File name:

actiV.bin

Full analysis: https://app.any.run/tasks/176367d0-48d2-40c1-97e8-77ce20faa565
Verdict: Malicious activity
Threats:

Dridex is a very evasive and technically complex banking trojan. Despite being based on a relatively old malware code, it was substantially updated over the years and became capable of using very effective infiltration techniques that make this malware especially dangerous.

Analysis date: February 05, 2019, 19:44:27
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
dridex
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (console) Intel 80386, for MS Windows
MD5:

57A42E1B04FE508838AD375DD707C0B0

SHA1:

1BE37077FB27BF26D83CEAE3903C50E0B6B43874

SHA256:

9F6E3E65AEDCA997C6445329663BD1D279392A34CFDA7D1B56461EB41641FA08

SSDEEP:

3072:SpukXprAmpUyPpeqzaenEy9tDyUGMB87bCPLf4iUWsXkzdk:kuktayPjBEGtDpx8nGL5sU

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Starts NET.EXE for network exploration

      • raserver.exe (PID: 3408)
    • Connects to unusual port

      • raserver.exe (PID: 3408)
    • Uses WHOAMI.EXE to obtaining logged on user information

      • raserver.exe (PID: 3408)
    • Searches for installed software

      • raserver.exe (PID: 3408)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.dll | Win32 Dynamic Link Library (generic) (38.3)
.exe | Win32 Executable (generic) (26.2)
.exe | Win16/32 Executable Delphi generic (12)
.exe | Generic Win/DOS Executable (11.6)
.exe | DOS Executable Generic (11.6)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2019:01:28 00:39:24+01:00
PEType: PE32
LinkerVersion: 11
CodeSize: 94208
InitializedDataSize: 57344
UninitializedDataSize: -
EntryPoint: 0x2f70
OSVersion: 5
ImageVersion: -
SubsystemVersion: 5
Subsystem: Windows command line
FileVersionNumber: 4.10.1.40
ProductVersionNumber: 1.40.0.0
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Windows, Latin1
CompanyName: EnTech Taiwan
FileDescription: DirecPLL Library
FileVersion: 4.10.01.40
InternalName: DirecPLL
LegalCopyright: Copyright © EnTech Taiwan 2001-2003
OriginalFileName: DirecPLL.DLL
No data.
screenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
38
Monitored processes
5
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start activ.bin.exe raserver.exe whoami.exe no specs nslookup.exe net.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2100C:\Windows\system32\whoami.exe /allC:\Windows\system32\whoami.exeraserver.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
whoami - displays logged on user information
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\whoami.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2932C:\Windows\system32\nslookup.exe -type=any localhostC:\Windows\system32\nslookup.exe
raserver.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
nslookup
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\nslookup.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\wsock32.dll
c:\windows\system32\ws2_32.dll
3064"C:\Users\admin\AppData\Local\Temp\actiV.bin.exe" C:\Users\admin\AppData\Local\Temp\actiV.bin.exe
explorer.exe
User:
admin
Company:
EnTech Taiwan
Integrity Level:
MEDIUM
Description:
DirecPLL Library
Exit code:
0
Version:
4.10.01.40
Modules
Images
c:\users\admin\appdata\local\temp\activ.bin.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
3408C:\Windows\system32\raserver.exe "C:\Users\admin\AppData\Local\Temp\actiV.bin.exe"C:\Windows\system32\raserver.exe
actiV.bin.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Remote Assistance COM Server
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\raserver.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
3880C:\Windows\system32\net.exe viewC:\Windows\system32\net.exeraserver.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Net Command
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\net.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\netutils.dll
c:\windows\system32\browcli.dll
Total events
173
Read events
145
Write events
28
Delete events
0

Modification events

(PID) Process:(3408) raserver.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\raserver_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(3408) raserver.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\raserver_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(3408) raserver.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\raserver_RASAPI32
Operation:writeName:FileTracingMask
Value:
4294901760
(PID) Process:(3408) raserver.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\raserver_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
4294901760
(PID) Process:(3408) raserver.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\raserver_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(3408) raserver.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\raserver_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
(PID) Process:(3408) raserver.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\raserver_RASMANCS
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(3408) raserver.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\raserver_RASMANCS
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(3408) raserver.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\raserver_RASMANCS
Operation:writeName:FileTracingMask
Value:
4294901760
(PID) Process:(3408) raserver.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\raserver_RASMANCS
Operation:writeName:ConsoleTracingMask
Value:
4294901760
Executable files
0
Suspicious files
4
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
3408raserver.exeC:\Users\admin\AppData\Local\Temp\oD3D1.tmp
MD5:
SHA256:
3408raserver.exeC:\Users\admin\AppData\Local\Temp\sID450.tmp
MD5:
SHA256:
3408raserver.exeC:\Users\admin\AppData\Local\Temp\8IgD51D.tmp
MD5:
SHA256:
3408raserver.exeC:\Users\admin\AppData\Local\Temp\CabE8F6.tmp
MD5:
SHA256:
3408raserver.exeC:\Users\admin\AppData\Local\Temp\TarE8F7.tmp
MD5:
SHA256:
3408raserver.exeC:\Users\admin\AppData\Local\Temp\CabE907.tmp
MD5:
SHA256:
3408raserver.exeC:\Users\admin\AppData\Local\Temp\TarE908.tmp
MD5:
SHA256:
3408raserver.exeC:\Users\admin\AppData\Local\Temp\CabEB1C.tmp
MD5:
SHA256:
3408raserver.exeC:\Users\admin\AppData\Local\Temp\TarEB1D.tmp
MD5:
SHA256:
3408raserver.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015binary
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
2
DNS requests
2
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3408
raserver.exe
GET
200
2.16.186.81:80
http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
unknown
compressed
55.2 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3408
raserver.exe
2.16.186.81:80
www.download.windowsupdate.com
Akamai International B.V.
whitelisted
3408
raserver.exe
192.241.220.183:3389
Digital Ocean, Inc.
US
malicious

DNS requests

Domain
IP
Reputation
localhost
  • 127.0.0.1
unknown
www.download.windowsupdate.com
  • 2.16.186.81
  • 2.16.186.56
whitelisted

Threats

PID
Process
Class
Message
3408
raserver.exe
A Network Trojan was detected
ET TROJAN ABUSE.CH SSL Blacklist Malicious SSL certificate detected (Dridex)
Process
Message
actiV.bin.exe
Installing...
actiV.bin.exe
Installing...
actiV.bin.exe
Installing...
actiV.bin.exe
Installing...
actiV.bin.exe
Installing...
actiV.bin.exe
Installing...
actiV.bin.exe
Installing...
actiV.bin.exe
Installing...
actiV.bin.exe
Installing...
actiV.bin.exe
Installing...