Loading ...

Play interactive tourEdit tour

Windows Analysis Report triage_dropped_file.dll

Overview

General Information

Sample Name:triage_dropped_file.dll
Analysis ID:544526
MD5:7d424a845f21f905b17fb1e4ece26bc4
SHA1:129162c17505204008b8c6345f78d8bd8e9d9548
SHA256:7f62e9d0e2cb7358202052b4b20f43cec7eed7db11c57cfb372f8fddfb9307a3
Tags:22201dlldridex
Infos:

Most interesting Screenshot:

Detection

Dridex
Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Yara detected Dridex unpacked file
Multi AV Scanner detection for submitted file
Sigma detected: Suspicious Call by Ordinal
Tries to delay execution (extensive OutputDebugStringW loop)
C2 URLs / IPs found in malware configuration
Uses 32bit PE files
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
AV process strings found (often used to terminate AV products)
Sample file is different than original file name gathered from version info
One or more processes crash
Contains functionality to query locales information (e.g. system language)
Uses code obfuscation techniques (call, push, ret)
Checks if the current process is being debugged
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to call native functions
Creates a process in suspended mode (likely to inject code)
IP address seen in connection with other malware
Entry point lies outside standard sections
Abnormal high CPU Usage

Classification

Process Tree

  • System is w10x64
  • loaddll32.exe (PID: 2332 cmdline: loaddll32.exe "C:\Users\user\Desktop\triage_dropped_file.dll" MD5: 7DEB5DB86C0AC789123DEC286286B938)
    • cmd.exe (PID: 4700 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\triage_dropped_file.dll",#1 MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • rundll32.exe (PID: 6376 cmdline: rundll32.exe "C:\Users\user\Desktop\triage_dropped_file.dll",#1 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
        • WerFault.exe (PID: 1460 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6376 -s 672 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
  • cleanup

Malware Configuration

Threatname: Dridex

{"Version": 22201, "C2 list": ["144.91.122.102:443", "85.10.248.28:593", "185.4.135.27:5228", "80.211.3.13:8116"], "RC4 keys": ["3IC8sFlUX9XZuoBQY9u5LhcZnHsV7E5r", "hnk63OiMfIbUqQnY7gkPwplwC0Ue5ZkZBYMCTYTjntqX7zsy9OvtNUlthJZXRtFF6P52Zbz6R5"]}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000000.00000002.694559765.000000006EB21000.00000020.00020000.sdmpJoeSecurity_Dridex_1Yara detected Dridex unpacked fileJoe Security
    00000002.00000000.296075681.000000006EB21000.00000020.00020000.sdmpJoeSecurity_Dridex_1Yara detected Dridex unpacked fileJoe Security
      00000002.00000002.324884043.000000006EB21000.00000020.00020000.sdmpJoeSecurity_Dridex_1Yara detected Dridex unpacked fileJoe Security
        00000002.00000000.298180742.000000006EB21000.00000020.00020000.sdmpJoeSecurity_Dridex_1Yara detected Dridex unpacked fileJoe Security
          00000002.00000001.292482173.000000006EB20000.00000004.00020000.sdmpJoeSecurity_Dridex_1Yara detected Dridex unpacked fileJoe Security

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            2.2.rundll32.exe.6eb20000.2.unpackJoeSecurity_Dridex_1Yara detected Dridex unpacked fileJoe Security
              2.1.rundll32.exe.6eb20000.0.raw.unpackJoeSecurity_Dridex_1Yara detected Dridex unpacked fileJoe Security
                2.1.rundll32.exe.6eb20000.0.unpackJoeSecurity_Dridex_1Yara detected Dridex unpacked fileJoe Security
                  2.0.rundll32.exe.6eb20000.5.unpackJoeSecurity_Dridex_1Yara detected Dridex unpacked fileJoe Security
                    2.0.rundll32.exe.6eb20000.2.unpackJoeSecurity_Dridex_1Yara detected Dridex unpacked fileJoe Security
                      Click to see the 1 entries

                      Sigma Overview

                      System Summary:

                      barindex
                      Sigma detected: Suspicious Call by OrdinalShow sources
                      Source: Process startedAuthor: Florian Roth: Data: Command: rundll32.exe "C:\Users\user\Desktop\triage_dropped_file.dll",#1, CommandLine: rundll32.exe "C:\Users\user\Desktop\triage_dropped_file.dll",#1, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\rundll32.exe, NewProcessName: C:\Windows\SysWOW64\rundll32.exe, OriginalFileName: C:\Windows\SysWOW64\rundll32.exe, ParentCommandLine: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\triage_dropped_file.dll",#1, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 4700, ProcessCommandLine: rundll32.exe "C:\Users\user\Desktop\triage_dropped_file.dll",#1, ProcessId: 6376

                      Jbx Signature Overview

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection:

                      barindex
                      Found malware configurationShow sources
                      Source: 0.2.loaddll32.exe.6eb20000.2.unpackMalware Configuration Extractor: Dridex {"Version": 22201, "C2 list": ["144.91.122.102:443", "85.10.248.28:593", "185.4.135.27:5228", "80.211.3.13:8116"], "RC4 keys": ["3IC8sFlUX9XZuoBQY9u5LhcZnHsV7E5r", "hnk63OiMfIbUqQnY7gkPwplwC0Ue5ZkZBYMCTYTjntqX7zsy9OvtNUlthJZXRtFF6P52Zbz6R5"]}
                      Multi AV Scanner detection for submitted fileShow sources
                      Source: triage_dropped_file.dllReversingLabs: Detection: 18%
                      Source: triage_dropped_file.dllStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
                      Source: triage_dropped_file.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT
                      Source: Binary string: wkernel32.pdb source: WerFault.exe, 00000005.00000003.307766584.00000000049C1000.00000004.00000001.sdmp, WerFault.exe, 00000005.00000003.302815879.0000000004700000.00000004.00000001.sdmp, WerFault.exe, 00000005.00000003.302841725.0000000002A15000.00000004.00000001.sdmp, WerFault.exe, 00000005.00000003.303283707.0000000002A15000.00000004.00000001.sdmp
                      Source: Binary string: bcrypt.pdb source: WerFault.exe, 00000005.00000003.307779684.0000000004B56000.00000004.00000040.sdmp
                      Source: Binary string: sfc_os.pdb source: WerFault.exe, 00000005.00000003.307779684.0000000004B56000.00000004.00000040.sdmp
                      Source: Binary string: ucrtbase.pdb source: WerFault.exe, 00000005.00000003.307774943.0000000004B50000.00000004.00000040.sdmp
                      Source: Binary string: msvcrt.pdb source: WerFault.exe, 00000005.00000003.307766584.00000000049C1000.00000004.00000001.sdmp
                      Source: Binary string: nCReportStore::Prune: MaxReportCount=%d MaxSizeInMb=%dRSDSwkernel32.pdb source: WerFault.exe, 00000005.00000002.319844575.0000000002352000.00000004.00000001.sdmp
                      Source: Binary string: wrpcrt4.pdb source: WerFault.exe, 00000005.00000003.307774943.0000000004B50000.00000004.00000040.sdmp
                      Source: Binary string: wntdll.pdb source: loaddll32.exe, 00000000.00000003.299917614.000000004B280000.00000004.00000001.sdmp, WerFault.exe, 00000005.00000003.307766584.00000000049C1000.00000004.00000001.sdmp, WerFault.exe, 00000005.00000003.302836365.0000000002A0F000.00000004.00000001.sdmp, WerFault.exe, 00000005.00000003.303491790.0000000002A0F000.00000004.00000001.sdmp
                      Source: Binary string: shcore.pdb source: WerFault.exe, 00000005.00000003.307774943.0000000004B50000.00000004.00000040.sdmp
                      Source: Binary string: wgdi32.pdb source: WerFault.exe, 00000005.00000003.307766584.00000000049C1000.00000004.00000001.sdmp
                      Source: Binary string: fltLib.pdb source: WerFault.exe, 00000005.00000003.307779684.0000000004B56000.00000004.00000040.sdmp
                      Source: Binary string: advapi32.pdb source: WerFault.exe, 00000005.00000003.307779684.0000000004B56000.00000004.00000040.sdmp
                      Source: Binary string: wsspicli.pdb source: WerFault.exe, 00000005.00000003.307779684.0000000004B56000.00000004.00000040.sdmp
                      Source: Binary string: shell32.pdb source: WerFault.exe, 00000005.00000003.307774943.0000000004B50000.00000004.00000040.sdmp
                      Source: Binary string: ws2_32.pdbm source: WerFault.exe, 00000005.00000003.307779684.0000000004B56000.00000004.00000040.sdmp
                      Source: Binary string: msvcp_win.pdb source: WerFault.exe, 00000005.00000003.307766584.00000000049C1000.00000004.00000001.sdmp
                      Source: Binary string: wkernelbase.pdb source: WerFault.exe, 00000005.00000003.303138336.0000000002A1B000.00000004.00000001.sdmp, WerFault.exe, 00000005.00000003.307766584.00000000049C1000.00000004.00000001.sdmp
                      Source: Binary string: wimm32.pdb source: WerFault.exe, 00000005.00000003.307779684.0000000004B56000.00000004.00000040.sdmp
                      Source: Binary string: shlwapi.pdb source: WerFault.exe, 00000005.00000003.307779684.0000000004B56000.00000004.00000040.sdmp
                      Source: Binary string: mpr.pdb source: WerFault.exe, 00000005.00000003.307774943.0000000004B50000.00000004.00000040.sdmp
                      Source: Binary string: wwin32u.pdb source: WerFault.exe, 00000005.00000003.307766584.00000000049C1000.00000004.00000001.sdmp
                      Source: Binary string: setupapi.pdb source: WerFault.exe, 00000005.00000003.307779684.0000000004B56000.00000004.00000040.sdmp
                      Source: Binary string: wUxTheme.pdb source: WerFault.exe, 00000005.00000003.307779684.0000000004B56000.00000004.00000040.sdmp
                      Source: Binary string: imagehlp.pdb source: WerFault.exe, 00000005.00000003.307779684.0000000004B56000.00000004.00000040.sdmp
                      Source: Binary string: dwmapi.pdb source: WerFault.exe, 00000005.00000003.307779684.0000000004B56000.00000004.00000040.sdmp
                      Source: Binary string: RFFGTEQ.pdb source: triage_dropped_file.dll
                      Source: Binary string: shcore.pdbk source: WerFault.exe, 00000005.00000003.307774943.0000000004B50000.00000004.00000040.sdmp
                      Source: Binary string: wntdll.pdb( source: WerFault.exe, 00000005.00000003.302836365.0000000002A0F000.00000004.00000001.sdmp, WerFault.exe, 00000005.00000003.303491790.0000000002A0F000.00000004.00000001.sdmp
                      Source: Binary string: profapi.pdb source: WerFault.exe, 00000005.00000003.307779684.0000000004B56000.00000004.00000040.sdmp
                      Source: Binary string: ws2_32.pdb source: WerFault.exe, 00000005.00000003.307779684.0000000004B56000.00000004.00000040.sdmp
                      Source: Binary string: winspool.pdb source: WerFault.exe, 00000005.00000003.307779684.0000000004B56000.00000004.00000040.sdmp
                      Source: Binary string: dwmapi.pdbv source: WerFault.exe, 00000005.00000003.307779684.0000000004B56000.00000004.00000040.sdmp
                      Source: Binary string: wgdi32full.pdb source: WerFault.exe, 00000005.00000003.307766584.00000000049C1000.00000004.00000001.sdmp
                      Source: Binary string: shell32.pdbk source: WerFault.exe, 00000005.00000003.307774943.0000000004B50000.00000004.00000040.sdmp
                      Source: Binary string: sechost.pdb source: WerFault.exe, 00000005.00000003.307779684.0000000004B56000.00000004.00000040.sdmp
                      Source: Binary string: iphlpapi.pdb source: WerFault.exe, 00000005.00000003.307779684.0000000004B56000.00000004.00000040.sdmp
                      Source: Binary string: propsys.pdb source: WerFault.exe, 00000005.00000003.307779684.0000000004B56000.00000004.00000040.sdmp
                      Source: Binary string: wntdll.pdbUGP source: loaddll32.exe, 00000000.00000003.299917614.000000004B280000.00000004.00000001.sdmp
                      Source: Binary string: cfgmgr32.pdbk source: WerFault.exe, 00000005.00000003.307774943.0000000004B50000.00000004.00000040.sdmp
                      Source: Binary string: ucrtbase.pdbk source: WerFault.exe, 00000005.00000003.307774943.0000000004B50000.00000004.00000040.sdmp
                      Source: Binary string: profapi.pdbs source: WerFault.exe, 00000005.00000003.307779684.0000000004B56000.00000004.00000040.sdmp
                      Source: Binary string: powrprof.pdb source: WerFault.exe, 00000005.00000003.307779684.0000000004B56000.00000004.00000040.sdmp
                      Source: Binary string: msctf.pdb source: WerFault.exe, 00000005.00000003.307779684.0000000004B56000.00000004.00000040.sdmp
                      Source: Binary string: AcLayers.pdb source: WerFault.exe, 00000005.00000003.307766584.00000000049C1000.00000004.00000001.sdmp
                      Source: Binary string: propsys.pdba source: WerFault.exe, 00000005.00000003.307779684.0000000004B56000.00000004.00000040.sdmp
                      Source: Binary string: imagehlp.pdby source: WerFault.exe, 00000005.00000003.307779684.0000000004B56000.00000004.00000040.sdmp
                      Source: Binary string: Kernel.Appcore.pdb source: WerFault.exe, 00000005.00000003.307774943.0000000004B50000.00000004.00000040.sdmp
                      Source: Binary string: cryptbase.pdb source: WerFault.exe, 00000005.00000003.307779684.0000000004B56000.00000004.00000040.sdmp
                      Source: Binary string: wimm32.pdbe source: WerFault.exe, 00000005.00000003.307779684.0000000004B56000.00000004.00000040.sdmp
                      Source: Binary string: wkernelbase.pdb( source: WerFault.exe, 00000005.00000003.303138336.0000000002A1B000.00000004.00000001.sdmp
                      Source: Binary string: bcryptprimitives.pdb source: WerFault.exe, 00000005.00000003.307774943.0000000004B50000.00000004.00000040.sdmp
                      Source: Binary string: cfgmgr32.pdb source: WerFault.exe, 00000005.00000003.307774943.0000000004B50000.00000004.00000040.sdmp
                      Source: Binary string: combase.pdb source: WerFault.exe, 00000005.00000003.307779684.0000000004B56000.00000004.00000040.sdmp
                      Source: Binary string: Windows.Storage.pdb source: WerFault.exe, 00000005.00000003.307774943.0000000004B50000.00000004.00000040.sdmp
                      Source: Binary string: rundll32.pdb source: WerFault.exe, 00000005.00000003.307766584.00000000049C1000.00000004.00000001.sdmp
                      Source: Binary string: wkernel32.pdb( source: WerFault.exe, 00000005.00000003.302841725.0000000002A15000.00000004.00000001.sdmp, WerFault.exe, 00000005.00000003.303283707.0000000002A15000.00000004.00000001.sdmp
                      Source: Binary string: oleaut32.pdb source: WerFault.exe, 00000005.00000003.307779684.0000000004B56000.00000004.00000040.sdmp
                      Source: Binary string: sfc.pdb source: WerFault.exe, 00000005.00000003.307779684.0000000004B56000.00000004.00000040.sdmp
                      Source: Binary string: apphelp.pdb source: WerFault.exe, 00000005.00000003.307766584.00000000049C1000.00000004.00000001.sdmp
                      Source: Binary string: wuser32.pdb source: WerFault.exe, 00000005.00000003.307766584.00000000049C1000.00000004.00000001.sdmp
                      Source: Binary string: cryptbase.pdbg source: WerFault.exe, 00000005.00000003.307779684.0000000004B56000.00000004.00000040.sdmp
                      Source: Binary string: powrprof.pdb[ source: WerFault.exe, 00000005.00000003.307779684.0000000004B56000.00000004.00000040.sdmp

                      Networking:

                      barindex
                      C2 URLs / IPs found in malware configurationShow sources
                      Source: Malware configuration extractorIPs: 144.91.122.102:443
                      Source: Malware configuration extractorIPs: 85.10.248.28:593
                      Source: Malware configuration extractorIPs: 185.4.135.27:5228
                      Source: Malware configuration extractorIPs: 80.211.3.13:8116
                      Source: Joe Sandbox ViewASN Name: TOPHOSTGR TOPHOSTGR
                      Source: Joe Sandbox ViewASN Name: HETZNER-ASDE HETZNER-ASDE
                      Source: Joe Sandbox ViewIP Address: 185.4.135.27 185.4.135.27
                      Source: Joe Sandbox ViewIP Address: 85.10.248.28 85.10.248.28
                      Source: WerFault.exe, 00000005.00000003.318664228.000000000467A000.00000004.00000001.sdmp, WerFault.exe, 00000005.00000002.320153185.000000000467A000.00000004.00000001.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
                      Source: Amcache.hve.5.drString found in binary or memory: http://upx.sf.net
                      Source: loaddll32.exe, 00000000.00000002.694831298.000000006EB3F000.00000002.00020000.sdmp, rundll32.exe, 00000002.00000000.298260895.000000006EB3F000.00000002.00020000.sdmpString found in binary or memory: http://www.baxleystamps.comDVarFileInfo$

                      E-Banking Fraud:

                      barindex
                      Yara detected Dridex unpacked fileShow sources
                      Source: Yara matchFile source: 2.2.rundll32.exe.6eb20000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.1.rundll32.exe.6eb20000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.1.rundll32.exe.6eb20000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.rundll32.exe.6eb20000.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.rundll32.exe.6eb20000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.loaddll32.exe.6eb20000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.694559765.000000006EB21000.00000020.00020000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000000.296075681.000000006EB21000.00000020.00020000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.324884043.000000006EB21000.00000020.00020000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000000.298180742.000000006EB21000.00000020.00020000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000001.292482173.000000006EB20000.00000004.00020000.sdmp, type: MEMORY

                      System Summary:

                      barindex
                      Source: triage_dropped_file.dllStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
                      Source: triage_dropped_file.dllBinary or memory string: OriginalFilenameShi.dllD vs triage_dropped_file.dll
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6376 -s 672
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6EB30730
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6EB39370
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6EB21494
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6EB2A4E8
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6EB3143C
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6EB28428
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_1_6EB30730
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_1_6EB39370
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_1_6EB21494
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_1_6EB2A4E8
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_1_6EB3143C
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_1_6EB28428
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_1_6EB29088
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6EB32234 NtDelayExecution,
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6EB32820 NtAllocateVirtualMemory,
                      Source: C:\Windows\System32\loaddll32.exeProcess Stats: CPU usage > 98%
                      Source: triage_dropped_file.dllReversingLabs: Detection: 18%
                      Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\triage_dropped_file.dll",#1
                      Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\triage_dropped_file.dll"
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\triage_dropped_file.dll",#1
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\triage_dropped_file.dll",#1
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6376 -s 672
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\triage_dropped_file.dll",#1
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\triage_dropped_file.dll",#1
                      Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6376
                      Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\WERB361.tmpJump to behavior
                      Source: classification engineClassification label: mal76.troj.evad.winDLL@6/6@0/4
                      Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: triage_dropped_file.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT
                      Source: triage_dropped_file.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                      Source: Binary string: wkernel32.pdb source: WerFault.exe, 00000005.00000003.307766584.00000000049C1000.00000004.00000001.sdmp, WerFault.exe, 00000005.00000003.302815879.0000000004700000.00000004.00000001.sdmp, WerFault.exe, 00000005.00000003.302841725.0000000002A15000.00000004.00000001.sdmp, WerFault.exe, 00000005.00000003.303283707.0000000002A15000.00000004.00000001.sdmp
                      Source: Binary string: bcrypt.pdb source: WerFault.exe, 00000005.00000003.307779684.0000000004B56000.00000004.00000040.sdmp
                      Source: Binary string: sfc_os.pdb source: WerFault.exe, 00000005.00000003.307779684.0000000004B56000.00000004.00000040.sdmp
                      Source: Binary string: ucrtbase.pdb source: WerFault.exe, 00000005.00000003.307774943.0000000004B50000.00000004.00000040.sdmp
                      Source: Binary string: msvcrt.pdb source: WerFault.exe, 00000005.00000003.307766584.00000000049C1000.00000004.00000001.sdmp
                      Source: Binary string: nCReportStore::Prune: MaxReportCount=%d MaxSizeInMb=%dRSDSwkernel32.pdb source: WerFault.exe, 00000005.00000002.319844575.0000000002352000.00000004.00000001.sdmp
                      Source: Binary string: wrpcrt4.pdb source: WerFault.exe, 00000005.00000003.307774943.0000000004B50000.00000004.00000040.sdmp
                      Source: Binary string: wntdll.pdb source: loaddll32.exe, 00000000.00000003.299917614.000000004B280000.00000004.00000001.sdmp, WerFault.exe, 00000005.00000003.307766584.00000000049C1000.00000004.00000001.sdmp, WerFault.exe, 00000005.00000003.302836365.0000000002A0F000.00000004.00000001.sdmp, WerFault.exe, 00000005.00000003.303491790.0000000002A0F000.00000004.00000001.sdmp
                      Source: Binary string: shcore.pdb source: WerFault.exe, 00000005.00000003.307774943.0000000004B50000.00000004.00000040.sdmp
                      Source: Binary string: wgdi32.pdb source: WerFault.exe, 00000005.00000003.307766584.00000000049C1000.00000004.00000001.sdmp
                      Source: Binary string: fltLib.pdb source: WerFault.exe, 00000005.00000003.307779684.0000000004B56000.00000004.00000040.sdmp
                      Source: Binary string: advapi32.pdb source: WerFault.exe, 00000005.00000003.307779684.0000000004B56000.00000004.00000040.sdmp
                      Source: Binary string: wsspicli.pdb source: WerFault.exe, 00000005.00000003.307779684.0000000004B56000.00000004.00000040.sdmp
                      Source: Binary string: shell32.pdb source: WerFault.exe, 00000005.00000003.307774943.0000000004B50000.00000004.00000040.sdmp
                      Source: Binary string: ws2_32.pdbm source: WerFault.exe, 00000005.00000003.307779684.0000000004B56000.00000004.00000040.sdmp
                      Source: Binary string: msvcp_win.pdb source: WerFault.exe, 00000005.00000003.307766584.00000000049C1000.00000004.00000001.sdmp
                      Source: Binary string: wkernelbase.pdb source: WerFault.exe, 00000005.00000003.303138336.0000000002A1B000.00000004.00000001.sdmp, WerFault.exe, 00000005.00000003.307766584.00000000049C1000.00000004.00000001.sdmp
                      Source: Binary string: wimm32.pdb source: WerFault.exe, 00000005.00000003.307779684.0000000004B56000.00000004.00000040.sdmp
                      Source: Binary string: shlwapi.pdb source: WerFault.exe, 00000005.00000003.307779684.0000000004B56000.00000004.00000040.sdmp
                      Source: Binary string: mpr.pdb source: WerFault.exe, 00000005.00000003.307774943.0000000004B50000.00000004.00000040.sdmp
                      Source: Binary string: wwin32u.pdb source: WerFault.exe, 00000005.00000003.307766584.00000000049C1000.00000004.00000001.sdmp
                      Source: Binary string: setupapi.pdb source: WerFault.exe, 00000005.00000003.307779684.0000000004B56000.00000004.00000040.sdmp
                      Source: Binary string: wUxTheme.pdb source: WerFault.exe, 00000005.00000003.307779684.0000000004B56000.00000004.00000040.sdmp
                      Source: Binary string: imagehlp.pdb source: WerFault.exe, 00000005.00000003.307779684.0000000004B56000.00000004.00000040.sdmp
                      Source: Binary string: dwmapi.pdb source: WerFault.exe, 00000005.00000003.307779684.0000000004B56000.00000004.00000040.sdmp
                      Source: Binary string: RFFGTEQ.pdb source: triage_dropped_file.dll
                      Source: Binary string: shcore.pdbk source: WerFault.exe, 00000005.00000003.307774943.0000000004B50000.00000004.00000040.sdmp
                      Source: Binary string: wntdll.pdb( source: WerFault.exe, 00000005.00000003.302836365.0000000002A0F000.00000004.00000001.sdmp, WerFault.exe, 00000005.00000003.303491790.0000000002A0F000.00000004.00000001.sdmp
                      Source: Binary string: profapi.pdb source: WerFault.exe, 00000005.00000003.307779684.0000000004B56000.00000004.00000040.sdmp
                      Source: Binary string: ws2_32.pdb source: WerFault.exe, 00000005.00000003.307779684.0000000004B56000.00000004.00000040.sdmp
                      Source: Binary string: winspool.pdb source: WerFault.exe, 00000005.00000003.307779684.0000000004B56000.00000004.00000040.sdmp
                      Source: Binary string: dwmapi.pdbv source: WerFault.exe, 00000005.00000003.307779684.0000000004B56000.00000004.00000040.sdmp
                      Source: Binary string: wgdi32full.pdb source: WerFault.exe, 00000005.00000003.307766584.00000000049C1000.00000004.00000001.sdmp
                      Source: Binary string: shell32.pdbk source: WerFault.exe, 00000005.00000003.307774943.0000000004B50000.00000004.00000040.sdmp
                      Source: Binary string: sechost.pdb source: WerFault.exe, 00000005.00000003.307779684.0000000004B56000.00000004.00000040.sdmp
                      Source: Binary string: iphlpapi.pdb source: WerFault.exe, 00000005.00000003.307779684.0000000004B56000.00000004.00000040.sdmp
                      Source: Binary string: propsys.pdb source: WerFault.exe, 00000005.00000003.307779684.0000000004B56000.00000004.00000040.sdmp
                      Source: Binary string: wntdll.pdbUGP source: loaddll32.exe, 00000000.00000003.299917614.000000004B280000.00000004.00000001.sdmp
                      Source: Binary string: cfgmgr32.pdbk source: WerFault.exe, 00000005.00000003.307774943.0000000004B50000.00000004.00000040.sdmp
                      Source: Binary string: ucrtbase.pdbk source: WerFault.exe, 00000005.00000003.307774943.0000000004B50000.00000004.00000040.sdmp
                      Source: Binary string: profapi.pdbs source: WerFault.exe, 00000005.00000003.307779684.0000000004B56000.00000004.00000040.sdmp
                      Source: Binary string: powrprof.pdb source: WerFault.exe, 00000005.00000003.307779684.0000000004B56000.00000004.00000040.sdmp
                      Source: Binary string: msctf.pdb source: WerFault.exe, 00000005.00000003.307779684.0000000004B56000.00000004.00000040.sdmp
                      Source: Binary string: AcLayers.pdb source: WerFault.exe, 00000005.00000003.307766584.00000000049C1000.00000004.00000001.sdmp
                      Source: Binary string: propsys.pdba source: WerFault.exe, 00000005.00000003.307779684.0000000004B56000.00000004.00000040.sdmp
                      Source: Binary string: imagehlp.pdby source: WerFault.exe, 00000005.00000003.307779684.0000000004B56000.00000004.00000040.sdmp
                      Source: Binary string: Kernel.Appcore.pdb source: WerFault.exe, 00000005.00000003.307774943.0000000004B50000.00000004.00000040.sdmp
                      Source: Binary string: cryptbase.pdb source: WerFault.exe, 00000005.00000003.307779684.0000000004B56000.00000004.00000040.sdmp
                      Source: Binary string: wimm32.pdbe source: WerFault.exe, 00000005.00000003.307779684.0000000004B56000.00000004.00000040.sdmp
                      Source: Binary string: wkernelbase.pdb( source: WerFault.exe, 00000005.00000003.303138336.0000000002A1B000.00000004.00000001.sdmp
                      Source: Binary string: bcryptprimitives.pdb source: WerFault.exe, 00000005.00000003.307774943.0000000004B50000.00000004.00000040.sdmp
                      Source: Binary string: cfgmgr32.pdb source: WerFault.exe, 00000005.00000003.307774943.0000000004B50000.00000004.00000040.sdmp
                      Source: Binary string: combase.pdb source: WerFault.exe, 00000005.00000003.307779684.0000000004B56000.00000004.00000040.sdmp
                      Source: Binary string: Windows.Storage.pdb source: WerFault.exe, 00000005.00000003.307774943.0000000004B50000.00000004.00000040.sdmp
                      Source: Binary string: rundll32.pdb source: WerFault.exe, 00000005.00000003.307766584.00000000049C1000.00000004.00000001.sdmp
                      Source: Binary string: wkernel32.pdb( source: WerFault.exe, 00000005.00000003.302841725.0000000002A15000.00000004.00000001.sdmp, WerFault.exe, 00000005.00000003.303283707.0000000002A15000.00000004.00000001.sdmp
                      Source: Binary string: oleaut32.pdb source: WerFault.exe, 00000005.00000003.307779684.0000000004B56000.00000004.00000040.sdmp
                      Source: Binary string: sfc.pdb source: WerFault.exe, 00000005.00000003.307779684.0000000004B56000.00000004.00000040.sdmp
                      Source: Binary string: apphelp.pdb source: WerFault.exe, 00000005.00000003.307766584.00000000049C1000.00000004.00000001.sdmp
                      Source: Binary string: wuser32.pdb source: WerFault.exe, 00000005.00000003.307766584.00000000049C1000.00000004.00000001.sdmp
                      Source: Binary string: cryptbase.pdbg source: WerFault.exe, 00000005.00000003.307779684.0000000004B56000.00000004.00000040.sdmp
                      Source: Binary string: powrprof.pdb[ source: WerFault.exe, 00000005.00000003.307779684.0000000004B56000.00000004.00000040.sdmp
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6EB2F6A8 push esi; mov dword ptr [esp], 00000000h
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_1_6EB2F6A8 push esi; mov dword ptr [esp], 00000000h
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_1_6EB3B77F push eax; ret
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_1_6EB3B8CB push esp; ret
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_1_6EB3B847 push esp; ret
                      Source: initial sampleStatic PE information: section where entry point is pointing to: .rdata
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX

                      Malware Analysis System Evasion:

                      barindex
                      Tries to delay execution (extensive OutputDebugStringW loop)Show sources
                      Source: C:\Windows\System32\loaddll32.exeSection loaded: OutputDebugStringW count: 1126
                      Source: C:\Windows\System32\loaddll32.exeWindow / User API: threadDelayed 1125
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6EB30730 GetTokenInformation,GetSystemInfo,GetTokenInformation,
                      Source: Amcache.hve.5.drBinary or memory string: VMware
                      Source: Amcache.hve.5.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/5&1ec51bf7&0&000000
                      Source: Amcache.hve.5.drBinary or memory string: @scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/5&280b647&0&000000
                      Source: Amcache.hve.5.drBinary or memory string: VMware Virtual USB Mouse
                      Source: Amcache.hve.5.drBinary or memory string: VMware, Inc.
                      Source: Amcache.hve.5.drBinary or memory string: VMware Virtual disk SCSI Disk Devicehbin
                      Source: Amcache.hve.5.drBinary or memory string: Microsoft Hyper-V Generation Counter
                      Source: Amcache.hve.5.drBinary or memory string: VMware7,1
                      Source: Amcache.hve.5.drBinary or memory string: NECVMWar VMware SATA CD00
                      Source: Amcache.hve.5.drBinary or memory string: VMware Virtual disk SCSI Disk Device
                      Source: Amcache.hve.5.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW71.00V.13989454.B64.1906190538,BiosReleaseDate:06/19/2019,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware7,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
                      Source: WerFault.exe, 00000005.00000002.320067944.0000000004630000.00000004.00000001.sdmp, WerFault.exe, 00000005.00000003.318716498.0000000004668000.00000004.00000001.sdmp, WerFault.exe, 00000005.00000002.320142264.0000000004668000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW
                      Source: Amcache.hve.5.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
                      Source: Amcache.hve.5.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
                      Source: Amcache.hve.5.drBinary or memory string: VMware, Inc.me
                      Source: Amcache.hve.5.drBinary or memory string: VMware-42 35 d8 20 48 cb c7 ff-aa 5e d0 37 a0 49 53 d7
                      Source: Amcache.hve.5.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/5&280b647&0&000000
                      Source: Amcache.hve.5.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/5&1ec51bf7&0&000000
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPort
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPort
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6EB26D0C GetUserNameW,MessageBoxW,GetLastError,CreateFileA,DebugBreak,FlushFileBuffers,FreeEnvironmentStringsA,GetConsoleOutputCP,GetEnvironmentStrings,GetLocaleInfoA,GetStartupInfoA,GetStringTypeA,HeapValidate,IsBadReadPtr,LCMapStringA,LoadLibraryA,OutputDebugStringA,
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6EB33138 RtlAddVectoredExceptionHandler,
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\triage_dropped_file.dll",#1
                      Source: loaddll32.exe, 00000000.00000002.689868887.0000000001170000.00000002.00020000.sdmp, rundll32.exe, 00000002.00000000.297771954.0000000003860000.00000002.00020000.sdmp, rundll32.exe, 00000002.00000000.295296097.0000000003860000.00000002.00020000.sdmpBinary or memory string: Program Manager
                      Source: loaddll32.exe, 00000000.00000002.689868887.0000000001170000.00000002.00020000.sdmp, rundll32.exe, 00000002.00000000.297771954.0000000003860000.00000002.00020000.sdmp, rundll32.exe, 00000002.00000000.295296097.0000000003860000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
                      Source: loaddll32.exe, 00000000.00000002.689868887.0000000001170000.00000002.00020000.sdmp, rundll32.exe, 00000002.00000000.297771954.0000000003860000.00000002.00020000.sdmp, rundll32.exe, 00000002.00000000.295296097.0000000003860000.00000002.00020000.sdmpBinary or memory string: Progman
                      Source: loaddll32.exe, 00000000.00000002.689868887.0000000001170000.00000002.00020000.sdmp, rundll32.exe, 00000002.00000000.297771954.0000000003860000.00000002.00020000.sdmp, rundll32.exe, 00000002.00000000.295296097.0000000003860000.00000002.00020000.sdmpBinary or memory string: Progmanlock
                      Source: C:\Windows\System32\loaddll32.exeCode function: GetUserNameW,MessageBoxW,GetLastError,CreateFileA,DebugBreak,FlushFileBuffers,FreeEnvironmentStringsA,GetConsoleOutputCP,GetEnvironmentStrings,GetLocaleInfoA,GetStartupInfoA,GetStringTypeA,HeapValidate,IsBadReadPtr,LCMapStringA,LoadLibraryA,OutputDebugStringA,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetUserNameW,MessageBoxW,GetLastError,CreateFileA,DebugBreak,FlushFileBuffers,FreeEnvironmentStringsA,GetConsoleOutputCP,GetEnvironmentStrings,GetLocaleInfoA,GetStartupInfoA,GetStringTypeA,HeapValidate,IsBadReadPtr,LCMapStringA,LoadLibraryA,OutputDebugStringA,
                      Source: C:\Windows\System32\loaddll32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6EB26D0C GetUserNameW,MessageBoxW,GetLastError,CreateFileA,DebugBreak,FlushFileBuffers,FreeEnvironmentStringsA,GetConsoleOutputCP,GetEnvironmentStrings,GetLocaleInfoA,GetStartupInfoA,GetStringTypeA,HeapValidate,IsBadReadPtr,LCMapStringA,LoadLibraryA,OutputDebugStringA,
                      Source: Amcache.hve.5.dr, Amcache.hve.LOG1.5.drBinary or memory string: c:\users\user\desktop\procexp.exe
                      Source: Amcache.hve.5.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
                      Source: Amcache.hve.5.dr, Amcache.hve.LOG1.5.drBinary or memory string: procexp.exe

                      Mitre Att&ck Matrix

                      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                      Valid AccountsWindows Management InstrumentationPath InterceptionProcess Injection12Virtualization/Sandbox Evasion11OS Credential DumpingSecurity Software Discovery31Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                      Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsProcess Injection12LSASS MemoryVirtualization/Sandbox Evasion11Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothApplication Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or Information1Security Account ManagerProcess Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Rundll321NTDSApplication Window Discovery1Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA SecretsAccount Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                      Replication Through Removable MediaLaunchdRc.commonRc.commonSteganographyCached Domain CredentialsSystem Owner/User Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSyncRemote System Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc FilesystemSystem Information Discovery13Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

                      Behavior Graph

                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 544526 Sample: triage_dropped_file.dll Startdate: 23/12/2021 Architecture: WINDOWS Score: 76 18 185.4.135.27 TOPHOSTGR Greece 2->18 20 85.10.248.28 HETZNER-ASDE Germany 2->20 22 2 other IPs or domains 2->22 24 Found malware configuration 2->24 26 Multi AV Scanner detection for submitted file 2->26 28 Yara detected Dridex unpacked file 2->28 30 2 other signatures 2->30 9 loaddll32.exe 1 2->9         started        signatures3 process4 signatures5 32 Tries to delay execution (extensive OutputDebugStringW loop) 9->32 12 cmd.exe 1 9->12         started        process6 process7 14 rundll32.exe 12->14         started        process8 16 WerFault.exe 23 9 14->16         started       

                      Screenshots

                      Thumbnails

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                      windows-stand

                      Antivirus, Machine Learning and Genetic Malware Detection

                      Initial Sample

                      SourceDetectionScannerLabelLink
                      triage_dropped_file.dll19%ReversingLabsWin32.Worm.Cridex

                      Dropped Files

                      No Antivirus matches

                      Unpacked PE Files

                      SourceDetectionScannerLabelLinkDownload
                      0.2.loaddll32.exe.6eb20000.2.unpack100%AviraHEUR/AGEN.1144420Download File
                      2.0.rundll32.exe.1260000.3.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      2.0.rundll32.exe.6eb20000.5.unpack100%AviraHEUR/AGEN.1144420Download File
                      2.0.rundll32.exe.1260000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      2.0.rundll32.exe.6eb20000.2.unpack100%AviraHEUR/AGEN.1144420Download File
                      2.2.rundll32.exe.1260000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      2.1.rundll32.exe.6eb20000.0.unpack100%AviraHEUR/AGEN.1144420Download File
                      0.2.loaddll32.exe.760000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      2.2.rundll32.exe.6eb20000.2.unpack100%AviraHEUR/AGEN.1144420Download File

                      Domains

                      No Antivirus matches

                      URLs

                      SourceDetectionScannerLabelLink
                      http://www.baxleystamps.comDVarFileInfo$0%Avira URL Cloudsafe

                      Domains and IPs

                      Contacted Domains

                      No contacted domains info

                      URLs from Memory and Binaries

                      NameSourceMaliciousAntivirus DetectionReputation
                      http://upx.sf.netAmcache.hve.5.drfalse
                        high
                        http://www.baxleystamps.comDVarFileInfo$loaddll32.exe, 00000000.00000002.694831298.000000006EB3F000.00000002.00020000.sdmp, rundll32.exe, 00000002.00000000.298260895.000000006EB3F000.00000002.00020000.sdmpfalse
                        • Avira URL Cloud: safe
                        low

                        Contacted IPs

                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs

                        Public

                        IPDomainCountryFlagASNASN NameMalicious
                        185.4.135.27
                        unknownGreece
                        199246TOPHOSTGRtrue
                        85.10.248.28
                        unknownGermany
                        24940HETZNER-ASDEtrue
                        80.211.3.13
                        unknownItaly
                        31034ARUBA-ASNITtrue
                        144.91.122.102
                        unknownGermany
                        51167CONTABODEtrue

                        General Information

                        Joe Sandbox Version:34.0.0 Boulder Opal
                        Analysis ID:544526
                        Start date:23.12.2021
                        Start time:15:58:24
                        Joe Sandbox Product:CloudBasic
                        Overall analysis duration:0h 8m 1s
                        Hypervisor based Inspection enabled:false
                        Report type:light
                        Sample file name:triage_dropped_file.dll
                        Cookbook file name:default.jbs
                        Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                        Run name:Run with higher sleep bypass
                        Number of analysed new started processes analysed:21
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • HDC enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Detection:MAL
                        Classification:mal76.troj.evad.winDLL@6/6@0/4
                        EGA Information:Failed
                        HDC Information:
                        • Successful, ratio: 95% (good quality ratio 92.4%)
                        • Quality average: 78.8%
                        • Quality standard deviation: 26.2%
                        HCA Information:Failed
                        Cookbook Comments:
                        • Adjust boot time
                        • Enable AMSI
                        • Sleeps bigger than 120000ms are automatically reduced to 1000ms
                        • Found application associated with file extension: .dll
                        Warnings:
                        Show All
                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WerFault.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, wuapihost.exe
                        • Excluded IPs from analysis (whitelisted): 20.189.173.21
                        • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, login.live.com, blobcollector.events.data.trafficmanager.net, onedsblobprdwus16.westus.cloudapp.azure.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, watson.telemetry.microsoft.com, arc.msn.com
                        • Not all processes where analyzed, report is missing behavior information

                        Simulations

                        Behavior and APIs

                        No simulations

                        Joe Sandbox View / Context

                        IPs

                        No context

                        Domains

                        No context

                        ASN

                        No context

                        JA3 Fingerprints

                        No context

                        Dropped Files

                        No context

                        Created / dropped Files

                        C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_3e2aba14ae6839fafa2e423496d524d852da7165_82810a17_041bce1d\Report.wer
                        Process:C:\Windows\SysWOW64\WerFault.exe
                        File Type:Little-endian UTF-16 Unicode text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):65536
                        Entropy (8bit):0.914992745908544
                        Encrypted:false
                        SSDEEP:192:CcXi390oX7m/HBUZMX4jed+9T/u7s6S274ItWc+:lXi3TXi/BUZMX4je0/u7s6X4ItWc+
                        MD5:FFC283118AA06FE416FAFB456382ABA0
                        SHA1:9A144EDE4DB5AF94BED38F4CBC76907AAAF22074
                        SHA-256:8E42A49718BFB041FCDFEC95F0CB56404C26673C16E3CA3FD277D7FE700F6D98
                        SHA-512:B7E5796FA394342342B7198665C186379D6F45ACB685F8738F9E5967007BA346851C21BFC6CD7E3D96B73B19154D3888F21F78971F1BEB3C414DB2F09D786095
                        Malicious:false
                        Reputation:low
                        Preview: ..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.2.8.4.7.7.7.7.3.1.8.9.7.6.4.9.2.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.2.8.4.7.7.7.7.3.6.2.4.1.3.6.3.3.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.0.5.9.2.2.a.6.c.-.4.b.f.a.-.4.d.0.2.-.9.2.e.6.-.a.f.3.0.f.0.5.3.b.c.7.3.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.b.9.1.f.8.5.5.8.-.4.4.8.f.-.4.1.e.1.-.a.6.1.1.-.d.9.c.8.a.0.1.e.0.2.5.f.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.8.e.8.-.0.0.0.1.-.0.0.1.c.-.2.f.9.e.-.d.5.7.c.5.9.f.8.d.7.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.b.c.c.5.d.c.3.2.2.2.0.3.4.d.3.f.2.5.7.f.1.f.d.3.5.8.8.9.e.5.b.e.9.0.f.0.9.
                        C:\ProgramData\Microsoft\Windows\WER\Temp\WERB361.tmp.dmp
                        Process:C:\Windows\SysWOW64\WerFault.exe
                        File Type:Mini DuMP crash report, 14 streams, Fri Dec 24 00:02:13 2021, 0x1205a4 type
                        Category:dropped
                        Size (bytes):43206
                        Entropy (8bit):2.189975589605877
                        Encrypted:false
                        SSDEEP:192:J2ZlWZxL5EcqNLO5SkbmAx//Cz8X+tH+Z/ift9yb7mNgR1n5:Jz9N5Lb2HZU/iV9ybIQ5
                        MD5:4DED7EA4DBDB77A88A5165D62BA5657E
                        SHA1:5745929C3EEE8276778432A70358FD7D21C3440D
                        SHA-256:E5B50B049B76A84A855932293C56ABEECA7F0FB914C2162D151A98E2D50E1DC0
                        SHA-512:DC346283D3067A695798153E6A8255320E667BB1388E95EE72C6CCB04576CA46C8AB2226978E01D1946B83C4E64E1C313D80D84B2386CFBCAC27EA33E2AC1552
                        Malicious:false
                        Reputation:low
                        Preview: MDMP....... ..........a.........................................-..........T.......8...........T............................................................................................................U...........B...... .......GenuineIntelW...........T..............a.............................0..=...............P.a.c.i.f.i.c. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................P.a.c.i.f.i.c. .D.a.y.l.i.g.h.t. .T.i.m.e...........................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.....................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        C:\ProgramData\Microsoft\Windows\WER\Temp\WERBB03.tmp.WERInternalMetadata.xml
                        Process:C:\Windows\SysWOW64\WerFault.exe
                        File Type:XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):8276
                        Entropy (8bit):3.6904332711477816
                        Encrypted:false
                        SSDEEP:192:Rrl7r3GLNiBy67zHs9x6Y4R6CgmfT+PSuCprC89bOosfJ6m:RrlsNiU6Q6Ye6CgmfTGSNObf1
                        MD5:483B84C6B648D40698425111147992D6
                        SHA1:58ABB6F98BCD71702EC2A80684CE0501B6627801
                        SHA-256:E8CE58DE9BC83D21AF4A6397844B5AFC072F30F413EAC882B41533FA9485EB8E
                        SHA-512:E34A0A4C81750B458A29C38EEFB6B46D9DE207DB8604ED717067DFA7A9C42DA0D91561984940EAE82907919CCEF50CA39F931F8D1D684C1C1B3AEC6045B07344
                        Malicious:false
                        Reputation:low
                        Preview: ..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.3.7.6.<./.P.i.d.>.......
                        C:\ProgramData\Microsoft\Windows\WER\Temp\WERBD27.tmp.xml
                        Process:C:\Windows\SysWOW64\WerFault.exe
                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):4648
                        Entropy (8bit):4.463350423834014
                        Encrypted:false
                        SSDEEP:48:cvIwSD8zsRJgtWI9ECWSC8BE8fm8M4JCdsFv2hFtUw+q8/iJKB4a4SrSzd:uITfjDDSN7Jja1dTaDWzd
                        MD5:9387DBD51C297B4F39DAF45EC8D36822
                        SHA1:9086AEFE076B0FA2C449CE254A1AAE33BB1544A4
                        SHA-256:1A37AA5BFB91650D5CB1D5FC29A59425F5785443B44BC8AA287952D399476C1A
                        SHA-512:5F0E05DC0D687197E864470F3CF740519CABD87ED809A4A77CAC03EC2226C8D4A6B34D0D4D8A512DD634CA05EE247C7B0FD1755B7B1FBACCB29FB2D35E092288
                        Malicious:false
                        Reputation:low
                        Preview: <?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="1310952" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
                        C:\Windows\appcompat\Programs\Amcache.hve
                        Process:C:\Windows\SysWOW64\WerFault.exe
                        File Type:MS Windows registry file, NT/2000 or above
                        Category:dropped
                        Size (bytes):1572864
                        Entropy (8bit):4.278196954406433
                        Encrypted:false
                        SSDEEP:12288:TCcdS461PHcyy3k6a1i86+nhM/XdsVR9yVSxkKS0qulM19mvM1deCR:WcdS461PHcyy3kzj
                        MD5:FEA865E0FCCBC94F2979F3F94AFE6133
                        SHA1:BBC47B1C701145F06D00725B4D7B09404EC37A10
                        SHA-256:24E3B616F120054E0D538D7DF9004BFA8694C18AE92E03769B3FB3D6B1AED83A
                        SHA-512:D92F82E82D241B2DEE62C1E7BA019323FEC1F5D69A466B46D1D79848402EEC8F891CBEB0F4041D63784884B9CCD04165DD9E72F67151F8F3F9F4158B28BB6D9C
                        Malicious:false
                        Reputation:low
                        Preview: regfZ...Z...p.\..,.................. ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e...4............E.4............E.....5............E.rmtm.A..Y.................................................................................................................................................................................................................................................................................................................................................."........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        C:\Windows\appcompat\Programs\Amcache.hve.LOG1
                        Process:C:\Windows\SysWOW64\WerFault.exe
                        File Type:MS Windows registry file, NT/2000 or above
                        Category:dropped
                        Size (bytes):24576
                        Entropy (8bit):4.035954912109526
                        Encrypted:false
                        SSDEEP:384:GEbK5Rftx1CPJ4XRsFcnE7k9PBqXSSeq5QMVyi6+/zl4Lk4uZd1DoXzn+XvwvL:DbURftx14J4XmFcE7yBqXxeq5QMVyi6B
                        MD5:BAE518626246B42FE89E91F61E190EC2
                        SHA1:35AB5793F7D83F7BD1B390C6E33CE36AF484C7A2
                        SHA-256:53CEBE5670D00B7441257A65A6590732102309D73F210972C0F106A4BF303144
                        SHA-512:D21040190C28A362F34EBDB8D62F65E73336F9E5ECE07328D9177011A6020781B3354CCCB88678F391A6CE578750C2B8B81BEEE97C284FAA32AFBB76BD1F0337
                        Malicious:false
                        Reputation:low
                        Preview: regfY...Y...p.\..,.................. ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e...4............E.4............E.....5............E.rmtm.A..Y.................................................................................................................................................................................................................................................................................................................................................."HvLE.^......Y.............Bj-M...T....cR.........0................... ..hbin................p.\..,..........nk,..A..Y....... ........................... ...........................&...{ad79c032-a2ea-f756-e377-72fb9332c3ae}......nk .....Y....... ........................... .......Z.......................Root........lf......Root....nk .....Y....................}.............. ...............*...............DeviceCensus.......................vk..................WritePermissionsCheck...

                        Static File Info

                        General

                        File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                        Entropy (8bit):7.341748728708058
                        TrID:
                        • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
                        • Generic Win/DOS Executable (2004/3) 0.20%
                        • DOS Executable Generic (2002/1) 0.20%
                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                        File name:triage_dropped_file.dll
                        File size:565248
                        MD5:7d424a845f21f905b17fb1e4ece26bc4
                        SHA1:129162c17505204008b8c6345f78d8bd8e9d9548
                        SHA256:7f62e9d0e2cb7358202052b4b20f43cec7eed7db11c57cfb372f8fddfb9307a3
                        SHA512:abc7141739ffb23ba3e982796e697e33a5c3108fa7910cf97ca4fc6a1e9dbdadbd10b27665da4829f753794df3f0d2a79adfc9aee91863d60ec70042309bc6a6
                        SSDEEP:12288:nGBK1zWlDqhPUVpqF9q9FAfPWvF+r3qTFCX1za7EV8RgfQOOvDC93:nNkIu2KAGIOwZ+v
                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........R...<...<...<..k....<...=.S.<.=.....<.......<.......<.t.?...<.t.=.4.<.L.9...<.t...0.<..k....<..0..x.<.......<..1....<..k....<

                        File Icon

                        Icon Hash:74f0e4ecccdce0e4

                        Static PE Info

                        General

                        Entrypoint:0x10005a80
                        Entrypoint Section:.rdata
                        Digitally signed:false
                        Imagebase:0x10000000
                        Subsystem:windows gui
                        Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
                        DLL Characteristics:DYNAMIC_BASE, NX_COMPAT
                        Time Stamp:0x61C43E40 [Thu Dec 23 09:15:44 2021 UTC]
                        TLS Callbacks:
                        CLR (.Net) Version:
                        OS Version Major:5
                        OS Version Minor:0
                        File Version Major:5
                        File Version Minor:0
                        Subsystem Version Major:5
                        Subsystem Version Minor:0
                        Import Hash:7119acbff3b38a52756367cf5bfb78f2

                        Entrypoint Preview

                        Instruction
                        inc eax
                        mov edx, 00000003h
                        cmpps xmm1, xmm0, 02h
                        jmp 00007F0458A26636h
                        add edx, 04h
                        add edx, 04h
                        add edx, 04h
                        add edx, 04h
                        add edx, 04h
                        add edx, 04h
                        add edx, 04h
                        add edx, 04h
                        add edx, 04h
                        add edx, 04h
                        add edx, 04h
                        add edx, 04h
                        add edx, 04h
                        add edx, 04h
                        add edx, 04h
                        add edx, 04h
                        add edx, 04h
                        add edx, 04h
                        add edx, 04h
                        add edx, 04h
                        add edx, 04h
                        add edx, 04h
                        add edx, 04h
                        int3
                        int3
                        int3
                        int3
                        int3
                        int3
                        int3
                        int3
                        int3
                        int3
                        int3
                        int3
                        push ebp
                        mov ebp, esp
                        push esi
                        push ebx
                        push edi
                        and esp, FFFFFFF8h
                        sub esp, 000000E8h
                        lea eax, dword ptr [esp+00000084h]
                        lea ecx, dword ptr [esp+23h]
                        mov word ptr [esp+000000D4h], 0F55h
                        mov edx, dword ptr [esp+000000CCh]
                        mov esi, edx
                        or esi, esi
                        mov dword ptr [esp+000000CCh], esi
                        mov byte ptr [esp+000000CBh], 0000000Eh
                        mov word ptr [esp+000000D2h], EED6h
                        mov dword ptr [esp+000000C4h], 00440CD0h
                        mov word ptr [esp+66h], C76Dh
                        mov bl, byte ptr [esp+000000D7h]
                        mov di, word ptr [esp+66h]
                        mov byte ptr [eax+eax+00000000h], bl

                        Rich Headers

                        Programming Language:
                        • [IMP] VS2015 UPD1 build 23506
                        • [C++] VS2012 UPD1 build 51106
                        • [ASM] VS2012 build 50727
                        • [ASM] VS2012 UPD2 build 60315
                        • [LNK] VS2010 SP1 build 40219
                        • [EXP] VS2010 SP1 build 40219
                        • [RES] VS2015 UPD1 build 23506
                        • [IMP] VS2010 build 30319
                        • [ASM] VS2015 UPD1 build 23506
                        • [C++] VS2017 v15.5.4 build 25834
                        • [EXP] VS2012 UPD4 build 61030
                        • [C++] VS2008 build 21022
                        • [ASM] VS2010 SP1 build 40219

                        Data Directories

                        NameVirtual AddressVirtual Size Is in Section
                        IMAGE_DIRECTORY_ENTRY_EXPORT0x810790x60.rdata
                        IMAGE_DIRECTORY_ENTRY_IMPORT0x810dc0x78.rdata
                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x890000x2f0.rsrc
                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x8a0000x1138.reloc
                        IMAGE_DIRECTORY_ENTRY_DEBUG0x60300x38.rdata
                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IAT0x80000x44.rdata
                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                        Sections

                        NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                        .rdata0x10000x699e0x7000False0.389334542411data4.45862860296IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                        .rdata0x80000x7929c0x7a000False0.303943071209data7.45743598814IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .data0x820000x6b660x5000False0.246435546875data5.05789801748IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                        .rsrc0x890000x5dc0x1000False0.090087890625data0.791740378228IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .reloc0x8a0000x18340x2000False0.242065429688data4.12259394173IMAGE_SCN_TYPE_COPY, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                        Resources

                        NameRVASizeTypeLanguageCountry
                        RT_VERSION0x890600x290MS Windows COFF PA-RISC object fileEnglishUnited States

                        Imports

                        DLLImport
                        KERNEL32.dllGetModuleHandleW, CloseHandle, IsDebuggerPresent, OutputDebugStringA, GetModuleFileNameW, GetFileSize
                        ADVAPI32.dllAccessCheck, RegCloseKey, QueryServiceStatus
                        USER32.dllGetWindowTextA
                        WINSPOOL.DRVEnumFormsW
                        WS2_32.dllWSACleanup

                        Version Infos

                        DescriptionData
                        OriginalFilenameShi.dll
                        FileDescriptionOracle Call Interface
                        FileVersion2.9.9.7.0
                        Legal CopyrightCopyright Oracle Corporation 1979, 2001. All rights reserved.
                        CompanyNameOracle Corporation
                        Translation0x0409 0x04b0

                        Possible Origin

                        Language of compilation systemCountry where language is spokenMap
                        EnglishUnited States

                        Network Behavior

                        No network behavior found

                        Code Manipulations

                        Statistics

                        Behavior

                        Click to jump to process

                        System Behavior

                        General

                        Start time:16:02:05
                        Start date:23/12/2021
                        Path:C:\Windows\System32\loaddll32.exe
                        Wow64 process (32bit):true
                        Commandline:loaddll32.exe "C:\Users\user\Desktop\triage_dropped_file.dll"
                        Imagebase:0xa50000
                        File size:116736 bytes
                        MD5 hash:7DEB5DB86C0AC789123DEC286286B938
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_Dridex_1, Description: Yara detected Dridex unpacked file, Source: 00000000.00000002.694559765.000000006EB21000.00000020.00020000.sdmp, Author: Joe Security
                        Reputation:moderate

                        General

                        Start time:16:02:05
                        Start date:23/12/2021
                        Path:C:\Windows\SysWOW64\cmd.exe
                        Wow64 process (32bit):true
                        Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\triage_dropped_file.dll",#1
                        Imagebase:0xd80000
                        File size:232960 bytes
                        MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high

                        General

                        Start time:16:02:06
                        Start date:23/12/2021
                        Path:C:\Windows\SysWOW64\rundll32.exe
                        Wow64 process (32bit):true
                        Commandline:rundll32.exe "C:\Users\user\Desktop\triage_dropped_file.dll",#1
                        Imagebase:0x1350000
                        File size:61952 bytes
                        MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_Dridex_1, Description: Yara detected Dridex unpacked file, Source: 00000002.00000000.296075681.000000006EB21000.00000020.00020000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_Dridex_1, Description: Yara detected Dridex unpacked file, Source: 00000002.00000002.324884043.000000006EB21000.00000020.00020000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_Dridex_1, Description: Yara detected Dridex unpacked file, Source: 00000002.00000000.298180742.000000006EB21000.00000020.00020000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_Dridex_1, Description: Yara detected Dridex unpacked file, Source: 00000002.00000001.292482173.000000006EB20000.00000004.00020000.sdmp, Author: Joe Security
                        Reputation:high

                        General

                        Start time:16:02:09
                        Start date:23/12/2021
                        Path:C:\Windows\SysWOW64\WerFault.exe
                        Wow64 process (32bit):true
                        Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6376 -s 672
                        Imagebase:0x220000
                        File size:434592 bytes
                        MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high

                        Disassembly

                        Code Analysis

                        Reset < >