File name:

mediadrm.dll

Full analysis: https://app.any.run/tasks/bcdd0f3d-fb45-4fff-b116-cab0305e0af8
Verdict: Malicious activity
Analysis date: February 03, 2025, 23:56:54
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
mimikatz
tools
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (DLL) (GUI) x86-64, for MS Windows, 7 sections
MD5:

BE57543E1B5B2978ABF5D27690AECEAC

SHA1:

95BCBBE4B6745D42CC1B4B56838E6CB04F136B02

SHA256:

D4F421C985F1786F603BD1EAF4232D5A0D56B5EE8A7F02E0DA978B478F060AF2

SSDEEP:

3072:yz4Ml0f7uqplcpBIvWLI3hf11Eei6wlAS9kP4QPMMMMMKrB5tp/MMMMM5a:yz4Ml0fCqvcpWr1Q6wlAS9E4QFtl

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • MIMIKATZ has been detected (YARA)

      • rundll32.exe (PID: 6460)
  • SUSPICIOUS

    • Executes application which crashes

      • rundll32.exe (PID: 6460)
    • The process creates files with name similar to system file names

      • WerFault.exe (PID: 6600)
  • INFO

    • Reads the software policy settings

      • WerFault.exe (PID: 6600)
    • Checks proxy server information

      • WerFault.exe (PID: 6600)
    • Creates files or folders in the user directory

      • WerFault.exe (PID: 6600)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (87.3)
.exe | Generic Win/DOS Executable (6.3)
.exe | DOS Executable Generic (6.3)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2024:12:03 08:15:20+00:00
ImageFileCharacteristics: Executable, Large address aware, DLL
PEType: PE32+
LinkerVersion: 14.29
CodeSize: 87040
InitializedDataSize: 58368
UninitializedDataSize: -
EntryPoint: 0x1650
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
134
Monitored processes
2
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #MIMIKATZ rundll32.exe werfault.exe

Process information

PID
CMD
Path
Indicators
Parent process
6460"C:\WINDOWS\System32\rundll32.exe" C:\Users\admin\AppData\Local\Temp\mediadrm.dll, #1C:\Windows\System32\rundll32.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
3221225477
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shcore.dll
c:\windows\system32\imagehlp.dll
6600C:\WINDOWS\system32\WerFault.exe -u -p 6460 -s 368C:\Windows\System32\WerFault.exe
rundll32.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\cryptsp.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\oleaut32.dll
Total events
3 262
Read events
3 262
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
7
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
6600WerFault.exeC:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_rundll32.exe_med_0e1628e4f9892e7b6ffff8a3fcac344a89f24_2687568e_3ad1fb42-8fa9-4dea-aa5d-a68344d4a6f1\Report.wer
MD5:
SHA256:
6600WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WER5A48.tmp.dmpbinary
MD5:E83743E5AE6FB0C38F82CA3311CAD268
SHA256:FE63C64A4079A6FCA4AD43735861F381B264C0FA84486F20D94DCB830EE6D637
6600WerFault.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\37C951188967C8EB88D99893D9D191FEbinary
MD5:B9A405D195C88049697EB94A15006C74
SHA256:C911207D174871B9216FBCCF8111118AB0D91CAFDE47C907AACD9C4670060236
6600WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WER5DD5.tmp.xmlxml
MD5:685647545263C509A0AB5559F7AA472E
SHA256:5C6363591FCD499E544554668334C1770B68C26D2B8001A52DE5DEAF1612125E
6600WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WER5D95.tmp.WERInternalMetadata.xmlbinary
MD5:949E614E8CBD0ADFA6A3EF9716BE8198
SHA256:EB313A65E505766A328C3531D42FBF761EB65F264CB981595723DD103076CD13
6600WerFault.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\37C951188967C8EB88D99893D9D191FEbinary
MD5:FA84E4BCC92AA5DB735AB50711040CDE
SHA256:6D7205E794FDE4219A62D9692ECDDF612663A5CF20399E79BE87B851FCA4CA33
6600WerFault.exeC:\Users\admin\AppData\Local\CrashDumps\rundll32.exe.6460.dmpbinary
MD5:432A424A6932CAED29B77D5A53862CBF
SHA256:520C74C7208946AEAD8CDB34C9E1CAD5379115A9B4C4B5B2B4B7277D752DF967
6600WerFault.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\21253908F3CB05D51B1C2DA8B681A785binary
MD5:680B0331A3CC8FCCE16367586EC7A721
SHA256:19F1B5D2C7F62663C14D97578411DC610E5F33E6CE4165977314442435F15305
6600WerFault.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\21253908F3CB05D51B1C2DA8B681A785binary
MD5:C6A8271DCB347155BB0003258DC83AA8
SHA256:5E90D25788510F9FF3C2C9604969829D2877FB500DD5BF840E3694B1020A373F
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
29
DNS requests
15
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
6600
WerFault.exe
GET
200
95.101.78.42:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6600
WerFault.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4876
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
4876
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
4648
backgroundTaskHost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4712
MoUsoCoreWorker.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1176
svchost.exe
20.190.160.17:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
184.30.131.245:80
ocsp.digicert.com
AKAMAI-AS
US
whitelisted
4
System
192.168.100.255:138
whitelisted
1076
svchost.exe
184.28.89.167:443
go.microsoft.com
AKAMAI-AS
US
whitelisted
1140
RUXIMICS.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4712
MoUsoCoreWorker.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6600
WerFault.exe
20.42.65.92:443
watson.events.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
6600
WerFault.exe
95.101.78.42:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
6600
WerFault.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
login.live.com
  • 20.190.160.17
  • 20.190.160.22
  • 40.126.32.140
  • 20.190.160.132
  • 20.190.160.128
  • 40.126.32.133
  • 20.190.160.64
  • 20.190.160.20
whitelisted
go.microsoft.com
  • 184.28.89.167
whitelisted
settings-win.data.microsoft.com
  • 40.127.240.158
  • 51.124.78.146
  • 20.73.194.208
whitelisted
watson.events.data.microsoft.com
  • 20.42.65.92
whitelisted
crl.microsoft.com
  • 95.101.78.42
  • 95.101.78.32
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
arc.msn.com
  • 20.223.35.26
whitelisted
ocsp.digicert.com
  • 184.30.131.245
whitelisted
fd.api.iris.microsoft.com
  • 20.199.58.43
whitelisted
slscr.update.microsoft.com
  • 4.175.87.197
whitelisted

Threats

No threats detected
No debug info