Windows Analysis Report L0mddDYjoL.dll

Overview

General Information

Sample Name: L0mddDYjoL.dll
Analysis ID: 545443
MD5: 0d9cc367aa4abc5620b6fcf8e9272f53
SHA1: cb6db576bbe636a895d0ad3e3136483d0ec777be
SHA256: 1bd2e431f2631a5bfc21a9e244bb28d4230dad825b9d6396afcd32458923fb0a
Tags: 32dllDridexexetrojan
Infos:

Most interesting Screenshot:

Detection

Dridex
Score: 80
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Found malware configuration
Yara detected Dridex unpacked file
Multi AV Scanner detection for submitted file
Sigma detected: Suspicious Call by Ordinal
Tries to delay execution (extensive OutputDebugStringW loop)
C2 URLs / IPs found in malware configuration
Machine Learning detection for sample
Creates a DirectInput object (often for capturing keystrokes)
Uses 32bit PE files
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
AV process strings found (often used to terminate AV products)
Sample file is different than original file name gathered from version info
One or more processes crash
Tries to load missing DLLs
Contains functionality to query locales information (e.g. system language)
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to call native functions
Creates a process in suspended mode (likely to inject code)
IP address seen in connection with other malware
Abnormal high CPU Usage

Classification

AV Detection:

barindex
Found malware configuration
Source: 1.2.loaddll32.exe.6e9a0000.2.unpack Malware Configuration Extractor: Dridex {"Version": 22201, "C2 list": ["104.36.167.47:443", "188.40.48.93:4664", "162.241.33.132:9217", "217.160.5.104:593"], "RC4 keys": ["MVvOFIilF0NXOL2BGlf3SZonbBup17KA", "6UfDOLUgX3hJ3XaposUIUiva9uclhs6fenw01keZT6Cxe8VImuG9Uw6F4mFEkE0ddDT1py8ABw"]}
Multi AV Scanner detection for submitted file
Source: L0mddDYjoL.dll Virustotal: Detection: 63% Perma Link
Source: L0mddDYjoL.dll ReversingLabs: Detection: 67%
Machine Learning detection for sample
Source: L0mddDYjoL.dll Joe Sandbox ML: detected

Compliance:

barindex
Uses 32bit PE files
Source: L0mddDYjoL.dll Static PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
Source: L0mddDYjoL.dll Static PE information: DYNAMIC_BASE, NX_COMPAT
Source: Binary string: wininet.pdb source: WerFault.exe, 0000000A.00000003.374308414.00000000055E6000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384837541.0000000005028000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384762603.0000000005028000.00000004.00000040.sdmp
Source: Binary string: WinTypes.pdb source: WerFault.exe, 0000000B.00000003.384837541.0000000005028000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384762603.0000000005028000.00000004.00000040.sdmp
Source: Binary string: WINMMBASE.pdb7 source: WerFault.exe, 0000000A.00000003.374308414.00000000055E6000.00000004.00000040.sdmp
Source: Binary string: wkernel32.pdb source: WerFault.exe, 0000000A.00000003.374222231.0000000005421000.00000004.00000001.sdmp, WerFault.exe, 0000000A.00000003.369202824.0000000004F94000.00000004.00000001.sdmp, WerFault.exe, 0000000A.00000003.369297298.0000000003324000.00000004.00000001.sdmp, WerFault.exe, 0000000A.00000003.369736704.0000000003324000.00000004.00000001.sdmp, WerFault.exe, 0000000B.00000003.384704568.0000000005051000.00000004.00000001.sdmp, WerFault.exe, 0000000B.00000003.375195406.0000000004BDC000.00000004.00000001.sdmp
Source: Binary string: sfc_os.pdb source: WerFault.exe, 0000000A.00000003.374308414.00000000055E6000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384837541.0000000005028000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384762603.0000000005028000.00000004.00000040.sdmp
Source: Binary string: bcrypt.pdb source: WerFault.exe, 0000000A.00000003.374308414.00000000055E6000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384837541.0000000005028000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384762603.0000000005028000.00000004.00000040.sdmp
Source: Binary string: ucrtbase.pdb source: WerFault.exe, 0000000A.00000003.374283286.00000000055E0000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384741127.0000000005022000.00000004.00000040.sdmp
Source: Binary string: WINMMBASE.pdb1 source: WerFault.exe, 0000000B.00000003.384837541.0000000005028000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384762603.0000000005028000.00000004.00000040.sdmp
Source: Binary string: msvcrt.pdb source: WerFault.exe, 0000000A.00000003.374222231.0000000005421000.00000004.00000001.sdmp, WerFault.exe, 0000000B.00000003.384704568.0000000005051000.00000004.00000001.sdmp
Source: Binary string: ntdsapi.pdb source: WerFault.exe, 0000000A.00000003.374308414.00000000055E6000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384837541.0000000005028000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384762603.0000000005028000.00000004.00000040.sdmp
Source: Binary string: cryptbase.pdb] source: WerFault.exe, 0000000A.00000003.374308414.00000000055E6000.00000004.00000040.sdmp
Source: Binary string: wrpcrt4.pdb source: WerFault.exe, 0000000A.00000003.374283286.00000000055E0000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384815927.0000000005020000.00000004.00000040.sdmp
Source: Binary string: wntdll.pdb source: loaddll32.exe, 00000001.00000003.399803453.000000004B280000.00000004.00000001.sdmp, WerFault.exe, 0000000A.00000003.370078267.000000000331E000.00000004.00000001.sdmp, WerFault.exe, 0000000A.00000003.374222231.0000000005421000.00000004.00000001.sdmp, WerFault.exe, 0000000A.00000003.369289634.000000000331E000.00000004.00000001.sdmp, WerFault.exe, 0000000B.00000003.384704568.0000000005051000.00000004.00000001.sdmp
Source: Binary string: shcore.pdb source: WerFault.exe, 0000000A.00000003.374283286.00000000055E0000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384828474.0000000005025000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384741127.0000000005022000.00000004.00000040.sdmp
Source: Binary string: CoreMessaging.pdb source: WerFault.exe, 0000000B.00000003.384837541.0000000005028000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384762603.0000000005028000.00000004.00000040.sdmp
Source: Binary string: wgdi32.pdb source: WerFault.exe, 0000000A.00000003.374222231.0000000005421000.00000004.00000001.sdmp, WerFault.exe, 0000000B.00000003.384704568.0000000005051000.00000004.00000001.sdmp
Source: Binary string: fltLib.pdb source: WerFault.exe, 0000000A.00000003.374308414.00000000055E6000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384837541.0000000005028000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384762603.0000000005028000.00000004.00000040.sdmp
Source: Binary string: advapi32.pdb source: WerFault.exe, 0000000A.00000003.374308414.00000000055E6000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384837541.0000000005028000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384762603.0000000005028000.00000004.00000040.sdmp
Source: Binary string: oCReportStore::Prune: MaxReportCount=%d MaxSizeInMb=%dRSDSwkernel32.pdb source: WerFault.exe, 0000000A.00000002.384212838.0000000000AD2000.00000004.00000001.sdmp, WerFault.exe, 0000000B.00000002.391466880.00000000006F2000.00000004.00000001.sdmp
Source: Binary string: iphlpapi.pdbQ source: WerFault.exe, 0000000A.00000003.374308414.00000000055E6000.00000004.00000040.sdmp
Source: Binary string: wsspicli.pdb source: WerFault.exe, 0000000A.00000003.374308414.00000000055E6000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384837541.0000000005028000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384762603.0000000005028000.00000004.00000040.sdmp
Source: Binary string: shell32.pdb source: WerFault.exe, 0000000A.00000003.374283286.00000000055E0000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384741127.0000000005022000.00000004.00000040.sdmp
Source: Binary string: ntmarta.pdb source: WerFault.exe, 0000000B.00000003.384837541.0000000005028000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384762603.0000000005028000.00000004.00000040.sdmp
Source: Binary string: mpr.pdbUm source: WerFault.exe, 0000000B.00000003.384815927.0000000005020000.00000004.00000040.sdmp
Source: Binary string: msvcp_win.pdb source: WerFault.exe, 0000000A.00000003.374222231.0000000005421000.00000004.00000001.sdmp, WerFault.exe, 0000000B.00000003.384704568.0000000005051000.00000004.00000001.sdmp
Source: Binary string: dwmapi.pdbW source: WerFault.exe, 0000000A.00000003.374308414.00000000055E6000.00000004.00000040.sdmp
Source: Binary string: wkernelbase.pdb source: WerFault.exe, 0000000A.00000003.369302646.000000000332A000.00000004.00000001.sdmp, WerFault.exe, 0000000A.00000003.374222231.0000000005421000.00000004.00000001.sdmp, WerFault.exe, 0000000A.00000003.369531141.000000000332A000.00000004.00000001.sdmp, WerFault.exe, 0000000B.00000003.384704568.0000000005051000.00000004.00000001.sdmp
Source: Binary string: wimm32.pdb source: WerFault.exe, 0000000A.00000003.374308414.00000000055E6000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384837541.0000000005028000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384762603.0000000005028000.00000004.00000040.sdmp
Source: Binary string: dwmapi.pdbY source: WerFault.exe, 0000000B.00000003.384837541.0000000005028000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384762603.0000000005028000.00000004.00000040.sdmp
Source: Binary string: shlwapi.pdb source: WerFault.exe, 0000000A.00000003.374308414.00000000055E6000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384837541.0000000005028000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384762603.0000000005028000.00000004.00000040.sdmp
Source: Binary string: mpr.pdb source: WerFault.exe, 0000000A.00000003.374283286.00000000055E0000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384815927.0000000005020000.00000004.00000040.sdmp
Source: Binary string: CoreUIComponents.pdb source: WerFault.exe, 0000000B.00000003.384837541.0000000005028000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384762603.0000000005028000.00000004.00000040.sdmp
Source: Binary string: wwin32u.pdb source: WerFault.exe, 0000000A.00000003.374222231.0000000005421000.00000004.00000001.sdmp, WerFault.exe, 0000000B.00000003.384704568.0000000005051000.00000004.00000001.sdmp
Source: Binary string: setupapi.pdb source: WerFault.exe, 0000000A.00000003.374308414.00000000055E6000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384837541.0000000005028000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384762603.0000000005028000.00000004.00000040.sdmp
Source: Binary string: fltLib.pdbC source: WerFault.exe, 0000000A.00000003.374308414.00000000055E6000.00000004.00000040.sdmp
Source: Binary string: imagehlp.pdb source: WerFault.exe, 0000000A.00000003.374308414.00000000055E6000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384837541.0000000005028000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384762603.0000000005028000.00000004.00000040.sdmp
Source: Binary string: wUxTheme.pdb source: WerFault.exe, 0000000A.00000003.374308414.00000000055E6000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384837541.0000000005028000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384762603.0000000005028000.00000004.00000040.sdmp
Source: Binary string: dwmapi.pdb source: WerFault.exe, 0000000A.00000003.374308414.00000000055E6000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384837541.0000000005028000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384762603.0000000005028000.00000004.00000040.sdmp
Source: Binary string: winmm.pdb} source: WerFault.exe, 0000000B.00000003.384837541.0000000005028000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384762603.0000000005028000.00000004.00000040.sdmp
Source: Binary string: wntdll.pdb( source: WerFault.exe, 0000000A.00000003.370078267.000000000331E000.00000004.00000001.sdmp, WerFault.exe, 0000000A.00000003.369289634.000000000331E000.00000004.00000001.sdmp
Source: Binary string: WINMMBASE.pdb source: WerFault.exe, 0000000A.00000003.374308414.00000000055E6000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384837541.0000000005028000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384762603.0000000005028000.00000004.00000040.sdmp
Source: Binary string: shcore.pdbk source: WerFault.exe, 0000000A.00000003.374283286.00000000055E0000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384828474.0000000005025000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384741127.0000000005022000.00000004.00000040.sdmp
Source: Binary string: ffty.pdbj source: WerFault.exe, 0000000A.00000003.374308414.00000000055E6000.00000004.00000040.sdmp
Source: Binary string: profapi.pdb source: WerFault.exe, 0000000A.00000003.374308414.00000000055E6000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384837541.0000000005028000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384762603.0000000005028000.00000004.00000040.sdmp
Source: Binary string: ws2_32.pdb source: WerFault.exe, 0000000A.00000003.374308414.00000000055E6000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384837541.0000000005028000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384762603.0000000005028000.00000004.00000040.sdmp
Source: Binary string: winspool.pdb source: WerFault.exe, 0000000A.00000003.374308414.00000000055E6000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384837541.0000000005028000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384762603.0000000005028000.00000004.00000040.sdmp
Source: Binary string: wgdi32full.pdb source: WerFault.exe, 0000000A.00000003.374222231.0000000005421000.00000004.00000001.sdmp, WerFault.exe, 0000000B.00000003.384704568.0000000005051000.00000004.00000001.sdmp
Source: Binary string: mpr.pdbi source: WerFault.exe, 0000000A.00000003.374283286.00000000055E0000.00000004.00000040.sdmp
Source: Binary string: shell32.pdbk source: WerFault.exe, 0000000A.00000003.374283286.00000000055E0000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384741127.0000000005022000.00000004.00000040.sdmp
Source: Binary string: sechost.pdb source: WerFault.exe, 0000000A.00000003.374308414.00000000055E6000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384837541.0000000005028000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384762603.0000000005028000.00000004.00000040.sdmp
Source: Binary string: wsspicli.pdb[ source: WerFault.exe, 0000000A.00000003.374308414.00000000055E6000.00000004.00000040.sdmp
Source: Binary string: iphlpapi.pdb source: WerFault.exe, 0000000A.00000003.374308414.00000000055E6000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384837541.0000000005028000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384762603.0000000005028000.00000004.00000040.sdmp
Source: Binary string: propsys.pdb source: WerFault.exe, 0000000A.00000003.374308414.00000000055E6000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384837541.0000000005028000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384762603.0000000005028000.00000004.00000040.sdmp
Source: Binary string: wntdll.pdbUGP source: loaddll32.exe, 00000001.00000003.399803453.000000004B280000.00000004.00000001.sdmp
Source: Binary string: cfgmgr32.pdbk source: WerFault.exe, 0000000A.00000003.374283286.00000000055E0000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384741127.0000000005022000.00000004.00000040.sdmp
Source: Binary string: ucrtbase.pdbk source: WerFault.exe, 0000000A.00000003.374283286.00000000055E0000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384741127.0000000005022000.00000004.00000040.sdmp
Source: Binary string: winmm.pdb source: WerFault.exe, 0000000A.00000003.374308414.00000000055E6000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384837541.0000000005028000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384762603.0000000005028000.00000004.00000040.sdmp
Source: Binary string: powrprof.pdb source: WerFault.exe, 0000000A.00000003.374308414.00000000055E6000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384837541.0000000005028000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384762603.0000000005028000.00000004.00000040.sdmp
Source: Binary string: msctf.pdb source: WerFault.exe, 0000000A.00000003.374308414.00000000055E6000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384837541.0000000005028000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384762603.0000000005028000.00000004.00000040.sdmp
Source: Binary string: esent.pdb source: WerFault.exe, 0000000A.00000003.374308414.00000000055E6000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384837541.0000000005028000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384762603.0000000005028000.00000004.00000040.sdmp
Source: Binary string: ole32.pdb source: WerFault.exe, 0000000A.00000003.374308414.00000000055E6000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384837541.0000000005028000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384762603.0000000005028000.00000004.00000040.sdmp
Source: Binary string: TextInputFramework.pdb source: WerFault.exe, 0000000B.00000003.384837541.0000000005028000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384762603.0000000005028000.00000004.00000040.sdmp
Source: Binary string: AcLayers.pdb source: WerFault.exe, 0000000A.00000003.374222231.0000000005421000.00000004.00000001.sdmp, WerFault.exe, 0000000B.00000003.384704568.0000000005051000.00000004.00000001.sdmp
Source: Binary string: pdh.pdb source: WerFault.exe, 0000000A.00000003.374308414.00000000055E6000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384837541.0000000005028000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384762603.0000000005028000.00000004.00000040.sdmp
Source: Binary string: ntdsapi.pdb source: WerFault.exe, 0000000A.00000003.374308414.00000000055E6000.00000004.00000040.sdmp
Source: Binary string: advapi32.pdbE source: WerFault.exe, 0000000A.00000003.374308414.00000000055E6000.00000004.00000040.sdmp
Source: Binary string: ffty.pdb source: WerFault.exe, 0000000A.00000003.374308414.00000000055E6000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384837541.0000000005028000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384762603.0000000005028000.00000004.00000040.sdmp, L0mddDYjoL.dll
Source: Binary string: ffty.pdbVl source: WerFault.exe, 0000000B.00000003.384837541.0000000005028000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384762603.0000000005028000.00000004.00000040.sdmp
Source: Binary string: Kernel.Appcore.pdb source: WerFault.exe, 0000000A.00000003.374283286.00000000055E0000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384815927.0000000005020000.00000004.00000040.sdmp
Source: Binary string: cryptbase.pdb source: WerFault.exe, 0000000A.00000003.374308414.00000000055E6000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384837541.0000000005028000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384762603.0000000005028000.00000004.00000040.sdmp
Source: Binary string: msctf.pdb+ source: WerFault.exe, 0000000A.00000003.374308414.00000000055E6000.00000004.00000040.sdmp
Source: Binary string: wkernelbase.pdb( source: WerFault.exe, 0000000A.00000003.369302646.000000000332A000.00000004.00000001.sdmp, WerFault.exe, 0000000A.00000003.369531141.000000000332A000.00000004.00000001.sdmp
Source: Binary string: bcryptprimitives.pdb source: WerFault.exe, 0000000A.00000003.374283286.00000000055E0000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384815927.0000000005020000.00000004.00000040.sdmp
Source: Binary string: cfgmgr32.pdb source: WerFault.exe, 0000000A.00000003.374283286.00000000055E0000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384741127.0000000005022000.00000004.00000040.sdmp
Source: Binary string: combase.pdb source: WerFault.exe, 0000000A.00000003.374308414.00000000055E6000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384837541.0000000005028000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384762603.0000000005028000.00000004.00000040.sdmp
Source: Binary string: Windows.Storage.pdb source: WerFault.exe, 0000000A.00000003.374283286.00000000055E0000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384815927.0000000005020000.00000004.00000040.sdmp
Source: Binary string: wUxTheme.pdb+ source: WerFault.exe, 0000000B.00000003.384837541.0000000005028000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384762603.0000000005028000.00000004.00000040.sdmp
Source: Binary string: esent.pdb! source: WerFault.exe, 0000000A.00000003.374308414.00000000055E6000.00000004.00000040.sdmp
Source: Binary string: profapi.pdbO source: WerFault.exe, 0000000A.00000003.374308414.00000000055E6000.00000004.00000040.sdmp
Source: Binary string: rundll32.pdb source: WerFault.exe, 0000000A.00000003.374222231.0000000005421000.00000004.00000001.sdmp, WerFault.exe, 0000000B.00000003.384704568.0000000005051000.00000004.00000001.sdmp
Source: Binary string: wkernel32.pdb( source: WerFault.exe, 0000000A.00000003.369297298.0000000003324000.00000004.00000001.sdmp, WerFault.exe, 0000000A.00000003.369736704.0000000003324000.00000004.00000001.sdmp
Source: Binary string: ntdsapi.pdb- source: WerFault.exe, 0000000B.00000003.384837541.0000000005028000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384762603.0000000005028000.00000004.00000040.sdmp
Source: Binary string: oleaut32.pdb source: WerFault.exe, 0000000A.00000003.374308414.00000000055E6000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384837541.0000000005028000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384762603.0000000005028000.00000004.00000040.sdmp
Source: Binary string: sfc.pdb source: WerFault.exe, 0000000A.00000003.374308414.00000000055E6000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384837541.0000000005028000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384762603.0000000005028000.00000004.00000040.sdmp
Source: Binary string: CoreUIComponents.pdb_ source: WerFault.exe, 0000000B.00000003.384837541.0000000005028000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384762603.0000000005028000.00000004.00000040.sdmp
Source: Binary string: apphelp.pdb source: WerFault.exe, 0000000A.00000003.374222231.0000000005421000.00000004.00000001.sdmp, WerFault.exe, 0000000B.00000003.384704568.0000000005051000.00000004.00000001.sdmp
Source: Binary string: wuser32.pdb source: WerFault.exe, 0000000A.00000003.374222231.0000000005421000.00000004.00000001.sdmp, WerFault.exe, 0000000B.00000003.384704568.0000000005051000.00000004.00000001.sdmp
Source: Binary string: lz32.pdb source: WerFault.exe, 0000000A.00000003.374308414.00000000055E6000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384837541.0000000005028000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384762603.0000000005028000.00000004.00000040.sdmp
Source: Binary string: combase.pdbg source: WerFault.exe, 0000000A.00000003.374308414.00000000055E6000.00000004.00000040.sdmp

Networking:

barindex
C2 URLs / IPs found in malware configuration
Source: Malware configuration extractor IPs: 104.36.167.47:443
Source: Malware configuration extractor IPs: 188.40.48.93:4664
Source: Malware configuration extractor IPs: 162.241.33.132:9217
Source: Malware configuration extractor IPs: 217.160.5.104:593
Internet Provider seen in connection with other malware
Source: Joe Sandbox View ASN Name: UNIFIEDLAYER-AS-1US UNIFIEDLAYER-AS-1US
Source: Joe Sandbox View ASN Name: GIGASNET-ASUS GIGASNET-ASUS
Source: Joe Sandbox View ASN Name: ONEANDONE-ASBrauerstrasse48DE ONEANDONE-ASBrauerstrasse48DE
IP address seen in connection with other malware
Source: Joe Sandbox View IP Address: 162.241.33.132 162.241.33.132
Source: Joe Sandbox View IP Address: 104.36.167.47 104.36.167.47
Source: Joe Sandbox View IP Address: 217.160.5.104 217.160.5.104
Source: WerFault.exe, 0000000A.00000002.384805542.00000000033AD000.00000004.00000001.sdmp, WerFault.exe, 0000000A.00000002.384776459.0000000003370000.00000004.00000001.sdmp String found in binary or memory: http://crl.globalsign.net/root-r2.crl0
Source: Amcache.hve.10.dr String found in binary or memory: http://upx.sf.net

Key, Mouse, Clipboard, Microphone and Screen Capturing:

barindex
Creates a DirectInput object (often for capturing keystrokes)
Source: loaddll32.exe, 00000001.00000002.684128796.0000000000BCB000.00000004.00000020.sdmp Binary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

E-Banking Fraud:

barindex
Yara detected Dridex unpacked file
Source: Yara match File source: 5.0.rundll32.exe.6e9a0000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 6.0.rundll32.exe.6e9a0000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 6.0.rundll32.exe.6e9a0000.5.unpack, type: UNPACKEDPE
Source: Yara match File source: 1.2.loaddll32.exe.6e9a0000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.0.rundll32.exe.6e9a0000.5.unpack, type: UNPACKEDPE
Source: Yara match File source: 6.2.rundll32.exe.6e9a0000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000005.00000000.371795691.000000006E9A1000.00000020.00020000.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000000.369759856.000000006E9A1000.00000020.00020000.sdmp, type: MEMORY
Source: Yara match File source: 00000006.00000000.363470341.000000006E9A1000.00000020.00020000.sdmp, type: MEMORY
Source: Yara match File source: 00000006.00000002.389367218.000000006E9A1000.00000020.00020000.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000002.685190249.000000006E9A1000.00000020.00020000.sdmp, type: MEMORY
Source: Yara match File source: 00000006.00000000.365127503.000000006E9A1000.00000020.00020000.sdmp, type: MEMORY

System Summary:

barindex
Uses 32bit PE files
Source: L0mddDYjoL.dll Static PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
Sample file is different than original file name gathered from version info
Source: L0mddDYjoL.dll Binary or memory string: OriginalFilenameHen.dllD vs L0mddDYjoL.dll
One or more processes crash
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 4988 -s 728
Tries to load missing DLLs
Source: C:\Windows\System32\loaddll32.exe Section loaded: lz32.dll Jump to behavior
Detected potential crypto function
Source: C:\Windows\System32\loaddll32.exe Code function: 1_2_6E9B0730 1_2_6E9B0730
Source: C:\Windows\System32\loaddll32.exe Code function: 1_2_6E9B9370 1_2_6E9B9370
Source: C:\Windows\System32\loaddll32.exe Code function: 1_2_6E9A1494 1_2_6E9A1494
Source: C:\Windows\System32\loaddll32.exe Code function: 1_2_6E9AA4E8 1_2_6E9AA4E8
Source: C:\Windows\System32\loaddll32.exe Code function: 1_2_6E9B143C 1_2_6E9B143C
Source: C:\Windows\System32\loaddll32.exe Code function: 1_2_6E9A8428 1_2_6E9A8428
Contains functionality to call native functions
Source: C:\Windows\System32\loaddll32.exe Code function: 1_2_6E9B2234 NtDelayExecution, 1_2_6E9B2234
Source: C:\Windows\System32\loaddll32.exe Code function: 1_2_6E9B2820 NtAllocateVirtualMemory, 1_2_6E9B2820
Source: C:\Windows\System32\loaddll32.exe Code function: 1_2_6E9ABB44 NtClose, 1_2_6E9ABB44
Abnormal high CPU Usage
Source: C:\Windows\System32\loaddll32.exe Process Stats: CPU usage > 98%
Source: L0mddDYjoL.dll Virustotal: Detection: 63%
Source: L0mddDYjoL.dll ReversingLabs: Detection: 67%
Source: L0mddDYjoL.dll Static PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: C:\Windows\System32\loaddll32.exe Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\L0mddDYjoL.dll,Wgpomsdeeomtunmdrt
Source: unknown Process created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\L0mddDYjoL.dll"
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\L0mddDYjoL.dll",#1
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\L0mddDYjoL.dll,Wgpomsdeeomtunmdrt
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\L0mddDYjoL.dll",#1
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 4988 -s 728
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6340 -s 848
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\L0mddDYjoL.dll",#1 Jump to behavior
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\L0mddDYjoL.dll,Wgpomsdeeomtunmdrt Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\L0mddDYjoL.dll",#1 Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6340
Source: C:\Windows\SysWOW64\WerFault.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess4988
Source: C:\Windows\SysWOW64\WerFault.exe File created: C:\ProgramData\Microsoft\Windows\WER\Temp\WER4A30.tmp Jump to behavior
Source: classification engine Classification label: mal80.troj.evad.winDLL@9/10@0/4
Source: C:\Windows\SysWOW64\WerFault.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: L0mddDYjoL.dll Static PE information: DYNAMIC_BASE, NX_COMPAT
Source: L0mddDYjoL.dll Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: wininet.pdb source: WerFault.exe, 0000000A.00000003.374308414.00000000055E6000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384837541.0000000005028000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384762603.0000000005028000.00000004.00000040.sdmp
Source: Binary string: WinTypes.pdb source: WerFault.exe, 0000000B.00000003.384837541.0000000005028000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384762603.0000000005028000.00000004.00000040.sdmp
Source: Binary string: WINMMBASE.pdb7 source: WerFault.exe, 0000000A.00000003.374308414.00000000055E6000.00000004.00000040.sdmp
Source: Binary string: wkernel32.pdb source: WerFault.exe, 0000000A.00000003.374222231.0000000005421000.00000004.00000001.sdmp, WerFault.exe, 0000000A.00000003.369202824.0000000004F94000.00000004.00000001.sdmp, WerFault.exe, 0000000A.00000003.369297298.0000000003324000.00000004.00000001.sdmp, WerFault.exe, 0000000A.00000003.369736704.0000000003324000.00000004.00000001.sdmp, WerFault.exe, 0000000B.00000003.384704568.0000000005051000.00000004.00000001.sdmp, WerFault.exe, 0000000B.00000003.375195406.0000000004BDC000.00000004.00000001.sdmp
Source: Binary string: sfc_os.pdb source: WerFault.exe, 0000000A.00000003.374308414.00000000055E6000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384837541.0000000005028000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384762603.0000000005028000.00000004.00000040.sdmp
Source: Binary string: bcrypt.pdb source: WerFault.exe, 0000000A.00000003.374308414.00000000055E6000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384837541.0000000005028000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384762603.0000000005028000.00000004.00000040.sdmp
Source: Binary string: ucrtbase.pdb source: WerFault.exe, 0000000A.00000003.374283286.00000000055E0000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384741127.0000000005022000.00000004.00000040.sdmp
Source: Binary string: WINMMBASE.pdb1 source: WerFault.exe, 0000000B.00000003.384837541.0000000005028000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384762603.0000000005028000.00000004.00000040.sdmp
Source: Binary string: msvcrt.pdb source: WerFault.exe, 0000000A.00000003.374222231.0000000005421000.00000004.00000001.sdmp, WerFault.exe, 0000000B.00000003.384704568.0000000005051000.00000004.00000001.sdmp
Source: Binary string: ntdsapi.pdb source: WerFault.exe, 0000000A.00000003.374308414.00000000055E6000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384837541.0000000005028000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384762603.0000000005028000.00000004.00000040.sdmp
Source: Binary string: cryptbase.pdb] source: WerFault.exe, 0000000A.00000003.374308414.00000000055E6000.00000004.00000040.sdmp
Source: Binary string: wrpcrt4.pdb source: WerFault.exe, 0000000A.00000003.374283286.00000000055E0000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384815927.0000000005020000.00000004.00000040.sdmp
Source: Binary string: wntdll.pdb source: loaddll32.exe, 00000001.00000003.399803453.000000004B280000.00000004.00000001.sdmp, WerFault.exe, 0000000A.00000003.370078267.000000000331E000.00000004.00000001.sdmp, WerFault.exe, 0000000A.00000003.374222231.0000000005421000.00000004.00000001.sdmp, WerFault.exe, 0000000A.00000003.369289634.000000000331E000.00000004.00000001.sdmp, WerFault.exe, 0000000B.00000003.384704568.0000000005051000.00000004.00000001.sdmp
Source: Binary string: shcore.pdb source: WerFault.exe, 0000000A.00000003.374283286.00000000055E0000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384828474.0000000005025000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384741127.0000000005022000.00000004.00000040.sdmp
Source: Binary string: CoreMessaging.pdb source: WerFault.exe, 0000000B.00000003.384837541.0000000005028000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384762603.0000000005028000.00000004.00000040.sdmp
Source: Binary string: wgdi32.pdb source: WerFault.exe, 0000000A.00000003.374222231.0000000005421000.00000004.00000001.sdmp, WerFault.exe, 0000000B.00000003.384704568.0000000005051000.00000004.00000001.sdmp
Source: Binary string: fltLib.pdb source: WerFault.exe, 0000000A.00000003.374308414.00000000055E6000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384837541.0000000005028000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384762603.0000000005028000.00000004.00000040.sdmp
Source: Binary string: advapi32.pdb source: WerFault.exe, 0000000A.00000003.374308414.00000000055E6000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384837541.0000000005028000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384762603.0000000005028000.00000004.00000040.sdmp
Source: Binary string: oCReportStore::Prune: MaxReportCount=%d MaxSizeInMb=%dRSDSwkernel32.pdb source: WerFault.exe, 0000000A.00000002.384212838.0000000000AD2000.00000004.00000001.sdmp, WerFault.exe, 0000000B.00000002.391466880.00000000006F2000.00000004.00000001.sdmp
Source: Binary string: iphlpapi.pdbQ source: WerFault.exe, 0000000A.00000003.374308414.00000000055E6000.00000004.00000040.sdmp
Source: Binary string: wsspicli.pdb source: WerFault.exe, 0000000A.00000003.374308414.00000000055E6000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384837541.0000000005028000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384762603.0000000005028000.00000004.00000040.sdmp
Source: Binary string: shell32.pdb source: WerFault.exe, 0000000A.00000003.374283286.00000000055E0000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384741127.0000000005022000.00000004.00000040.sdmp
Source: Binary string: ntmarta.pdb source: WerFault.exe, 0000000B.00000003.384837541.0000000005028000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384762603.0000000005028000.00000004.00000040.sdmp
Source: Binary string: mpr.pdbUm source: WerFault.exe, 0000000B.00000003.384815927.0000000005020000.00000004.00000040.sdmp
Source: Binary string: msvcp_win.pdb source: WerFault.exe, 0000000A.00000003.374222231.0000000005421000.00000004.00000001.sdmp, WerFault.exe, 0000000B.00000003.384704568.0000000005051000.00000004.00000001.sdmp
Source: Binary string: dwmapi.pdbW source: WerFault.exe, 0000000A.00000003.374308414.00000000055E6000.00000004.00000040.sdmp
Source: Binary string: wkernelbase.pdb source: WerFault.exe, 0000000A.00000003.369302646.000000000332A000.00000004.00000001.sdmp, WerFault.exe, 0000000A.00000003.374222231.0000000005421000.00000004.00000001.sdmp, WerFault.exe, 0000000A.00000003.369531141.000000000332A000.00000004.00000001.sdmp, WerFault.exe, 0000000B.00000003.384704568.0000000005051000.00000004.00000001.sdmp
Source: Binary string: wimm32.pdb source: WerFault.exe, 0000000A.00000003.374308414.00000000055E6000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384837541.0000000005028000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384762603.0000000005028000.00000004.00000040.sdmp
Source: Binary string: dwmapi.pdbY source: WerFault.exe, 0000000B.00000003.384837541.0000000005028000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384762603.0000000005028000.00000004.00000040.sdmp
Source: Binary string: shlwapi.pdb source: WerFault.exe, 0000000A.00000003.374308414.00000000055E6000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384837541.0000000005028000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384762603.0000000005028000.00000004.00000040.sdmp
Source: Binary string: mpr.pdb source: WerFault.exe, 0000000A.00000003.374283286.00000000055E0000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384815927.0000000005020000.00000004.00000040.sdmp
Source: Binary string: CoreUIComponents.pdb source: WerFault.exe, 0000000B.00000003.384837541.0000000005028000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384762603.0000000005028000.00000004.00000040.sdmp
Source: Binary string: wwin32u.pdb source: WerFault.exe, 0000000A.00000003.374222231.0000000005421000.00000004.00000001.sdmp, WerFault.exe, 0000000B.00000003.384704568.0000000005051000.00000004.00000001.sdmp
Source: Binary string: setupapi.pdb source: WerFault.exe, 0000000A.00000003.374308414.00000000055E6000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384837541.0000000005028000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384762603.0000000005028000.00000004.00000040.sdmp
Source: Binary string: fltLib.pdbC source: WerFault.exe, 0000000A.00000003.374308414.00000000055E6000.00000004.00000040.sdmp
Source: Binary string: imagehlp.pdb source: WerFault.exe, 0000000A.00000003.374308414.00000000055E6000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384837541.0000000005028000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384762603.0000000005028000.00000004.00000040.sdmp
Source: Binary string: wUxTheme.pdb source: WerFault.exe, 0000000A.00000003.374308414.00000000055E6000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384837541.0000000005028000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384762603.0000000005028000.00000004.00000040.sdmp
Source: Binary string: dwmapi.pdb source: WerFault.exe, 0000000A.00000003.374308414.00000000055E6000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384837541.0000000005028000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384762603.0000000005028000.00000004.00000040.sdmp
Source: Binary string: winmm.pdb} source: WerFault.exe, 0000000B.00000003.384837541.0000000005028000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384762603.0000000005028000.00000004.00000040.sdmp
Source: Binary string: wntdll.pdb( source: WerFault.exe, 0000000A.00000003.370078267.000000000331E000.00000004.00000001.sdmp, WerFault.exe, 0000000A.00000003.369289634.000000000331E000.00000004.00000001.sdmp
Source: Binary string: WINMMBASE.pdb source: WerFault.exe, 0000000A.00000003.374308414.00000000055E6000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384837541.0000000005028000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384762603.0000000005028000.00000004.00000040.sdmp
Source: Binary string: shcore.pdbk source: WerFault.exe, 0000000A.00000003.374283286.00000000055E0000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384828474.0000000005025000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384741127.0000000005022000.00000004.00000040.sdmp
Source: Binary string: ffty.pdbj source: WerFault.exe, 0000000A.00000003.374308414.00000000055E6000.00000004.00000040.sdmp
Source: Binary string: profapi.pdb source: WerFault.exe, 0000000A.00000003.374308414.00000000055E6000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384837541.0000000005028000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384762603.0000000005028000.00000004.00000040.sdmp
Source: Binary string: ws2_32.pdb source: WerFault.exe, 0000000A.00000003.374308414.00000000055E6000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384837541.0000000005028000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384762603.0000000005028000.00000004.00000040.sdmp
Source: Binary string: winspool.pdb source: WerFault.exe, 0000000A.00000003.374308414.00000000055E6000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384837541.0000000005028000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384762603.0000000005028000.00000004.00000040.sdmp
Source: Binary string: wgdi32full.pdb source: WerFault.exe, 0000000A.00000003.374222231.0000000005421000.00000004.00000001.sdmp, WerFault.exe, 0000000B.00000003.384704568.0000000005051000.00000004.00000001.sdmp
Source: Binary string: mpr.pdbi source: WerFault.exe, 0000000A.00000003.374283286.00000000055E0000.00000004.00000040.sdmp
Source: Binary string: shell32.pdbk source: WerFault.exe, 0000000A.00000003.374283286.00000000055E0000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384741127.0000000005022000.00000004.00000040.sdmp
Source: Binary string: sechost.pdb source: WerFault.exe, 0000000A.00000003.374308414.00000000055E6000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384837541.0000000005028000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384762603.0000000005028000.00000004.00000040.sdmp
Source: Binary string: wsspicli.pdb[ source: WerFault.exe, 0000000A.00000003.374308414.00000000055E6000.00000004.00000040.sdmp
Source: Binary string: iphlpapi.pdb source: WerFault.exe, 0000000A.00000003.374308414.00000000055E6000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384837541.0000000005028000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384762603.0000000005028000.00000004.00000040.sdmp
Source: Binary string: propsys.pdb source: WerFault.exe, 0000000A.00000003.374308414.00000000055E6000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384837541.0000000005028000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384762603.0000000005028000.00000004.00000040.sdmp
Source: Binary string: wntdll.pdbUGP source: loaddll32.exe, 00000001.00000003.399803453.000000004B280000.00000004.00000001.sdmp
Source: Binary string: cfgmgr32.pdbk source: WerFault.exe, 0000000A.00000003.374283286.00000000055E0000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384741127.0000000005022000.00000004.00000040.sdmp
Source: Binary string: ucrtbase.pdbk source: WerFault.exe, 0000000A.00000003.374283286.00000000055E0000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384741127.0000000005022000.00000004.00000040.sdmp
Source: Binary string: winmm.pdb source: WerFault.exe, 0000000A.00000003.374308414.00000000055E6000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384837541.0000000005028000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384762603.0000000005028000.00000004.00000040.sdmp
Source: Binary string: powrprof.pdb source: WerFault.exe, 0000000A.00000003.374308414.00000000055E6000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384837541.0000000005028000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384762603.0000000005028000.00000004.00000040.sdmp
Source: Binary string: msctf.pdb source: WerFault.exe, 0000000A.00000003.374308414.00000000055E6000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384837541.0000000005028000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384762603.0000000005028000.00000004.00000040.sdmp
Source: Binary string: esent.pdb source: WerFault.exe, 0000000A.00000003.374308414.00000000055E6000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384837541.0000000005028000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384762603.0000000005028000.00000004.00000040.sdmp
Source: Binary string: ole32.pdb source: WerFault.exe, 0000000A.00000003.374308414.00000000055E6000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384837541.0000000005028000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384762603.0000000005028000.00000004.00000040.sdmp
Source: Binary string: TextInputFramework.pdb source: WerFault.exe, 0000000B.00000003.384837541.0000000005028000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384762603.0000000005028000.00000004.00000040.sdmp
Source: Binary string: AcLayers.pdb source: WerFault.exe, 0000000A.00000003.374222231.0000000005421000.00000004.00000001.sdmp, WerFault.exe, 0000000B.00000003.384704568.0000000005051000.00000004.00000001.sdmp
Source: Binary string: pdh.pdb source: WerFault.exe, 0000000A.00000003.374308414.00000000055E6000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384837541.0000000005028000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384762603.0000000005028000.00000004.00000040.sdmp
Source: Binary string: ntdsapi.pdb source: WerFault.exe, 0000000A.00000003.374308414.00000000055E6000.00000004.00000040.sdmp
Source: Binary string: advapi32.pdbE source: WerFault.exe, 0000000A.00000003.374308414.00000000055E6000.00000004.00000040.sdmp
Source: Binary string: ffty.pdb source: WerFault.exe, 0000000A.00000003.374308414.00000000055E6000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384837541.0000000005028000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384762603.0000000005028000.00000004.00000040.sdmp, L0mddDYjoL.dll
Source: Binary string: ffty.pdbVl source: WerFault.exe, 0000000B.00000003.384837541.0000000005028000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384762603.0000000005028000.00000004.00000040.sdmp
Source: Binary string: Kernel.Appcore.pdb source: WerFault.exe, 0000000A.00000003.374283286.00000000055E0000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384815927.0000000005020000.00000004.00000040.sdmp
Source: Binary string: cryptbase.pdb source: WerFault.exe, 0000000A.00000003.374308414.00000000055E6000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384837541.0000000005028000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384762603.0000000005028000.00000004.00000040.sdmp
Source: Binary string: msctf.pdb+ source: WerFault.exe, 0000000A.00000003.374308414.00000000055E6000.00000004.00000040.sdmp
Source: Binary string: wkernelbase.pdb( source: WerFault.exe, 0000000A.00000003.369302646.000000000332A000.00000004.00000001.sdmp, WerFault.exe, 0000000A.00000003.369531141.000000000332A000.00000004.00000001.sdmp
Source: Binary string: bcryptprimitives.pdb source: WerFault.exe, 0000000A.00000003.374283286.00000000055E0000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384815927.0000000005020000.00000004.00000040.sdmp
Source: Binary string: cfgmgr32.pdb source: WerFault.exe, 0000000A.00000003.374283286.00000000055E0000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384741127.0000000005022000.00000004.00000040.sdmp
Source: Binary string: combase.pdb source: WerFault.exe, 0000000A.00000003.374308414.00000000055E6000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384837541.0000000005028000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384762603.0000000005028000.00000004.00000040.sdmp
Source: Binary string: Windows.Storage.pdb source: WerFault.exe, 0000000A.00000003.374283286.00000000055E0000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384815927.0000000005020000.00000004.00000040.sdmp
Source: Binary string: wUxTheme.pdb+ source: WerFault.exe, 0000000B.00000003.384837541.0000000005028000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384762603.0000000005028000.00000004.00000040.sdmp
Source: Binary string: esent.pdb! source: WerFault.exe, 0000000A.00000003.374308414.00000000055E6000.00000004.00000040.sdmp
Source: Binary string: profapi.pdbO source: WerFault.exe, 0000000A.00000003.374308414.00000000055E6000.00000004.00000040.sdmp
Source: Binary string: rundll32.pdb source: WerFault.exe, 0000000A.00000003.374222231.0000000005421000.00000004.00000001.sdmp, WerFault.exe, 0000000B.00000003.384704568.0000000005051000.00000004.00000001.sdmp
Source: Binary string: wkernel32.pdb( source: WerFault.exe, 0000000A.00000003.369297298.0000000003324000.00000004.00000001.sdmp, WerFault.exe, 0000000A.00000003.369736704.0000000003324000.00000004.00000001.sdmp
Source: Binary string: ntdsapi.pdb- source: WerFault.exe, 0000000B.00000003.384837541.0000000005028000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384762603.0000000005028000.00000004.00000040.sdmp
Source: Binary string: oleaut32.pdb source: WerFault.exe, 0000000A.00000003.374308414.00000000055E6000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384837541.0000000005028000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384762603.0000000005028000.00000004.00000040.sdmp
Source: Binary string: sfc.pdb source: WerFault.exe, 0000000A.00000003.374308414.00000000055E6000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384837541.0000000005028000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384762603.0000000005028000.00000004.00000040.sdmp
Source: Binary string: CoreUIComponents.pdb_ source: WerFault.exe, 0000000B.00000003.384837541.0000000005028000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384762603.0000000005028000.00000004.00000040.sdmp
Source: Binary string: apphelp.pdb source: WerFault.exe, 0000000A.00000003.374222231.0000000005421000.00000004.00000001.sdmp, WerFault.exe, 0000000B.00000003.384704568.0000000005051000.00000004.00000001.sdmp
Source: Binary string: wuser32.pdb source: WerFault.exe, 0000000A.00000003.374222231.0000000005421000.00000004.00000001.sdmp, WerFault.exe, 0000000B.00000003.384704568.0000000005051000.00000004.00000001.sdmp
Source: Binary string: lz32.pdb source: WerFault.exe, 0000000A.00000003.374308414.00000000055E6000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384837541.0000000005028000.00000004.00000040.sdmp, WerFault.exe, 0000000B.00000003.384762603.0000000005028000.00000004.00000040.sdmp
Source: Binary string: combase.pdbg source: WerFault.exe, 0000000A.00000003.374308414.00000000055E6000.00000004.00000040.sdmp

Data Obfuscation:

barindex
Uses code obfuscation techniques (call, push, ret)
Source: C:\Windows\System32\loaddll32.exe Code function: 1_2_6E9AF6A8 push esi; mov dword ptr [esp], 00000000h 1_2_6E9AF6A9
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior

Malware Analysis System Evasion:

barindex
Tries to delay execution (extensive OutputDebugStringW loop)
Source: C:\Windows\System32\loaddll32.exe Section loaded: OutputDebugStringW count: 1001
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Source: C:\Windows\System32\loaddll32.exe Window / User API: threadDelayed 1001 Jump to behavior
Sample execution stops while process was sleeping (likely an evasion)
Source: C:\Windows\System32\loaddll32.exe Last function: Thread delayed
Source: C:\Windows\System32\loaddll32.exe Last function: Thread delayed
Source: C:\Windows\System32\loaddll32.exe Code function: 1_2_6E9B0730 GetTokenInformation,GetSystemInfo,GetTokenInformation, 1_2_6E9B0730
Source: Amcache.hve.10.dr Binary or memory string: VMware
Source: Amcache.hve.10.dr Binary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/5&1ec51bf7&0&000000
Source: Amcache.hve.10.dr Binary or memory string: @scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/5&280b647&0&000000
Source: Amcache.hve.10.dr Binary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.10.dr Binary or memory string: VMware, Inc.
Source: Amcache.hve.10.dr Binary or memory string: VMware Virtual disk SCSI Disk Devicehbin
Source: Amcache.hve.10.dr Binary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.10.dr Binary or memory string: VMware7,1
Source: Amcache.hve.10.dr Binary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.10.dr Binary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.10.dr Binary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW71.00V.13989454.B64.1906190538,BiosReleaseDate:06/19/2019,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware7,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: WerFault.exe, 0000000A.00000002.384767858.0000000003360000.00000004.00000001.sdmp, WerFault.exe, 0000000A.00000002.384939037.0000000004FA6000.00000004.00000001.sdmp Binary or memory string: Hyper-V RAW
Source: Amcache.hve.10.dr Binary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.10.dr Binary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: WerFault.exe, 0000000A.00000002.384776459.0000000003370000.00000004.00000001.sdmp Binary or memory string: Hyper-V RAWonicdLocal Area Connection* 8-QoS Packet Scheduler-0000
Source: Amcache.hve.10.dr Binary or memory string: VMware, Inc.me
Source: Amcache.hve.10.dr Binary or memory string: VMware-42 35 d8 20 48 cb c7 ff-aa 5e d0 37 a0 49 53 d7
Source: Amcache.hve.10.dr Binary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/5&280b647&0&000000
Source: Amcache.hve.10.dr Binary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/5&1ec51bf7&0&000000

Anti Debugging:

barindex
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Source: C:\Windows\System32\loaddll32.exe Code function: 1_2_6E9A6D0C GetUserNameW,MessageBoxW,GetLastError,CreateFileA,DebugBreak,FlushFileBuffers,FreeEnvironmentStringsA,GetConsoleOutputCP,GetEnvironmentStrings,GetLocaleInfoA,GetStartupInfoA,GetStringTypeA,HeapValidate,IsBadReadPtr,LCMapStringA,LoadLibraryA,OutputDebugStringA, 1_2_6E9A6D0C
Source: C:\Windows\System32\loaddll32.exe Code function: 1_2_6E9B3138 RtlAddVectoredExceptionHandler, 1_2_6E9B3138

HIPS / PFW / Operating System Protection Evasion:

barindex
Creates a process in suspended mode (likely to inject code)
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\L0mddDYjoL.dll",#1 Jump to behavior
Source: loaddll32.exe, 00000001.00000002.684736046.0000000001350000.00000002.00020000.sdmp, rundll32.exe, 00000005.00000000.369073399.00000000037C0000.00000002.00020000.sdmp, rundll32.exe, 00000005.00000000.371411387.00000000037C0000.00000002.00020000.sdmp, rundll32.exe, 00000006.00000000.363318375.00000000034D0000.00000002.00020000.sdmp, rundll32.exe, 00000006.00000000.364945140.00000000034D0000.00000002.00020000.sdmp Binary or memory string: Program Manager
Source: loaddll32.exe, 00000001.00000002.684736046.0000000001350000.00000002.00020000.sdmp, rundll32.exe, 00000005.00000000.369073399.00000000037C0000.00000002.00020000.sdmp, rundll32.exe, 00000005.00000000.371411387.00000000037C0000.00000002.00020000.sdmp, rundll32.exe, 00000006.00000000.363318375.00000000034D0000.00000002.00020000.sdmp, rundll32.exe, 00000006.00000000.364945140.00000000034D0000.00000002.00020000.sdmp Binary or memory string: Shell_TrayWnd
Source: loaddll32.exe, 00000001.00000002.684736046.0000000001350000.00000002.00020000.sdmp, rundll32.exe, 00000005.00000000.369073399.00000000037C0000.00000002.00020000.sdmp, rundll32.exe, 00000005.00000000.371411387.00000000037C0000.00000002.00020000.sdmp, rundll32.exe, 00000006.00000000.363318375.00000000034D0000.00000002.00020000.sdmp, rundll32.exe, 00000006.00000000.364945140.00000000034D0000.00000002.00020000.sdmp Binary or memory string: Progman
Source: loaddll32.exe, 00000001.00000002.684736046.0000000001350000.00000002.00020000.sdmp, rundll32.exe, 00000005.00000000.369073399.00000000037C0000.00000002.00020000.sdmp, rundll32.exe, 00000005.00000000.371411387.00000000037C0000.00000002.00020000.sdmp, rundll32.exe, 00000006.00000000.363318375.00000000034D0000.00000002.00020000.sdmp, rundll32.exe, 00000006.00000000.364945140.00000000034D0000.00000002.00020000.sdmp Binary or memory string: Progmanlock

Language, Device and Operating System Detection:

barindex
Contains functionality to query locales information (e.g. system language)
Source: C:\Windows\System32\loaddll32.exe Code function: GetUserNameW,MessageBoxW,GetLastError,CreateFileA,DebugBreak,FlushFileBuffers,FreeEnvironmentStringsA,GetConsoleOutputCP,GetEnvironmentStrings,GetLocaleInfoA,GetStartupInfoA,GetStringTypeA,HeapValidate,IsBadReadPtr,LCMapStringA,LoadLibraryA,OutputDebugStringA, 1_2_6E9A6D0C
Source: C:\Windows\System32\loaddll32.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid Jump to behavior
Source: C:\Windows\System32\loaddll32.exe Code function: 1_2_6E9A6D0C GetUserNameW,MessageBoxW,GetLastError,CreateFileA,DebugBreak,FlushFileBuffers,FreeEnvironmentStringsA,GetConsoleOutputCP,GetEnvironmentStrings,GetLocaleInfoA,GetStartupInfoA,GetStringTypeA,HeapValidate,IsBadReadPtr,LCMapStringA,LoadLibraryA,OutputDebugStringA, 1_2_6E9A6D0C

Lowering of HIPS / PFW / Operating System Security Settings:

barindex
AV process strings found (often used to terminate AV products)
Source: Amcache.hve.10.dr, Amcache.hve.LOG1.10.dr Binary or memory string: c:\users\user\desktop\procexp.exe
Source: Amcache.hve.10.dr Binary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.10.dr, Amcache.hve.LOG1.10.dr Binary or memory string: procexp.exe
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs