File name:

03703538020f226e3a93c3e4bc98a9e72c3766d1.dll

Full analysis: https://app.any.run/tasks/c9c4beca-d8fd-4a70-ae8c-41e9c369a33c
Verdict: Malicious activity
Analysis date: November 08, 2024, 15:44:53
OS: Windows 10 Professional (build: 19045, 64 bit)
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, 10 sections
MD5:

3C7810724BE82752B7403F531B2FFA96

SHA1:

03703538020F226E3A93C3E4BC98A9E72C3766D1

SHA256:

10FC720A537810EB0491D795E54F8C97D4B4FB2D6AC863DE2E628FDF2FFAE892

SSDEEP:

196608:XLEIfVW0rsq4aK7F85gvYQhVF7dfdIJUxTSBIQ:Vaq9K7e5gvYQhVz1Iex0

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Executes application which crashes

      • rundll32.exe (PID: 6392)
    • Sets XML DOM element text (SCRIPT)

      • splwow64.exe (PID: 3104)
    • There is functionality for communication over UDP network (YARA)

      • rundll32.exe (PID: 6392)
    • There is functionality for taking screenshot (YARA)

      • rundll32.exe (PID: 6392)
  • INFO

    • Reads security settings of Internet Explorer

      • splwow64.exe (PID: 3104)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable (generic) (52.9)
.exe | Generic Win/DOS Executable (23.5)
.exe | DOS Executable Generic (23.5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 1992:06:19 22:22:17+00:00
ImageFileCharacteristics: Executable, No line numbers, No symbols, Bytes reversed lo, 32-bit, DLL, Bytes reversed hi
PEType: PE32
LinkerVersion: 2.25
CodeSize: 17218560
InitializedDataSize: 9776640
UninitializedDataSize: -
EntryPoint: 0x1e04d3d
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
133
Monitored processes
4
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start THREAT rundll32.exe splwow64.exe no specs werfault.exe werfault.exe

Process information

PID
CMD
Path
Indicators
Parent process
3104C:\WINDOWS\splwow64.exe 8192C:\Windows\splwow64.exerundll32.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Print driver host for applications
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\splwow64.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
6172C:\WINDOWS\SysWOW64\WerFault.exe -u -p 6392 -s 968C:\Windows\SysWOW64\WerFault.exe
rundll32.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
6392"C:\WINDOWS\SysWOW64\rundll32.exe" C:\Users\admin\AppData\Local\Temp\03703538020f226e3a93c3e4bc98a9e72c3766d1.dll, #1C:\Windows\SysWOW64\rundll32.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
3221226525
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\aclayers.dll
6996C:\WINDOWS\SysWOW64\WerFault.exe -u -p 6392 -s 920C:\Windows\SysWOW64\WerFault.exe
rundll32.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
Total events
6 719
Read events
6 718
Write events
1
Delete events
0

Modification events

(PID) Process:(3104) splwow64.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Script\Settings\Telemetry\splwow64.exe
Operation:writeName:JScriptSetScriptStateStarted
Value:
B9E7080000000000
Executable files
0
Suspicious files
8
Text files
4
Unknown types
0

Dropped files

PID
Process
Filename
Type
6172WerFault.exeC:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_rundll32.exe_3f2f4bfc420fd56cba823c7c69daac385f1a193_67c333ae_fd48d246-c1ea-4166-904f-8a4b79fce1b1\Report.wer
MD5:
SHA256:
6996WerFault.exeC:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_rundll32.exe_15646f54945aba3e82e21ce0a925ba5d42d2ef_67c333ae_66eb0fce-640a-4ec8-9d5e-233c871a48d9\Report.wer
MD5:
SHA256:
6172WerFault.exeC:\Users\admin\AppData\Local\CrashDumps\rundll32.exe.6392.dmpbinary
MD5:D7924BFE3568C2928ED0825CA2A085E3
SHA256:5963C85C998D730A9D760C61309F69619E9B0DCF62E57AFA78291AD480DB78BA
6172WerFault.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\37C951188967C8EB88D99893D9D191FEder
MD5:F0CF5B1794ECA7CD73F9C020DAAB8EF2
SHA256:2AF00EDCE7EF3266897E52DC81E8DE3B7A079028C0F1F96EAFF9E38AD342F617
6996WerFault.exeC:\Users\admin\AppData\Local\CrashDumps\rundll32.exe(1).6392.dmpdmp
MD5:D2DA2ECA18A48DAC49DCA81529564742
SHA256:95CD460A702F0AAE03AEF9C0BE80C32932165A5CC4DB8FC98BFB9E40E4D3DB0C
6172WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WEREC1E.tmp.dmpbinary
MD5:25613EEDB36E12E08A53696526B8BA0A
SHA256:FD510041D4A98539DE0F5B7EA621EA037F990927566258626FA64FEBC8BCF701
6172WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WEREE04.tmp.xmlxml
MD5:545E6A8D46E21FC0F137427413573A2B
SHA256:0EDF7A60ED1024D23C17B67CFE9B5F13A7C79BA27B0F4C36F91CD724C95A5603
6172WerFault.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\37C951188967C8EB88D99893D9D191FEbinary
MD5:0892571A4DEBD9F22671F7B84899A8AD
SHA256:A6BA5F91F4229D36682276BF174AB8E5A45495948C9B747CBF8F2559380D0447
6172WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERED57.tmp.WERInternalMetadata.xmlxml
MD5:B907F615B1229611DD7E9667B865E08D
SHA256:FB46398DDCE8D575B57A420C4CE6593DE8C4EF0B62B9E919B805AD6256F9A7EA
6172WerFault.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\21253908F3CB05D51B1C2DA8B681A785binary
MD5:6245A9A8AB4D5042D603383FED082560
SHA256:3218E01740698C340E5EE02ACB208D1139D590A6F70FCCF47ED8C5693B1C7676
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
9
TCP/UDP connections
41
DNS requests
23
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
2.16.164.49:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
1880
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
6160
SIHClient.exe
GET
200
23.218.209.163:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
6160
SIHClient.exe
GET
200
23.218.209.163:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
6676
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
6172
WerFault.exe
GET
200
23.48.23.176:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6172
WerFault.exe
GET
200
23.218.209.163:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
5488
MoUsoCoreWorker.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2.16.164.49:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
88.221.169.152:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
4360
SearchApp.exe
2.23.209.177:443
www.bing.com
Akamai International B.V.
GB
whitelisted
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
1880
svchost.exe
40.126.32.138:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1880
svchost.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 51.104.136.2
  • 4.231.128.59
  • 51.124.78.146
whitelisted
crl.microsoft.com
  • 2.16.164.49
  • 2.16.164.9
  • 23.48.23.176
  • 23.48.23.143
  • 23.48.23.156
whitelisted
www.microsoft.com
  • 88.221.169.152
  • 23.218.209.163
whitelisted
google.com
  • 142.250.185.174
whitelisted
www.bing.com
  • 2.23.209.177
  • 2.23.209.158
  • 2.23.209.179
  • 2.23.209.156
  • 2.23.209.176
  • 2.23.209.160
  • 2.23.209.181
  • 2.23.209.182
  • 2.23.209.183
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
login.live.com
  • 40.126.32.138
  • 40.126.32.72
  • 40.126.32.136
  • 40.126.32.74
  • 40.126.32.76
  • 40.126.32.140
  • 20.190.160.22
  • 40.126.32.133
whitelisted
th.bing.com
  • 2.23.209.137
  • 2.23.209.149
  • 2.23.209.141
  • 2.23.209.185
  • 2.23.209.150
  • 2.23.209.144
  • 2.23.209.189
  • 2.23.209.140
  • 2.23.209.183
whitelisted
go.microsoft.com
  • 184.28.89.167
whitelisted
slscr.update.microsoft.com
  • 4.245.163.56
whitelisted

Threats

No threats detected
No debug info