Loading ...

Play interactive tourEdit tour

Windows Analysis Report 0G0AO3HYEI

Overview

General Information

Sample Name:0G0AO3HYEI (renamed file extension from none to dll)
Analysis ID:492188
MD5:c50f692a715db805e68e9655ff6a9ab2
SHA1:229b257301ed99d518364afd22c4276daa5b3d20
SHA256:ff3aa75e4d4637599d3e97fb8b42ce8a1254425f856671ae56377df2676b1033
Tags:Dridexexe
Infos:

Most interesting Screenshot:

Detection

Dridex
Score:72
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Yara detected Dridex unpacked file
Multi AV Scanner detection for submitted file
Queues an APC in another process (thread injection)
PE file has nameless sections
Potential time zone aware malware
Uses Windows timers to delay execution
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
PE file contains sections with non-standard names
Queries the installation date of Windows
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to call native functions
PE file contains executable resources (Code or Archives)
Program does not show much activity (idle)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
PE file contains an invalid checksum
PE file contains strange resources
PE file contains more sections than normal
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

Process Tree

  • System is w10x64
  • loaddll64.exe (PID: 6488 cmdline: loaddll64.exe 'C:\Users\user\Desktop\0G0AO3HYEI.dll' MD5: A84133CCB118CF35D49A423CD836D0EF)
    • cmd.exe (PID: 6512 cmdline: cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\0G0AO3HYEI.dll',#1 MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
      • rundll32.exe (PID: 6532 cmdline: rundll32.exe 'C:\Users\user\Desktop\0G0AO3HYEI.dll',#1 MD5: 73C519F050C20580F8A62C849D49215A)
        • explorer.exe (PID: 3292 cmdline: C:\Windows\Explorer.EXE MD5: AD5296B280E8F522A8A897C96BAB0E1D)
    • rundll32.exe (PID: 6520 cmdline: rundll32.exe C:\Users\user\Desktop\0G0AO3HYEI.dll,CheckDriverSoftwareDependenciesSatisfied MD5: 73C519F050C20580F8A62C849D49215A)
    • rundll32.exe (PID: 6864 cmdline: rundll32.exe C:\Users\user\Desktop\0G0AO3HYEI.dll,DeviceInternetSettingUiW MD5: 73C519F050C20580F8A62C849D49215A)
    • rundll32.exe (PID: 6924 cmdline: rundll32.exe C:\Users\user\Desktop\0G0AO3HYEI.dll,DiInstallDevice MD5: 73C519F050C20580F8A62C849D49215A)
    • rundll32.exe (PID: 6940 cmdline: rundll32.exe C:\Users\user\Desktop\0G0AO3HYEI.dll,DiInstallDriverA MD5: 73C519F050C20580F8A62C849D49215A)
    • rundll32.exe (PID: 7116 cmdline: rundll32.exe C:\Users\user\Desktop\0G0AO3HYEI.dll,DiInstallDriverW MD5: 73C519F050C20580F8A62C849D49215A)
    • rundll32.exe (PID: 4604 cmdline: rundll32.exe C:\Users\user\Desktop\0G0AO3HYEI.dll,DiRollbackDriver MD5: 73C519F050C20580F8A62C849D49215A)
    • rundll32.exe (PID: 5392 cmdline: rundll32.exe C:\Users\user\Desktop\0G0AO3HYEI.dll,DiShowUpdateDevice MD5: 73C519F050C20580F8A62C849D49215A)
    • rundll32.exe (PID: 6508 cmdline: rundll32.exe C:\Users\user\Desktop\0G0AO3HYEI.dll,DiShowUpdateDriver MD5: 73C519F050C20580F8A62C849D49215A)
    • rundll32.exe (PID: 6656 cmdline: rundll32.exe C:\Users\user\Desktop\0G0AO3HYEI.dll,DiUninstallDevice MD5: 73C519F050C20580F8A62C849D49215A)
    • rundll32.exe (PID: 5636 cmdline: rundll32.exe C:\Users\user\Desktop\0G0AO3HYEI.dll,DiUninstallDriverA MD5: 73C519F050C20580F8A62C849D49215A)
    • rundll32.exe (PID: 4516 cmdline: rundll32.exe C:\Users\user\Desktop\0G0AO3HYEI.dll,DiUninstallDriverW MD5: 73C519F050C20580F8A62C849D49215A)
    • rundll32.exe (PID: 3324 cmdline: rundll32.exe C:\Users\user\Desktop\0G0AO3HYEI.dll,GetInternetPolicies MD5: 73C519F050C20580F8A62C849D49215A)
    • rundll32.exe (PID: 3604 cmdline: rundll32.exe C:\Users\user\Desktop\0G0AO3HYEI.dll,InstallNewDevice MD5: 73C519F050C20580F8A62C849D49215A)
    • rundll32.exe (PID: 4912 cmdline: rundll32.exe C:\Users\user\Desktop\0G0AO3HYEI.dll,InstallSelectedDriver MD5: 73C519F050C20580F8A62C849D49215A)
    • rundll32.exe (PID: 3864 cmdline: rundll32.exe C:\Users\user\Desktop\0G0AO3HYEI.dll,InstallWindowsUpdateDriver MD5: 73C519F050C20580F8A62C849D49215A)
    • rundll32.exe (PID: 1392 cmdline: rundll32.exe C:\Users\user\Desktop\0G0AO3HYEI.dll,InstallWindowsUpdateDriverEx MD5: 73C519F050C20580F8A62C849D49215A)
    • rundll32.exe (PID: 6568 cmdline: rundll32.exe C:\Users\user\Desktop\0G0AO3HYEI.dll,InstallWindowsUpdateDrivers MD5: 73C519F050C20580F8A62C849D49215A)
  • explorer.exe (PID: 7024 cmdline: explorer.exe MD5: AD5296B280E8F522A8A897C96BAB0E1D)
  • explorer.exe (PID: 4932 cmdline: explorer.exe MD5: AD5296B280E8F522A8A897C96BAB0E1D)
  • explorer.exe (PID: 4628 cmdline: explorer.exe MD5: AD5296B280E8F522A8A897C96BAB0E1D)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000011.00000002.531717710.0000000140001000.00000020.00020000.sdmpJoeSecurity_Dridex_2Yara detected Dridex unpacked fileJoe Security
    00000025.00000002.532357019.0000000140001000.00000020.00020000.sdmpJoeSecurity_Dridex_2Yara detected Dridex unpacked fileJoe Security
      00000015.00000002.531718093.0000000140001000.00000020.00020000.sdmpJoeSecurity_Dridex_2Yara detected Dridex unpacked fileJoe Security
        00000009.00000002.531527593.0000000140001000.00000020.00020000.sdmpJoeSecurity_Dridex_2Yara detected Dridex unpacked fileJoe Security
          00000014.00000002.531894805.0000000140001000.00000020.00020000.sdmpJoeSecurity_Dridex_2Yara detected Dridex unpacked fileJoe Security
            Click to see the 14 entries

            Sigma Overview

            No Sigma rule has matched

            Jbx Signature Overview

            Click to jump to signature section

            Show All Signature Results

            AV Detection:

            barindex
            Multi AV Scanner detection for submitted fileShow sources
            Source: 0G0AO3HYEI.dllVirustotal: Detection: 58%Perma Link
            Source: 0G0AO3HYEI.dllReversingLabs: Detection: 62%
            Source: 0G0AO3HYEI.dllStatic PE information: TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
            Source: Binary string: ntdll.pdb source: loaddll64.exe, 00000001.00000003.411800362.0000000180000000.00000004.00000001.sdmp, rundll32.exe, 00000003.00000003.256715020.0000000180000000.00000004.00000001.sdmp, rundll32.exe, 00000004.00000003.256417536.0000000180000000.00000004.00000001.sdmp, rundll32.exe, 00000008.00000003.263803630.0000000180000000.00000004.00000001.sdmp, rundll32.exe, 00000009.00000003.271733095.0000000180000000.00000004.00000001.sdmp, rundll32.exe, 0000000A.00000003.279171463.0000000180000000.00000004.00000001.sdmp, rundll32.exe, 0000000E.00000003.288178811.0000000180000000.00000004.00000001.sdmp, rundll32.exe, 00000011.00000003.295451294.0000000180000000.00000004.00000001.sdmp, rundll32.exe, 00000014.00000003.303409299.0000000180000000.00000004.00000001.sdmp, rundll32.exe, 00000015.00000003.310728417.0000000180000000.00000004.00000001.sdmp, rundll32.exe, 00000018.00000003.318939594.0000000180000000.00000004.00000001.sdmp, rundll32.exe, 0000001A.00000003.328403002.0000000180000000.00000004.00000001.sdmp, rundll32.exe, 0000001C.00000003.335755306.0000000180000000.00000004.00000001.sdmp, rundll32.exe, 0000001E.00000003.343665130.0000000180000000.00000004.00000001.sdmp, rundll32.exe, 0000001F.00000003.352054462.0000000180000000.00000004.00000001.sdmp, rundll32.exe, 00000021.00000003.359110630.0000000180000000.00000004.00000001.sdmp
            Source: Binary string: ntdll.pdbUGP source: loaddll64.exe, 00000001.00000003.411800362.0000000180000000.00000004.00000001.sdmp, rundll32.exe, 00000003.00000003.256715020.0000000180000000.00000004.00000001.sdmp, rundll32.exe, 00000004.00000003.256417536.0000000180000000.00000004.00000001.sdmp, rundll32.exe, 00000008.00000003.263803630.0000000180000000.00000004.00000001.sdmp, rundll32.exe, 00000009.00000003.271733095.0000000180000000.00000004.00000001.sdmp, rundll32.exe, 0000000A.00000003.279171463.0000000180000000.00000004.00000001.sdmp, rundll32.exe, 0000000E.00000003.288178811.0000000180000000.00000004.00000001.sdmp, rundll32.exe, 00000011.00000003.295451294.0000000180000000.00000004.00000001.sdmp, rundll32.exe, 00000014.00000003.303409299.0000000180000000.00000004.00000001.sdmp, rundll32.exe, 00000015.00000003.310728417.0000000180000000.00000004.00000001.sdmp, rundll32.exe, 00000018.00000003.318939594.0000000180000000.00000004.00000001.sdmp, rundll32.exe, 0000001A.00000003.328403002.0000000180000000.00000004.00000001.sdmp, rundll32.exe, 0000001C.00000003.335755306.0000000180000000.00000004.00000001.sdmp, rundll32.exe, 0000001E.00000003.343665130.0000000180000000.00000004.00000001.sdmp, rundll32.exe, 0000001F.00000003.352054462.0000000180000000.00000004.00000001.sdmp, rundll32.exe, 00000021.00000003.359110630.0000000180000000.00000004.00000001.sdmp
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014004FBF8 FindFirstFileExW,
            Source: explorer.exe, 00000006.00000000.280007192.0000000006870000.00000004.00000001.sdmpString found in binary or memory: http://www.autoitscript.com/autoit3/J

            E-Banking Fraud:

            barindex
            Yara detected Dridex unpacked fileShow sources
            Source: Yara matchFile source: 00000011.00000002.531717710.0000000140001000.00000020.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000025.00000002.532357019.0000000140001000.00000020.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000015.00000002.531718093.0000000140001000.00000020.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000002.531527593.0000000140001000.00000020.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000014.00000002.531894805.0000000140001000.00000020.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000022.00000002.533238918.0000000140001000.00000020.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.531244676.0000000140001000.00000020.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001C.00000002.532059437.0000000140001000.00000020.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.531418646.0000000140001000.00000020.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000021.00000002.532290767.0000000140001000.00000020.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000E.00000002.531716160.0000000140001000.00000020.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001E.00000002.532228237.0000000140001000.00000020.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.531206986.0000000140001000.00000020.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.531295536.0000000140001000.00000020.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000A.00000002.531585014.0000000140001000.00000020.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000028.00000002.532418928.0000000140001000.00000020.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000018.00000002.531937010.0000000140001000.00000020.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001A.00000002.531718874.0000000140001000.00000020.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001F.00000002.532276672.0000000140001000.00000020.00020000.sdmp, type: MEMORY

            System Summary:

            barindex
            PE file has nameless sectionsShow sources
            Source: 0G0AO3HYEI.dllStatic PE information: section name:
            Source: 0G0AO3HYEI.dllStatic PE information: section name:
            Source: 0G0AO3HYEI.dllStatic PE information: section name:
            Source: 0G0AO3HYEI.dllStatic PE information: section name:
            Source: 0G0AO3HYEI.dllStatic PE information: section name:
            Source: 0G0AO3HYEI.dllStatic PE information: section name:
            Source: 0G0AO3HYEI.dllStatic PE information: section name:
            Source: 0G0AO3HYEI.dllStatic PE information: section name:
            Source: 0G0AO3HYEI.dllStatic PE information: section name:
            Source: 0G0AO3HYEI.dllStatic PE information: section name:
            Source: 0G0AO3HYEI.dllStatic PE information: section name:
            Source: 0G0AO3HYEI.dllStatic PE information: section name:
            Source: 0G0AO3HYEI.dllStatic PE information: section name:
            Source: 0G0AO3HYEI.dllStatic PE information: section name:
            Source: 0G0AO3HYEI.dllStatic PE information: section name:
            Source: 0G0AO3HYEI.dllStatic PE information: section name:
            Source: 0G0AO3HYEI.dllStatic PE information: section name:
            Source: 0G0AO3HYEI.dllStatic PE information: section name:
            Source: 0G0AO3HYEI.dllStatic PE information: section name:
            Source: 0G0AO3HYEI.dllStatic PE information: section name:
            Source: 0G0AO3HYEI.dllStatic PE information: section name:
            Source: 0G0AO3HYEI.dllStatic PE information: section name:
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400421C8
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400431CC
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400504E4
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014003A688
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014004271C
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400447B8
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140027954
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140053AF0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140045BE0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014004ED58
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140026FF0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140019054
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014001C05C
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140005078
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140053094
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400330C4
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014003B0C8
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400380D0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014003F0FC
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140063102
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140052110
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014001311C
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140001154
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400311B0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400021C8
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400231DC
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014006D1F0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140032214
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014002A214
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014002E228
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140035268
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140046264
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140069278
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014002F278
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014004B288
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140068292
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400362A0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400172A8
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014001E2E4
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140029320
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014000732C
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014002C348
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140038424
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014006B428
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014005343C
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014005B470
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014004F4C8
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014001B52C
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140026540
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140044584
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140061598
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014004759C
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400215FC
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140051620
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140032648
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140053644
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140067663
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014001A66C
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014003C6B0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014001D6C4
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400356F4
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014004F708
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140024718
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014001276C
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014000F76C
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140056790
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400557DC
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140057820
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014003E8E0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400258FC
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014005C8FC
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014006D904
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140005918
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140020924
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140068928
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140031928
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140019928
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140024940
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014002D95C
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140032964
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014005497C
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140033984
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400479E0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014002CA14
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014006BA1C
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140002A20
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140026A24
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014002AA90
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140005AB8
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014001CAC8
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014006AAD8
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140024AEC
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140041AF4
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014002BB18
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014000EB3C
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140014B68
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140001B74
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014002AB7A
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014002AB7F
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014002AB84
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140006B88
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014002AB89
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014002AB8E
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014002AB93
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014002AB98
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014002AB9D
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014002ABA2
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014002ABA7
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014001DBB8
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014000BBC4
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140003BE0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140034BF8
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140050BF4
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140016BFC
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014005ABFC
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140036C08
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140029C1C
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140026C30
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014003CC38
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140035C80
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140022C84
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140032CC8
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014004CCD4
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014003BCE4
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140015D04
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014001AD0C
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140037D24
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014001CD24
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014005CD24
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014001FD44
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140052D60
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014000AD5C
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014003DDA4
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140050DA8
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014005CDAB
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140030DC0
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140051DE4
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140018DE8
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014006BE28
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140006E34
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014002AE48
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140068E58
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014001EE68
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140004E68
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014000CEAC
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140011EB4
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140014EBC
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140013ED4
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140057FA8
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014005CFCA
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140047FCC
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140025FD4
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400455F8 NtAllocateVirtualMemory,
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140059688 NtTerminateProcess,
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014004386C NtDelayExecution,
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140049CF8 NtClose,
            Source: 0G0AO3HYEI.dllStatic PE information: Resource name: RT_VERSION type: COM executable for DOS
            Source: 0G0AO3HYEI.dllStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: 0G0AO3HYEI.dllStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: 0G0AO3HYEI.dllStatic PE information: Number of sections : 28 > 10
            Source: 0G0AO3HYEI.dllStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: 0G0AO3HYEI.dllVirustotal: Detection: 58%
            Source: 0G0AO3HYEI.dllReversingLabs: Detection: 62%
            Source: 0G0AO3HYEI.dllStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: C:\Windows\System32\loaddll64.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
            Source: unknownProcess created: C:\Windows\System32\loaddll64.exe loaddll64.exe 'C:\Users\user\Desktop\0G0AO3HYEI.dll'
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\0G0AO3HYEI.dll',#1
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\0G0AO3HYEI.dll,CheckDriverSoftwareDependenciesSatisfied
            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\0G0AO3HYEI.dll',#1
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\0G0AO3HYEI.dll,DeviceInternetSettingUiW
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\0G0AO3HYEI.dll,DiInstallDevice
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\0G0AO3HYEI.dll,DiInstallDriverA
            Source: unknownProcess created: C:\Windows\explorer.exe explorer.exe
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\0G0AO3HYEI.dll,DiInstallDriverW
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\0G0AO3HYEI.dll,DiRollbackDriver
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\0G0AO3HYEI.dll,DiShowUpdateDevice
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\0G0AO3HYEI.dll,DiShowUpdateDriver
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\0G0AO3HYEI.dll,DiUninstallDevice
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\0G0AO3HYEI.dll,DiUninstallDriverA
            Source: unknownProcess created: C:\Windows\explorer.exe explorer.exe
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\0G0AO3HYEI.dll,DiUninstallDriverW
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\0G0AO3HYEI.dll,GetInternetPolicies
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\0G0AO3HYEI.dll,InstallNewDevice
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\0G0AO3HYEI.dll,InstallSelectedDriver
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\0G0AO3HYEI.dll,InstallWindowsUpdateDriver
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\0G0AO3HYEI.dll,InstallWindowsUpdateDriverEx
            Source: unknownProcess created: C:\Windows\explorer.exe explorer.exe
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\0G0AO3HYEI.dll,InstallWindowsUpdateDrivers
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\0G0AO3HYEI.dll',#1
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\0G0AO3HYEI.dll,CheckDriverSoftwareDependenciesSatisfied
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\0G0AO3HYEI.dll,DeviceInternetSettingUiW
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\0G0AO3HYEI.dll,DiInstallDevice
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\0G0AO3HYEI.dll,DiInstallDriverA
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\0G0AO3HYEI.dll,DiInstallDriverW
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\0G0AO3HYEI.dll,DiRollbackDriver
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\0G0AO3HYEI.dll,DiShowUpdateDevice
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\0G0AO3HYEI.dll,DiShowUpdateDriver
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\0G0AO3HYEI.dll,DiUninstallDevice
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\0G0AO3HYEI.dll,DiUninstallDriverA
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\0G0AO3HYEI.dll,DiUninstallDriverW
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\0G0AO3HYEI.dll,GetInternetPolicies
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\0G0AO3HYEI.dll,InstallNewDevice
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\0G0AO3HYEI.dll,InstallSelectedDriver
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\0G0AO3HYEI.dll,InstallWindowsUpdateDriver
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\0G0AO3HYEI.dll,InstallWindowsUpdateDriverEx
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\0G0AO3HYEI.dll,InstallWindowsUpdateDrivers
            Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknown
            Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknown
            Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknown
            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\0G0AO3HYEI.dll',#1
            Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{660b90c8-73a9-4b58-8cae-355b7f55341b}\InProcServer32
            Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Caches\{3DA71D5A-20CC-432F-A115-DFE92379E91F}.3.ver0x0000000000000015.dbJump to behavior
            Source: classification engineClassification label: mal72.troj.evad.winDLL@45/0@0/0
            Source: C:\Windows\explorer.exeFile read: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.iniJump to behavior
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\0G0AO3HYEI.dll,CheckDriverSoftwareDependenciesSatisfied
            Source: unknownProcess created: C:\Windows\explorer.exe
            Source: unknownProcess created: C:\Windows\explorer.exe
            Source: unknownProcess created: C:\Windows\explorer.exe
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: 0G0AO3HYEI.dllStatic PE information: Image base 0x140000000 > 0x60000000
            Source: 0G0AO3HYEI.dllStatic file information: File size 1110016 > 1048576
            Source: 0G0AO3HYEI.dllStatic PE information: section name: RT_CURSOR
            Source: 0G0AO3HYEI.dllStatic PE information: section name: RT_BITMAP
            Source: 0G0AO3HYEI.dllStatic PE information: section name: RT_ICON
            Source: 0G0AO3HYEI.dllStatic PE information: section name: RT_MENU
            Source: 0G0AO3HYEI.dllStatic PE information: section name: RT_DIALOG
            Source: 0G0AO3HYEI.dllStatic PE information: section name: RT_STRING
            Source: 0G0AO3HYEI.dllStatic PE information: section name: RT_ACCELERATOR
            Source: 0G0AO3HYEI.dllStatic PE information: section name: RT_GROUP_ICON
            Source: 0G0AO3HYEI.dllStatic PE information: TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
            Source: 0G0AO3HYEI.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
            Source: Binary string: ntdll.pdb source: loaddll64.exe, 00000001.00000003.411800362.0000000180000000.00000004.00000001.sdmp, rundll32.exe, 00000003.00000003.256715020.0000000180000000.00000004.00000001.sdmp, rundll32.exe, 00000004.00000003.256417536.0000000180000000.00000004.00000001.sdmp, rundll32.exe, 00000008.00000003.263803630.0000000180000000.00000004.00000001.sdmp, rundll32.exe, 00000009.00000003.271733095.0000000180000000.00000004.00000001.sdmp, rundll32.exe, 0000000A.00000003.279171463.0000000180000000.00000004.00000001.sdmp, rundll32.exe, 0000000E.00000003.288178811.0000000180000000.00000004.00000001.sdmp, rundll32.exe, 00000011.00000003.295451294.0000000180000000.00000004.00000001.sdmp, rundll32.exe, 00000014.00000003.303409299.0000000180000000.00000004.00000001.sdmp, rundll32.exe, 00000015.00000003.310728417.0000000180000000.00000004.00000001.sdmp, rundll32.exe, 00000018.00000003.318939594.0000000180000000.00000004.00000001.sdmp, rundll32.exe, 0000001A.00000003.328403002.0000000180000000.00000004.00000001.sdmp, rundll32.exe, 0000001C.00000003.335755306.0000000180000000.00000004.00000001.sdmp, rundll32.exe, 0000001E.00000003.343665130.0000000180000000.00000004.00000001.sdmp, rundll32.exe, 0000001F.00000003.352054462.0000000180000000.00000004.00000001.sdmp, rundll32.exe, 00000021.00000003.359110630.0000000180000000.00000004.00000001.sdmp
            Source: Binary string: ntdll.pdbUGP source: loaddll64.exe, 00000001.00000003.411800362.0000000180000000.00000004.00000001.sdmp, rundll32.exe, 00000003.00000003.256715020.0000000180000000.00000004.00000001.sdmp, rundll32.exe, 00000004.00000003.256417536.0000000180000000.00000004.00000001.sdmp, rundll32.exe, 00000008.00000003.263803630.0000000180000000.00000004.00000001.sdmp, rundll32.exe, 00000009.00000003.271733095.0000000180000000.00000004.00000001.sdmp, rundll32.exe, 0000000A.00000003.279171463.0000000180000000.00000004.00000001.sdmp, rundll32.exe, 0000000E.00000003.288178811.0000000180000000.00000004.00000001.sdmp, rundll32.exe, 00000011.00000003.295451294.0000000180000000.00000004.00000001.sdmp, rundll32.exe, 00000014.00000003.303409299.0000000180000000.00000004.00000001.sdmp, rundll32.exe, 00000015.00000003.310728417.0000000180000000.00000004.00000001.sdmp, rundll32.exe, 00000018.00000003.318939594.0000000180000000.00000004.00000001.sdmp, rundll32.exe, 0000001A.00000003.328403002.0000000180000000.00000004.00000001.sdmp, rundll32.exe, 0000001C.00000003.335755306.0000000180000000.00000004.00000001.sdmp, rundll32.exe, 0000001E.00000003.343665130.0000000180000000.00000004.00000001.sdmp, rundll32.exe, 0000001F.00000003.352054462.0000000180000000.00000004.00000001.sdmp, rundll32.exe, 00000021.00000003.359110630.0000000180000000.00000004.00000001.sdmp
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014006E5C9 push 00000031h; retf
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014006E6A4 push rsp; retf
            Source: 0G0AO3HYEI.dllStatic PE information: section name:
            Source: 0G0AO3HYEI.dllStatic PE information: section name:
            Source: 0G0AO3HYEI.dllStatic PE information: section name:
            Source: 0G0AO3HYEI.dllStatic PE information: section name:
            Source: 0G0AO3HYEI.dllStatic PE information: section name:
            Source: 0G0AO3HYEI.dllStatic PE information: section name:
            Source: 0G0AO3HYEI.dllStatic PE information: section name:
            Source: 0G0AO3HYEI.dllStatic PE information: section name:
            Source: 0G0AO3HYEI.dllStatic PE information: section name:
            Source: 0G0AO3HYEI.dllStatic PE information: section name:
            Source: 0G0AO3HYEI.dllStatic PE information: section name:
            Source: 0G0AO3HYEI.dllStatic PE information: section name:
            Source: 0G0AO3HYEI.dllStatic PE information: section name:
            Source: 0G0AO3HYEI.dllStatic PE information: section name:
            Source: 0G0AO3HYEI.dllStatic PE information: section name:
            Source: 0G0AO3HYEI.dllStatic PE information: section name:
            Source: 0G0AO3HYEI.dllStatic PE information: section name:
            Source: 0G0AO3HYEI.dllStatic PE information: section name:
            Source: 0G0AO3HYEI.dllStatic PE information: section name:
            Source: 0G0AO3HYEI.dllStatic PE information: section name:
            Source: 0G0AO3HYEI.dllStatic PE information: section name:
            Source: 0G0AO3HYEI.dllStatic PE information: section name:
            Source: 0G0AO3HYEI.dllStatic PE information: real checksum: 0x70461819 should be: 0x11e8a9
            Source: initial sampleStatic PE information: section name: .text entropy: 7.84727441246
            Source: C:\Windows\explorer.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
            Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX

            Malware Analysis System Evasion:

            barindex
            Potential time zone aware malwareShow sources
            Source: C:\Windows\explorer.exeSystem information queried: CurrentTimeZoneInformation
            Source: C:\Windows\explorer.exeSystem information queried: CurrentTimeZoneInformation
            Source: C:\Windows\explorer.exeSystem information queried: CurrentTimeZoneInformation
            Uses Windows timers to delay executionShow sources
            Source: C:\Windows\explorer.exeUser Timer Set: Timeout: 500ms
            Source: C:\Windows\System32\loaddll64.exe TID: 6492Thread sleep time: -60000s >= -30000s
            Source: C:\Windows\System32\loaddll64.exe TID: 6492Thread sleep count: 232 > 30
            Source: C:\Windows\System32\rundll32.exeLast function: Thread delayed
            Source: C:\Windows\System32\rundll32.exeLast function: Thread delayed
            Source: C:\Windows\System32\rundll32.exeLast function: Thread delayed
            Source: C:\Windows\System32\rundll32.exeLast function: Thread delayed
            Source: C:\Windows\System32\rundll32.exeLast function: Thread delayed
            Source: C:\Windows\System32\rundll32.exeLast function: Thread delayed
            Source: C:\Windows\System32\rundll32.exeLast function: Thread delayed
            Source: C:\Windows\System32\rundll32.exeLast function: Thread delayed
            Source: C:\Windows\System32\rundll32.exeLast function: Thread delayed
            Source: C:\Windows\System32\rundll32.exeLast function: Thread delayed
            Source: C:\Windows\System32\rundll32.exeLast function: Thread delayed
            Source: C:\Windows\System32\rundll32.exeLast function: Thread delayed
            Source: C:\Windows\System32\rundll32.exeLast function: Thread delayed
            Source: C:\Windows\System32\rundll32.exeLast function: Thread delayed
            Source: C:\Windows\System32\rundll32.exeLast function: Thread delayed
            Source: C:\Windows\System32\rundll32.exeLast function: Thread delayed
            Source: C:\Windows\System32\rundll32.exeLast function: Thread delayed
            Source: C:\Windows\System32\rundll32.exeLast function: Thread delayed
            Source: C:\Windows\System32\rundll32.exeLast function: Thread delayed
            Source: C:\Windows\System32\rundll32.exeLast function: Thread delayed
            Source: C:\Windows\System32\rundll32.exeLast function: Thread delayed
            Source: C:\Windows\System32\rundll32.exeLast function: Thread delayed
            Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
            Source: C:\Windows\System32\rundll32.exeWindow / User API: threadDelayed 648
            Source: C:\Windows\System32\rundll32.exeWindow / User API: threadDelayed 412
            Source: C:\Windows\System32\rundll32.exeWindow / User API: threadDelayed 388
            Source: C:\Windows\System32\rundll32.exeWindow / User API: threadDelayed 599
            Source: C:\Windows\System32\rundll32.exeWindow / User API: threadDelayed 633
            Source: C:\Windows\System32\rundll32.exeWindow / User API: threadDelayed 585
            Source: C:\Windows\System32\rundll32.exeWindow / User API: threadDelayed 566
            Source: C:\Windows\System32\rundll32.exeWindow / User API: threadDelayed 400
            Source: C:\Windows\System32\rundll32.exeWindow / User API: threadDelayed 490
            Source: C:\Windows\System32\rundll32.exeWindow / User API: threadDelayed 390
            Source: C:\Windows\System32\rundll32.exeWindow / User API: threadDelayed 399
            Source: C:\Windows\System32\loaddll64.exeProcess information queried: ProcessInformation
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400447B8 GetTokenInformation,GetTokenInformation,GetSystemInfo,
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014004FBF8 FindFirstFileExW,
            Source: explorer.exe, 00000006.00000000.266283482.0000000008A32000.00000004.00000001.sdmpBinary or memory string: VMware SATA CD00dRom0
            Source: explorer.exe, 00000006.00000000.266283482.0000000008A32000.00000004.00000001.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&000000
            Source: explorer.exe, 0000000C.00000000.307251989.000000000054D000.00000004.00000020.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\5&280B647&0&000000V
            Source: explorer.exe, 00000006.00000000.269976007.000000000EE70000.00000004.00000001.sdmpBinary or memory string: 0000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
            Source: explorer.exe, 00000006.00000000.266555490.0000000008B88000.00000004.00000001.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
            Source: explorer.exe, 00000006.00000000.266555490.0000000008B88000.00000004.00000001.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}e
            Source: explorer.exe, 00000006.00000000.261140112.00000000048E0000.00000004.00000001.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
            Source: explorer.exe, 00000006.00000000.266971589.0000000008C73000.00000004.00000001.sdmpBinary or memory string: 0ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&
            Source: explorer.exe, 00000006.00000000.266399504.0000000008ACF000.00000004.00000001.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&000000Datc
            Source: explorer.exe, 00000006.00000000.266555490.0000000008B88000.00000004.00000001.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}C
            Source: explorer.exe, 00000006.00000000.269976007.000000000EE70000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}||
            Source: explorer.exe, 0000001B.00000000.343461857.00000000010A9000.00000004.00000020.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\5&280B647&0&000000
            Source: explorer.exe, 0000001B.00000000.343461857.00000000010A9000.00000004.00000020.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}_3
            Source: explorer.exe, 00000006.00000000.280701146.00000000069DA000.00000004.00000001.sdmpBinary or memory string: VMware SATA CD002
            Source: explorer.exe, 0000000C.00000000.307214159.0000000000538000.00000004.00000020.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}k
            Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400421C8 LdrLoadDll,
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140045800 RtlAddVectoredExceptionHandler,

            HIPS / PFW / Operating System Protection Evasion:

            barindex
            Queues an APC in another process (thread injection)Show sources
            Source: C:\Windows\System32\rundll32.exeThread APC queued: target process: C:\Windows\explorer.exe
            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\0G0AO3HYEI.dll',#1
            Source: explorer.exe, 00000006.00000000.260396404.0000000001400000.00000002.00020000.sdmpBinary or memory string: uProgram Manager
            Source: rundll32.exe, 00000004.00000002.537719544.0000028680000000.00000002.00020000.sdmp, explorer.exe, 00000006.00000000.279867449.0000000005F40000.00000004.00000001.sdmp, explorer.exe, 0000000C.00000000.307798770.0000000000BD0000.00000002.00020000.sdmp, explorer.exe, 0000001B.00000000.352492281.0000000004A10000.00000004.00000001.sdmpBinary or memory string: Shell_TrayWnd
            Source: rundll32.exe, 00000004.00000002.537719544.0000028680000000.00000002.00020000.sdmp, explorer.exe, 00000006.00000000.260396404.0000000001400000.00000002.00020000.sdmp, explorer.exe, 0000000C.00000000.307798770.0000000000BD0000.00000002.00020000.sdmp, explorer.exe, 0000001B.00000000.354870844.0000000005570000.00000004.00000001.sdmpBinary or memory string: Progman
            Source: rundll32.exe, 00000004.00000002.537719544.0000028680000000.00000002.00020000.sdmpBinary or memory string: Program Manager"
            Source: explorer.exe, 0000001B.00000000.347528150.00000000017E0000.00000002.00020000.sdmpBinary or memory string: Program Manager/
            Source: explorer.exe, 0000000C.00000000.307251989.000000000054D000.00000004.00000020.sdmpBinary or memory string: ProgmanG
            Source: explorer.exe, 0000001B.00000000.343461857.00000000010A9000.00000004.00000020.sdmpBinary or memory string: Progman~D
            Source: rundll32.exe, 00000004.00000002.537719544.0000028680000000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWndStart
            Source: rundll32.exe, 00000004.00000002.537719544.0000028680000000.00000002.00020000.sdmp, explorer.exe, 00000006.00000000.260396404.0000000001400000.00000002.00020000.sdmp, explorer.exe, 0000000C.00000000.307798770.0000000000BD0000.00000002.00020000.sdmp, explorer.exe, 0000001B.00000000.347528150.00000000017E0000.00000002.00020000.sdmpBinary or memory string: Progmanlock
            Source: explorer.exe, 00000006.00000000.259975951.0000000000EB8000.00000004.00000020.sdmpBinary or memory string: ProgmanX
            Source: explorer.exe, 0000000C.00000000.307798770.0000000000BD0000.00000002.00020000.sdmpBinary or memory string: OProgram Manager
            Source: explorer.exe, 00000006.00000000.266399504.0000000008ACF000.00000004.00000001.sdmpBinary or memory string: Shell_TrayWndAj
            Source: explorer.exe, 0000001B.00000003.350412249.0000000004AD4000.00000004.00000001.sdmpBinary or memory string: Progman#Y
            Source: explorer.exe, 0000000C.00000000.309606315.0000000004677000.00000004.00000001.sdmpBinary or memory string: Progmanllw{v
            Source: C:\Windows\System32\loaddll64.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion InstallDate
            Source: C:\Windows\System32\loaddll64.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
            Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140043FF0 GetUserNameW,

            Mitre Att&ck Matrix

            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            Valid AccountsWindows Management InstrumentationPath InterceptionProcess Injection112Masquerading1OS Credential DumpingSystem Time Discovery1Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
            Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsVirtualization/Sandbox Evasion11LSASS MemoryQuery Registry1Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Process Injection112Security Account ManagerSecurity Software Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
            Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Obfuscated Files or Information2NTDSVirtualization/Sandbox Evasion11Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
            Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptRundll321LSA SecretsProcess Discovery2SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
            Replication Through Removable MediaLaunchdRc.commonRc.commonSoftware Packing2Cached Domain CredentialsApplication Window Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
            External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSyncAccount Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
            Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc FilesystemSystem Owner/User Discovery1Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
            Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Masquerading/etc/passwd and /etc/shadowFile and Directory Discovery2Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
            Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)Invalid Code SignatureNetwork SniffingSystem Information Discovery13Taint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact

            Behavior Graph

            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 signatures2 2 Behavior Graph ID: 492188 Sample: 0G0AO3HYEI Startdate: 28/09/2021 Architecture: WINDOWS Score: 72 30 Multi AV Scanner detection for submitted file 2->30 32 Yara detected Dridex unpacked file 2->32 34 PE file has nameless sections 2->34 8 loaddll64.exe 1 2->8         started        10 explorer.exe 2->10         started        13 explorer.exe 124 2->13         started        15 explorer.exe 2->15         started        process3 signatures4 17 cmd.exe 1 8->17         started        19 rundll32.exe 8->19         started        21 rundll32.exe 8->21         started        23 15 other processes 8->23 38 Uses Windows timers to delay execution 10->38 40 Potential time zone aware malware 10->40 process5 process6 25 rundll32.exe 17->25         started        signatures7 36 Queues an APC in another process (thread injection) 25->36 28 explorer.exe 25->28 injected process8

            Screenshots

            Thumbnails

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.

            windows-stand

            Antivirus, Machine Learning and Genetic Malware Detection

            Initial Sample

            SourceDetectionScannerLabelLink
            0G0AO3HYEI.dll59%VirustotalBrowse
            0G0AO3HYEI.dll62%ReversingLabsWin64.Trojan.Injexa

            Dropped Files

            No Antivirus matches

            Unpacked PE Files

            No Antivirus matches

            Domains

            No Antivirus matches

            URLs

            No Antivirus matches

            Domains and IPs

            Contacted Domains

            No contacted domains info

            URLs from Memory and Binaries

            NameSourceMaliciousAntivirus DetectionReputation
            http://www.autoitscript.com/autoit3/Jexplorer.exe, 00000006.00000000.280007192.0000000006870000.00000004.00000001.sdmpfalse
              high

              Contacted IPs

              No contacted IP infos

              General Information

              Joe Sandbox Version:33.0.0 White Diamond
              Analysis ID:492188
              Start date:28.09.2021
              Start time:13:03:29
              Joe Sandbox Product:CloudBasic
              Overall analysis duration:0h 12m 36s
              Hypervisor based Inspection enabled:false
              Report type:light
              Sample file name:0G0AO3HYEI (renamed file extension from none to dll)
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
              Number of analysed new started processes analysed:40
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • HDC enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Detection:MAL
              Classification:mal72.troj.evad.winDLL@45/0@0/0
              EGA Information:Failed
              HDC Information:
              • Successful, ratio: 17.7% (good quality ratio 15.7%)
              • Quality average: 82.8%
              • Quality standard deviation: 33.1%
              HCA Information:Failed
              Cookbook Comments:
              • Adjust boot time
              • Enable AMSI
              Warnings:
              Show All
              • Exclude process from analysis (whitelisted): SearchUI.exe, BackgroundTransferHost.exe, ShellExperienceHost.exe, SgrmBroker.exe, backgroundTaskHost.exe, svchost.exe
              • Excluded IPs from analysis (whitelisted): 23.211.6.115, 23.211.4.86, 20.50.102.62, 173.222.108.210, 173.222.108.226, 20.199.120.85, 20.199.120.151, 80.67.82.235, 80.67.82.211, 204.79.197.200, 13.107.21.200, 20.54.110.249, 40.112.88.60, 131.253.33.200, 13.107.22.200
              • Excluded domains from analysis (whitelisted): store-images.s-microsoft.com-c.edgekey.net, a767.dspw65.akamai.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, e12564.dspb.akamaiedge.net, wns.notify.trafficmanager.net, consumer-displaycatalogrp-aks2aks-europe.md.mp.microsoft.com.akadns.net, www-bing-com.dual-a-0001.a-msedge.net, arc.trafficmanager.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, www.bing.com, client.wns.windows.com, fs.microsoft.com, dual-a-0001.a-msedge.net, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, wu-shim.trafficmanager.net, neu-displaycatalogrp.useroor.bigcatalog.commerce.microsoft.com, ris-prod.trafficmanager.net, asf-ris-prod-neu.northeurope.cloudapp.azure.com, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, iris-de-prod-azsc-uks.uksouth.cloudapp.azure.com, download.windowsupdate.com.edgesuite.net, ris.api.iris.microsoft.com, dual-a-0001.dc-msedge.net, a-0001.a-afdentry.net.trafficmanager.net, store-images.s-microsoft.com, displaycatalog-rp.md.mp.microsoft.com.akadns.net
              • Not all processes where analyzed, report is missing behavior information
              • Report size exceeded maximum capacity and may have missing behavior information.
              • Report size exceeded maximum capacity and may have missing disassembly code.
              • Report size getting too big, too many NtAllocateVirtualMemory calls found.
              • Report size getting too big, too many NtEnumerateKey calls found.
              • Report size getting too big, too many NtOpenKeyEx calls found.
              • Report size getting too big, too many NtProtectVirtualMemory calls found.
              • Report size getting too big, too many NtQueryAttributesFile calls found.
              • Report size getting too big, too many NtQueryValueKey calls found.

              Simulations

              Behavior and APIs

              TimeTypeDescription
              13:04:51API Interceptor118x Sleep call for process: explorer.exe modified

              Joe Sandbox View / Context

              IPs

              No context

              Domains

              No context

              ASN

              No context

              JA3 Fingerprints

              No context

              Dropped Files

              No context

              Created / dropped Files

              No created / dropped files found

              Static File Info

              General

              File type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
              Entropy (8bit):5.0210157653928675
              TrID:
              • Win64 Dynamic Link Library (generic) (102004/3) 86.43%
              • Win64 Executable (generic) (12005/4) 10.17%
              • Generic Win/DOS Executable (2004/3) 1.70%
              • DOS Executable Generic (2002/1) 1.70%
              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.01%
              File name:0G0AO3HYEI.dll
              File size:1110016
              MD5:c50f692a715db805e68e9655ff6a9ab2
              SHA1:229b257301ed99d518364afd22c4276daa5b3d20
              SHA256:ff3aa75e4d4637599d3e97fb8b42ce8a1254425f856671ae56377df2676b1033
              SHA512:ad74f556ccef1f8fd4a3c18a18c27adcafd2f552025bf7f83864261c6944db5423c719ea161c341e593800499c6e01aba846031e79caf1e771b2b16e7d6e33d1
              SSDEEP:12288:4dMIwS97wJs6tSKDXEabXaC+jhc1S8XXk7CZzHsZH9dq0T:SMIJxSDX3bqjhcfHk7MzH6z
              File Content Preview:MZ......................@........................................[.r.:.!.:.!.:.!..[!n;.!.:.!d:.!..8!.:.!.Br!j:.!...!N:.!.hL!>:.!(d. |;.!x.^!.:.!-d. .;.!.g. .;.!P^. .:.!.BN!.:.!.._!.;.!.._!.;.!..Y!v;.!!._!M;.!Rich.:.!....................................PE.

              File Icon

              Icon Hash:54b26869f8c8cc00

              Static PE Info

              General

              Entrypoint:0x140078760
              Entrypoint Section:.text
              Digitally signed:false
              Imagebase:0x140000000
              Subsystem:windows gui
              Image File Characteristics:EXECUTABLE_IMAGE, DLL, LARGE_ADDRESS_AWARE
              DLL Characteristics:TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
              Time Stamp:0x60ADEC84 [Wed May 26 06:36:52 2021 UTC]
              TLS Callbacks:
              CLR (.Net) Version:
              OS Version Major:5
              OS Version Minor:1
              File Version Major:5
              File Version Minor:1
              Subsystem Version Major:5
              Subsystem Version Minor:1
              Import Hash:c6b4c2eec8a93016c63563421e15f011

              Entrypoint Preview

              Instruction
              xor eax, edx
              jmp 00007F0A7CCDD11Ah
              inc ecx
              pop ecx
              dec ecx
              add ecx, 08h
              call edi
              push edi
              dec eax
              mov edi, dword ptr [00014784h]
              dec esp
              xor dword ptr [0001476Dh], ecx
              jmp 00007F0A7CCDD0F9h
              xor eax, edx
              xor eax, edx
              xor eax, edx
              xor eax, edx
              xor eax, edx
              xor eax, edx
              xor eax, edx
              xor eax, edx
              xor eax, edx
              xor eax, edx
              xor eax, edx
              xor eax, edx
              xor eax, edx
              xor eax, edx
              xor eax, edx
              xor eax, edx
              xor eax, edx
              xor eax, edx
              xor eax, edx
              xor eax, edx
              xor eax, edx
              xor eax, edx
              xor eax, edx
              xor eax, edx
              ud2
              int3
              push ebx
              push edi
              push esi
              dec eax
              sub esp, 000000D0h
              mov eax, 919AD45Fh
              inc ecx
              mov eax, eax
              mov eax, 1F739ECFh
              mov word ptr [esp+000000CEh], 804Dh
              inc esp
              mov ecx, dword ptr [esp+000000C8h]
              inc esp
              sub eax, ecx
              mov dword ptr [esp+000000C8h], eax
              dec eax
              mov dword ptr [esp+000000B0h], 0074A7F1h
              inc sp
              mov edx, dword ptr [esp+000000C4h]
              inc sp
              mov dword ptr [esp+000000C4h], edx
              dec esp
              mov ebx, dword ptr [esp+000000B0h]
              dec ebp
              sub eax, ebx
              dec esp
              mov dword ptr [esp+000000A8h], eax
              dec eax
              mov dword ptr [esp+70h], ecx
              dec eax
              mov ecx, edx
              dec eax
              mov dword ptr [esp+68h], edx
              inc sp
              mov dword ptr [esp+66h], edx

              Data Directories

              NameVirtual AddressVirtual Size Is in Section
              IMAGE_DIRECTORY_ENTRY_EXPORT0x10e0100x35d
              IMAGE_DIRECTORY_ENTRY_IMPORT0x891b00x28.rdata
              IMAGE_DIRECTORY_ENTRY_RESOURCE0x990000x2f98.rsrc
              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
              IMAGE_DIRECTORY_ENTRY_BASERELOC0x9c0000x244.reloc
              IMAGE_DIRECTORY_ENTRY_DEBUG0x7d0100x38.rdata
              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IAT0x7d0000x10.rdata
              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

              Sections

              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
              .text0x10000x7bb100x7c000False0.803878291961data7.84727441246IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
              .rdata0x7d0000xc2100xd000False0.772648737981data7.6188975428IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .data0x8a0000xd2180xe000False0.125104631696data1.89187623617IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
              .pdata0x980000x1380x1000False0.060791015625data0.590508203574IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .rsrc0x990000x2f980x3000False0.302408854167data3.73793039709IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .reloc0x9c0000x2440x1000False0.076171875data1.23641369386IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
              0x9d0000x6cd00x7000False0.00177873883929data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              0xa40000x1f2a0x2000False0.0037841796875data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              0xa60000x13e0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              0xa70000x6cd00x7000False0.00177873883929data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              0xae0000x7fd0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              0xaf0000x13e0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              0xb00000x1f70x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              0xb10000x23b0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              0xb20000x12780x2000False0.0037841796875data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              0xb40000x13e0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              0xb50000x9cd0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              0xb60000x11240x2000False0.0037841796875data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              0xb80000x23b0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              0xb90000x8960x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              0xba0000x6cd00x7000False0.00177873883929data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              0xc10000x13e0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              0xc20000x1af0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              0xc30000x451740x46000False0.0010498046875data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              0x1090000x197d0x2000False0.0037841796875data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              0x10b0000x197d0x2000False0.0037841796875data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              0x10d0000x1ee0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              0x10e0000x36d0x1000False0.1259765625data1.6701021982IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

              Resources

              NameRVASizeTypeLanguageCountry
              RT_CURSOR0x996400x134dataEnglishUnited States
              RT_BITMAP0x997780x3e8dataHebrewIsrael
              RT_BITMAP0x99b600xd8dataEnglishUnited States
              RT_BITMAP0x99c380xd8dataEnglishUnited States
              RT_ICON0x99d100x2e8dataHebrewIsrael
              RT_ICON0x99ff80x128GLS_BINARY_LSB_FIRSTHebrewIsrael
              RT_ICON0x9a1200x128GLS_BINARY_LSB_FIRSTHebrewIsrael
              RT_MENU0x9a2480x430dataEnglishUnited States
              RT_MENU0x9a6780x1a0dataEnglishUnited States
              RT_DIALOG0x9a8180xa2dataHebrewIsrael
              RT_DIALOG0x9a8c00x296dataHebrewIsrael
              RT_DIALOG0x9ab580x99adataHebrewIsrael
              RT_DIALOG0x9b4f80xfadataHebrewIsrael
              RT_STRING0x9b5f80x230dataEnglishUnited States
              RT_STRING0x9b8280x116dataEnglishUnited States
              RT_STRING0x9b9400x4cdataEnglishUnited States
              RT_STRING0x9b9900x50dataEnglishUnited States
              RT_STRING0x9b9e00xd6dataEnglishUnited States
              RT_STRING0x9bab80x2edataEnglishUnited States
              RT_STRING0x9bae80x42dataEnglishUnited States
              RT_STRING0x9bb300x6adataEnglishUnited States
              RT_STRING0x9bba00x34dataEnglishUnited States
              RT_STRING0x9bbd80x62dataEnglishUnited States
              RT_ACCELERATOR0x9bc400x48dataHebrewIsrael
              RT_GROUP_CURSOR0x9bc880x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
              RT_GROUP_ICON0x9bca00x22dataHebrewIsrael
              RT_GROUP_ICON0x9bcc80x14dataHebrewIsrael
              RT_VERSION0x9bce00x2b8COM executable for DOSHebrewIsrael

              Imports

              DLLImport
              CRYPT32.dllCryptImportPublicKeyInfo

              Exports

              NameOrdinalAddress
              CheckDriverSoftwareDependenciesSatisfied10x1400296ac
              DeviceInternetSettingUiW20x14004a758
              DiInstallDevice30x14006f114
              DiInstallDriverA40x1400097c8
              DiInstallDriverW50x1400430c8
              DiRollbackDriver60x140046938
              DiShowUpdateDevice70x14000d420
              DiShowUpdateDriver80x140043b6c
              DiUninstallDevice90x14002b514
              DiUninstallDriverA100x14001b7c0
              DiUninstallDriverW110x140059c8c
              GetInternetPolicies120x14004b8a4
              InstallNewDevice130x140038e68
              InstallSelectedDriver140x140045cac
              InstallWindowsUpdateDriver150x14002e854
              InstallWindowsUpdateDriverEx160x14005c290
              InstallWindowsUpdateDrivers170x1400116a8
              QueryWindowsUpdateDriverStatus180x1400782d0
              SetInternetPolicies190x14002bb64
              UpdateDriverForPlugAndPlayDevicesA200x140005c30
              UpdateDriverForPlugAndPlayDevicesW210x1400558a0
              pDiDoDeviceInstallAsAdmin220x14004f77c
              pDiDoNullDriverInstall230x140052f18
              pDiRunFinishInstallOperations240x1400669bc

              Version Infos

              DescriptionData
              LegalCopyrightCopyright 2005 - 2009 Nir Sofer
              InternalNameTeltwFoo
              FileVersion9.74
              CompanyNameNirSoft
              ProductNameTeltwFoo
              ProductVersion9.74
              FileDescriptionProduKey
              OriginalFilenameTeltwFoo.exe
              Translation0x0409 0x04b0

              Possible Origin

              Language of compilation systemCountry where language is spokenMap
              EnglishUnited States
              HebrewIsrael

              Network Behavior

              Network Port Distribution

              UDP Packets

              TimestampSource PortDest PortSource IPDest IP
              Sep 28, 2021 13:04:23.505140066 CEST6033853192.168.2.78.8.8.8
              Sep 28, 2021 13:04:23.573188066 CEST53603388.8.8.8192.168.2.7
              Sep 28, 2021 13:04:35.846666098 CEST5871753192.168.2.78.8.8.8
              Sep 28, 2021 13:04:35.866933107 CEST53587178.8.8.8192.168.2.7
              Sep 28, 2021 13:04:58.577305079 CEST5976253192.168.2.78.8.8.8
              Sep 28, 2021 13:04:58.607346058 CEST53597628.8.8.8192.168.2.7
              Sep 28, 2021 13:05:14.241303921 CEST5432953192.168.2.78.8.8.8
              Sep 28, 2021 13:05:14.268682957 CEST53543298.8.8.8192.168.2.7
              Sep 28, 2021 13:05:16.395365953 CEST5805253192.168.2.78.8.8.8
              Sep 28, 2021 13:05:16.415195942 CEST53580528.8.8.8192.168.2.7
              Sep 28, 2021 13:05:20.938812971 CEST5400853192.168.2.78.8.8.8
              Sep 28, 2021 13:05:20.958224058 CEST53540088.8.8.8192.168.2.7
              Sep 28, 2021 13:05:31.310127020 CEST5945153192.168.2.78.8.8.8
              Sep 28, 2021 13:05:31.331723928 CEST53594518.8.8.8192.168.2.7
              Sep 28, 2021 13:05:34.285274029 CEST5291453192.168.2.78.8.8.8
              Sep 28, 2021 13:05:34.303147078 CEST53529148.8.8.8192.168.2.7
              Sep 28, 2021 13:05:49.886737108 CEST6456953192.168.2.78.8.8.8
              Sep 28, 2021 13:05:49.907191992 CEST53645698.8.8.8192.168.2.7
              Sep 28, 2021 13:05:50.044132948 CEST5281653192.168.2.78.8.8.8
              Sep 28, 2021 13:05:50.080962896 CEST53528168.8.8.8192.168.2.7
              Sep 28, 2021 13:05:53.422394037 CEST5078153192.168.2.78.8.8.8
              Sep 28, 2021 13:05:53.460597038 CEST53507818.8.8.8192.168.2.7
              Sep 28, 2021 13:05:55.004934072 CEST5423053192.168.2.78.8.8.8
              Sep 28, 2021 13:05:55.050369978 CEST53542308.8.8.8192.168.2.7
              Sep 28, 2021 13:05:55.806480885 CEST5491153192.168.2.78.8.8.8
              Sep 28, 2021 13:05:55.853698015 CEST53549118.8.8.8192.168.2.7
              Sep 28, 2021 13:05:56.173832893 CEST4995853192.168.2.78.8.8.8
              Sep 28, 2021 13:05:56.190999031 CEST53499588.8.8.8192.168.2.7
              Sep 28, 2021 13:05:57.309151888 CEST5086053192.168.2.78.8.8.8
              Sep 28, 2021 13:05:57.326709986 CEST53508608.8.8.8192.168.2.7
              Sep 28, 2021 13:05:57.678658962 CEST5045253192.168.2.78.8.8.8
              Sep 28, 2021 13:05:57.743607998 CEST53504528.8.8.8192.168.2.7
              Sep 28, 2021 13:05:58.000309944 CEST5973053192.168.2.78.8.8.8
              Sep 28, 2021 13:05:58.027781963 CEST53597308.8.8.8192.168.2.7
              Sep 28, 2021 13:05:58.076576948 CEST5931053192.168.2.78.8.8.8
              Sep 28, 2021 13:05:58.095819950 CEST53593108.8.8.8192.168.2.7
              Sep 28, 2021 13:05:58.562820911 CEST5191953192.168.2.78.8.8.8
              Sep 28, 2021 13:05:58.582771063 CEST53519198.8.8.8192.168.2.7
              Sep 28, 2021 13:05:59.083587885 CEST6429653192.168.2.78.8.8.8
              Sep 28, 2021 13:05:59.116796970 CEST53642968.8.8.8192.168.2.7
              Sep 28, 2021 13:05:59.438103914 CEST5668053192.168.2.78.8.8.8
              Sep 28, 2021 13:05:59.457645893 CEST53566808.8.8.8192.168.2.7
              Sep 28, 2021 13:06:04.194844007 CEST5882053192.168.2.78.8.8.8
              Sep 28, 2021 13:06:04.230432987 CEST53588208.8.8.8192.168.2.7
              Sep 28, 2021 13:06:14.306551933 CEST6098353192.168.2.78.8.8.8
              Sep 28, 2021 13:06:14.340621948 CEST53609838.8.8.8192.168.2.7
              Sep 28, 2021 13:06:19.166496038 CEST4924753192.168.2.78.8.8.8
              Sep 28, 2021 13:06:19.405267000 CEST53492478.8.8.8192.168.2.7
              Sep 28, 2021 13:06:38.931651115 CEST5228653192.168.2.78.8.8.8
              Sep 28, 2021 13:06:38.951231956 CEST53522868.8.8.8192.168.2.7
              Sep 28, 2021 13:06:39.978004932 CEST5606453192.168.2.78.8.8.8
              Sep 28, 2021 13:06:39.997354031 CEST53560648.8.8.8192.168.2.7
              Sep 28, 2021 13:06:55.767621040 CEST6374453192.168.2.78.8.8.8
              Sep 28, 2021 13:06:55.802818060 CEST53637448.8.8.8192.168.2.7

              Code Manipulations

              Statistics

              Behavior

              Click to jump to process

              System Behavior

              General

              Start time:13:04:28
              Start date:28/09/2021
              Path:C:\Windows\System32\loaddll64.exe
              Wow64 process (32bit):false
              Commandline:loaddll64.exe 'C:\Users\user\Desktop\0G0AO3HYEI.dll'
              Imagebase:0x7ff65ceb0000
              File size:140288 bytes
              MD5 hash:A84133CCB118CF35D49A423CD836D0EF
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_Dridex_2, Description: Yara detected Dridex unpacked file, Source: 00000001.00000002.531295536.0000000140001000.00000020.00020000.sdmp, Author: Joe Security
              Reputation:high

              General

              Start time:13:04:29
              Start date:28/09/2021
              Path:C:\Windows\System32\cmd.exe
              Wow64 process (32bit):false
              Commandline:cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\0G0AO3HYEI.dll',#1
              Imagebase:0x7ff7bf140000
              File size:273920 bytes
              MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high

              General

              Start time:13:04:30
              Start date:28/09/2021
              Path:C:\Windows\System32\rundll32.exe
              Wow64 process (32bit):false
              Commandline:rundll32.exe C:\Users\user\Desktop\0G0AO3HYEI.dll,CheckDriverSoftwareDependenciesSatisfied
              Imagebase:0x7ff687d70000
              File size:69632 bytes
              MD5 hash:73C519F050C20580F8A62C849D49215A
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_Dridex_2, Description: Yara detected Dridex unpacked file, Source: 00000003.00000002.531206986.0000000140001000.00000020.00020000.sdmp, Author: Joe Security
              Reputation:high

              General

              Start time:13:04:30
              Start date:28/09/2021
              Path:C:\Windows\System32\rundll32.exe
              Wow64 process (32bit):false
              Commandline:rundll32.exe 'C:\Users\user\Desktop\0G0AO3HYEI.dll',#1
              Imagebase:0x7ff687d70000
              File size:69632 bytes
              MD5 hash:73C519F050C20580F8A62C849D49215A
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_Dridex_2, Description: Yara detected Dridex unpacked file, Source: 00000004.00000002.531244676.0000000140001000.00000020.00020000.sdmp, Author: Joe Security
              Reputation:high

              General

              Start time:13:04:31
              Start date:28/09/2021
              Path:C:\Windows\explorer.exe
              Wow64 process (32bit):false
              Commandline:C:\Windows\Explorer.EXE
              Imagebase:0x7ff662bf0000
              File size:3933184 bytes
              MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high

              General

              Start time:13:04:33
              Start date:28/09/2021
              Path:C:\Windows\System32\rundll32.exe
              Wow64 process (32bit):false
              Commandline:rundll32.exe C:\Users\user\Desktop\0G0AO3HYEI.dll,DeviceInternetSettingUiW
              Imagebase:0x7ff687d70000
              File size:69632 bytes
              MD5 hash:73C519F050C20580F8A62C849D49215A
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_Dridex_2, Description: Yara detected Dridex unpacked file, Source: 00000008.00000002.531418646.0000000140001000.00000020.00020000.sdmp, Author: Joe Security
              Reputation:high

              General

              Start time:13:04:37
              Start date:28/09/2021
              Path:C:\Windows\System32\rundll32.exe
              Wow64 process (32bit):false
              Commandline:rundll32.exe C:\Users\user\Desktop\0G0AO3HYEI.dll,DiInstallDevice
              Imagebase:0x7ff687d70000
              File size:69632 bytes
              MD5 hash:73C519F050C20580F8A62C849D49215A
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_Dridex_2, Description: Yara detected Dridex unpacked file, Source: 00000009.00000002.531527593.0000000140001000.00000020.00020000.sdmp, Author: Joe Security
              Reputation:high

              General

              Start time:13:04:40
              Start date:28/09/2021
              Path:C:\Windows\System32\rundll32.exe
              Wow64 process (32bit):false
              Commandline:rundll32.exe C:\Users\user\Desktop\0G0AO3HYEI.dll,DiInstallDriverA
              Imagebase:0x7ff687d70000
              File size:69632 bytes
              MD5 hash:73C519F050C20580F8A62C849D49215A
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_Dridex_2, Description: Yara detected Dridex unpacked file, Source: 0000000A.00000002.531585014.0000000140001000.00000020.00020000.sdmp, Author: Joe Security

              General

              Start time:13:04:42
              Start date:28/09/2021
              Path:C:\Windows\explorer.exe
              Wow64 process (32bit):false
              Commandline:explorer.exe
              Imagebase:0x7ff662bf0000
              File size:3933184 bytes
              MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language

              General

              Start time:13:04:44
              Start date:28/09/2021
              Path:C:\Windows\System32\rundll32.exe
              Wow64 process (32bit):false
              Commandline:rundll32.exe C:\Users\user\Desktop\0G0AO3HYEI.dll,DiInstallDriverW
              Imagebase:0x7ff687d70000
              File size:69632 bytes
              MD5 hash:73C519F050C20580F8A62C849D49215A
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_Dridex_2, Description: Yara detected Dridex unpacked file, Source: 0000000E.00000002.531716160.0000000140001000.00000020.00020000.sdmp, Author: Joe Security

              General

              Start time:13:04:48
              Start date:28/09/2021
              Path:C:\Windows\System32\rundll32.exe
              Wow64 process (32bit):false
              Commandline:rundll32.exe C:\Users\user\Desktop\0G0AO3HYEI.dll,DiRollbackDriver
              Imagebase:0x7ff687d70000
              File size:69632 bytes
              MD5 hash:73C519F050C20580F8A62C849D49215A
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_Dridex_2, Description: Yara detected Dridex unpacked file, Source: 00000011.00000002.531717710.0000000140001000.00000020.00020000.sdmp, Author: Joe Security

              General

              Start time:13:04:51
              Start date:28/09/2021
              Path:C:\Windows\System32\rundll32.exe
              Wow64 process (32bit):false
              Commandline:rundll32.exe C:\Users\user\Desktop\0G0AO3HYEI.dll,DiShowUpdateDevice
              Imagebase:0x7ff687d70000
              File size:69632 bytes
              MD5 hash:73C519F050C20580F8A62C849D49215A
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_Dridex_2, Description: Yara detected Dridex unpacked file, Source: 00000014.00000002.531894805.0000000140001000.00000020.00020000.sdmp, Author: Joe Security

              General

              Start time:13:04:55
              Start date:28/09/2021
              Path:C:\Windows\System32\rundll32.exe
              Wow64 process (32bit):false
              Commandline:rundll32.exe C:\Users\user\Desktop\0G0AO3HYEI.dll,DiShowUpdateDriver
              Imagebase:0x7ff687d70000
              File size:69632 bytes
              MD5 hash:73C519F050C20580F8A62C849D49215A
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_Dridex_2, Description: Yara detected Dridex unpacked file, Source: 00000015.00000002.531718093.0000000140001000.00000020.00020000.sdmp, Author: Joe Security

              General

              Start time:13:04:58
              Start date:28/09/2021
              Path:C:\Windows\System32\rundll32.exe
              Wow64 process (32bit):false
              Commandline:rundll32.exe C:\Users\user\Desktop\0G0AO3HYEI.dll,DiUninstallDevice
              Imagebase:0x7ff687d70000
              File size:69632 bytes
              MD5 hash:73C519F050C20580F8A62C849D49215A
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_Dridex_2, Description: Yara detected Dridex unpacked file, Source: 00000018.00000002.531937010.0000000140001000.00000020.00020000.sdmp, Author: Joe Security

              General

              Start time:13:05:02
              Start date:28/09/2021
              Path:C:\Windows\System32\rundll32.exe
              Wow64 process (32bit):false
              Commandline:rundll32.exe C:\Users\user\Desktop\0G0AO3HYEI.dll,DiUninstallDriverA
              Imagebase:0x7ff687d70000
              File size:69632 bytes
              MD5 hash:73C519F050C20580F8A62C849D49215A
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_Dridex_2, Description: Yara detected Dridex unpacked file, Source: 0000001A.00000002.531718874.0000000140001000.00000020.00020000.sdmp, Author: Joe Security

              General

              Start time:13:05:05
              Start date:28/09/2021
              Path:C:\Windows\explorer.exe
              Wow64 process (32bit):false
              Commandline:explorer.exe
              Imagebase:0x7ff662bf0000
              File size:3933184 bytes
              MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language

              General

              Start time:13:05:06
              Start date:28/09/2021
              Path:C:\Windows\System32\rundll32.exe
              Wow64 process (32bit):false
              Commandline:rundll32.exe C:\Users\user\Desktop\0G0AO3HYEI.dll,DiUninstallDriverW
              Imagebase:0x7ff687d70000
              File size:69632 bytes
              MD5 hash:73C519F050C20580F8A62C849D49215A
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_Dridex_2, Description: Yara detected Dridex unpacked file, Source: 0000001C.00000002.532059437.0000000140001000.00000020.00020000.sdmp, Author: Joe Security

              General

              Start time:13:05:10
              Start date:28/09/2021
              Path:C:\Windows\System32\rundll32.exe
              Wow64 process (32bit):false
              Commandline:rundll32.exe C:\Users\user\Desktop\0G0AO3HYEI.dll,GetInternetPolicies
              Imagebase:0x7ff687d70000
              File size:69632 bytes
              MD5 hash:73C519F050C20580F8A62C849D49215A
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_Dridex_2, Description: Yara detected Dridex unpacked file, Source: 0000001E.00000002.532228237.0000000140001000.00000020.00020000.sdmp, Author: Joe Security

              General

              Start time:13:05:14
              Start date:28/09/2021
              Path:C:\Windows\System32\rundll32.exe
              Wow64 process (32bit):false
              Commandline:rundll32.exe C:\Users\user\Desktop\0G0AO3HYEI.dll,InstallNewDevice
              Imagebase:0x7ff687d70000
              File size:69632 bytes
              MD5 hash:73C519F050C20580F8A62C849D49215A
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_Dridex_2, Description: Yara detected Dridex unpacked file, Source: 0000001F.00000002.532276672.0000000140001000.00000020.00020000.sdmp, Author: Joe Security

              General

              Start time:13:05:17
              Start date:28/09/2021
              Path:C:\Windows\System32\rundll32.exe
              Wow64 process (32bit):false
              Commandline:rundll32.exe C:\Users\user\Desktop\0G0AO3HYEI.dll,InstallSelectedDriver
              Imagebase:0x7ff687d70000
              File size:69632 bytes
              MD5 hash:73C519F050C20580F8A62C849D49215A
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_Dridex_2, Description: Yara detected Dridex unpacked file, Source: 00000021.00000002.532290767.0000000140001000.00000020.00020000.sdmp, Author: Joe Security

              General

              Start time:13:05:21
              Start date:28/09/2021
              Path:C:\Windows\System32\rundll32.exe
              Wow64 process (32bit):false
              Commandline:rundll32.exe C:\Users\user\Desktop\0G0AO3HYEI.dll,InstallWindowsUpdateDriver
              Imagebase:0x7ff687d70000
              File size:69632 bytes
              MD5 hash:73C519F050C20580F8A62C849D49215A
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_Dridex_2, Description: Yara detected Dridex unpacked file, Source: 00000022.00000002.533238918.0000000140001000.00000020.00020000.sdmp, Author: Joe Security

              General

              Start time:13:05:25
              Start date:28/09/2021
              Path:C:\Windows\System32\rundll32.exe
              Wow64 process (32bit):false
              Commandline:rundll32.exe C:\Users\user\Desktop\0G0AO3HYEI.dll,InstallWindowsUpdateDriverEx
              Imagebase:0x7ff687d70000
              File size:69632 bytes
              MD5 hash:73C519F050C20580F8A62C849D49215A
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_Dridex_2, Description: Yara detected Dridex unpacked file, Source: 00000025.00000002.532357019.0000000140001000.00000020.00020000.sdmp, Author: Joe Security

              General

              Start time:13:05:26
              Start date:28/09/2021
              Path:C:\Windows\explorer.exe
              Wow64 process (32bit):false
              Commandline:explorer.exe
              Imagebase:0x7ff772bb0000
              File size:3933184 bytes
              MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language

              General

              Start time:13:05:29
              Start date:28/09/2021
              Path:C:\Windows\System32\rundll32.exe
              Wow64 process (32bit):false
              Commandline:rundll32.exe C:\Users\user\Desktop\0G0AO3HYEI.dll,InstallWindowsUpdateDrivers
              Imagebase:0x7ff687d70000
              File size:69632 bytes
              MD5 hash:73C519F050C20580F8A62C849D49215A
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_Dridex_2, Description: Yara detected Dridex unpacked file, Source: 00000028.00000002.532418928.0000000140001000.00000020.00020000.sdmp, Author: Joe Security

              Disassembly

              Code Analysis

              Reset < >