1D2000
|
unkown
|
page readonly
|
 |
|
|
Name: |
00000001.00000000.1269492282.00000000001D2000.00000002.00000001.01000000.00000003.sdmp
|
TargetID: |
1
|
Dumpstage: |
process new
|
Regiontype: |
unkown
|
Protect: |
page readonly
|
Base address: |
1D2000
|
Size: |
53248
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Yara detected Njrat |
AV Detection, E-Banking Fraud, Stealing of Sensitive Information, Remote Access Functionality |
|
Yara signature match |
System Summary |
|
|
576000
|
stack
|
page read and write
|
|
|
|
Name: |
00000001.00000002.3737337554.0000000000576000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
576000
|
Size: |
8192
|
|
5E0000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000002.3737397514.00000000005E0000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
5E0000
|
Size: |
16384
|
|
B22000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000001.00000002.3738113386.0000000000B22000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
B22000
|
Size: |
4096
|
|
49F0000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000002.3739399219.00000000049F0000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
49F0000
|
Size: |
4096
|
|
B50000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000002.3738177761.0000000000B50000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
B50000
|
Size: |
12288
|
|
63F000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000002.3737489797.000000000063F000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
63F000
|
Size: |
360448
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
May try to detect the virtual machine to hinder analysis (VM artifact strings found in memory) |
Malware Analysis System Evasion |
Security Software Discovery
|
|
B0A000
|
trusted library allocation
|
page execute and read and write
|
|
|
|
Name: |
00000001.00000002.3738046505.0000000000B0A000.00000040.00000800.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page execute and read and write
|
Base address: |
B0A000
|
Size: |
4096
|
|
AFA000
|
trusted library allocation
|
page execute and read and write
|
|
|
|
Name: |
00000001.00000002.3737966608.0000000000AFA000.00000040.00000800.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page execute and read and write
|
Base address: |
AFA000
|
Size: |
4096
|
|
980000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000002.3737711273.0000000000980000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
980000
|
Size: |
4096
|
|
AD8000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000001.00000002.3737770723.0000000000AD8000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
AD8000
|
Size: |
4096
|
|
4BB0000
|
unclassified section
|
page read and write
|
|
|
|
Name: |
00000001.00000002.3739524487.0000000004BB0000.00000004.10000000.00040000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
unclassified section
|
Protect: |
page read and write
|
Base address: |
4BB0000
|
Size: |
4096
|
|
4B48000
|
stack
|
page read and write
|
|
|
|
Name: |
00000001.00000002.3739499255.0000000004B48000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
4B48000
|
Size: |
32768
|
|
600000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000002.3737489797.0000000000600000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
600000
|
Size: |
24576
|
|
3811000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000001.00000002.3739189886.0000000003811000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
3811000
|
Size: |
24576
|
|
B12000
|
trusted library allocation
|
page execute and read and write
|
|
|
|
Name: |
00000001.00000002.3738070370.0000000000B12000.00000040.00000800.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page execute and read and write
|
Base address: |
B12000
|
Size: |
4096
|
|
2862000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000001.00000002.3738364787.0000000002862000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
2862000
|
Size: |
24576
|
|
5E5000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000002.3737397514.00000000005E5000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
5E5000
|
Size: |
12288
|
|
AD0000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000001.00000002.3737770723.0000000000AD0000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
AD0000
|
Size: |
8192
|
|
49E0000
|
trusted library allocation
|
page execute and read and write
|
|
|
|
Name: |
00000001.00000002.3739380110.00000000049E0000.00000040.00000800.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page execute and read and write
|
Base address: |
49E0000
|
Size: |
8192
|
|
D1E000
|
stack
|
page read and write
|
|
|
|
Name: |
00000001.00000002.3738325532.0000000000D1E000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
D1E000
|
Size: |
8192
|
|
608000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000002.3737489797.0000000000608000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
608000
|
Size: |
16384
|
|
AFC000
|
trusted library allocation
|
page execute and read and write
|
|
|
|
Name: |
00000001.00000002.3737996473.0000000000AFC000.00000040.00000800.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page execute and read and write
|
Base address: |
AFC000
|
Size: |
4096
|
|
B27000
|
trusted library allocation
|
page execute and read and write
|
|
|
|
Name: |
00000001.00000002.3738136186.0000000000B27000.00000040.00000800.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page execute and read and write
|
Base address: |
B27000
|
Size: |
4096
|
|
2811000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000001.00000002.3738364787.0000000002811000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
2811000
|
Size: |
208896
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) |
Malware Analysis System Evasion |
Security Software Discovery
|
AV process strings found (often used to terminate AV products) |
Lowering of HIPS / PFW / Operating System Security Settings |
Security Software Discovery
|
|
28A9000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000001.00000002.3738364787.00000000028A9000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
28A9000
|
Size: |
172032
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
May try to detect the Windows Explorer process (often used for injection) |
HIPS / PFW / Operating System Protection Evasion |
|
|
47A000
|
stack
|
page read and write
|
|
|
|
Name: |
00000001.00000002.3737235940.000000000047A000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
47A000
|
Size: |
24576
|
|
4818000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000001.00000002.3739215947.0000000004818000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
4818000
|
Size: |
8192
|
|
CD0000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000002.3738306374.0000000000CD0000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
CD0000
|
Size: |
12288
|
|
5F0000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000002.3737460046.00000000005F0000.00000004.00000020.00040000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
5F0000
|
Size: |
4096
|
|
D20000
|
heap
|
page execute and read and write
|
|
|
|
Name: |
00000001.00000002.3738344628.0000000000D20000.00000040.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page execute and read and write
|
Base address: |
D20000
|
Size: |
4096
|
|
60E000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000002.3737489797.000000000060E000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
60E000
|
Size: |
188416
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Sample file is different than original file name gathered from version info |
System Summary |
|
|
CB0000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000001.00000002.3738262709.0000000000CB0000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
CB0000
|
Size: |
65536
|
|
4A8D000
|
stack
|
page read and write
|
|
|
|
Name: |
00000001.00000002.3739417076.0000000004A8D000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
4A8D000
|
Size: |
12288
|
|
2886000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000001.00000002.3738364787.0000000002886000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
2886000
|
Size: |
24576
|
|
1E0000
|
unkown
|
page readonly
|
|
|
|
Name: |
00000001.00000000.1269492282.00000000001E0000.00000002.00000001.01000000.00000003.sdmp
|
TargetID: |
1
|
Dumpstage: |
process new
|
Regiontype: |
unkown
|
Protect: |
page readonly
|
Base address: |
1E0000
|
Size: |
4096
|
|
9A0000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000002.3737740709.00000000009A0000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
9A0000
|
Size: |
12288
|
|
1D0000
|
unkown
|
page readonly
|
|
|
|
Name: |
00000001.00000000.1269457934.00000000001D0000.00000002.00000001.01000000.00000003.sdmp
|
TargetID: |
1
|
Dumpstage: |
process new
|
Regiontype: |
unkown
|
Protect: |
page readonly
|
Base address: |
1D0000
|
Size: |
4096
|
|
AF2000
|
trusted library allocation
|
page execute and read and write
|
|
|
|
Name: |
00000001.00000002.3737934327.0000000000AF2000.00000040.00000800.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page execute and read and write
|
Base address: |
AF2000
|
Size: |
20480
|
|
B07000
|
trusted library allocation
|
page execute and read and write
|
|
|
|
Name: |
00000001.00000002.3738022256.0000000000B07000.00000040.00000800.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page execute and read and write
|
Base address: |
B07000
|
Size: |
4096
|
|
49D0000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000001.00000002.3739346033.00000000049D0000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
49D0000
|
Size: |
65536
|
|
579000
|
stack
|
page read and write
|
|
|
|
Name: |
00000001.00000002.3737337554.0000000000579000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
579000
|
Size: |
28672
|
|
AE2000
|
trusted library allocation
|
page execute and read and write
|
|
|
|
Name: |
00000001.00000002.3737830367.0000000000AE2000.00000040.00000800.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page execute and read and write
|
Base address: |
AE2000
|
Size: |
4096
|
|
B9E000
|
stack
|
page read and write
|
|
|
|
Name: |
00000001.00000002.3738194753.0000000000B9E000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
B9E000
|
Size: |
8192
|
|
4ACC000
|
stack
|
page read and write
|
|
|
|
Name: |
00000001.00000002.3739444913.0000000004ACC000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
4ACC000
|
Size: |
16384
|
|
B2B000
|
trusted library allocation
|
page execute and read and write
|
|
|
|
Name: |
00000001.00000002.3738156696.0000000000B2B000.00000040.00000800.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page execute and read and write
|
Base address: |
B2B000
|
Size: |
4096
|
|
7D0000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000002.3737678798.00000000007D0000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
7D0000
|
Size: |
8192
|
|
AEA000
|
trusted library allocation
|
page execute and read and write
|
|
|
|
Name: |
00000001.00000002.3737861829.0000000000AEA000.00000040.00000800.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page execute and read and write
|
Base address: |
AEA000
|
Size: |
8192
|
|
C9E000
|
stack
|
page read and write
|
|
|
|
Name: |
00000001.00000002.3738248373.0000000000C9E000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
C9E000
|
Size: |
8192
|
|
49AF000
|
stack
|
page read and write
|
|
|
|
Name: |
00000001.00000002.3739299853.00000000049AF000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
49AF000
|
Size: |
4096
|
|
CC0000
|
trusted library allocation
|
page execute and read and write
|
|
|
|
Name: |
00000001.00000002.3738284261.0000000000CC0000.00000040.00000800.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page execute and read and write
|
Base address: |
CC0000
|
Size: |
12288
|
|
28D4000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000001.00000002.3738364787.00000000028D4000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
28D4000
|
Size: |
5222400
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
May try to detect the Windows Explorer process (often used for injection) |
HIPS / PFW / Operating System Protection Evasion |
|
|
B1A000
|
trusted library allocation
|
page execute and read and write
|
|
|
|
Name: |
00000001.00000002.3738091071.0000000000B1A000.00000040.00000800.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page execute and read and write
|
Base address: |
B1A000
|
Size: |
4096
|
|
4B0C000
|
stack
|
page read and write
|
|
|
|
Name: |
00000001.00000002.3739466171.0000000004B0C000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
4B0C000
|
Size: |
16384
|
|
AF0000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000001.00000002.3737896681.0000000000AF0000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
AF0000
|
Size: |
8192
|
|
49B0000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000001.00000002.3739323623.00000000049B0000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
49B0000
|
Size: |
12288
|
|