Loading ...

Play interactive tourEdit tour

Analysis Report 042529de_by_Libranalysis

Overview

General Information

Sample Name:042529de_by_Libranalysis (renamed file extension from none to dll)
Analysis ID:413046
MD5:042529de19df790cdf8fe1a26ae1d5aa
SHA1:f9f73e973dda28b2b82fc3c3bb5f0740f6d28ea1
SHA256:430143aaf388f90ce6766480df547460ed3588347b4c58871accd32fa8a0961b
Infos:

Most interesting Screenshot:

Detection

Dridex
Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected Dridex unpacked file
C2 URLs / IPs found in malware configuration
Machine Learning detection for sample
Tries to detect sandboxes / dynamic malware analysis system (file name check)
Checks if the current process is being debugged
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to query locales information (e.g. system language)
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
One or more processes crash
PE / OLE file has an invalid certificate
PE file contains an invalid checksum
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

Startup

  • System is w10x64
  • loaddll32.exe (PID: 4844 cmdline: loaddll32.exe 'C:\Users\user\Desktop\042529de_by_Libranalysis.dll' MD5: 542795ADF7CC08EFCF675D65310596E8)
    • cmd.exe (PID: 2236 cmdline: cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\042529de_by_Libranalysis.dll',#1 MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • rundll32.exe (PID: 1008 cmdline: rundll32.exe 'C:\Users\user\Desktop\042529de_by_Libranalysis.dll',#1 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
        • WerFault.exe (PID: 7008 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 1008 -s 764 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
  • cleanup

Malware Configuration

Threatname: Dridex

{"Version": 22201, "C2 list": ["203.114.109.124:443", "82.165.145.100:6601", "94.177.255.18:8172"], "RC4 keys": ["BwjTiXD0nMT8wuL0lzuDMT1lwajgYLnSPMpMch1H2fk8H", "Zn2kewZlGvQs4cF0q7SiWd3gnwzXSWs561WqoqBWjN3RtNQTcvkRtcHJba3Ed"]}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000002.00000002.330690935.0000000010001000.00000020.00020000.sdmpJoeSecurity_Dridex_1Yara detected Dridex unpacked fileJoe Security

    Unpacked PEs

    SourceRuleDescriptionAuthorStrings
    2.2.rundll32.exe.10000000.3.unpackJoeSecurity_Dridex_1Yara detected Dridex unpacked fileJoe Security

      Sigma Overview

      No Sigma rule has matched

      Signature Overview

      Click to jump to signature section

      Show All Signature Results

      AV Detection:

      barindex
      Found malware configurationShow sources
      Source: 2.2.rundll32.exe.10000000.3.unpackMalware Configuration Extractor: Dridex {"Version": 22201, "C2 list": ["203.114.109.124:443", "82.165.145.100:6601", "94.177.255.18:8172"], "RC4 keys": ["BwjTiXD0nMT8wuL0lzuDMT1lwajgYLnSPMpMch1H2fk8H", "Zn2kewZlGvQs4cF0q7SiWd3gnwzXSWs561WqoqBWjN3RtNQTcvkRtcHJba3Ed"]}
      Multi AV Scanner detection for submitted fileShow sources
      Source: 042529de_by_Libranalysis.dllReversingLabs: Detection: 61%
      Machine Learning detection for sampleShow sources
      Source: 042529de_by_Libranalysis.dllJoe Sandbox ML: detected
      Source: 042529de_by_Libranalysis.dllStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
      Source: 042529de_by_Libranalysis.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT
      Source: Binary string: ClusApi.pdb source: WerFault.exe, 0000000F.00000003.310233646.0000000005666000.00000004.00000040.sdmp
      Source: Binary string: wkernel32.pdb source: WerFault.exe, 0000000F.00000003.303057390.00000000050A6000.00000004.00000001.sdmp
      Source: Binary string: shlwapi.pdb+ source: WerFault.exe, 0000000F.00000003.310233646.0000000005666000.00000004.00000040.sdmp
      Source: Binary string: sfc_os.pdb source: WerFault.exe, 0000000F.00000003.310233646.0000000005666000.00000004.00000040.sdmp
      Source: Binary string: bcrypt.pdb source: WerFault.exe, 0000000F.00000003.310233646.0000000005666000.00000004.00000040.sdmp
      Source: Binary string: ucrtbase.pdb source: WerFault.exe, 0000000F.00000003.310207729.0000000005531000.00000004.00000001.sdmp
      Source: Binary string: msvcrt.pdb source: WerFault.exe, 0000000F.00000003.310207729.0000000005531000.00000004.00000001.sdmp
      Source: Binary string: profapi.pdb- source: WerFault.exe, 0000000F.00000003.310233646.0000000005666000.00000004.00000040.sdmp
      Source: Binary string: glu32.pdb source: WerFault.exe, 0000000F.00000003.310233646.0000000005666000.00000004.00000040.sdmp
      Source: Binary string: wrpcrt4.pdb source: WerFault.exe, 0000000F.00000003.310226883.0000000005660000.00000004.00000040.sdmp
      Source: Binary string: wntdll.pdb source: WerFault.exe, 0000000F.00000003.310207729.0000000005531000.00000004.00000001.sdmp
      Source: Binary string: winspool.pdb5 source: WerFault.exe, 0000000F.00000003.310233646.0000000005666000.00000004.00000040.sdmp
      Source: Binary string: shcore.pdb source: WerFault.exe, 0000000F.00000003.310226883.0000000005660000.00000004.00000040.sdmp
      Source: Binary string: wUxTheme.pdbv source: WerFault.exe, 0000000F.00000003.310233646.0000000005666000.00000004.00000040.sdmp
      Source: Binary string: wgdi32.pdb source: WerFault.exe, 0000000F.00000003.310207729.0000000005531000.00000004.00000001.sdmp
      Source: Binary string: rundll32.pdbk source: WerFault.exe, 0000000F.00000003.310207729.0000000005531000.00000004.00000001.sdmp
      Source: Binary string: advapi32.pdb source: WerFault.exe, 0000000F.00000003.310233646.0000000005666000.00000004.00000040.sdmp
      Source: Binary string: fltLib.pdb source: WerFault.exe, 0000000F.00000003.310233646.0000000005666000.00000004.00000040.sdmp
      Source: Binary string: propsys.pdb! source: WerFault.exe, 0000000F.00000003.310233646.0000000005666000.00000004.00000040.sdmp
      Source: Binary string: wsspicli.pdb source: WerFault.exe, 0000000F.00000003.310233646.0000000005666000.00000004.00000040.sdmp
      Source: Binary string: msctf.pdbx source: WerFault.exe, 0000000F.00000003.310233646.0000000005666000.00000004.00000040.sdmp
      Source: Binary string: ws2_32.pdb" source: WerFault.exe, 0000000F.00000003.310233646.0000000005666000.00000004.00000040.sdmp
      Source: Binary string: shell32.pdb source: WerFault.exe, 0000000F.00000003.310226883.0000000005660000.00000004.00000040.sdmp
      Source: Binary string: msvcp_win.pdb source: WerFault.exe, 0000000F.00000003.310207729.0000000005531000.00000004.00000001.sdmp
      Source: Binary string: dnsapi.pdb source: WerFault.exe, 0000000F.00000003.310233646.0000000005666000.00000004.00000040.sdmp
      Source: Binary string: rasapi32.pdb source: WerFault.exe, 0000000F.00000003.310233646.0000000005666000.00000004.00000040.sdmp
      Source: Binary string: wkernelbase.pdb source: WerFault.exe, 0000000F.00000003.303057390.00000000050A6000.00000004.00000001.sdmp
      Source: Binary string: wimm32.pdb source: WerFault.exe, 0000000F.00000003.310233646.0000000005666000.00000004.00000040.sdmp
      Source: Binary string: shlwapi.pdb source: WerFault.exe, 0000000F.00000003.310233646.0000000005666000.00000004.00000040.sdmp
      Source: Binary string: mpr.pdb source: WerFault.exe, 0000000F.00000003.310226883.0000000005660000.00000004.00000040.sdmp
      Source: Binary string: wwin32u.pdb source: WerFault.exe, 0000000F.00000003.310207729.0000000005531000.00000004.00000001.sdmp
      Source: Binary string: setupapi.pdb source: WerFault.exe, 0000000F.00000003.310233646.0000000005666000.00000004.00000040.sdmp
      Source: Binary string: bcrypt.pdb? source: WerFault.exe, 0000000F.00000003.310233646.0000000005666000.00000004.00000040.sdmp
      Source: Binary string: imagehlp.pdb source: WerFault.exe, 0000000F.00000003.310233646.0000000005666000.00000004.00000040.sdmp
      Source: Binary string: wUxTheme.pdb source: WerFault.exe, 0000000F.00000003.310233646.0000000005666000.00000004.00000040.sdmp
      Source: Binary string: dwmapi.pdb source: WerFault.exe, 0000000F.00000003.310233646.0000000005666000.00000004.00000040.sdmp
      Source: Binary string: wntdll.pdb( source: WerFault.exe, 0000000F.00000003.305080913.0000000003391000.00000004.00000001.sdmp
      Source: Binary string: shcore.pdbk source: WerFault.exe, 0000000F.00000003.310226883.0000000005660000.00000004.00000040.sdmp
      Source: Binary string: opengl32.pdb source: WerFault.exe, 0000000F.00000003.310233646.0000000005666000.00000004.00000040.sdmp
      Source: Binary string: profapi.pdb source: WerFault.exe, 0000000F.00000003.310233646.0000000005666000.00000004.00000040.sdmp
      Source: Binary string: ws2_32.pdb source: WerFault.exe, 0000000F.00000003.310233646.0000000005666000.00000004.00000040.sdmp
      Source: Binary string: winspool.pdb source: WerFault.exe, 0000000F.00000003.310233646.0000000005666000.00000004.00000040.sdmp
      Source: Binary string: wgdi32full.pdb source: WerFault.exe, 0000000F.00000003.310207729.0000000005531000.00000004.00000001.sdmp
      Source: Binary string: mpr.pdbh source: WerFault.exe, 0000000F.00000003.310226883.0000000005660000.00000004.00000040.sdmp
      Source: Binary string: shell32.pdbk source: WerFault.exe, 0000000F.00000003.310226883.0000000005660000.00000004.00000040.sdmp
      Source: Binary string: sechost.pdb source: WerFault.exe, 0000000F.00000003.310233646.0000000005666000.00000004.00000040.sdmp
      Source: Binary string: iphlpapi.pdb source: WerFault.exe, 0000000F.00000003.310233646.0000000005666000.00000004.00000040.sdmp
      Source: Binary string: rasman.pdb source: WerFault.exe, 0000000F.00000003.310233646.0000000005666000.00000004.00000040.sdmp
      Source: Binary string: nsi.pdb source: WerFault.exe, 0000000F.00000003.310233646.0000000005666000.00000004.00000040.sdmp
      Source: Binary string: propsys.pdb source: WerFault.exe, 0000000F.00000003.310233646.0000000005666000.00000004.00000040.sdmp
      Source: Binary string: cfgmgr32.pdbk source: WerFault.exe, 0000000F.00000003.310226883.0000000005660000.00000004.00000040.sdmp
      Source: Binary string: fpmvppp.pdb source: loaddll32.exe, 00000000.00000002.229413673.0000000010024000.00000002.00020000.sdmp, WerFault.exe, 0000000F.00000002.328387581.0000000005800000.00000002.00000001.sdmp, 042529de_by_Libranalysis.dll
      Source: Binary string: powrprof.pdb source: WerFault.exe, 0000000F.00000003.310233646.0000000005666000.00000004.00000040.sdmp
      Source: Binary string: msctf.pdb source: WerFault.exe, 0000000F.00000003.310233646.0000000005666000.00000004.00000040.sdmp
      Source: Binary string: ole32.pdb source: WerFault.exe, 0000000F.00000003.310233646.0000000005666000.00000004.00000040.sdmp
      Source: Binary string: AcLayers.pdb source: WerFault.exe, 0000000F.00000003.310207729.0000000005531000.00000004.00000001.sdmp
      Source: Binary string: Kernel.Appcore.pdb source: WerFault.exe, 0000000F.00000003.310226883.0000000005660000.00000004.00000040.sdmp
      Source: Binary string: cryptbase.pdb source: WerFault.exe, 0000000F.00000003.310233646.0000000005666000.00000004.00000040.sdmp
      Source: Binary string: wkernelbase.pdb( source: WerFault.exe, 0000000F.00000003.303079104.000000000339D000.00000004.00000001.sdmp
      Source: Binary string: bcryptprimitives.pdb source: WerFault.exe, 0000000F.00000003.310226883.0000000005660000.00000004.00000040.sdmp
      Source: Binary string: cfgmgr32.pdb source: WerFault.exe, 0000000F.00000003.310226883.0000000005660000.00000004.00000040.sdmp
      Source: Binary string: combase.pdb source: WerFault.exe, 0000000F.00000003.310233646.0000000005666000.00000004.00000040.sdmp
      Source: Binary string: Windows.Storage.pdb source: WerFault.exe, 0000000F.00000003.310226883.0000000005660000.00000004.00000040.sdmp
      Source: Binary string: rundll32.pdb source: WerFault.exe, 0000000F.00000003.310207729.0000000005531000.00000004.00000001.sdmp
      Source: Binary string: wkernel32.pdb( source: WerFault.exe, 0000000F.00000003.304984623.0000000003397000.00000004.00000001.sdmp
      Source: Binary string: oleaut32.pdb source: WerFault.exe, 0000000F.00000003.310233646.0000000005666000.00000004.00000040.sdmp
      Source: Binary string: sfc.pdb source: WerFault.exe, 0000000F.00000003.310233646.0000000005666000.00000004.00000040.sdmp
      Source: Binary string: sfc.pdbk source: WerFault.exe, 0000000F.00000003.310233646.0000000005666000.00000004.00000040.sdmp
      Source: Binary string: apphelp.pdb source: WerFault.exe, 0000000F.00000003.310207729.0000000005531000.00000004.00000001.sdmp
      Source: Binary string: wuser32.pdb source: WerFault.exe, 0000000F.00000003.310207729.0000000005531000.00000004.00000001.sdmp

      Networking:

      barindex
      C2 URLs / IPs found in malware configurationShow sources
      Source: Malware configuration extractorIPs: 203.114.109.124:443
      Source: Malware configuration extractorIPs: 82.165.145.100:6601
      Source: Malware configuration extractorIPs: 94.177.255.18:8172
      Source: Joe Sandbox ViewIP Address: 94.177.255.18 94.177.255.18
      Source: Joe Sandbox ViewIP Address: 203.114.109.124 203.114.109.124
      Source: Joe Sandbox ViewASN Name: ARUBACLOUDLTD-ASNGB ARUBACLOUDLTD-ASNGB
      Source: Joe Sandbox ViewASN Name: TOT-LLI-AS-APTOTPublicCompanyLimitedTH TOT-LLI-AS-APTOTPublicCompanyLimitedTH
      Source: Joe Sandbox ViewASN Name: ONEANDONE-ASBrauerstrasse48DE ONEANDONE-ASBrauerstrasse48DE
      Source: WerFault.exe, 0000000F.00000002.328387581.0000000005800000.00000002.00000001.sdmp, 042529de_by_Libranalysis.dllString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
      Source: WerFault.exe, 0000000F.00000002.328387581.0000000005800000.00000002.00000001.sdmp, 042529de_by_Libranalysis.dllString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
      Source: WerFault.exe, 0000000F.00000002.328387581.0000000005800000.00000002.00000001.sdmp, 042529de_by_Libranalysis.dllString found in binary or memory: http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s
      Source: WerFault.exe, 0000000F.00000002.328387581.0000000005800000.00000002.00000001.sdmp, 042529de_by_Libranalysis.dllString found in binary or memory: http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#
      Source: WerFault.exe, 0000000F.00000002.328387581.0000000005800000.00000002.00000001.sdmp, 042529de_by_Libranalysis.dllString found in binary or memory: http://ocsp.comodoca.com0
      Source: WerFault.exe, 0000000F.00000002.328387581.0000000005800000.00000002.00000001.sdmp, 042529de_by_Libranalysis.dllString found in binary or memory: http://ocsp.sectigo.com0
      Source: WerFault.exe, 0000000F.00000002.328387581.0000000005800000.00000002.00000001.sdmp, 042529de_by_Libranalysis.dllString found in binary or memory: https://sectigo.com/CPS0
      Source: loaddll32.exe, 00000000.00000002.229374353.000000000132B000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

      E-Banking Fraud:

      barindex
      Yara detected Dridex unpacked fileShow sources
      Source: Yara matchFile source: 00000002.00000002.330690935.0000000010001000.00000020.00020000.sdmp, type: MEMORY
      Source: Yara matchFile source: 2.2.rundll32.exe.10000000.3.unpack, type: UNPACKEDPE
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_10011460
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_1000846C
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_10001494
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_1000A52C
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_10011D58
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_10019348
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_10010754
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_100090CC
      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 1008 -s 764
      Source: 042529de_by_Libranalysis.dllStatic PE information: invalid certificate
      Source: 042529de_by_Libranalysis.dllBinary or memory string: OriginalFilenamex2otfb.dllN vs 042529de_by_Libranalysis.dll
      Source: 042529de_by_Libranalysis.dllStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
      Source: 042529de_by_Libranalysis.dllStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      Source: classification engineClassification label: mal76.troj.evad.winDLL@6/4@0/3
      Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess1008
      Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\WER1E97.tmpJump to behavior
      Source: 042529de_by_Libranalysis.dllStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
      Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\042529de_by_Libranalysis.dll',#1
      Source: 042529de_by_Libranalysis.dllReversingLabs: Detection: 61%
      Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe 'C:\Users\user\Desktop\042529de_by_Libranalysis.dll'
      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\042529de_by_Libranalysis.dll',#1
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\042529de_by_Libranalysis.dll',#1
      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 1008 -s 764
      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\042529de_by_Libranalysis.dll',#1
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\042529de_by_Libranalysis.dll',#1
      Source: 042529de_by_Libranalysis.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT
      Source: 042529de_by_Libranalysis.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
      Source: Binary string: ClusApi.pdb source: WerFault.exe, 0000000F.00000003.310233646.0000000005666000.00000004.00000040.sdmp
      Source: Binary string: wkernel32.pdb source: WerFault.exe, 0000000F.00000003.303057390.00000000050A6000.00000004.00000001.sdmp
      Source: Binary string: shlwapi.pdb+ source: WerFault.exe, 0000000F.00000003.310233646.0000000005666000.00000004.00000040.sdmp
      Source: Binary string: sfc_os.pdb source: WerFault.exe, 0000000F.00000003.310233646.0000000005666000.00000004.00000040.sdmp
      Source: Binary string: bcrypt.pdb source: WerFault.exe, 0000000F.00000003.310233646.0000000005666000.00000004.00000040.sdmp
      Source: Binary string: ucrtbase.pdb source: WerFault.exe, 0000000F.00000003.310207729.0000000005531000.00000004.00000001.sdmp
      Source: Binary string: msvcrt.pdb source: WerFault.exe, 0000000F.00000003.310207729.0000000005531000.00000004.00000001.sdmp
      Source: Binary string: profapi.pdb- source: WerFault.exe, 0000000F.00000003.310233646.0000000005666000.00000004.00000040.sdmp
      Source: Binary string: glu32.pdb source: WerFault.exe, 0000000F.00000003.310233646.0000000005666000.00000004.00000040.sdmp
      Source: Binary string: wrpcrt4.pdb source: WerFault.exe, 0000000F.00000003.310226883.0000000005660000.00000004.00000040.sdmp
      Source: Binary string: wntdll.pdb source: WerFault.exe, 0000000F.00000003.310207729.0000000005531000.00000004.00000001.sdmp
      Source: Binary string: winspool.pdb5 source: WerFault.exe, 0000000F.00000003.310233646.0000000005666000.00000004.00000040.sdmp
      Source: Binary string: shcore.pdb source: WerFault.exe, 0000000F.00000003.310226883.0000000005660000.00000004.00000040.sdmp
      Source: Binary string: wUxTheme.pdbv source: WerFault.exe, 0000000F.00000003.310233646.0000000005666000.00000004.00000040.sdmp
      Source: Binary string: wgdi32.pdb source: WerFault.exe, 0000000F.00000003.310207729.0000000005531000.00000004.00000001.sdmp
      Source: Binary string: rundll32.pdbk source: WerFault.exe, 0000000F.00000003.310207729.0000000005531000.00000004.00000001.sdmp
      Source: Binary string: advapi32.pdb source: WerFault.exe, 0000000F.00000003.310233646.0000000005666000.00000004.00000040.sdmp
      Source: Binary string: fltLib.pdb source: WerFault.exe, 0000000F.00000003.310233646.0000000005666000.00000004.00000040.sdmp
      Source: Binary string: propsys.pdb! source: WerFault.exe, 0000000F.00000003.310233646.0000000005666000.00000004.00000040.sdmp
      Source: Binary string: wsspicli.pdb source: WerFault.exe, 0000000F.00000003.310233646.0000000005666000.00000004.00000040.sdmp
      Source: Binary string: msctf.pdbx source: WerFault.exe, 0000000F.00000003.310233646.0000000005666000.00000004.00000040.sdmp
      Source: Binary string: ws2_32.pdb" source: WerFault.exe, 0000000F.00000003.310233646.0000000005666000.00000004.00000040.sdmp
      Source: Binary string: shell32.pdb source: WerFault.exe, 0000000F.00000003.310226883.0000000005660000.00000004.00000040.sdmp
      Source: Binary string: msvcp_win.pdb source: WerFault.exe, 0000000F.00000003.310207729.0000000005531000.00000004.00000001.sdmp
      Source: Binary string: dnsapi.pdb source: WerFault.exe, 0000000F.00000003.310233646.0000000005666000.00000004.00000040.sdmp
      Source: Binary string: rasapi32.pdb source: WerFault.exe, 0000000F.00000003.310233646.0000000005666000.00000004.00000040.sdmp
      Source: Binary string: wkernelbase.pdb source: WerFault.exe, 0000000F.00000003.303057390.00000000050A6000.00000004.00000001.sdmp
      Source: Binary string: wimm32.pdb source: WerFault.exe, 0000000F.00000003.310233646.0000000005666000.00000004.00000040.sdmp
      Source: Binary string: shlwapi.pdb source: WerFault.exe, 0000000F.00000003.310233646.0000000005666000.00000004.00000040.sdmp
      Source: Binary string: mpr.pdb source: WerFault.exe, 0000000F.00000003.310226883.0000000005660000.00000004.00000040.sdmp
      Source: Binary string: wwin32u.pdb source: WerFault.exe, 0000000F.00000003.310207729.0000000005531000.00000004.00000001.sdmp
      Source: Binary string: setupapi.pdb source: WerFault.exe, 0000000F.00000003.310233646.0000000005666000.00000004.00000040.sdmp
      Source: Binary string: bcrypt.pdb? source: WerFault.exe, 0000000F.00000003.310233646.0000000005666000.00000004.00000040.sdmp
      Source: Binary string: imagehlp.pdb source: WerFault.exe, 0000000F.00000003.310233646.0000000005666000.00000004.00000040.sdmp
      Source: Binary string: wUxTheme.pdb source: WerFault.exe, 0000000F.00000003.310233646.0000000005666000.00000004.00000040.sdmp
      Source: Binary string: dwmapi.pdb source: WerFault.exe, 0000000F.00000003.310233646.0000000005666000.00000004.00000040.sdmp
      Source: Binary string: wntdll.pdb( source: WerFault.exe, 0000000F.00000003.305080913.0000000003391000.00000004.00000001.sdmp
      Source: Binary string: shcore.pdbk source: WerFault.exe, 0000000F.00000003.310226883.0000000005660000.00000004.00000040.sdmp
      Source: Binary string: opengl32.pdb source: WerFault.exe, 0000000F.00000003.310233646.0000000005666000.00000004.00000040.sdmp
      Source: Binary string: profapi.pdb source: WerFault.exe, 0000000F.00000003.310233646.0000000005666000.00000004.00000040.sdmp
      Source: Binary string: ws2_32.pdb source: WerFault.exe, 0000000F.00000003.310233646.0000000005666000.00000004.00000040.sdmp
      Source: Binary string: winspool.pdb source: WerFault.exe, 0000000F.00000003.310233646.0000000005666000.00000004.00000040.sdmp
      Source: Binary string: wgdi32full.pdb source: WerFault.exe, 0000000F.00000003.310207729.0000000005531000.00000004.00000001.sdmp
      Source: Binary string: mpr.pdbh source: WerFault.exe, 0000000F.00000003.310226883.0000000005660000.00000004.00000040.sdmp
      Source: Binary string: shell32.pdbk source: WerFault.exe, 0000000F.00000003.310226883.0000000005660000.00000004.00000040.sdmp
      Source: Binary string: sechost.pdb source: WerFault.exe, 0000000F.00000003.310233646.0000000005666000.00000004.00000040.sdmp
      Source: Binary string: iphlpapi.pdb source: WerFault.exe, 0000000F.00000003.310233646.0000000005666000.00000004.00000040.sdmp
      Source: Binary string: rasman.pdb source: WerFault.exe, 0000000F.00000003.310233646.0000000005666000.00000004.00000040.sdmp
      Source: Binary string: nsi.pdb source: WerFault.exe, 0000000F.00000003.310233646.0000000005666000.00000004.00000040.sdmp
      Source: Binary string: propsys.pdb source: WerFault.exe, 0000000F.00000003.310233646.0000000005666000.00000004.00000040.sdmp
      Source: Binary string: cfgmgr32.pdbk source: WerFault.exe, 0000000F.00000003.310226883.0000000005660000.00000004.00000040.sdmp
      Source: Binary string: fpmvppp.pdb source: loaddll32.exe, 00000000.00000002.229413673.0000000010024000.00000002.00020000.sdmp, WerFault.exe, 0000000F.00000002.328387581.0000000005800000.00000002.00000001.sdmp, 042529de_by_Libranalysis.dll
      Source: Binary string: powrprof.pdb source: WerFault.exe, 0000000F.00000003.310233646.0000000005666000.00000004.00000040.sdmp
      Source: Binary string: msctf.pdb source: WerFault.exe, 0000000F.00000003.310233646.0000000005666000.00000004.00000040.sdmp
      Source: Binary string: ole32.pdb source: WerFault.exe, 0000000F.00000003.310233646.0000000005666000.00000004.00000040.sdmp
      Source: Binary string: AcLayers.pdb source: WerFault.exe, 0000000F.00000003.310207729.0000000005531000.00000004.00000001.sdmp
      Source: Binary string: Kernel.Appcore.pdb source: WerFault.exe, 0000000F.00000003.310226883.0000000005660000.00000004.00000040.sdmp
      Source: Binary string: cryptbase.pdb source: WerFault.exe, 0000000F.00000003.310233646.0000000005666000.00000004.00000040.sdmp
      Source: Binary string: wkernelbase.pdb( source: WerFault.exe, 0000000F.00000003.303079104.000000000339D000.00000004.00000001.sdmp
      Source: Binary string: bcryptprimitives.pdb source: WerFault.exe, 0000000F.00000003.310226883.0000000005660000.00000004.00000040.sdmp
      Source: Binary string: cfgmgr32.pdb source: WerFault.exe, 0000000F.00000003.310226883.0000000005660000.00000004.00000040.sdmp
      Source: Binary string: combase.pdb source: WerFault.exe, 0000000F.00000003.310233646.0000000005666000.00000004.00000040.sdmp
      Source: Binary string: Windows.Storage.pdb source: WerFault.exe, 0000000F.00000003.310226883.0000000005660000.00000004.00000040.sdmp
      Source: Binary string: rundll32.pdb source: WerFault.exe, 0000000F.00000003.310207729.0000000005531000.00000004.00000001.sdmp
      Source: Binary string: wkernel32.pdb( source: WerFault.exe, 0000000F.00000003.304984623.0000000003397000.00000004.00000001.sdmp
      Source: Binary string: oleaut32.pdb source: WerFault.exe, 0000000F.00000003.310233646.0000000005666000.00000004.00000040.sdmp
      Source: Binary string: sfc.pdb source: WerFault.exe, 0000000F.00000003.310233646.0000000005666000.00000004.00000040.sdmp
      Source: Binary string: sfc.pdbk source: WerFault.exe, 0000000F.00000003.310233646.0000000005666000.00000004.00000040.sdmp
      Source: Binary string: apphelp.pdb source: WerFault.exe, 0000000F.00000003.310207729.0000000005531000.00000004.00000001.sdmp
      Source: Binary string: wuser32.pdb source: WerFault.exe, 0000000F.00000003.310207729.0000000005531000.00000004.00000001.sdmp
      Source: 042529de_by_Libranalysis.dllStatic PE information: real checksum: 0x2a3c3 should be: 0x32291
      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_10007685 push DA598020h; ret
      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_100030DC push edi; iretd
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_1000F6CC push esi; mov dword ptr [esp], 00000000h
      Source: initial sampleStatic PE information: section name: .text entropy: 7.58875564719
      Source: C:\Windows\SysWOW64\WerFault.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX

      Malware Analysis System Evasion:

      barindex
      Tries to detect sandboxes / dynamic malware analysis system (file name check)Show sources
      Source: C:\Windows\SysWOW64\rundll32.exeSection loaded: \KnownDlls32\TESTAPP.exe
      Source: WerFault.exe, 0000000F.00000002.328212057.00000000056F0000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
      Source: WerFault.exe, 0000000F.00000002.327814686.0000000004FA0000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW
      Source: WerFault.exe, 0000000F.00000002.328212057.00000000056F0000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
      Source: WerFault.exe, 0000000F.00000002.328212057.00000000056F0000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
      Source: WerFault.exe, 0000000F.00000002.328212057.00000000056F0000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
      Source: C:\Windows\System32\loaddll32.exeProcess queried: DebugPort
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_10006D50 GetUserNameW,MessageBoxW,GetLastError,CreateFileA,DebugBreak,FlushFileBuffers,FreeEnvironmentStringsA,GetConsoleOutputCP,GetEnvironmentStrings,GetLocaleInfoA,GetStartupInfoA,GetStringTypeA,HeapValidate,IsBadReadPtr,LCMapStringA,LoadLibraryA,OutputDebugStringA,
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\042529de_by_Libranalysis.dll',#1
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetUserNameW,MessageBoxW,GetLastError,CreateFileA,DebugBreak,FlushFileBuffers,FreeEnvironmentStringsA,GetConsoleOutputCP,GetEnvironmentStrings,GetLocaleInfoA,GetStartupInfoA,GetStringTypeA,HeapValidate,IsBadReadPtr,LCMapStringA,LoadLibraryA,OutputDebugStringA,
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_10006D50 GetUserNameW,MessageBoxW,GetLastError,CreateFileA,DebugBreak,FlushFileBuffers,FreeEnvironmentStringsA,GetConsoleOutputCP,GetEnvironmentStrings,GetLocaleInfoA,GetStartupInfoA,GetStringTypeA,HeapValidate,IsBadReadPtr,LCMapStringA,LoadLibraryA,OutputDebugStringA,

      Mitre Att&ck Matrix

      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
      Valid AccountsWindows Management InstrumentationPath InterceptionProcess Injection11Virtualization/Sandbox Evasion11Input Capture1Query Registry1Remote ServicesInput Capture1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
      Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsProcess Injection11LSASS MemorySecurity Software Discovery121Remote Desktop ProtocolArchive Collected Data1Exfiltration Over BluetoothApplication Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or Information2Security Account ManagerVirtualization/Sandbox Evasion11SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Rundll321NTDSAccount Discovery1Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware Packing2LSA SecretsSystem Owner/User Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
      Replication Through Removable MediaLaunchdRc.commonRc.commonSteganographyCached Domain CredentialsRemote System Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSyncSystem Information Discovery11Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact

      Behavior Graph

      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      Screenshots

      Thumbnails

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

      windows-stand

      Antivirus, Machine Learning and Genetic Malware Detection

      Initial Sample

      SourceDetectionScannerLabelLink
      042529de_by_Libranalysis.dll62%ReversingLabsWin32.Infostealer.Dridex
      042529de_by_Libranalysis.dll100%Joe Sandbox ML

      Dropped Files

      No Antivirus matches

      Unpacked PE Files

      SourceDetectionScannerLabelLinkDownload
      2.2.rundll32.exe.4e0000.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File

      Domains

      No Antivirus matches

      URLs

      SourceDetectionScannerLabelLink
      http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s0%URL Reputationsafe
      http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s0%URL Reputationsafe
      http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s0%URL Reputationsafe
      http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s0%URL Reputationsafe
      https://sectigo.com/CPS00%URL Reputationsafe
      https://sectigo.com/CPS00%URL Reputationsafe
      https://sectigo.com/CPS00%URL Reputationsafe
      https://sectigo.com/CPS00%URL Reputationsafe
      http://ocsp.sectigo.com00%URL Reputationsafe
      http://ocsp.sectigo.com00%URL Reputationsafe
      http://ocsp.sectigo.com00%URL Reputationsafe
      http://ocsp.sectigo.com00%URL Reputationsafe
      http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#0%URL Reputationsafe
      http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#0%URL Reputationsafe
      http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#0%URL Reputationsafe
      http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#0%URL Reputationsafe

      Domains and IPs

      Contacted Domains

      No contacted domains info

      URLs from Memory and Binaries

      NameSourceMaliciousAntivirus DetectionReputation
      http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0sWerFault.exe, 0000000F.00000002.328387581.0000000005800000.00000002.00000001.sdmp, 042529de_by_Libranalysis.dllfalse
      • URL Reputation: safe
      • URL Reputation: safe
      • URL Reputation: safe
      • URL Reputation: safe
      unknown
      https://sectigo.com/CPS0WerFault.exe, 0000000F.00000002.328387581.0000000005800000.00000002.00000001.sdmp, 042529de_by_Libranalysis.dllfalse
      • URL Reputation: safe
      • URL Reputation: safe
      • URL Reputation: safe
      • URL Reputation: safe
      unknown
      http://ocsp.sectigo.com0WerFault.exe, 0000000F.00000002.328387581.0000000005800000.00000002.00000001.sdmp, 042529de_by_Libranalysis.dllfalse
      • URL Reputation: safe
      • URL Reputation: safe
      • URL Reputation: safe
      • URL Reputation: safe
      unknown
      http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#WerFault.exe, 0000000F.00000002.328387581.0000000005800000.00000002.00000001.sdmp, 042529de_by_Libranalysis.dllfalse
      • URL Reputation: safe
      • URL Reputation: safe
      • URL Reputation: safe
      • URL Reputation: safe
      unknown

      Contacted IPs

      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs

      Public

      IPDomainCountryFlagASNASN NameMalicious
      94.177.255.18
      unknownItaly
      199883ARUBACLOUDLTD-ASNGBtrue
      203.114.109.124
      unknownThailand
      131293TOT-LLI-AS-APTOTPublicCompanyLimitedTHtrue
      82.165.145.100
      unknownGermany
      8560ONEANDONE-ASBrauerstrasse48DEtrue

      General Information

      Joe Sandbox Version:32.0.0 Black Diamond
      Analysis ID:413046
      Start date:13.05.2021
      Start time:06:56:23
      Joe Sandbox Product:CloudBasic
      Overall analysis duration:0h 7m 5s
      Hypervisor based Inspection enabled:false
      Report type:light
      Sample file name:042529de_by_Libranalysis (renamed file extension from none to dll)
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
      Number of analysed new started processes analysed:30
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • HDC enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Detection:MAL
      Classification:mal76.troj.evad.winDLL@6/4@0/3
      EGA Information:Failed
      HDC Information:
      • Successful, ratio: 94.2% (good quality ratio 84.8%)
      • Quality average: 71.1%
      • Quality standard deviation: 33%
      HCA Information:
      • Successful, ratio: 100%
      • Number of executed functions: 0
      • Number of non-executed functions: 0
      Cookbook Comments:
      • Adjust boot time
      • Enable AMSI

      Simulations

      Behavior and APIs

      TimeTypeDescription
      06:57:58API Interceptor1x Sleep call for process: WerFault.exe modified

      Joe Sandbox View / Context

      IPs

      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
      94.177.255.1887324661_by_Libranalysis.dllGet hashmaliciousBrowse
        931f389a_by_Libranalysis.dllGet hashmaliciousBrowse
          ed938820_by_Libranalysis.dllGet hashmaliciousBrowse
            931f389a_by_Libranalysis.dllGet hashmaliciousBrowse
              ed938820_by_Libranalysis.dllGet hashmaliciousBrowse
                ab44ae30_by_Libranalysis.dllGet hashmaliciousBrowse
                  ab44ae30_by_Libranalysis.dllGet hashmaliciousBrowse
                    e442fdd8_by_Libranalysis.dllGet hashmaliciousBrowse
                      e442fdd8_by_Libranalysis.dllGet hashmaliciousBrowse
                        8ca7a263_by_Libranalysis.dllGet hashmaliciousBrowse
                          8ca7a263_by_Libranalysis.dllGet hashmaliciousBrowse
                            2617efd0_by_Libranalysis.dllGet hashmaliciousBrowse
                              ec120f08_by_Libranalysis.dllGet hashmaliciousBrowse
                                2617efd0_by_Libranalysis.dllGet hashmaliciousBrowse
                                  83832e74_by_Libranalysis.dllGet hashmaliciousBrowse
                                    cce7d578_by_Libranalysis.dllGet hashmaliciousBrowse
                                      ec120f08_by_Libranalysis.dllGet hashmaliciousBrowse
                                        83832e74_by_Libranalysis.dllGet hashmaliciousBrowse
                                          cce7d578_by_Libranalysis.dllGet hashmaliciousBrowse
                                            be825cf1_by_Libranalysis.dllGet hashmaliciousBrowse
                                              203.114.109.12487324661_by_Libranalysis.dllGet hashmaliciousBrowse
                                                931f389a_by_Libranalysis.dllGet hashmaliciousBrowse
                                                  ed938820_by_Libranalysis.dllGet hashmaliciousBrowse
                                                    931f389a_by_Libranalysis.dllGet hashmaliciousBrowse
                                                      ed938820_by_Libranalysis.dllGet hashmaliciousBrowse
                                                        ab44ae30_by_Libranalysis.dllGet hashmaliciousBrowse
                                                          ab44ae30_by_Libranalysis.dllGet hashmaliciousBrowse
                                                            e442fdd8_by_Libranalysis.dllGet hashmaliciousBrowse
                                                              e442fdd8_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                8ca7a263_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                  8ca7a263_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                    2617efd0_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                      ec120f08_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                        2617efd0_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                          83832e74_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                            cce7d578_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                              ec120f08_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                83832e74_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                  cce7d578_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                    be825cf1_by_Libranalysis.dllGet hashmaliciousBrowse

                                                                                      Domains

                                                                                      No context

                                                                                      ASN

                                                                                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                                      ONEANDONE-ASBrauerstrasse48DE87324661_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                      • 82.165.145.100
                                                                                      931f389a_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                      • 82.165.145.100
                                                                                      ed938820_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                      • 82.165.145.100
                                                                                      931f389a_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                      • 82.165.145.100
                                                                                      ed938820_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                      • 82.165.145.100
                                                                                      ab44ae30_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                      • 82.165.145.100
                                                                                      ab44ae30_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                      • 82.165.145.100
                                                                                      e442fdd8_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                      • 82.165.145.100
                                                                                      e442fdd8_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                      • 82.165.145.100
                                                                                      8ca7a263_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                      • 82.165.145.100
                                                                                      8ca7a263_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                      • 82.165.145.100
                                                                                      2617efd0_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                      • 82.165.145.100
                                                                                      ec120f08_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                      • 82.165.145.100
                                                                                      2617efd0_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                      • 82.165.145.100
                                                                                      83832e74_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                      • 82.165.145.100
                                                                                      cce7d578_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                      • 82.165.145.100
                                                                                      ec120f08_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                      • 82.165.145.100
                                                                                      83832e74_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                      • 82.165.145.100
                                                                                      cce7d578_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                      • 82.165.145.100
                                                                                      be825cf1_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                      • 82.165.145.100
                                                                                      TOT-LLI-AS-APTOTPublicCompanyLimitedTH87324661_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                      • 203.114.109.124
                                                                                      931f389a_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                      • 203.114.109.124
                                                                                      ed938820_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                      • 203.114.109.124
                                                                                      931f389a_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                      • 203.114.109.124
                                                                                      ed938820_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                      • 203.114.109.124
                                                                                      ab44ae30_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                      • 203.114.109.124
                                                                                      ab44ae30_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                      • 203.114.109.124
                                                                                      e442fdd8_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                      • 203.114.109.124
                                                                                      e442fdd8_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                      • 203.114.109.124
                                                                                      8ca7a263_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                      • 203.114.109.124
                                                                                      8ca7a263_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                      • 203.114.109.124
                                                                                      2617efd0_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                      • 203.114.109.124
                                                                                      ec120f08_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                      • 203.114.109.124
                                                                                      2617efd0_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                      • 203.114.109.124
                                                                                      83832e74_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                      • 203.114.109.124
                                                                                      cce7d578_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                      • 203.114.109.124
                                                                                      ec120f08_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                      • 203.114.109.124
                                                                                      83832e74_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                      • 203.114.109.124
                                                                                      cce7d578_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                      • 203.114.109.124
                                                                                      be825cf1_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                      • 203.114.109.124
                                                                                      ARUBACLOUDLTD-ASNGB87324661_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                      • 94.177.255.18
                                                                                      931f389a_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                      • 94.177.255.18
                                                                                      ed938820_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                      • 94.177.255.18
                                                                                      931f389a_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                      • 94.177.255.18
                                                                                      ed938820_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                      • 94.177.255.18
                                                                                      ab44ae30_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                      • 94.177.255.18
                                                                                      ab44ae30_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                      • 94.177.255.18
                                                                                      e442fdd8_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                      • 94.177.255.18
                                                                                      e442fdd8_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                      • 94.177.255.18
                                                                                      8ca7a263_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                      • 94.177.255.18
                                                                                      8ca7a263_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                      • 94.177.255.18
                                                                                      2617efd0_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                      • 94.177.255.18
                                                                                      ec120f08_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                      • 94.177.255.18
                                                                                      2617efd0_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                      • 94.177.255.18
                                                                                      83832e74_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                      • 94.177.255.18
                                                                                      cce7d578_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                      • 94.177.255.18
                                                                                      ec120f08_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                      • 94.177.255.18
                                                                                      83832e74_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                      • 94.177.255.18
                                                                                      cce7d578_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                      • 94.177.255.18
                                                                                      be825cf1_by_Libranalysis.dllGet hashmaliciousBrowse
                                                                                      • 94.177.255.18

                                                                                      JA3 Fingerprints

                                                                                      No context

                                                                                      Dropped Files

                                                                                      No context

                                                                                      Created / dropped Files

                                                                                      C:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_rundll32.exe_b9c383acf725d24c7ce2a6d77f1a2161252591c_82810a17_1b214450\Report.wer
                                                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                      File Type:Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):12684
                                                                                      Entropy (8bit):3.7675682588990025
                                                                                      Encrypted:false
                                                                                      SSDEEP:192:S/ir0oXTGiYHBUZMX4jed+bwR/u7s2S274ItWcy:Si1XTkBUZMX4jeV/u7s2X4ItWcy
                                                                                      MD5:CF4C7262591EEB77CC497704042A3006
                                                                                      SHA1:F1C344130C7169F7722BF741427A629960EA0859
                                                                                      SHA-256:945D8FB97A3B01C69084F26F4C038EEC854BC12E4853D08E7A8F1597F705F5A6
                                                                                      SHA-512:E9957FD17F6D8382F63D51F45DC3E9DE8B461472A959141154D5D6974C6479C90931C0FB598D8B11BF2784B74FD504F29C5B02D762EF70716785E2EC1A3EA8D9
                                                                                      Malicious:false
                                                                                      Reputation:low
                                                                                      Preview: ..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.2.6.5.3.8.7.8.6.8.5.8.8.8.3.3.6.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.2.6.5.3.8.7.8.7.6.1.9.8.1.8.6.1.....R.e.p.o.r.t.S.t.a.t.u.s.=.2.6.8.4.3.5.4.5.6.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.a.d.8.d.c.d.9.8.-.6.3.8.2.-.4.e.c.3.-.b.d.d.a.-.5.5.3.2.1.9.b.6.d.0.d.8.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.9.b.a.6.e.5.8.4.-.b.e.1.3.-.4.8.0.8.-.b.2.4.1.-.e.c.3.d.9.f.e.9.5.f.d.f.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.3.f.0.-.0.0.0.1.-.0.0.1.7.-.c.d.d.a.-.e.b.d.f.f.f.4.7.d.7.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.b.c.c.5.d.c.3.2.2.2.0.3.4.d.3.f.2.5.7.f.1.f.d.3.5.8.8.9.e.5.b.e.9.0.
                                                                                      C:\ProgramData\Microsoft\Windows\WER\Temp\WER1E97.tmp.dmp
                                                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                      File Type:Mini DuMP crash report, 14 streams, Thu May 13 13:57:50 2021, 0x1205a4 type
                                                                                      Category:dropped
                                                                                      Size (bytes):40932
                                                                                      Entropy (8bit):2.3894657397967505
                                                                                      Encrypted:false
                                                                                      SSDEEP:192:/NdFbhhpPjZq4YszocqMEU7G3aLTcRro3JNqZluYfE:fRpH9geT6rONqZ/fE
                                                                                      MD5:D0531B75E056E6E769887CADB931B07A
                                                                                      SHA1:A3A471094FD64D7C844FF5CF4E2703074632537C
                                                                                      SHA-256:AA51272E58FDD0AF8A607C118F95C9662999DFBDE7A4CED269F7F64595991AA2
                                                                                      SHA-512:7CB30B87D146C4C44AF71603456924DEF0343C3BA5A05F9A983917DF23295CBC1C8F484D50492B4945F6374CAB356F08A33BD76BD6632233EDF418EF31D25D9E
                                                                                      Malicious:false
                                                                                      Reputation:low
                                                                                      Preview: MDMP....... .......^0.`...................U...........B......P ......GenuineIntelW...........T...........80.`.............................0..=...............P.a.c.i.f.i.c. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................P.a.c.i.f.i.c. .D.a.y.l.i.g.h.t. .T.i.m.e...........................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.............................................................................................................................................................................................................................................................................................................................................................................................................................................................d.b.g.c.o.r.e...i.3.8.6.,.1.0...0...1.7.1.3.4...1.........................................................................................................
                                                                                      C:\ProgramData\Microsoft\Windows\WER\Temp\WER2734.tmp.WERInternalMetadata.xml
                                                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                      File Type:XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):8292
                                                                                      Entropy (8bit):3.6938064463575477
                                                                                      Encrypted:false
                                                                                      SSDEEP:192:Rrl7r3GLNiMVY6nG6YWo6VSgmfT7ZSUCprv89bvwnGsf0P92m:RrlsNiM66G6YB6VSgmfTtSMvwnlfG/
                                                                                      MD5:7289C8F390F18CC6BCCADFF6E9E6A7CC
                                                                                      SHA1:FE84CB5CE8317083554A39DAC5EE6FE6964A87BC
                                                                                      SHA-256:614F200D0C19E649508BA613E34292DE1CDF6701E736399777D15FFBA755346F
                                                                                      SHA-512:FF36077BAD3F5C0523D59A702C08DF163BF31177E8D4E6F53F3F5B012A768268EE3E67CF329D5B02D9C064E8DEE7C2A6FA2ECAD87272D6FF753C1893BB253111
                                                                                      Malicious:false
                                                                                      Reputation:low
                                                                                      Preview: ..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.1.0.0.8.<./.P.i.d.>.......
                                                                                      C:\ProgramData\Microsoft\Windows\WER\Temp\WER2A90.tmp.xml
                                                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):4663
                                                                                      Entropy (8bit):4.4742919696922865
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:cvIwSD8zsVJgtWI9EqWSC8Bg8fm8M4JCds/bNntF3m+q8/MbNFnL4SrS41d:uITfvTLSNzJNbNe9bNFDWCd
                                                                                      MD5:E3378408341C99A0B0A96CADB5084621
                                                                                      SHA1:12B6643E54A3D838501A9E7A84C47E46EF6D17E1
                                                                                      SHA-256:98AF9C3CA1151C915C9ABFE9A15B82C499AD548C37A34F7AF06585185672AD45
                                                                                      SHA-512:EDBE410A76B86C846B8B2CDB3A315B19ECB788921FED0BB865821A41B95C6E6EE4922E972C8206A990F01109B2B7E49AA9EA3C9B0D6F3C67E4185BC43D1B583D
                                                                                      Malicious:false
                                                                                      Reputation:low
                                                                                      Preview: <?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="987788" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..

                                                                                      Static File Info

                                                                                      General

                                                                                      File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                      Entropy (8bit):7.583613798367438
                                                                                      TrID:
                                                                                      • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
                                                                                      • Generic Win/DOS Executable (2004/3) 0.20%
                                                                                      • DOS Executable Generic (2002/1) 0.20%
                                                                                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                      File name:042529de_by_Libranalysis.dll
                                                                                      File size:166856
                                                                                      MD5:042529de19df790cdf8fe1a26ae1d5aa
                                                                                      SHA1:f9f73e973dda28b2b82fc3c3bb5f0740f6d28ea1
                                                                                      SHA256:430143aaf388f90ce6766480df547460ed3588347b4c58871accd32fa8a0961b
                                                                                      SHA512:73381bf28bca8a5cca1f9675a13fd9d57ad9a004626e4d5e016efb614b95cb9768010fad774c56d738ddb75aa75c7007f6f5d5a1d9e75bc3bc31df17f4db37e4
                                                                                      SSDEEP:3072:F/FbrEzD9N+RiMB00c9/74DXE+JgaV7IPx+e6O/pPtaLOi:3brE1kvcB74DXZ2Mel3i
                                                                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......t.%.0zK.0zK.0zK.0zJ.}{K...3..{K.....P{K...3..zK.V....zK...1..{K......zK.Rich0zK.........................................PE..L..

                                                                                      File Icon

                                                                                      Icon Hash:74f0e4ecccdce0e4

                                                                                      Static PE Info

                                                                                      General

                                                                                      Entrypoint:0x10023130
                                                                                      Entrypoint Section:.text
                                                                                      Digitally signed:true
                                                                                      Imagebase:0x10000000
                                                                                      Subsystem:windows gui
                                                                                      Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
                                                                                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT
                                                                                      Time Stamp:0x609C7F93 [Thu May 13 01:23:31 2021 UTC]
                                                                                      TLS Callbacks:
                                                                                      CLR (.Net) Version:
                                                                                      OS Version Major:5
                                                                                      OS Version Minor:0
                                                                                      File Version Major:5
                                                                                      File Version Minor:0
                                                                                      Subsystem Version Major:5
                                                                                      Subsystem Version Minor:0
                                                                                      Import Hash:35893a758d71a4b313745582f88cfeb6

                                                                                      Authenticode Signature

                                                                                      Signature Valid:false
                                                                                      Signature Issuer:CN=Sectigo RSA Code Signing CA, O=Sectigo Limited, L=Salford, S=Greater Manchester, C=GB
                                                                                      Signature Validation Error:The digital signature of the object did not verify
                                                                                      Error Number:-2146869232
                                                                                      Not Before, Not After
                                                                                      • 12/6/2020 4:00:00 PM 12/7/2021 3:59:59 PM
                                                                                      Subject Chain
                                                                                      • CN=STAND ALONE MUSIC LTD, O=STAND ALONE MUSIC LTD, STREET="23 Cameo House, 11 Bear Street", L=LONDON, PostalCode=WC2H 7AS, C=GB
                                                                                      Version:3
                                                                                      Thumbprint MD5:BE49CFBB4B6B5F4638C9EC0872B04B7C
                                                                                      Thumbprint SHA-1:A5887C72B22F81884E714EDEC711E52FDC60EA37
                                                                                      Thumbprint SHA-256:F680FAB6A9D21E8E76003C5C28B3C5084866D7AC85CF0CFB5AAA02F69EE99F1E
                                                                                      Serial:3B777165B125BCCC181D0BAC3F5B55B3

                                                                                      Entrypoint Preview

                                                                                      Instruction
                                                                                      xor eax, eax
                                                                                      add eax, 00002234h
                                                                                      cmpss xmm1, xmm2, 03h
                                                                                      sub eax, 00002233h
                                                                                      mov edx, 00000000h
                                                                                      mov edx, 00000000h
                                                                                      mov edx, 00000000h
                                                                                      mov edx, 00000000h
                                                                                      mov edx, 00000000h
                                                                                      mov edx, 00000000h
                                                                                      cmpss xmm1, xmm2, 03h
                                                                                      cmp eax, 02h
                                                                                      jne 00007FA45C7FC979h
                                                                                      mov eax, 00000000h
                                                                                      mov eax, 00000000h
                                                                                      mov eax, 00000000h
                                                                                      mov eax, 00000000h
                                                                                      mov eax, 00000000h
                                                                                      mov eax, 00000000h
                                                                                      mov eax, 00000000h
                                                                                      mov eax, 00000000h
                                                                                      mov eax, 00000000h
                                                                                      mov eax, 00000000h
                                                                                      mov eax, 00000000h
                                                                                      mov eax, 00000000h
                                                                                      mov eax, 00000000h
                                                                                      mov eax, 00000000h
                                                                                      mov eax, 00000000h
                                                                                      mov eax, 00000000h
                                                                                      mov eax, 00000000h
                                                                                      mov eax, 00000000h
                                                                                      mov eax, 00000000h
                                                                                      mov eax, 00000000h
                                                                                      mov eax, 00000000h
                                                                                      mov eax, 00000000h
                                                                                      mov eax, 00000000h
                                                                                      mov eax, 00000000h
                                                                                      mov eax, 00000000h
                                                                                      mov eax, 00000000h
                                                                                      mov eax, 00000000h
                                                                                      mov eax, 00000000h

                                                                                      Rich Headers

                                                                                      Programming Language:
                                                                                      • [RES] VS2012 UPD3 build 60610
                                                                                      • [LNK] VS2005 build 50727
                                                                                      • [EXP] VS2005 build 50727
                                                                                      • [ C ] VS2012 UPD4 build 61030
                                                                                      • [IMP] VS2013 UPD2 build 30501

                                                                                      Data Directories

                                                                                      NameVirtual AddressVirtual Size Is in Section
                                                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x2672a0x5b.rdata
                                                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x267f80x59.rdata
                                                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x2b0000x3a0.rsrc
                                                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x274000x17c8.pdata
                                                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x2c0000x1220
                                                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x100180x38.text
                                                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_IAT0x240000x58.rdata
                                                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                                                      Sections

                                                                                      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                      .text0x10000x222ac0x22400False0.761077212591data7.58875564719IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                                                      .rdata0x240000x2a760x2c00False0.793323863636data7.44946265271IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                      .pdata0x270000x33900x1800False0.722330729167MMDF mailbox7.18721728982IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                                                                      .rsrc0x2b0000x3a00x400False0.423828125data3.05991849143IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                      .reloc0x2c0000x2500x400False0.517578125data4.09990016339IMAGE_SCN_TYPE_NOLOAD, IMAGE_SCN_TYPE_DSECT, IMAGE_SCN_TYPE_NO_PAD, IMAGE_SCN_TYPE_GROUP, IMAGE_SCN_TYPE_COPY, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                                                      Resources

                                                                                      NameRVASizeTypeLanguageCountry
                                                                                      RT_VERSION0x2b0600x33cdata

                                                                                      Imports

                                                                                      DLLImport
                                                                                      CLUSAPI.dllClusterEnum
                                                                                      OPENGL32.dllglTexSubImage1D
                                                                                      ADVAPI32.dllRegOverridePredefKey
                                                                                      KERNEL32.dllLoadLibraryExA, LoadLibraryW, GetProfileSectionW, OpenSemaphoreW, GetProfileSectionA, CreateFileW, OutputDebugStringA, CloseHandle
                                                                                      ole32.dllCreateStreamOnHGlobal, CreatePointerMoniker
                                                                                      USER32.dllTranslateMessage
                                                                                      RASAPI32.dllRasGetConnectionStatistics

                                                                                      Version Infos

                                                                                      DescriptionData
                                                                                      LegalCopyrightCopyright 2018
                                                                                      InternalNamex2otfb
                                                                                      FileVersion7.2.5422.00
                                                                                      Full Version7.2.5_000-b00
                                                                                      CompanyNameOracle Corporation
                                                                                      ProductNameXhot(BM) Ltloehey YO 8
                                                                                      ProductVersion7.2.5422.00
                                                                                      FileDescriptionJava(TM) Platform SE binary
                                                                                      OriginalFilenamex2otfb.dll
                                                                                      Translation0x0000 0x04b0

                                                                                      Network Behavior

                                                                                      Network Port Distribution

                                                                                      UDP Packets

                                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                                      May 13, 2021 06:57:05.497380972 CEST5659053192.168.2.78.8.8.8
                                                                                      May 13, 2021 06:57:05.554747105 CEST53565908.8.8.8192.168.2.7
                                                                                      May 13, 2021 06:57:06.027421951 CEST6050153192.168.2.78.8.8.8
                                                                                      May 13, 2021 06:57:06.084467888 CEST53605018.8.8.8192.168.2.7
                                                                                      May 13, 2021 06:57:06.247921944 CEST5377553192.168.2.78.8.8.8
                                                                                      May 13, 2021 06:57:06.296725035 CEST53537758.8.8.8192.168.2.7
                                                                                      May 13, 2021 06:57:07.329972982 CEST5183753192.168.2.78.8.8.8
                                                                                      May 13, 2021 06:57:07.381485939 CEST53518378.8.8.8192.168.2.7
                                                                                      May 13, 2021 06:57:08.530333996 CEST5541153192.168.2.78.8.8.8
                                                                                      May 13, 2021 06:57:08.579020023 CEST53554118.8.8.8192.168.2.7
                                                                                      May 13, 2021 06:57:09.923357010 CEST6366853192.168.2.78.8.8.8
                                                                                      May 13, 2021 06:57:09.960467100 CEST5464053192.168.2.78.8.8.8
                                                                                      May 13, 2021 06:57:09.972031116 CEST53636688.8.8.8192.168.2.7
                                                                                      May 13, 2021 06:57:10.024082899 CEST53546408.8.8.8192.168.2.7
                                                                                      May 13, 2021 06:57:11.531532049 CEST5873953192.168.2.78.8.8.8
                                                                                      May 13, 2021 06:57:11.588655949 CEST53587398.8.8.8192.168.2.7
                                                                                      May 13, 2021 06:57:12.667609930 CEST6033853192.168.2.78.8.8.8
                                                                                      May 13, 2021 06:57:12.716346979 CEST53603388.8.8.8192.168.2.7
                                                                                      May 13, 2021 06:57:14.364583969 CEST5871753192.168.2.78.8.8.8
                                                                                      May 13, 2021 06:57:14.421838999 CEST53587178.8.8.8192.168.2.7
                                                                                      May 13, 2021 06:57:22.150432110 CEST5976253192.168.2.78.8.8.8
                                                                                      May 13, 2021 06:57:22.199636936 CEST53597628.8.8.8192.168.2.7
                                                                                      May 13, 2021 06:57:23.267908096 CEST5432953192.168.2.78.8.8.8
                                                                                      May 13, 2021 06:57:23.325012922 CEST53543298.8.8.8192.168.2.7
                                                                                      May 13, 2021 06:57:25.443334103 CEST5805253192.168.2.78.8.8.8
                                                                                      May 13, 2021 06:57:25.494931936 CEST53580528.8.8.8192.168.2.7
                                                                                      May 13, 2021 06:57:26.485157013 CEST5400853192.168.2.78.8.8.8
                                                                                      May 13, 2021 06:57:26.534009933 CEST53540088.8.8.8192.168.2.7
                                                                                      May 13, 2021 06:57:33.341187954 CEST5945153192.168.2.78.8.8.8
                                                                                      May 13, 2021 06:57:33.400007963 CEST53594518.8.8.8192.168.2.7
                                                                                      May 13, 2021 06:57:34.791951895 CEST5291453192.168.2.78.8.8.8
                                                                                      May 13, 2021 06:57:34.840886116 CEST53529148.8.8.8192.168.2.7
                                                                                      May 13, 2021 06:57:35.913252115 CEST6456953192.168.2.78.8.8.8
                                                                                      May 13, 2021 06:57:35.962047100 CEST53645698.8.8.8192.168.2.7
                                                                                      May 13, 2021 06:57:37.069798946 CEST5281653192.168.2.78.8.8.8
                                                                                      May 13, 2021 06:57:37.118942022 CEST53528168.8.8.8192.168.2.7
                                                                                      May 13, 2021 06:57:38.813409090 CEST5078153192.168.2.78.8.8.8
                                                                                      May 13, 2021 06:57:38.865058899 CEST53507818.8.8.8192.168.2.7
                                                                                      May 13, 2021 06:57:40.074878931 CEST5423053192.168.2.78.8.8.8
                                                                                      May 13, 2021 06:57:40.123526096 CEST53542308.8.8.8192.168.2.7
                                                                                      May 13, 2021 06:57:41.307329893 CEST5491153192.168.2.78.8.8.8
                                                                                      May 13, 2021 06:57:41.357032061 CEST53549118.8.8.8192.168.2.7
                                                                                      May 13, 2021 06:57:42.836102962 CEST4995853192.168.2.78.8.8.8
                                                                                      May 13, 2021 06:57:42.884879112 CEST53499588.8.8.8192.168.2.7
                                                                                      May 13, 2021 06:57:43.990967989 CEST5086053192.168.2.78.8.8.8
                                                                                      May 13, 2021 06:57:44.040106058 CEST53508608.8.8.8192.168.2.7
                                                                                      May 13, 2021 06:57:44.942949057 CEST5045253192.168.2.78.8.8.8
                                                                                      May 13, 2021 06:57:44.994451046 CEST53504528.8.8.8192.168.2.7
                                                                                      May 13, 2021 06:57:47.105863094 CEST5973053192.168.2.78.8.8.8
                                                                                      May 13, 2021 06:57:47.154968977 CEST53597308.8.8.8192.168.2.7
                                                                                      May 13, 2021 06:57:56.365051031 CEST5931053192.168.2.78.8.8.8
                                                                                      May 13, 2021 06:57:56.440208912 CEST53593108.8.8.8192.168.2.7
                                                                                      May 13, 2021 06:57:57.532074928 CEST5191953192.168.2.78.8.8.8
                                                                                      May 13, 2021 06:57:57.589720964 CEST53519198.8.8.8192.168.2.7
                                                                                      May 13, 2021 06:58:01.251290083 CEST6429653192.168.2.78.8.8.8
                                                                                      May 13, 2021 06:58:01.312550068 CEST53642968.8.8.8192.168.2.7
                                                                                      May 13, 2021 06:58:02.474287033 CEST5668053192.168.2.78.8.8.8
                                                                                      May 13, 2021 06:58:02.523000002 CEST53566808.8.8.8192.168.2.7
                                                                                      May 13, 2021 06:58:11.694286108 CEST5882053192.168.2.78.8.8.8
                                                                                      May 13, 2021 06:58:11.754353046 CEST53588208.8.8.8192.168.2.7
                                                                                      May 13, 2021 06:58:42.742275953 CEST6098353192.168.2.78.8.8.8
                                                                                      May 13, 2021 06:58:42.808885098 CEST53609838.8.8.8192.168.2.7
                                                                                      May 13, 2021 06:58:48.056348085 CEST4924753192.168.2.78.8.8.8
                                                                                      May 13, 2021 06:58:48.124034882 CEST53492478.8.8.8192.168.2.7
                                                                                      May 13, 2021 06:59:03.320688963 CEST5228653192.168.2.78.8.8.8
                                                                                      May 13, 2021 06:59:03.426789045 CEST53522868.8.8.8192.168.2.7
                                                                                      May 13, 2021 06:59:04.068598032 CEST5606453192.168.2.78.8.8.8
                                                                                      May 13, 2021 06:59:04.170871019 CEST53560648.8.8.8192.168.2.7
                                                                                      May 13, 2021 06:59:04.491632938 CEST6374453192.168.2.78.8.8.8
                                                                                      May 13, 2021 06:59:04.562212944 CEST53637448.8.8.8192.168.2.7
                                                                                      May 13, 2021 06:59:04.791532993 CEST6145753192.168.2.78.8.8.8
                                                                                      May 13, 2021 06:59:04.848692894 CEST53614578.8.8.8192.168.2.7
                                                                                      May 13, 2021 06:59:05.337626934 CEST5836753192.168.2.78.8.8.8
                                                                                      May 13, 2021 06:59:05.401299953 CEST53583678.8.8.8192.168.2.7
                                                                                      May 13, 2021 06:59:06.034526110 CEST6059953192.168.2.78.8.8.8
                                                                                      May 13, 2021 06:59:06.091675997 CEST53605998.8.8.8192.168.2.7
                                                                                      May 13, 2021 06:59:06.724257946 CEST5957153192.168.2.78.8.8.8
                                                                                      May 13, 2021 06:59:06.783740044 CEST53595718.8.8.8192.168.2.7
                                                                                      May 13, 2021 06:59:07.289761066 CEST5268953192.168.2.78.8.8.8
                                                                                      May 13, 2021 06:59:07.346870899 CEST53526898.8.8.8192.168.2.7
                                                                                      May 13, 2021 06:59:08.170528889 CEST5029053192.168.2.78.8.8.8
                                                                                      May 13, 2021 06:59:08.233360052 CEST53502908.8.8.8192.168.2.7
                                                                                      May 13, 2021 06:59:09.265723944 CEST6042753192.168.2.78.8.8.8
                                                                                      May 13, 2021 06:59:09.325908899 CEST53604278.8.8.8192.168.2.7
                                                                                      May 13, 2021 06:59:09.943453074 CEST5620953192.168.2.78.8.8.8
                                                                                      May 13, 2021 06:59:10.000729084 CEST53562098.8.8.8192.168.2.7
                                                                                      May 13, 2021 06:59:18.568387985 CEST5958253192.168.2.78.8.8.8
                                                                                      May 13, 2021 06:59:18.626960993 CEST53595828.8.8.8192.168.2.7
                                                                                      May 13, 2021 06:59:19.479314089 CEST6094953192.168.2.78.8.8.8
                                                                                      May 13, 2021 06:59:19.536600113 CEST53609498.8.8.8192.168.2.7

                                                                                      Code Manipulations

                                                                                      Statistics

                                                                                      Behavior

                                                                                      Click to jump to process

                                                                                      System Behavior

                                                                                      General

                                                                                      Start time:06:57:12
                                                                                      Start date:13/05/2021
                                                                                      Path:C:\Windows\System32\loaddll32.exe
                                                                                      Wow64 process (32bit):true
                                                                                      Commandline:loaddll32.exe 'C:\Users\user\Desktop\042529de_by_Libranalysis.dll'
                                                                                      Imagebase:0xb20000
                                                                                      File size:116736 bytes
                                                                                      MD5 hash:542795ADF7CC08EFCF675D65310596E8
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Reputation:high

                                                                                      General

                                                                                      Start time:06:57:12
                                                                                      Start date:13/05/2021
                                                                                      Path:C:\Windows\SysWOW64\cmd.exe
                                                                                      Wow64 process (32bit):true
                                                                                      Commandline:cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\042529de_by_Libranalysis.dll',#1
                                                                                      Imagebase:0x870000
                                                                                      File size:232960 bytes
                                                                                      MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Reputation:high

                                                                                      General

                                                                                      Start time:06:57:12
                                                                                      Start date:13/05/2021
                                                                                      Path:C:\Windows\SysWOW64\rundll32.exe
                                                                                      Wow64 process (32bit):true
                                                                                      Commandline:rundll32.exe 'C:\Users\user\Desktop\042529de_by_Libranalysis.dll',#1
                                                                                      Imagebase:0xc50000
                                                                                      File size:61952 bytes
                                                                                      MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Yara matches:
                                                                                      • Rule: JoeSecurity_Dridex_1, Description: Yara detected Dridex unpacked file, Source: 00000002.00000002.330690935.0000000010001000.00000020.00020000.sdmp, Author: Joe Security
                                                                                      Reputation:high

                                                                                      General

                                                                                      Start time:06:57:44
                                                                                      Start date:13/05/2021
                                                                                      Path:C:\Windows\SysWOW64\WerFault.exe
                                                                                      Wow64 process (32bit):true
                                                                                      Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 1008 -s 764
                                                                                      Imagebase:0x1070000
                                                                                      File size:434592 bytes
                                                                                      MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Reputation:high

                                                                                      Disassembly

                                                                                      Code Analysis

                                                                                      Reset < >