top title background image
flash

mal2.dll

Status: finished
Submission Time: 2021-12-01 18:08:55 +01:00
Malicious
Trojan
Evader
Emotet

Comments

Tags

Details

  • Analysis ID:
    532100
  • API (Web) ID:
    899624
  • Analysis Started:
    2021-12-01 18:09:23 +01:00
  • Analysis Finished:
    2021-12-01 18:40:00 +01:00
  • MD5:
    9efbd03d5576686dd9f0678c09abe9fc
  • SHA1:
    0b821e78137018bbf3f9c67d3b049e33d5b36ae5
  • SHA256:
    972f9350219dcc2df463f923ec5b559f4ab69f083da9ccbd0976c51bc19f3f5b
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
Score: 84
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
malicious
Score: 76
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Run Condition: Run with higher sleep bypass
clean
0/100

Third Party Analysis Engines

malicious
Score: 11/45

IPs

IP Country Detection
46.55.222.11
Bulgaria
104.251.214.46
United States
158.69.222.101
Canada
Click to see the 26 hidden entries
185.184.25.237
Turkey
58.227.42.236
Korea Republic of
210.57.217.132
Indonesia
203.114.109.124
Thailand
45.142.114.231
Germany
212.237.56.116
Italy
207.38.84.195
United States
176.104.106.96
Serbia
212.237.5.209
Italy
178.79.147.66
United Kingdom
103.8.26.103
Malaysia
41.76.108.46
South Africa
195.154.133.20
France
103.8.26.102
Malaysia
51.68.175.8
France
50.116.54.215
United States
45.118.135.203
Japan
107.182.225.142
United States
216.158.226.206
United States
103.75.201.2
Thailand
45.118.115.99
Indonesia
81.0.236.90
Czech Republic
138.185.72.26
Brazil
104.245.52.73
United States
110.232.117.186
Australia
212.237.17.99
Italy

URLs

Name Detection
https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=
https://dev.virtualearth.net/mapcontrol/logging.ashx
https://dev.ditu.live.com/mapcontrol/logging.ashx
Click to see the 42 hidden entries
https://dev.ditu.live.com/REST/v1/Imagery/Copyright/
https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?entry=
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=
https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r=
https://dev.virtualearth.net/REST/v1/JsonFilter/VenueMaps/data/
https://dev.virtualearth.net/REST/v1/Transit/Schedules/
https://dynamic.t
https://dev.virtualearth.net/REST/v1/Routes/Transit
https://t0.ssl.ak.tiles.virtualearth.net/tiles/gen
https://ecn.dev.virtualearth.net/mapcontrol/mapconfiguration.ashx?name=native&v=
https://ecn.dev.virtualearth.net/mapcontrol/roadshield.ashx?bucket=
https://activity.windows.com
http://www.bingmapsportal.com
https://dev.ditu.live.com/REST/v1/Locations
https://dev.virtualearth.net/REST/v1/Imagery/Copyright/
https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/
https://%s.xboxlive.com/
https://%s.dnet.xboxlive.com
https://dev.ditu.live.com/REST/v1/JsonFilter/VenueMaps/data/
https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r=
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdv?pv=1&r=
https://dev.ditu.live.com/REST/v1/Routes/
https://dev.virtualearth.net/REST/v1/Routes/Driving
http://crl.microsoft
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashx
https://dev.ditu.live.com/REST/v1/Traffic/Incidents/
https://dev.ditu.live.com/REST/v1/Transit/Stops/
https://t0.tiles.ditu.live.com/tiles/gen
https://dev.virtualearth.net/REST/v1/Routes/
https://dev.virtualearth.net/REST/v1/Traffic/Incidents/
https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashx
https://dev.virtualearth.net/REST/v1/Routes/Walking
https://dev.virtualearth.net/REST/v1/Transit/Stops/
http://crl.ver)
https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?
http://upx.sf.net
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r=
https://dev.virtualearth.net/mapcontrol/HumanScaleServices/GetBubbles.ashx?n=
https://%s.xboxlive.com
https://dev.ditu.live.com/mapcontrol/mapconfiguration.ashx?name=native&v=
https://dev.virtualearth.net/REST/v1/Locations

Dropped files

Name File Type Hashes Detection
C:\ProgramData\Microsoft\Windows\WER\Temp\WER37E7.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
#
C:\Windows\appcompat\Programs\Amcache.hve.LOG1
MS Windows registry file, NT/2000 or above
#
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
#
Click to see the 18 hidden entries
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\DeliveryOptimization\Logs\dosvc.20211202_021113_237.etl
data
#
C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\MpCmdRun.log
Little-endian UTF-16 Unicode text, with CRLF, CR line terminators
#
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
ASCII text, with no line terminators
#
C:\ProgramData\Microsoft\Windows\WER\Temp\WERFFDF.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
#
C:\ProgramData\Microsoft\Windows\WER\Temp\WERFBB7.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
#
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF93D.tmp.txt
data
#
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF8C8.tmp.dmp
Mini DuMP crash report, 15 streams, Thu Dec 2 02:13:05 2021, 0x1205a4 type
#
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF332.tmp.csv
data
#
C:\ProgramData\Microsoft\Network\Downloader\edb.chk
data
#
C:\ProgramData\Microsoft\Windows\WER\Temp\WER32A6.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
#
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2F05.tmp.txt
data
#
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2B5B.tmp.csv
data
#
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1E23.tmp.dmp
Mini DuMP crash report, 15 streams, Thu Dec 2 02:13:15 2021, 0x1205a4 type
#
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_loaddll32.exe_c88ef9c8adc7184426523373a8db842e0fd5b2a_d70d8aa6_1bb754a4\Report.wer
Little-endian UTF-16 Unicode text, with CRLF line terminators
#
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_loaddll32.exe_8f98a6f9895b5a351f9a3e818d899c7f87e7c39c_d70d8aa6_123f08d6\Report.wer
Little-endian UTF-16 Unicode text, with CRLF line terminators
#
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
#
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0x16be3dae, page size 16384, Windows version 10.0
#
C:\ProgramData\Microsoft\Network\Downloader\edb.log
MPEG-4 LOAS
#