Loading ...

Play interactive tourEdit tour

Windows Analysis Report 6ZV65nCMYQ

Overview

General Information

Sample Name:6ZV65nCMYQ (renamed file extension from none to exe)
Analysis ID:448941
MD5:622f4aa2d5e82438f3a40a35ab4902d5
SHA1:b486db47021575c47e7b130bed1ad70b8bf6a719
SHA256:277089cb78a9c493cecd8f5fbe70df0577d4f9557fb8b55ff5f7c2505308ca3a
Tags:32exe
Infos:

Most interesting Screenshot:

Detection

Dridex Dropper
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Dridex dropper found
Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected Dridex unpacked file
C2 URLs / IPs found in malware configuration
Found potential dummy code loops (likely to delay analysis)
Machine Learning detection for sample
Tries to delay execution (extensive OutputDebugStringW loop)
Tries to detect sandboxes / dynamic malware analysis system (file name check)
Tries to detect virtualization through RDTSC time measurements
Abnormal high CPU Usage
Antivirus or Machine Learning detection for unpacked file
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to query locales information (e.g. system language)
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Program does not show much activity (idle)
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

Process Tree

  • System is w10x64
  • 6ZV65nCMYQ.exe (PID: 6632 cmdline: 'C:\Users\user\Desktop\6ZV65nCMYQ.exe' MD5: 622F4AA2D5E82438F3A40A35AB4902D5)
  • cleanup

Malware Configuration

Threatname: Dridex

{"Version": 22202, "C2 list": ["202.29.60.34:443", "66.175.217.172:13786", "78.46.78.42:9043"], "RC4 keys": ["RQTJGOuDHeSyUCWzdNRZi3fWMitWY9aTc", "2UMW8pusQXiNJDgmuPITkf4TmrOt3Y13lRDWnjBuu16JkzjIG6gNuckQDkiut9pzQHVGfFdlT"]}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000000.00000002.1172561248.0000000010001000.00000020.00020000.sdmpJoeSecurity_Dridex_1Yara detected Dridex unpacked fileJoe Security

    Unpacked PEs

    SourceRuleDescriptionAuthorStrings
    0.2.6ZV65nCMYQ.exe.10000000.0.unpackJoeSecurity_Dridex_1Yara detected Dridex unpacked fileJoe Security

      Sigma Overview

      No Sigma rule has matched

      Jbx Signature Overview

      Click to jump to signature section

      Show All Signature Results

      AV Detection:

      barindex
      Found malware configurationShow sources
      Source: 0.2.6ZV65nCMYQ.exe.10000000.0.unpackMalware Configuration Extractor: Dridex {"Version": 22202, "C2 list": ["202.29.60.34:443", "66.175.217.172:13786", "78.46.78.42:9043"], "RC4 keys": ["RQTJGOuDHeSyUCWzdNRZi3fWMitWY9aTc", "2UMW8pusQXiNJDgmuPITkf4TmrOt3Y13lRDWnjBuu16JkzjIG6gNuckQDkiut9pzQHVGfFdlT"]}
      Multi AV Scanner detection for submitted fileShow sources
      Source: 6ZV65nCMYQ.exeVirustotal: Detection: 29%Perma Link
      Source: 6ZV65nCMYQ.exeReversingLabs: Detection: 34%
      Machine Learning detection for sampleShow sources
      Source: 6ZV65nCMYQ.exeJoe Sandbox ML: detected
      Source: 0.2.6ZV65nCMYQ.exe.10000000.0.unpackAvira: Label: TR/Dropper.Gen

      Compliance:

      barindex
      Detected unpacking (overwrites its own PE header)Show sources
      Source: C:\Users\user\Desktop\6ZV65nCMYQ.exeUnpacked PE file: 0.2.6ZV65nCMYQ.exe.10000000.0.unpack
      Source: 6ZV65nCMYQ.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
      Source: 6ZV65nCMYQ.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT
      Source: Binary string: wntdll.pdbUGP source: 6ZV65nCMYQ.exe, 00000000.00000003.659201910.000000004B280000.00000004.00000001.sdmp
      Source: Binary string: wntdll.pdb source: 6ZV65nCMYQ.exe, 00000000.00000003.659201910.000000004B280000.00000004.00000001.sdmp
      Source: Binary string: Gpernfedeefe.pdb source: 6ZV65nCMYQ.exe

      Networking:

      barindex
      C2 URLs / IPs found in malware configurationShow sources
      Source: Malware configuration extractorIPs: 202.29.60.34:443
      Source: Malware configuration extractorIPs: 66.175.217.172:13786
      Source: Malware configuration extractorIPs: 78.46.78.42:9043
      Source: Joe Sandbox ViewIP Address: 78.46.78.42 78.46.78.42
      Source: Joe Sandbox ViewIP Address: 202.29.60.34 202.29.60.34
      Source: Joe Sandbox ViewIP Address: 66.175.217.172 66.175.217.172
      Source: Joe Sandbox ViewASN Name: HETZNER-ASDE HETZNER-ASDE
      Source: Joe Sandbox ViewASN Name: CMRU-AS-APChiangmaiRajabhatUniversityTH CMRU-AS-APChiangmaiRajabhatUniversityTH
      Source: Joe Sandbox ViewASN Name: LINODE-APLinodeLLCUS LINODE-APLinodeLLCUS

      E-Banking Fraud:

      barindex
      Dridex dropper foundShow sources
      Source: Initial fileSignature Results: Dridex dropper behavior
      Yara detected Dridex unpacked fileShow sources
      Source: Yara matchFile source: 0.2.6ZV65nCMYQ.exe.10000000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 00000000.00000002.1172561248.0000000010001000.00000020.00020000.sdmp, type: MEMORY
      Source: C:\Users\user\Desktop\6ZV65nCMYQ.exeProcess Stats: CPU usage > 98%
      Source: C:\Users\user\Desktop\6ZV65nCMYQ.exeCode function: 0_2_10012840 NtAllocateVirtualMemory,
      Source: C:\Users\user\Desktop\6ZV65nCMYQ.exeCode function: 0_2_1001223C NtDelayExecution,
      Source: C:\Users\user\Desktop\6ZV65nCMYQ.exeCode function: 0_2_1000BB88 NtClose,
      Source: C:\Users\user\Desktop\6ZV65nCMYQ.exeCode function: 0_2_10010754
      Source: C:\Users\user\Desktop\6ZV65nCMYQ.exeCode function: 0_2_10011460
      Source: C:\Users\user\Desktop\6ZV65nCMYQ.exeCode function: 0_2_1000846C
      Source: C:\Users\user\Desktop\6ZV65nCMYQ.exeCode function: 0_2_10001494
      Source: C:\Users\user\Desktop\6ZV65nCMYQ.exeCode function: 0_2_1000A52C
      Source: C:\Users\user\Desktop\6ZV65nCMYQ.exeCode function: 0_2_10011D58
      Source: C:\Users\user\Desktop\6ZV65nCMYQ.exeCode function: 0_2_10019348
      Source: 6ZV65nCMYQ.exe, 00000000.00000003.659347284.000000004B39F000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs 6ZV65nCMYQ.exe
      Source: 6ZV65nCMYQ.exe, 00000000.00000000.648423330.0000000010028000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameDihzehtreof.resources.dll@ vs 6ZV65nCMYQ.exe
      Source: 6ZV65nCMYQ.exe, 00000000.00000002.1172580143.000000001001F000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameHexEditor.exe6 vs 6ZV65nCMYQ.exe
      Source: 6ZV65nCMYQ.exeBinary or memory string: OriginalFilenameDihzehtreof.resources.dll@ vs 6ZV65nCMYQ.exe
      Source: 6ZV65nCMYQ.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
      Source: 6ZV65nCMYQ.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      Source: classification engineClassification label: mal100.bank.troj.evad.winEXE@1/0@0/3
      Source: 6ZV65nCMYQ.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\6ZV65nCMYQ.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
      Source: 6ZV65nCMYQ.exeVirustotal: Detection: 29%
      Source: 6ZV65nCMYQ.exeReversingLabs: Detection: 34%
      Source: 6ZV65nCMYQ.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT
      Source: 6ZV65nCMYQ.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
      Source: Binary string: wntdll.pdbUGP source: 6ZV65nCMYQ.exe, 00000000.00000003.659201910.000000004B280000.00000004.00000001.sdmp
      Source: Binary string: wntdll.pdb source: 6ZV65nCMYQ.exe, 00000000.00000003.659201910.000000004B280000.00000004.00000001.sdmp
      Source: Binary string: Gpernfedeefe.pdb source: 6ZV65nCMYQ.exe

      Data Obfuscation:

      barindex
      Detected unpacking (changes PE section rights)Show sources
      Source: C:\Users\user\Desktop\6ZV65nCMYQ.exeUnpacked PE file: 0.2.6ZV65nCMYQ.exe.10000000.0.unpack .text:ER;.rdata:R;.data:W;.rsrc:R;.reloc:R; vs .text:ER;.rdata:R;.data:W;.CRT:R;.rsrc:R;.reloc:R;
      Detected unpacking (overwrites its own PE header)Show sources
      Source: C:\Users\user\Desktop\6ZV65nCMYQ.exeUnpacked PE file: 0.2.6ZV65nCMYQ.exe.10000000.0.unpack
      Source: C:\Users\user\Desktop\6ZV65nCMYQ.exeCode function: 0_2_1000F6CC push esi; mov dword ptr [esp], 00000000h
      Source: initial sampleStatic PE information: section name: .text entropy: 7.824574037

      Malware Analysis System Evasion:

      barindex
      Tries to delay execution (extensive OutputDebugStringW loop)Show sources
      Source: C:\Users\user\Desktop\6ZV65nCMYQ.exeSection loaded: OutputDebugStringW count: 1668
      Tries to detect sandboxes / dynamic malware analysis system (file name check)Show sources
      Source: C:\Users\user\Desktop\6ZV65nCMYQ.exeSection loaded: \KnownDlls32\Self.exE
      Source: C:\Users\user\Desktop\6ZV65nCMYQ.exeSection loaded: \KnownDlls32\testapp.exe
      Tries to detect virtualization through RDTSC time measurementsShow sources
      Source: C:\Users\user\Desktop\6ZV65nCMYQ.exeRDTSC instruction interceptor: First address: 0000000010001332 second address: 0000000010001336 instructions: 0x00000000 rdtsc 0x00000002 mov esi, eax 0x00000004 rdtsc
      Source: C:\Users\user\Desktop\6ZV65nCMYQ.exeRDTSC instruction interceptor: First address: 0000000010001336 second address: 0000000010001332 instructions: 0x00000000 rdtsc 0x00000002 mov edi, eax 0x00000004 xor eax, eax 0x00000006 xor edx, edx 0x00000008 sub edi, esi 0x0000000a mov eax, dword ptr [esp+04h] 0x0000000e cmp eax, edi 0x00000010 cmovb eax, edi 0x00000013 cmp ecx, edi 0x00000015 cmovnbe ecx, edi 0x00000018 mov bl, byte ptr [esp+2Bh] 0x0000001c mov byte ptr [esp+3Bh], bl 0x00000020 mov edx, dword ptr [esp+08h] 0x00000024 add edx, 01h 0x00000027 mov esi, dword ptr [esp+2Ch] 0x0000002b cmp edx, esi 0x0000002d mov edi, ecx 0x0000002f mov esi, eax 0x00000031 mov dword ptr [esp+24h], edi 0x00000035 mov dword ptr [esp+18h], eax 0x00000039 mov dword ptr [esp+1Ch], ecx 0x0000003d mov dword ptr [esp+20h], esi 0x00000041 mov dword ptr [esp+14h], edx 0x00000045 je 00007FCA587815D3h 0x0000004b jmp 00007FCA5878162Dh 0x0000004d mov eax, dword ptr [esp+14h] 0x00000051 mov ecx, dword ptr [esp+1Ch] 0x00000055 mov edx, dword ptr [esp+18h] 0x00000059 mov dword ptr [esp+08h], eax 0x0000005d mov dword ptr [esp+04h], edx 0x00000061 rdtsc
      Source: C:\Users\user\Desktop\6ZV65nCMYQ.exeWindow / User API: threadDelayed 1668
      Source: C:\Users\user\Desktop\6ZV65nCMYQ.exe TID: 6636Thread sleep count: 1668 > 30
      Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
      Source: C:\Users\user\Desktop\6ZV65nCMYQ.exeLast function: Thread delayed
      Source: C:\Users\user\Desktop\6ZV65nCMYQ.exeLast function: Thread delayed
      Source: C:\Users\user\Desktop\6ZV65nCMYQ.exeCode function: 0_2_10010754 GetTokenInformation,GetSystemInfo,GetTokenInformation,

      Anti Debugging:

      barindex
      Found potential dummy code loops (likely to delay analysis)Show sources
      Source: C:\Users\user\Desktop\6ZV65nCMYQ.exeProcess Stats: CPU usage > 90% for more than 60s
      Source: C:\Users\user\Desktop\6ZV65nCMYQ.exeCode function: 0_2_10019AB4 LdrInitializeThunk,
      Source: C:\Users\user\Desktop\6ZV65nCMYQ.exeCode function: 0_2_10006D50 GetUserNameW,MessageBoxW,GetLastError,CreateFileA,DebugBreak,FlushFileBuffers,FreeEnvironmentStringsA,GetConsoleOutputCP,GetEnvironmentStrings,GetLocaleInfoA,GetStartupInfoA,GetStringTypeA,HeapValidate,IsBadReadPtr,LCMapStringA,LoadLibraryA,OutputDebugStringA,
      Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
      Source: C:\Users\user\Desktop\6ZV65nCMYQ.exeCode function: 0_2_10013110 RtlAddVectoredExceptionHandler,
      Source: 6ZV65nCMYQ.exe, 00000000.00000002.1172446806.0000000000DA0000.00000002.00000001.sdmpBinary or memory string: Program Manager
      Source: 6ZV65nCMYQ.exe, 00000000.00000002.1172446806.0000000000DA0000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
      Source: 6ZV65nCMYQ.exe, 00000000.00000002.1172446806.0000000000DA0000.00000002.00000001.sdmpBinary or memory string: Progman
      Source: 6ZV65nCMYQ.exe, 00000000.00000002.1172446806.0000000000DA0000.00000002.00000001.sdmpBinary or memory string: Progmanlock
      Source: C:\Users\user\Desktop\6ZV65nCMYQ.exeCode function: GetUserNameW,MessageBoxW,GetLastError,CreateFileA,DebugBreak,FlushFileBuffers,FreeEnvironmentStringsA,GetConsoleOutputCP,GetEnvironmentStrings,GetLocaleInfoA,GetStartupInfoA,GetStringTypeA,HeapValidate,IsBadReadPtr,LCMapStringA,LoadLibraryA,OutputDebugStringA,
      Source: C:\Users\user\Desktop\6ZV65nCMYQ.exeCode function: 0_2_10006D50 GetUserNameW,MessageBoxW,GetLastError,CreateFileA,DebugBreak,FlushFileBuffers,FreeEnvironmentStringsA,GetConsoleOutputCP,GetEnvironmentStrings,GetLocaleInfoA,GetStartupInfoA,GetStringTypeA,HeapValidate,IsBadReadPtr,LCMapStringA,LoadLibraryA,OutputDebugStringA,
      Source: C:\Users\user\Desktop\6ZV65nCMYQ.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

      Mitre Att&ck Matrix

      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
      Valid AccountsWindows Management InstrumentationPath InterceptionProcess Injection1Virtualization/Sandbox Evasion311OS Credential DumpingSecurity Software Discovery31Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
      Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsProcess Injection1LSASS MemoryVirtualization/Sandbox Evasion311Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothApplication Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or Information2Security Account ManagerProcess Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Software Packing23NTDSApplication Window Discovery1Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA SecretsAccount Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
      Replication Through Removable MediaLaunchdRc.commonRc.commonSteganographyCached Domain CredentialsSystem Owner/User Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSyncSystem Information Discovery113Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact

      Behavior Graph

      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      Screenshots

      Thumbnails

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

      windows-stand

      Antivirus, Machine Learning and Genetic Malware Detection

      Initial Sample

      SourceDetectionScannerLabelLink
      6ZV65nCMYQ.exe30%VirustotalBrowse
      6ZV65nCMYQ.exe35%ReversingLabsWin32.Trojan.Generic
      6ZV65nCMYQ.exe100%Joe Sandbox ML

      Dropped Files

      No Antivirus matches

      Unpacked PE Files

      SourceDetectionScannerLabelLinkDownload
      0.2.6ZV65nCMYQ.exe.10000000.0.unpack100%AviraTR/Dropper.GenDownload File

      Domains

      No Antivirus matches

      URLs

      No Antivirus matches

      Domains and IPs

      Contacted Domains

      No contacted domains info

      Contacted IPs

      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs

      Public

      IPDomainCountryFlagASNASN NameMalicious
      78.46.78.42
      unknownGermany
      24940HETZNER-ASDEtrue
      202.29.60.34
      unknownThailand
      24344CMRU-AS-APChiangmaiRajabhatUniversityTHtrue
      66.175.217.172
      unknownUnited States
      63949LINODE-APLinodeLLCUStrue

      General Information

      Joe Sandbox Version:33.0.0 White Diamond
      Analysis ID:448941
      Start date:14.07.2021
      Start time:21:05:32
      Joe Sandbox Product:CloudBasic
      Overall analysis duration:0h 7m 39s
      Hypervisor based Inspection enabled:false
      Report type:light
      Sample file name:6ZV65nCMYQ (renamed file extension from none to exe)
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
      Number of analysed new started processes analysed:16
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • HDC enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Detection:MAL
      Classification:mal100.bank.troj.evad.winEXE@1/0@0/3
      EGA Information:Failed
      HDC Information:
      • Successful, ratio: 99.6% (good quality ratio 98.3%)
      • Quality average: 80.9%
      • Quality standard deviation: 24%
      HCA Information:Failed
      Cookbook Comments:
      • Adjust boot time
      • Enable AMSI
      • Override analysis time to 240s for sample files taking high CPU consumption
      Warnings:
      Show All
      • Exclude process from analysis (whitelisted): BackgroundTransferHost.exe, backgroundTaskHost.exe, svchost.exe, wuapihost.exe

      Simulations

      Behavior and APIs

      No simulations

      Joe Sandbox View / Context

      IPs

      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
      78.46.78.42nrQXlgp21m.exeGet hashmaliciousBrowse
        m3d2gsRm5Q.exeGet hashmaliciousBrowse
          4TWEQh2HJb.xlsGet hashmaliciousBrowse
            ldE25Snd1f.exeGet hashmaliciousBrowse
              Receipt-6218387.xlsGet hashmaliciousBrowse
                BhAJLvq0c7.xlsGet hashmaliciousBrowse
                  PFx3G8Snzk.exeGet hashmaliciousBrowse
                    9EP6Gxzv6F.xlsGet hashmaliciousBrowse
                      2ejCKSIjIV.exeGet hashmaliciousBrowse
                        bQWApID6av.xlsGet hashmaliciousBrowse
                          202.29.60.34nrQXlgp21m.exeGet hashmaliciousBrowse
                            m3d2gsRm5Q.exeGet hashmaliciousBrowse
                              4TWEQh2HJb.xlsGet hashmaliciousBrowse
                                ldE25Snd1f.exeGet hashmaliciousBrowse
                                  Receipt-6218387.xlsGet hashmaliciousBrowse
                                    BhAJLvq0c7.xlsGet hashmaliciousBrowse
                                      PFx3G8Snzk.exeGet hashmaliciousBrowse
                                        9EP6Gxzv6F.xlsGet hashmaliciousBrowse
                                          2ejCKSIjIV.exeGet hashmaliciousBrowse
                                            bQWApID6av.xlsGet hashmaliciousBrowse
                                              66.175.217.172nrQXlgp21m.exeGet hashmaliciousBrowse
                                                m3d2gsRm5Q.exeGet hashmaliciousBrowse
                                                  4TWEQh2HJb.xlsGet hashmaliciousBrowse
                                                    ldE25Snd1f.exeGet hashmaliciousBrowse
                                                      Receipt-6218387.xlsGet hashmaliciousBrowse
                                                        BhAJLvq0c7.xlsGet hashmaliciousBrowse
                                                          PFx3G8Snzk.exeGet hashmaliciousBrowse
                                                            9EP6Gxzv6F.xlsGet hashmaliciousBrowse
                                                              2ejCKSIjIV.exeGet hashmaliciousBrowse
                                                                bQWApID6av.xlsGet hashmaliciousBrowse

                                                                  Domains

                                                                  No context

                                                                  ASN

                                                                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                  CMRU-AS-APChiangmaiRajabhatUniversityTHnrQXlgp21m.exeGet hashmaliciousBrowse
                                                                  • 202.29.60.34
                                                                  m3d2gsRm5Q.exeGet hashmaliciousBrowse
                                                                  • 202.29.60.34
                                                                  4TWEQh2HJb.xlsGet hashmaliciousBrowse
                                                                  • 202.29.60.34
                                                                  ldE25Snd1f.exeGet hashmaliciousBrowse
                                                                  • 202.29.60.34
                                                                  Receipt-6218387.xlsGet hashmaliciousBrowse
                                                                  • 202.29.60.34
                                                                  BhAJLvq0c7.xlsGet hashmaliciousBrowse
                                                                  • 202.29.60.34
                                                                  PFx3G8Snzk.exeGet hashmaliciousBrowse
                                                                  • 202.29.60.34
                                                                  9EP6Gxzv6F.xlsGet hashmaliciousBrowse
                                                                  • 202.29.60.34
                                                                  2ejCKSIjIV.exeGet hashmaliciousBrowse
                                                                  • 202.29.60.34
                                                                  bQWApID6av.xlsGet hashmaliciousBrowse
                                                                  • 202.29.60.34
                                                                  HETZNER-ASDEBear_Vpn.exeGet hashmaliciousBrowse
                                                                  • 88.99.66.31
                                                                  MiiefP6Jj7.exeGet hashmaliciousBrowse
                                                                  • 88.99.66.31
                                                                  MWTUoiKKLz.exeGet hashmaliciousBrowse
                                                                  • 88.99.66.31
                                                                  qwxiR5lxRE.exeGet hashmaliciousBrowse
                                                                  • 88.99.66.31
                                                                  QaFzP2AOXH.exeGet hashmaliciousBrowse
                                                                  • 88.99.66.31
                                                                  nrQXlgp21m.exeGet hashmaliciousBrowse
                                                                  • 78.46.78.42
                                                                  1z0OH1ed7P.exeGet hashmaliciousBrowse
                                                                  • 88.99.66.31
                                                                  m3d2gsRm5Q.exeGet hashmaliciousBrowse
                                                                  • 78.46.78.42
                                                                  4TWEQh2HJb.xlsGet hashmaliciousBrowse
                                                                  • 78.46.78.42
                                                                  ldE25Snd1f.exeGet hashmaliciousBrowse
                                                                  • 78.46.78.42
                                                                  2aJ9QdIdFE.exeGet hashmaliciousBrowse
                                                                  • 195.201.225.248
                                                                  EA4LughYnY.exeGet hashmaliciousBrowse
                                                                  • 195.201.225.248
                                                                  Receipt-6218387.xlsGet hashmaliciousBrowse
                                                                  • 78.46.78.42
                                                                  etSPaoVcAD.exeGet hashmaliciousBrowse
                                                                  • 195.201.225.248
                                                                  VwC7ZwYCLH.exeGet hashmaliciousBrowse
                                                                  • 195.201.225.248
                                                                  BhAJLvq0c7.xlsGet hashmaliciousBrowse
                                                                  • 78.46.78.42
                                                                  kxQkjkU9DO.exeGet hashmaliciousBrowse
                                                                  • 195.201.225.248
                                                                  PFx3G8Snzk.exeGet hashmaliciousBrowse
                                                                  • 78.46.78.42
                                                                  9CMjcYFBxo.exeGet hashmaliciousBrowse
                                                                  • 195.201.225.248
                                                                  jDnYtpTxyZ.exeGet hashmaliciousBrowse
                                                                  • 88.99.66.31
                                                                  LINODE-APLinodeLLCUSzYObZhfFz0.dllGet hashmaliciousBrowse
                                                                  • 176.58.123.25
                                                                  nrQXlgp21m.exeGet hashmaliciousBrowse
                                                                  • 66.175.217.172
                                                                  m3d2gsRm5Q.exeGet hashmaliciousBrowse
                                                                  • 66.175.217.172
                                                                  4TWEQh2HJb.xlsGet hashmaliciousBrowse
                                                                  • 66.175.217.172
                                                                  6kZeSToEoa.dllGet hashmaliciousBrowse
                                                                  • 176.58.123.25
                                                                  ldE25Snd1f.exeGet hashmaliciousBrowse
                                                                  • 66.175.217.172
                                                                  Receipt-6218387.xlsGet hashmaliciousBrowse
                                                                  • 66.175.217.172
                                                                  BhAJLvq0c7.xlsGet hashmaliciousBrowse
                                                                  • 66.175.217.172
                                                                  PFx3G8Snzk.exeGet hashmaliciousBrowse
                                                                  • 66.175.217.172
                                                                  9EP6Gxzv6F.xlsGet hashmaliciousBrowse
                                                                  • 66.175.217.172
                                                                  2ejCKSIjIV.exeGet hashmaliciousBrowse
                                                                  • 66.175.217.172
                                                                  bQWApID6av.xlsGet hashmaliciousBrowse
                                                                  • 66.175.217.172
                                                                  sddA9XYpsF.exeGet hashmaliciousBrowse
                                                                  • 66.175.211.144
                                                                  3F9E.dllGet hashmaliciousBrowse
                                                                  • 176.58.123.25
                                                                  5pyLvJBYld.dllGet hashmaliciousBrowse
                                                                  • 176.58.123.25
                                                                  triage_dropped_file.dllGet hashmaliciousBrowse
                                                                  • 176.58.123.25
                                                                  TeMdJqNMM0.exeGet hashmaliciousBrowse
                                                                  • 45.33.2.79
                                                                  RzLicilE0b.exeGet hashmaliciousBrowse
                                                                  • 172.104.157.41
                                                                  C0TEsC936Q.exeGet hashmaliciousBrowse
                                                                  • 178.79.153.56
                                                                  zizy3.dllGet hashmaliciousBrowse
                                                                  • 176.58.123.25

                                                                  JA3 Fingerprints

                                                                  No context

                                                                  Dropped Files

                                                                  No context

                                                                  Created / dropped Files

                                                                  No created / dropped files found

                                                                  Static File Info

                                                                  General

                                                                  File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                  Entropy (8bit):7.49405680509504
                                                                  TrID:
                                                                  • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                  • Generic Win/DOS Executable (2004/3) 0.02%
                                                                  • DOS Executable Generic (2002/1) 0.02%
                                                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                  File name:6ZV65nCMYQ.exe
                                                                  File size:167936
                                                                  MD5:622f4aa2d5e82438f3a40a35ab4902d5
                                                                  SHA1:b486db47021575c47e7b130bed1ad70b8bf6a719
                                                                  SHA256:277089cb78a9c493cecd8f5fbe70df0577d4f9557fb8b55ff5f7c2505308ca3a
                                                                  SHA512:2526c4ddad898208f5c3884e869beb35955a85ed92b628e1f7622daaf84d1f5e14071e6ab6984b8431eb9d127ae0e32c927699a40ef448169f81f74023df3446
                                                                  SSDEEP:3072:4WiJzQu5JD9ko9WY1wzxWrPAYNF7L5cWlvsRwmhnxONgkf:4LquAkPAYnX5WncNgk
                                                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........x.............................................................Rich............PE..L...!`.`.................@...P.......>.....

                                                                  File Icon

                                                                  Icon Hash:00828e8e8686b000

                                                                  Static PE Info

                                                                  General

                                                                  Entrypoint:0x10013ef0
                                                                  Entrypoint Section:.text
                                                                  Digitally signed:false
                                                                  Imagebase:0x10000000
                                                                  Subsystem:windows gui
                                                                  Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                                                  DLL Characteristics:DYNAMIC_BASE, NX_COMPAT
                                                                  Time Stamp:0x60FE6021 [Mon Jul 26 07:11:29 2021 UTC]
                                                                  TLS Callbacks:
                                                                  CLR (.Net) Version:
                                                                  OS Version Major:5
                                                                  OS Version Minor:0
                                                                  File Version Major:5
                                                                  File Version Minor:0
                                                                  Subsystem Version Major:5
                                                                  Subsystem Version Minor:0
                                                                  Import Hash:e9cbee8358b331a128409a4d26e3e347

                                                                  Entrypoint Preview

                                                                  Instruction
                                                                  call 00007FCA58ECEB80h
                                                                  int3
                                                                  int3
                                                                  int3
                                                                  int3
                                                                  int3
                                                                  int3
                                                                  int3
                                                                  int3
                                                                  int3
                                                                  int3
                                                                  int3
                                                                  push ebp
                                                                  mov ebp, esp
                                                                  push esi
                                                                  push ebx
                                                                  push edi
                                                                  and esp, FFFFFFF8h
                                                                  sub esp, 58h
                                                                  mov eax, dword ptr [ebp+0Ch]
                                                                  mov ecx, dword ptr [ebp+08h]
                                                                  xor edx, edx
                                                                  mov word ptr [esp+4Eh], 83C7h
                                                                  mov dword ptr [esp+38h], eax
                                                                  mov dword ptr [esp+34h], ecx
                                                                  mov dword ptr [esp+30h], edx
                                                                  call 00007FCA58EDF679h
                                                                  mov ecx, dword ptr [esp+40h]
                                                                  mov edx, dword ptr [esp+44h]
                                                                  xor esi, esi
                                                                  mov edi, 6612AFABh
                                                                  sub edi, ecx
                                                                  sbb esi, edx
                                                                  mov eax, dword ptr [eax+0Ch]
                                                                  mov dword ptr [esp+40h], edi
                                                                  mov dword ptr [esp+44h], esi
                                                                  mov ecx, eax
                                                                  add ecx, 14h
                                                                  mov eax, dword ptr [eax+14h]
                                                                  cmp eax, ecx
                                                                  mov edx, dword ptr [esp+30h]
                                                                  mov dword ptr [esp+2Ch], ecx
                                                                  mov dword ptr [esp+28h], eax
                                                                  mov dword ptr [esp+24h], edx
                                                                  je 00007FCA58EE04B6h
                                                                  jmp 00007FCA58EE04E1h
                                                                  mov eax, dword ptr [esp+20h]
                                                                  mov cx, word ptr [eax+24h]
                                                                  mov dword ptr [esp+44h], 00000000h
                                                                  mov dword ptr [esp+40h], 60000408h
                                                                  mov edx, dword ptr [esp+50h]
                                                                  add edx, dword ptr [esp+50h]
                                                                  mov esi, dword ptr [eax+10h]
                                                                  mov edi, dword ptr [eax+28h]
                                                                  mov dword ptr [esp+50h], edx
                                                                  mov bx, word ptr [esp+3Eh]
                                                                  mov edx, dword ptr [esp+38h]
                                                                  cmp esi, edx
                                                                  sete dl
                                                                  mov dh, byte ptr [esp+1Fh]
                                                                  and dh, dl
                                                                  xor bx, FFFFh
                                                                  mov word ptr [esp+3Eh], bx
                                                                  test dh, 00000000h

                                                                  Rich Headers

                                                                  Programming Language:
                                                                  • [EXP] VS2013 build 21005
                                                                  • [RES] VS2013 build 21005
                                                                  • [LNK] VS2013 build 21005
                                                                  • [IMP] VS2008 SP1 build 30729

                                                                  Data Directories

                                                                  NameVirtual AddressVirtual Size Is in Section
                                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x152100x5d.rdata
                                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x152ec0x168.rdata
                                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x280000x420.rsrc
                                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x290000x1.reloc
                                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x151100x38.rdata
                                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_IAT0x150000x10c.rdata
                                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                                  Sections

                                                                  NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                  .text0x10000x1357c0x14000False0.893872070313data7.824574037IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                                  .rdata0x150000x9d80x1000False0.346923828125data3.66891935244IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                  .data0x160000x119ca0x11000False0.947150735294data7.84923846168IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                                                  .rsrc0x280000x4200x1000False0.115478515625data1.09655664129IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                  .reloc0x290000x1200x1000False0.076904296875data0.698725432618IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                                  Resources

                                                                  NameRVASizeTypeLanguageCountry
                                                                  RT_VERSION0x280600x3bcdata

                                                                  Imports

                                                                  DLLImport
                                                                  msvcrt.dllfeof, ungetwc
                                                                  ADVAPI32.dllLookupPrivilegeValueA, LogonUserA, GetServiceDisplayNameW
                                                                  pdh.dllPdhEnumObjectsW
                                                                  KERNEL32.dllGetLargestConsoleWindowSize, WritePrivateProfileStructW, CloseHandle, GetCurrentThread, LocalSize, FindFirstVolumeW, GetCommTimeouts, IsValidLanguageGroup, lstrcatA, GetTempFileNameA, IsDebuggerPresent, GetModuleHandleA, GetProcAddress, OutputDebugStringA, CreateProcessA, LoadLibraryA, GetTimeFormatW
                                                                  MPRAPI.dllMprInfoBlockRemove
                                                                  GDI32.dllRectangle, GetDeviceGammaRamp, GetRgnBox, GetTextExtentPointA
                                                                  SHLWAPI.dllStrCSpnIW
                                                                  WINSPOOL.DRVFindClosePrinterChangeNotification
                                                                  mscms.dllGetColorProfileElement
                                                                  WININET.dllInternetCrackUrlA
                                                                  ole32.dllHPALETTE_UserFree
                                                                  SETUPAPI.dllSetupDiGetClassDevsExW, SetupDiGetDeviceInterfaceDetailA, SetupDiInstallClassExA
                                                                  WINMM.dllmixerSetControlDetails
                                                                  OLEAUT32.dllVarI4FromDate, SysStringByteLen
                                                                  ESENT.dllJetSeek
                                                                  IPHLPAPI.DLLFlushIpNetTable
                                                                  USER32.dllDefDlgProcW, GrayStringW, MsgWaitForMultipleObjects, GetMenuState, GetScrollRange, GetRawInputDeviceInfoW, GetShellWindow, GetClassInfoExW, GetMenu

                                                                  Exports

                                                                  NameOrdinalAddress
                                                                  DoorrledFgppr10x1001525e

                                                                  Version Infos

                                                                  DescriptionData
                                                                  Translation0x0000 0x04b0
                                                                  LegalCopyrightCopyright 1990-2017 Citrix Systems, Inc. All rights reserved.
                                                                  Assembly Version4.12.0.18013
                                                                  InternalNameDihzehtreof.resources.dll
                                                                  FileVersion8.68.5.00000
                                                                  CompanyNameCitrix Systems, Inc.
                                                                  ProductNameDihzeh Reofqehs
                                                                  ProductVersion8.68.5.00000
                                                                  FileDescriptionCredentials
                                                                  OriginalFilenameDihzehtreof.resources.dll

                                                                  Network Behavior

                                                                  No network behavior found

                                                                  Code Manipulations

                                                                  Statistics

                                                                  System Behavior

                                                                  General

                                                                  Start time:21:06:20
                                                                  Start date:14/07/2021
                                                                  Path:C:\Users\user\Desktop\6ZV65nCMYQ.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:'C:\Users\user\Desktop\6ZV65nCMYQ.exe'
                                                                  Imagebase:0x10000000
                                                                  File size:167936 bytes
                                                                  MD5 hash:622F4AA2D5E82438F3A40A35AB4902D5
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Yara matches:
                                                                  • Rule: JoeSecurity_Dridex_1, Description: Yara detected Dridex unpacked file, Source: 00000000.00000002.1172561248.0000000010001000.00000020.00020000.sdmp, Author: Joe Security
                                                                  Reputation:low

                                                                  Disassembly

                                                                  Code Analysis

                                                                  Reset < >