming Language:
                                                                                      • [RES] VS2012 UPD3 build 60610
                                                                                      • [LNK] VS2005 build 50727
                                                                                      • [EXP] VS2005 build 50727
                                                                                      • [ C ] VS2012 UPD4 build 61030
                                                                                      • [IMP] VS2013 UPD2 build 30501

                                                                                      Data Directories

                                                                                      NameVirtual AddressVirtual Size Is in Section
                                                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x2672a0x5b.rdata
                                                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x267f80x59.rdata
                                                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x2b0000x3a0.rsrc
                                                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x274000x17c8.pdata
                                                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x2c0000x1220
                                                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x100180x38.text
                                                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_IAT0x240000x58.rdata
                                                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                                                      Sections

                                                                                      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                      .text0x10000x222bc0x22400False0.76244582573data7.58615299723IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                                                      .rdata0x240000x2a760x2c00False0.787819602273SysEx File -7.46416514998IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                      .pdata0x270000x33070x1800False0.76806640625MMDF mailbox7.41456160551IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                                                                      .rsrc0x2b0000x3a00x400False0.423828125data3.05991849143IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                      .reloc0x2c0000x2300x400False0.4951171875data3.95131264834IMAGE_SCN_TYPE_NOLOAD, IMAGE_SCN_TYPE_DSECT, IMAGE_SCN_TYPE_NO_PAD, IMAGE_SCN_TYPE_GROUP, IMAGE_SCN_TYPE_COPY, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                                                      Resources

                                                                                      NameRVASizeTypeLanguageCountry
                                                                                      RT_VERSION0x2b0600x33cdata

                                                                                      Imports

                                                                                      DLLImport
                                                                                      ADVAPI32.dllRegOverridePredefKey
                                                                                      CLUSAPI.dllClusterEnum
                                                                                      RASAPI32.dllRasGetConnectionStatistics
                                                                                      ole32.dllCreatePointerMoniker, CreateStreamOnHGlobal
                                                                                      OPENGL32.dllglTexSubImage1D
                                                                                      KERNEL32.dllCloseHandle, LoadLibraryExA, OutputDebugStringA, CreateFileW, GetProfileSectionW, GetProfileSectionA, LoadLibraryW, OpenSemaphoreW
                                                                                      USER32.dllTranslateMessage

                                                                                      Version Infos

                                                                                      DescriptionData
                                                                                      LegalCopyrightCopyright 2018
                                                                                      InternalNamex2otfb
                                                                                      FileVersion7.2.5422.00
                                                                                      Full Version7.2.5_000-b00
                                                                                      CompanyNameOracle Corporation
                                                                                      ProductNameXhot(BM) Ltloehey YO 8
                                                                                      ProductVersion7.2.5422.00
                                                                                      FileDescriptionJava(TM) Platform SE binary
                                                                                      OriginalFilenamex2otfb.dll
                                                                                      Translation0x0000 0x04b0

                                                                                      Network Behavior

                                                                                      Network Port Distribution

                                                                                      UDP Packets

                                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                                      May 13, 2021 06:53:03.650938988 CEST53518378.8.8.8192.168.2.7
                                                                                      May 13, 2021 06:53:04.575496912 CEST5541153192.168.2.78.8.8.8
                                                                                      May 13, 2021 06:53:04.636465073 CEST53554118.8.8.8192.168.2.7
                                                                                      May 13, 2021 06:53:05.169647932 CEST6366853192.168.2.78.8.8.8
                                                                                      May 13, 2021 06:53:05.220032930 CEST53636688.8.8.8192.168.2.7
                                                                                      May 13, 2021 06:53:06.270973921 CEST5464053192.168.2.78.8.8.8
                                                                                      May 13, 2021 06:53:06.322563887 CEST53546408.8.8.8192.168.2.7
                                                                                      May 13, 2021 06:53:07.190846920 CEST5873953192.168.2.78.8.8.8
                                                                                      May 13, 2021 06:53:07.241010904 CEST53587398.8.8.8192.168.2.7
                                                                                      May 13, 2021 06:53:08.213059902 CEST6033853192.168.2.78.8.8.8
                                                                                      May 13, 2021 06:53:08.270248890 CEST53603388.8.8.8192.168.2.7
                                                                                      May 13, 2021 06:53:10.013606071 CEST5871753192.168.2.78.8.8.8
                                                                                      May 13, 2021 06:53:10.062330961 CEST53587178.8.8.8192.168.2.7
                                                                                      May 13, 2021 06:53:10.982935905 CEST5976253192.168.2.78.8.8.8
                                                                                      May 13, 2021 06:53:11.042082071 CEST53597628.8.8.8192.168.2.7
                                                                                      May 13, 2021 06:53:12.093765974 CEST5432953192.168.2.78.8.8.8
                                                                                      May 13, 2021 06:53:12.150939941 CEST53543298.8.8.8192.168.2.7
                                                                                      May 13, 2021 06:53:15.986905098 CEST5805253192.168.2.78.8.8.8
                                                                                      May 13, 2021 06:53:16.040357113 CEST53580528.8.8.8192.168.2.7
                                                                                      May 13, 2021 06:53:17.299525976 CEST5400853192.168.2.78.8.8.8
                                                                                      May 13, 2021 06:53:17.356952906 CEST53540088.8.8.8192.168.2.7
                                                                                      May 13, 2021 06:53:18.371773958 CEST5945153192.168.2.78.8.8.8
                                                                                      May 13, 2021 06:53:18.422003984 CEST53594518.8.8.8192.168.2.7
                                                                                      May 13, 2021 06:53:19.375796080 CEST5291453192.168.2.78.8.8.8
                                                                                      May 13, 2021 06:53:19.425734997 CEST53529148.8.8.8192.168.2.7
                                                                                      May 13, 2021 06:53:20.320971012 CEST6456953192.168.2.78.8.8.8
                                                                                      May 13, 2021 06:53:20.379380941 CEST53645698.8.8.8192.168.2.7
                                                                                      May 13, 2021 06:53:22.141390085 CEST5281653192.168.2.78.8.8.8
                                                                                      May 13, 2021 06:53:22.190107107 CEST53528168.8.8.8192.168.2.7
                                                                                      May 13, 2021 06:53:23.126115084 CEST5078153192.168.2.78.8.8.8
                                                                                      May 13, 2021 06:53:23.177876949 CEST53507818.8.8.8192.168.2.7
                                                                                      May 13, 2021 06:53:24.430749893 CEST5423053192.168.2.78.8.8.8
                                                                                      May 13, 2021 06:53:24.479428053 CEST53542308.8.8.8192.168.2.7
                                                                                      May 13, 2021 06:53:29.998092890 CEST5491153192.168.2.78.8.8.8
                                                                                      May 13, 2021 06:53:30.058737993 CEST53549118.8.8.8192.168.2.7
                                                                                      May 13, 2021 06:53:31.377778053 CEST4995853192.168.2.78.8.8.8
                                                                                      May 13, 2021 06:53:31.428180933 CEST53499588.8.8.8192.168.2.7
                                                                                      May 13, 2021 06:53:32.585802078 CEST5086053192.168.2.78.8.8.8
                                                                                      May 13, 2021 06:53:32.634721994 CEST53508608.8.8.8192.168.2.7
                                                                                      May 13, 2021 06:53:34.213552952 CEST5045253192.168.2.78.8.8.8
                                                                                      May 13, 2021 06:53:34.262284040 CEST53504528.8.8.8192.168.2.7
                                                                                      May 13, 2021 06:53:35.594146967 CEST5973053192.168.2.78.8.8.8
                                                                                      May 13, 2021 06:53:35.642837048 CEST53597308.8.8.8192.168.2.7
                                                                                      May 13, 2021 06:53:38.883027077 CEST5931053192.168.2.78.8.8.8
                                                                                      May 13, 2021 06:53:38.931754112 CEST53593108.8.8.8192.168.2.7
                                                                                      May 13, 2021 06:53:40.004771948 CEST5191953192.168.2.78.8.8.8
                                                                                      May 13, 2021 06:53:40.055289030 CEST53519198.8.8.8192.168.2.7
                                                                                      May 13, 2021 06:53:50.918724060 CEST6429653192.168.2.78.8.8.8
                                                                                      May 13, 2021 06:53:50.993432999 CEST53642968.8.8.8192.168.2.7
                                                                                      May 13, 2021 06:53:53.093300104 CEST5668053192.168.2.78.8.8.8
                                                                                      May 13, 2021 06:53:53.142174959 CEST53566808.8.8.8192.168.2.7
                                                                                      May 13, 2021 06:53:59.845599890 CEST5882053192.168.2.78.8.8.8
                                                                                      May 13, 2021 06:53:59.909684896 CEST53588208.8.8.8192.168.2.7
                                                                                      May 13, 2021 06:54:08.344572067 CEST6098353192.168.2.78.8.8.8
                                                                                      May 13, 2021 06:54:08.403266907 CEST53609838.8.8.8192.168.2.7
                                                                                      May 13, 2021 06:54:33.806541920 CEST4924753192.168.2.78.8.8.8
                                                                                      May 13, 2021 06:54:33.871860027 CEST53492478.8.8.8192.168.2.7
                                                                                      May 13, 2021 06:54:44.187128067 CEST5228653192.168.2.78.8.8.8
                                                                                      May 13, 2021 06:54:44.245999098 CEST53522868.8.8.8192.168.2.7
                                                                                      May 13, 2021 06:54:59.335824966 CEST5606453192.168.2.78.8.8.8
                                                                                      May 13, 2021 06:54:59.449593067 CEST53560648.8.8.8192.168.2.7
                                                                                      May 13, 2021 06:54:59.995862961 CEST6374453192.168.2.78.8.8.8
                                                                                      May 13, 2021 06:55:00.055728912 CEST53637448.8.8.8192.168.2.7
                                                                                      May 13, 2021 06:55:00.476495028 CEST6145753192.168.2.78.8.8.8
                                                                                      May 13, 2021 06:55:00.548268080 CEST53614578.8.8.8192.168.2.7
                                                                                      May 13, 2021 06:55:00.685201883 CEST5836753192.168.2.78.8.8.8
                                                                                      May 13, 2021 06:55:00.750860929 CEST53583678.8.8.8192.168.2.7
                                                                                      May 13, 2021 06:55:01.225806952 CEST6059953192.168.2.78.8.8.8
                                                                                      May 13, 2021 06:55:01.283047915 CEST53605998.8.8.8192.168.2.7
                                                                                      May 13, 2021 06:55:01.842647076 CEST5957153192.168.2.78.8.8.8
                                                                                      May 13, 2021 06:55:01.902240038 CEST53595718.8.8.8192.168.2.7
                                                                                      May 13, 2021 06:55:02.463356972 CEST5268953192.168.2.78.8.8.8
                                                                                      May 13, 2021 06:55:02.522622108 CEST53526898.8.8.8192.168.2.7
                                                                                      May 13, 2021 06:55:03.004291058 CEST5029053192.168.2.78.8.8.8
                                                                                      May 13, 2021 06:55:03.067368984 CEST53502908.8.8.8192.168.2.7
                                                                                      May 13, 2021 06:55:03.937666893 CEST6042753192.168.2.78.8.8.8
                                                                                      May 13, 2021 06:55:03.997759104 CEST53604278.8.8.8192.168.2.7
                                                                                      May 13, 2021 06:55:05.019449949 CEST5620953192.168.2.78.8.8.8
                                                                                      May 13, 2021 06:55:05.077378035 CEST53562098.8.8.8192.168.2.7
                                                                                      May 13, 2021 06:55:05.508192062 CEST5958253192.168.2.78.8.8.8
                                                                                      May 13, 2021 06:55:05.625802040 CEST53595828.8.8.8192.168.2.7

                                                                                      Code Manipulations

                                                                                      Statistics

                                                                                      Behavior

                                                                                      Click to jump to process

                                                                                      System Behavior

                                                                                      General

                                                                                      Start time:06:53:10
                                                                                      Start date:13/05/2021
                                                                                      Path:C:\Windows\System32\loaddll32.exe
                                                                                      Wow64 process (32bit):true
                                                                                      Commandline:loaddll32.exe 'C:\Users\user\Desktop\87324661_by_Libranalysis.dll'
                                                                                      Imagebase:0x1050000
                                                                                      File size:116736 bytes
                                                                                      MD5 hash:542795ADF7CC08EFCF675D65310596E8
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Reputation:high

                                                                                      General

                                                                                      Start time:06:53:10
                                                                                      Start date:13/05/2021
                                                                                      Path:C:\Windows\SysWOW64\cmd.exe
                                                                                      Wow64 process (32bit):true
                                                                                      Commandline:cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\87324661_by_Libranalysis.dll',#1
                                                                                      Imagebase:0x870000
                                                                                      File size:232960 bytes
                                                                                      MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Reputation:high

                                                                                      General

                                                                                      Start time:06:53:10
                                                                                      Start date:13/05/2021
                                                                                      Path:C:\Windows\SysWOW64\rundll32.exe
                                                                                      Wow64 process (32bit):true
                                                                                      Commandline:rundll32.exe 'C:\Users\user\Desktop\87324661_by_Libranalysis.dll',#1
                                                                                      Imagebase:0xe00000
                                                                                      File size:61952 bytes
                                                                                      MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Yara matches:
                                                                                      • Rule: JoeSecurity_Dridex_1, Description: Yara detected Dridex unpacked file, Source: 00000003.00000002.329383594.0000000010001000.00000020.00020000.sdmp, Author: Joe Security
                                                                                      Reputation:high

                                                                                      General

                                                                                      Start time:06:53:43
                                                                                      Start date:13/05/2021
                                                                                      Path:C:\Windows\SysWOW64\WerFault.exe
                                                                                      Wow64 process (32bit):true
                                                                                      Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 1232 -s 764
                                                                                      Imagebase:0x1240000
                                                                                      File size:434592 bytes
                                                                                      MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Reputation:high

                                                                                      Disassembly

                                                                                      Code Analysis

                                                                                      Reset < >