Loading ...

Play interactive tourEdit tour

Windows Analysis Report SecuriteInfo.com.Trojan.Win32.Save.a.28377.dll

Overview

General Information

Sample Name:SecuriteInfo.com.Trojan.Win32.Save.a.28377.dll
Analysis ID:510679
MD5:2228471d39760f9a389ac95f71b671a9
SHA1:38b7d35e72c995ca526e293af9d448a7a8011df6
SHA256:a9238550f705b9668a390a9e7b9e4dec6a88daec2c8acca19ffa10af328d594d
Tags:dll
Infos:

Most interesting Screenshot:

Detection

Dridex
Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Found detection on Joe Sandbox Cloud Basic with higher score
Yara detected Dridex unpacked file
Multi AV Scanner detection for submitted file
Tries to delay execution (extensive OutputDebugStringW loop)
C2 URLs / IPs found in malware configuration
Machine Learning detection for sample
Uses 32bit PE files
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Antivirus or Machine Learning detection for unpacked file
Sample file is different than original file name gathered from version info
One or more processes crash
Contains functionality to query locales information (e.g. system language)
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to call native functions
Launches processes in debugging mode, may be used to hinder debugging
Creates a process in suspended mode (likely to inject code)
IP address seen in connection with other malware

Classification

Process Tree

  • System is w10x64
  • loaddll32.exe (PID: 5868 cmdline: loaddll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.28377.dll' MD5: 72FCD8FB0ADC38ED9050569AD673650E)
    • cmd.exe (PID: 3248 cmdline: cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.28377.dll',#1 MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • rundll32.exe (PID: 6404 cmdline: rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.28377.dll',#1 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 6436 cmdline: rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.28377.dll,FFRgpmdlwwWde MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 6900 cmdline: rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.28377.dll',CheckTrust MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 7144 cmdline: rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.28377.dll',DllCanUnloadNow MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
      • WerFault.exe (PID: 4508 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7144 -s 652 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
    • rundll32.exe (PID: 6296 cmdline: rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.28377.dll',DllGetClassObject MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
      • WerFault.exe (PID: 5404 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6296 -s 652 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
    • rundll32.exe (PID: 2944 cmdline: rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.28377.dll',DownloadFile MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 3892 cmdline: rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.28377.dll',GetICifFileFromFile MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
  • cleanup

Malware Configuration

Threatname: Dridex

{"Version": 22201, "C2 list": ["149.202.179.100:443", "66.147.235.11:6891", "81.0.236.89:13786"], "RC4 keys": ["9fRysqcdPgZffBlroqJaZHyCvLvD6BUV", "ranVAwtYINZG8jFJSjh5rR8jx3HIZIvSCern79nVFUhfeb2NvJlOKPsGO1osGE0VchV9bFDjym"]}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
0000000C.00000000.680670011.000000006E8B1000.00000020.00020000.sdmpJoeSecurity_Dridex_1Yara detected Dridex unpacked fileJoe Security
    00000004.00000002.697384477.000000006E8B1000.00000020.00020000.sdmpJoeSecurity_Dridex_1Yara detected Dridex unpacked fileJoe Security
      0000000D.00000000.682183733.000000006E8B1000.00000020.00020000.sdmpJoeSecurity_Dridex_1Yara detected Dridex unpacked fileJoe Security
        0000000C.00000002.719392684.000000006E8B1000.00000020.00020000.sdmpJoeSecurity_Dridex_1Yara detected Dridex unpacked fileJoe Security
          0000000B.00000002.753337263.000000006E8B1000.00000020.00020000.sdmpJoeSecurity_Dridex_1Yara detected Dridex unpacked fileJoe Security
            Click to see the 6 entries

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            9.2.rundll32.exe.6e8b0000.2.unpackJoeSecurity_Dridex_1Yara detected Dridex unpacked fileJoe Security
              3.0.rundll32.exe.6e8b0000.2.unpackJoeSecurity_Dridex_1Yara detected Dridex unpacked fileJoe Security
                13.2.rundll32.exe.6e8b0000.2.unpackJoeSecurity_Dridex_1Yara detected Dridex unpacked fileJoe Security
                  12.0.rundll32.exe.6e8b0000.2.unpackJoeSecurity_Dridex_1Yara detected Dridex unpacked fileJoe Security
                    11.2.rundll32.exe.6e8b0000.2.unpackJoeSecurity_Dridex_1Yara detected Dridex unpacked fileJoe Security
                      Click to see the 6 entries

                      Sigma Overview

                      No Sigma rule has matched

                      Jbx Signature Overview

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection:

                      barindex
                      Found malware configurationShow sources
                      Source: 13.2.rundll32.exe.6e8b0000.2.unpackMalware Configuration Extractor: Dridex {"Version": 22201, "C2 list": ["149.202.179.100:443", "66.147.235.11:6891", "81.0.236.89:13786"], "RC4 keys": ["9fRysqcdPgZffBlroqJaZHyCvLvD6BUV", "ranVAwtYINZG8jFJSjh5rR8jx3HIZIvSCern79nVFUhfeb2NvJlOKPsGO1osGE0VchV9bFDjym"]}
                      Multi AV Scanner detection for submitted fileShow sources
                      Source: SecuriteInfo.com.Trojan.Win32.Save.a.28377.dllVirustotal: Detection: 20%Perma Link
                      Source: SecuriteInfo.com.Trojan.Win32.Save.a.28377.dllReversingLabs: Detection: 28%
                      Machine Learning detection for sampleShow sources
                      Source: SecuriteInfo.com.Trojan.Win32.Save.a.28377.dllJoe Sandbox ML: detected
                      Source: 12.0.rundll32.exe.3220000.0.unpackAvira: Label: TR/ATRAPS.Gen2
                      Source: 12.2.rundll32.exe.4d34756.1.unpackAvira: Label: TR/Patched.Ren.Gen
                      Source: 9.2.rundll32.exe.33a0000.0.unpackAvira: Label: TR/ATRAPS.Gen2
                      Source: 13.0.rundll32.exe.3b0000.0.unpackAvira: Label: TR/ATRAPS.Gen2
                      Source: 3.0.rundll32.exe.2f80000.0.unpackAvira: Label: TR/ATRAPS.Gen2
                      Source: 4.2.rundll32.exe.29a0000.0.unpackAvira: Label: TR/ATRAPS.Gen2
                      Source: 3.0.rundll32.exe.4a04756.1.unpackAvira: Label: TR/Patched.Ren.Gen
                      Source: 4.2.rundll32.exe.4484756.1.unpackAvira: Label: TR/Patched.Ren.Gen
                      Source: 11.0.rundll32.exe.2990000.0.unpackAvira: Label: TR/ATRAPS.Gen2
                      Source: 11.0.rundll32.exe.47f4756.1.unpackAvira: Label: TR/Patched.Ren.Gen
                      Source: 14.0.rundll32.exe.4884756.1.unpackAvira: Label: TR/Patched.Ren.Gen
                      Source: 11.0.rundll32.exe.2990000.3.unpackAvira: Label: TR/ATRAPS.Gen2
                      Source: 13.2.rundll32.exe.3b0000.0.unpackAvira: Label: TR/ATRAPS.Gen2
                      Source: 1.2.loaddll32.exe.ce4756.1.unpackAvira: Label: TR/Patched.Ren.Gen
                      Source: 12.2.rundll32.exe.3220000.0.unpackAvira: Label: TR/ATRAPS.Gen2
                      Source: 13.2.rundll32.exe.29f4756.1.unpackAvira: Label: TR/Patched.Ren.Gen
                      Source: 12.0.rundll32.exe.4d34756.1.unpackAvira: Label: TR/Patched.Ren.Gen
                      Source: 3.0.rundll32.exe.2f80000.3.unpackAvira: Label: TR/ATRAPS.Gen2
                      Source: 11.2.rundll32.exe.2990000.0.unpackAvira: Label: TR/ATRAPS.Gen2
                      Source: 1.2.loaddll32.exe.7b0000.0.unpackAvira: Label: TR/ATRAPS.Gen2
                      Source: 14.0.rundll32.exe.2d60000.0.unpackAvira: Label: TR/ATRAPS.Gen2
                      Source: 11.2.rundll32.exe.47f4756.1.unpackAvira: Label: TR/Patched.Ren.Gen
                      Source: 13.0.rundll32.exe.29f4756.1.unpackAvira: Label: TR/Patched.Ren.Gen
                      Source: 9.2.rundll32.exe.36a4756.1.unpackAvira: Label: TR/Patched.Ren.Gen
                      Source: 3.0.rundll32.exe.4a04756.4.unpackAvira: Label: TR/Patched.Ren.Gen
                      Source: 11.0.rundll32.exe.47f4756.4.unpackAvira: Label: TR/Patched.Ren.Gen
                      Source: SecuriteInfo.com.Trojan.Win32.Save.a.28377.dllStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
                      Source: SecuriteInfo.com.Trojan.Win32.Save.a.28377.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT
                      Source: Binary string: rpidebbfll.pdb source: SecuriteInfo.com.Trojan.Win32.Save.a.28377.dll
                      Source: Binary string: wntdll.pdbUGP source: rundll32.exe, 00000004.00000003.405380149.000000004B280000.00000004.00000001.sdmp, rundll32.exe, 00000009.00000003.645478010.000000004B280000.00000004.00000001.sdmp
                      Source: Binary string: wntdll.pdb source: rundll32.exe, 00000004.00000003.405380149.000000004B280000.00000004.00000001.sdmp, rundll32.exe, 00000009.00000003.645478010.000000004B280000.00000004.00000001.sdmp

                      Networking:

                      barindex
                      C2 URLs / IPs found in malware configurationShow sources
                      Source: Malware configuration extractorIPs: 149.202.179.100:443
                      Source: Malware configuration extractorIPs: 66.147.235.11:6891
                      Source: Malware configuration extractorIPs: 81.0.236.89:13786
                      Source: Joe Sandbox ViewASN Name: HOSTROCKETUS HOSTROCKETUS
                      Source: Joe Sandbox ViewASN Name: OVHFR OVHFR
                      Source: Joe Sandbox ViewIP Address: 66.147.235.11 66.147.235.11
                      Source: Joe Sandbox ViewIP Address: 149.202.179.100 149.202.179.100
                      Source: rundll32.exe, 00000003.00000000.423532537.000000006E8CF000.00000002.00020000.sdmp, rundll32.exe, 00000004.00000002.698746996.000000006E8CF000.00000002.00020000.sdmp, rundll32.exe, 00000009.00000002.784764544.000000006E8CF000.00000002.00020000.sdmp, rundll32.exe, 0000000B.00000000.698207139.000000006E8CF000.00000002.00020000.sdmp, rundll32.exe, 0000000C.00000002.723020912.000000006E8CF000.00000002.00020000.sdmp, rundll32.exe, 0000000D.00000002.753729339.000000006E8CF000.00000002.00020000.sdmp, rundll32.exe, 0000000E.00000000.713332446.000000006E8CF000.00000002.00020000.sdmpString found in binary or memory: http://www.vomfass.deDVarFileInfo$

                      E-Banking Fraud:

                      barindex
                      Yara detected Dridex unpacked fileShow sources
                      Source: Yara matchFile source: 9.2.rundll32.exe.6e8b0000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.0.rundll32.exe.6e8b0000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 13.2.rundll32.exe.6e8b0000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 12.0.rundll32.exe.6e8b0000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 11.2.rundll32.exe.6e8b0000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.6e8b0000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 12.2.rundll32.exe.6e8b0000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 11.0.rundll32.exe.6e8b0000.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.0.rundll32.exe.6e8b0000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 11.0.rundll32.exe.6e8b0000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 13.0.rundll32.exe.6e8b0000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0000000C.00000000.680670011.000000006E8B1000.00000020.00020000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.697384477.000000006E8B1000.00000020.00020000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000D.00000000.682183733.000000006E8B1000.00000020.00020000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000C.00000002.719392684.000000006E8B1000.00000020.00020000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000B.00000002.753337263.000000006E8B1000.00000020.00020000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000D.00000002.749868846.000000006E8B1000.00000020.00020000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000000.423290755.000000006E8B1000.00000020.00020000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000B.00000000.698176529.000000006E8B1000.00000020.00020000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.780387984.000000006E8B1000.00000020.00020000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000B.00000000.676132737.000000006E8B1000.00000020.00020000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000E.00000000.701129229.000000006E8B1000.00000020.00020000.sdmp, type: MEMORY

                      System Summary:

                      barindex
                      Found detection on Joe Sandbox Cloud Basic with higher scoreShow sources
                      Source: SecuriteInfo.com.Trojan.Win32.Save.a.28377.dllJoe Sandbox Cloud Basic: Detection: malicious Score: 76 Threat Name: DridexPerma Link
                      Source: SecuriteInfo.com.Trojan.Win32.Save.a.28377.dllStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
                      Source: SecuriteInfo.com.Trojan.Win32.Save.a.28377.dllBinary or memory string: OriginalFilenameddlb.dll vs SecuriteInfo.com.Trojan.Win32.Save.a.28377.dll
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7144 -s 652
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_6E8B1494
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6E8C0754
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6E8C9348
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6E8B1494
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6E8B846C
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6E8C1460
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6E8BA52C
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6E8C1D58
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6E8C223C NtDelayExecution,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6E8C2840 NtAllocateVirtualMemory,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6E8BBB88 NtClose,
                      Source: SecuriteInfo.com.Trojan.Win32.Save.a.28377.dllVirustotal: Detection: 20%
                      Source: SecuriteInfo.com.Trojan.Win32.Save.a.28377.dllReversingLabs: Detection: 28%
                      Source: SecuriteInfo.com.Trojan.Win32.Save.a.28377.dllStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.28377.dll,FFRgpmdlwwWde
                      Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.28377.dll'
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.28377.dll',#1
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.28377.dll,FFRgpmdlwwWde
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.28377.dll',#1
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.28377.dll',CheckTrust
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.28377.dll',DllCanUnloadNow
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.28377.dll',DllGetClassObject
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.28377.dll',DownloadFile
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.28377.dll',GetICifFileFromFile
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7144 -s 652
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6296 -s 652
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.28377.dll',#1
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.28377.dll,FFRgpmdlwwWde
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.28377.dll',CheckTrust
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.28377.dll',DllCanUnloadNow
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.28377.dll',DllGetClassObject
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.28377.dll',DownloadFile
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.28377.dll',GetICifFileFromFile
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.28377.dll',#1
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7144 -s 652
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6296 -s 652
                      Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6296
                      Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7144
                      Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\WERCF97.tmpJump to behavior
                      Source: classification engineClassification label: mal84.troj.evad.winDLL@23/6@0/3
                      Source: SecuriteInfo.com.Trojan.Win32.Save.a.28377.dllStatic file information: File size 1093632 > 1048576
                      Source: SecuriteInfo.com.Trojan.Win32.Save.a.28377.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT
                      Source: SecuriteInfo.com.Trojan.Win32.Save.a.28377.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                      Source: Binary string: rpidebbfll.pdb source: SecuriteInfo.com.Trojan.Win32.Save.a.28377.dll
                      Source: Binary string: wntdll.pdbUGP source: rundll32.exe, 00000004.00000003.405380149.000000004B280000.00000004.00000001.sdmp, rundll32.exe, 00000009.00000003.645478010.000000004B280000.00000004.00000001.sdmp
                      Source: Binary string: wntdll.pdb source: rundll32.exe, 00000004.00000003.405380149.000000004B280000.00000004.00000001.sdmp, rundll32.exe, 00000009.00000003.645478010.000000004B280000.00000004.00000001.sdmp
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6E8BF6CC push esi; mov dword ptr [esp], 00000000h
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX

                      Malware Analysis System Evasion:

                      barindex
                      Tries to delay execution (extensive OutputDebugStringW loop)Show sources
                      Source: C:\Windows\SysWOW64\rundll32.exeSection loaded: OutputDebugStringW count: 389
                      Source: C:\Windows\SysWOW64\rundll32.exeWindow / User API: threadDelayed 389
                      Source: C:\Windows\System32\loaddll32.exeLast function: Thread delayed
                      Source: C:\Windows\SysWOW64\rundll32.exeLast function: Thread delayed
                      Source: C:\Windows\SysWOW64\rundll32.exeLast function: Thread delayed
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6E8C0754 GetTokenInformation,GetSystemInfo,GetTokenInformation,
                      Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 120000
                      Source: WERE0CF.tmp.xml.21.drBinary or memory string: <arg nm="syspro" val="VMware7,1" />
                      Source: WERDF95.tmp.WERInternalMetadata.xml.21.drBinary or memory string: <SystemManufacturer>VMware, Inc.</SystemManufacturer>
                      Source: WERDF95.tmp.WERInternalMetadata.xml.21.drBinary or memory string: <SystemProductName>VMware7,1</SystemProductName>
                      Source: WERE0CF.tmp.xml.21.drBinary or memory string: <arg nm="sysmfg" val="VMware, Inc." />
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6E8B6D50 GetUserNameW,MessageBoxW,GetLastError,CreateFileA,DebugBreak,FlushFileBuffers,FreeEnvironmentStringsA,GetConsoleOutputCP,GetEnvironmentStrings,GetLocaleInfoA,GetStartupInfoA,GetStringTypeA,HeapValidate,IsBadReadPtr,LCMapStringA,LoadLibraryA,OutputDebugStringA,
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7144 -s 652
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6E8C3110 RtlAddVectoredExceptionHandler,
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.28377.dll',#1
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7144 -s 652
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6296 -s 652
                      Source: loaddll32.exe, 00000001.00000002.732756195.00000000011A0000.00000002.00020000.sdmp, rundll32.exe, 00000003.00000000.420285938.0000000003520000.00000002.00020000.sdmp, rundll32.exe, 00000004.00000002.687603981.0000000002FA0000.00000002.00020000.sdmp, rundll32.exe, 00000009.00000002.757450406.0000000003AE0000.00000002.00020000.sdmp, rundll32.exe, 0000000B.00000000.644072001.0000000003310000.00000002.00020000.sdmp, rundll32.exe, 0000000C.00000000.676062687.0000000003850000.00000002.00020000.sdmp, rundll32.exe, 0000000D.00000000.679799692.0000000002D90000.00000002.00020000.sdmp, rundll32.exe, 0000000E.00000000.680159187.00000000033A0000.00000002.00020000.sdmpBinary or memory string: Program Manager
                      Source: loaddll32.exe, 00000001.00000002.732756195.00000000011A0000.00000002.00020000.sdmp, rundll32.exe, 00000003.00000000.420285938.0000000003520000.00000002.00020000.sdmp, rundll32.exe, 00000004.00000002.687603981.0000000002FA0000.00000002.00020000.sdmp, rundll32.exe, 00000009.00000002.757450406.0000000003AE0000.00000002.00020000.sdmp, rundll32.exe, 0000000B.00000000.644072001.0000000003310000.00000002.00020000.sdmp, rundll32.exe, 0000000C.00000000.676062687.0000000003850000.00000002.00020000.sdmp, rundll32.exe, 0000000D.00000000.679799692.0000000002D90000.00000002.00020000.sdmp, rundll32.exe, 0000000E.00000000.680159187.00000000033A0000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
                      Source: loaddll32.exe, 00000001.00000002.732756195.00000000011A0000.00000002.00020000.sdmp, rundll32.exe, 00000003.00000000.420285938.0000000003520000.00000002.00020000.sdmp, rundll32.exe, 00000004.00000002.687603981.0000000002FA0000.00000002.00020000.sdmp, rundll32.exe, 00000009.00000002.757450406.0000000003AE0000.00000002.00020000.sdmp, rundll32.exe, 0000000B.00000000.644072001.0000000003310000.00000002.00020000.sdmp, rundll32.exe, 0000000C.00000000.676062687.0000000003850000.00000002.00020000.sdmp, rundll32.exe, 0000000D.00000000.679799692.0000000002D90000.00000002.00020000.sdmp, rundll32.exe, 0000000E.00000000.680159187.00000000033A0000.00000002.00020000.sdmpBinary or memory string: Progman
                      Source: loaddll32.exe, 00000001.00000002.732756195.00000000011A0000.00000002.00020000.sdmp, rundll32.exe, 00000003.00000000.420285938.0000000003520000.00000002.00020000.sdmp, rundll32.exe, 00000004.00000002.687603981.0000000002FA0000.00000002.00020000.sdmp, rundll32.exe, 00000009.00000002.757450406.0000000003AE0000.00000002.00020000.sdmp, rundll32.exe, 0000000B.00000000.644072001.0000000003310000.00000002.00020000.sdmp, rundll32.exe, 0000000C.00000000.676062687.0000000003850000.00000002.00020000.sdmp, rundll32.exe, 0000000D.00000000.679799692.0000000002D90000.00000002.00020000.sdmp, rundll32.exe, 0000000E.00000000.680159187.00000000033A0000.00000002.00020000.sdmpBinary or memory string: Progmanlock
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetUserNameW,MessageBoxW,GetLastError,CreateFileA,DebugBreak,FlushFileBuffers,FreeEnvironmentStringsA,GetConsoleOutputCP,GetEnvironmentStrings,GetLocaleInfoA,GetStartupInfoA,GetStringTypeA,HeapValidate,IsBadReadPtr,LCMapStringA,LoadLibraryA,OutputDebugStringA,
                      Source: C:\Windows\SysWOW64\rundll32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6E8B6D50 GetUserNameW,MessageBoxW,GetLastError,CreateFileA,DebugBreak,FlushFileBuffers,FreeEnvironmentStringsA,GetConsoleOutputCP,GetEnvironmentStrings,GetLocaleInfoA,GetStartupInfoA,GetStringTypeA,HeapValidate,IsBadReadPtr,LCMapStringA,LoadLibraryA,OutputDebugStringA,

                      Mitre Att&ck Matrix

                      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                      Valid AccountsWindows Management InstrumentationPath InterceptionProcess Injection12Disable or Modify Tools1OS Credential DumpingSecurity Software Discovery11Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                      Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsVirtualization/Sandbox Evasion11LSASS MemoryProcess Discovery1Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothApplication Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Process Injection12Security Account ManagerVirtualization/Sandbox Evasion11SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Obfuscated Files or Information1NTDSApplication Window Discovery1Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptRundll321LSA SecretsAccount Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                      Replication Through Removable MediaLaunchdRc.commonRc.commonSoftware Packing1Cached Domain CredentialsSystem Owner/User Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSyncSystem Information Discovery13Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact

                      Behavior Graph

                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 510679 Sample: SecuriteInfo.com.Trojan.Win... Startdate: 28/10/2021 Architecture: WINDOWS Score: 84 25 149.202.179.100 OVHFR France 2->25 27 66.147.235.11 HOSTROCKETUS United States 2->27 29 81.0.236.89 CASABLANCA-ASInternetCollocationProviderCZ Czech Republic 2->29 31 Found malware configuration 2->31 33 Multi AV Scanner detection for submitted file 2->33 35 Yara detected Dridex unpacked file 2->35 37 3 other signatures 2->37 8 loaddll32.exe 1 2->8         started        signatures3 process4 process5 10 rundll32.exe 8->10         started        13 rundll32.exe 8->13         started        15 rundll32.exe 8->15         started        17 4 other processes 8->17 signatures6 39 Tries to delay execution (extensive OutputDebugStringW loop) 10->39 19 WerFault.exe 20 7 13->19         started        21 WerFault.exe 5 15->21         started        23 rundll32.exe 17->23         started        process7

                      Screenshots

                      Thumbnails

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                      windows-stand

                      Antivirus, Machine Learning and Genetic Malware Detection

                      Initial Sample

                      SourceDetectionScannerLabelLink
                      SecuriteInfo.com.Trojan.Win32.Save.a.28377.dll21%VirustotalBrowse
                      SecuriteInfo.com.Trojan.Win32.Save.a.28377.dll29%ReversingLabsWin32.Trojan.Drixed
                      SecuriteInfo.com.Trojan.Win32.Save.a.28377.dll100%Joe Sandbox ML

                      Dropped Files

                      No Antivirus matches

                      Unpacked PE Files

                      SourceDetectionScannerLabelLinkDownload
                      12.0.rundll32.exe.3220000.0.unpack100%AviraTR/ATRAPS.Gen2Download File
                      12.2.rundll32.exe.4d34756.1.unpack100%AviraTR/Patched.Ren.GenDownload File
                      9.2.rundll32.exe.33a0000.0.unpack100%AviraTR/ATRAPS.Gen2Download File
                      13.0.rundll32.exe.3b0000.0.unpack100%AviraTR/ATRAPS.Gen2Download File
                      3.0.rundll32.exe.2f80000.0.unpack100%AviraTR/ATRAPS.Gen2Download File
                      4.2.rundll32.exe.29a0000.0.unpack100%AviraTR/ATRAPS.Gen2Download File
                      13.2.rundll32.exe.6e8b0000.2.unpack100%AviraHEUR/AGEN.1144420Download File
                      3.0.rundll32.exe.4a04756.1.unpack100%AviraTR/Patched.Ren.GenDownload File
                      4.2.rundll32.exe.4484756.1.unpack100%AviraTR/Patched.Ren.GenDownload File
                      11.0.rundll32.exe.2990000.0.unpack100%AviraTR/ATRAPS.Gen2Download File
                      11.0.rundll32.exe.47f4756.1.unpack100%AviraTR/Patched.Ren.GenDownload File
                      14.0.rundll32.exe.4884756.1.unpack100%AviraTR/Patched.Ren.GenDownload File
                      9.2.rundll32.exe.6e8b0000.2.unpack100%AviraHEUR/AGEN.1144420Download File
                      11.0.rundll32.exe.2990000.3.unpack100%AviraTR/ATRAPS.Gen2Download File
                      3.0.rundll32.exe.6e8b0000.2.unpack100%AviraHEUR/AGEN.1144420Download File
                      13.2.rundll32.exe.3b0000.0.unpack100%AviraTR/ATRAPS.Gen2Download File
                      1.2.loaddll32.exe.ce4756.1.unpack100%AviraTR/Patched.Ren.GenDownload File
                      12.0.rundll32.exe.6e8b0000.2.unpack100%AviraHEUR/AGEN.1144420Download File
                      12.2.rundll32.exe.3220000.0.unpack100%AviraTR/ATRAPS.Gen2Download File
                      13.2.rundll32.exe.29f4756.1.unpack100%AviraTR/Patched.Ren.GenDownload File
                      12.0.rundll32.exe.4d34756.1.unpack100%AviraTR/Patched.Ren.GenDownload File
                      3.0.rundll32.exe.2f80000.3.unpack100%AviraTR/ATRAPS.Gen2Download File
                      11.2.rundll32.exe.2990000.0.unpack100%AviraTR/ATRAPS.Gen2Download File
                      11.2.rundll32.exe.6e8b0000.2.unpack100%AviraHEUR/AGEN.1144420Download File
                      1.2.loaddll32.exe.7b0000.0.unpack100%AviraTR/ATRAPS.Gen2Download File
                      4.2.rundll32.exe.6e8b0000.2.unpack100%AviraHEUR/AGEN.1144420Download File
                      14.0.rundll32.exe.2d60000.0.unpack100%AviraTR/ATRAPS.Gen2Download File
                      12.2.rundll32.exe.6e8b0000.2.unpack100%AviraHEUR/AGEN.1144420Download File
                      11.0.rundll32.exe.6e8b0000.5.unpack100%AviraHEUR/AGEN.1144420Download File
                      11.2.rundll32.exe.47f4756.1.unpack100%AviraTR/Patched.Ren.GenDownload File
                      13.0.rundll32.exe.6e8b0000.2.unpack100%AviraHEUR/AGEN.1144420Download File
                      13.0.rundll32.exe.29f4756.1.unpack100%AviraTR/Patched.Ren.GenDownload File
                      9.2.rundll32.exe.36a4756.1.unpack100%AviraTR/Patched.Ren.GenDownload File
                      14.0.rundll32.exe.6e8b0000.2.unpack100%AviraHEUR/AGEN.1144420Download File
                      3.0.rundll32.exe.4a04756.4.unpack100%AviraTR/Patched.Ren.GenDownload File
                      11.0.rundll32.exe.47f4756.4.unpack100%AviraTR/Patched.Ren.GenDownload File
                      11.0.rundll32.exe.6e8b0000.2.unpack100%AviraHEUR/AGEN.1144420Download File

                      Domains

                      No Antivirus matches

                      URLs

                      SourceDetectionScannerLabelLink
                      http://www.vomfass.deDVarFileInfo$0%Avira URL Cloudsafe

                      Domains and IPs

                      Contacted Domains

                      No contacted domains info

                      URLs from Memory and Binaries

                      NameSourceMaliciousAntivirus DetectionReputation
                      http://www.vomfass.deDVarFileInfo$rundll32.exe, 00000003.00000000.423532537.000000006E8CF000.00000002.00020000.sdmp, rundll32.exe, 00000004.00000002.698746996.000000006E8CF000.00000002.00020000.sdmp, rundll32.exe, 00000009.00000002.784764544.000000006E8CF000.00000002.00020000.sdmp, rundll32.exe, 0000000B.00000000.698207139.000000006E8CF000.00000002.00020000.sdmp, rundll32.exe, 0000000C.00000002.723020912.000000006E8CF000.00000002.00020000.sdmp, rundll32.exe, 0000000D.00000002.753729339.000000006E8CF000.00000002.00020000.sdmp, rundll32.exe, 0000000E.00000000.713332446.000000006E8CF000.00000002.00020000.sdmpfalse
                      • Avira URL Cloud: safe
                      low

                      Contacted IPs

                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs

                      Public

                      IPDomainCountryFlagASNASN NameMalicious
                      66.147.235.11
                      unknownUnited States
                      23535HOSTROCKETUStrue
                      149.202.179.100
                      unknownFrance
                      16276OVHFRtrue
                      81.0.236.89
                      unknownCzech Republic
                      15685CASABLANCA-ASInternetCollocationProviderCZtrue

                      General Information

                      Joe Sandbox Version:33.0.0 White Diamond
                      Analysis ID:510679
                      Start date:28.10.2021
                      Start time:04:52:34
                      Joe Sandbox Product:CloudBasic
                      Overall analysis duration:0h 8m 46s
                      Hypervisor based Inspection enabled:false
                      Report type:light
                      Sample file name:SecuriteInfo.com.Trojan.Win32.Save.a.28377.dll
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                      Run name:Run with higher sleep bypass
                      Number of analysed new started processes analysed:24
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • HDC enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Detection:MAL
                      Classification:mal84.troj.evad.winDLL@23/6@0/3
                      EGA Information:Failed
                      HDC Information:
                      • Successful, ratio: 92.5% (good quality ratio 82.9%)
                      • Quality average: 74.4%
                      • Quality standard deviation: 33.3%
                      HCA Information:
                      • Successful, ratio: 73%
                      • Number of executed functions: 0
                      • Number of non-executed functions: 0
                      Cookbook Comments:
                      • Adjust boot time
                      • Enable AMSI
                      • Sleeps bigger than 120000ms are automatically reduced to 1000ms
                      • Found application associated with file extension: .dll
                      Warnings:
                      Show All
                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, WerFault.exe, WMIADAP.exe, conhost.exe, backgroundTaskHost.exe, svchost.exe
                      • Excluded IPs from analysis (whitelisted): 8.248.133.254, 8.253.204.120, 67.27.158.126, 67.27.235.126, 67.27.233.254, 20.82.210.154, 20.190.160.4, 20.190.160.134, 20.190.160.8, 20.190.160.136, 20.190.160.132, 20.190.160.69, 20.190.160.73, 20.190.160.71, 20.42.65.92, 104.208.16.94, 20.42.73.29
                      • Excluded domains from analysis (whitelisted): fg.download.windowsupdate.com.c.footprint.net, wu-shim.trafficmanager.net, ctldl.windowsupdate.com, iris-de-prod-azsc-neu-b.northeurope.cloudapp.azure.com, www.tm.a.prd.aadg.akadns.net, arc.msn.com, login.msa.msidentity.com, onedsblobprdeus17.eastus.cloudapp.azure.com, login.live.com, blobcollector.events.data.trafficmanager.net, onedsblobprdeus15.eastus.cloudapp.azure.com, arc.trafficmanager.net, watson.telemetry.microsoft.com, www.tm.lg.prod.aadmsa.trafficmanager.net, onedsblobprdcus16.centralus.cloudapp.azure.com
                      • Not all processes where analyzed, report is missing behavior information
                      • Report size exceeded maximum capacity and may have missing behavior information.

                      Simulations

                      Behavior and APIs

                      No simulations

                      Joe Sandbox View / Context

                      IPs

                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                      66.147.235.11SecuriteInfo.com.Drixed-FJXEDADFD868F1D.21569.dllGet hashmaliciousBrowse
                        SecuriteInfo.com.Drixed-FJXE53A16BEA791.13728.dllGet hashmaliciousBrowse
                          SecuriteInfo.com.Drixed-FJXEDADFD868F1D.21569.dllGet hashmaliciousBrowse
                            SecuriteInfo.com.Trojan.Win32.Save.a.28377.dllGet hashmaliciousBrowse
                              SecuriteInfo.com.Trojan.Win32.Save.a.16213.dllGet hashmaliciousBrowse
                                SecuriteInfo.com.Trojan.Win32.Save.a.16213.dllGet hashmaliciousBrowse
                                  Early_Access.-3878_20211027.xlsbGet hashmaliciousBrowse
                                    ckrgvIQvmUux.dllGet hashmaliciousBrowse
                                      ckrgvIQvmUux.dllGet hashmaliciousBrowse
                                        Casting Invite.-859403670_20211027.xlsbGet hashmaliciousBrowse
                                          149.202.179.100SecuriteInfo.com.Drixed-FJXEDADFD868F1D.21569.dllGet hashmaliciousBrowse
                                            SecuriteInfo.com.Drixed-FJXE53A16BEA791.13728.dllGet hashmaliciousBrowse
                                              SecuriteInfo.com.Drixed-FJXEDADFD868F1D.21569.dllGet hashmaliciousBrowse
                                                SecuriteInfo.com.Trojan.Win32.Save.a.28377.dllGet hashmaliciousBrowse
                                                  SecuriteInfo.com.Trojan.Win32.Save.a.16213.dllGet hashmaliciousBrowse
                                                    SecuriteInfo.com.Trojan.Win32.Save.a.16213.dllGet hashmaliciousBrowse
                                                      Early_Access.-3878_20211027.xlsbGet hashmaliciousBrowse
                                                        ckrgvIQvmUux.dllGet hashmaliciousBrowse
                                                          ckrgvIQvmUux.dllGet hashmaliciousBrowse
                                                            Casting Invite.-859403670_20211027.xlsbGet hashmaliciousBrowse

                                                              Domains

                                                              No context

                                                              ASN

                                                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                              HOSTROCKETUSSecuriteInfo.com.Drixed-FJXEDADFD868F1D.21569.dllGet hashmaliciousBrowse
                                                              • 66.147.235.11
                                                              SecuriteInfo.com.Drixed-FJXE53A16BEA791.13728.dllGet hashmaliciousBrowse
                                                              • 66.147.235.11
                                                              SecuriteInfo.com.Drixed-FJXEDADFD868F1D.21569.dllGet hashmaliciousBrowse
                                                              • 66.147.235.11
                                                              SecuriteInfo.com.Trojan.Win32.Save.a.28377.dllGet hashmaliciousBrowse
                                                              • 66.147.235.11
                                                              SecuriteInfo.com.Trojan.Win32.Save.a.16213.dllGet hashmaliciousBrowse
                                                              • 66.147.235.11
                                                              SecuriteInfo.com.Trojan.Win32.Save.a.16213.dllGet hashmaliciousBrowse
                                                              • 66.147.235.11
                                                              Early_Access.-3878_20211027.xlsbGet hashmaliciousBrowse
                                                              • 66.147.235.11
                                                              ckrgvIQvmUux.dllGet hashmaliciousBrowse
                                                              • 66.147.235.11
                                                              ckrgvIQvmUux.dllGet hashmaliciousBrowse
                                                              • 66.147.235.11
                                                              Casting Invite.-859403670_20211027.xlsbGet hashmaliciousBrowse
                                                              • 66.147.235.11
                                                              s1uOMLvpO4.exeGet hashmaliciousBrowse
                                                              • 216.120.236.127
                                                              WGs54P9e8aGet hashmaliciousBrowse
                                                              • 216.120.241.108
                                                              ba2Eq178BGXyW5T.exeGet hashmaliciousBrowse
                                                              • 216.120.237.68
                                                              4TXvMuUjTxE2kqz.exeGet hashmaliciousBrowse
                                                              • 66.147.239.119
                                                              Requirements-oct_2020.exeGet hashmaliciousBrowse
                                                              • 66.147.239.119
                                                              JESEE FRIED FIRDAY.exeGet hashmaliciousBrowse
                                                              • 66.147.239.119
                                                              Scan_0884218630071 Bank Swift.exeGet hashmaliciousBrowse
                                                              • 66.147.239.119
                                                              BANK ACCOUNT DETAILS ATTACHED.pdf.exeGet hashmaliciousBrowse
                                                              • 66.147.239.119
                                                              XYmX3bLQJ9.xlsGet hashmaliciousBrowse
                                                              • 66.147.238.141
                                                              payment730.xlsGet hashmaliciousBrowse
                                                              • 66.147.238.141
                                                              OVHFRSecuriteInfo.com.Drixed-FJXEDADFD868F1D.21569.dllGet hashmaliciousBrowse
                                                              • 149.202.179.100
                                                              SecuriteInfo.com.Drixed-FJXE53A16BEA791.13728.dllGet hashmaliciousBrowse
                                                              • 149.202.179.100
                                                              SecuriteInfo.com.Drixed-FJXEDADFD868F1D.21569.dllGet hashmaliciousBrowse
                                                              • 149.202.179.100
                                                              SecuriteInfo.com.Trojan.Win32.Save.a.28377.dllGet hashmaliciousBrowse
                                                              • 149.202.179.100
                                                              SecuriteInfo.com.Trojan.Win32.Save.a.16213.dllGet hashmaliciousBrowse
                                                              • 149.202.179.100
                                                              SecuriteInfo.com.Trojan.Win32.Save.a.16213.dllGet hashmaliciousBrowse
                                                              • 149.202.179.100
                                                              protocol-1096018033.xlsGet hashmaliciousBrowse
                                                              • 192.99.46.215
                                                              protocol-1096018033.xlsGet hashmaliciousBrowse
                                                              • 192.99.46.215
                                                              arm7Get hashmaliciousBrowse
                                                              • 8.33.207.78
                                                              #U0191ACTU#U0156A_wfpqacDkwlb__Z2676679.vbsGet hashmaliciousBrowse
                                                              • 144.217.33.249
                                                              Byov62cXa1.exeGet hashmaliciousBrowse
                                                              • 94.23.24.82
                                                              Early_Access.-3878_20211027.xlsbGet hashmaliciousBrowse
                                                              • 149.202.179.100
                                                              ckrgvIQvmUux.dllGet hashmaliciousBrowse
                                                              • 149.202.179.100
                                                              ckrgvIQvmUux.dllGet hashmaliciousBrowse
                                                              • 149.202.179.100
                                                              Casting Invite.-859403670_20211027.xlsbGet hashmaliciousBrowse
                                                              • 149.202.179.100
                                                              lyVSOhLA7o.dllGet hashmaliciousBrowse
                                                              • 51.210.102.137
                                                              protocol-1441399238.xlsGet hashmaliciousBrowse
                                                              • 192.99.46.215
                                                              protocol-1441399238.xlsGet hashmaliciousBrowse
                                                              • 192.99.46.215
                                                              protocol-1086855687.xlsGet hashmaliciousBrowse
                                                              • 192.99.46.215
                                                              protocol-1086855687.xlsGet hashmaliciousBrowse
                                                              • 192.99.46.215

                                                              JA3 Fingerprints

                                                              No context

                                                              Dropped Files

                                                              No context

                                                              Created / dropped Files

                                                              C:\ProgramData\Microsoft\Windows\WER\Temp\WERCF97.tmp.dmp
                                                              Process:C:\Windows\SysWOW64\WerFault.exe
                                                              File Type:Mini DuMP crash report, 14 streams, Thu Oct 28 12:00:21 2021, 0x1205a4 type
                                                              Category:dropped
                                                              Size (bytes):42702
                                                              Entropy (8bit):2.207124165645606
                                                              Encrypted:false
                                                              SSDEEP:192:VZdlaApHpPO5SkbnNXEApvXmSOqM43Y45/iwl7PDS:DKp5LbNXEqO2MOY45/3DD
                                                              MD5:DB0652CF648D9BCF1F5AB9194E1F68C1
                                                              SHA1:3DC406319171C59F344FB33F695D8CFD04B4EBA1
                                                              SHA-256:16C41435B544898BC70360A83C2FA50B6B1A3C9DA505EE93C5114909151D7A84
                                                              SHA-512:C16019E1BAC092F1BB9E99792EBA7E5F137AA82EDE959AE22963F910C80A39A266488B578C26E5AC967520BE1959207CD272D415014584153EE9D7DD80F5A32C
                                                              Malicious:false
                                                              Preview: MDMP....... ........za........................................(-..........T.......8...........T...........................0................................................................................U...........B..............GenuineIntelW...........T...........t.za.............................0..=...............P.a.c.i.f.i.c. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................P.a.c.i.f.i.c. .D.a.y.l.i.g.h.t. .T.i.m.e...........................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.....................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                              C:\ProgramData\Microsoft\Windows\WER\Temp\WERD321.tmp.dmp
                                                              Process:C:\Windows\SysWOW64\WerFault.exe
                                                              File Type:Mini DuMP crash report, 14 streams, Thu Oct 28 12:00:22 2021, 0x1205a4 type
                                                              Category:dropped
                                                              Size (bytes):45982
                                                              Entropy (8bit):2.099881264021738
                                                              Encrypted:false
                                                              SSDEEP:192:mjbaApNpB9WZO5SkbRF09Tm+e9J2aKY8D+zfCZKnpN5NTqugn:Bwp5LboQJ2aKYlfpnpN/g
                                                              MD5:D2C917AA03B5BE458524EDE31C8BF2E3
                                                              SHA1:8107F1286AD10187FD5109F17D75AEC43ED1C45F
                                                              SHA-256:CD92C35C4C9B8ECF3827BDAD5A7C1B7339FE87A1CD79E7B1A5542CFA02DA8D03
                                                              SHA-512:8C88E3B26DABF9D1592308A198413BC080232550A7BF5D500019F12081AF57D0D94C1BDAACFC07DC3EF26FE417808FE7D5B0392C4F7A5E519593BB5656320076
                                                              Malicious:false
                                                              Preview: MDMP....... ........za........................................(-..........T.......8...........T...........................0................................................................................U...........B..............GenuineIntelW...........T...........u.za.............................0..=...............P.a.c.i.f.i.c. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................P.a.c.i.f.i.c. .D.a.y.l.i.g.h.t. .T.i.m.e...........................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.....................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                              C:\ProgramData\Microsoft\Windows\WER\Temp\WERDA56.tmp.WERInternalMetadata.xml
                                                              Process:C:\Windows\SysWOW64\WerFault.exe
                                                              File Type:XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                              Category:dropped
                                                              Size (bytes):8346
                                                              Entropy (8bit):3.697784594736263
                                                              Encrypted:false
                                                              SSDEEP:192:Rrl7r3GLNijE6Bz6Yxp6jmgmfTHSwCprI89bL9sft65m:RrlsNig6Bz6Yf6igmfTHSdL2ff
                                                              MD5:A865B108032789E908917669D003D0F9
                                                              SHA1:757F83168C63440CBC9EF8E26FECABDBEAB57BFB
                                                              SHA-256:52AAA5643776D7D5ED46F89B273A887DB942CE9780B5C465E65049F2C0099C4B
                                                              SHA-512:1E5AFF0F2E51373814E9EE405F579A6826781F8DB71698D2FA133B51532533C7039BC8804707792F90ECC53C1FC0CBDC8E7102ED86423AE4E15D23C9B3B54837
                                                              Malicious:false
                                                              Preview: ..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.1.4.4.<./.P.i.d.>.......
                                                              C:\ProgramData\Microsoft\Windows\WER\Temp\WERDE10.tmp.xml
                                                              Process:C:\Windows\SysWOW64\WerFault.exe
                                                              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                              Category:dropped
                                                              Size (bytes):4694
                                                              Entropy (8bit):4.491266080632903
                                                              Encrypted:false
                                                              SSDEEP:48:cvIwSD8zsNJgtWI94eWSC8Bt8fm8M4JCdsRFL+q8/Jbw4SrSSd:uITfnLfSNYJ18wDWSd
                                                              MD5:3F94544E2C46B95C25E14F305717973C
                                                              SHA1:CE511706AE2CA5A6FB0C38819387B2AEA3DD3549
                                                              SHA-256:E286808229401A1183E3B16E4812CD7CC05815D03E502123FAAD69EC9AB1A19F
                                                              SHA-512:C6395FD197D9B5C27BEED75D2C7A54531902BC5A81041848DD32A43C7580290DA58E912C0682F7894FAF5508D6EB6C4A2F1173F99CEC4604D9D2CFF561599A82
                                                              Malicious:false
                                                              Preview: <?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="1229591" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
                                                              C:\ProgramData\Microsoft\Windows\WER\Temp\WERDF95.tmp.WERInternalMetadata.xml
                                                              Process:C:\Windows\SysWOW64\WerFault.exe
                                                              File Type:XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                              Category:dropped
                                                              Size (bytes):8346
                                                              Entropy (8bit):3.6960872073756694
                                                              Encrypted:false
                                                              SSDEEP:192:Rrl7r3GLNiGQ656YxJ6jmgmfTiSgCprk89bCXsfj2m:RrlsNi5656Y/6igmfTiSJCcfb
                                                              MD5:C598E8847032D22DE4336DC03715CA84
                                                              SHA1:7FE6F4EF927331D8CF98FB2E03A4D4CA131D67DF
                                                              SHA-256:A82ACA21C9EDEB3EF31B77AF5959D8C83D3C2814640F0EA9401F6BC71F2CE664
                                                              SHA-512:12A7EC6FD4522157DB999F7C2247FBDB75E7075D613B3C66D2A7510574D6E93AF0047607DEC2C45E0FA4E620A6F55B43BE8392891860F0D85FD47933633D5DD0
                                                              Malicious:false
                                                              Preview: ..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.2.9.6.<./.P.i.d.>.......
                                                              C:\ProgramData\Microsoft\Windows\WER\Temp\WERE0CF.tmp.xml
                                                              Process:C:\Windows\SysWOW64\WerFault.exe
                                                              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                              Category:dropped
                                                              Size (bytes):4694
                                                              Entropy (8bit):4.49012452156466
                                                              Encrypted:false
                                                              SSDEEP:48:cvIwSD8zsNJgtWI9wkckWSC8BY8fm8M4JCdsoFu+q8/JMd4SrSVd:uITfnyc9SNzJZZDWVd
                                                              MD5:B3001A8D69959B513E4C32F8498E9A51
                                                              SHA1:DE60C3446E86F7F99BF4F47F1CD3DE8B63B276E4
                                                              SHA-256:8332ABDFE622AD0816941B5EB74996F7CF83F01E0DFE8B0D08BFA90021845277
                                                              SHA-512:F3365D1CB94415F2EBED370243FE01E7D4059837476540FADBDB1DE4BD06B3A0977838DDE89D5F50CF2222245E6117F3D37CD468B0472AB936201E2E4C88D3FF
                                                              Malicious:false
                                                              Preview: <?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="1229591" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..

                                                              Static File Info

                                                              General

                                                              File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                              Entropy (8bit):7.160195302212999
                                                              TrID:
                                                              • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
                                                              • Generic Win/DOS Executable (2004/3) 0.20%
                                                              • DOS Executable Generic (2002/1) 0.20%
                                                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                              File name:SecuriteInfo.com.Trojan.Win32.Save.a.28377.dll
                                                              File size:1093632
                                                              MD5:2228471d39760f9a389ac95f71b671a9
                                                              SHA1:38b7d35e72c995ca526e293af9d448a7a8011df6
                                                              SHA256:a9238550f705b9668a390a9e7b9e4dec6a88daec2c8acca19ffa10af328d594d
                                                              SHA512:48d40173dfbc5dd798efbae2252b9599d2dd88b3a9b9535e4f7203de79bd272c24b5c914f5b809774d1b3b146b8fd3a12446bc4d5855959eca3229e0a97b7194
                                                              SSDEEP:24576:tjsXggYiykQsMy2GSuCAaimSQws2yyq+YoWEUK6ES0wOyeSGwswWquEQq2GiMcis:m
                                                              File Content Preview:MZ......................@........................................IZ..(4..(4..(4..z..&)4.....Z)4..Q...)4..u5..(4.....K(4..v6."(4.7....(4. ...,(4.....i(4.....Z(4..(5.f)4.Rich.(4.........................PE..L...&.ya...........!.... `...P.......K.......p.....

                                                              File Icon

                                                              Icon Hash:74f0e4ecccdce0e4

                                                              Static PE Info

                                                              General

                                                              Entrypoint:0x10004b90
                                                              Entrypoint Section:.text
                                                              Digitally signed:false
                                                              Imagebase:0x10000000
                                                              Subsystem:windows gui
                                                              Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
                                                              DLL Characteristics:DYNAMIC_BASE, NX_COMPAT
                                                              Time Stamp:0x61798526 [Wed Oct 27 16:58:14 2021 UTC]
                                                              TLS Callbacks:
                                                              CLR (.Net) Version:
                                                              OS Version Major:5
                                                              OS Version Minor:0
                                                              File Version Major:5
                                                              File Version Minor:0
                                                              Subsystem Version Major:5
                                                              Subsystem Version Minor:0
                                                              Import Hash:ae858e1bcf44b240b65263bbd6945db2

                                                              Entrypoint Preview

                                                              Instruction
                                                              mov eax, dword ptr [10106128h]
                                                              call eax
                                                              mov edx, eax
                                                              ret
                                                              int3
                                                              int3
                                                              int3
                                                              int3
                                                              int3
                                                              int3
                                                              push ebp
                                                              mov ebp, esp
                                                              push ebx
                                                              push edi
                                                              push esi
                                                              and esp, FFFFFFF8h
                                                              sub esp, 000000A8h
                                                              mov eax, dword ptr [ebp+08h]
                                                              mov dword ptr [esp+0000009Ch], 008A6C3Fh
                                                              mov byte ptr [esp+00000083h], 00000072h
                                                              mov dword ptr [esp+6Ch], 6C57D91Ch
                                                              mov dword ptr [esp+00000094h], 00000000h
                                                              mov dword ptr [esp+00000090h], 0093F6B2h
                                                              mov ecx, dword ptr [ebp+08h]
                                                              mov edx, esp
                                                              mov dword ptr [edx], ecx
                                                              mov dword ptr [esp+38h], eax
                                                              call 00007F4854B78312h
                                                              movzx ecx, word ptr [esp+000000A2h]
                                                              mov si, cx
                                                              mov word ptr [esp+000000A2h], B4E5h
                                                              mov byte ptr [esp+37h], al
                                                              mov dword ptr [esp+30h], ecx
                                                              mov word ptr [esp+2Eh], si
                                                              call 00007F4854B7868Bh
                                                              mov ecx, dword ptr [esp+0000008Ch]
                                                              mov edx, ecx
                                                              add edx, DE3924BAh
                                                              mov dword ptr [esp+0000008Ch], edx
                                                              mov dword ptr [esp+70h], eax
                                                              mov eax, dword ptr [esp+30h]
                                                              add eax, eax
                                                              mov si, ax
                                                              mov word ptr [esp+000000A2h], si
                                                              mov eax, dword ptr [esp+70h]
                                                              mov edx, dword ptr [esp+00000090h]
                                                              mov edi, dword ptr [esp+00000094h]

                                                              Data Directories

                                                              NameVirtual AddressVirtual Size Is in Section
                                                              IMAGE_DIRECTORY_ENTRY_EXPORT0xfad600x5f.rdata
                                                              IMAGE_DIRECTORY_ENTRY_IMPORT0xfae3c0xb4.rdata
                                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x1080000x3e8.rsrc
                                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x1090000x2a38.reloc
                                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x705c0x38.rdata
                                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_IAT0x70000x44.rdata
                                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                              Sections

                                                              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                              .text0x10000x5dfe0x6000False0.381795247396data4.41548626837IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                              .rdata0x70000xf40320xf5000False0.135155253508data7.11998014415IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                              .data0xfc0000xbd1c0xb000False0.234153053977data5.69509557044IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                                              .rsrc0x1080000x3e80x1000False0.119873046875data1.03136554304IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                              .reloc0x1090000x2a380x3000False0.231608072917data5.67874721692IMAGE_SCN_TYPE_GROUP, IMAGE_SCN_TYPE_COPY, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                              Resources

                                                              NameRVASizeTypeLanguageCountry
                                                              RT_VERSION0x1080600x388data

                                                              Imports

                                                              DLLImport
                                                              SHELL32.dllSHGetDesktopFolder
                                                              IPHLPAPI.DLLGetIfTable
                                                              ADVAPI32.dllRegOverridePredefKey
                                                              msvcrt.dllmemset
                                                              OLEAUT32.dllVarR4FromI2
                                                              KERNEL32.dllCreateFileW, GetModuleFileNameW
                                                              SETUPAPI.dllSetupDiEnumDeviceInfo
                                                              USER32.dllShowOwnedPopups

                                                              Exports

                                                              NameOrdinalAddress
                                                              FFRgpmdlwwWde10x100fadb0

                                                              Version Infos

                                                              DescriptionData
                                                              LegalCopyrightCopyright 2004
                                                              InternalNameddlb
                                                              FileVersion5.2.00.0
                                                              Full Version5.2.0_00-b00
                                                              CompanyNameSun Microsystems, Inc.
                                                              ProductNameDdlb(EA) 2 Tsyfezyt Bidibhex Ernseqa 5.0 Urdate 6
                                                              ProductVersion5.2.00.0
                                                              FileDescriptionJava(TM) 2 Platform Standard Edition binary
                                                              OriginalFilenameddlb.dll
                                                              Translation0x0000 0x04b0

                                                              Network Behavior

                                                              No network behavior found

                                                              Code Manipulations

                                                              Statistics

                                                              Behavior

                                                              Click to jump to process

                                                              System Behavior

                                                              General

                                                              Start time:04:57:19
                                                              Start date:28/10/2021
                                                              Path:C:\Windows\System32\loaddll32.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:loaddll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.28377.dll'
                                                              Imagebase:0xae0000
                                                              File size:893440 bytes
                                                              MD5 hash:72FCD8FB0ADC38ED9050569AD673650E
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:moderate

                                                              General

                                                              Start time:04:57:20
                                                              Start date:28/10/2021
                                                              Path:C:\Windows\SysWOW64\cmd.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.28377.dll',#1
                                                              Imagebase:0xd80000
                                                              File size:232960 bytes
                                                              MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:high

                                                              General

                                                              Start time:04:57:20
                                                              Start date:28/10/2021
                                                              Path:C:\Windows\SysWOW64\rundll32.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.28377.dll,FFRgpmdlwwWde
                                                              Imagebase:0x900000
                                                              File size:61952 bytes
                                                              MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Yara matches:
                                                              • Rule: JoeSecurity_Dridex_1, Description: Yara detected Dridex unpacked file, Source: 00000003.00000000.423290755.000000006E8B1000.00000020.00020000.sdmp, Author: Joe Security
                                                              Reputation:high

                                                              General

                                                              Start time:04:57:20
                                                              Start date:28/10/2021
                                                              Path:C:\Windows\SysWOW64\rundll32.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.28377.dll',#1
                                                              Imagebase:0x900000
                                                              File size:61952 bytes
                                                              MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Yara matches:
                                                              • Rule: JoeSecurity_Dridex_1, Description: Yara detected Dridex unpacked file, Source: 00000004.00000002.697384477.000000006E8B1000.00000020.00020000.sdmp, Author: Joe Security
                                                              Reputation:high

                                                              General

                                                              Start time:04:58:44
                                                              Start date:28/10/2021
                                                              Path:C:\Windows\SysWOW64\rundll32.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.28377.dll',CheckTrust
                                                              Imagebase:0x900000
                                                              File size:61952 bytes
                                                              MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Yara matches:
                                                              • Rule: JoeSecurity_Dridex_1, Description: Yara detected Dridex unpacked file, Source: 00000009.00000002.780387984.000000006E8B1000.00000020.00020000.sdmp, Author: Joe Security
                                                              Reputation:high

                                                              General

                                                              Start time:04:58:45
                                                              Start date:28/10/2021
                                                              Path:C:\Windows\SysWOW64\rundll32.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.28377.dll',DllCanUnloadNow
                                                              Imagebase:0x900000
                                                              File size:61952 bytes
                                                              MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Yara matches:
                                                              • Rule: JoeSecurity_Dridex_1, Description: Yara detected Dridex unpacked file, Source: 0000000B.00000002.753337263.000000006E8B1000.00000020.00020000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_Dridex_1, Description: Yara detected Dridex unpacked file, Source: 0000000B.00000000.698176529.000000006E8B1000.00000020.00020000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_Dridex_1, Description: Yara detected Dridex unpacked file, Source: 0000000B.00000000.676132737.000000006E8B1000.00000020.00020000.sdmp, Author: Joe Security
                                                              Reputation:high

                                                              General

                                                              Start time:04:58:46
                                                              Start date:28/10/2021
                                                              Path:C:\Windows\SysWOW64\rundll32.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.28377.dll',DllGetClassObject
                                                              Imagebase:0x900000
                                                              File size:61952 bytes
                                                              MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Yara matches:
                                                              • Rule: JoeSecurity_Dridex_1, Description: Yara detected Dridex unpacked file, Source: 0000000C.00000000.680670011.000000006E8B1000.00000020.00020000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_Dridex_1, Description: Yara detected Dridex unpacked file, Source: 0000000C.00000002.719392684.000000006E8B1000.00000020.00020000.sdmp, Author: Joe Security
                                                              Reputation:high

                                                              General

                                                              Start time:04:58:47
                                                              Start date:28/10/2021
                                                              Path:C:\Windows\SysWOW64\rundll32.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.28377.dll',DownloadFile
                                                              Imagebase:0x900000
                                                              File size:61952 bytes
                                                              MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Yara matches:
                                                              • Rule: JoeSecurity_Dridex_1, Description: Yara detected Dridex unpacked file, Source: 0000000D.00000000.682183733.000000006E8B1000.00000020.00020000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_Dridex_1, Description: Yara detected Dridex unpacked file, Source: 0000000D.00000002.749868846.000000006E8B1000.00000020.00020000.sdmp, Author: Joe Security
                                                              Reputation:high

                                                              General

                                                              Start time:04:58:49
                                                              Start date:28/10/2021
                                                              Path:C:\Windows\SysWOW64\rundll32.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.28377.dll',GetICifFileFromFile
                                                              Imagebase:0x900000
                                                              File size:61952 bytes
                                                              MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Yara matches:
                                                              • Rule: JoeSecurity_Dridex_1, Description: Yara detected Dridex unpacked file, Source: 0000000E.00000000.701129229.000000006E8B1000.00000020.00020000.sdmp, Author: Joe Security

                                                              General

                                                              Start time:05:00:10
                                                              Start date:28/10/2021
                                                              Path:C:\Windows\SysWOW64\WerFault.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7144 -s 652
                                                              Imagebase:0xd90000
                                                              File size:434592 bytes
                                                              MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language

                                                              General

                                                              Start time:05:00:15
                                                              Start date:28/10/2021
                                                              Path:C:\Windows\SysWOW64\WerFault.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6296 -s 652
                                                              Imagebase:0xd90000
                                                              File size:434592 bytes
                                                              MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language

                                                              Disassembly

                                                              Code Analysis

                                                              Reset < >