Windows
Analysis Report
EMP.dll
Overview
General Information
Detection
Score: | 23 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 40% |
Signatures
Classification
Analysis Advice
Sample tries to load a library which is not present or installed on the analysis machine, adding the library might reveal more behavior |
Sample may be VM or Sandbox-aware, try analysis on a native machine |
Sample crashes during execution, try analyze it on another analysis machine |
- System is w10x64
loaddll64.exe (PID: 5216 cmdline:
loaddll64. exe "C:\Us ers\user\D esktop\EMP .dll" MD5: 4E8A40CAD6CCC047914E3A7830A2D8AA) cmd.exe (PID: 5228 cmdline:
cmd.exe /C rundll32. exe "C:\Us ers\user\D esktop\EMP .dll",#1 MD5: 4E2ACF4F8A396486AB4268C94A6A245F) rundll32.exe (PID: 5204 cmdline:
rundll32.e xe "C:\Use rs\user\De sktop\EMP. dll",#1 MD5: 73C519F050C20580F8A62C849D49215A) WerFault.exe (PID: 5752 cmdline:
C:\Windows \system32\ WerFault.e xe -u -p 5 204 -s 436 MD5: 2AFFE478D86272288BBEF5A00BBEF6A0) rundll32.exe (PID: 5136 cmdline:
rundll32.e xe C:\User s\user\Des ktop\EMP.d ll,EMP MD5: 73C519F050C20580F8A62C849D49215A) WerFault.exe (PID: 5720 cmdline:
C:\Windows \system32\ WerFault.e xe -u -p 5 136 -s 428 MD5: 2AFFE478D86272288BBEF5A00BBEF6A0) WerFault.exe (PID: 5172 cmdline:
C:\Windows \system32\ WerFault.e xe -u -p 5 216 -s 492 MD5: 2AFFE478D86272288BBEF5A00BBEF6A0)
- cleanup
- • Key, Mouse, Clipboard, Microphone and Screen Capturing
- • System Summary
- • Data Obfuscation
- • Hooking and other Techniques for Hiding and Protection
- • Malware Analysis System Evasion
- • HIPS / PFW / Operating System Protection Evasion
Click to jump to signature section
Source: | Binary or memory string: |
Source: | Windows user hook set: | Jump to behavior |
Source: | Process created: |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | File created: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | Classification label: |
Source: | Process created: |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | File read: | Jump to behavior | ||
Source: | File read: | Jump to behavior | ||
Source: | File read: | Jump to behavior | ||
Source: | File read: | Jump to behavior | ||
Source: | File read: | Jump to behavior | ||
Source: | File read: | Jump to behavior |
Source: | Binary or memory string: |
Source: | Static file information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process created: | Jump to behavior |
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Network Effects | Remote Service Effects | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Valid Accounts | Windows Management Instrumentation | 1 DLL Side-Loading | 11 Process Injection | 1 Virtualization/Sandbox Evasion | 2 Input Capture | 1 Security Software Discovery | Remote Services | 2 Input Capture | Exfiltration Over Other Network Medium | Data Obfuscation | Eavesdrop on Insecure Network Communication | Remotely Track Device Without Authorization | Modify System Partition |
Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 1 Rundll32 | LSASS Memory | 1 Virtualization/Sandbox Evasion | Remote Desktop Protocol | Data from Removable Media | Exfiltration Over Bluetooth | Junk Data | Exploit SS7 to Redirect Phone Calls/SMS | Remotely Wipe Data Without Authorization | Device Lockout |
Domain Accounts | At (Linux) | Logon Script (Windows) | Logon Script (Windows) | 11 Process Injection | Security Account Manager | 1 System Information Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | Automated Exfiltration | Steganography | Exploit SS7 to Track Device Location | Obtain Device Cloud Backups | Delete Device Data |
Local Accounts | At (Windows) | Logon Script (Mac) | Logon Script (Mac) | 1 DLL Side-Loading | NTDS | 1 Remote System Discovery | Distributed Component Object Model | Input Capture | Scheduled Transfer | Protocol Impersonation | SIM Card Swap | Carrier Billing Fraud |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
8% | ReversingLabs | |||
5% | Virustotal | Browse | ||
3% | Metadefender | Browse |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Virustotal | Browse |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
dual-a-0001.a-msedge.net | 204.79.197.200 | true | false |
| unknown |
Joe Sandbox Version: | 36.0.0 Rainbow Opal |
Analysis ID: | 705117 |
Start date and time: | 2022-09-18 22:52:07 +02:00 |
Joe Sandbox Product: | CloudBasic |
Overall analysis duration: | 0h 4m 27s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Sample file name: | EMP.dll |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211 |
Run name: | Run with higher sleep bypass |
Number of analysed new started processes analysed: | 10 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Detection: | SUS |
Classification: | sus23.evad.winDLL@10/12@0/0 |
EGA Information: | Failed |
HDC Information: | Failed |
HCA Information: | Failed |
Cookbook Comments: |
|
- Exclude process from analysis
(whitelisted): WerFault.exe - Excluded IPs from analysis (wh
itelisted): 104.208.16.94, 20. 42.73.29, 52.168.117.173 - Excluded domains from analysis
(whitelisted): www.bing.com, onedsblobprdeus16.eastus.cloud app.azure.com, fs.microsoft.co m, login.live.com, blobcollect or.events.data.trafficmanager. net, onedsblobprdeus15.eastus. cloudapp.azure.com, watson.tel emetry.microsoft.com, www-www. bing.com.trafficmanager.net, o nedsblobprdcus16.centralus.clo udapp.azure.com - Execution Graph export aborted
for target rundll32.exe, PID 5136 because there are no exec uted function - Not all processes where analyz
ed, report is missing behavior information
Match | Associated Sample Name / URL | SHA 256 | Detection | Link | Context |
---|---|---|---|---|---|
dual-a-0001.a-msedge.net | Get hash | malicious | Browse |
| |
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
|
Process: | C:\Windows\System32\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 65536 |
Entropy (8bit): | 0.7919728236354776 |
Encrypted: | false |
SSDEEP: | 96:W4F1wupa4thUL7ufDpXIQcQgc6ObcE6cw3+2v+HbHgmksn3eZFDPCFYOyPdTxifS:T4upa0H+KbQIjz5/u7sSS274lt+ |
MD5: | CD478A69357F7166EDBC23965EA3A429 |
SHA1: | 4B6AB71949797BBDFB727AA1E24F187D891D07DC |
SHA-256: | F38E1F2A7BC4D3803D311EF75D5F8C393AA7C1DDAB55A3468AAE2F511E6A3895 |
SHA-512: | F28AF679B8546CB1B1DB42308FFACDEAA1C52CB4E1D3DD9E133FE84A29911B0433B3625947202CC30650FA81D240A825CD09451094C4F71B20E73DE9230A8CEC |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\System32\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 65536 |
Entropy (8bit): | 0.7988839305400732 |
Encrypted: | false |
SSDEEP: | 96:xyFeU7ESRirJPnyujA55L7ufDpXIQcQgc6ObcE6cw3+XaXz+HbHgSQgJPb9kp8WI:gZbirJKmH+KbQAjUt/u7sSS274ltG3 |
MD5: | C211BE82A914F91CDDD6657FF202A682 |
SHA1: | 2FA4A32B67C2007B0DFDD00C81D92D504BCB1601 |
SHA-256: | C057457DAF6984132AA903B00333D196550E92F9FDECD547C576E06A7E0CA4FD |
SHA-512: | 0FAA9761B69A98A4AE31C8D87FB2E70DAA2A107AB95C39CB6471F8713710BD5734E043D5A19D7DD78B6F6897520216A357413569B980EE9491D436CFC734FD1C |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\System32\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 65536 |
Entropy (8bit): | 0.7983255214577226 |
Encrypted: | false |
SSDEEP: | 96:GYFdRiYJPnyVjA55L7ufDpXIQcQgc6ObcE6cw3+XaXz+HbHgSQgJPb9kp8WpsvOU:T5iYJKtH+KbQAjUt/u7sSS274ltG3 |
MD5: | 7094056FA762811907CE17F80868EAA7 |
SHA1: | 0F3781B559835AE943D1E16CB08B3EAD45E1AFC9 |
SHA-256: | 101302FB5CB881B4FD42EFDE7DC8839A345AE929966AF2397CB86CF373E300FC |
SHA-512: | B0CF3C9742F67C7FF49EE482A16AE0ACB5A2174410D6BA7A4525C1CB01298F8B43892A42B732CBF073CE479E2FCEBE300A7DD994FE5A05E8CB950378345E31C9 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\System32\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4698 |
Entropy (8bit): | 4.456550630823905 |
Encrypted: | false |
SSDEEP: | 48:cvIwSD8zsFJgtBI93XWgc8sqYjt8fm8M4JCZCQjVtFuRtoyq85msWqewZESC5SMd:uITfflmgrsqYuJOrsewVvMd |
MD5: | 34E0E1E180207D1EB1373786DC78B845 |
SHA1: | AC7572AA3FE55B88AC0D5095EDD8F4AD3E8D272E |
SHA-256: | 2084E4D79650E28085A178819E43E2A69F8A77DD2C2AC571FB14FC3BA54E2E50 |
SHA-512: | 21184793923DA5AEEBF4B2D9FFB8B59FE1E9819889F7321B5271690B29E16D50D3AB0AC1583FC7AA735C8E640A1C298F328D369D0709955DDB976CC91C3D005A |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\System32\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 8490 |
Entropy (8bit): | 3.693495259318594 |
Encrypted: | false |
SSDEEP: | 192:Rrl7r3GLNiVMIKYe6YecAgmfckS/2D+CpDb89b2nrfeSm:RrlsNi5E6YNAgmfckS/h2rfS |
MD5: | 3BD16566C073779941E01F4712912CB8 |
SHA1: | 5B92F9B9E94F8228DA644F889794CD7BB58288ED |
SHA-256: | 03788D4C1D62816F6196B7D7B7D2E7048C3DB9BF4BF46CAC3D7821ABCEB332DE |
SHA-512: | C40CE79B255021644396C50CEF7A13314020A9FE82990275F84D4DEB5076A81834016D7A08FBE0CAE011AF897518040C23973BA996D7DD90CD7B192A2866A52C |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\System32\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4698 |
Entropy (8bit): | 4.460832761200755 |
Encrypted: | false |
SSDEEP: | 48:cvIwSD8zsFJgtBI93XWgc8sqYjo8fm8M4JCZCQjVtFTyq85msWqm5ZESC5SNd:uITfflmgrsqYJJOrs8VvNd |
MD5: | 45F66DE9900DBBCD5C54CDAF0445DEB5 |
SHA1: | BBC4502348DBCD08A05149499A9EC309E2E41DB7 |
SHA-256: | 377A0A597E2DEBC565C6080F31F5C47E4B4367F5CD8D25A64E7DF709EC9D198D |
SHA-512: | 3BAD51AD7C0EB4E7B93780C7CAD6F47AD021F27801CBD797DD7B38A68A643351009F5D805B1F0562515B58B7BD8E017BEBEA51B802386B0D0B218834B550BB68 |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 78902 |
Entropy (8bit): | 1.3718980534191463 |
Encrypted: | false |
SSDEEP: | 192:Ht50bUNpDUvC6KO2YZx+ARPxNKOXpGn1NE/o0gdVS16O5qbp:jCeDUq6V22w+j/pG1NEw0gdQf52p |
MD5: | 4494CDAC0FEE155DF9EAC98B9ECAE03A |
SHA1: | FBF687E6CEC027B248A842D3EBE91F14C50B8572 |
SHA-256: | CB972A1769A8B8CC7B6135291ABF5D7C7C8623CC3771E251D4B89456E241A458 |
SHA-512: | 1037A9DB279210BCF4B30657B714DF3A426A0E6A3DBE9942F9419DB4B89B698F9356B94A46A6E7A00120E850170CCC578C301358436EF58AB8E684D1A0AAEDAD |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 8508 |
Entropy (8bit): | 3.6931613083132837 |
Encrypted: | false |
SSDEEP: | 192:Rrl7r3GLNiRyr46e6Yqws3gmfbS/2D+CpD489bBbB+f0Kbjm:RrlsNi0o6YNs3gmfbS/4BbIfb6 |
MD5: | 1CB6F864B6368104B89D9033716B93A8 |
SHA1: | C66F35F2BBB5895BD7CC81E829D9D0A32AEF4C14 |
SHA-256: | 8F30D18EB0975A52E5D6D14238432CD112B275D0CFD9C1BA29D94A9E70761D04 |
SHA-512: | FF9806559CB6E31A467934FB6E2052F622AB1B49316A9F8599A465AD6DBC742B8B47D7FF852BF2528DAD98F814B0CFE134130DB5CE1E005011C89C05AA78195F |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4602 |
Entropy (8bit): | 4.422172421423899 |
Encrypted: | false |
SSDEEP: | 48:cvIwSD8zsFJgtBI93XWgc8sqYjW8fm8M4JoujVtFSyq85qyWq2FVs95d:uITfflmgrsqY/JpKY2FK95d |
MD5: | 02CF71ADDAFEF0C769714BAAA6C5D86C |
SHA1: | E0E43ACFE64E79E1FD087406A59F090398E8C5EB |
SHA-256: | 0B60B4BE4C6688A2EF44540E45DD1960FBE0F332B9096A71768DA327159EBCCC |
SHA-512: | AEC1EEC177E46F2193FEFFC66E12525BA039D7E453D4C3982D863DC8FF0A9CF066B90DA5CEA8BC70162E09DFBAFEEF62E99DC56CC4FF488F4B73467D97FDD55C |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 89370 |
Entropy (8bit): | 1.32384068656244 |
Encrypted: | false |
SSDEEP: | 192:mTPUmDpcOC515JZyHtXUnTR81lW7/a+FwdkqPWVeY:aZTCn5JZyH5UnujWDa+CxNY |
MD5: | F4115782A643B9FF9138C168C662B35F |
SHA1: | 1CFECE721F57E18C70279FBE2E692F22BE290EDE |
SHA-256: | 191C7986DC019A5D74F6D6264C066413BD426E413A2E7CE2822ADADEA9C203D6 |
SHA-512: | 28ACBBA5F4025361011256F1A1B5373B85225C7CC08F1191CACA70D474807A97A295307F46574899BF80D250843CD379F1F0B417E37AF5670FB6129B9E81E764 |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 81366 |
Entropy (8bit): | 1.3618201081053767 |
Encrypted: | false |
SSDEEP: | 192:mGsUa1epn7OC51wBzMwnSR4X6e8yLO96fwQGSvyPkunMc:AdmnCCnySOD8yLOmw3V82p |
MD5: | 7D5B5182B44EECCA54A2E8202D69AA90 |
SHA1: | E3F25B39C4BFB3ECF2A7EB2046D784C7F3D6BF2E |
SHA-256: | B0C6BFF4C531ECFD933E392D6A1DDB0587950148698B582F31DEE01672BEB55B |
SHA-512: | BFDEE09889E17CE47A684A7078F0301F75440AC20491300B7470AE2468A58726B4421C77748839901B69C536BEB73834BDB514402765B800023F1376D27C09E1 |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 8700 |
Entropy (8bit): | 3.6966629658675263 |
Encrypted: | false |
SSDEEP: | 192:Rrl7r3GLNiEQL8KI6YxZjILgmfckS/2D+CpDg89b2mpf2Sm:RrlsNirS6Y/ggmfckS/A2If6 |
MD5: | F27B298D2427EF300F2EA779AE520457 |
SHA1: | 5789534EFEE8373662ADC5A71470935707D82B52 |
SHA-256: | 07ACB1F8BC45AFAAA5024D1DEF2E596F3941831F5EDF8E47206496C256D848B8 |
SHA-512: | 465EFD91228A9C5BB94F277AE0EFC3B25757539B90368508A23843A936DBB344126A5B700D29D00A4E693143572FDD03CB031EC3833D5E9FDA3C0178A00742C8 |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 7.914102296938064 |
TrID: |
|
File name: | EMP.dll |
File size: | 4115456 |
MD5: | 39412a5854f88089d18da288bc8bb6ae |
SHA1: | 5f3fafba0569e43997009347014caf0ea51d39f3 |
SHA256: | ac2a4eb967e709a08ee39c6b5f983a3cebf6e35897564f742ef6e8ee0914e443 |
SHA512: | b59e781d89f380075812a11f15aadb618086e2586c9de487fcfa7f5e1ec34e76a8ddfa1a9001d47933475f156d6524ca93232b7894c0e4bf0b01e67628fe5bbc |
SSDEEP: | 98304:WCeAEmz8unU80/byTuwInrft+rO6FRLf/HQ:WaELuUjyTAft+rOQhP |
TLSH: | 9F16335CE23D5E50C654843B48CE66C32552ED06B980F243AEA7EBDDD1729EAF44BE03 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d......a..........# ......>.........`.\.......................................\........... ................................ |
Icon Hash: | 74f0e4ecccdce0e4 |
Entrypoint: | 0x135cc260 |
Entrypoint Section: | EMP1 |
Digitally signed: | false |
Imagebase: | 0x13000000 |
Subsystem: | windows gui |
Image File Characteristics: | RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, DLL |
DLL Characteristics: | HIGH_ENTROPY_VA |
Time Stamp: | 0x61ADF69D [Mon Dec 6 11:40:13 2021 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 6 |
OS Version Minor: | 0 |
File Version Major: | 6 |
File Version Minor: | 0 |
Subsystem Version Major: | 6 |
Subsystem Version Minor: | 0 |
Import Hash: | 6859c1fbd5011b39e2b3c5ccd6eda491 |
Instruction |
---|
dec eax |
mov dword ptr [esp+08h], ecx |
dec eax |
mov dword ptr [esp+10h], edx |
dec esp |
mov dword ptr [esp+18h], eax |
cmp dl, 00000001h |
jne 00007F1818D5D595h |
push ebx |
push esi |
push edi |
push ebp |
dec eax |
lea esi, dword ptr [FFC13DA2h] |
dec eax |
lea edi, dword ptr [esi-001DF025h] |
push edi |
xor ebx, ebx |
xor ecx, ecx |
dec eax |
or ebp, FFFFFFFFh |
call 00007F1818D5D395h |
add ebx, ebx |
je 00007F1818D5D344h |
rep ret |
mov ebx, dword ptr [esi] |
dec eax |
sub esi, FFFFFFFCh |
adc ebx, ebx |
mov dl, byte ptr [esi] |
rep ret |
dec eax |
lea eax, dword ptr [edi+ebp] |
cmp ecx, 05h |
mov dl, byte ptr [eax] |
jbe 00007F1818D5D363h |
dec eax |
cmp ebp, FFFFFFFCh |
jnbe 00007F1818D5D35Dh |
sub ecx, 04h |
mov edx, dword ptr [eax] |
dec eax |
add eax, 04h |
sub ecx, 04h |
mov dword ptr [edi], edx |
dec eax |
lea edi, dword ptr [edi+04h] |
jnc 00007F1818D5D331h |
add ecx, 04h |
mov dl, byte ptr [eax] |
je 00007F1818D5D352h |
dec eax |
inc eax |
mov byte ptr [edi], dl |
sub ecx, 01h |
mov dl, byte ptr [eax] |
dec eax |
lea edi, dword ptr [edi+01h] |
jne 00007F1818D5D332h |
rep ret |
cld |
inc ecx |
pop ebx |
jmp 00007F1818D5D34Ah |
dec eax |
inc esi |
mov byte ptr [edi], dl |
dec eax |
inc edi |
mov dl, byte ptr [esi] |
add ebx, ebx |
jne 00007F1818D5D34Ch |
mov ebx, dword ptr [esi] |
dec eax |
sub esi, FFFFFFFCh |
adc ebx, ebx |
mov dl, byte ptr [esi] |
jc 00007F1818D5D328h |
lea eax, dword ptr [ecx+01h] |
inc ecx |
call ebx |
adc eax, eax |
add ebx, ebx |
jne 00007F1818D5D34Ch |
mov ebx, dword ptr [esi] |
dec eax |
sub esi, FFFFFFFCh |
adc ebx, ebx |
mov dl, byte ptr [esi] |
jnc 00007F1818D5D32Dh |
sub eax, 03h |
jc 00007F1818D5D355h |
shl eax, 08h |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x5cd178 | 0x48 | .rsrc |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x5cd0f0 | 0x88 | .rsrc |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x5cd000 | 0xf0 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x5c88a0 | 0x234 | EMP1 |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x5cc4e0 | 0x130 | EMP1 |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|
EMP0 | 0x1000 | 0x1df000 | 0x0 | False | 0 | empty | 0.0 | IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
EMP1 | 0x1e0000 | 0x3ed000 | 0x3ec800 | unknown | unknown | unknown | unknown | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rsrc | 0x5cd000 | 0x1000 | 0x200 | False | 0.57421875 | data | 3.993113977578181 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Name | RVA | Size | Type | Language | Country |
---|---|---|---|---|---|
RT_MANIFEST | 0x5cd05c | 0x91 | XML 1.0 document text | English | United States |
DLL | Import |
---|---|
KERNEL32.DLL | LoadLibraryA, GetProcAddress, VirtualProtect |
Name | Ordinal | Address |
---|---|---|
EMP | 1 | 0x13001010 |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 22:52:58 |
Start date: | 18/09/2022 |
Path: | C:\Windows\System32\loaddll64.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7d1230000 |
File size: | 140288 bytes |
MD5 hash: | 4E8A40CAD6CCC047914E3A7830A2D8AA |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Target ID: | 1 |
Start time: | 22:52:58 |
Start date: | 18/09/2022 |
Path: | C:\Windows\System32\cmd.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff707bb0000 |
File size: | 273920 bytes |
MD5 hash: | 4E2ACF4F8A396486AB4268C94A6A245F |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Target ID: | 2 |
Start time: | 22:52:59 |
Start date: | 18/09/2022 |
Path: | C:\Windows\System32\rundll32.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff734df0000 |
File size: | 69632 bytes |
MD5 hash: | 73C519F050C20580F8A62C849D49215A |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Target ID: | 3 |
Start time: | 22:52:59 |
Start date: | 18/09/2022 |
Path: | C:\Windows\System32\rundll32.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff734df0000 |
File size: | 69632 bytes |
MD5 hash: | 73C519F050C20580F8A62C849D49215A |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Target ID: | 6 |
Start time: | 22:53:02 |
Start date: | 18/09/2022 |
Path: | C:\Windows\System32\WerFault.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff679980000 |
File size: | 494488 bytes |
MD5 hash: | 2AFFE478D86272288BBEF5A00BBEF6A0 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Target ID: | 7 |
Start time: | 22:53:02 |
Start date: | 18/09/2022 |
Path: | C:\Windows\System32\WerFault.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff679980000 |
File size: | 494488 bytes |
MD5 hash: | 2AFFE478D86272288BBEF5A00BBEF6A0 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Target ID: | 9 |
Start time: | 22:53:06 |
Start date: | 18/09/2022 |
Path: | C:\Windows\System32\WerFault.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff679980000 |
File size: | 494488 bytes |
MD5 hash: | 2AFFE478D86272288BBEF5A00BBEF6A0 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |