File name:

G2M.dll

Full analysis: https://app.any.run/tasks/961efa53-1340-4d1f-a19c-2ea12ee8128f
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: December 11, 2024, 18:18:05
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
shellrunner
loader
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, 10 sections
MD5:

7156D8F41FAD4E42455020396611D8CD

SHA1:

E20D3E8D89358A05E0675D981395013FE56A9330

SHA256:

E8816519768D257C11EA1FA0D1419510E36B360C0ED0F37851B4DCC5D1F2945E

SSDEEP:

98304:01amKBd+WWSyTwgGKmotzcqzUzr+5i/i/cIvRCrGhAhwTNgh/H7xm0G4G9Gy6eQi:X969nWKYor3KuxE7HDvaVHeF

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • SHELLRUNNER has been detected

      • rundll32.exe (PID: 7136)
      • WerFault.exe (PID: 6344)
  • SUSPICIOUS

    • Executes application which crashes

      • rundll32.exe (PID: 7136)
  • INFO

    • The sample compiled with english language support

      • rundll32.exe (PID: 7136)
    • Checks proxy server information

      • WerFault.exe (PID: 6344)
    • Creates files or folders in the user directory

      • WerFault.exe (PID: 6344)
    • Reads the software policy settings

      • WerFault.exe (PID: 6344)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Inno Setup installer (68.6)
.exe | Win32 EXE PECompact compressed (generic) (26)
.exe | Win32 Executable (generic) (2.8)
.exe | Generic Win/DOS Executable (1.2)
.exe | DOS Executable Generic (1.2)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2024:12:11 03:47:16+00:00
ImageFileCharacteristics: Executable, No line numbers, No symbols, Bytes reversed lo, 32-bit, DLL, Bytes reversed hi
PEType: PE32
LinkerVersion: 2.25
CodeSize: 2996736
InitializedDataSize: 42802176
UninitializedDataSize: -
EntryPoint: 0x2dd3cc
OSVersion: 5
ImageVersion: -
SubsystemVersion: 5
Subsystem: Windows GUI
FileVersionNumber: 3.4.3.5
ProductVersionNumber: 3.4.3.5
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Windows, Latin1
FileVersion: 3.4.3.5
ProductVersion: 3.4.3.5
ProgramID: com.embarcadero.G2M
FileDescription: G2M
ProductName: G2M
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
119
Monitored processes
2
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #SHELLRUNNER rundll32.exe #SHELLRUNNER werfault.exe

Process information

PID
CMD
Path
Indicators
Parent process
6344C:\WINDOWS\SysWOW64\WerFault.exe -u -p 7136 -s 776C:\Windows\SysWOW64\WerFault.exe
rundll32.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
7136"C:\WINDOWS\SysWOW64\rundll32.exe" C:\Users\admin\AppData\Local\Temp\G2M.dll, #1C:\Windows\SysWOW64\rundll32.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
3221225477
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\aclayers.dll
Total events
3 136
Read events
3 136
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
4
Text files
2
Unknown types
2

Dropped files

PID
Process
Filename
Type
6344WerFault.exeC:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_rundll32.exe_5b31221836048ab5fa79f6861d64da6b7b0bb2_67c333ae_4a7c8a3a-56a0-470c-a5ee-db359ea04fc8\Report.wer
MD5:
SHA256:
6344WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WER7F18.tmp.xmlxml
MD5:FB5C0574C8B70E1E864AE18D7AC6B26D
SHA256:A1CEE70F016A75B3703CDAD340DBECDDC753BDAE384E60DA7245738FF94B7D11
6344WerFault.exeC:\Users\admin\AppData\Local\CrashDumps\rundll32.exe.7136.dmpbinary
MD5:9205924BE3C887593359886620BED59D
SHA256:F0CB3A4750230F6B06CFD1A9CFFB40C3D1BC75BECD767AD3374C9775EF078FFA
6344WerFault.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\37C951188967C8EB88D99893D9D191FEder
MD5:F0CF5B1794ECA7CD73F9C020DAAB8EF2
SHA256:2AF00EDCE7EF3266897E52DC81E8DE3B7A079028C0F1F96EAFF9E38AD342F617
6344WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WER7EE8.tmp.WERInternalMetadata.xmlxml
MD5:5D5C7C14CAE3C5DF398CA8757EDDE991
SHA256:C871336B22767017F547ED94BAF16F8869238785A9CADFABDDC27A66C83A6BC1
6344WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WER7E0D.tmp.dmpbinary
MD5:71A8907CCFF22603ACF526726911783F
SHA256:759D2687BA27DD6D05974D71C4B3864ED2234EB677FAB9B5889D209981DDCC4C
6344WerFault.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\37C951188967C8EB88D99893D9D191FEbinary
MD5:B893B1DAACE53CE962051CF89552CD3C
SHA256:33A8B78FCD2C17649A449E8A599CCF3E8EEA5EA15E5ECFCAD88831D9EE23F063
6344WerFault.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\21253908F3CB05D51B1C2DA8B681A785der
MD5:F6F53CD09A41E968C363419B279D3112
SHA256:6D2BB01CC7A9BADE2113B219CAC1BDA86B2733196B7E1BD0C807CE1E396B1892
6344WerFault.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\21253908F3CB05D51B1C2DA8B681A785binary
MD5:B20B15BC75814EC62FB7EC028ACB3156
SHA256:ABA40CFEC0706ECC5ABB10DAA40C99352B29DB58813B0C3B411FF52F4838DBCE
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
11
TCP/UDP connections
35
DNS requests
20
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4872
svchost.exe
GET
200
2.16.241.12:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
2.16.241.12:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4872
svchost.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
6344
WerFault.exe
GET
200
23.53.41.248:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6344
WerFault.exe
GET
200
23.52.120.96:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1176
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
6556
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
6476
SIHClient.exe
GET
200
23.52.120.96:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
4712
MoUsoCoreWorker.exe
2.16.241.12:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4872
svchost.exe
2.16.241.12:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4712
MoUsoCoreWorker.exe
88.221.169.152:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4872
svchost.exe
88.221.169.152:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
2.23.209.177:443
www.bing.com
Akamai International B.V.
GB
whitelisted
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 40.127.240.158
  • 51.104.136.2
whitelisted
crl.microsoft.com
  • 2.16.241.12
  • 2.16.241.19
  • 23.53.41.248
  • 23.53.42.41
whitelisted
www.microsoft.com
  • 88.221.169.152
  • 23.52.120.96
whitelisted
google.com
  • 142.250.186.174
whitelisted
www.bing.com
  • 2.23.209.177
  • 2.23.209.130
  • 2.23.209.149
  • 2.23.209.135
  • 2.23.209.133
  • 2.23.209.158
  • 2.23.209.140
  • 2.23.209.141
  • 2.23.209.150
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
login.live.com
  • 40.126.32.140
  • 40.126.32.136
  • 40.126.32.138
  • 20.190.160.14
  • 40.126.32.76
  • 40.126.32.134
  • 40.126.32.133
  • 20.190.160.17
whitelisted
go.microsoft.com
  • 184.28.89.167
whitelisted
watson.events.data.microsoft.com
  • 20.189.173.20
whitelisted
arc.msn.com
  • 20.74.47.205
whitelisted

Threats

No threats detected
No debug info