Loading ...

Play interactive tourEdit tour

Windows Analysis Report SecuriteInfo.com.W32.AIDetect.malware1.4295.dll

Overview

General Information

Sample Name:SecuriteInfo.com.W32.AIDetect.malware1.4295.dll
Analysis ID:544174
MD5:57cc0ec93c55348dd7b864e26ec96379
SHA1:bcf46bb64fc5a673e7889d9ba9baad26bfab0ff7
SHA256:60bd3eba4dac7d37cd07e375f4dbfe5e816b0ab599f28da31c5cf5b180b5849a
Tags:dllDridex
Infos:

Most interesting Screenshot:

Detection

Dridex
Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Yara detected Dridex unpacked file
Multi AV Scanner detection for submitted file
Sigma detected: Suspicious Call by Ordinal
Tries to delay execution (extensive OutputDebugStringW loop)
C2 URLs / IPs found in malware configuration
Uses 32bit PE files
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
AV process strings found (often used to terminate AV products)
Sample file is different than original file name gathered from version info
One or more processes crash
Contains functionality to query locales information (e.g. system language)
Uses code obfuscation techniques (call, push, ret)
Checks if the current process is being debugged
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to call native functions
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Creates a process in suspended mode (likely to inject code)
IP address seen in connection with other malware
Entry point lies outside standard sections
Abnormal high CPU Usage

Classification

Process Tree

  • System is w10x64
  • loaddll32.exe (PID: 6296 cmdline: loaddll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.4295.dll" MD5: 7DEB5DB86C0AC789123DEC286286B938)
    • cmd.exe (PID: 6328 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.4295.dll",#1 MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • rundll32.exe (PID: 6368 cmdline: rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.4295.dll",#1 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
        • WerFault.exe (PID: 6564 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6368 -s 684 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
  • cleanup

Malware Configuration

Threatname: Dridex

{"Version": 22201, "C2 list": ["144.91.122.102:443", "85.10.248.28:593", "185.4.135.27:5228", "80.211.3.13:8116"], "RC4 keys": ["3IC8sFlUX9XZuoBQY9u5LhcZnHsV7E5r", "hnk63OiMfIbUqQnY7gkPwplwC0Ue5ZkZBYMCTYTjntqX7zsy9OvtNUlthJZXRtFF6P52Zbz6R5"]}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000002.00000000.263879217.000000006E831000.00000020.00020000.sdmpJoeSecurity_Dridex_1Yara detected Dridex unpacked fileJoe Security
    00000000.00000002.654367413.000000006E831000.00000020.00020000.sdmpJoeSecurity_Dridex_1Yara detected Dridex unpacked fileJoe Security
      00000002.00000002.303178231.000000006E831000.00000020.00020000.sdmpJoeSecurity_Dridex_1Yara detected Dridex unpacked fileJoe Security
        00000002.00000000.261899992.000000006E831000.00000020.00020000.sdmpJoeSecurity_Dridex_1Yara detected Dridex unpacked fileJoe Security

          Unpacked PEs

          SourceRuleDescriptionAuthorStrings
          2.0.rundll32.exe.6e830000.2.unpackJoeSecurity_Dridex_1Yara detected Dridex unpacked fileJoe Security
            0.2.loaddll32.exe.6e830000.2.unpackJoeSecurity_Dridex_1Yara detected Dridex unpacked fileJoe Security
              2.2.rundll32.exe.6e830000.2.unpackJoeSecurity_Dridex_1Yara detected Dridex unpacked fileJoe Security
                2.0.rundll32.exe.6e830000.5.unpackJoeSecurity_Dridex_1Yara detected Dridex unpacked fileJoe Security

                  Sigma Overview

                  System Summary:

                  barindex
                  Sigma detected: Suspicious Call by OrdinalShow sources
                  Source: Process startedAuthor: Florian Roth: Data: Command: rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.4295.dll",#1, CommandLine: rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.4295.dll",#1, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\rundll32.exe, NewProcessName: C:\Windows\SysWOW64\rundll32.exe, OriginalFileName: C:\Windows\SysWOW64\rundll32.exe, ParentCommandLine: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.4295.dll",#1, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 6328, ProcessCommandLine: rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.4295.dll",#1, ProcessId: 6368

                  Jbx Signature Overview

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection:

                  barindex
                  Found malware configurationShow sources
                  Source: 0.2.loaddll32.exe.6e830000.2.unpackMalware Configuration Extractor: Dridex {"Version": 22201, "C2 list": ["144.91.122.102:443", "85.10.248.28:593", "185.4.135.27:5228", "80.211.3.13:8116"], "RC4 keys": ["3IC8sFlUX9XZuoBQY9u5LhcZnHsV7E5r", "hnk63OiMfIbUqQnY7gkPwplwC0Ue5ZkZBYMCTYTjntqX7zsy9OvtNUlthJZXRtFF6P52Zbz6R5"]}
                  Multi AV Scanner detection for submitted fileShow sources
                  Source: SecuriteInfo.com.W32.AIDetect.malware1.4295.dllVirustotal: Detection: 23%Perma Link
                  Source: SecuriteInfo.com.W32.AIDetect.malware1.4295.dllReversingLabs: Detection: 25%
                  Source: SecuriteInfo.com.W32.AIDetect.malware1.4295.dllStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
                  Source: SecuriteInfo.com.W32.AIDetect.malware1.4295.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT
                  Source: Binary string: ws2_32.pdb;. source: WerFault.exe, 00000006.00000003.273943910.0000000004F76000.00000004.00000040.sdmp
                  Source: Binary string: bcrypt.pdbq. source: WerFault.exe, 00000006.00000003.273943910.0000000004F76000.00000004.00000040.sdmp
                  Source: Binary string: wkernel32.pdb source: WerFault.exe, 00000006.00000003.268112270.0000000004C5D000.00000004.00000001.sdmp, WerFault.exe, 00000006.00000003.269479129.0000000004C5D000.00000004.00000001.sdmp, WerFault.exe, 00000006.00000003.269438809.0000000002E16000.00000004.00000001.sdmp, WerFault.exe, 00000006.00000003.268022167.0000000002E16000.00000004.00000001.sdmp, WerFault.exe, 00000006.00000003.269822443.0000000004C5E000.00000004.00000001.sdmp, WerFault.exe, 00000006.00000003.273891782.0000000004C5E000.00000004.00000001.sdmp, WerFault.exe, 00000006.00000003.273931070.0000000004FA1000.00000004.00000001.sdmp
                  Source: Binary string: sfc_os.pdb source: WerFault.exe, 00000006.00000003.273943910.0000000004F76000.00000004.00000040.sdmp
                  Source: Binary string: bcrypt.pdb source: WerFault.exe, 00000006.00000003.273943910.0000000004F76000.00000004.00000040.sdmp
                  Source: Binary string: ucrtbase.pdb source: WerFault.exe, 00000006.00000003.273937807.0000000004F70000.00000004.00000040.sdmp
                  Source: Binary string: msvcrt.pdb source: WerFault.exe, 00000006.00000003.273931070.0000000004FA1000.00000004.00000001.sdmp
                  Source: Binary string: wrpcrt4.pdb source: WerFault.exe, 00000006.00000003.273937807.0000000004F70000.00000004.00000040.sdmp
                  Source: Binary string: wntdll.pdb source: loaddll32.exe, 00000000.00000003.266556290.000000004B280000.00000004.00000001.sdmp, WerFault.exe, 00000006.00000003.268157671.0000000002E10000.00000004.00000001.sdmp, WerFault.exe, 00000006.00000003.269628951.0000000002E10000.00000004.00000001.sdmp, WerFault.exe, 00000006.00000003.273931070.0000000004FA1000.00000004.00000001.sdmp
                  Source: Binary string: shcore.pdb source: WerFault.exe, 00000006.00000003.273937807.0000000004F70000.00000004.00000040.sdmp
                  Source: Binary string: wgdi32.pdb source: WerFault.exe, 00000006.00000003.273931070.0000000004FA1000.00000004.00000001.sdmp
                  Source: Binary string: advapi32.pdb source: WerFault.exe, 00000006.00000003.273943910.0000000004F76000.00000004.00000040.sdmp
                  Source: Binary string: fltLib.pdb source: WerFault.exe, 00000006.00000003.273943910.0000000004F76000.00000004.00000040.sdmp
                  Source: Binary string: wsspicli.pdb source: WerFault.exe, 00000006.00000003.273943910.0000000004F76000.00000004.00000040.sdmp
                  Source: Binary string: shell32.pdb source: WerFault.exe, 00000006.00000003.273937807.0000000004F70000.00000004.00000040.sdmp
                  Source: Binary string: msvcp_win.pdb source: WerFault.exe, 00000006.00000003.273931070.0000000004FA1000.00000004.00000001.sdmp
                  Source: Binary string: dwmapi.pdbD; source: WerFault.exe, 00000006.00000003.273943910.0000000004F76000.00000004.00000040.sdmp
                  Source: Binary string: wkernelbase.pdb source: WerFault.exe, 00000006.00000003.268035308.0000000002E1C000.00000004.00000001.sdmp, WerFault.exe, 00000006.00000003.269053101.0000000002E1C000.00000004.00000001.sdmp, WerFault.exe, 00000006.00000003.273931070.0000000004FA1000.00000004.00000001.sdmp, WerFault.exe, 00000006.00000003.268187692.0000000002E1C000.00000004.00000001.sdmp
                  Source: Binary string: wimm32.pdb source: WerFault.exe, 00000006.00000003.273943910.0000000004F76000.00000004.00000040.sdmp
                  Source: Binary string: shlwapi.pdb source: WerFault.exe, 00000006.00000003.273943910.0000000004F76000.00000004.00000040.sdmp
                  Source: Binary string: mpr.pdb source: WerFault.exe, 00000006.00000003.273937807.0000000004F70000.00000004.00000040.sdmp
                  Source: Binary string: wwin32u.pdb source: WerFault.exe, 00000006.00000003.273931070.0000000004FA1000.00000004.00000001.sdmp
                  Source: Binary string: setupapi.pdb source: WerFault.exe, 00000006.00000003.273943910.0000000004F76000.00000004.00000040.sdmp
                  Source: Binary string: iphlpapi.pdbk. source: WerFault.exe, 00000006.00000003.273943910.0000000004F76000.00000004.00000040.sdmp
                  Source: Binary string: oleaut32.pdbg. source: WerFault.exe, 00000006.00000003.273943910.0000000004F76000.00000004.00000040.sdmp
                  Source: Binary string: wUxTheme.pdb source: WerFault.exe, 00000006.00000003.273943910.0000000004F76000.00000004.00000040.sdmp
                  Source: Binary string: imagehlp.pdb source: WerFault.exe, 00000006.00000003.273943910.0000000004F76000.00000004.00000040.sdmp
                  Source: Binary string: dwmapi.pdb source: WerFault.exe, 00000006.00000003.273943910.0000000004F76000.00000004.00000040.sdmp
                  Source: Binary string: RFFGTEQ.pdb source: SecuriteInfo.com.W32.AIDetect.malware1.4295.dll
                  Source: Binary string: wntdll.pdb( source: WerFault.exe, 00000006.00000003.268157671.0000000002E10000.00000004.00000001.sdmp, WerFault.exe, 00000006.00000003.269628951.0000000002E10000.00000004.00000001.sdmp
                  Source: Binary string: shcore.pdbk source: WerFault.exe, 00000006.00000003.273937807.0000000004F70000.00000004.00000040.sdmp
                  Source: Binary string: profapi.pdb source: WerFault.exe, 00000006.00000003.273943910.0000000004F76000.00000004.00000040.sdmp
                  Source: Binary string: advapi32.pdbS. source: WerFault.exe, 00000006.00000003.273943910.0000000004F76000.00000004.00000040.sdmp
                  Source: Binary string: ws2_32.pdb source: WerFault.exe, 00000006.00000003.273943910.0000000004F76000.00000004.00000040.sdmp
                  Source: Binary string: winspool.pdb source: WerFault.exe, 00000006.00000003.273943910.0000000004F76000.00000004.00000040.sdmp
                  Source: Binary string: wgdi32full.pdb source: WerFault.exe, 00000006.00000003.273931070.0000000004FA1000.00000004.00000001.sdmp
                  Source: Binary string: shell32.pdbk source: WerFault.exe, 00000006.00000003.273937807.0000000004F70000.00000004.00000040.sdmp
                  Source: Binary string: sechost.pdb source: WerFault.exe, 00000006.00000003.273943910.0000000004F76000.00000004.00000040.sdmp
                  Source: Binary string: profapi.pdbU. source: WerFault.exe, 00000006.00000003.273943910.0000000004F76000.00000004.00000040.sdmp
                  Source: Binary string: iphlpapi.pdb source: WerFault.exe, 00000006.00000003.273943910.0000000004F76000.00000004.00000040.sdmp
                  Source: Binary string: propsys.pdb source: WerFault.exe, 00000006.00000003.273943910.0000000004F76000.00000004.00000040.sdmp
                  Source: Binary string: wntdll.pdbUGP source: loaddll32.exe, 00000000.00000003.266556290.000000004B280000.00000004.00000001.sdmp
                  Source: Binary string: cfgmgr32.pdbk source: WerFault.exe, 00000006.00000003.273937807.0000000004F70000.00000004.00000040.sdmp
                  Source: Binary string: ucrtbase.pdbk source: WerFault.exe, 00000006.00000003.273937807.0000000004F70000.00000004.00000040.sdmp
                  Source: Binary string: propsys.pdbc source: WerFault.exe, 00000006.00000003.273943910.0000000004F76000.00000004.00000040.sdmp
                  Source: Binary string: powrprof.pdb source: WerFault.exe, 00000006.00000003.273943910.0000000004F76000.00000004.00000040.sdmp
                  Source: Binary string: msctf.pdb source: WerFault.exe, 00000006.00000003.273943910.0000000004F76000.00000004.00000040.sdmp
                  Source: Binary string: wimm32.pdb=. source: WerFault.exe, 00000006.00000003.273943910.0000000004F76000.00000004.00000040.sdmp
                  Source: Binary string: AcLayers.pdb source: WerFault.exe, 00000006.00000003.273931070.0000000004FA1000.00000004.00000001.sdmp
                  Source: Binary string: Kernel.Appcore.pdb source: WerFault.exe, 00000006.00000003.273937807.0000000004F70000.00000004.00000040.sdmp
                  Source: Binary string: shlwapi.pdbO. source: WerFault.exe, 00000006.00000003.273943910.0000000004F76000.00000004.00000040.sdmp
                  Source: Binary string: wUxTheme.pdbY. source: WerFault.exe, 00000006.00000003.273943910.0000000004F76000.00000004.00000040.sdmp
                  Source: Binary string: fltLib.pdbm. source: WerFault.exe, 00000006.00000003.273943910.0000000004F76000.00000004.00000040.sdmp
                  Source: Binary string: cryptbase.pdb source: WerFault.exe, 00000006.00000003.273943910.0000000004F76000.00000004.00000040.sdmp
                  Source: Binary string: bcryptprimitives.pdb source: WerFault.exe, 00000006.00000003.273937807.0000000004F70000.00000004.00000040.sdmp
                  Source: Binary string: wkernelbase.pdb( source: WerFault.exe, 00000006.00000003.268035308.0000000002E1C000.00000004.00000001.sdmp, WerFault.exe, 00000006.00000003.269053101.0000000002E1C000.00000004.00000001.sdmp, WerFault.exe, 00000006.00000003.268187692.0000000002E1C000.00000004.00000001.sdmp
                  Source: Binary string: cfgmgr32.pdb source: WerFault.exe, 00000006.00000003.273937807.0000000004F70000.00000004.00000040.sdmp
                  Source: Binary string: combase.pdb source: WerFault.exe, 00000006.00000003.273943910.0000000004F76000.00000004.00000040.sdmp
                  Source: Binary string: Windows.Storage.pdb source: WerFault.exe, 00000006.00000003.273937807.0000000004F70000.00000004.00000040.sdmp
                  Source: Binary string: wkernel32.pdb( source: WerFault.exe, 00000006.00000003.269438809.0000000002E16000.00000004.00000001.sdmp, WerFault.exe, 00000006.00000003.268022167.0000000002E16000.00000004.00000001.sdmp
                  Source: Binary string: rundll32.pdb source: WerFault.exe, 00000006.00000003.273931070.0000000004FA1000.00000004.00000001.sdmp
                  Source: Binary string: oleaut32.pdb source: WerFault.exe, 00000006.00000003.273943910.0000000004F76000.00000004.00000040.sdmp
                  Source: Binary string: sfc.pdb source: WerFault.exe, 00000006.00000003.273943910.0000000004F76000.00000004.00000040.sdmp
                  Source: Binary string: wsspicli.pdbA. source: WerFault.exe, 00000006.00000003.273943910.0000000004F76000.00000004.00000040.sdmp
                  Source: Binary string: apphelp.pdb source: WerFault.exe, 00000006.00000003.273931070.0000000004FA1000.00000004.00000001.sdmp
                  Source: Binary string: wuser32.pdb source: WerFault.exe, 00000006.00000003.273931070.0000000004FA1000.00000004.00000001.sdmp

                  Networking:

                  barindex
                  C2 URLs / IPs found in malware configurationShow sources
                  Source: Malware configuration extractorIPs: 144.91.122.102:443
                  Source: Malware configuration extractorIPs: 85.10.248.28:593
                  Source: Malware configuration extractorIPs: 185.4.135.27:5228
                  Source: Malware configuration extractorIPs: 80.211.3.13:8116
                  Source: Joe Sandbox ViewASN Name: TOPHOSTGR TOPHOSTGR
                  Source: Joe Sandbox ViewASN Name: HETZNER-ASDE HETZNER-ASDE
                  Source: Joe Sandbox ViewIP Address: 185.4.135.27 185.4.135.27
                  Source: Joe Sandbox ViewIP Address: 85.10.248.28 85.10.248.28
                  Source: WerFault.exe, 00000006.00000002.300655792.0000000004BBF000.00000004.00000001.sdmp, WerFault.exe, 00000006.00000003.298419024.0000000004BBF000.00000004.00000001.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
                  Source: Amcache.hve.6.drString found in binary or memory: http://upx.sf.net
                  Source: loaddll32.exe, 00000000.00000002.654546323.000000006E84F000.00000002.00020000.sdmp, rundll32.exe, 00000002.00000000.263902525.000000006E84F000.00000002.00020000.sdmpString found in binary or memory: http://www.n4pkg6fy8o.gaDVarFileInfo$

                  E-Banking Fraud:

                  barindex
                  Yara detected Dridex unpacked fileShow sources
                  Source: Yara matchFile source: 2.0.rundll32.exe.6e830000.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.loaddll32.exe.6e830000.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.rundll32.exe.6e830000.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.0.rundll32.exe.6e830000.5.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000002.00000000.263879217.000000006E831000.00000020.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.654367413.000000006E831000.00000020.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.303178231.000000006E831000.00000020.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000000.261899992.000000006E831000.00000020.00020000.sdmp, type: MEMORY

                  System Summary:

                  barindex
                  Source: SecuriteInfo.com.W32.AIDetect.malware1.4295.dllStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
                  Source: SecuriteInfo.com.W32.AIDetect.malware1.4295.dllBinary or memory string: OriginalFilenameIha.dllD vs SecuriteInfo.com.W32.AIDetect.malware1.4295.dll
                  Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6368 -s 684
                  Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E840730
                  Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E849370
                  Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E831494
                  Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E83A4E8
                  Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E838428
                  Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E84143C
                  Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E842234 NtDelayExecution,
                  Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E842820 NtAllocateVirtualMemory,
                  Source: C:\Windows\System32\loaddll32.exeProcess Stats: CPU usage > 98%
                  Source: SecuriteInfo.com.W32.AIDetect.malware1.4295.dllVirustotal: Detection: 23%
                  Source: SecuriteInfo.com.W32.AIDetect.malware1.4295.dllReversingLabs: Detection: 25%
                  Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.4295.dll",#1
                  Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.4295.dll"
                  Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.4295.dll",#1
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.4295.dll",#1
                  Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6368 -s 684
                  Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.4295.dll",#1
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.4295.dll",#1
                  Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6368
                  Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\WER97B6.tmpJump to behavior
                  Source: classification engineClassification label: mal76.troj.evad.winDLL@6/6@0/4
                  Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: SecuriteInfo.com.W32.AIDetect.malware1.4295.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT
                  Source: SecuriteInfo.com.W32.AIDetect.malware1.4295.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: Binary string: ws2_32.pdb;. source: WerFault.exe, 00000006.00000003.273943910.0000000004F76000.00000004.00000040.sdmp
                  Source: Binary string: bcrypt.pdbq. source: WerFault.exe, 00000006.00000003.273943910.0000000004F76000.00000004.00000040.sdmp
                  Source: Binary string: wkernel32.pdb source: WerFault.exe, 00000006.00000003.268112270.0000000004C5D000.00000004.00000001.sdmp, WerFault.exe, 00000006.00000003.269479129.0000000004C5D000.00000004.00000001.sdmp, WerFault.exe, 00000006.00000003.269438809.0000000002E16000.00000004.00000001.sdmp, WerFault.exe, 00000006.00000003.268022167.0000000002E16000.00000004.00000001.sdmp, WerFault.exe, 00000006.00000003.269822443.0000000004C5E000.00000004.00000001.sdmp, WerFault.exe, 00000006.00000003.273891782.0000000004C5E000.00000004.00000001.sdmp, WerFault.exe, 00000006.00000003.273931070.0000000004FA1000.00000004.00000001.sdmp
                  Source: Binary string: sfc_os.pdb source: WerFault.exe, 00000006.00000003.273943910.0000000004F76000.00000004.00000040.sdmp
                  Source: Binary string: bcrypt.pdb source: WerFault.exe, 00000006.00000003.273943910.0000000004F76000.00000004.00000040.sdmp
                  Source: Binary string: ucrtbase.pdb source: WerFault.exe, 00000006.00000003.273937807.0000000004F70000.00000004.00000040.sdmp
                  Source: Binary string: msvcrt.pdb source: WerFault.exe, 00000006.00000003.273931070.0000000004FA1000.00000004.00000001.sdmp
                  Source: Binary string: wrpcrt4.pdb source: WerFault.exe, 00000006.00000003.273937807.0000000004F70000.00000004.00000040.sdmp
                  Source: Binary string: wntdll.pdb source: loaddll32.exe, 00000000.00000003.266556290.000000004B280000.00000004.00000001.sdmp, WerFault.exe, 00000006.00000003.268157671.0000000002E10000.00000004.00000001.sdmp, WerFault.exe, 00000006.00000003.269628951.0000000002E10000.00000004.00000001.sdmp, WerFault.exe, 00000006.00000003.273931070.0000000004FA1000.00000004.00000001.sdmp
                  Source: Binary string: shcore.pdb source: WerFault.exe, 00000006.00000003.273937807.0000000004F70000.00000004.00000040.sdmp
                  Source: Binary string: wgdi32.pdb source: WerFault.exe, 00000006.00000003.273931070.0000000004FA1000.00000004.00000001.sdmp
                  Source: Binary string: advapi32.pdb source: WerFault.exe, 00000006.00000003.273943910.0000000004F76000.00000004.00000040.sdmp
                  Source: Binary string: fltLib.pdb source: WerFault.exe, 00000006.00000003.273943910.0000000004F76000.00000004.00000040.sdmp
                  Source: Binary string: wsspicli.pdb source: WerFault.exe, 00000006.00000003.273943910.0000000004F76000.00000004.00000040.sdmp
                  Source: Binary string: shell32.pdb source: WerFault.exe, 00000006.00000003.273937807.0000000004F70000.00000004.00000040.sdmp
                  Source: Binary string: msvcp_win.pdb source: WerFault.exe, 00000006.00000003.273931070.0000000004FA1000.00000004.00000001.sdmp
                  Source: Binary string: dwmapi.pdbD; source: WerFault.exe, 00000006.00000003.273943910.0000000004F76000.00000004.00000040.sdmp
                  Source: Binary string: wkernelbase.pdb source: WerFault.exe, 00000006.00000003.268035308.0000000002E1C000.00000004.00000001.sdmp, WerFault.exe, 00000006.00000003.269053101.0000000002E1C000.00000004.00000001.sdmp, WerFault.exe, 00000006.00000003.273931070.0000000004FA1000.00000004.00000001.sdmp, WerFault.exe, 00000006.00000003.268187692.0000000002E1C000.00000004.00000001.sdmp
                  Source: Binary string: wimm32.pdb source: WerFault.exe, 00000006.00000003.273943910.0000000004F76000.00000004.00000040.sdmp
                  Source: Binary string: shlwapi.pdb source: WerFault.exe, 00000006.00000003.273943910.0000000004F76000.00000004.00000040.sdmp
                  Source: Binary string: mpr.pdb source: WerFault.exe, 00000006.00000003.273937807.0000000004F70000.00000004.00000040.sdmp
                  Source: Binary string: wwin32u.pdb source: WerFault.exe, 00000006.00000003.273931070.0000000004FA1000.00000004.00000001.sdmp
                  Source: Binary string: setupapi.pdb source: WerFault.exe, 00000006.00000003.273943910.0000000004F76000.00000004.00000040.sdmp
                  Source: Binary string: iphlpapi.pdbk. source: WerFault.exe, 00000006.00000003.273943910.0000000004F76000.00000004.00000040.sdmp
                  Source: Binary string: oleaut32.pdbg. source: WerFault.exe, 00000006.00000003.273943910.0000000004F76000.00000004.00000040.sdmp
                  Source: Binary string: wUxTheme.pdb source: WerFault.exe, 00000006.00000003.273943910.0000000004F76000.00000004.00000040.sdmp
                  Source: Binary string: imagehlp.pdb source: WerFault.exe, 00000006.00000003.273943910.0000000004F76000.00000004.00000040.sdmp
                  Source: Binary string: dwmapi.pdb source: WerFault.exe, 00000006.00000003.273943910.0000000004F76000.00000004.00000040.sdmp
                  Source: Binary string: RFFGTEQ.pdb source: SecuriteInfo.com.W32.AIDetect.malware1.4295.dll
                  Source: Binary string: wntdll.pdb( source: WerFault.exe, 00000006.00000003.268157671.0000000002E10000.00000004.00000001.sdmp, WerFault.exe, 00000006.00000003.269628951.0000000002E10000.00000004.00000001.sdmp
                  Source: Binary string: shcore.pdbk source: WerFault.exe, 00000006.00000003.273937807.0000000004F70000.00000004.00000040.sdmp
                  Source: Binary string: profapi.pdb source: WerFault.exe, 00000006.00000003.273943910.0000000004F76000.00000004.00000040.sdmp
                  Source: Binary string: advapi32.pdbS. source: WerFault.exe, 00000006.00000003.273943910.0000000004F76000.00000004.00000040.sdmp
                  Source: Binary string: ws2_32.pdb source: WerFault.exe, 00000006.00000003.273943910.0000000004F76000.00000004.00000040.sdmp
                  Source: Binary string: winspool.pdb source: WerFault.exe, 00000006.00000003.273943910.0000000004F76000.00000004.00000040.sdmp
                  Source: Binary string: wgdi32full.pdb source: WerFault.exe, 00000006.00000003.273931070.0000000004FA1000.00000004.00000001.sdmp
                  Source: Binary string: shell32.pdbk source: WerFault.exe, 00000006.00000003.273937807.0000000004F70000.00000004.00000040.sdmp
                  Source: Binary string: sechost.pdb source: WerFault.exe, 00000006.00000003.273943910.0000000004F76000.00000004.00000040.sdmp
                  Source: Binary string: profapi.pdbU. source: WerFault.exe, 00000006.00000003.273943910.0000000004F76000.00000004.00000040.sdmp
                  Source: Binary string: iphlpapi.pdb source: WerFault.exe, 00000006.00000003.273943910.0000000004F76000.00000004.00000040.sdmp
                  Source: Binary string: propsys.pdb source: WerFault.exe, 00000006.00000003.273943910.0000000004F76000.00000004.00000040.sdmp
                  Source: Binary string: wntdll.pdbUGP source: loaddll32.exe, 00000000.00000003.266556290.000000004B280000.00000004.00000001.sdmp
                  Source: Binary string: cfgmgr32.pdbk source: WerFault.exe, 00000006.00000003.273937807.0000000004F70000.00000004.00000040.sdmp
                  Source: Binary string: ucrtbase.pdbk source: WerFault.exe, 00000006.00000003.273937807.0000000004F70000.00000004.00000040.sdmp
                  Source: Binary string: propsys.pdbc source: WerFault.exe, 00000006.00000003.273943910.0000000004F76000.00000004.00000040.sdmp
                  Source: Binary string: powrprof.pdb source: WerFault.exe, 00000006.00000003.273943910.0000000004F76000.00000004.00000040.sdmp
                  Source: Binary string: msctf.pdb source: WerFault.exe, 00000006.00000003.273943910.0000000004F76000.00000004.00000040.sdmp
                  Source: Binary string: wimm32.pdb=. source: WerFault.exe, 00000006.00000003.273943910.0000000004F76000.00000004.00000040.sdmp
                  Source: Binary string: AcLayers.pdb source: WerFault.exe, 00000006.00000003.273931070.0000000004FA1000.00000004.00000001.sdmp
                  Source: Binary string: Kernel.Appcore.pdb source: WerFault.exe, 00000006.00000003.273937807.0000000004F70000.00000004.00000040.sdmp
                  Source: Binary string: shlwapi.pdbO. source: WerFault.exe, 00000006.00000003.273943910.0000000004F76000.00000004.00000040.sdmp
                  Source: Binary string: wUxTheme.pdbY. source: WerFault.exe, 00000006.00000003.273943910.0000000004F76000.00000004.00000040.sdmp
                  Source: Binary string: fltLib.pdbm. source: WerFault.exe, 00000006.00000003.273943910.0000000004F76000.00000004.00000040.sdmp
                  Source: Binary string: cryptbase.pdb source: WerFault.exe, 00000006.00000003.273943910.0000000004F76000.00000004.00000040.sdmp
                  Source: Binary string: bcryptprimitives.pdb source: WerFault.exe, 00000006.00000003.273937807.0000000004F70000.00000004.00000040.sdmp
                  Source: Binary string: wkernelbase.pdb( source: WerFault.exe, 00000006.00000003.268035308.0000000002E1C000.00000004.00000001.sdmp, WerFault.exe, 00000006.00000003.269053101.0000000002E1C000.00000004.00000001.sdmp, WerFault.exe, 00000006.00000003.268187692.0000000002E1C000.00000004.00000001.sdmp
                  Source: Binary string: cfgmgr32.pdb source: WerFault.exe, 00000006.00000003.273937807.0000000004F70000.00000004.00000040.sdmp
                  Source: Binary string: combase.pdb source: WerFault.exe, 00000006.00000003.273943910.0000000004F76000.00000004.00000040.sdmp
                  Source: Binary string: Windows.Storage.pdb source: WerFault.exe, 00000006.00000003.273937807.0000000004F70000.00000004.00000040.sdmp
                  Source: Binary string: wkernel32.pdb( source: WerFault.exe, 00000006.00000003.269438809.0000000002E16000.00000004.00000001.sdmp, WerFault.exe, 00000006.00000003.268022167.0000000002E16000.00000004.00000001.sdmp
                  Source: Binary string: rundll32.pdb source: WerFault.exe, 00000006.00000003.273931070.0000000004FA1000.00000004.00000001.sdmp
                  Source: Binary string: oleaut32.pdb source: WerFault.exe, 00000006.00000003.273943910.0000000004F76000.00000004.00000040.sdmp
                  Source: Binary string: sfc.pdb source: WerFault.exe, 00000006.00000003.273943910.0000000004F76000.00000004.00000040.sdmp
                  Source: Binary string: wsspicli.pdbA. source: WerFault.exe, 00000006.00000003.273943910.0000000004F76000.00000004.00000040.sdmp
                  Source: Binary string: apphelp.pdb source: WerFault.exe, 00000006.00000003.273931070.0000000004FA1000.00000004.00000001.sdmp
                  Source: Binary string: wuser32.pdb source: WerFault.exe, 00000006.00000003.273931070.0000000004FA1000.00000004.00000001.sdmp
                  Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E83F6A8 push esi; mov dword ptr [esp], 00000000h
                  Source: initial sampleStatic PE information: section where entry point is pointing to: .rdata
                  Source: C:\Windows\SysWOW64\WerFault.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
                  Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX

                  Malware Analysis System Evasion:

                  barindex
                  Tries to delay execution (extensive OutputDebugStringW loop)Show sources
                  Source: C:\Windows\System32\loaddll32.exeSection loaded: OutputDebugStringW count: 1198
                  Source: C:\Windows\System32\loaddll32.exeWindow / User API: threadDelayed 1198
                  Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E840730 GetTokenInformation,GetSystemInfo,GetTokenInformation,
                  Source: Amcache.hve.6.drBinary or memory string: VMware
                  Source: Amcache.hve.6.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/5&1ec51bf7&0&000000
                  Source: WerFault.exe, 00000006.00000002.300730624.0000000004D80000.00000004.00000001.sdmpBinary or memory string: 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&p=<WlidToken><Version>1.0</Version><Type>0</Type><AuthorizationToken><Flags>0</Flags><Ticket Type="urn:passport:compact">t=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&amp;p=</Ticket></AuthorizationToken></WlidToken>
                  Source: Amcache.hve.6.drBinary or memory string: VMware Virtual USB Mouse
                  Source: Amcache.hve.6.drBinary or memory string: VMware, Inc.
                  Source: Amcache.hve.6.drBinary or memory string: VMware Virtual disk SCSI Disk Devicehbin
                  Source: WerFault.exe, 00000006.00000002.300730624.0000000004D80000.00000004.00000001.sdmpBinary or memory string: t=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&p=''https://watson.telemetry.microsoft.com
                  Source: WerFault.exe, 00000006.00000002.300618449.0000000004BA0000.00000004.00000001.sdmp, WerFault.exe, 00000006.00000003.298385587.0000000004B9D000.00000004.00000001.sdmpBinary or memory string: gpJJ36LAbhOJHjZ2kAAfy20W7WGr2H1Dd3s1L4CyDOlJhVjZKa310V3lmO8QvaAXeY4EeGZSzjy6P/rXiwk3ipb22QUZ75IJ0oxf8uXs8ORQTXAigDL/YBgFxxlWW337gwFSpqRrW7Dm/pkMMyleiJcRpTb5Kjzq0y7BPtkA4ocCKlrIQ7Va2TuRRwF3k5ASuviPY9IvyzzFOX/TfTx3gYkP0gwxQvUFe2WOzL30PIraXbKi9hRCAf5GAeXP2C/9FmM1rIsqMJ/apH69q14qvL9DHMOHe6fJGyUCWWVmnO5Hx1tnBmQMBjYtV4/5Mh63P6WDNc4OGdKTWUA/JWZrCq5UW5c882LNEa0BiwQjUDZgAACN/Vp1vg4nFTiAG4Lg5QwFRZaKsCfv4AgLKfm7J9ObZmFxjfl4duRxk4nY/MJzFhGFSe7ubN/TpYPRjQ3lmszvxiBiRiCAO+CbX115XXe9ZLwr3hY3t7Bef5AiNuwmZXUfpjY4Cfho5lgDEHHH4plkDQ7UFtGZ24pKrQRdcPmcCZH58oSw3HEyDJJ7+eLgNKAAyAhn53zud4F+84JwS07NF43VwxynI5fr9AOiNXikdtd2J60pExA7yxO+5Sz19bZt9MS5ScJzfC5G2kngfkEL0Evm7f1+aA5+KIXGqOzoSoR1RHE7CceBIlKiuIz3cZdB4GZ2JiTF5+ZrQ46aLGtIPpLWEGhIJdSz64r5A1N47484WaWlGEIHCvjbysSrvrKBF+OxIZhy6Zi/TbMuuIT/kPQ1IvYZfTstWnF1BeTbh19zuQIyrKkowCpMuMMyhvU4OGWllsNUOTJpSuKD79LekJTH00kiZ/xyJ7v5mHgd4PanmPE+7R7gg0wq6zMycNrgRe98aqXOvFQHvLO8XpmoeCyrYB&p=
                  Source: WerFault.exe, 00000006.00000003.299584345.0000000004F50000.00000004.00000001.sdmpBinary or memory string: e6fJGyUCWWVmnO5Hx1tnBmQMBjYtV4/5Mh63P6WDNc4OGdKTWUA/JWZrCq5UW5c882LNEa0BiwQjUDZgAACN/Vp1vg4nFTiAG4Lg5QwFRZaKsCfv4AgLKfm7J9ObZmFxjfl4duRxk4nY/MJzFhGFSe7ubN/TpYPRjQ3lmszvxiBiRiCAO+CbX115XXe9ZLwr3hY3t7Bef5AiNuwmZXUfpjY4Cfho5lgDEHHH4plkDQ7UFtGZ24pKrQRdcPmcCZH58oSw3HEyDJJ7+eLgNKAAyAhn53zud4F+84JwS07NF43VwxynI5fr9AOiNXikdtd2J60pExA7yxO+5Sz19bZt9Mx ;T6
                  Source: WerFault.exe, 00000006.00000002.300707776.0000000004C56000.00000004.00000001.sdmp, WerFault.exe, 00000006.00000003.298409389.0000000004BB3000.00000004.00000001.sdmp, WerFault.exe, 00000006.00000003.298362110.0000000004C56000.00000004.00000001.sdmp, WerFault.exe, 00000006.00000002.300642542.0000000004BB3000.00000004.00000001.sdmp, WerFault.exe, 00000006.00000003.298135731.0000000004C56000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW
                  Source: WerFault.exe, 00000006.00000002.300618449.0000000004BA0000.00000004.00000001.sdmp, WerFault.exe, 00000006.00000003.298385587.0000000004B9D000.00000004.00000001.sdmpBinary or memory string: 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&p=MSDWKeep-Alive
                  Source: Amcache.hve.6.drBinary or memory string: VMware, Inc.me
                  Source: Amcache.hve.6.drBinary or memory string: VMware-42 35 44 6e 75 85 11 47-bd a2 bb ed 21 43 9f 89
                  Source: WerFault.exe, 00000006.00000003.298135731.0000000004C56000.00000004.00000001.sdmpBinary or memory string: MSA_DeviceTickett=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&p=
                  Source: WerFault.exe, 00000006.00000003.298362110.0000000004C56000.00000004.00000001.sdmpBinary or memory string: ceTickett=EwC4AlN5BAAUfXuGwOqhW7gpJJ36LAbhOJHjZ2kAAfy20W7WGr2H1Dd3s1L4CyDOlJhVjZKa310V3lmO8QvaAXeY4EeGZSzjy6P/rXiwk3ipb22QUZ75IJ0oxf8uXs8ORQTXAigDL/YBgFxxlWW337gwFSpqRrW7Dm/pkMMyleiJcRpTb5Kjzq0y7BPtkA4ocCKlrIQ7Va2TuRRwF3k5ASuviPY9IvyzzFOX/TfTx3gYkP0gwxQvUFe2WOzL30PIraXbKi9hRCAf5GAeXP2C/9FmM1rIsqMJ/apH69q14qvL9DHMOHe6fJGyUCWWVmnO5Hx1tnBmQMBjYtV4/5Mh63P6WDNc4OGdKTWUA/JWZrCq5UW5c882LNEa0BiwQjUDZgAACN/Vp1vg4nFTiAG4Lg5QwFRZaKsCfv4AgLKfm7J9ObZmFxjfl4duRxk4nY/MJzFhGFSe7ubN/TpYPRjQ3lmszvxiBiRiCAO+CbX115XXe9ZLwr3hY3t7Bef5AiNuwmZXUfpjY4Cfho5lgDEHHH4plkDQ7UFtGZ24pKrQRdcPmcCZH58oSw3HEyDJJ7+eLgNKAAyAhn53zud4F+84JwS07NF43VwxynI5fr9AOiNXikdtd2J60pExA7yxO+5Sz19bZt9MS5ScJzfC5G2kngfkEL0Evm7f1+aA5+KIXGqOzoSoR1RHE7CceBIlKiuIz3cZdB4GZ2JiTF5+ZrQ46aLGtIPpLWEGhIJdSz64r5A1N47484WaWlGEIHCvjbysSrvrKBF+OxIZhy6Zi/TbMuuIT/kPQ1IvYZfTstWnF1BeTbh19zuQIyrKkowCpMuMMyhvU4OGWllsNUOTJpSuKD79LekJTH00kiZ/xyJ7v5mHgd4PanmPE+7R7gg0wq6zMycNrgRe98aqXOvFQHvLO8XpmoeCyrYB&p=
                  Source: Amcache.hve.6.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/5&1ec51bf7&0&000000
                  Source: Amcache.hve.6.drBinary or memory string: @scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/5&280b647&0&000000
                  Source: WerFault.exe, 00000006.00000003.298409389.0000000004BB3000.00000004.00000001.sdmp, WerFault.exe, 00000006.00000002.300642542.0000000004BB3000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAWZ
                  Source: WerFault.exe, 00000006.00000003.298362110.0000000004C56000.00000004.00000001.sdmp, WerFault.exe, 00000006.00000003.298135731.0000000004C56000.00000004.00000001.sdmpBinary or memory string: t=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&p=
                  Source: Amcache.hve.6.drBinary or memory string: Microsoft Hyper-V Generation Counter
                  Source: Amcache.hve.6.drBinary or memory string: VMware7,1
                  Source: Amcache.hve.6.drBinary or memory string: NECVMWar VMware SATA CD00
                  Source: Amcache.hve.6.drBinary or memory string: VMware Virtual disk SCSI Disk Device
                  Source: Amcache.hve.6.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW71.00V.13989454.B64.1906190538,BiosReleaseDate:06/19/2019,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware7,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
                  Source: Amcache.hve.6.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
                  Source: Amcache.hve.6.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
                  Source: Amcache.hve.6.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/5&280b647&0&000000
                  Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPort
                  Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPort
                  Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E836D0C GetUserNameW,MessageBoxW,GetLastError,CreateFileA,DebugBreak,FlushFileBuffers,FreeEnvironmentStringsA,GetConsoleOutputCP,GetEnvironmentStrings,GetLocaleInfoA,GetStartupInfoA,GetStringTypeA,HeapValidate,IsBadReadPtr,LCMapStringA,LoadLibraryA,OutputDebugStringA,
                  Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E843138 RtlAddVectoredExceptionHandler,
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.4295.dll",#1
                  Source: loaddll32.exe, 00000000.00000002.653930606.00000000016C0000.00000002.00020000.sdmp, rundll32.exe, 00000002.00000000.263678676.00000000038C0000.00000002.00020000.sdmp, rundll32.exe, 00000002.00000000.260831521.00000000038C0000.00000002.00020000.sdmpBinary or memory string: uProgram Manager
                  Source: loaddll32.exe, 00000000.00000002.653930606.00000000016C0000.00000002.00020000.sdmp, rundll32.exe, 00000002.00000000.263678676.00000000038C0000.00000002.00020000.sdmp, rundll32.exe, 00000002.00000000.260831521.00000000038C0000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
                  Source: loaddll32.exe, 00000000.00000002.653930606.00000000016C0000.00000002.00020000.sdmp, rundll32.exe, 00000002.00000000.263678676.00000000038C0000.00000002.00020000.sdmp, rundll32.exe, 00000002.00000000.260831521.00000000038C0000.00000002.00020000.sdmpBinary or memory string: Progman
                  Source: loaddll32.exe, 00000000.00000002.653930606.00000000016C0000.00000002.00020000.sdmp, rundll32.exe, 00000002.00000000.263678676.00000000038C0000.00000002.00020000.sdmp, rundll32.exe, 00000002.00000000.260831521.00000000038C0000.00000002.00020000.sdmpBinary or memory string: Progmanlock
                  Source: C:\Windows\System32\loaddll32.exeCode function: GetUserNameW,MessageBoxW,GetLastError,CreateFileA,DebugBreak,FlushFileBuffers,FreeEnvironmentStringsA,GetConsoleOutputCP,GetEnvironmentStrings,GetLocaleInfoA,GetStartupInfoA,GetStringTypeA,HeapValidate,IsBadReadPtr,LCMapStringA,LoadLibraryA,OutputDebugStringA,
                  Source: C:\Windows\System32\loaddll32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
                  Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6E836D0C GetUserNameW,MessageBoxW,GetLastError,CreateFileA,DebugBreak,FlushFileBuffers,FreeEnvironmentStringsA,GetConsoleOutputCP,GetEnvironmentStrings,GetLocaleInfoA,GetStartupInfoA,GetStringTypeA,HeapValidate,IsBadReadPtr,LCMapStringA,LoadLibraryA,OutputDebugStringA,
                  Source: Amcache.hve.6.drBinary or memory string: c:\program files\windows defender\msmpeng.exe

                  Mitre Att&ck Matrix

                  Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                  Valid AccountsWindows Management InstrumentationPath InterceptionProcess Injection12Virtualization/Sandbox Evasion11OS Credential DumpingQuery Registry1Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                  Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsProcess Injection12LSASS MemorySecurity Software Discovery31Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothApplication Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                  Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or Information1Security Account ManagerVirtualization/Sandbox Evasion11SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                  Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Rundll321NTDSProcess Discovery1Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                  Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA SecretsApplication Window Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                  Replication Through Removable MediaLaunchdRc.commonRc.commonSteganographyCached Domain CredentialsAccount Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                  External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSyncSystem Owner/User Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                  Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc FilesystemRemote System Discovery1Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                  Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Masquerading/etc/passwd and /etc/shadowSystem Information Discovery13Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction

                  Behavior Graph

                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet
                  behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 544174 Sample: SecuriteInfo.com.W32.AIDete... Startdate: 22/12/2021 Architecture: WINDOWS Score: 76 18 185.4.135.27 TOPHOSTGR Greece 2->18 20 85.10.248.28 HETZNER-ASDE Germany 2->20 22 2 other IPs or domains 2->22 24 Found malware configuration 2->24 26 Multi AV Scanner detection for submitted file 2->26 28 Yara detected Dridex unpacked file 2->28 30 2 other signatures 2->30 9 loaddll32.exe 1 2->9         started        signatures3 process4 signatures5 32 Tries to delay execution (extensive OutputDebugStringW loop) 9->32 12 cmd.exe 1 9->12         started        process6 process7 14 rundll32.exe 12->14         started        process8 16 WerFault.exe 23 9 14->16         started       

                  Screenshots

                  Thumbnails

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                  windows-stand

                  Antivirus, Machine Learning and Genetic Malware Detection

                  Initial Sample

                  SourceDetectionScannerLabelLink
                  SecuriteInfo.com.W32.AIDetect.malware1.4295.dll23%VirustotalBrowse
                  SecuriteInfo.com.W32.AIDetect.malware1.4295.dll26%ReversingLabsWin32.Worm.Cridex

                  Dropped Files

                  No Antivirus matches

                  Unpacked PE Files

                  SourceDetectionScannerLabelLinkDownload
                  0.2.loaddll32.exe.6e830000.2.unpack100%AviraHEUR/AGEN.1144420Download File
                  2.0.rundll32.exe.3220000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                  2.0.rundll32.exe.3220000.3.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                  2.2.rundll32.exe.6e830000.2.unpack100%AviraHEUR/AGEN.1144420Download File
                  2.2.rundll32.exe.3220000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                  0.2.loaddll32.exe.f60000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                  2.0.rundll32.exe.6e830000.2.unpack100%AviraHEUR/AGEN.1144420Download File
                  2.0.rundll32.exe.6e830000.5.unpack100%AviraHEUR/AGEN.1144420Download File

                  Domains

                  No Antivirus matches

                  URLs

                  SourceDetectionScannerLabelLink
                  http://www.n4pkg6fy8o.gaDVarFileInfo$0%Avira URL Cloudsafe

                  Domains and IPs

                  Contacted Domains

                  No contacted domains info

                  URLs from Memory and Binaries

                  NameSourceMaliciousAntivirus DetectionReputation
                  http://upx.sf.netAmcache.hve.6.drfalse
                    high
                    http://www.n4pkg6fy8o.gaDVarFileInfo$loaddll32.exe, 00000000.00000002.654546323.000000006E84F000.00000002.00020000.sdmp, rundll32.exe, 00000002.00000000.263902525.000000006E84F000.00000002.00020000.sdmpfalse
                    • Avira URL Cloud: safe
                    low

                    Contacted IPs

                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs

                    Public

                    IPDomainCountryFlagASNASN NameMalicious
                    185.4.135.27
                    unknownGreece
                    199246TOPHOSTGRtrue
                    85.10.248.28
                    unknownGermany
                    24940HETZNER-ASDEtrue
                    80.211.3.13
                    unknownItaly
                    31034ARUBA-ASNITtrue
                    144.91.122.102
                    unknownGermany
                    51167CONTABODEtrue

                    General Information

                    Joe Sandbox Version:34.0.0 Boulder Opal
                    Analysis ID:544174
                    Start date:22.12.2021
                    Start time:20:02:55
                    Joe Sandbox Product:CloudBasic
                    Overall analysis duration:0h 7m 24s
                    Hypervisor based Inspection enabled:false
                    Report type:light
                    Sample file name:SecuriteInfo.com.W32.AIDetect.malware1.4295.dll
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                    Run name:Run with higher sleep bypass
                    Number of analysed new started processes analysed:29
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • HDC enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Detection:MAL
                    Classification:mal76.troj.evad.winDLL@6/6@0/4
                    EGA Information:Failed
                    HDC Information:
                    • Successful, ratio: 100% (good quality ratio 96.8%)
                    • Quality average: 78.9%
                    • Quality standard deviation: 26.2%
                    HCA Information:Failed
                    Cookbook Comments:
                    • Adjust boot time
                    • Enable AMSI
                    • Sleeps bigger than 120000ms are automatically reduced to 1000ms
                    • Found application associated with file extension: .dll
                    Warnings:
                    Show All
                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WerFault.exe, WMIADAP.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
                    • Excluded IPs from analysis (whitelisted): 23.54.113.53, 52.182.143.212
                    • Excluded domains from analysis (whitelisted): client.wns.windows.com, fs.microsoft.com, ctldl.windowsupdate.com, store-images.s-microsoft.com-c.edgekey.net, arc.msn.com, ris.api.iris.microsoft.com, e12564.dspb.akamaiedge.net, onedsblobprdcus15.centralus.cloudapp.azure.com, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, watson.telemetry.microsoft.com
                    • Not all processes where analyzed, report is missing behavior information

                    Simulations

                    Behavior and APIs

                    No simulations

                    Joe Sandbox View / Context

                    IPs

                    No context

                    Domains

                    No context

                    ASN

                    No context

                    JA3 Fingerprints

                    No context

                    Dropped Files

                    No context

                    Created / dropped Files

                    C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_acf0c1b1d931196b9999224049caaf48ed8bd9_82810a17_18eecba7\Report.wer
                    Process:C:\Windows\SysWOW64\WerFault.exe
                    File Type:Little-endian UTF-16 Unicode text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):65536
                    Entropy (8bit):0.922125224955901
                    Encrypted:false
                    SSDEEP:192:xmMiC0oXuA/HBUZMX4jed+fm/u7sCS274ItWc:AMiEXuA/BUZMX4jeKm/u7sCX4ItWc
                    MD5:499007EBF56D77B0189DDA896BA1C4DE
                    SHA1:91D7878017B238972F91D5C792BB959FEC82DE4E
                    SHA-256:EBD2A36EBCA81495AFA4DD1E7028AC93E78A009519858BDAF3073E0837EADC3C
                    SHA-512:2B7B64D821BE1A4653C867F05C390A9A8B897ABDD17A108FC8B1E8C8B53BC4DC328682F593F2C01DD0BF1D326098062F77BDA0EFD9E84A715AC7A37DD256B33D
                    Malicious:false
                    Reputation:low
                    Preview: ..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.2.8.4.7.0.5.8.4.3.0.4.1.3.8.3.1.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.2.8.4.7.0.5.8.5.4.6.9.7.5.8.4.4.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.f.6.e.b.f.d.c.4.-.8.8.6.c.-.4.4.7.c.-.b.4.6.5.-.1.c.d.6.1.8.e.5.4.7.f.b.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.0.4.8.d.9.9.2.a.-.d.b.3.0.-.4.8.9.c.-.b.1.b.c.-.9.f.3.1.5.b.a.f.7.7.9.c.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.8.e.0.-.0.0.0.1.-.0.0.1.7.-.8.8.4.0.-.5.7.1.b.b.2.f.7.d.7.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.b.c.c.5.d.c.3.2.2.2.0.3.4.d.3.f.2.5.7.f.1.f.d.3.5.8.8.9.e.5.b.e.9.0.f.0.9.
                    C:\ProgramData\Microsoft\Windows\WER\Temp\WER97B6.tmp.dmp
                    Process:C:\Windows\SysWOW64\WerFault.exe
                    File Type:Mini DuMP crash report, 14 streams, Thu Dec 23 04:04:04 2021, 0x1205a4 type
                    Category:dropped
                    Size (bytes):45498
                    Entropy (8bit):2.1178952305241547
                    Encrypted:false
                    SSDEEP:192:SDrw0XFeUH/qO5SkbP/drlei+HEEqxKxjyCrmYny:6eUf15Lb3drXYxjyvYy
                    MD5:797BC81A1158FB63989497B035879FC6
                    SHA1:626D53CAE42D30730110E4E1CB86ED4127EA47CD
                    SHA-256:73104FFC864263D171093BC3EEF03AFFE06660EAAADF320F76C447916C9B3533
                    SHA-512:874F47E20AE83DAF648AA7F5CC04DFFBC9E11CD746D99A08CB32D9DBE0CC9ACE8775473517C9EF300C36F3365ABE074EEACFCF244FE54F2F8612BFB2DF7C5AF8
                    Malicious:false
                    Reputation:low
                    Preview: MDMP....... .......4..a.........................................-..........T.......8...........T...........@...z............................................................................................U...........B...... .......GenuineIntelW...........T...........,..a.............................0..=...............P.a.c.i.f.i.c. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................P.a.c.i.f.i.c. .D.a.y.l.i.g.h.t. .T.i.m.e...........................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.....................................................................................................................................................................................................................................................................................................................................................................................................................................................
                    C:\ProgramData\Microsoft\Windows\WER\Temp\WER9F87.tmp.WERInternalMetadata.xml
                    Process:C:\Windows\SysWOW64\WerFault.exe
                    File Type:XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):8324
                    Entropy (8bit):3.6916703589045934
                    Encrypted:false
                    SSDEEP:192:Rrl7r3GLNiOp67OgmsTB6Y086KgmfT/ZSuCpro89bsWsfrEm:RrlsNiw6N6Y/6KgmfT/ZSjs1fN
                    MD5:F5B52B104E61752E08FA79034F86427A
                    SHA1:0A8365C70C11F7117C1C5A159BE4E210067BD68E
                    SHA-256:45CC1E4E430B0564D53DB748A41848C884685CD94A4BD9F2B347DC3745A1190D
                    SHA-512:FBD4FD83351BE5B43DA74F54CA5EB53AB13E79F6BC2EB6BDA30E3C726A7022CDACABC61964589FE1E7021C8A7FCEB5F2F0A634E603CC3E9656284178323F46C7
                    Malicious:false
                    Reputation:low
                    Preview: ..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.3.6.8.<./.P.i.d.>.......
                    C:\ProgramData\Microsoft\Windows\WER\Temp\WERA219.tmp.xml
                    Process:C:\Windows\SysWOW64\WerFault.exe
                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):4696
                    Entropy (8bit):4.487517127877766
                    Encrypted:false
                    SSDEEP:48:cvIwSD8zsTJgtWI9m4WSC8BI8fm8M4JCdsDvhF3e+q8/QLBBc4SrSEd:uITftdxSN3Jl7eVsDWEd
                    MD5:FF5A047CF993A42F5B5BABA30DE99647
                    SHA1:ED221F555C69E434400FCFC08768397CE74AE74C
                    SHA-256:60518FEBB19DBDACCB3E4D644C22BC1B737F2BDDEB9F459B6EBEC57C23B231DA
                    SHA-512:F18D60FE1983B9C3F0C45C12089539753FD5D0A5B37667DA7A95D69851A8042728AD0B5587E77B9E48C1905CAB3DB1B11FE6FE50AB1369966FAA2285E852434B
                    Malicious:false
                    Reputation:low
                    Preview: <?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="1309754" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
                    C:\Windows\appcompat\Programs\Amcache.hve
                    Process:C:\Windows\SysWOW64\WerFault.exe
                    File Type:MS Windows registry file, NT/2000 or above
                    Category:dropped
                    Size (bytes):1572864
                    Entropy (8bit):4.281346260961785
                    Encrypted:false
                    SSDEEP:12288:no7Mhuoq0S69Kuz5mQPg4hGZVkT4Tn6dwkmEOhdeYtsEhJXUJy:owhuoq0S69Kuz5kqBTh
                    MD5:B759349E398B9119E7DA64ABBC34BE62
                    SHA1:BB1060988E3111E18F01292140BA7BDE6B4E2601
                    SHA-256:75D1B4D1ACB47072856B6D166B08F678ADC1C5FFC9405014EADE4B76CB38FB97
                    SHA-512:A172121E871AD20B23A86B6ECB5E12A3640C2AC6B7D37ED85354357FE66A5C3651B2AF3BFA79E4BFEFA811F503985B63F0F9EF8480B1B6296F30AD7915F2CB60
                    Malicious:false
                    Reputation:low
                    Preview: regfW...W...p.\..,.................. ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e...4............E.4............E.....5............E.rmtmj.-..................................................................................................................................................................................................................................................................................................................................................u)C........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                    C:\Windows\appcompat\Programs\Amcache.hve.LOG1
                    Process:C:\Windows\SysWOW64\WerFault.exe
                    File Type:MS Windows registry file, NT/2000 or above
                    Category:dropped
                    Size (bytes):24576
                    Entropy (8bit):4.116206154896422
                    Encrypted:false
                    SSDEEP:384:kXFpse53EIxxk7Ru39vYBnt9SaPlSpafYt7+ygEhBzpfjrjQOe6Xadp9xfd:k1pl3LxkNu35YBPSaPIpafYtCyg8fjXW
                    MD5:8B67F4AE3DE37568249414D50233DAB8
                    SHA1:CEB8AE6992BD6AE8AC6A2DCA0F68FCDA77F9E726
                    SHA-256:0A39149007089E4916B6426C2F3C22F2E304977B7F5CBA417F5625BAE1CCC274
                    SHA-512:753183DE302ACB5E5A5853BE41FADFFB92343E091ACF30FDC479CE2E36887782CDF618CA12B4B3A7C2EF7FAF273A19E776791182F6ED91B2CD94C1F3A8ED8E04
                    Malicious:false
                    Reputation:low
                    Preview: regfV...V...p.\..,.................. ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e...4............E.4............E.....5............E.rmtmj.-..................................................................................................................................................................................................................................................................................................................................................u)CHvLE.^......V.............V.D`}x2..s.?..................0......................hbin................p.\..,..........nk,..c/..................................... ...........................&...{ad79c032-a2ea-f756-e377-72fb9332c3ae}......nk ..c/......... ...........8~.............. .......Z.......................Root........lf......Root....nk ..c/.................................... ...............*...............DeviceCensus.......................vk..................WritePermissions

                    Static File Info

                    General

                    File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                    Entropy (8bit):7.322458028777742
                    TrID:
                    • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
                    • Generic Win/DOS Executable (2004/3) 0.20%
                    • DOS Executable Generic (2002/1) 0.20%
                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                    File name:SecuriteInfo.com.W32.AIDetect.malware1.4295.dll
                    File size:544768
                    MD5:57cc0ec93c55348dd7b864e26ec96379
                    SHA1:bcf46bb64fc5a673e7889d9ba9baad26bfab0ff7
                    SHA256:60bd3eba4dac7d37cd07e375f4dbfe5e816b0ab599f28da31c5cf5b180b5849a
                    SHA512:562b44d23cbfa0ccec2bee34dfd5cdbad64f87adc8b152c2874d9a4f5b249ff7dfa437aa150fe33e919b3aa3871bf8b92dcbc8cc11b47aed69e791e1d4a9a784
                    SSDEEP:6144:D7+RYf/Mv1UvT4vjYf/Glpov3KvfMvLo+jwHk3UryzU3+R7ff4evm35IQku4+pMQ:D7t2UAogoOwhx7nA4+pMXg
                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........R...<...<...<..k....<...=.S.<.=.....<.......<.......<.t.?...<.t.=.4.<.L.9...<.t...0.<..k....<..0..x.<.......<..1....<..k....<

                    File Icon

                    Icon Hash:74f0e4ecccdce0e4

                    Static PE Info

                    General

                    Entrypoint:0x10004db0
                    Entrypoint Section:.rdata
                    Digitally signed:false
                    Imagebase:0x10000000
                    Subsystem:windows gui
                    Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT
                    Time Stamp:0x61C2E245 [Wed Dec 22 08:31:01 2021 UTC]
                    TLS Callbacks:
                    CLR (.Net) Version:
                    OS Version Major:5
                    OS Version Minor:0
                    File Version Major:5
                    File Version Minor:0
                    Subsystem Version Major:5
                    Subsystem Version Minor:0
                    Import Hash:e980d287af7ef0ccd616c6efb9daaae8

                    Entrypoint Preview

                    Instruction
                    inc eax
                    mov edx, 00000003h
                    cmpps xmm1, xmm0, 02h
                    add edx, 04h
                    add edx, 04h
                    add edx, 04h
                    add edx, 04h
                    add edx, 04h
                    add edx, 04h
                    add edx, 04h
                    add edx, 04h
                    add edx, 04h
                    add edx, 04h
                    add edx, 04h
                    add edx, 04h
                    add edx, 04h
                    add edx, 04h
                    add edx, 04h
                    add edx, 04h
                    add edx, 04h
                    add edx, 04h
                    add edx, 04h
                    add edx, 04h
                    add edx, 04h
                    add edx, 04h
                    add edx, 04h
                    jmp 00007F13A4705191h
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    push ebp
                    mov ebp, esp
                    push esi
                    push edi
                    push ebx
                    and esp, FFFFFFF8h
                    sub esp, 00000090h
                    mov eax, dword ptr [ebp+08h]
                    mov byte ptr [esp+00000083h], 00000064h
                    mov dword ptr [esp+70h], 02263442h
                    mov dword ptr [esp+44h], eax
                    call 00007F13A4708D1Ah
                    mov ecx, eax
                    mov edx, eax
                    mov esi, dword ptr [eax+3Ch]
                    movzx edi, word ptr [esp+0000008Ah]
                    mov bx, di
                    mov dword ptr [esp+40h], eax
                    mov eax, edi
                    xor eax, 0000E2E7h
                    mov word ptr [esp+3Eh], ax
                    mov al, byte ptr [esp+77h]
                    mov byte ptr [esp+3Dh], al
                    mov eax, dword ptr [esp+00000084h]
                    mov dword ptr [esp+38h], esi
                    mov si, word ptr [esp+3Eh]
                    mov word ptr [eax+eax+00000000h], si

                    Rich Headers

                    Programming Language:
                    • [IMP] VS2015 UPD1 build 23506
                    • [C++] VS2012 UPD1 build 51106
                    • [ASM] VS2012 build 50727
                    • [ASM] VS2012 UPD2 build 60315
                    • [LNK] VS2010 SP1 build 40219
                    • [EXP] VS2010 SP1 build 40219
                    • [RES] VS2015 UPD1 build 23506
                    • [IMP] VS2010 build 30319
                    • [ASM] VS2015 UPD1 build 23506
                    • [C++] VS2017 v15.5.4 build 25834
                    • [EXP] VS2012 UPD4 build 61030
                    • [C++] VS2008 build 21022
                    • [ASM] VS2010 SP1 build 40219

                    Data Directories

                    NameVirtual AddressVirtual Size Is in Section
                    IMAGE_DIRECTORY_ENTRY_EXPORT0x7c0290x60.rdata
                    IMAGE_DIRECTORY_ENTRY_IMPORT0x7c08c0x78.rdata
                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x840000x2f0.rsrc
                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x850000x1138.reloc
                    IMAGE_DIRECTORY_ENTRY_DEBUG0x60300x38.rdata
                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IAT0x80000x44.rdata
                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                    Sections

                    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                    .rdata0x10000x6b2e0x7000False0.391636439732data4.47964770197IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                    .rdata0x80000x7424e0x75000False0.316228882879data7.44062687646IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    .data0x7d0000x66d80x5000False0.24609375data5.03782298504IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                    .rsrc0x840000x2f00x1000False0.09033203125data0.789164600932IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    .reloc0x850000x11380x2000False0.2421875data4.12390144992IMAGE_SCN_TYPE_COPY, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                    Resources

                    NameRVASizeTypeLanguageCountry
                    RT_VERSION0x840600x290MS Windows COFF PA-RISC object fileEnglishUnited States

                    Imports

                    DLLImport
                    WINSPOOL.DRVEnumFormsW
                    ADVAPI32.dllRegCloseKey, QueryServiceStatusEx, AccessCheck
                    WS2_32.dllWSACleanup
                    USER32.dllGetWindowTextA
                    KERNEL32.dllCloseHandle, GetModuleHandleW, GetFileSize, OutputDebugStringA, IsDebuggerPresent, GetModuleFileNameW

                    Version Infos

                    DescriptionData
                    OriginalFilenameIha.dll
                    FileDescriptionOracle Call Interface
                    FileVersion2.3.7.0.0
                    Legal CopyrightCopyright Oracle Corporation 1979, 2001. All rights reserved.
                    CompanyNameOracle Corporation
                    Translation0x0409 0x04b0

                    Possible Origin

                    Language of compilation systemCountry where language is spokenMap
                    EnglishUnited States

                    Network Behavior

                    No network behavior found

                    Code Manipulations

                    Statistics

                    Behavior

                    Click to jump to process

                    System Behavior

                    General

                    Start time:20:03:55
                    Start date:22/12/2021
                    Path:C:\Windows\System32\loaddll32.exe
                    Wow64 process (32bit):true
                    Commandline:loaddll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.4295.dll"
                    Imagebase:0x8b0000
                    File size:116736 bytes
                    MD5 hash:7DEB5DB86C0AC789123DEC286286B938
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_Dridex_1, Description: Yara detected Dridex unpacked file, Source: 00000000.00000002.654367413.000000006E831000.00000020.00020000.sdmp, Author: Joe Security
                    Reputation:moderate

                    General

                    Start time:20:03:56
                    Start date:22/12/2021
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.4295.dll",#1
                    Imagebase:0x870000
                    File size:232960 bytes
                    MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high

                    General

                    Start time:20:03:56
                    Start date:22/12/2021
                    Path:C:\Windows\SysWOW64\rundll32.exe
                    Wow64 process (32bit):true
                    Commandline:rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.4295.dll",#1
                    Imagebase:0xb80000
                    File size:61952 bytes
                    MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_Dridex_1, Description: Yara detected Dridex unpacked file, Source: 00000002.00000000.263879217.000000006E831000.00000020.00020000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_Dridex_1, Description: Yara detected Dridex unpacked file, Source: 00000002.00000002.303178231.000000006E831000.00000020.00020000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_Dridex_1, Description: Yara detected Dridex unpacked file, Source: 00000002.00000000.261899992.000000006E831000.00000020.00020000.sdmp, Author: Joe Security
                    Reputation:high

                    General

                    Start time:20:04:00
                    Start date:22/12/2021
                    Path:C:\Windows\SysWOW64\WerFault.exe
                    Wow64 process (32bit):true
                    Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6368 -s 684
                    Imagebase:0xc30000
                    File size:434592 bytes
                    MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high

                    Disassembly

                    Code Analysis

                    Reset < >