Windows Analysis Report SecuriteInfo.com.W32.AIDetect.malware2.28165.dll

Overview

General Information

Sample Name: SecuriteInfo.com.W32.AIDetect.malware2.28165.dll
Analysis ID: 544258
MD5: 9d86b7a93411bd7cc5c68b4f49709c27
SHA1: 199faa9305b8a1f6645c07098990ac62da6a7d4d
SHA256: 03d956e36d96255794c7999c52cbc3ea5fc6ec52193a0a3db40e7fb1414b6219
Tags: dll
Infos:

Most interesting Screenshot:

Detection

Dridex
Score: 76
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Found malware configuration
Yara detected Dridex unpacked file
Multi AV Scanner detection for submitted file
Sigma detected: Suspicious Call by Ordinal
Tries to delay execution (extensive OutputDebugStringW loop)
C2 URLs / IPs found in malware configuration
Uses 32bit PE files
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
AV process strings found (often used to terminate AV products)
Sample file is different than original file name gathered from version info
One or more processes crash
Contains functionality to query locales information (e.g. system language)
Uses code obfuscation techniques (call, push, ret)
Checks if the current process is being debugged
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to call native functions
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Creates a process in suspended mode (likely to inject code)
IP address seen in connection with other malware
Entry point lies outside standard sections
Abnormal high CPU Usage

Classification

AV Detection:

barindex
Found malware configuration
Source: 2.2.rundll32.exe.6e750000.2.unpack Malware Configuration Extractor: Dridex {"Version": 22201, "C2 list": ["144.91.122.102:443", "85.10.248.28:593", "185.4.135.27:5228", "80.211.3.13:8116"], "RC4 keys": ["3IC8sFlUX9XZuoBQY9u5LhcZnHsV7E5r", "hnk63OiMfIbUqQnY7gkPwplwC0Ue5ZkZBYMCTYTjntqX7zsy9OvtNUlthJZXRtFF6P52Zbz6R5"]}
Multi AV Scanner detection for submitted file
Source: SecuriteInfo.com.W32.AIDetect.malware2.28165.dll Virustotal: Detection: 19% Perma Link
Source: SecuriteInfo.com.W32.AIDetect.malware2.28165.dll ReversingLabs: Detection: 23%

Compliance:

barindex
Uses 32bit PE files
Source: SecuriteInfo.com.W32.AIDetect.malware2.28165.dll Static PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
Source: SecuriteInfo.com.W32.AIDetect.malware2.28165.dll Static PE information: DYNAMIC_BASE, NX_COMPAT
Source: Binary string: profapi.pdb! source: WerFault.exe, 00000007.00000003.672800912.0000000005296000.00000004.00000040.sdmp
Source: Binary string: wkernel32.pdb source: WerFault.exe, 00000007.00000003.668453300.0000000002EE5000.00000004.00000001.sdmp, WerFault.exe, 00000007.00000003.668264334.0000000002EE5000.00000004.00000001.sdmp, WerFault.exe, 00000007.00000003.672783661.00000000052C1000.00000004.00000001.sdmp, WerFault.exe, 00000007.00000003.668240835.0000000004F50000.00000004.00000001.sdmp
Source: Binary string: shlwapi.pdb+ source: WerFault.exe, 00000007.00000003.672800912.0000000005296000.00000004.00000040.sdmp
Source: Binary string: sfc_os.pdb source: WerFault.exe, 00000007.00000003.672800912.0000000005296000.00000004.00000040.sdmp
Source: Binary string: bcrypt.pdb source: WerFault.exe, 00000007.00000003.672800912.0000000005296000.00000004.00000040.sdmp
Source: Binary string: ucrtbase.pdb source: WerFault.exe, 00000007.00000003.672793536.0000000005290000.00000004.00000040.sdmp
Source: Binary string: msvcrt.pdb source: WerFault.exe, 00000007.00000003.672783661.00000000052C1000.00000004.00000001.sdmp
Source: Binary string: dwmapi.pdb" source: WerFault.exe, 00000007.00000003.672800912.0000000005296000.00000004.00000040.sdmp
Source: Binary string: wrpcrt4.pdb source: WerFault.exe, 00000007.00000003.672793536.0000000005290000.00000004.00000040.sdmp
Source: Binary string: wntdll.pdb source: loaddll32.exe, 00000000.00000003.667178698.000000004B280000.00000004.00000001.sdmp, WerFault.exe, 00000007.00000003.672783661.00000000052C1000.00000004.00000001.sdmp, WerFault.exe, 00000007.00000003.668889853.0000000002EDF000.00000004.00000001.sdmp, WerFault.exe, 00000007.00000003.668259172.0000000002EDF000.00000004.00000001.sdmp
Source: Binary string: winspool.pdb5 source: WerFault.exe, 00000007.00000003.672800912.0000000005296000.00000004.00000040.sdmp
Source: Binary string: shcore.pdb source: WerFault.exe, 00000007.00000003.672793536.0000000005290000.00000004.00000040.sdmp
Source: Binary string: wgdi32.pdb source: WerFault.exe, 00000007.00000003.672783661.00000000052C1000.00000004.00000001.sdmp
Source: Binary string: advapi32.pdb source: WerFault.exe, 00000007.00000003.672800912.0000000005296000.00000004.00000040.sdmp
Source: Binary string: fltLib.pdb source: WerFault.exe, 00000007.00000003.672800912.0000000005296000.00000004.00000040.sdmp
Source: Binary string: wsspicli.pdb source: WerFault.exe, 00000007.00000003.672800912.0000000005296000.00000004.00000040.sdmp
Source: Binary string: wsspicli.pdb- source: WerFault.exe, 00000007.00000003.672800912.0000000005296000.00000004.00000040.sdmp
Source: Binary string: shell32.pdb source: WerFault.exe, 00000007.00000003.672793536.0000000005290000.00000004.00000040.sdmp
Source: Binary string: propsys.pdb3 source: WerFault.exe, 00000007.00000003.672800912.0000000005296000.00000004.00000040.sdmp
Source: Binary string: msvcp_win.pdb source: WerFault.exe, 00000007.00000003.672783661.00000000052C1000.00000004.00000001.sdmp
Source: Binary string: wimm32.pdb source: WerFault.exe, 00000007.00000003.672800912.0000000005296000.00000004.00000040.sdmp
Source: Binary string: wkernelbase.pdb source: WerFault.exe, 00000007.00000003.672783661.00000000052C1000.00000004.00000001.sdmp, WerFault.exe, 00000007.00000003.668644186.0000000002EEB000.00000004.00000001.sdmp, WerFault.exe, 00000007.00000003.668269654.0000000002EEB000.00000004.00000001.sdmp, WerFault.exe, 00000007.00000003.668457629.0000000002EEB000.00000004.00000001.sdmp
Source: Binary string: shlwapi.pdb source: WerFault.exe, 00000007.00000003.672800912.0000000005296000.00000004.00000040.sdmp
Source: Binary string: mpr.pdb source: WerFault.exe, 00000007.00000003.672793536.0000000005290000.00000004.00000040.sdmp
Source: Binary string: wwin32u.pdb source: WerFault.exe, 00000007.00000003.672783661.00000000052C1000.00000004.00000001.sdmp
Source: Binary string: setupapi.pdb source: WerFault.exe, 00000007.00000003.672800912.0000000005296000.00000004.00000040.sdmp
Source: Binary string: wUxTheme.pdb source: WerFault.exe, 00000007.00000003.672800912.0000000005296000.00000004.00000040.sdmp
Source: Binary string: imagehlp.pdb source: WerFault.exe, 00000007.00000003.672800912.0000000005296000.00000004.00000040.sdmp
Source: Binary string: dwmapi.pdb source: WerFault.exe, 00000007.00000003.672800912.0000000005296000.00000004.00000040.sdmp
Source: Binary string: RFFGTEQ.pdb source: SecuriteInfo.com.W32.AIDetect.malware2.28165.dll
Source: Binary string: wntdll.pdb( source: WerFault.exe, 00000007.00000003.668889853.0000000002EDF000.00000004.00000001.sdmp, WerFault.exe, 00000007.00000003.668259172.0000000002EDF000.00000004.00000001.sdmp
Source: Binary string: shcore.pdbk source: WerFault.exe, 00000007.00000003.672793536.0000000005290000.00000004.00000040.sdmp
Source: Binary string: profapi.pdb source: WerFault.exe, 00000007.00000003.672800912.0000000005296000.00000004.00000040.sdmp
Source: Binary string: ws2_32.pdb source: WerFault.exe, 00000007.00000003.672800912.0000000005296000.00000004.00000040.sdmp
Source: Binary string: winspool.pdb source: WerFault.exe, 00000007.00000003.672800912.0000000005296000.00000004.00000040.sdmp
Source: Binary string: wgdi32full.pdb source: WerFault.exe, 00000007.00000003.672783661.00000000052C1000.00000004.00000001.sdmp
Source: Binary string: shell32.pdbk source: WerFault.exe, 00000007.00000003.672793536.0000000005290000.00000004.00000040.sdmp
Source: Binary string: sechost.pdb source: WerFault.exe, 00000007.00000003.672800912.0000000005296000.00000004.00000040.sdmp
Source: Binary string: iphlpapi.pdb source: WerFault.exe, 00000007.00000003.672800912.0000000005296000.00000004.00000040.sdmp
Source: Binary string: msctf.pdbN source: WerFault.exe, 00000007.00000003.672800912.0000000005296000.00000004.00000040.sdmp
Source: Binary string: propsys.pdb source: WerFault.exe, 00000007.00000003.672800912.0000000005296000.00000004.00000040.sdmp
Source: Binary string: wntdll.pdbUGP source: loaddll32.exe, 00000000.00000003.667178698.000000004B280000.00000004.00000001.sdmp
Source: Binary string: cfgmgr32.pdbk source: WerFault.exe, 00000007.00000003.672793536.0000000005290000.00000004.00000040.sdmp
Source: Binary string: mpr.pdb^ source: WerFault.exe, 00000007.00000003.672793536.0000000005290000.00000004.00000040.sdmp
Source: Binary string: ucrtbase.pdbk source: WerFault.exe, 00000007.00000003.672793536.0000000005290000.00000004.00000040.sdmp
Source: Binary string: powrprof.pdb source: WerFault.exe, 00000007.00000003.672800912.0000000005296000.00000004.00000040.sdmp
Source: Binary string: msctf.pdb source: WerFault.exe, 00000007.00000003.672800912.0000000005296000.00000004.00000040.sdmp
Source: Binary string: AcLayers.pdb source: WerFault.exe, 00000007.00000003.672783661.00000000052C1000.00000004.00000001.sdmp
Source: Binary string: sfc.pdb] source: WerFault.exe, 00000007.00000003.672800912.0000000005296000.00000004.00000040.sdmp
Source: Binary string: Kernel.Appcore.pdb source: WerFault.exe, 00000007.00000003.672793536.0000000005290000.00000004.00000040.sdmp
Source: Binary string: cryptbase.pdb source: WerFault.exe, 00000007.00000003.672800912.0000000005296000.00000004.00000040.sdmp
Source: Binary string: setupapi.pdb? source: WerFault.exe, 00000007.00000003.672800912.0000000005296000.00000004.00000040.sdmp
Source: Binary string: wkernelbase.pdb( source: WerFault.exe, 00000007.00000003.668644186.0000000002EEB000.00000004.00000001.sdmp, WerFault.exe, 00000007.00000003.668269654.0000000002EEB000.00000004.00000001.sdmp, WerFault.exe, 00000007.00000003.668457629.0000000002EEB000.00000004.00000001.sdmp
Source: Binary string: bcryptprimitives.pdb source: WerFault.exe, 00000007.00000003.672793536.0000000005290000.00000004.00000040.sdmp
Source: Binary string: cfgmgr32.pdb source: WerFault.exe, 00000007.00000003.672793536.0000000005290000.00000004.00000040.sdmp
Source: Binary string: combase.pdb source: WerFault.exe, 00000007.00000003.672800912.0000000005296000.00000004.00000040.sdmp
Source: Binary string: Windows.Storage.pdb source: WerFault.exe, 00000007.00000003.672793536.0000000005290000.00000004.00000040.sdmp
Source: Binary string: fltLib.pdb source: WerFault.exe, 00000007.00000003.672800912.0000000005296000.00000004.00000040.sdmp
Source: Binary string: wkernel32.pdb( source: WerFault.exe, 00000007.00000003.668453300.0000000002EE5000.00000004.00000001.sdmp, WerFault.exe, 00000007.00000003.668264334.0000000002EE5000.00000004.00000001.sdmp
Source: Binary string: rundll32.pdb source: WerFault.exe, 00000007.00000003.672783661.00000000052C1000.00000004.00000001.sdmp
Source: Binary string: oleaut32.pdb source: WerFault.exe, 00000007.00000003.672800912.0000000005296000.00000004.00000040.sdmp
Source: Binary string: sfc.pdb source: WerFault.exe, 00000007.00000003.672800912.0000000005296000.00000004.00000040.sdmp
Source: Binary string: apphelp.pdb source: WerFault.exe, 00000007.00000003.672783661.00000000052C1000.00000004.00000001.sdmp
Source: Binary string: wuser32.pdb source: WerFault.exe, 00000007.00000003.672783661.00000000052C1000.00000004.00000001.sdmp

Networking:

barindex
C2 URLs / IPs found in malware configuration
Source: Malware configuration extractor IPs: 144.91.122.102:443
Source: Malware configuration extractor IPs: 85.10.248.28:593
Source: Malware configuration extractor IPs: 185.4.135.27:5228
Source: Malware configuration extractor IPs: 80.211.3.13:8116
Internet Provider seen in connection with other malware
Source: Joe Sandbox View ASN Name: TOPHOSTGR TOPHOSTGR
Source: Joe Sandbox View ASN Name: HETZNER-ASDE HETZNER-ASDE
Source: Joe Sandbox View ASN Name: ARUBA-ASNIT ARUBA-ASNIT
IP address seen in connection with other malware
Source: Joe Sandbox View IP Address: 185.4.135.27 185.4.135.27
Source: Joe Sandbox View IP Address: 85.10.248.28 85.10.248.28
Source: Joe Sandbox View IP Address: 80.211.3.13 80.211.3.13
Source: WerFault.exe, 00000007.00000002.691773134.0000000004E90000.00000004.00000001.sdmp String found in binary or memory: http://crl.globalsign.net/root-r2.crl0
Source: Amcache.hve.7.dr String found in binary or memory: http://upx.sf.net
Source: loaddll32.exe, 00000000.00000002.1054725426.000000006E76F000.00000002.00020000.sdmp, rundll32.exe, 00000002.00000000.664536372.000000006E76F000.00000002.00020000.sdmp String found in binary or memory: http://www.forex-broker.websiteDVarFileInfo$

E-Banking Fraud:

barindex
Yara detected Dridex unpacked file
Source: Yara match File source: 0.2.loaddll32.exe.6e750000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 2.0.rundll32.exe.6e750000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 2.2.rundll32.exe.6e750000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 2.0.rundll32.exe.6e750000.5.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000002.00000000.663271333.000000006E751000.00000020.00020000.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000002.1053702891.000000006E751000.00000020.00020000.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000000.664478156.000000006E751000.00000020.00020000.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000002.695754483.000000006E751000.00000020.00020000.sdmp, type: MEMORY

System Summary:

barindex
Uses 32bit PE files
Source: SecuriteInfo.com.W32.AIDetect.malware2.28165.dll Static PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
Sample file is different than original file name gathered from version info
Source: SecuriteInfo.com.W32.AIDetect.malware2.28165.dll Binary or memory string: OriginalFilenameIha.dllD vs SecuriteInfo.com.W32.AIDetect.malware2.28165.dll
One or more processes crash
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7156 -s 684
Detected potential crypto function
Source: C:\Windows\System32\loaddll32.exe Code function: 0_2_6E760730 0_2_6E760730
Source: C:\Windows\System32\loaddll32.exe Code function: 0_2_6E769370 0_2_6E769370
Source: C:\Windows\System32\loaddll32.exe Code function: 0_2_6E76143C 0_2_6E76143C
Source: C:\Windows\System32\loaddll32.exe Code function: 0_2_6E758428 0_2_6E758428
Source: C:\Windows\System32\loaddll32.exe Code function: 0_2_6E75A4E8 0_2_6E75A4E8
Source: C:\Windows\System32\loaddll32.exe Code function: 0_2_6E751494 0_2_6E751494
Contains functionality to call native functions
Source: C:\Windows\System32\loaddll32.exe Code function: 0_2_6E762234 NtDelayExecution, 0_2_6E762234
Source: C:\Windows\System32\loaddll32.exe Code function: 0_2_6E762820 NtAllocateVirtualMemory, 0_2_6E762820
Abnormal high CPU Usage
Source: C:\Windows\System32\loaddll32.exe Process Stats: CPU usage > 98%
Source: SecuriteInfo.com.W32.AIDetect.malware2.28165.dll Virustotal: Detection: 19%
Source: SecuriteInfo.com.W32.AIDetect.malware2.28165.dll ReversingLabs: Detection: 23%
Source: C:\Windows\System32\loaddll32.exe Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware2.28165.dll",#1
Source: unknown Process created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware2.28165.dll"
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware2.28165.dll",#1
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware2.28165.dll",#1
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7156 -s 684
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware2.28165.dll",#1 Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware2.28165.dll",#1 Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7156
Source: C:\Windows\SysWOW64\WerFault.exe File created: C:\ProgramData\Microsoft\Windows\WER\Temp\WER6137.tmp Jump to behavior
Source: classification engine Classification label: mal76.troj.evad.winDLL@6/6@0/4
Source: C:\Windows\SysWOW64\WerFault.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: SecuriteInfo.com.W32.AIDetect.malware2.28165.dll Static PE information: DYNAMIC_BASE, NX_COMPAT
Source: SecuriteInfo.com.W32.AIDetect.malware2.28165.dll Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: profapi.pdb! source: WerFault.exe, 00000007.00000003.672800912.0000000005296000.00000004.00000040.sdmp
Source: Binary string: wkernel32.pdb source: WerFault.exe, 00000007.00000003.668453300.0000000002EE5000.00000004.00000001.sdmp, WerFault.exe, 00000007.00000003.668264334.0000000002EE5000.00000004.00000001.sdmp, WerFault.exe, 00000007.00000003.672783661.00000000052C1000.00000004.00000001.sdmp, WerFault.exe, 00000007.00000003.668240835.0000000004F50000.00000004.00000001.sdmp
Source: Binary string: shlwapi.pdb+ source: WerFault.exe, 00000007.00000003.672800912.0000000005296000.00000004.00000040.sdmp
Source: Binary string: sfc_os.pdb source: WerFault.exe, 00000007.00000003.672800912.0000000005296000.00000004.00000040.sdmp
Source: Binary string: bcrypt.pdb source: WerFault.exe, 00000007.00000003.672800912.0000000005296000.00000004.00000040.sdmp
Source: Binary string: ucrtbase.pdb source: WerFault.exe, 00000007.00000003.672793536.0000000005290000.00000004.00000040.sdmp
Source: Binary string: msvcrt.pdb source: WerFault.exe, 00000007.00000003.672783661.00000000052C1000.00000004.00000001.sdmp
Source: Binary string: dwmapi.pdb" source: WerFault.exe, 00000007.00000003.672800912.0000000005296000.00000004.00000040.sdmp
Source: Binary string: wrpcrt4.pdb source: WerFault.exe, 00000007.00000003.672793536.0000000005290000.00000004.00000040.sdmp
Source: Binary string: wntdll.pdb source: loaddll32.exe, 00000000.00000003.667178698.000000004B280000.00000004.00000001.sdmp, WerFault.exe, 00000007.00000003.672783661.00000000052C1000.00000004.00000001.sdmp, WerFault.exe, 00000007.00000003.668889853.0000000002EDF000.00000004.00000001.sdmp, WerFault.exe, 00000007.00000003.668259172.0000000002EDF000.00000004.00000001.sdmp
Source: Binary string: winspool.pdb5 source: WerFault.exe, 00000007.00000003.672800912.0000000005296000.00000004.00000040.sdmp
Source: Binary string: shcore.pdb source: WerFault.exe, 00000007.00000003.672793536.0000000005290000.00000004.00000040.sdmp
Source: Binary string: wgdi32.pdb source: WerFault.exe, 00000007.00000003.672783661.00000000052C1000.00000004.00000001.sdmp
Source: Binary string: advapi32.pdb source: WerFault.exe, 00000007.00000003.672800912.0000000005296000.00000004.00000040.sdmp
Source: Binary string: fltLib.pdb source: WerFault.exe, 00000007.00000003.672800912.0000000005296000.00000004.00000040.sdmp
Source: Binary string: wsspicli.pdb source: WerFault.exe, 00000007.00000003.672800912.0000000005296000.00000004.00000040.sdmp
Source: Binary string: wsspicli.pdb- source: WerFault.exe, 00000007.00000003.672800912.0000000005296000.00000004.00000040.sdmp
Source: Binary string: shell32.pdb source: WerFault.exe, 00000007.00000003.672793536.0000000005290000.00000004.00000040.sdmp
Source: Binary string: propsys.pdb3 source: WerFault.exe, 00000007.00000003.672800912.0000000005296000.00000004.00000040.sdmp
Source: Binary string: msvcp_win.pdb source: WerFault.exe, 00000007.00000003.672783661.00000000052C1000.00000004.00000001.sdmp
Source: Binary string: wimm32.pdb source: WerFault.exe, 00000007.00000003.672800912.0000000005296000.00000004.00000040.sdmp
Source: Binary string: wkernelbase.pdb source: WerFault.exe, 00000007.00000003.672783661.00000000052C1000.00000004.00000001.sdmp, WerFault.exe, 00000007.00000003.668644186.0000000002EEB000.00000004.00000001.sdmp, WerFault.exe, 00000007.00000003.668269654.0000000002EEB000.00000004.00000001.sdmp, WerFault.exe, 00000007.00000003.668457629.0000000002EEB000.00000004.00000001.sdmp
Source: Binary string: shlwapi.pdb source: WerFault.exe, 00000007.00000003.672800912.0000000005296000.00000004.00000040.sdmp
Source: Binary string: mpr.pdb source: WerFault.exe, 00000007.00000003.672793536.0000000005290000.00000004.00000040.sdmp
Source: Binary string: wwin32u.pdb source: WerFault.exe, 00000007.00000003.672783661.00000000052C1000.00000004.00000001.sdmp
Source: Binary string: setupapi.pdb source: WerFault.exe, 00000007.00000003.672800912.0000000005296000.00000004.00000040.sdmp
Source: Binary string: wUxTheme.pdb source: WerFault.exe, 00000007.00000003.672800912.0000000005296000.00000004.00000040.sdmp
Source: Binary string: imagehlp.pdb source: WerFault.exe, 00000007.00000003.672800912.0000000005296000.00000004.00000040.sdmp
Source: Binary string: dwmapi.pdb source: WerFault.exe, 00000007.00000003.672800912.0000000005296000.00000004.00000040.sdmp
Source: Binary string: RFFGTEQ.pdb source: SecuriteInfo.com.W32.AIDetect.malware2.28165.dll
Source: Binary string: wntdll.pdb( source: WerFault.exe, 00000007.00000003.668889853.0000000002EDF000.00000004.00000001.sdmp, WerFault.exe, 00000007.00000003.668259172.0000000002EDF000.00000004.00000001.sdmp
Source: Binary string: shcore.pdbk source: WerFault.exe, 00000007.00000003.672793536.0000000005290000.00000004.00000040.sdmp
Source: Binary string: profapi.pdb source: WerFault.exe, 00000007.00000003.672800912.0000000005296000.00000004.00000040.sdmp
Source: Binary string: ws2_32.pdb source: WerFault.exe, 00000007.00000003.672800912.0000000005296000.00000004.00000040.sdmp
Source: Binary string: winspool.pdb source: WerFault.exe, 00000007.00000003.672800912.0000000005296000.00000004.00000040.sdmp
Source: Binary string: wgdi32full.pdb source: WerFault.exe, 00000007.00000003.672783661.00000000052C1000.00000004.00000001.sdmp
Source: Binary string: shell32.pdbk source: WerFault.exe, 00000007.00000003.672793536.0000000005290000.00000004.00000040.sdmp
Source: Binary string: sechost.pdb source: WerFault.exe, 00000007.00000003.672800912.0000000005296000.00000004.00000040.sdmp
Source: Binary string: iphlpapi.pdb source: WerFault.exe, 00000007.00000003.672800912.0000000005296000.00000004.00000040.sdmp
Source: Binary string: msctf.pdbN source: WerFault.exe, 00000007.00000003.672800912.0000000005296000.00000004.00000040.sdmp
Source: Binary string: propsys.pdb source: WerFault.exe, 00000007.00000003.672800912.0000000005296000.00000004.00000040.sdmp
Source: Binary string: wntdll.pdbUGP source: loaddll32.exe, 00000000.00000003.667178698.000000004B280000.00000004.00000001.sdmp
Source: Binary string: cfgmgr32.pdbk source: WerFault.exe, 00000007.00000003.672793536.0000000005290000.00000004.00000040.sdmp
Source: Binary string: mpr.pdb^ source: WerFault.exe, 00000007.00000003.672793536.0000000005290000.00000004.00000040.sdmp
Source: Binary string: ucrtbase.pdbk source: WerFault.exe, 00000007.00000003.672793536.0000000005290000.00000004.00000040.sdmp
Source: Binary string: powrprof.pdb source: WerFault.exe, 00000007.00000003.672800912.0000000005296000.00000004.00000040.sdmp
Source: Binary string: msctf.pdb source: WerFault.exe, 00000007.00000003.672800912.0000000005296000.00000004.00000040.sdmp
Source: Binary string: AcLayers.pdb source: WerFault.exe, 00000007.00000003.672783661.00000000052C1000.00000004.00000001.sdmp
Source: Binary string: sfc.pdb] source: WerFault.exe, 00000007.00000003.672800912.0000000005296000.00000004.00000040.sdmp
Source: Binary string: Kernel.Appcore.pdb source: WerFault.exe, 00000007.00000003.672793536.0000000005290000.00000004.00000040.sdmp
Source: Binary string: cryptbase.pdb source: WerFault.exe, 00000007.00000003.672800912.0000000005296000.00000004.00000040.sdmp
Source: Binary string: setupapi.pdb? source: WerFault.exe, 00000007.00000003.672800912.0000000005296000.00000004.00000040.sdmp
Source: Binary string: wkernelbase.pdb( source: WerFault.exe, 00000007.00000003.668644186.0000000002EEB000.00000004.00000001.sdmp, WerFault.exe, 00000007.00000003.668269654.0000000002EEB000.00000004.00000001.sdmp, WerFault.exe, 00000007.00000003.668457629.0000000002EEB000.00000004.00000001.sdmp
Source: Binary string: bcryptprimitives.pdb source: WerFault.exe, 00000007.00000003.672793536.0000000005290000.00000004.00000040.sdmp
Source: Binary string: cfgmgr32.pdb source: WerFault.exe, 00000007.00000003.672793536.0000000005290000.00000004.00000040.sdmp
Source: Binary string: combase.pdb source: WerFault.exe, 00000007.00000003.672800912.0000000005296000.00000004.00000040.sdmp
Source: Binary string: Windows.Storage.pdb source: WerFault.exe, 00000007.00000003.672793536.0000000005290000.00000004.00000040.sdmp
Source: Binary string: fltLib.pdb source: WerFault.exe, 00000007.00000003.672800912.0000000005296000.00000004.00000040.sdmp
Source: Binary string: wkernel32.pdb( source: WerFault.exe, 00000007.00000003.668453300.0000000002EE5000.00000004.00000001.sdmp, WerFault.exe, 00000007.00000003.668264334.0000000002EE5000.00000004.00000001.sdmp
Source: Binary string: rundll32.pdb source: WerFault.exe, 00000007.00000003.672783661.00000000052C1000.00000004.00000001.sdmp
Source: Binary string: oleaut32.pdb source: WerFault.exe, 00000007.00000003.672800912.0000000005296000.00000004.00000040.sdmp
Source: Binary string: sfc.pdb source: WerFault.exe, 00000007.00000003.672800912.0000000005296000.00000004.00000040.sdmp
Source: Binary string: apphelp.pdb source: WerFault.exe, 00000007.00000003.672783661.00000000052C1000.00000004.00000001.sdmp
Source: Binary string: wuser32.pdb source: WerFault.exe, 00000007.00000003.672783661.00000000052C1000.00000004.00000001.sdmp

Data Obfuscation:

barindex
Uses code obfuscation techniques (call, push, ret)
Source: C:\Windows\System32\loaddll32.exe Code function: 0_2_6E75F6A8 push esi; mov dword ptr [esp], 00000000h 0_2_6E75F6A9
Entry point lies outside standard sections
Source: initial sample Static PE information: section where entry point is pointing to: .rdata

Hooking and other Techniques for Hiding and Protection:

barindex
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Source: C:\Windows\SysWOW64\WerFault.exe Registry key monitored for changes: HKEY_CURRENT_USER_Classes Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior

Malware Analysis System Evasion:

barindex
Tries to delay execution (extensive OutputDebugStringW loop)
Source: C:\Windows\System32\loaddll32.exe Section loaded: OutputDebugStringW count: 1411
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Source: C:\Windows\System32\loaddll32.exe Window / User API: threadDelayed 1411 Jump to behavior
Source: C:\Windows\System32\loaddll32.exe Code function: 0_2_6E760730 GetTokenInformation,GetSystemInfo,GetTokenInformation, 0_2_6E760730
Source: Amcache.hve.7.dr Binary or memory string: VMware
Source: Amcache.hve.7.dr Binary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/5&1ec51bf7&0&000000
Source: Amcache.hve.7.dr Binary or memory string: @scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/5&280b647&0&000000
Source: Amcache.hve.7.dr Binary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.7.dr Binary or memory string: VMware-42 35 9c fb 73 fa 4e 1b-fb a4 60 e7 7b e5 4a ed
Source: Amcache.hve.7.dr Binary or memory string: VMware, Inc.
Source: WerFault.exe, 00000007.00000002.691773134.0000000004E90000.00000004.00000001.sdmp Binary or memory string: Hyper-V RAWp
Source: Amcache.hve.7.dr Binary or memory string: VMware Virtual disk SCSI Disk Devicehbin
Source: Amcache.hve.7.dr Binary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.7.dr Binary or memory string: VMware7,1
Source: Amcache.hve.7.dr Binary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.7.dr Binary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.7.dr Binary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW71.00V.13989454.B64.1906190538,BiosReleaseDate:06/19/2019,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware7,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: WerFault.exe, 00000007.00000003.686993932.0000000004F63000.00000004.00000001.sdmp, WerFault.exe, 00000007.00000002.694219293.0000000004F63000.00000004.00000001.sdmp Binary or memory string: Hyper-V RAW
Source: Amcache.hve.7.dr Binary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.7.dr Binary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.7.dr Binary or memory string: VMware, Inc.me
Source: Amcache.hve.7.dr Binary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/5&280b647&0&000000
Source: Amcache.hve.7.dr Binary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/5&1ec51bf7&0&000000

Anti Debugging:

barindex
Checks if the current process is being debugged
Source: C:\Windows\SysWOW64\rundll32.exe Process queried: DebugPort Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process queried: DebugPort Jump to behavior
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Source: C:\Windows\System32\loaddll32.exe Code function: 0_2_6E756D0C GetUserNameW,MessageBoxW,GetLastError,CreateFileA,DebugBreak,FlushFileBuffers,FreeEnvironmentStringsA,GetConsoleOutputCP,GetEnvironmentStrings,GetLocaleInfoA,GetStartupInfoA,GetStringTypeA,HeapValidate,IsBadReadPtr,LCMapStringA,LoadLibraryA,OutputDebugStringA, 0_2_6E756D0C
Source: C:\Windows\System32\loaddll32.exe Code function: 0_2_6E763138 RtlAddVectoredExceptionHandler, 0_2_6E763138

HIPS / PFW / Operating System Protection Evasion:

barindex
Creates a process in suspended mode (likely to inject code)
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware2.28165.dll",#1 Jump to behavior
Source: loaddll32.exe, 00000000.00000002.1053413526.0000000000F40000.00000002.00020000.sdmp, rundll32.exe, 00000002.00000000.664234752.0000000003790000.00000002.00020000.sdmp, rundll32.exe, 00000002.00000000.662485231.0000000003790000.00000002.00020000.sdmp Binary or memory string: Program Manager
Source: loaddll32.exe, 00000000.00000002.1053413526.0000000000F40000.00000002.00020000.sdmp, rundll32.exe, 00000002.00000000.664234752.0000000003790000.00000002.00020000.sdmp, rundll32.exe, 00000002.00000000.662485231.0000000003790000.00000002.00020000.sdmp Binary or memory string: Shell_TrayWnd
Source: loaddll32.exe, 00000000.00000002.1053413526.0000000000F40000.00000002.00020000.sdmp, rundll32.exe, 00000002.00000000.664234752.0000000003790000.00000002.00020000.sdmp, rundll32.exe, 00000002.00000000.662485231.0000000003790000.00000002.00020000.sdmp Binary or memory string: Progman
Source: loaddll32.exe, 00000000.00000002.1053413526.0000000000F40000.00000002.00020000.sdmp, rundll32.exe, 00000002.00000000.664234752.0000000003790000.00000002.00020000.sdmp, rundll32.exe, 00000002.00000000.662485231.0000000003790000.00000002.00020000.sdmp Binary or memory string: Progmanlock

Language, Device and Operating System Detection:

barindex
Contains functionality to query locales information (e.g. system language)
Source: C:\Windows\System32\loaddll32.exe Code function: GetUserNameW,MessageBoxW,GetLastError,CreateFileA,DebugBreak,FlushFileBuffers,FreeEnvironmentStringsA,GetConsoleOutputCP,GetEnvironmentStrings,GetLocaleInfoA,GetStartupInfoA,GetStringTypeA,HeapValidate,IsBadReadPtr,LCMapStringA,LoadLibraryA,OutputDebugStringA, 0_2_6E756D0C
Source: C:\Windows\System32\loaddll32.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid Jump to behavior
Source: C:\Windows\System32\loaddll32.exe Code function: 0_2_6E756D0C GetUserNameW,MessageBoxW,GetLastError,CreateFileA,DebugBreak,FlushFileBuffers,FreeEnvironmentStringsA,GetConsoleOutputCP,GetEnvironmentStrings,GetLocaleInfoA,GetStartupInfoA,GetStringTypeA,HeapValidate,IsBadReadPtr,LCMapStringA,LoadLibraryA,OutputDebugStringA, 0_2_6E756D0C

Lowering of HIPS / PFW / Operating System Security Settings:

barindex
AV process strings found (often used to terminate AV products)
Source: Amcache.hve.7.dr Binary or memory string: c:\program files\windows defender\msmpeng.exe
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs