Windows Analysis Report SecuriteInfo.com.Variant.Graftor.981531.21000.9246
Overview
General Information
Sample Name: | SecuriteInfo.com.Variant.Graftor.981531.21000.9246 (renamed file extension from 9246 to dll) |
Analysis ID: | 455752 |
MD5: | f3895703410910aa0ef2f7da6a12dd49 |
SHA1: | 18a05909877ba997e3acda5426d5a28a4159c089 |
SHA256: | 688bc9341860e2f04f307f162f71a628896bc6ca9fa200be54eee05a4b69cb72 |
Tags: | dll |
Infos: | |
Most interesting Screenshot: |
Detection
Score: | 76 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
Process Tree |
---|
|
Malware Configuration |
---|
Threatname: Dridex |
---|
{"Version": 22201, "C2 list": ["46.55.222.10:443", "104.248.178.90:4664", "173.212.243.155:7002"], "RC4 keys": ["TlzeoaANiJLtcEAzNS7uZ3KSSRK6oFpIoDHQ62eZwk", "DSZImon5Amvp18afhhpJ5slHb4KiGr7qCFcVbrMfqMAezKKzyK5CJx2kyEDS4LKI"]}
Yara Overview |
---|
Memory Dumps |
---|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Dridex_1 | Yara detected Dridex unpacked file | Joe Security | ||
JoeSecurity_Dridex_1 | Yara detected Dridex unpacked file | Joe Security | ||
JoeSecurity_Dridex_1 | Yara detected Dridex unpacked file | Joe Security |
Unpacked PEs |
---|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Dridex_1 | Yara detected Dridex unpacked file | Joe Security | ||
JoeSecurity_Dridex_1 | Yara detected Dridex unpacked file | Joe Security | ||
JoeSecurity_Dridex_1 | Yara detected Dridex unpacked file | Joe Security |
Sigma Overview |
---|
No Sigma rule has matched |
---|
Jbx Signature Overview |
---|
Click to jump to signature section
AV Detection: |
---|
Found malware configuration | Show sources |
Source: | Malware Configuration Extractor: |
Multi AV Scanner detection for submitted file | Show sources |
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: |
Machine Learning detection for sample | Show sources |
Source: | Joe Sandbox ML: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Networking: |
---|
C2 URLs / IPs found in malware configuration | Show sources |
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: |
Source: | IP Address: | ||
Source: | IP Address: |
Source: | ASN Name: | ||
Source: | ASN Name: |
Source: | String found in binary or memory: |
Source: | Binary or memory string: |
E-Banking Fraud: |
---|
Yara detected Dridex unpacked file | Show sources |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
System Summary: |
---|
Found PHP interpreter | Show sources |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Code function: | 3_2_6E2E9348 | |
Source: | Code function: | 3_2_6E2E0754 | |
Source: | Code function: | 3_2_6E2D846C | |
Source: | Code function: | 3_2_6E2E1460 | |
Source: | Code function: | 3_2_6E2D1494 | |
Source: | Code function: | 3_2_6E2DA52C | |
Source: | Code function: | 3_2_6E2E1D58 |
Source: | Process created: |
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Classification label: |
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | Key opened: | Jump to behavior |
Source: | File read: | Jump to behavior | ||
Source: | File read: | Jump to behavior |
Source: | Process created: |
Source: | Virustotal: | ||
Source: | ReversingLabs: |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Code function: | 3_2_6E2DF6CD |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process queried: | Jump to behavior |
Source: | Code function: | 3_2_6E2D6D50 |
Source: | Process created: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Code function: | 3_2_6E2D6D50 |
Source: | Code function: | 3_2_6E2D6D50 |
Mitre Att&ck Matrix |
---|
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Network Effects | Remote Service Effects | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Valid Accounts | Scripting1 | Path Interception | Process Injection12 | Virtualization/Sandbox Evasion1 | Input Capture1 | Security Software Discovery21 | Remote Services | Input Capture1 | Exfiltration Over Other Network Medium | Encrypted Channel1 | Eavesdrop on Insecure Network Communication | Remotely Track Device Without Authorization | Modify System Partition |
Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | Process Injection12 | LSASS Memory | Virtualization/Sandbox Evasion1 | Remote Desktop Protocol | Archive Collected Data1 | Exfiltration Over Bluetooth | Application Layer Protocol1 | Exploit SS7 to Redirect Phone Calls/SMS | Remotely Wipe Data Without Authorization | Device Lockout |
Domain Accounts | At (Linux) | Logon Script (Windows) | Logon Script (Windows) | Scripting1 | Security Account Manager | Process Discovery1 | SMB/Windows Admin Shares | Data from Network Shared Drive | Automated Exfiltration | Steganography | Exploit SS7 to Track Device Location | Obtain Device Cloud Backups | Delete Device Data |
Local Accounts | At (Windows) | Logon Script (Mac) | Logon Script (Mac) | Obfuscated Files or Information1 | NTDS | Account Discovery1 | Distributed Component Object Model | Input Capture | Scheduled Transfer | Protocol Impersonation | SIM Card Swap | Carrier Billing Fraud | |
Cloud Accounts | Cron | Network Logon Script | Network Logon Script | Rundll321 | LSA Secrets | System Owner/User Discovery1 | SSH | Keylogging | Data Transfer Size Limits | Fallback Channels | Manipulate Device Communication | Manipulate App Store Rankings or Ratings | |
Replication Through Removable Media | Launchd | Rc.common | Rc.common | Steganography | Cached Domain Credentials | Remote System Discovery1 | VNC | GUI Input Capture | Exfiltration Over C2 Channel | Multiband Communication | Jamming or Denial of Service | Abuse Accessibility Features | |
External Remote Services | Scheduled Task | Startup Items | Startup Items | Compile After Delivery | DCSync | System Information Discovery11 | Windows Remote Management | Web Portal Capture | Exfiltration Over Alternative Protocol | Commonly Used Port | Rogue Wi-Fi Access Points | Data Encrypted for Impact |
Behavior Graph |
---|
Screenshots |
---|
Thumbnails
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Antivirus, Machine Learning and Genetic Malware Detection |
---|
Initial Sample |
---|
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
33% | Virustotal | Browse | ||
24% | ReversingLabs | Win32.Trojan.Graftor | ||
100% | Joe Sandbox ML |
Dropped Files |
---|
No Antivirus matches |
---|
Unpacked PE Files |
---|
Source | Detection | Scanner | Label | Link | Download |
---|---|---|---|---|---|
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File |
Domains |
---|
No Antivirus matches |
---|
URLs |
---|
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | URL Reputation | safe |
Domains and IPs |
---|
Contacted Domains |
---|
No contacted domains info |
---|
URLs from Memory and Binaries |
---|
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false |
| unknown |
Contacted IPs |
---|
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
Public |
---|
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
104.248.178.90 | unknown | United States | 14061 | DIGITALOCEAN-ASNUS | true | |
173.212.243.155 | unknown | Germany | 51167 | CONTABODE | true | |
46.55.222.10 | unknown | Bulgaria | 34841 | BALCHIKNETBG | true |
General Information |
---|
Joe Sandbox Version: | 33.0.0 White Diamond |
Analysis ID: | 455752 |
Start date: | 28.07.2021 |
Start time: | 21:01:57 |
Joe Sandbox Product: | CloudBasic |
Overall analysis duration: | 0h 6m 48s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Sample file name: | SecuriteInfo.com.Variant.Graftor.981531.21000.9246 (renamed file extension from 9246 to dll) |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211 |
Number of analysed new started processes analysed: | 24 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Detection: | MAL |
Classification: | mal76.troj.winDLL@6/4@0/3 |
EGA Information: | Failed |
HDC Information: |
|
HCA Information: | Failed |
Cookbook Comments: |
|
Warnings: | Show All
|
Simulations |
---|
Behavior and APIs |
---|
Time | Type | Description |
---|---|---|
21:03:32 | API Interceptor |
Joe Sandbox View / Context |
---|
IPs |
---|
Match | Associated Sample Name / URL | SHA 256 | Detection | Link | Context |
---|---|---|---|---|---|
104.248.178.90 | Get hash | malicious | Browse | ||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
173.212.243.155 | Get hash | malicious | Browse | ||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse |
Domains |
---|
No context |
---|
ASN |
---|
Match | Associated Sample Name / URL | SHA 256 | Detection | Link | Context |
---|---|---|---|---|---|
CONTABODE | Get hash | malicious | Browse |
| |
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
DIGITALOCEAN-ASNUS | Get hash | malicious | Browse |
| |
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
|
JA3 Fingerprints |
---|
No context |
---|
Dropped Files |
---|
No context |
---|
Created / dropped Files |
---|
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 11884 |
Entropy (8bit): | 3.7665246733459377 |
Encrypted: | false |
SSDEEP: | 192:UaW9izm0oX36HQ0Ztjed+c3/u7s4S274ItWcg:EizAXiQ0Ztjep/u7s4X4ItWcg |
MD5: | 2FF40BB3404552C321C19DFC1CD4BF82 |
SHA1: | 868505C4D89FBEC9B63D34D8FF34A079FC5639C9 |
SHA-256: | 9DDEB5A04723691DCEA4E082483162810B1AC072EE8D22FEAFFDE1EB238B625A |
SHA-512: | 582F9A2992633978CECBEEED300C039C3352FF932ADFE3CEE59350AA420B6C9B602AEFBE8A28DBFF4C514E6287537BE9E0DC63778BA56DBBF57CC1F02A80D3B9 |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 38796 |
Entropy (8bit): | 2.3615127873150676 |
Encrypted: | false |
SSDEEP: | 192:Zlk91YKHFUOlx8+KZEMDC7Zk9+1FNZL3xHIthiq5C1oj5snTet:/Q1LbG/eVcWZLMhiq5CatsTet |
MD5: | 935344E601A58A560FDF0AB709F4110C |
SHA1: | 2AC42B0747FC9EAF42562CE69690C5C6ABB094F8 |
SHA-256: | 87ADEB4B5D929486705D9E6DBF4C35AFC6050745AB3BEA331E8145199BD2E4FD |
SHA-512: | 56B09A70255B776FF95E0D740E7EC639F982597364E69971D4EE5B0D8E847B43B3F81A84AD0AA38DD06D2825037A9989CE3E4F1859811629C4A6E5AC5733953D |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 8340 |
Entropy (8bit): | 3.6910757978882964 |
Encrypted: | false |
SSDEEP: | 192:Rrl7r3GLNi3Y6Pm827t6YFr6k8gmfTFLSHCprRD89bfdsfuW71m:RrlsNiI6+827t6YZ6k8gmfTRSMUfWfm |
MD5: | 4DAABFA0B38CEB7086EFE325E44486A4 |
SHA1: | D8881B7BBAF1780189032E723D7BB85FD7730216 |
SHA-256: | EB12A4C76222839831187055C00C9D5C7AB0F413492B9299DB9763708FD3FE33 |
SHA-512: | A2F68A914744B4A83BC7B83072C95A66AE32110999FB1810A48875C9BF9A9BDC2F927A284A74360AF5D8C583997D98A1A1DFD654906B43C241FC157A5A7AC777 |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4700 |
Entropy (8bit): | 4.485795788425257 |
Encrypted: | false |
SSDEEP: | 48:cvIwSD8zsJJgtWI9HJjRWSC8B28fm8M4JCds1usFHz+q8/2BRK4SrSUd:uITfb0JjASNZJrNzRCDWUd |
MD5: | C1C7F3304DEA7748BE849179CE3D45FC |
SHA1: | 4F1992FD613BB333B9A78AEB277E75EC9ADF9854 |
SHA-256: | 0D2FF16532F15E795FB84A1B8099EC45510DB3E83AEC41DB08B0418B0C79AEF0 |
SHA-512: | 3368CC82D5651EC15E3320D223460CBDF660AC6AAEC8E44534E3024D437DABE9083A7F828528E703232E7F2A3671E98E9B5806165E4E9542281F653D593F41E8 |
Malicious: | false |
Reputation: | low |
Preview: |
|
Static File Info |
---|
General | |
---|---|
File type: | |
Entropy (8bit): | 7.333069151649206 |
TrID: |
|
File name: | SecuriteInfo.com.Variant.Graftor.981531.21000.dll |
File size: | 179712 |
MD5: | f3895703410910aa0ef2f7da6a12dd49 |
SHA1: | 18a05909877ba997e3acda5426d5a28a4159c089 |
SHA256: | 688bc9341860e2f04f307f162f71a628896bc6ca9fa200be54eee05a4b69cb72 |
SHA512: | 9e7fb076d894f8ab933ad00b2d1e4dfc9d92e2608ec1efe41d08346be287991a6cdc3528eb93935bf07c2525af1008e5e4199e976fbb1f25906ef563e88f2c2b |
SSDEEP: | 3072:cC1Oe6ths2hyT0DzJfN3ZKU3YkmN5Sw4Q2kUl59Pn9ObAAW0f3:cC1Oem/DzJhok45X4HPYb |
File Content Preview: | MZ......................@...................................t...v,..2M..2M..2M..T.4..M..T.4..M.......M..15...M...)...L..?.!..L.......L....5..M......#M..\...KM..O4".hL..];T.]M...: ..M....7..L...)...L..).c..M..,.z..M.......M..T.7..M..2M..lL.......M..Rich2M. |
File Icon |
---|
Icon Hash: | 74f0e4ecccdce0e4 |
Static PE Info |
---|
General | |
---|---|
Entrypoint: | 0x10006770 |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x10000000 |
Subsystem: | windows gui |
Image File Characteristics: | 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT |
Time Stamp: | 0x610E3E1A [Sat Aug 7 08:02:34 2021 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 5 |
OS Version Minor: | 0 |
File Version Major: | 5 |
File Version Minor: | 0 |
Subsystem Version Major: | 5 |
Subsystem Version Minor: | 0 |
Import Hash: | 9451e8b8b1259e622801dd0cdc59802c |
Entrypoint Preview |
---|
Instruction |
---|
call 00007F02649F2860h |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
push ebp |
mov ebp, esp |
push edi |
push esi |
and esp, FFFFFFF8h |
sub esp, 000000D8h |
lea eax, dword ptr [esp+00000090h] |
mov word ptr [esp+000000CEh], 8357h |
mov dword ptr [esp+000000B8h], 003B1B4Dh |
mov byte ptr [esp+0000008Dh], 0000006Bh |
mov cl, byte ptr [esp+0000008Dh] |
mov dword ptr [esp], eax |
mov byte ptr [esp+1Bh], cl |
call 00007F02649F57D0h |
mov cl, E8h |
mov dl, byte ptr [esp+1Bh] |
cmp cl, dl |
mov dword ptr [esp+14h], eax |
jnc 00007F02649F73E9h |
jmp 00007F02649F73CFh |
mov eax, dword ptr [esp+44h] |
mov dword ptr [esp+000000C4h], 00FFFFFFh |
mov dword ptr [esp+000000C0h], 00D0F135h |
mov dword ptr [esp], eax |
call 00007F02649F4E77h |
lea ecx, dword ptr [esp+24h] |
mov eax, dword ptr [eax+50h] |
mov dword ptr [esp+00000084h], eax |
mov dl, byte ptr [esp+1Bh] |
add dl, dl |
mov byte ptr [esp+000000BFh], dl |
mov eax, dword ptr [esp+000000B8h] |
add eax, 8BC4E4B4h |
mov dword ptr [esp], ecx |
mov dword ptr [esp+10h], eax |
call 00007F02649F1C84h |
mov eax, dword ptr [esp+10h] |
mov dword ptr [esp+00h], eax |
Data Directories |
---|
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x257e0 | 0x61 | .rdata |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x258b0 | 0x78 | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x2e000 | 0x518 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x2f000 | 0xa68 | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x7032 | 0x38 | .rdata |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x7000 | 0x30 | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Sections |
---|
Name | Virtual Address | Virtual Size | Raw Size | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x5f0d | 0x5e00 | False | 0.37109375 | data | 4.24903636585 | IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ |
.rdata | 0x7000 | 0x1ea10 | 0x1ec00 | False | 0.820098132622 | data | 7.74467634199 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0x26000 | 0x7854 | 0x5e00 | False | 0.510098071809 | data | 6.67697384904 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ |
.rsrc | 0x2e000 | 0xb79 | 0x600 | False | 0.401041666667 | data | 3.05840578194 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x2f000 | 0xb5d | 0xc00 | False | 0.5302734375 | data | 5.64204264895 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Resources |
---|
Name | RVA | Size | Type | Language | Country |
---|---|---|---|---|---|
RT_VERSION | 0x2e060 | 0x4b4 | data | English | United States |
Imports |
---|
DLL | Import |
---|---|
OLEAUT32.dll | VarI2FromCy |
USER32.dll | TranslateMessage |
msvcrt.dll | memset |
KERNEL32.dll | OutputDebugStringA, GetModuleFileNameA, GetModuleHandleW |
ADVAPI32.dll | RegOverridePredefKey |
Version Infos |
---|
Description | Data |
---|---|
LegalCopyright | Copyright 1997-2018 The PHP Group |
InternalName | SIR8_12L tthewtfeb |
FileVersion | 7.6.8 |
CompanyName | The PHP Group |
URL | http://www.php.net |
LegalTrademarks | PHP |
Comments | Thanks to Stig Bakken, Thies C. Arntzen, Andy Sautins, David Benson, Maxim Maletsky, Harald Radi, Antony Dovgal, Andi Gutmans, Wez Furlong, Christopher Jones, Oracle Corporation |
ProductName | SIR |
ProductVersion | 7.6.8 |
FileDescription | OCI8 |
OriginalFilename | sir_ehh8_12h.dll |
Translation | 0x0409 0x04b0 |
Possible Origin |
---|
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Network Behavior |
---|
Network Port Distribution |
---|
UDP Packets |
---|
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jul 28, 2021 21:02:40.429536104 CEST | 64267 | 53 | 192.168.2.6 | 8.8.8.8 |
Jul 28, 2021 21:02:40.450295925 CEST | 53 | 64267 | 8.8.8.8 | 192.168.2.6 |
Jul 28, 2021 21:02:41.562653065 CEST | 49448 | 53 | 192.168.2.6 | 8.8.8.8 |
Jul 28, 2021 21:02:41.588987112 CEST | 53 | 49448 | 8.8.8.8 | 192.168.2.6 |
Jul 28, 2021 21:02:42.005836964 CEST | 60342 | 53 | 192.168.2.6 | 8.8.8.8 |
Jul 28, 2021 21:02:42.028490067 CEST | 53 | 60342 | 8.8.8.8 | 192.168.2.6 |
Jul 28, 2021 21:02:42.871262074 CEST | 61346 | 53 | 192.168.2.6 | 8.8.8.8 |
Jul 28, 2021 21:02:42.892626047 CEST | 53 | 61346 | 8.8.8.8 | 192.168.2.6 |
Jul 28, 2021 21:02:44.022634983 CEST | 51774 | 53 | 192.168.2.6 | 8.8.8.8 |
Jul 28, 2021 21:02:44.043879986 CEST | 53 | 51774 | 8.8.8.8 | 192.168.2.6 |
Jul 28, 2021 21:02:45.385360003 CEST | 56023 | 53 | 192.168.2.6 | 8.8.8.8 |
Jul 28, 2021 21:02:45.409840107 CEST | 53 | 56023 | 8.8.8.8 | 192.168.2.6 |
Jul 28, 2021 21:02:46.343559027 CEST | 58384 | 53 | 192.168.2.6 | 8.8.8.8 |
Jul 28, 2021 21:02:46.364135027 CEST | 53 | 58384 | 8.8.8.8 | 192.168.2.6 |
Jul 28, 2021 21:02:47.750207901 CEST | 60261 | 53 | 192.168.2.6 | 8.8.8.8 |
Jul 28, 2021 21:02:47.771768093 CEST | 53 | 60261 | 8.8.8.8 | 192.168.2.6 |
Jul 28, 2021 21:02:51.131330967 CEST | 56061 | 53 | 192.168.2.6 | 8.8.8.8 |
Jul 28, 2021 21:02:51.154548883 CEST | 53 | 56061 | 8.8.8.8 | 192.168.2.6 |
Jul 28, 2021 21:02:52.327632904 CEST | 58336 | 53 | 192.168.2.6 | 8.8.8.8 |
Jul 28, 2021 21:02:52.350408077 CEST | 53 | 58336 | 8.8.8.8 | 192.168.2.6 |
Jul 28, 2021 21:02:53.563396931 CEST | 53781 | 53 | 192.168.2.6 | 8.8.8.8 |
Jul 28, 2021 21:02:53.585982084 CEST | 53 | 53781 | 8.8.8.8 | 192.168.2.6 |
Jul 28, 2021 21:02:54.765511036 CEST | 54064 | 53 | 192.168.2.6 | 8.8.8.8 |
Jul 28, 2021 21:02:54.786180973 CEST | 53 | 54064 | 8.8.8.8 | 192.168.2.6 |
Jul 28, 2021 21:02:55.894237995 CEST | 52811 | 53 | 192.168.2.6 | 8.8.8.8 |
Jul 28, 2021 21:02:55.916250944 CEST | 53 | 52811 | 8.8.8.8 | 192.168.2.6 |
Jul 28, 2021 21:02:56.954866886 CEST | 55299 | 53 | 192.168.2.6 | 8.8.8.8 |
Jul 28, 2021 21:02:56.975554943 CEST | 53 | 55299 | 8.8.8.8 | 192.168.2.6 |
Jul 28, 2021 21:02:58.964678049 CEST | 63745 | 53 | 192.168.2.6 | 8.8.8.8 |
Jul 28, 2021 21:02:58.986041069 CEST | 53 | 63745 | 8.8.8.8 | 192.168.2.6 |
Jul 28, 2021 21:03:00.233464956 CEST | 50055 | 53 | 192.168.2.6 | 8.8.8.8 |
Jul 28, 2021 21:03:00.255450964 CEST | 53 | 50055 | 8.8.8.8 | 192.168.2.6 |
Jul 28, 2021 21:03:04.465789080 CEST | 61374 | 53 | 192.168.2.6 | 8.8.8.8 |
Jul 28, 2021 21:03:04.486534119 CEST | 53 | 61374 | 8.8.8.8 | 192.168.2.6 |
Jul 28, 2021 21:03:05.520246983 CEST | 50339 | 53 | 192.168.2.6 | 8.8.8.8 |
Jul 28, 2021 21:03:05.541695118 CEST | 53 | 50339 | 8.8.8.8 | 192.168.2.6 |
Jul 28, 2021 21:03:07.119601965 CEST | 63307 | 53 | 192.168.2.6 | 8.8.8.8 |
Jul 28, 2021 21:03:07.140296936 CEST | 53 | 63307 | 8.8.8.8 | 192.168.2.6 |
Jul 28, 2021 21:03:16.003654957 CEST | 49694 | 53 | 192.168.2.6 | 8.8.8.8 |
Jul 28, 2021 21:03:16.025439978 CEST | 53 | 49694 | 8.8.8.8 | 192.168.2.6 |
Jul 28, 2021 21:03:31.756306887 CEST | 54982 | 53 | 192.168.2.6 | 8.8.8.8 |
Jul 28, 2021 21:03:31.787667990 CEST | 53 | 54982 | 8.8.8.8 | 192.168.2.6 |
Jul 28, 2021 21:03:33.473274946 CEST | 50010 | 53 | 192.168.2.6 | 8.8.8.8 |
Jul 28, 2021 21:03:33.497868061 CEST | 53 | 50010 | 8.8.8.8 | 192.168.2.6 |
Jul 28, 2021 21:03:45.321088076 CEST | 63718 | 53 | 192.168.2.6 | 8.8.8.8 |
Jul 28, 2021 21:03:45.415860891 CEST | 53 | 63718 | 8.8.8.8 | 192.168.2.6 |
Jul 28, 2021 21:03:45.454898119 CEST | 62116 | 53 | 192.168.2.6 | 8.8.8.8 |
Jul 28, 2021 21:03:45.492161036 CEST | 53 | 62116 | 8.8.8.8 | 192.168.2.6 |
Jul 28, 2021 21:03:45.941066027 CEST | 63816 | 53 | 192.168.2.6 | 8.8.8.8 |
Jul 28, 2021 21:03:46.048563004 CEST | 53 | 63816 | 8.8.8.8 | 192.168.2.6 |
Jul 28, 2021 21:03:47.362243891 CEST | 55014 | 53 | 192.168.2.6 | 8.8.8.8 |
Jul 28, 2021 21:03:47.382900953 CEST | 53 | 55014 | 8.8.8.8 | 192.168.2.6 |
Jul 28, 2021 21:03:47.950758934 CEST | 62208 | 53 | 192.168.2.6 | 8.8.8.8 |
Jul 28, 2021 21:03:48.129303932 CEST | 53 | 62208 | 8.8.8.8 | 192.168.2.6 |
Jul 28, 2021 21:03:48.890731096 CEST | 57574 | 53 | 192.168.2.6 | 8.8.8.8 |
Jul 28, 2021 21:03:48.912436962 CEST | 53 | 57574 | 8.8.8.8 | 192.168.2.6 |
Jul 28, 2021 21:03:49.429601908 CEST | 51818 | 53 | 192.168.2.6 | 8.8.8.8 |
Jul 28, 2021 21:03:49.450651884 CEST | 53 | 51818 | 8.8.8.8 | 192.168.2.6 |
Jul 28, 2021 21:03:51.175411940 CEST | 56628 | 53 | 192.168.2.6 | 8.8.8.8 |
Jul 28, 2021 21:03:51.299721956 CEST | 53 | 56628 | 8.8.8.8 | 192.168.2.6 |
Jul 28, 2021 21:03:51.969790936 CEST | 60778 | 53 | 192.168.2.6 | 8.8.8.8 |
Jul 28, 2021 21:03:51.990619898 CEST | 53 | 60778 | 8.8.8.8 | 192.168.2.6 |
Jul 28, 2021 21:03:52.665848970 CEST | 53799 | 53 | 192.168.2.6 | 8.8.8.8 |
Jul 28, 2021 21:03:52.691879988 CEST | 53 | 53799 | 8.8.8.8 | 192.168.2.6 |
Jul 28, 2021 21:03:53.311211109 CEST | 54683 | 53 | 192.168.2.6 | 8.8.8.8 |
Jul 28, 2021 21:03:53.332066059 CEST | 53 | 54683 | 8.8.8.8 | 192.168.2.6 |
Jul 28, 2021 21:03:54.193006039 CEST | 59329 | 53 | 192.168.2.6 | 8.8.8.8 |
Jul 28, 2021 21:03:54.214898109 CEST | 53 | 59329 | 8.8.8.8 | 192.168.2.6 |
Jul 28, 2021 21:04:20.343085051 CEST | 64021 | 53 | 192.168.2.6 | 8.8.8.8 |
Jul 28, 2021 21:04:20.369200945 CEST | 53 | 64021 | 8.8.8.8 | 192.168.2.6 |
Jul 28, 2021 21:04:24.975008965 CEST | 56129 | 53 | 192.168.2.6 | 8.8.8.8 |
Jul 28, 2021 21:04:25.016398907 CEST | 53 | 56129 | 8.8.8.8 | 192.168.2.6 |
Jul 28, 2021 21:04:26.493860960 CEST | 58177 | 53 | 192.168.2.6 | 8.8.8.8 |
Jul 28, 2021 21:04:26.529123068 CEST | 53 | 58177 | 8.8.8.8 | 192.168.2.6 |
Code Manipulations |
---|
Statistics |
---|
CPU Usage |
---|
Click to jump to process
Memory Usage |
---|
Click to jump to process
High Level Behavior Distribution |
---|
back
Click to dive into process behavior distribution
Behavior |
---|
Click to jump to process
System Behavior |
---|
General |
---|
Start time: | 21:02:45 |
Start date: | 28/07/2021 |
Path: | C:\Windows\System32\loaddll32.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xf50000 |
File size: | 116736 bytes |
MD5 hash: | 542795ADF7CC08EFCF675D65310596E8 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
General |
---|
Start time: | 21:02:46 |
Start date: | 28/07/2021 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x2a0000 |
File size: | 232960 bytes |
MD5 hash: | F3BDBE3BB6F734E357235F4D5898582D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
General |
---|
Start time: | 21:02:46 |
Start date: | 28/07/2021 |
Path: | C:\Windows\SysWOW64\rundll32.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x50000 |
File size: | 61952 bytes |
MD5 hash: | D7CA562B0DB4F4DD0F03A89A1FDAD63D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | high |
General |
---|
Start time: | 21:03:17 |
Start date: | 28/07/2021 |
Path: | C:\Windows\SysWOW64\WerFault.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xbb0000 |
File size: | 434592 bytes |
MD5 hash: | 9E2B8ACAD48ECCA55C0230D63623661B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Disassembly |
---|
Code Analysis |
---|
Executed Functions |
---|
Non-executed Functions |
---|
Function 6E5648FD, Relevance: 5.0, Strings: 4, Instructions: 49COMMON
C-Code - Quality: 98% |
|
Strings |
Memory Dump Source |
|
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Executed Functions |
---|
Function 02841F54, Relevance: 5.4, APIs: 2, Strings: 1, Instructions: 185memoryCOMMON
C-Code - Quality: 42% |
|
APIs |
Strings |
|
Memory Dump Source |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 028420B4, Relevance: 3.6, APIs: 1, Strings: 1, Instructions: 109memoryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 6E2E3600, Relevance: 1.5, APIs: 1, Instructions: 43memoryCOMMON
C-Code - Quality: 29% |
|
APIs |
|
Memory Dump Source |
|
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Non-executed Functions |
---|
C-Code - Quality: 78% |
|
Strings |
|
Memory Dump Source |
|
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
C-Code - Quality: 31% |
|
Strings |
|
Memory Dump Source |
|
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
C-Code - Quality: 84% |
|
Strings |
|
Memory Dump Source |
|
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
C-Code - Quality: 93% |
|
Strings |
|
Memory Dump Source |
|
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
C-Code - Quality: 100% |
|
Strings |
|
Memory Dump Source |
|
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 6E2E1460, Relevance: .6, Instructions: 572COMMONCrypto
C-Code - Quality: 90% |
|
Memory Dump Source |
|
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 6E2E1D58, Relevance: .3, Instructions: 282COMMONCrypto
C-Code - Quality: 89% |
|
Memory Dump Source |
|
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 6E2D6D50, Relevance: .0, Instructions: 36COMMON
C-Code - Quality: 100% |
|
Memory Dump Source |
|
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |