Windows Analysis Report SecuriteInfo.com.Variant.Graftor.981531.21000.9246
Overview
General Information
Sample Name: | SecuriteInfo.com.Variant.Graftor.981531.21000.9246 (renamed file extension from 9246 to dll) |
Analysis ID: | 455752 |
MD5: | f3895703410910aa0ef2f7da6a12dd49 |
SHA1: | 18a05909877ba997e3acda5426d5a28a4159c089 |
SHA256: | 688bc9341860e2f04f307f162f71a628896bc6ca9fa200be54eee05a4b69cb72 |
Tags: | dll |
Infos: | |
Most interesting Screenshot: |
Detection
Score: | 76 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
|
{
"Version": 22201,
"C2 list": [
"46.55.222.10:443",
"104.248.178.90:4664",
"173.212.243.155:7002"
],
"RC4 keys": [
"TlzeoaANiJLtcEAzNS7uZ3KSSRK6oFpIoDHQ62eZwk",
"DSZImon5Amvp18afhhpJ5slHb4KiGr7qCFcVbrMfqMAezKKzyK5CJx2kyEDS4LKI"
]
}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Dridex_1 | Yara detected Dridex unpacked file | Joe Security | ||
JoeSecurity_Dridex_1 | Yara detected Dridex unpacked file | Joe Security | ||
JoeSecurity_Dridex_1 | Yara detected Dridex unpacked file | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Dridex_1 | Yara detected Dridex unpacked file | Joe Security | ||
JoeSecurity_Dridex_1 | Yara detected Dridex unpacked file | Joe Security | ||
JoeSecurity_Dridex_1 | Yara detected Dridex unpacked file | Joe Security |
Sigma Overview |
---|
No Sigma rule has matched |
---|
Jbx Signature Overview |
---|
- • AV Detection
- • Compliance
- • Networking
- • Key, Mouse, Clipboard, Microphone and Screen Capturing
- • E-Banking Fraud
- • System Summary
- • Data Obfuscation
- • Hooking and other Techniques for Hiding and Protection
- • Malware Analysis System Evasion
- • Anti Debugging
- • HIPS / PFW / Operating System Protection Evasion
- • Language, Device and Operating System Detection
Click to jump to signature section
AV Detection: |
---|
Found malware configuration |
Source: | Malware Configuration Extractor: |
Multi AV Scanner detection for submitted file |
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: |
Machine Learning detection for sample |
Source: | Joe Sandbox ML: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Networking: |
---|
C2 URLs / IPs found in malware configuration |
Source: | IPs: | ||
Source: | IPs: | ||
Source: | IPs: |
Source: | IP Address: | ||
Source: | IP Address: |
Source: | ASN Name: | ||
Source: | ASN Name: |
Source: | String found in binary or memory: |
Source: | Binary or memory string: |
E-Banking Fraud: |
---|
Yara detected Dridex unpacked file |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
System Summary: |
---|
Found PHP interpreter |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Code function: | 3_2_6E2E9348 | |
Source: | Code function: | 3_2_6E2E0754 | |
Source: | Code function: | 3_2_6E2D846C | |
Source: | Code function: | 3_2_6E2E1460 | |
Source: | Code function: | 3_2_6E2D1494 | |
Source: | Code function: | 3_2_6E2DA52C | |
Source: | Code function: | 3_2_6E2E1D58 |
Source: | Process created: |
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Classification label: |
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | Key opened: | Jump to behavior |
Source: | File read: | Jump to behavior | ||
Source: | File read: | Jump to behavior |
Source: | Process created: |
Source: | Virustotal: | ||
Source: | ReversingLabs: |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Code function: | 3_2_6E2DF6CD |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process queried: | Jump to behavior |
Source: | Code function: | 3_2_6E2D6D50 |
Source: | Process created: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Code function: | 3_2_6E2D6D50 |
Source: | Code function: | 3_2_6E2D6D50 |
Mitre Att&ck Matrix |
---|
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Network Effects | Remote Service Effects | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Valid Accounts | Scripting1 | Path Interception | Process Injection12 | Virtualization/Sandbox Evasion1 | Input Capture1 | Security Software Discovery21 | Remote Services | Input Capture1 | Exfiltration Over Other Network Medium | Encrypted Channel1 | Eavesdrop on Insecure Network Communication | Remotely Track Device Without Authorization | Modify System Partition |
Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | Process Injection12 | LSASS Memory | Virtualization/Sandbox Evasion1 | Remote Desktop Protocol | Archive Collected Data1 | Exfiltration Over Bluetooth | Application Layer Protocol1 | Exploit SS7 to Redirect Phone Calls/SMS | Remotely Wipe Data Without Authorization | Device Lockout |
Domain Accounts | At (Linux) | Logon Script (Windows) | Logon Script (Windows) | Scripting1 | Security Account Manager | Process Discovery1 | SMB/Windows Admin Shares | Data from Network Shared Drive | Automated Exfiltration | Steganography | Exploit SS7 to Track Device Location | Obtain Device Cloud Backups | Delete Device Data |
Local Accounts | At (Windows) | Logon Script (Mac) | Logon Script (Mac) | Obfuscated Files or Information1 | NTDS | Account Discovery1 | Distributed Component Object Model | Input Capture | Scheduled Transfer | Protocol Impersonation | SIM Card Swap | Carrier Billing Fraud | |
Cloud Accounts | Cron | Network Logon Script | Network Logon Script | Rundll321 | LSA Secrets | System Owner/User Discovery1 | SSH | Keylogging | Data Transfer Size Limits | Fallback Channels | Manipulate Device Communication | Manipulate App Store Rankings or Ratings | |
Replication Through Removable Media | Launchd | Rc.common | Rc.common | Steganography | Cached Domain Credentials | Remote System Discovery1 | VNC | GUI Input Capture | Exfiltration Over C2 Channel | Multiband Communication | Jamming or Denial of Service | Abuse Accessibility Features | |
External Remote Services | Scheduled Task | Startup Items | Startup Items | Compile After Delivery | DCSync | System Information Discovery11 | Windows Remote Management | Web Portal Capture | Exfiltration Over Alternative Protocol | Commonly Used Port | Rogue Wi-Fi Access Points | Data Encrypted for Impact |
Thumbnails
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
33% | Virustotal | Browse | ||
24% | ReversingLabs | Win32.Trojan.Graftor | ||
100% | Joe Sandbox ML |
No Antivirus matches |
---|
Source | Detection | Scanner | Label | Link | Download |
---|---|---|---|---|---|
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File |
No Antivirus matches |
---|
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | URL Reputation | safe |
No contacted domains info |
---|
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
104.248.178.90 | unknown | United States | 14061 | DIGITALOCEAN-ASNUS | true | |
173.212.243.155 | unknown | Germany | 51167 | CONTABODE | true | |
46.55.222.10 | unknown | Bulgaria | 34841 | BALCHIKNETBG | true |
General Information |
---|
Joe Sandbox Version: | 33.0.0 White Diamond |
Analysis ID: | 455752 |
Start date: | 28.07.2021 |
Start time: | 21:01:57 |
Joe Sandbox Product: | CloudBasic |
Overall analysis duration: | 0h 6m 48s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Sample file name: | SecuriteInfo.com.Variant.Graftor.981531.21000.9246 (renamed file extension from 9246 to dll) |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211 |
Number of analysed new started processes analysed: | 24 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Detection: | MAL |
Classification: | mal76.troj.winDLL@6/4@0/3 |
EGA Information: | Failed |
HDC Information: |
|
HCA Information: | Failed |
Cookbook Comments: |
|
Warnings: | Show All
|
Time | Type | Description |
---|---|---|
21:03:32 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Link | Context |
---|---|---|---|---|---|
104.248.178.90 | Get hash | malicious | Browse | ||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
173.212.243.155 | Get hash | malicious | Browse | ||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse | |||
Get hash | malicious | Browse |
No context |
---|
Match | Associated Sample Name / URL | SHA 256 | Detection | Link | Context |
---|---|---|---|---|---|
CONTABODE | Get hash | malicious | Browse |
| |
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
DIGITALOCEAN-ASNUS | Get hash | malicious | Browse |
| |
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
|
No context |
---|
No context |
---|
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 11884 |
Entropy (8bit): | 3.7665246733459377 |
Encrypted: | false |
SSDEEP: | 192:UaW9izm0oX36HQ0Ztjed+c3/u7s4S274ItWcg:EizAXiQ0Ztjep/u7s4X4ItWcg |
MD5: | 2FF40BB3404552C321C19DFC1CD4BF82 |
SHA1: | 868505C4D89FBEC9B63D34D8FF34A079FC5639C9 |
SHA-256: | 9DDEB5A04723691DCEA4E082483162810B1AC072EE8D22FEAFFDE1EB238B625A |
SHA-512: | 582F9A2992633978CECBEEED300C039C3352FF932ADFE3CEE59350AA420B6C9B602AEFBE8A28DBFF4C514E6287537BE9E0DC63778BA56DBBF57CC1F02A80D3B9 |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 38796 |
Entropy (8bit): | 2.3615127873150676 |
Encrypted: | false |
SSDEEP: | 192:Zlk91YKHFUOlx8+KZEMDC7Zk9+1FNZL3xHIthiq5C1oj5snTet:/Q1LbG/eVcWZLMhiq5CatsTet |
MD5: | 935344E601A58A560FDF0AB709F4110C |
SHA1: | 2AC42B0747FC9EAF42562CE69690C5C6ABB094F8 |
SHA-256: | 87ADEB4B5D929486705D9E6DBF4C35AFC6050745AB3BEA331E8145199BD2E4FD |
SHA-512: | 56B09A70255B776FF95E0D740E7EC639F982597364E69971D4EE5B0D8E847B43B3F81A84AD0AA38DD06D2825037A9989CE3E4F1859811629C4A6E5AC5733953D |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 8340 |
Entropy (8bit): | 3.6910757978882964 |
Encrypted: | false |
SSDEEP: | 192:Rrl7r3GLNi3Y6Pm827t6YFr6k8gmfTFLSHCprRD89bfdsfuW71m:RrlsNiI6+827t6YZ6k8gmfTRSMUfWfm |
MD5: | 4DAABFA0B38CEB7086EFE325E44486A4 |
SHA1: | D8881B7BBAF1780189032E723D7BB85FD7730216 |
SHA-256: | EB12A4C76222839831187055C00C9D5C7AB0F413492B9299DB9763708FD3FE33 |
SHA-512: | A2F68A914744B4A83BC7B83072C95A66AE32110999FB1810A48875C9BF9A9BDC2F927A284A74360AF5D8C583997D98A1A1DFD654906B43C241FC157A5A7AC777 |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4700 |
Entropy (8bit): | 4.485795788425257 |
Encrypted: | false |
SSDEEP: | 48:cvIwSD8zsJJgtWI9HJjRWSC8B28fm8M4JCds1usFHz+q8/2BRK4SrSUd:uITfb0JjASNZJrNzRCDWUd |
MD5: | C1C7F3304DEA7748BE849179CE3D45FC |
SHA1: | 4F1992FD613BB333B9A78AEB277E75EC9ADF9854 |
SHA-256: | 0D2FF16532F15E795FB84A1B8099EC45510DB3E83AEC41DB08B0418B0C79AEF0 |
SHA-512: | 3368CC82D5651EC15E3320D223460CBDF660AC6AAEC8E44534E3024D437DABE9083A7F828528E703232E7F2A3671E98E9B5806165E4E9542281F653D593F41E8 |
Malicious: | false |
Reputation: | low |
Preview: |
|
Static File Info |
---|
General | |
---|---|
File type: | |
Entropy (8bit): | 7.333069151649206 |
TrID: |
|
File name: | SecuriteInfo.com.Variant.Graftor.981531.21000.dll |
File size: | 179712 |
MD5: | f3895703410910aa0ef2f7da6a12dd49 |
SHA1: | 18a05909877ba997e3acda5426d5a28a4159c089 |
SHA256: | 688bc9341860e2f04f307f162f71a628896bc6ca9fa200be54eee05a4b69cb72 |
SHA512: | 9e7fb076d894f8ab933ad00b2d1e4dfc9d92e2608ec1efe41d08346be287991a6cdc3528eb93935bf07c2525af1008e5e4199e976fbb1f25906ef563e88f2c2b |
SSDEEP: | 3072:cC1Oe6ths2hyT0DzJfN3ZKU3YkmN5Sw4Q2kUl59Pn9ObAAW0f3:cC1Oem/DzJhok45X4HPYb |
File Content Preview: | MZ......................@...................................t...v,..2M..2M..2M..T.4..M..T.4..M.......M..15...M...)...L..?.!..L.......L....5..M......#M..\...KM..O4".hL..];T.]M...: ..M....7..L...)...L..).c..M..,.z..M.......M..T.7..M..2M..lL.......M..Rich2M. |
File Icon |
---|
Icon Hash: | 74f0e4ecccdce0e4 |
General | |
---|---|
Entrypoint: | 0x10006770 |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x10000000 |
Subsystem: | windows gui |
Image File Characteristics: | 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT |
Time Stamp: | 0x610E3E1A [Sat Aug 7 08:02:34 2021 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 5 |
OS Version Minor: | 0 |
File Version Major: | 5 |
File Version Minor: | 0 |
Subsystem Version Major: | 5 |
Subsystem Version Minor: | 0 |
Import Hash: | 9451e8b8b1259e622801dd0cdc59802c |
Instruction |
---|
call 00007F02649F2860h |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
push ebp |
mov ebp, esp |
push edi |
push esi |
and esp, FFFFFFF8h |
sub esp, 000000D8h |
lea eax, dword ptr [esp+00000090h] |
mov word ptr [esp+000000CEh], 8357h |
mov dword ptr [esp+000000B8h], 003B1B4Dh |
mov byte ptr [esp+0000008Dh], 0000006Bh |
mov cl, byte ptr [esp+0000008Dh] |
mov dword ptr [esp], eax |
mov byte ptr [esp+1Bh], cl |
call 00007F02649F57D0h |
mov cl, E8h |
mov dl, byte ptr [esp+1Bh] |
cmp cl, dl |
mov dword ptr [esp+14h], eax |
jnc 00007F02649F73E9h |
jmp 00007F02649F73CFh |
mov eax, dword ptr [esp+44h] |
mov dword ptr [esp+000000C4h], 00FFFFFFh |
mov dword ptr [esp+000000C0h], 00D0F135h |
mov dword ptr [esp], eax |
call 00007F02649F4E77h |
lea ecx, dword ptr [esp+24h] |
mov eax, dword ptr [eax+50h] |
mov dword ptr [esp+00000084h], eax |
mov dl, byte ptr [esp+1Bh] |
add dl, dl |
mov byte ptr [esp+000000BFh], dl |
mov eax, dword ptr [esp+000000B8h] |
add eax, 8BC4E4B4h |
mov dword ptr [esp], ecx |
mov dword ptr [esp+10h], eax |
call 00007F02649F1C84h |
mov eax, dword ptr [esp+10h] |
mov dword ptr [esp+00h], eax |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x257e0 | 0x61 | .rdata |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x258b0 | 0x78 | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x2e000 | 0x518 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x2f000 | 0xa68 | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x7032 | 0x38 | .rdata |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x7000 | 0x30 | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x5f0d | 0x5e00 | False | 0.37109375 | data | 4.24903636585 | IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ |
.rdata | 0x7000 | 0x1ea10 | 0x1ec00 | False | 0.820098132622 | data | 7.74467634199 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0x26000 | 0x7854 | 0x5e00 | False | 0.510098071809 | data | 6.67697384904 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ |
.rsrc | 0x2e000 | 0xb79 | 0x600 | False | 0.401041666667 | data | 3.05840578194 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x2f000 | 0xb5d | 0xc00 | False | 0.5302734375 | data | 5.64204264895 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country |
---|---|---|---|---|---|
RT_VERSION | 0x2e060 | 0x4b4 | data | English | United States |
DLL | Import |
---|---|
OLEAUT32.dll | VarI2FromCy |
USER32.dll | TranslateMessage |
msvcrt.dll | memset |
KERNEL32.dll | OutputDebugStringA, GetModuleFileNameA, GetModuleHandleW |
ADVAPI32.dll | RegOverridePredefKey |
Description | Data |
---|---|
LegalCopyright | Copyright 1997-2018 The PHP Group |
InternalName | SIR8_12L tthewtfeb |
FileVersion | 7.6.8 |
CompanyName | The PHP Group |
URL | http://www.php.net |
LegalTrademarks | PHP |
Comments | Thanks to Stig Bakken, Thies C. Arntzen, Andy Sautins, David Benson, Maxim Maletsky, Harald Radi, Antony Dovgal, Andi Gutmans, Wez Furlong, Christopher Jones, Oracle Corporation |
ProductName | SIR |
ProductVersion | 7.6.8 |
FileDescription | OCI8 |
OriginalFilename | sir_ehh8_12h.dll |
Translation | 0x0409 0x04b0 |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Network Behavior |
---|
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jul 28, 2021 21:02:40.429536104 CEST | 64267 | 53 | 192.168.2.6 | 8.8.8.8 |
Jul 28, 2021 21:02:40.450295925 CEST | 53 | 64267 | 8.8.8.8 | 192.168.2.6 |
Jul 28, 2021 21:02:41.562653065 CEST | 49448 | 53 | 192.168.2.6 | 8.8.8.8 |
Jul 28, 2021 21:02:41.588987112 CEST | 53 | 49448 | 8.8.8.8 | 192.168.2.6 |
Jul 28, 2021 21:02:42.005836964 CEST | 60342 | 53 | 192.168.2.6 | 8.8.8.8 |
Jul 28, 2021 21:02:42.028490067 CEST | 53 | 60342 | 8.8.8.8 | 192.168.2.6 |
Jul 28, 2021 21:02:42.871262074 CEST | 61346 | 53 | 192.168.2.6 | 8.8.8.8 |
Jul 28, 2021 21:02:42.892626047 CEST | 53 | 61346 | 8.8.8.8 | 192.168.2.6 |
Jul 28, 2021 21:02:44.022634983 CEST | 51774 | 53 | 192.168.2.6 | 8.8.8.8 |
Jul 28, 2021 21:02:44.043879986 CEST | 53 | 51774 | 8.8.8.8 | 192.168.2.6 |
Jul 28, 2021 21:02:45.385360003 CEST | 56023 | 53 | 192.168.2.6 | 8.8.8.8 |
Jul 28, 2021 21:02:45.409840107 CEST | 53 | 56023 | 8.8.8.8 | 192.168.2.6 |
Jul 28, 2021 21:02:46.343559027 CEST | 58384 | 53 | 192.168.2.6 | 8.8.8.8 |
Jul 28, 2021 21:02:46.364135027 CEST | 53 | 58384 | 8.8.8.8 | 192.168.2.6 |
Jul 28, 2021 21:02:47.750207901 CEST | 60261 | 53 | 192.168.2.6 | 8.8.8.8 |
Jul 28, 2021 21:02:47.771768093 CEST | 53 | 60261 | 8.8.8.8 | 192.168.2.6 |
Jul 28, 2021 21:02:51.131330967 CEST | 56061 | 53 | 192.168.2.6 | 8.8.8.8 |
Jul 28, 2021 21:02:51.154548883 CEST | 53 | 56061 | 8.8.8.8 | 192.168.2.6 |
Jul 28, 2021 21:02:52.327632904 CEST | 58336 | 53 | 192.168.2.6 | 8.8.8.8 |
Jul 28, 2021 21:02:52.350408077 CEST | 53 | 58336 | 8.8.8.8 | 192.168.2.6 |
Jul 28, 2021 21:02:53.563396931 CEST | 53781 | 53 | 192.168.2.6 | 8.8.8.8 |
Jul 28, 2021 21:02:53.585982084 CEST | 53 | 53781 | 8.8.8.8 | 192.168.2.6 |
Jul 28, 2021 21:02:54.765511036 CEST | 54064 | 53 | 192.168.2.6 | 8.8.8.8 |
Jul 28, 2021 21:02:54.786180973 CEST | 53 | 54064 | 8.8.8.8 | 192.168.2.6 |
Jul 28, 2021 21:02:55.894237995 CEST | 52811 | 53 | 192.168.2.6 | 8.8.8.8 |
Jul 28, 2021 21:02:55.916250944 CEST | 53 | 52811 | 8.8.8.8 | 192.168.2.6 |
Jul 28, 2021 21:02:56.954866886 CEST | 55299 | 53 | 192.168.2.6 | 8.8.8.8 |
Jul 28, 2021 21:02:56.975554943 CEST | 53 | 55299 | 8.8.8.8 | 192.168.2.6 |
Jul 28, 2021 21:02:58.964678049 CEST | 63745 | 53 | 192.168.2.6 | 8.8.8.8 |
Jul 28, 2021 21:02:58.986041069 CEST | 53 | 63745 | 8.8.8.8 | 192.168.2.6 |
Jul 28, 2021 21:03:00.233464956 CEST | 50055 | 53 | 192.168.2.6 | 8.8.8.8 |
Jul 28, 2021 21:03:00.255450964 CEST | 53 | 50055 | 8.8.8.8 | 192.168.2.6 |
Jul 28, 2021 21:03:04.465789080 CEST | 61374 | 53 | 192.168.2.6 | 8.8.8.8 |
Jul 28, 2021 21:03:04.486534119 CEST | 53 | 61374 | 8.8.8.8 | 192.168.2.6 |
Jul 28, 2021 21:03:05.520246983 CEST | 50339 | 53 | 192.168.2.6 | 8.8.8.8 |
Jul 28, 2021 21:03:05.541695118 CEST | 53 | 50339 | 8.8.8.8 | 192.168.2.6 |
Jul 28, 2021 21:03:07.119601965 CEST | 63307 | 53 | 192.168.2.6 | 8.8.8.8 |
Jul 28, 2021 21:03:07.140296936 CEST | 53 | 63307 | 8.8.8.8 | 192.168.2.6 |
Jul 28, 2021 21:03:16.003654957 CEST | 49694 | 53 | 192.168.2.6 | 8.8.8.8 |
Jul 28, 2021 21:03:16.025439978 CEST | 53 | 49694 | 8.8.8.8 | 192.168.2.6 |
Jul 28, 2021 21:03:31.756306887 CEST | 54982 | 53 | 192.168.2.6 | 8.8.8.8 |
Jul 28, 2021 21:03:31.787667990 CEST | 53 | 54982 | 8.8.8.8 | 192.168.2.6 |
Jul 28, 2021 21:03:33.473274946 CEST | 50010 | 53 | 192.168.2.6 | 8.8.8.8 |
Jul 28, 2021 21:03:33.497868061 CEST | 53 | 50010 | 8.8.8.8 | 192.168.2.6 |
Jul 28, 2021 21:03:45.321088076 CEST | 63718 | 53 | 192.168.2.6 | 8.8.8.8 |
Jul 28, 2021 21:03:45.415860891 CEST | 53 | 63718 | 8.8.8.8 | 192.168.2.6 |
Jul 28, 2021 21:03:45.454898119 CEST | 62116 | 53 | 192.168.2.6 | 8.8.8.8 |
Jul 28, 2021 21:03:45.492161036 CEST | 53 | 62116 | 8.8.8.8 | 192.168.2.6 |
Jul 28, 2021 21:03:45.941066027 CEST | 63816 | 53 | 192.168.2.6 | 8.8.8.8 |
Jul 28, 2021 21:03:46.048563004 CEST | 53 | 63816 | 8.8.8.8 | 192.168.2.6 |
Jul 28, 2021 21:03:47.362243891 CEST | 55014 | 53 | 192.168.2.6 | 8.8.8.8 |
Jul 28, 2021 21:03:47.382900953 CEST | 53 | 55014 | 8.8.8.8 | 192.168.2.6 |
Jul 28, 2021 21:03:47.950758934 CEST | 62208 | 53 | 192.168.2.6 | 8.8.8.8 |
Jul 28, 2021 21:03:48.129303932 CEST | 53 | 62208 | 8.8.8.8 | 192.168.2.6 |
Jul 28, 2021 21:03:48.890731096 CEST | 57574 | 53 | 192.168.2.6 | 8.8.8.8 |
Jul 28, 2021 21:03:48.912436962 CEST | 53 | 57574 | 8.8.8.8 | 192.168.2.6 |
Jul 28, 2021 21:03:49.429601908 CEST | 51818 | 53 | 192.168.2.6 | 8.8.8.8 |
Jul 28, 2021 21:03:49.450651884 CEST | 53 | 51818 | 8.8.8.8 | 192.168.2.6 |
Jul 28, 2021 21:03:51.175411940 CEST | 56628 | 53 | 192.168.2.6 | 8.8.8.8 |
Jul 28, 2021 21:03:51.299721956 CEST | 53 | 56628 | 8.8.8.8 | 192.168.2.6 |
Jul 28, 2021 21:03:51.969790936 CEST | 60778 | 53 | 192.168.2.6 | 8.8.8.8 |
Jul 28, 2021 21:03:51.990619898 CEST | 53 | 60778 | 8.8.8.8 | 192.168.2.6 |
Jul 28, 2021 21:03:52.665848970 CEST | 53799 | 53 | 192.168.2.6 | 8.8.8.8 |
Jul 28, 2021 21:03:52.691879988 CEST | 53 | 53799 | 8.8.8.8 | 192.168.2.6 |
Jul 28, 2021 21:03:53.311211109 CEST | 54683 | 53 | 192.168.2.6 | 8.8.8.8 |
Jul 28, 2021 21:03:53.332066059 CEST | 53 | 54683 | 8.8.8.8 | 192.168.2.6 |
Jul 28, 2021 21:03:54.193006039 CEST | 59329 | 53 | 192.168.2.6 | 8.8.8.8 |
Jul 28, 2021 21:03:54.214898109 CEST | 53 | 59329 | 8.8.8.8 | 192.168.2.6 |
Jul 28, 2021 21:04:20.343085051 CEST | 64021 | 53 | 192.168.2.6 | 8.8.8.8 |
Jul 28, 2021 21:04:20.369200945 CEST | 53 | 64021 | 8.8.8.8 | 192.168.2.6 |
Jul 28, 2021 21:04:24.975008965 CEST | 56129 | 53 | 192.168.2.6 | 8.8.8.8 |
Jul 28, 2021 21:04:25.016398907 CEST | 53 | 56129 | 8.8.8.8 | 192.168.2.6 |
Jul 28, 2021 21:04:26.493860960 CEST | 58177 | 53 | 192.168.2.6 | 8.8.8.8 |
Jul 28, 2021 21:04:26.529123068 CEST | 53 | 58177 | 8.8.8.8 | 192.168.2.6 |
Code Manipulations |
---|
Statistics |
---|
CPU Usage |
---|
Click to jump to process
Memory Usage |
---|
Click to jump to process
High Level Behavior Distribution |
---|
back
Click to dive into process behavior distribution
Behavior |
---|
Click to jump to process
System Behavior |
---|
Start time: | 21:02:45 |
Start date: | 28/07/2021 |
Path: | C:\Windows\System32\loaddll32.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xf50000 |
File size: | 116736 bytes |
MD5 hash: | 542795ADF7CC08EFCF675D65310596E8 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
File Activities
Section Activities
Registry Activities
Process Activities
Thread Activities
Memory Activities
System Activities
LPC Port Activities
Start time: | 21:02:46 |
Start date: | 28/07/2021 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x2a0000 |
File size: | 232960 bytes |
MD5 hash: | F3BDBE3BB6F734E357235F4D5898582D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
File Activities
Section Activities
Process Activities
Thread Activities
Memory Activities
System Activities
LPC Port Activities
Start time: | 21:02:46 |
Start date: | 28/07/2021 |
Path: | C:\Windows\SysWOW64\rundll32.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x50000 |
File size: | 61952 bytes |
MD5 hash: | D7CA562B0DB4F4DD0F03A89A1FDAD63D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | high |
File Activities
Section Activities
Registry Activities
Mutex Activities
Process Activities
Thread Activities
Memory Activities
System Activities
Windows UI Activities
LPC Port Activities
Start time: | 21:03:17 |
Start date: | 28/07/2021 |
Path: | C:\Windows\SysWOW64\WerFault.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xbb0000 |
File size: | 434592 bytes |
MD5 hash: | 9E2B8ACAD48ECCA55C0230D63623661B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
File Activities
Section Activities
Registry Activities
Mutex Activities
Process Activities
Thread Activities
Memory Activities
System Activities
Timing Activities
Windows UI Activities
Process Token Activities
Object Security Activities
LPC Port Activities
Disassembly |
---|
Code Analysis |
---|
Executed Functions |
---|
Non-executed Functions |
---|
C-Code - Quality: 98% |
|
Strings |
Memory Dump Source |
|
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Executed Functions |
---|
C-Code - Quality: 42% |
|
APIs |
Strings |
|
Memory Dump Source |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Strings |
|
Memory Dump Source |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
C-Code - Quality: 29% |
|
APIs |
|
Memory Dump Source |
|
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Non-executed Functions |
---|
C-Code - Quality: 78% |
|
Strings |
|
Memory Dump Source |
|
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
C-Code - Quality: 31% |
|
Strings |
|
Memory Dump Source |
|
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
C-Code - Quality: 84% |
|
Strings |
|
Memory Dump Source |
|
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
C-Code - Quality: 93% |
|
Strings |
|
Memory Dump Source |
|
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
C-Code - Quality: 100% |
|
Strings |
|
Memory Dump Source |
|
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
C-Code - Quality: 90% |
|
Memory Dump Source |
|
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
C-Code - Quality: 89% |
|
Memory Dump Source |
|
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
C-Code - Quality: 100% |
|
Memory Dump Source |
|
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |