352000
|
unkown
|
page readonly
|
 |
|
|
Name: |
00000000.00000000.898870038.0000000000352000.00000002.00000001.01000000.00000003.sdmp
|
TargetID: |
0
|
Dumpstage: |
process new
|
Regiontype: |
unkown
|
Protect: |
page readonly
|
Base address: |
352000
|
Size: |
53248
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Yara detected Njrat |
AV Detection, E-Banking Fraud, Stealing of Sensitive Information, Remote Access Functionality |
|
Yara signature match |
System Summary |
|
|
2A7D000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3362364190.0000000002A7D000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
2A7D000
|
Size: |
1257472
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
May try to detect the Windows Explorer process (often used for injection) |
HIPS / PFW / Operating System Protection Evasion |
|
|
360000
|
unkown
|
page readonly
|
|
|
|
Name: |
00000000.00000000.898870038.0000000000360000.00000002.00000001.01000000.00000003.sdmp
|
TargetID: |
0
|
Dumpstage: |
process new
|
Regiontype: |
unkown
|
Protect: |
page readonly
|
Base address: |
360000
|
Size: |
4096
|
|
8F0000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3361415208.00000000008F0000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
8F0000
|
Size: |
24576
|
|
B5A000
|
trusted library allocation
|
page execute and read and write
|
|
|
|
Name: |
00000000.00000002.3361926433.0000000000B5A000.00000040.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page execute and read and write
|
Base address: |
B5A000
|
Size: |
4096
|
|
4C7C000
|
stack
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3363481579.0000000004C7C000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
4C7C000
|
Size: |
16384
|
|
B6A000
|
trusted library allocation
|
page execute and read and write
|
|
|
|
Name: |
00000000.00000002.3362019834.0000000000B6A000.00000040.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page execute and read and write
|
Base address: |
B6A000
|
Size: |
4096
|
|
2BB1000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3362364190.0000000002BB1000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
2BB1000
|
Size: |
3989504
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
May try to detect the Windows Explorer process (often used for injection) |
HIPS / PFW / Operating System Protection Evasion |
|
|
B50000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3361850369.0000000000B50000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
B50000
|
Size: |
8192
|
|
4D30000
|
unclassified section
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3363556295.0000000004D30000.00000004.10000000.00040000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
unclassified section
|
Protect: |
page read and write
|
Base address: |
4D30000
|
Size: |
4096
|
|
3FA000
|
stack
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3361077266.00000000003FA000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
3FA000
|
Size: |
24576
|
|
BC0000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3362195684.0000000000BC0000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
BC0000
|
Size: |
12288
|
|
865000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3361301103.0000000000865000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
865000
|
Size: |
12288
|
|
4BF0000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3363435014.0000000004BF0000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
4BF0000
|
Size: |
4096
|
|
4C3B000
|
stack
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3363459906.0000000004C3B000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
4C3B000
|
Size: |
20480
|
|
860000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3361301103.0000000000860000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
860000
|
Size: |
16384
|
|
4CB9000
|
stack
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3363511403.0000000004CB9000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
4CB9000
|
Size: |
28672
|
|
6F6000
|
stack
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3361195940.00000000006F6000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
6F6000
|
Size: |
40960
|
|
B52000
|
trusted library allocation
|
page execute and read and write
|
|
|
|
Name: |
00000000.00000002.3361890673.0000000000B52000.00000040.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page execute and read and write
|
Base address: |
B52000
|
Size: |
20480
|
|
4D20000
|
trusted library allocation
|
page execute and read and write
|
|
|
|
Name: |
00000000.00000002.3363536566.0000000004D20000.00000040.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page execute and read and write
|
Base address: |
4D20000
|
Size: |
8192
|
|
F60000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3362296773.0000000000F60000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
F60000
|
Size: |
12288
|
|
4B10000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3363313617.0000000004B10000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
4B10000
|
Size: |
65536
|
|
350000
|
unkown
|
page readonly
|
|
|
|
Name: |
00000000.00000000.898851263.0000000000350000.00000002.00000001.01000000.00000003.sdmp
|
TargetID: |
0
|
Dumpstage: |
process new
|
Regiontype: |
unkown
|
Protect: |
page readonly
|
Base address: |
350000
|
Size: |
4096
|
|
2A12000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3362364190.0000000002A12000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
2A12000
|
Size: |
24576
|
|
B8B000
|
trusted library allocation
|
page execute and read and write
|
|
|
|
Name: |
00000000.00000002.3362143641.0000000000B8B000.00000040.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page execute and read and write
|
Base address: |
B8B000
|
Size: |
4096
|
|
49FE000
|
stack
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3363241909.00000000049FE000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
49FE000
|
Size: |
8192
|
|
2A35000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3362364190.0000000002A35000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
2A35000
|
Size: |
24576
|
|
95E000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3361415208.000000000095E000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
95E000
|
Size: |
180224
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
May try to detect the virtual machine to hinder analysis (VM artifact strings found in memory) |
Malware Analysis System Evasion |
Security Software Discovery
|
|
4B20000
|
trusted library allocation
|
page execute and read and write
|
|
|
|
Name: |
00000000.00000002.3363349465.0000000004B20000.00000040.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page execute and read and write
|
Base address: |
4B20000
|
Size: |
12288
|
|
8AE000
|
stack
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3361386924.00000000008AE000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
8AE000
|
Size: |
8192
|
|
D0E000
|
stack
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3362218569.0000000000D0E000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
D0E000
|
Size: |
8192
|
|
B90000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3362166116.0000000000B90000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
B90000
|
Size: |
4096
|
|
B82000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3362102200.0000000000B82000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
B82000
|
Size: |
4096
|
|
4BDD000
|
stack
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3363387688.0000000004BDD000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
4BDD000
|
Size: |
12288
|
|
4B30000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3363365321.0000000004B30000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
4B30000
|
Size: |
12288
|
|
B7A000
|
trusted library allocation
|
page execute and read and write
|
|
|
|
Name: |
00000000.00000002.3362077401.0000000000B7A000.00000040.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page execute and read and write
|
Base address: |
B7A000
|
Size: |
4096
|
|
4BE0000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3363405467.0000000004BE0000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
4BE0000
|
Size: |
65536
|
|
840000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3361264597.0000000000840000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
840000
|
Size: |
4096
|
|
4AFE000
|
stack
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3363290961.0000000004AFE000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
4AFE000
|
Size: |
8192
|
|
8FE000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3361415208.00000000008FE000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
8FE000
|
Size: |
188416
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Sample file is different than original file name gathered from version info |
System Summary |
|
|
B87000
|
trusted library allocation
|
page execute and read and write
|
|
|
|
Name: |
00000000.00000002.3362121362.0000000000B87000.00000040.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page execute and read and write
|
Base address: |
B87000
|
Size: |
4096
|
|
29C1000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3362364190.00000000029C1000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
29C1000
|
Size: |
208896
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) |
Malware Analysis System Evasion |
Security Software Discovery
|
AV process strings found (often used to terminate AV products) |
Lowering of HIPS / PFW / Operating System Security Settings |
Security Software Discovery
|
|
92F000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3361415208.000000000092F000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
92F000
|
Size: |
188416
|
|
DC0000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3362282052.0000000000DC0000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
DC0000
|
Size: |
12288
|
|
D18000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3362242483.0000000000D18000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
D18000
|
Size: |
8192
|
|
B3A000
|
trusted library allocation
|
page execute and read and write
|
|
|
|
Name: |
00000000.00000002.3361782204.0000000000B3A000.00000040.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page execute and read and write
|
Base address: |
B3A000
|
Size: |
8192
|
|
AEE000
|
stack
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3361675694.0000000000AEE000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
AEE000
|
Size: |
8192
|
|
267F000
|
stack
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3362344361.000000000267F000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
267F000
|
Size: |
4096
|
|
8F8000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3361415208.00000000008F8000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
8F8000
|
Size: |
16384
|
|
760000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3361237785.0000000000760000.00000004.00000020.00040000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
760000
|
Size: |
4096
|
|
B5C000
|
trusted library allocation
|
page execute and read and write
|
|
|
|
Name: |
00000000.00000002.3361963138.0000000000B5C000.00000040.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page execute and read and write
|
Base address: |
B5C000
|
Size: |
4096
|
|
B20000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3361704677.0000000000B20000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
B20000
|
Size: |
8192
|
|
B32000
|
trusted library allocation
|
page execute and read and write
|
|
|
|
Name: |
00000000.00000002.3361746304.0000000000B32000.00000040.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page execute and read and write
|
Base address: |
B32000
|
Size: |
4096
|
|
B40000
|
heap
|
page execute and read and write
|
|
|
|
Name: |
00000000.00000002.3361820080.0000000000B40000.00000040.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page execute and read and write
|
Base address: |
B40000
|
Size: |
4096
|
|
B67000
|
trusted library allocation
|
page execute and read and write
|
|
|
|
Name: |
00000000.00000002.3361993545.0000000000B67000.00000040.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page execute and read and write
|
Base address: |
B67000
|
Size: |
4096
|
|
2A59000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3362364190.0000000002A59000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
2A59000
|
Size: |
24576
|
|
39C1000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3363211785.00000000039C1000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
39C1000
|
Size: |
24576
|
|
B72000
|
trusted library allocation
|
page execute and read and write
|
|
|
|
Name: |
00000000.00000002.3362052835.0000000000B72000.00000040.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page execute and read and write
|
Base address: |
B72000
|
Size: |
4096
|
|