Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
WOTZc2nssO.exe

Overview

General Information

Sample Name:WOTZc2nssO.exe (renamed file extension from exe to dll)
Analysis ID:606301
MD5:ba33bff302fdecf939ed96296d93593f
SHA1:f422c218c50549a380234e6c57231e95a5774371
SHA256:55f53b1d9dac903d695b48f52894117a87acd81c1c10fc6eafb6dad5d6bc28b4
Tags:dllDridex
Infos:

Detection

Dridex
Score:68
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Yara detected Dridex unpacked file
Multi AV Scanner detection for submitted file
Sigma detected: Suspicious Call by Ordinal
Creates a DirectInput object (often for capturing keystrokes)
Uses 32bit PE files
Sample file is different than original file name gathered from version info
PE file contains strange resources
Program does not show much activity (idle)
Creates a process in suspended mode (likely to inject code)
Checks if the current process is being debugged

Classification

  • System is w10x64
  • loaddll32.exe (PID: 3260 cmdline: loaddll32.exe "C:\Users\user\Desktop\WOTZc2nssO.dll" MD5: 7DEB5DB86C0AC789123DEC286286B938)
    • cmd.exe (PID: 5784 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\WOTZc2nssO.dll",#1 MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • rundll32.exe (PID: 1356 cmdline: rundll32.exe "C:\Users\user\Desktop\WOTZc2nssO.dll",#1 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
WOTZc2nssO.dllJoeSecurity_Dridex_1Yara detected Dridex unpacked fileJoe Security

    System Summary

    barindex
    Source: Process startedAuthor: Florian Roth: Data: Command: rundll32.exe "C:\Users\user\Desktop\WOTZc2nssO.dll",#1, CommandLine: rundll32.exe "C:\Users\user\Desktop\WOTZc2nssO.dll",#1, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\rundll32.exe, NewProcessName: C:\Windows\SysWOW64\rundll32.exe, OriginalFileName: C:\Windows\SysWOW64\rundll32.exe, ParentCommandLine: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\WOTZc2nssO.dll",#1, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 5784, ParentProcessName: cmd.exe, ProcessCommandLine: rundll32.exe "C:\Users\user\Desktop\WOTZc2nssO.dll",#1, ProcessId: 1356, ProcessName: rundll32.exe
    No Snort rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: WOTZc2nssO.dllAvira: detected
    Source: WOTZc2nssO.dllVirustotal: Detection: 41%Perma Link
    Source: WOTZc2nssO.dllReversingLabs: Detection: 71%
    Source: WOTZc2nssO.dllStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL, RELOCS_STRIPPED
    Source: WOTZc2nssO.dllStatic PE information: TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
    Source: loaddll32.exe, 00000000.00000002.234826330.0000000000ACB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

    E-Banking Fraud

    barindex
    Source: Yara matchFile source: WOTZc2nssO.dll, type: SAMPLE
    Source: WOTZc2nssO.dllStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL, RELOCS_STRIPPED
    Source: WOTZc2nssO.dllBinary or memory string: OriginalFilenameTESTAPP.EXE0 vs WOTZc2nssO.dll
    Source: WOTZc2nssO.dllStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
    Source: WOTZc2nssO.dllVirustotal: Detection: 41%
    Source: WOTZc2nssO.dllReversingLabs: Detection: 71%
    Source: WOTZc2nssO.dllStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
    Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: classification engineClassification label: mal68.troj.winDLL@5/0@0/0
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\WOTZc2nssO.dll",#1
    Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\WOTZc2nssO.dll"
    Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\WOTZc2nssO.dll",#1
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\WOTZc2nssO.dll",#1
    Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\WOTZc2nssO.dll",#1Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\WOTZc2nssO.dll",#1Jump to behavior
    Source: WOTZc2nssO.dllStatic PE information: TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
    Source: WOTZc2nssO.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
    Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
    Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
    Source: C:\Windows\System32\loaddll32.exeProcess queried: DebugPortJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\WOTZc2nssO.dll",#1Jump to behavior
    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid AccountsWindows Management InstrumentationPath Interception11
    Process Injection
    1
    Virtualization/Sandbox Evasion
    1
    Input Capture
    1
    Security Software Discovery
    Remote Services1
    Input Capture
    Exfiltration Over Other Network MediumData ObfuscationEavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
    Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
    Rundll32
    LSASS Memory1
    Virtualization/Sandbox Evasion
    Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)11
    Process Injection
    Security Account Manager1
    System Information Discovery
    SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet
    behaviorgraph top1 signatures2 2 Behavior Graph ID: 606301 Sample: WOTZc2nssO.exe Startdate: 09/04/2022 Architecture: WINDOWS Score: 68 13 Antivirus / Scanner detection for submitted sample 2->13 15 Multi AV Scanner detection for submitted file 2->15 17 Yara detected Dridex unpacked file 2->17 19 Sigma detected: Suspicious Call by Ordinal 2->19 7 loaddll32.exe 1 2->7         started        process3 process4 9 cmd.exe 1 7->9         started        process5 11 rundll32.exe 9->11         started       

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    WOTZc2nssO.dll41%VirustotalBrowse
    WOTZc2nssO.dll71%ReversingLabsWin32.Infostealer.Dridex
    WOTZc2nssO.dll100%AviraHEUR/AGEN.1214843
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    No contacted domains info
    No contacted IP infos
    Joe Sandbox Version:34.0.0 Boulder Opal
    Analysis ID:606301
    Start date and time: 09/04/202220:19:082022-04-09 20:19:08 +02:00
    Joe Sandbox Product:CloudBasic
    Overall analysis duration:0h 2m 28s
    Hypervisor based Inspection enabled:false
    Report type:full
    Sample file name:WOTZc2nssO.exe (renamed file extension from exe to dll)
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
    Number of analysed new started processes analysed:3
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • HDC enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Detection:MAL
    Classification:mal68.troj.winDLL@5/0@0/0
    EGA Information:Failed
    HDC Information:Failed
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 0
    • Number of non-executed functions: 0
    Cookbook Comments:
    • Adjust boot time
    • Enable AMSI
    • Stop behavior analysis, all processes terminated
    • Not all processes where analyzed, report is missing behavior information
    No simulations
    No context
    No context
    No context
    No context
    No context
    No created / dropped files found
    File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
    Entropy (8bit):6.038106926488256
    TrID:
    • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
    • Generic Win/DOS Executable (2004/3) 0.20%
    • DOS Executable Generic (2002/1) 0.20%
    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
    File name:WOTZc2nssO.dll
    File size:135168
    MD5:ba33bff302fdecf939ed96296d93593f
    SHA1:f422c218c50549a380234e6c57231e95a5774371
    SHA256:55f53b1d9dac903d695b48f52894117a87acd81c1c10fc6eafb6dad5d6bc28b4
    SHA512:3ca1e38a95818811f15aedd86bd202e4e698600e3a9143c338b4908ca8b5890f9f7a81f75df7f4337b1331de4e49428dd17d996bd21691e600385f67afcaabbf
    SSDEEP:3072:W3sOOO1kCH3gxtJC8UDqYfGbKDkvKjxCy:W3sOl1kqOC8U/6Ikyjx
    TLSH:E4D38D02F68382F6ED93A9B0091E667FE7715D0A45749399C3E57E66E433230E73A342
    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........#...B...B...B..R.o..B..R.j..B...B...B..R.q..B..*+...B...B...B..*+...B..*+^..B..*+...B..Rich.B..........PE..L....R.a...........
    Icon Hash:f9e0f484c2d0fc0e
    Entrypoint:0x5c0000
    Entrypoint Section:
    Digitally signed:false
    Imagebase:0x5c0000
    Subsystem:windows gui
    Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE, DLL, RELOCS_STRIPPED
    DLL Characteristics:TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
    Time Stamp:0x61AA52E1 [Fri Dec 3 17:24:49 2021 UTC]
    TLS Callbacks:
    CLR (.Net) Version:
    OS Version Major:6
    OS Version Minor:0
    File Version Major:6
    File Version Minor:0
    Subsystem Version Major:6
    Subsystem Version Minor:0
    Import Hash:68b66fd5fe2322f1f5fcb9cf4ede12bd
    Instruction
    dec ebp
    pop edx
    nop
    add byte ptr [ebx], al
    add byte ptr [eax], al
    add byte ptr [eax+eax], al
    add byte ptr [eax], al
    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x1c9a00x178.rdata
    IMAGE_DIRECTORY_ENTRY_IMPORT0x1cc380x50.rdata
    IMAGE_DIRECTORY_ENTRY_RESOURCE0x1f0000x9b0.rsrc
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
    IMAGE_DIRECTORY_ENTRY_DEBUG0x1c9800x1c.rdata
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0x1a0000x60.rdata
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
    .text0x10000x190000x19000False0.5660546875data6.34871846727IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
    .rdata0x1a0000x30000x3000False0.873779296875Dyalog APL component file 64-bit non-journaled checksummed version 199.1197.49659019864IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .data0x1d0000x10000x1000False0.151123046875DOS executable (block device driver)1.60850107338IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
    .CRT0x1e0000x10000x1000False0.0078125ASCII text, with no line terminators0.00984533685143IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .rsrc0x1f0000x10000x1000False0.24951171875data2.91667869163IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .reloc0x200000x10000x1000False0.161376953125GLS_BINARY_LSB_FIRST1.48069807529IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
    NameRVASizeTypeLanguageCountry
    RT_ICON0x1f0e80x568GLS_BINARY_LSB_FIRST
    RT_GROUP_ICON0x1f6500x14data
    RT_VERSION0x1f6680x344data
    DLLImport
    KERNEL32.dllLCMapStringA, IsBadReadPtr, HeapValidate, GetStringTypeA, GetStartupInfoA, GetLocaleInfoA, LoadLibraryA, GetConsoleOutputCP, FreeEnvironmentStringsA, FlushFileBuffers, DebugBreak, CreateFileA, GetLastError, GetEnvironmentStrings, OutputDebugStringA
    USER32.dllMessageBoxW
    ADVAPI32.dllGetUserNameW
    NameOrdinalAddress
    CreateExecutivePlatform20x5d78dc
    DllCanUnloadNow30x5d93d4
    DllGetClassObject40x5cdce5
    DllRegisterServer50x5c21c8
    DllUnregisterServer60x5cbdd1
    DescriptionData
    LegalCopyrightCopyright 2016-2021
    InternalNameTarget Corporation
    FileVersion2.1.66
    CompanyNameParamount Pictures
    LegalTrademarksParamount Pictures
    Comments3.1.100
    ProductNameStaples
    ProductVersion6.0.20
    FileDescription5.6.46
    OriginalFilenameTESTAPP.EXE
    Translation0x0409 0x04e4
    No network behavior found

    Click to jump to process

    Click to jump to process

    Click to jump to process

    Target ID:0
    Start time:20:20:09
    Start date:09/04/2022
    Path:C:\Windows\System32\loaddll32.exe
    Wow64 process (32bit):true
    Commandline:loaddll32.exe "C:\Users\user\Desktop\WOTZc2nssO.dll"
    Imagebase:0xd70000
    File size:116736 bytes
    MD5 hash:7DEB5DB86C0AC789123DEC286286B938
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high

    Target ID:1
    Start time:20:20:10
    Start date:09/04/2022
    Path:C:\Windows\SysWOW64\cmd.exe
    Wow64 process (32bit):true
    Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\WOTZc2nssO.dll",#1
    Imagebase:0x1190000
    File size:232960 bytes
    MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high

    Target ID:2
    Start time:20:20:10
    Start date:09/04/2022
    Path:C:\Windows\SysWOW64\rundll32.exe
    Wow64 process (32bit):true
    Commandline:rundll32.exe "C:\Users\user\Desktop\WOTZc2nssO.dll",#1
    Imagebase:0x70000
    File size:61952 bytes
    MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high

    No disassembly