Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.dll

Overview

General Information

Sample name:file.dll
(renamed file extension from exe to dll)
Original sample name:file.exe
Analysis ID:1524399
MD5:2edec0c87d2db4eae0d75c9e4d886c15
SHA1:497a43a5a8221731031575ef50f0427e1302b8ef
SHA256:cbf75cfe17c781e3a99382f5912d91d92abe2d24939aca937a9f828399dce311
Tags:dllexesignedx64user-jstrosch
Infos:

Detection

Score:4
Range:0 - 100
Whitelisted:false
Confidence:60%

Signatures

AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Creates a process in suspended mode (likely to inject code)
Found large amount of non-executed APIs
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info

Classification

  • System is w10x64
  • loaddll64.exe (PID: 3536 cmdline: loaddll64.exe "C:\Users\user\Desktop\file.dll" MD5: 763455F9DCB24DFEECC2B9D9F8D46D52)
    • conhost.exe (PID: 6304 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 4824 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\file.dll",#1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • rundll32.exe (PID: 1020 cmdline: rundll32.exe "C:\Users\user\Desktop\file.dll",#1 MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 5996 cmdline: rundll32.exe C:\Users\user\Desktop\file.dll,Java_sun_tracing_dtrace_JVM_activate0 MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 2836 cmdline: rundll32.exe C:\Users\user\Desktop\file.dll,Java_sun_tracing_dtrace_JVM_defineClass0 MD5: EF3179D498793BF4234F708D3BE28633)
      • WerFault.exe (PID: 408 cmdline: C:\Windows\system32\WerFault.exe -u -p 2836 -s 328 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
    • rundll32.exe (PID: 3304 cmdline: rundll32.exe C:\Users\user\Desktop\file.dll,Java_sun_tracing_dtrace_JVM_dispose0 MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 5040 cmdline: rundll32.exe "C:\Users\user\Desktop\file.dll",Java_sun_tracing_dtrace_JVM_activate0 MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 3500 cmdline: rundll32.exe "C:\Users\user\Desktop\file.dll",Java_sun_tracing_dtrace_JVM_defineClass0 MD5: EF3179D498793BF4234F708D3BE28633)
      • WerFault.exe (PID: 764 cmdline: C:\Windows\system32\WerFault.exe -u -p 3500 -s 324 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
    • rundll32.exe (PID: 5504 cmdline: rundll32.exe "C:\Users\user\Desktop\file.dll",Java_sun_tracing_dtrace_JVM_dispose0 MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 4836 cmdline: rundll32.exe "C:\Users\user\Desktop\file.dll",Java_sun_tracing_dtrace_JVM_isSupported0 MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 1532 cmdline: rundll32.exe "C:\Users\user\Desktop\file.dll",Java_sun_tracing_dtrace_JVM_isEnabled0 MD5: EF3179D498793BF4234F708D3BE28633)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: file.dllStatic PE information: certificate valid
Source: file.dllStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
Source: Binary string: c:\jenkins\workspace\8-2-build-windows-x64-cygwin\jdk8u361\3183\build\windows-x64\jdk\objs\libjsdt\jsdt.pdb source: rundll32.exe, 00000006.00000002.2304495353.00007FF8BFAB3000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000D.00000002.2256901548.00007FF8BFAB3000.00000002.00000001.01000000.00000003.sdmp, file.dll
Source: file.dllString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
Source: file.dllString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
Source: file.dllString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
Source: file.dllString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
Source: file.dllString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
Source: file.dllString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
Source: file.dllString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
Source: file.dllString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
Source: file.dllString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
Source: file.dllString found in binary or memory: http://ocsp.digicert.com0
Source: file.dllString found in binary or memory: http://ocsp.digicert.com0A
Source: file.dllString found in binary or memory: http://ocsp.digicert.com0C
Source: file.dllString found in binary or memory: http://ocsp.digicert.com0X
Source: Amcache.hve.9.drString found in binary or memory: http://upx.sf.net
Source: file.dllString found in binary or memory: http://www.digicert.com/CPS0
Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 2836 -s 328
Source: file.dllBinary or memory string: OriginalFilenamejsdt.dllN vs file.dll
Source: classification engineClassification label: clean4.winDLL@24/9@0/0
Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess2836
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6304:120:WilError_03
Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess3500
Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\b90204a8-bd65-4f02-bd9a-140ae0676668Jump to behavior
Source: file.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Windows\System32\loaddll64.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\file.dll,Java_sun_tracing_dtrace_JVM_activate0
Source: unknownProcess created: C:\Windows\System32\loaddll64.exe loaddll64.exe "C:\Users\user\Desktop\file.dll"
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\file.dll",#1
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\file.dll,Java_sun_tracing_dtrace_JVM_activate0
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",#1
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\file.dll,Java_sun_tracing_dtrace_JVM_defineClass0
Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 2836 -s 328
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\file.dll,Java_sun_tracing_dtrace_JVM_dispose0
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",Java_sun_tracing_dtrace_JVM_activate0
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",Java_sun_tracing_dtrace_JVM_defineClass0
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",Java_sun_tracing_dtrace_JVM_dispose0
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",Java_sun_tracing_dtrace_JVM_isSupported0
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",Java_sun_tracing_dtrace_JVM_isEnabled0
Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 3500 -s 324
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\file.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\file.dll,Java_sun_tracing_dtrace_JVM_activate0Jump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\file.dll,Java_sun_tracing_dtrace_JVM_defineClass0Jump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\file.dll,Java_sun_tracing_dtrace_JVM_dispose0Jump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",Java_sun_tracing_dtrace_JVM_activate0Jump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",Java_sun_tracing_dtrace_JVM_defineClass0Jump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",Java_sun_tracing_dtrace_JVM_dispose0Jump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",Java_sun_tracing_dtrace_JVM_isSupported0Jump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",Java_sun_tracing_dtrace_JVM_isEnabled0Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: kernel.appcore.dllJump to behavior
Source: file.dllStatic PE information: certificate valid
Source: file.dllStatic PE information: Image base 0x180000000 > 0x60000000
Source: file.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: file.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: file.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: file.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: file.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: file.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: file.dllStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
Source: file.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: c:\jenkins\workspace\8-2-build-windows-x64-cygwin\jdk8u361\3183\build\windows-x64\jdk\objs\libjsdt\jsdt.pdb source: rundll32.exe, 00000006.00000002.2304495353.00007FF8BFAB3000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000D.00000002.2256901548.00007FF8BFAB3000.00000002.00000001.01000000.00000003.sdmp, file.dll
Source: file.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: file.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: file.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: file.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: file.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeAPI coverage: 2.2 %
Source: C:\Windows\System32\loaddll64.exe TID: 5536Thread sleep time: -120000s >= -30000sJump to behavior
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\loaddll64.exeThread delayed: delay time: 120000Jump to behavior
Source: Amcache.hve.9.drBinary or memory string: VMware
Source: Amcache.hve.9.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.9.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.9.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.9.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.9.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.9.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.9.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.9.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.9.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.9.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.9.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.9.drBinary or memory string: vmci.sys
Source: Amcache.hve.9.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
Source: Amcache.hve.9.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.9.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.9.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.9.drBinary or memory string: VMware20,1
Source: Amcache.hve.9.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.9.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.9.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.9.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.9.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.9.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.9.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.9.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.9.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.9.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.9.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00007FF8BFAB2584 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,6_2_00007FF8BFAB2584
Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00007FF8BFAB2584 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,6_2_00007FF8BFAB2584
Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00007FF8BFAB1F64 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,6_2_00007FF8BFAB1F64
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",#1Jump to behavior
Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00007FF8BFAB20E0 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,6_2_00007FF8BFAB20E0
Source: Amcache.hve.9.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.9.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.9.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.9.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
11
Process Injection
1
Rundll32
OS Credential Dumping1
System Time Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
21
Virtualization/Sandbox Evasion
LSASS Memory31
Security Software Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
Process Injection
Security Account Manager21
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDS2
System Information Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 1524399 Sample: file.exe Startdate: 02/10/2024 Architecture: WINDOWS Score: 4 6 loaddll64.exe 1 2->6         started        process3 8 cmd.exe 1 6->8         started        10 rundll32.exe 6->10         started        12 rundll32.exe 6->12         started        14 7 other processes 6->14 process4 16 rundll32.exe 8->16         started        18 WerFault.exe 20 16 10->18         started        20 WerFault.exe 16 12->20         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
file.dll0%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://upx.sf.net0%URL Reputationsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://upx.sf.netAmcache.hve.9.drfalse
  • URL Reputation: safe
unknown
No contacted IP infos
Joe Sandbox version:41.0.0 Charoite
Analysis ID:1524399
Start date and time:2024-10-02 18:46:00 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 27s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:21
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:file.dll
(renamed file extension from exe to dll)
Original Sample Name:file.exe
Detection:CLEAN
Classification:clean4.winDLL@24/9@0/0
EGA Information:
  • Successful, ratio: 100%
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 1
  • Number of non-executed functions: 3
  • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
  • Excluded IPs from analysis (whitelisted): 52.168.117.173
  • Excluded domains from analysis (whitelisted): onedsblobprdeus16.eastus.cloudapp.azure.com, ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
  • Not all processes where analyzed, report is missing behavior information
  • VT rate limit hit for: file.dll
TimeTypeDescription
12:46:58API Interceptor1x Sleep call for process: loaddll64.exe modified
12:47:10API Interceptor2x Sleep call for process: WerFault.exe modified
No context
No context
No context
No context
No context
Process:C:\Windows\System32\WerFault.exe
File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):65536
Entropy (8bit):0.7621268954728609
Encrypted:false
SSDEEP:192:6vFihy4o0M0Iv+yQgjxMLzuiFWZ24lO8V:ciE4zIv+yQgjmzuiFWY4lO8V
MD5:1EE58AB86B6909C4C9C18099C06D87EE
SHA1:7288B8B2475C86044FC29AF00EA241A4916A9531
SHA-256:C2E75134B73AD336370148DA8BD04B25437AD23384A4F90945C0AF32EF45EAAF
SHA-512:895F6C9E3D08E2173103A14C707EE63DB95BAF03CD6614F675901933B04839D70415549435037B085BC379778BCF387465BBC45F3E4DA9C9878490CF29FE8AF8
Malicious:false
Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.2.3.6.1.2.1.3.2.7.5.1.9.5.1.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.2.3.6.1.2.1.3.5.4.0.8.1.6.0.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.d.9.c.7.9.6.0.c.-.7.b.3.3.-.4.c.1.1.-.8.9.b.0.-.f.4.a.b.e.e.e.b.b.8.2.2.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.a.3.2.1.7.0.8.8.-.b.b.f.d.-.4.3.3.8.-.b.1.4.5.-.8.9.8.4.f.b.f.9.c.c.8.e.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e._.f.i.l.e...d.l.l.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.b.1.4.-.0.0.0.1.-.0.0.1.4.-.9.4.a.5.-.7.1.a.e.e.a.1.4.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.d.d.3.9.9.a.e.4.6.3.0.3.3.4.3.f.9.f.0.d.a.1.8.9.a.e.e.1.1.c.6.7.b.d.8.6.8.2.2.2.!.r.u.n.
Process:C:\Windows\System32\WerFault.exe
File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):65536
Entropy (8bit):0.7621630590970173
Encrypted:false
SSDEEP:192:fq0FiKy6Go0M0Iv+yQgjxMLzuiFWZ24lO8V:yCiXrzIv+yQgjmzuiFWY4lO8V
MD5:CC2CE715DD47FF7A2CF45FEC2627F922
SHA1:0FE641BCCB26DC659881E2129C16379CDEDB6C92
SHA-256:0524093B701AB6307DF01B8A72E7C4C24C10BF7D5C73BC3A8426EA08E707EDBB
SHA-512:19E478FCF3010F9209BA8D7DC76C51F92A8D76CCCFE71FC0E02FFE83325FB604F806FAF9EF83E5DEB9517032D51AF5BEA987A00BF4DDDCEC8F054CAC44FF5D4F
Malicious:false
Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.2.3.6.1.2.1.8.6.9.7.9.0.7.4.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.2.3.6.1.2.1.9.0.1.0.4.1.2.4.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.d.d.d.5.b.7.b.4.-.0.d.9.e.-.4.9.1.c.-.b.e.0.f.-.5.4.e.d.8.5.a.4.5.1.0.c.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.4.2.4.5.7.7.1.c.-.d.e.5.c.-.4.4.f.1.-.b.a.1.5.-.5.c.e.0.c.9.f.e.e.f.d.7.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e._.f.i.l.e...d.l.l.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.d.a.c.-.0.0.0.1.-.0.0.1.4.-.6.7.6.d.-.0.b.b.2.e.a.1.4.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.d.d.3.9.9.a.e.4.6.3.0.3.3.4.3.f.9.f.0.d.a.1.8.9.a.e.e.1.1.c.6.7.b.d.8.6.8.2.2.2.!.r.u.n.
Process:C:\Windows\System32\WerFault.exe
File Type:Mini DuMP crash report, 14 streams, Wed Oct 2 16:46:53 2024, 0x1205a4 type
Category:dropped
Size (bytes):56422
Entropy (8bit):1.6761649103247223
Encrypted:false
SSDEEP:192:gWqyjJHOMxqbo30wEm2U9vmFn/0Y+Z03:CKu1K2U9vmFMY
MD5:8D70EE50B78CB5E3DBCEE0CB61E2691B
SHA1:013C6AD1BC89FD2C0A7E827C5C6DCB6507B9C724
SHA-256:58F85B97486DEF85CCA3C5D26C8BB5407DB33072A85795D0DCD60BBDEB64231B
SHA-512:8C2CBEED3ABF0FED9EBC1501AD7831D05CA3C652920128124BC83AA7FEEDBF944716EF1FF3C74D3FAE85378A57872131D0301ACF0E3DF0680422E6C0F10B5F2D
Malicious:false
Preview:MDMP..a..... ........x.f........................L................)..........T.......8...........T...........0...6.......................................................................................................eJ......l.......Lw......................T............x.f.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Windows\System32\WerFault.exe
File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):8988
Entropy (8bit):3.7084205982677867
Encrypted:false
SSDEEP:192:R6l7wVeJCChdF6YCMEgmfiL0a4pr+89beKSfLKm:R6lXJvhdF6YxEgmfGVKe/f3
MD5:0EAC021BB06F9DF8E299AECCA0CAC70A
SHA1:9F149F9DD93E14DC6F2AFE6DF4AA4F502A290901
SHA-256:FE6B01B873D25D3FB8B28F7D1E9CFA9AE9F36BB0255EBD10092694D11CDD9B48
SHA-512:04881194E15A47CE8928881A20CEC6C932FF270EFF57C9CCC02716FEB0BE6BFA2B4FC833329795631421A40831EA3DE28E3A6D728C3A94A17123ADC88F98B24C
Malicious:false
Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.2.8.3.6.<./.P.i.
Process:C:\Windows\System32\WerFault.exe
File Type:XML 1.0 document, ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):4730
Entropy (8bit):4.467337590607223
Encrypted:false
SSDEEP:48:cvIwWl8zsiJg771I9VSWpW8VY1Ym8M4JCFCtsNuFgzyq85m4zINptSTS3d:uIjfwI7iz7VBJixzGwpoO3d
MD5:61B48ACAC962D34A2CA7A7BB6893168D
SHA1:1564F066BD91BE2BC47E148BABA19EFD40549DC4
SHA-256:D4ABBDB60640A9B78AAE3FBE081A94204B24D80FACE7491CB0ED3789A399EAE8
SHA-512:3623ADE5435A3AF16E8F7DA32D3AE79FCD7BFD0D441D14E353A6B7FD877859B283D94D6AD6A2B61D67AA7E1BE81C19C9CA798E49128516FBB0C34B9815723CD7
Malicious:false
Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="526069" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
Process:C:\Windows\System32\WerFault.exe
File Type:Mini DuMP crash report, 14 streams, Wed Oct 2 16:46:58 2024, 0x1205a4 type
Category:dropped
Size (bytes):56294
Entropy (8bit):1.6613248578599324
Encrypted:false
SSDEEP:96:5582HP4o1lq6avm2m+mi424yPoi7MxeR352NNGAKu6EhZOdKWI/7IBw55CbSpRAm:Ysc4ywOMxeZUpKg5KERAWMn
MD5:1D107469E42DF18C00825F561A750C31
SHA1:6CB5EF965D0D034E6E0CB0D541B283D45D2F62F6
SHA-256:7989DBAA68F0259A9FF8596679FA33C672B833AD90DE4E74DD16D71E60980821
SHA-512:7C5C4A093CAE2D9F99E94D9852E64AEF909089586588416553DEE3461C21AB22F10C03B4450AA3F65F37EC8DF279E36B20643B44BA443BDDBD3FDAC441B56CDC
Malicious:false
Preview:MDMP..a..... ........y.f........................L................)..........T.......8...........T...........0...........................................................................................................eJ......l.......Lw......................T............y.f.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Windows\System32\WerFault.exe
File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):8760
Entropy (8bit):3.7021226947879717
Encrypted:false
SSDEEP:192:R6l7wVeJj7cdTB6YBQivpgmfiL0a4prO89b9grfVA/m:R6lXJ/cdV6YSiBgmfGV69EfVV
MD5:A69E7BD431D7B33B7BB9AEC813754B2E
SHA1:E96B751ED9D06362F37D63262D2D8659AFCE0422
SHA-256:C487B3772F678B24B8C693841E6E9E8BEE889954642B57ED959C02D0F50BA630
SHA-512:7CEFB156E4EA01DE3A84EF110726E70750F9D33C5FECD368F6F8D449AA2296FEF3B0794614579E124728FA54CF3753B83E33B0C856726317E1AB59AAB213B1D7
Malicious:false
Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.3.5.0.0.<./.P.i.
Process:C:\Windows\System32\WerFault.exe
File Type:XML 1.0 document, ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):4730
Entropy (8bit):4.467289142410391
Encrypted:false
SSDEEP:48:cvIwWl8zsiJg771I9VSWpW8VYaYm8M4JCFCtsNuF9yq85m4zIMHptSTSKd:uIjfwI7iz7VGJiGGppoOKd
MD5:8566B407423557C5FFB9F3335EAA2CF3
SHA1:EFDAF7DCA6BDD17E99A1AE3F7E37B713711E445D
SHA-256:03C69D7AD2F80ED8CCEA4E9D4B2E324BEA655EBCB83CC3E835A2CBD89F054D13
SHA-512:6F8F28D62978EFEFBBA9B762202FBC978BEC99108C0858DACA8425A440B29AD02F603D1A55525205ED7AD37D12465F423A383833A493EB65E51E6788B2349188
Malicious:false
Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="526069" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
Process:C:\Windows\System32\WerFault.exe
File Type:MS Windows registry file, NT/2000 or above
Category:dropped
Size (bytes):1835008
Entropy (8bit):4.422408112557154
Encrypted:false
SSDEEP:6144:iSvfpi6ceLP/9skLmb0OTMWSPHaJG8nAgeMZMMhA2fX4WABlEnNa0uhiTw:xvloTMW+EZMM6DFy003w
MD5:8EFE007D48C0BC29AA52BDB4D2B6F865
SHA1:43CD3458CC8B645E6BF91D9FA883AF2FC7ABFEA1
SHA-256:FD80CDB9A1932F3DA87815174F92BE0D75BF67B3CC47623FC074DB55C6DD756A
SHA-512:3D7D8DF27C8A1D5B3120B8DA1154B5588A37B32B44FAB682F9B3A3FC0E482AD4DBDF22510DBF8C5F9878021DF4E4639D21B594A8B6787DD5D5EABC181F6EC914
Malicious:false
Preview:regf>...>....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm..9.............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
File type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
Entropy (8bit):6.458930901015721
TrID:
  • Win64 Dynamic Link Library (generic) (102004/3) 86.43%
  • Win64 Executable (generic) (12005/4) 10.17%
  • Generic Win/DOS Executable (2004/3) 1.70%
  • DOS Executable Generic (2002/1) 1.70%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.01%
File name:file.dll
File size:25'760 bytes
MD5:2edec0c87d2db4eae0d75c9e4d886c15
SHA1:497a43a5a8221731031575ef50f0427e1302b8ef
SHA256:cbf75cfe17c781e3a99382f5912d91d92abe2d24939aca937a9f828399dce311
SHA512:a95496018ac2b3bfdb268a4fd943654017119720c69b2fa399c084581397ef62c2e435492e44885f760b4f879e376e1bbbf582913acfbf493f344fee8a472468
SSDEEP:384:4fuRWJf1e1zJG9BTkrwnGPwPK6cMjhcUQ7IYieTFhO0GPxh8E9VF0NyuR1CP:ouR2AZJGrGwnbybEYiUFGPxWEYRwP
TLSH:C2C25C5387E84825FD6B4AF1A4D54A26DAB1B6504270C3EB03A9C36B0F53743376D7E8
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......(]..l<..l<..l<..eD5.h<..>T..n<..7T..o<..l<..J<..>T..g<..>T..d<..>T..n<...U..n<...U..m<...UY.m<...U..m<..Richl<.................
Icon Hash:7ae282899bbab082
Entrypoint:0x180001f24
Entrypoint Section:.text
Digitally signed:true
Imagebase:0x180000000
Subsystem:windows gui
Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, DLL
DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
Time Stamp:0x63BBD4C3 [Mon Jan 9 08:48:03 2023 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:6
OS Version Minor:0
File Version Major:6
File Version Minor:0
Subsystem Version Major:6
Subsystem Version Minor:0
Import Hash:85262f55c407d44a7aabc3e52c0e910b
Signature Valid:true
Signature Issuer:CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US
Signature Validation Error:The operation completed successfully
Error Number:0
Not Before, Not After
  • 19/08/2021 02:00:00 20/08/2023 01:59:59
Subject Chain
  • CN="Oracle America, Inc.", OU=Software Engineering, O="Oracle America, Inc.", L=Redwood City, S=California, C=US
Version:3
Thumbprint MD5:2876C1BECB51837D0E3DE50903D025B6
Thumbprint SHA-1:940D69C0A34A1B4CFD8048488BA86F4CED60481A
Thumbprint SHA-256:EE46613A38B4F486164BCE7FB23178667715617F511B364594311A1548B08EB1
Serial:068BE2F53452C882F18ED41A5DD4E7A3
Instruction
dec eax
mov dword ptr [esp+08h], ebx
dec eax
mov dword ptr [esp+10h], esi
push edi
dec eax
sub esp, 20h
dec ecx
mov edi, eax
mov ebx, edx
dec eax
mov esi, ecx
cmp edx, 01h
jne 00007FCE650F2C57h
call 00007FCE650F2DF0h
dec esp
mov eax, edi
mov edx, ebx
dec eax
mov ecx, esi
dec eax
mov ebx, dword ptr [esp+30h]
dec eax
mov esi, dword ptr [esp+38h]
dec eax
add esp, 20h
pop edi
jmp 00007FCE650F2AE4h
int3
int3
int3
inc eax
push ebx
dec eax
sub esp, 20h
dec eax
mov ebx, ecx
xor ecx, ecx
call dword ptr [000010C3h]
dec eax
mov ecx, ebx
call dword ptr [000010B2h]
call dword ptr [000010BCh]
dec eax
mov ecx, eax
mov edx, C0000409h
dec eax
add esp, 20h
pop ebx
dec eax
jmp dword ptr [000010B0h]
dec eax
mov dword ptr [esp+08h], ecx
dec eax
sub esp, 38h
mov ecx, 00000017h
call 00007FCE650F358Ah
test eax, eax
je 00007FCE650F2C59h
mov ecx, 00000002h
int 29h
dec eax
lea ecx, dword ptr [00003133h]
call 00007FCE650F2CFFh
dec eax
mov eax, dword ptr [esp+38h]
dec eax
mov dword ptr [0000321Ah], eax
dec eax
lea eax, dword ptr [esp+38h]
dec eax
add eax, 08h
dec eax
mov dword ptr [000031AAh], eax
dec eax
mov eax, dword ptr [00003203h]
dec eax
mov dword ptr [00003074h], eax
Programming Language:
  • [IMP] VS2008 SP1 build 30729
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x3ad00x128.rdata
IMAGE_DIRECTORY_ENTRY_IMPORT0x3bf80x64.rdata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x70000x398.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x60000x21c.pdata
IMAGE_DIRECTORY_ENTRY_SECURITY0x3c000x28a0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x80000x18.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x34700x54.rdata
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x34d00x100.rdata
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x30000x120.rdata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x19c30x1a00b41118d91236c8a729d013fe6931d60bFalse0.5621995192307693data6.010704089113709IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rdata0x30000x10800x1200417f818db33213d3bf6b4a277c2d41d0False0.3969184027777778data4.468600811424352IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0x50000x6380x200bcdacb84b06b6d5de784487c9554a2c3False0.087890625data0.4295224506328726IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.pdata0x60000x21c0x400ca151f85c902041ab1a11c8f14556ad4False0.30078125data2.3528345062105953IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.rsrc0x70000x3980x400cd816a5488e3f4aef870a1eb49495016False0.4033203125data3.030833634108568IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0x80000x180x2006bca7355d1310645754d95d4528b3ffeFalse0.068359375data0.30461668466005165IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_VERSION0x70600x334data0.4634146341463415
DLLImport
KERNEL32.dllFreeLibrary, GetModuleHandleA, GetProcAddress, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, TerminateProcess, IsProcessorFeaturePresent, QueryPerformanceCounter, GetCurrentProcessId, GetCurrentThreadId, GetSystemTimeAsFileTime, DisableThreadLibraryCalls, InitializeSListHead, IsDebuggerPresent
VCRUNTIME140.dll__C_specific_handler, __std_type_info_destroy_list, memset
api-ms-win-crt-heap-l1-1-0.dllfree, malloc, calloc
api-ms-win-crt-runtime-l1-1-0.dll_initterm_e, _seh_filter_dll, _configure_narrow_argv, _initterm, _initialize_onexit_table, _execute_onexit_table, _cexit, _initialize_narrow_environment
NameOrdinalAddress
Java_sun_tracing_dtrace_JVM_activate010x180001000
Java_sun_tracing_dtrace_JVM_defineClass020x18000114c
Java_sun_tracing_dtrace_JVM_dispose030x1800012e0
Java_sun_tracing_dtrace_JVM_isEnabled040x180001300
Java_sun_tracing_dtrace_JVM_isSupported050x180001340
TimestampSource PortDest PortSource IPDest IP
Oct 2, 2024 18:47:10.508929014 CEST53584651.1.1.1192.168.2.5

Click to jump to process

Click to jump to process

Click to dive into process behavior distribution

Click to jump to process

Target ID:0
Start time:12:46:48
Start date:02/10/2024
Path:C:\Windows\System32\loaddll64.exe
Wow64 process (32bit):false
Commandline:loaddll64.exe "C:\Users\user\Desktop\file.dll"
Imagebase:0x7ff786390000
File size:165'888 bytes
MD5 hash:763455F9DCB24DFEECC2B9D9F8D46D52
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:1
Start time:12:46:48
Start date:02/10/2024
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff6d64d0000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:2
Start time:12:46:48
Start date:02/10/2024
Path:C:\Windows\System32\cmd.exe
Wow64 process (32bit):false
Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\file.dll",#1
Imagebase:0x7ff7b2b10000
File size:289'792 bytes
MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:3
Start time:12:46:48
Start date:02/10/2024
Path:C:\Windows\System32\rundll32.exe
Wow64 process (32bit):false
Commandline:rundll32.exe C:\Users\user\Desktop\file.dll,Java_sun_tracing_dtrace_JVM_activate0
Imagebase:0x7ff72ca40000
File size:71'680 bytes
MD5 hash:EF3179D498793BF4234F708D3BE28633
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:4
Start time:12:46:48
Start date:02/10/2024
Path:C:\Windows\System32\rundll32.exe
Wow64 process (32bit):false
Commandline:rundll32.exe "C:\Users\user\Desktop\file.dll",#1
Imagebase:0x7ff72ca40000
File size:71'680 bytes
MD5 hash:EF3179D498793BF4234F708D3BE28633
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:6
Start time:12:46:51
Start date:02/10/2024
Path:C:\Windows\System32\rundll32.exe
Wow64 process (32bit):false
Commandline:rundll32.exe C:\Users\user\Desktop\file.dll,Java_sun_tracing_dtrace_JVM_defineClass0
Imagebase:0x7ff72ca40000
File size:71'680 bytes
MD5 hash:EF3179D498793BF4234F708D3BE28633
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:9
Start time:12:46:53
Start date:02/10/2024
Path:C:\Windows\System32\WerFault.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\WerFault.exe -u -p 2836 -s 328
Imagebase:0x7ff7f8ca0000
File size:570'736 bytes
MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:11
Start time:12:46:54
Start date:02/10/2024
Path:C:\Windows\System32\rundll32.exe
Wow64 process (32bit):false
Commandline:rundll32.exe C:\Users\user\Desktop\file.dll,Java_sun_tracing_dtrace_JVM_dispose0
Imagebase:0x7ff72ca40000
File size:71'680 bytes
MD5 hash:EF3179D498793BF4234F708D3BE28633
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:12
Start time:12:46:57
Start date:02/10/2024
Path:C:\Windows\System32\rundll32.exe
Wow64 process (32bit):false
Commandline:rundll32.exe "C:\Users\user\Desktop\file.dll",Java_sun_tracing_dtrace_JVM_activate0
Imagebase:0x7ff72ca40000
File size:71'680 bytes
MD5 hash:EF3179D498793BF4234F708D3BE28633
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:13
Start time:12:46:57
Start date:02/10/2024
Path:C:\Windows\System32\rundll32.exe
Wow64 process (32bit):false
Commandline:rundll32.exe "C:\Users\user\Desktop\file.dll",Java_sun_tracing_dtrace_JVM_defineClass0
Imagebase:0x7ff72ca40000
File size:71'680 bytes
MD5 hash:EF3179D498793BF4234F708D3BE28633
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:14
Start time:12:46:57
Start date:02/10/2024
Path:C:\Windows\System32\rundll32.exe
Wow64 process (32bit):false
Commandline:rundll32.exe "C:\Users\user\Desktop\file.dll",Java_sun_tracing_dtrace_JVM_dispose0
Imagebase:0x7ff72ca40000
File size:71'680 bytes
MD5 hash:EF3179D498793BF4234F708D3BE28633
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:15
Start time:12:46:57
Start date:02/10/2024
Path:C:\Windows\System32\rundll32.exe
Wow64 process (32bit):false
Commandline:rundll32.exe "C:\Users\user\Desktop\file.dll",Java_sun_tracing_dtrace_JVM_isSupported0
Imagebase:0x7ff72ca40000
File size:71'680 bytes
MD5 hash:EF3179D498793BF4234F708D3BE28633
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Target ID:16
Start time:12:46:57
Start date:02/10/2024
Path:C:\Windows\System32\rundll32.exe
Wow64 process (32bit):false
Commandline:rundll32.exe "C:\Users\user\Desktop\file.dll",Java_sun_tracing_dtrace_JVM_isEnabled0
Imagebase:0x7ff72ca40000
File size:71'680 bytes
MD5 hash:EF3179D498793BF4234F708D3BE28633
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Target ID:18
Start time:12:46:58
Start date:02/10/2024
Path:C:\Windows\System32\WerFault.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\WerFault.exe -u -p 3500 -s 324
Imagebase:0x7ff7f8ca0000
File size:570'736 bytes
MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Reset < >

    Execution Graph

    Execution Coverage:2%
    Dynamic/Decrypted Code Coverage:0%
    Signature Coverage:7.4%
    Total number of Nodes:54
    Total number of Limit Nodes:1
    execution_graph 568 7ff8bfab1000 569 7ff8bfab1036 568->569 572 7ff8bfab103b 568->572 579 7ff8bfab1a48 malloc 569->579 571 7ff8bfab112c 572->571 573 7ff8bfab1082 calloc 572->573 574 7ff8bfab10da 573->574 577 7ff8bfab1098 573->577 575 7ff8bfab111e free 574->575 576 7ff8bfab110b free 574->576 575->571 576->575 576->576 577->574 586 7ff8bfab1824 577->586 580 7ff8bfab1b27 579->580 581 7ff8bfab1a69 GetModuleHandleA 579->581 580->572 582 7ff8bfab1a8e 6 API calls 581->582 583 7ff8bfab1a7e free 581->583 584 7ff8bfab1b00 582->584 585 7ff8bfab1b1c free 582->585 583->580 584->580 584->585 585->580 587 7ff8bfab184f 586->587 588 7ff8bfab18e5 calloc 587->588 589 7ff8bfab1913 587->589 588->589 589->577 590 7ff8bfab1340 591 7ff8bfab1352 590->591 592 7ff8bfab1357 590->592 593 7ff8bfab1a48 10 API calls 591->593 593->592 594 7ff8bfab22c0 595 7ff8bfab22e4 __scrt_initialize_onexit_tables 594->595 596 7ff8bfab2904 _seh_filter_dll 595->596 597 7ff8bfab1f24 598 7ff8bfab1f40 597->598 599 7ff8bfab1f45 597->599 601 7ff8bfab20e0 598->601 602 7ff8bfab2103 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 601->602 603 7ff8bfab2177 601->603 602->603 603->599 567 7ff8bfab2975 __scrt_dllmain_exception_filter 541 7ff8bfab114c 542 7ff8bfab12b2 541->542 543 7ff8bfab119a 541->543 553 7ff8bfab1bd0 542->553 543->542 544 7ff8bfab11a2 malloc 543->544 544->542 548 7ff8bfab11b7 544->548 547 7ff8bfab12a4 free 547->542 548->547 550 7ff8bfab1234 548->550 551 7ff8bfab121e malloc 548->551 549 7ff8bfab129b free 549->547 550->547 550->549 551->547 552 7ff8bfab1232 551->552 552->550 554 7ff8bfab1bda 553->554 555 7ff8bfab12c4 554->555 556 7ff8bfab1f98 IsProcessorFeaturePresent 554->556 557 7ff8bfab1faf 556->557 562 7ff8bfab206c RtlCaptureContext 557->562 563 7ff8bfab2086 RtlLookupFunctionEntry 562->563 564 7ff8bfab1fc2 563->564 565 7ff8bfab209c RtlVirtualUnwind 563->565 566 7ff8bfab1f64 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 564->566 565->563 565->564

    Callgraph

    • Executed
    • Not Executed
    • Opacity -> Relevance
    • Disassembly available
    callgraph 0 Function_00007FF8BFAB21B0 1 Function_00007FF8BFAB23B0 21 Function_00007FF8BFAB2584 1->21 38 Function_00007FF8BFAB28D0 1->38 2 Function_00007FF8BFAB2234 2->38 44 Function_00007FF8BFAB28C8 2->44 46 Function_00007FF8BFAB274C 2->46 3 Function_00007FF8BFAB29AB 4 Function_00007FF8BFAB2928 5 Function_00007FF8BFAB22A8 5->4 6 Function_00007FF8BFAB292C 7 Function_00007FF8BFAB16A0 8 Function_00007FF8BFAB2320 8->6 8->38 9 Function_00007FF8BFAB2524 9->38 10 Function_00007FF8BFAB1F24 29 Function_00007FF8BFAB20E0 10->29 11 Function_00007FF8BFAB1824 11->7 13 Function_00007FF8BFAB1388 11->13 12 Function_00007FF8BFAB251A 14 Function_00007FF8BFAB2488 15 Function_00007FF8BFAB218C 16 Function_00007FF8BFAB270C 17 Function_00007FF8BFAB1F0D 18 Function_00007FF8BFAB1300 19 Function_00007FF8BFAB1000 19->11 43 Function_00007FF8BFAB1A48 19->43 20 Function_00007FF8BFAB2280 20->4 23 Function_00007FF8BFAB257C 21->23 22 Function_00007FF8BFAB21F8 22->38 24 Function_00007FF8BFAB2574 25 Function_00007FF8BFAB1BF4 25->0 25->5 25->8 25->9 25->14 25->15 25->16 25->21 25->22 25->24 25->25 27 Function_00007FF8BFAB2268 25->27 32 Function_00007FF8BFAB2364 25->32 35 Function_00007FF8BFAB21DC 25->35 36 Function_00007FF8BFAB26D0 25->36 37 Function_00007FF8BFAB2350 25->37 42 Function_00007FF8BFAB2548 25->42 50 Function_00007FF8BFAB21C0 25->50 26 Function_00007FF8BFAB2975 27->1 28 Function_00007FF8BFAB206C 30 Function_00007FF8BFAB12E0 31 Function_00007FF8BFAB1F64 32->4 32->46 33 Function_00007FF8BFAB1B58 34 Function_00007FF8BFAB2959 34->37 40 Function_00007FF8BFAB21D4 35->40 47 Function_00007FF8BFAB21CC 35->47 37->4 39 Function_00007FF8BFAB1BD0 39->28 39->31 41 Function_00007FF8BFAB274A 42->4 45 Function_00007FF8BFAB114C 45->39 48 Function_00007FF8BFAB2942 49 Function_00007FF8BFAB1340 49->43 51 Function_00007FF8BFAB22C0 51->38 52 Function_00007FF8BFAB1B38 52->33

    Control-flow Graph

    APIs
    Memory Dump Source
    • Source File: 00000006.00000002.2304480150.00007FF8BFAB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8BFAB0000, based on PE: true
    • Associated: 00000006.00000002.2304450772.00007FF8BFAB0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000006.00000002.2304495353.00007FF8BFAB3000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000006.00000002.2304510210.00007FF8BFAB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_6_2_7ff8bfab0000_rundll32.jbxd
    Similarity
    • API ID: freemalloc
    • String ID:
    • API String ID: 3061335427-0
    • Opcode ID: d83fed59c239068870401c71ee476ef8cd99d9a132b4ab097894b0f370469684
    • Instruction ID: 7dd848ee08bfe8cfa8f926fa10211b164c433babc0c585a1278be126cc5aefae
    • Opcode Fuzzy Hash: d83fed59c239068870401c71ee476ef8cd99d9a132b4ab097894b0f370469684
    • Instruction Fuzzy Hash: A8419F22709BC585EE688F5AA5553BA6BA0FF88FC8F082031CF4E43756DF3CE0558600

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000006.00000002.2304480150.00007FF8BFAB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8BFAB0000, based on PE: true
    • Associated: 00000006.00000002.2304450772.00007FF8BFAB0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000006.00000002.2304495353.00007FF8BFAB3000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000006.00000002.2304510210.00007FF8BFAB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_6_2_7ff8bfab0000_rundll32.jbxd
    Similarity
    • API ID: AddressProc$free$FreeHandleLibraryModulemalloc
    • String ID: JVM_DTraceActivate$JVM_DTraceDispose$JVM_DTraceGetVersion$JVM_DTraceIsProbeEnabled$JVM_DTraceIsSupported$jvm.dll
    • API String ID: 4013426164-285299422
    • Opcode ID: 6283937f83dac059ded7eecdf2e2cae91b8857e5ad5ada0c060b5c66e07cf9d6
    • Instruction ID: 73f7f88abffb7cc11b353aaf2652d3b2934c2663ddc1ce1851838be2c8ad9550
    • Opcode Fuzzy Hash: 6283937f83dac059ded7eecdf2e2cae91b8857e5ad5ada0c060b5c66e07cf9d6
    • Instruction Fuzzy Hash: 2621DB25A08F0291EB1DAF99E95633427A1FF48BCCF446035CB4E062A6EF7CE468D340

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 41 7ff8bfab1bf4-7ff8bfab1bfa 42 7ff8bfab1c35-7ff8bfab1c3f 41->42 43 7ff8bfab1bfc-7ff8bfab1bff 41->43 46 7ff8bfab1d60-7ff8bfab1d7c 42->46 44 7ff8bfab1c01-7ff8bfab1c04 43->44 45 7ff8bfab1c29-7ff8bfab1c68 call 7ff8bfab2364 43->45 47 7ff8bfab1c06-7ff8bfab1c09 44->47 48 7ff8bfab1c1c __scrt_dllmain_crt_thread_attach 44->48 61 7ff8bfab1c82-7ff8bfab1c97 call 7ff8bfab21f8 45->61 62 7ff8bfab1c6a 45->62 49 7ff8bfab1d90-7ff8bfab1dab call 7ff8bfab21f8 46->49 50 7ff8bfab1d7e 46->50 52 7ff8bfab1c15-7ff8bfab1c1a call 7ff8bfab22a8 47->52 53 7ff8bfab1c0b-7ff8bfab1c14 47->53 56 7ff8bfab1c21-7ff8bfab1c28 48->56 64 7ff8bfab1de2-7ff8bfab1e14 call 7ff8bfab2584 49->64 65 7ff8bfab1dad-7ff8bfab1de0 call 7ff8bfab2320 call 7ff8bfab21c0 call 7ff8bfab270c call 7ff8bfab2350 call 7ff8bfab2524 call 7ff8bfab2548 49->65 54 7ff8bfab1d80-7ff8bfab1d8f 50->54 52->56 73 7ff8bfab1d51-7ff8bfab1d5f call 7ff8bfab2584 61->73 74 7ff8bfab1c9d-7ff8bfab1cae call 7ff8bfab2268 61->74 66 7ff8bfab1c6c-7ff8bfab1c81 62->66 75 7ff8bfab1e16-7ff8bfab1e1c 64->75 76 7ff8bfab1e25-7ff8bfab1e2b 64->76 65->54 73->46 94 7ff8bfab1cb0-7ff8bfab1cd4 call 7ff8bfab26d0 call 7ff8bfab21b0 call 7ff8bfab21dc call 7ff8bfab28fe 74->94 95 7ff8bfab1cff-7ff8bfab1d09 call 7ff8bfab2524 74->95 75->76 80 7ff8bfab1e1e-7ff8bfab1e20 75->80 81 7ff8bfab1e72-7ff8bfab1e88 call 7ff8bfab218c 76->81 82 7ff8bfab1e2d-7ff8bfab1e37 76->82 88 7ff8bfab1f15-7ff8bfab1f22 80->88 100 7ff8bfab1ec2-7ff8bfab1ec4 81->100 101 7ff8bfab1e8a-7ff8bfab1e8c 81->101 89 7ff8bfab1e43-7ff8bfab1e51 82->89 90 7ff8bfab1e39-7ff8bfab1e41 82->90 91 7ff8bfab1e57-7ff8bfab1e6c call 7ff8bfab1bf4 89->91 106 7ff8bfab1f0b-7ff8bfab1f13 89->106 90->91 91->81 91->106 94->95 140 7ff8bfab1cd6-7ff8bfab1cdd __scrt_dllmain_after_initialize_c 94->140 95->62 113 7ff8bfab1d0f-7ff8bfab1d1b call 7ff8bfab2574 95->113 103 7ff8bfab1ec6-7ff8bfab1ec9 100->103 104 7ff8bfab1ecb-7ff8bfab1ee0 call 7ff8bfab1bf4 100->104 101->100 109 7ff8bfab1e8e-7ff8bfab1eb2 call 7ff8bfab218c call 7ff8bfab1bf4 101->109 103->104 103->106 104->106 122 7ff8bfab1ee2-7ff8bfab1eec 104->122 106->88 109->100 136 7ff8bfab1eb4-7ff8bfab1eb9 109->136 130 7ff8bfab1d41-7ff8bfab1d4c 113->130 131 7ff8bfab1d1d-7ff8bfab1d27 call 7ff8bfab2488 113->131 127 7ff8bfab1ef7-7ff8bfab1f07 122->127 128 7ff8bfab1eee-7ff8bfab1ef5 122->128 127->106 128->106 130->66 131->130 141 7ff8bfab1d29-7ff8bfab1d37 131->141 136->100 140->95 142 7ff8bfab1cdf-7ff8bfab1cfc call 7ff8bfab28f8 140->142 141->130 142->95
    APIs
    Memory Dump Source
    • Source File: 00000006.00000002.2304480150.00007FF8BFAB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8BFAB0000, based on PE: true
    • Associated: 00000006.00000002.2304450772.00007FF8BFAB0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000006.00000002.2304495353.00007FF8BFAB3000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000006.00000002.2304510210.00007FF8BFAB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_6_2_7ff8bfab0000_rundll32.jbxd
    Similarity
    • API ID: Initialize__scrt_acquire_startup_lock__scrt_fastfail__scrt_release_startup_lock$__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_initialize_crt__scrt_initialize_default_local_stdio_options__scrt_is_nonwritable_in_current_image__scrt_uninitialize_crt
    • String ID:
    • API String ID: 627783611-0
    • Opcode ID: 660b85fbaeb59edb467afbb2171c401c2ab3a6df28f1056619c4f50a47a948e5
    • Instruction ID: 568fca98af8c8ff807e75290505e2aa7db0e5ac5516ee9f1e21702ac470a80e6
    • Opcode Fuzzy Hash: 660b85fbaeb59edb467afbb2171c401c2ab3a6df28f1056619c4f50a47a948e5
    • Instruction Fuzzy Hash: E8918E21E0CE4385FA5DABEEA4532792BD4AF457C8F546136DB0D87697DE3CE8428700

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 145 7ff8bfab1824-7ff8bfab185f 148 7ff8bfab1865-7ff8bfab1892 145->148 149 7ff8bfab1a28 145->149 148->149 153 7ff8bfab1898-7ff8bfab18ba 148->153 150 7ff8bfab1a2a-7ff8bfab1a44 149->150 153->149 156 7ff8bfab18c0-7ff8bfab18df 153->156 156->149 159 7ff8bfab18e5-7ff8bfab1922 calloc 156->159 159->149 162 7ff8bfab1928-7ff8bfab194a 159->162 162->149 165 7ff8bfab1950-7ff8bfab19ca call 7ff8bfab1388 * 5 162->165 165->149 177 7ff8bfab19cc-7ff8bfab19d1 165->177 178 7ff8bfab19d3-7ff8bfab19f4 177->178 179 7ff8bfab1a21-7ff8bfab1a26 177->179 178->149 182 7ff8bfab19f6-7ff8bfab1a18 call 7ff8bfab16a0 178->182 179->150 182->149 186 7ff8bfab1a1a-7ff8bfab1a1f 182->186 186->178 186->179
    APIs
    • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF8BFAB10D0), ref: 00007FF8BFAB18EC
    Strings
    Memory Dump Source
    • Source File: 00000006.00000002.2304480150.00007FF8BFAB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8BFAB0000, based on PE: true
    • Associated: 00000006.00000002.2304450772.00007FF8BFAB0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000006.00000002.2304495353.00007FF8BFAB3000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000006.00000002.2304510210.00007FF8BFAB6000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_6_2_7ff8bfab0000_rundll32.jbxd
    Similarity
    • API ID: calloc
    • String ID: ()Ljava/lang/String;$()[Lsun/tracing/dtrace/DTraceProbe;$com/sun/tracing/dtrace/ArgsAttributes$com/sun/tracing/dtrace/FunctionAttributes$com/sun/tracing/dtrace/ModuleAttributes$com/sun/tracing/dtrace/NameAttributes$com/sun/tracing/dtrace/ProviderAttributes$getProbes$getProviderName
    • API String ID: 2635317215-2991031166
    • Opcode ID: 49be9ec7ba34a3d14460ac5d9e4f98d17bbcdf745ecbeafa6806f1296b8bba78
    • Instruction ID: fa49cf1aa60d8aef89fbdffc3d8234bd9cdc23ea28593425931129dc08b1d1f2
    • Opcode Fuzzy Hash: 49be9ec7ba34a3d14460ac5d9e4f98d17bbcdf745ecbeafa6806f1296b8bba78
    • Instruction Fuzzy Hash: FF515966714F4582EB08DFAAD8552A967A0FB49FC8B486436DF0E03766DF3CE459C340