opengl.dat
This report is generated from a file or URL submitted to this webservice on December 15th 2022 08:29:49 (UTC)
Guest System: Windows 7 32 bit, Professional, 6.1 (build 7601), Service Pack 1
Report generated by Falcon Sandbox © Hybrid Analysis
Incident Response
Risk Assessment
- Remote Access
- Hooks internet related APIs
- Spyware
-
Hooks API calls
Hooks key cryptographic functions of the CryptoAPI - Persistence
-
Installs hooks/patches the running process
Spawns a lot of processes
Writes data to a remote process - Evasive
-
Possibly checks for the presence of an Antivirus engine
Possibly tries to evade analysis by sleeping many times
MITRE ATT&CK™ Techniques Detection
Indicators
Not all malicious and suspicious indicators are displayed. Get your own cloud service or the full version to view all details.
-
Malicious Indicators 8
-
Anti-Detection/Stealthyness
-
Hooks file system APIs
- details
-
"FindFirstFileA@KERNEL32.DLL" in "rundll32.exe"
"FindFirstFileW@KERNEL32.DLL" in "rundll32.exe"
"FindNextFileA@KERNEL32.DLL" in "rundll32.exe"
"FindNextFileW@KERNEL32.DLL" in "rundll32.exe" - source
- Hook Detection
- relevance
- 10/10
- ATT&CK ID
- T1056.004 (Show technique in the MITRE ATT&CK™ matrix)
-
Hooks file system APIs
-
Cryptographic Related
-
Hooks key cryptographic functions of the CryptoAPI
- details
-
"DecryptMessage@SSPICLI.DLL" in "rundll32.exe"
"EncryptMessage@SSPICLI.DLL" in "rundll32.exe" - source
- Hook Detection
- relevance
- 10/10
- ATT&CK ID
- T1056.004 (Show technique in the MITRE ATT&CK™ matrix)
-
Hooks key cryptographic functions of the CryptoAPI
-
External Systems
-
Sample was identified as malicious by a large number of Antivirus engines
- details
- 31/71 Antivirus vendors marked sample as malicious (43% detection rate)
- source
- External System
- relevance
- 10/10
-
Sample was identified as malicious by a trusted Antivirus engine
- details
- No specific details available
- source
- External System
- relevance
- 10/10
-
Sample was identified as malicious by a large number of Antivirus engines
-
Installation/Persistence
-
Writes data to a remote process
- details
-
"rundll32.exe" wrote 32 bytes to a remote process "%WINDIR%\System32\wermgr.exe" (Handle: 664)
"rundll32.exe" wrote 52 bytes to a remote process "%WINDIR%\System32\wermgr.exe" (Handle: 664)
"rundll32.exe" wrote 4 bytes to a remote process "%WINDIR%\System32\wermgr.exe" (Handle: 664)
"rundll32.exe" wrote 6852 bytes to a remote process "%WINDIR%\System32\wermgr.exe" (Handle: 664)
"rundll32.exe" wrote 5 bytes to a remote process "%WINDIR%\System32\wermgr.exe" (Handle: 664) - source
- API Call
- relevance
- 6/10
- ATT&CK ID
- T1055 (Show technique in the MITRE ATT&CK™ matrix)
-
Writes data to a remote process
-
Spyware/Information Retrieval
-
Hooks internet related APIs
- details
- "send@WS2_32.DLL" in "rundll32.exe"
- source
- Hook Detection
- relevance
- 10/10
- ATT&CK ID
- T1056.004 (Show technique in the MITRE ATT&CK™ matrix)
-
Hooks internet related APIs
-
Unusual Characteristics
-
Spawns a lot of processes
- details
-
Spawned process "WerFault.exe" with commandline "-u -p 2148 -s 212" (Show Process)
Spawned process "WerFault.exe" with commandline "-u -p 3884 -s 212" (Show Process)
Spawned process "wermgr.exe" (Show Process)
Spawned process "WerFault.exe" with commandline "-u -p 284 -s 212" (Show Process)
Spawned process "WerFault.exe" with commandline "-u -p 2936 -s 212" (Show Process) - source
- Monitored Target
- relevance
- 8/10
-
Spawns a lot of processes
-
Hiding 1 Malicious Indicators
- All indicators are available only in the private webservice or standalone version
-
Suspicious Indicators 11
-
Anti-Detection/Stealthyness
-
Possibly checks for the presence of an Antivirus engine
- details
- "McAfee, Inc." (Indicator: "mcafee")
- source
- File/Memory
- relevance
- 3/10
- ATT&CK ID
- T1518.001 (Show technique in the MITRE ATT&CK™ matrix)
-
Possibly checks for the presence of an Antivirus engine
-
Environment Awareness
-
Possibly tries to evade analysis by sleeping many times
- details
- "wermgr.exe" (Thread ID: 3880) slept "520" times (threshold: 500)
- source
- API Call
- relevance
- 10/10
- ATT&CK ID
- T1497.003 (Show technique in the MITRE ATT&CK™ matrix)
-
Possibly tries to evade analysis by sleeping many times
-
External Systems
-
Sample detected by CrowdStrike Static Analysis and ML with relatively low confidence
- details
- CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_60% (W)
- source
- External System
- relevance
- 10/10
-
Sample was identified as malicious by at least one Antivirus engine
- details
- 31/71 Antivirus vendors marked sample as malicious (43% detection rate)
- source
- External System
-
Sample detected by CrowdStrike Static Analysis and ML with relatively low confidence
-
General
-
Found a potential E-Mail address in binary/memory
- details
- Pattern match: "offers@master-gadgets.com0"
- source
- File/Memory
- relevance
- 3/10
- ATT&CK ID
- T1114 (Show technique in the MITRE ATT&CK™ matrix)
-
Found a potential E-Mail address in binary/memory
-
Spyware/Information Retrieval
-
Calls an API typically used to enumerate process encountered in a system snapshot
- details
-
"rundll32.exe" called "Process32FirstW" (UID: 00000000-00003116)
"rundll32.exe" called "Process32NextW" (UID: 00000000-00003116) - source
- API Call
- relevance
- 5/10
- ATT&CK ID
- T1057 (Show technique in the MITRE ATT&CK™ matrix)
-
Touches files in program files directory
- details
- "rundll32.exe" trying to touch file "%PROGRAMFILES%\Wireshark\FDDBDBDFBDFBFD.DLL"
- source
- API Call
- relevance
- 3/10
- ATT&CK ID
- T1083 (Show technique in the MITRE ATT&CK™ matrix)
-
Calls an API typically used to enumerate process encountered in a system snapshot
-
System Security
-
Hooks API calls
- details
-
"GetLogicalDriveStringsA@KERNEL32.DLL" in "rundll32.exe"
"FindFirstFileA@KERNEL32.DLL" in "rundll32.exe"
"FindFirstFileW@KERNEL32.DLL" in "rundll32.exe"
"FindNextFileA@KERNEL32.DLL" in "rundll32.exe"
"FindResourceW@KERNEL32.DLL" in "rundll32.exe"
"FindNextFileW@KERNEL32.DLL" in "rundll32.exe"
"GetLogicalDriveStringsW@KERNEL32.DLL" in "rundll32.exe"
"LoadLibraryW@KERNEL32.DLL" in "rundll32.exe"
"OpenMutexA@KERNEL32.DLL" in "rundll32.exe"
"CreateDirectoryW@KERNEL32.DLL" in "rundll32.exe"
"LoadLibraryExA@KERNEL32.DLL" in "rundll32.exe"
"Process32FirstW@KERNEL32.DLL" in "rundll32.exe"
"CreateToolhelp32Snapshot@KERNEL32.DLL" in "rundll32.exe"
"GetNativeSystemInfo@KERNEL32.DLL" in "rundll32.exe"
"CopyFileW@KERNEL32.DLL" in "rundll32.exe"
"FindResourceA@KERNEL32.DLL" in "rundll32.exe"
"RemoveDirectoryA@KERNEL32.DLL" in "rundll32.exe"
"CreateDirectoryA@KERNEL32.DLL" in "rundll32.exe"
"LoadResource@KERNEL32.DLL" in "rundll32.exe"
"send@WS2_32.DLL" in "rundll32.exe" - source
- Hook Detection
- relevance
- 10/10
- ATT&CK ID
- T1056.004 (Show technique in the MITRE ATT&CK™ matrix)
-
Hooks API calls
-
Unusual Characteristics
-
Imports suspicious APIs
- details
-
GetModuleFileNameW
LoadLibraryA
GetCommandLineW
UnhandledExceptionFilter
LoadLibraryExW
GetStartupInfoW
GetCommandLineA
GetProcAddress
GetTickCount64
CreateThread
GetModuleHandleA
FindNextFileW
WriteFile
FindFirstFileExW
GetModuleHandleW
TerminateProcess
GetModuleHandleExW
CreateFileW
IsDebuggerPresent
VirtualAlloc - source
- Static Parser
- relevance
- 1/10
-
Installs hooks/patches the running process
- details
-
"rundll32.exe" wrote bytes "e91d0fcd89" to virtual address "0x76AF8D2E" ("GetLogicalDriveStringsA@KERNEL32.DLL")
"rundll32.exe" wrote bytes "e990c3cc89" to virtual address "0x76AFC1AB" ("FindFirstFileA@KERNEL32.DLL")
"rundll32.exe" wrote bytes "e9b744cc89" to virtual address "0x76B04274" ("FindFirstFileW@KERNEL32.DLL")
"rundll32.exe" wrote bytes "e9c2e0cc89" to virtual address "0x76AFA869" ("FindNextFileA@KERNEL32.DLL")
"rundll32.exe" wrote bytes "e9b45bcd89" to virtual address "0x76AF5727" ("FindResourceW@KERNEL32.DLL")
"rundll32.exe" wrote bytes "e935eecc89" to virtual address "0x76AF9DA6" ("FindNextFileW@KERNEL32.DLL")
"rundll32.exe" wrote bytes "e9846cce89" to virtual address "0x76AE31A7" ("GetLogicalDriveStringsW@KERNEL32.DLL")
"rundll32.exe" wrote bytes "e95993cc89" to virtual address "0x76AFF162" ("LoadLibraryW@KERNEL32.DLL")
"rundll32.exe" wrote bytes "e9a9c2cd89" to virtual address "0x76AF0622" ("OpenMutexA@KERNEL32.DLL")
"rundll32.exe" wrote bytes "e92a0ecd89" to virtual address "0x76AF9BE1" ("CreateDirectoryW@KERNEL32.DLL")
"rundll32.exe" wrote bytes "e91d3ecd89" to virtual address "0x76AF46BE" ("LoadLibraryExA@KERNEL32.DLL")
"rundll32.exe" wrote bytes "e90e8ecd89" to virtual address "0x76AF023D" ("Process32FirstW@KERNEL32.DLL")
"rundll32.exe" wrote bytes "e94c877094" to virtual address "0x6C0C271F" (part of module "ACLAYERS.DLL")
"rundll32.exe" wrote bytes "e9518fcd89" to virtual address "0x76AEFF3A" ("CreateToolhelp32Snapshot@KERNEL32.DLL")
"rundll32.exe" wrote bytes "e988d4cd89" to virtual address "0x76AEC6B3" ("GetNativeSystemInfo@KERNEL32.DLL")
"rundll32.exe" wrote bytes "e90c38ce89" to virtual address "0x76AE6D4F" ("CopyFileW@KERNEL32.DLL")
"rundll32.exe" wrote bytes "e97e09cd89" to virtual address "0x76AFA6CD" ("FindResourceA@KERNEL32.DLL")
"rundll32.exe" wrote bytes "e924a7c889" to virtual address "0x76B404D7" ("RemoveDirectoryA@KERNEL32.DLL")
"rundll32.exe" wrote bytes "e9d624cb89" to virtual address "0x76B18355" ("CreateDirectoryA@KERNEL32.DLL")
"rundll32.exe" wrote bytes "e9a116cd89" to virtual address "0x76AF9ECA" ("LoadResource@KERNEL32.DLL") - source
- Hook Detection
- relevance
- 10/10
- ATT&CK ID
- T1056.004 (Show technique in the MITRE ATT&CK™ matrix)
-
Imports suspicious APIs
-
Hiding 1 Suspicious Indicators
- All indicators are available only in the private webservice or standalone version
-
Informative 27
-
Environment Awareness
-
Calls an API typically used to get product type
- details
- "rundll32.exe" called "RtlGetNtProductType" with parameter (UID: 00000000-00003116)
- source
- API Call
- relevance
- 3/10
- ATT&CK ID
- T1082 (Show technique in the MITRE ATT&CK™ matrix)
-
Calls an API typically used to get system version information
- details
- "rundll32.exe" called "RtlGetVersion" with parameter (UID: 00000000-00003116)
- source
- API Call
- relevance
- 3/10
- ATT&CK ID
- T1082 (Show technique in the MITRE ATT&CK™ matrix)
-
Contains ability to read software policies
- details
-
"rundll32.exe" (Path: "HKLM\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\SAFER\CODEIDENTIFIERS"; Key: "TRANSPARENTENABLED")
"rundll32.exe" (Path: "HKLM\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\SAFER\CODEIDENTIFIERS"; Key: "AUTHENTICODEENABLED")
"wermgr.exe" (Path: "HKLM\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\SAFER\CODEIDENTIFIERS"; Key: "TRANSPARENTENABLED") - source
- Registry Access
- relevance
- 1/10
- ATT&CK ID
- T1082 (Show technique in the MITRE ATT&CK™ matrix)
-
Contains ability to verify if file exist on disk (API string)
- details
- Observed api string:"PathFileExistsA" [Source: 122ca4d274ebe0850db490adb34b938a439eb1838b303cef0c6f37b52ad1d60e.bin]
- source
- File/Memory
- relevance
- 1/10
- ATT&CK ID
- T1083 (Show technique in the MITRE ATT&CK™ matrix)
-
Reads the active computer name
- details
-
"rundll32.exe" (Path: "HKLM\SYSTEM\CONTROLSET001\CONTROL\COMPUTERNAME\ACTIVECOMPUTERNAME"; Key: "COMPUTERNAME")
"wermgr.exe" (Path: "HKLM\SYSTEM\CONTROLSET001\CONTROL\COMPUTERNAME\ACTIVECOMPUTERNAME"; Key: "COMPUTERNAME") - source
- Registry Access
- relevance
- 5/10
- ATT&CK ID
- T1012 (Show technique in the MITRE ATT&CK™ matrix)
-
Calls an API typically used to get product type
-
General
-
An application crash occurred
- details
- Report process "WerFault.exe" was created by "rundll32.exe"
- source
- Monitored Target
-
Contains ability to dynamically determine API calls
- details
- Found GetProcAddress() and LoadLibraryA() in an import section (Source: 122ca4d274ebe0850db490adb34b938a439eb1838b303cef0c6f37b52ad1d60e.bin)
- source
- Static Parser
- relevance
- 1/10
- ATT&CK ID
- T1106 (Show technique in the MITRE ATT&CK™ matrix)
-
Contains ability to read the PEB (Process Environment Block) structure
- details
- "122ca4d274ebe0850db490adb34b938a439eb1838b303cef0c6f37b52ad1d60e.bin" can read PEB structure (dword ptr fs:[00000030h]) (Offset: 95900)
- source
- Binary File
- relevance
- 3/10
-
Contains export functions
- details
-
"122ca4d274ebe0850db490adb34b938a439eb1838b303cef0c6f37b52ad1d60e.bin" contains export function called "DrawThemeIcon" at ordinal 1
"122ca4d274ebe0850db490adb34b938a439eb1838b303cef0c6f37b52ad1d60e.bin" contains export function called "apetaloid" at ordinal 2
"122ca4d274ebe0850db490adb34b938a439eb1838b303cef0c6f37b52ad1d60e.bin" contains export function called "graben" at ordinal 3
"122ca4d274ebe0850db490adb34b938a439eb1838b303cef0c6f37b52ad1d60e.bin" contains export function called "ladykind" at ordinal 4
"122ca4d274ebe0850db490adb34b938a439eb1838b303cef0c6f37b52ad1d60e.bin" contains export function called "overindulge" at ordinal 5
"122ca4d274ebe0850db490adb34b938a439eb1838b303cef0c6f37b52ad1d60e.bin" contains export function called "spirometer" at ordinal 6
"122ca4d274ebe0850db490adb34b938a439eb1838b303cef0c6f37b52ad1d60e.bin" contains export function called "townless" at ordinal 7
"122ca4d274ebe0850db490adb34b938a439eb1838b303cef0c6f37b52ad1d60e.bin" contains export function called "zaparoan" at ordinal 8 - source
- Static Parser
- relevance
- 1/10
-
Creates mutants
- details
-
"\Sessions\1\BaseNamedObjects\DBWinMutex"
"DBWinMutex"
"\Sessions\1\BaseNamedObjects\Global\{2E21AA80-7D3F-4D54-9A37-DFFB2CA36D7C}"
"\Sessions\1\BaseNamedObjects\{2E21AA80-7D3F-4D54-9A37-DFFB2CA36D7C}"
"\Sessions\1\BaseNamedObjects\{C9317923-F45D-4F85-9D1F-3CAB4A7C14D0}"
"{2E21AA80-7D3F-4D54-9A37-DFFB2CA36D7C}"
"Global\{2E21AA80-7D3F-4D54-9A37-DFFB2CA36D7C}"
"{C9317923-F45D-4F85-9D1F-3CAB4A7C14D0}" - source
- Created Mutant
- relevance
- 3/10
-
Found API related strings
- details
-
"FlsGetValue" (Indicator: "FlsGetValue")
"FlsSetValue" (Indicator: "FlsSetValue")
"InitializeCriticalSectionEx" (Indicator: "InitializeCriticalSection")
"CorExitProcess" (Indicator: "ExitProcess")
"LocaleNameToLCID" (Indicator: "LocaleNameToLCID")
"WaitForSingleObjectEx" (Indicator: "WaitForSingleObject")
"CreateThread" (Indicator: "CreateThread")
"GetTickCount64" (Indicator: "GetTickCount")
"VirtualAlloc" (Indicator: "VirtualAlloc")
"GetCurrentThreadId" (Indicator: "GetCurrentThread")
"GetModuleHandleA" (Indicator: "GetModuleHandleA")
"GetModuleHandleW" (Indicator: "GetModuleHandleW")
"LoadLibraryA" (Indicator: "LoadLibraryA")
"SendMessageA" (Indicator: "SendMessageA")
"PathFileExistsA" (Indicator: "PathFileExistsA")
"IsProcessorFeaturePresent" (Indicator: "IsProcessorFeaturePresent")
"IsDebuggerPresent" (Indicator: "IsDebuggerPresent")
"UnhandledExceptionFilter" (Indicator: "UnhandledExceptionFilter")
"SetUnhandledExceptionFilter" (Indicator: "SetUnhandledExceptionFilter")
"GetStartupInfoW" (Indicator: "GetStartupInfoW") - source
- File/Memory
- relevance
- 1/10
-
PE file contains executable sections
- details
- "122ca4d274ebe0850db490adb34b938a439eb1838b303cef0c6f37b52ad1d60e.bin" has an executable section named ".text"
- source
- Static Parser
- relevance
- 1/10
-
PE file contains writable sections
- details
- "122ca4d274ebe0850db490adb34b938a439eb1838b303cef0c6f37b52ad1d60e.bin" has an writable section named "data1"
- source
- Static Parser
- relevance
- 1/10
-
PE file entrypoint instructions
- details
- "122ca4d274ebe0850db490adb34b938a439eb1838b303cef0c6f37b52ad1d60e.bin" file has an entrypoint instructions - "pushebp,movebp, esp,cmpdword ptr [ebp + 0xc], 1,jne0x1000f289,call0x1000f675,pushdword ptr [ebp + 0x10],pushdword ptr [ebp + 0xc],pushdword ptr [ebp + 8],call0x1000f145,addesp, 0xc,popebp,ret0xc,pushebp,movebp, esp,subesp, 0xc,leaecx, [ebp - 0xc],call0x1000ea2b,push0x1004effc,leaeax, [ebp - 0xc],pusheax,call0x1000f911,int3,pushebp,movebp, esp,subesp, 0xc,leaecx, [ebp - 0xc],call0x10001890,push0x1004ecfc,leaeax, [ebp - 0xc],pusheax,call0x1000f911,int3,pushebp,movebp, esp,"
- source
- Static Parser
- relevance
- 1/10
-
Spawns new processes
- details
-
Spawned process "rundll32.exe" with commandline ""C:\opengl.dat.dll",#1" (Show Process)
Spawned process "rundll32.exe" with commandline ""C:\opengl.dat.dll",#2" (Show Process)
Spawned process "rundll32.exe" with commandline ""C:\opengl.dat.dll",#3" (Show Process)
Spawned process "rundll32.exe" with commandline ""C:\opengl.dat.dll",#4" (Show Process)
Spawned process "rundll32.exe" with commandline ""C:\opengl.dat.dll",#5" (Show Process)
Spawned process "rundll32.exe" with commandline ""C:\opengl.dat.dll",#6" (Show Process)
Spawned process "WerFault.exe" with commandline "-u -p 2148 -s 212" (Show Process)
Spawned process "WerFault.exe" with commandline "-u -p 3884 -s 212" (Show Process)
Spawned process "wermgr.exe" (Show Process)
Spawned process "rundll32.exe" with commandline ""C:\opengl.dat.dll",#7" (Show Process)
Spawned process "WerFault.exe" with commandline "-u -p 284 -s 212" (Show Process)
Spawned process "rundll32.exe" with commandline ""C:\opengl.dat.dll",#8" (Show Process)
Spawned process "WerFault.exe" with commandline "-u -p 2936 -s 212" (Show Process) - source
- Monitored Target
- relevance
- 3/10
-
Spawns new processes that are not known child processes
- details
-
Spawned process "rundll32.exe" with commandline ""C:\opengl.dat.dll",#1" (Show Process)
Spawned process "rundll32.exe" with commandline ""C:\opengl.dat.dll",#2" (Show Process)
Spawned process "rundll32.exe" with commandline ""C:\opengl.dat.dll",#3" (Show Process)
Spawned process "rundll32.exe" with commandline ""C:\opengl.dat.dll",#4" (Show Process)
Spawned process "rundll32.exe" with commandline ""C:\opengl.dat.dll",#5" (Show Process)
Spawned process "rundll32.exe" with commandline ""C:\opengl.dat.dll",#6" (Show Process)
Spawned process "WerFault.exe" with commandline "-u -p 2148 -s 212" (Show Process)
Spawned process "WerFault.exe" with commandline "-u -p 3884 -s 212" (Show Process)
Spawned process "wermgr.exe" (Show Process)
Spawned process "rundll32.exe" with commandline ""C:\opengl.dat.dll",#7" (Show Process)
Spawned process "WerFault.exe" with commandline "-u -p 284 -s 212" (Show Process)
Spawned process "rundll32.exe" with commandline ""C:\opengl.dat.dll",#8" (Show Process)
Spawned process "WerFault.exe" with commandline "-u -p 2936 -s 212" (Show Process) - source
- Monitored Target
- relevance
- 3/10
-
The input sample is signed with a certificate
- details
-
The input sample is signed with a certificate issued by "CN=Sectigo Public Code Signing CA R36, O=Sectigo Limited, C=GB" (SHA1: FA:9C:C0:60:76:BB:DB:2E:C2:BD:BC:15:79:93:AA:AF:7A:A8:0C:5A; see report for more information)
The input sample is signed with a certificate issued by "CN=AAA Certificate Services, O=Comodo CA Limited, L=Salford, ST=Greater Manchester, C=GB" (SHA1: D1:EB:23:A4:6D:17:D6:8F:D9:25:64:C2:F1:F1:60:17:64:D8:E3:49; see report for more information)
The input sample is signed with a certificate issued by "CN=AAA Certificate Services, O=Comodo CA Limited, L=Salford, ST=Greater Manchester, C=GB" (SHA1: 32:9B:78:A5:C9:EB:C2:04:32:42:DE:90:CE:1B:7C:6B:1B:A6:C6:92; see report for more information)
The input sample is signed with a certificate issued by "CN=Sectigo Public Code Signing Root R46, O=Sectigo Limited, C=GB" (SHA1: 0B:C5:E7:67:73:D2:E4:4F:C9:90:3D:4D:FE:FE:45:15:53:BB:EC:4A; see report for more information) - source
- Certificate Data
- relevance
- 10/10
- ATT&CK ID
- T1553.002 (Show technique in the MITRE ATT&CK™ matrix)
-
The input sample is signed with a valid certificate
- details
- The entire certificate chain of the input sample was validated successfully.
- source
- Certificate Data
- relevance
- 10/10
- ATT&CK ID
- T1553.002 (Show technique in the MITRE ATT&CK™ matrix)
-
An application crash occurred
-
Installation/Persistence
-
Touches files in the Windows directory
- details
- "rundll32.exe" touched file "%WINDIR%\AppPatch\sysmain.sdb"
- source
- API Call
- relevance
- 7/10
-
Touches files in the Windows directory
-
Network Related
-
Found potential URL in binary/memory
- details
-
Pattern match: "https://sectigo.com/CPS0"
Pattern match: "crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y"
Pattern match: "crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#"
Pattern match: "http://ocsp.sectigo.com0$"
Pattern match: "crl.comodoca.com/AAACertificateServices.crl06"
Pattern match: "crl.comodo.net/AAACertificateServices.crl0"
Pattern match: "crl.comodoca.com/AAACertificateServices.crl04"
Pattern match: "http://ocsp.comodoca.com0"
Pattern match: "http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0"
Pattern match: "http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#"
Pattern match: "http://ocsp.sectigo.com0" - source
- File/Memory
- relevance
- 10/10
-
Possibly tries to communicate over SSL connection (HTTPS)
- details
- "https://sectigo.com/CPS0" (Indicator: "https://")
- source
- File/Memory
- relevance
- 1/10
- ATT&CK ID
- T1573 (Show technique in the MITRE ATT&CK™ matrix)
-
Found potential URL in binary/memory
-
Spyware/Information Retrieval
-
Calls an API typically used for taking snapshot of the specified processes
- details
- "rundll32.exe" called "CreateToolhelp32Snapshot" (UID: 00000000-00003116)
- source
- API Call
- relevance
- 3/10
- ATT&CK ID
- T1057 (Show technique in the MITRE ATT&CK™ matrix)
-
Contains ability to enumerate files on disk (API string)
- details
- Observed api string:"FindNextFileW" [Source: 122ca4d274ebe0850db490adb34b938a439eb1838b303cef0c6f37b52ad1d60e.bin]
- source
- File/Memory
- relevance
- 1/10
- ATT&CK ID
- T1083 (Show technique in the MITRE ATT&CK™ matrix)
-
Imports GetCommandLine API
- details
- Observed import api "GetCommandLineA" which can "Retrieves the command-line string for the current process" [Source: 122ca4d274ebe0850db490adb34b938a439eb1838b303cef0c6f37b52ad1d60e.bin]
- source
- Static Parser
- relevance
- 1/10
- ATT&CK ID
- T1106 (Show technique in the MITRE ATT&CK™ matrix)
-
Tries to access non-existent files
- details
-
"rundll32.exe" trying to access non-existent file "C:\Windows\System32\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL"
"rundll32.exe" trying to access non-existent file "C:\Windows\System32\API-MS-WIN-CORE-LOCALIZATION-L1-2-1.DLL"
"rundll32.exe" trying to access non-existent file "C:\Users\%USERNAME%\AppData\Local\Programs\Python\Python36-32\Scripts\FDDBDBDFBDFBFD.DLL"
"rundll32.exe" trying to access non-existent file "C:\Windows\System32\FDDBDBDFBDFBFD.DLL"
"rundll32.exe" trying to access non-existent file "C:\Windows\system\FDDBDBDFBDFBFD.DLL"
"rundll32.exe" trying to access non-existent file "C:\Windows\FDDBDBDFBDFBFD.DLL"
"rundll32.exe" trying to access non-existent file "C:\FDDBDBDFBDFBFD.DLL"
"rundll32.exe" trying to access non-existent file "%ALLUSERSPROFILE%\Oracle\Java\javapath_target_623756\FDDBDBDFBDFBFD.DLL"
"rundll32.exe" trying to access non-existent file "C:\Windows\System32\wbem\FDDBDBDFBDFBFD.DLL"
"rundll32.exe" trying to access non-existent file "C:\Windows\System32\WindowsPowerShell\v1.0\FDDBDBDFBDFBFD.DLL"
"rundll32.exe" trying to access non-existent file "C:\Program Files\Wireshark\FDDBDBDFBDFBFD.DLL"
"rundll32.exe" trying to access non-existent file "C:\Users\%USERNAME%\AppData\Local\Programs\Python\Python36-32\FDDBDBDFBDFBFD.DLL" - source
- API Call
- relevance
- 3/10
- ATT&CK ID
- T1083 (Show technique in the MITRE ATT&CK™ matrix)
-
Calls an API typically used for taking snapshot of the specified processes
-
Unusual Characteristics
-
Matched Compiler/Packer signature
- details
- "122ca4d274ebe0850db490adb34b938a439eb1838b303cef0c6f37b52ad1d60e.bin" was detected as "Borland Delphi 3.0 (???)"
- source
- Static Parser
- relevance
- 10/10
- ATT&CK ID
- T1027.002 (Show technique in the MITRE ATT&CK™ matrix)
-
Reads information about supported languages
- details
-
"rundll32.exe" (Path: "HKLM\SYSTEM\CONTROLSET001\CONTROL\NLS\CUSTOMLOCALE"; Key: "AR")
"rundll32.exe" (Path: "HKLM\SYSTEM\CONTROLSET001\CONTROL\NLS\EXTENDEDLOCALE"; Key: "AR")
"rundll32.exe" (Path: "HKLM\SYSTEM\CONTROLSET001\CONTROL\NLS\EXTENDEDLOCALE"; Key: "AR-SA")
"rundll32.exe" (Path: "HKLM\SYSTEM\CONTROLSET001\CONTROL\NLS\CUSTOMLOCALE"; Key: "AR-SA")
"rundll32.exe" (Path: "HKLM\SYSTEM\CONTROLSET001\CONTROL\NLS\EXTENDEDLOCALE"; Key: "EN-US")
"rundll32.exe" (Path: "HKLM\SYSTEM\CONTROLSET001\CONTROL\NLS\CUSTOMLOCALE"; Key: "EN-US")
"wermgr.exe" (Path: "HKLM\SYSTEM\CONTROLSET001\CONTROL\NLS\EXTENDEDLOCALE"; Key: "EN-US")
"wermgr.exe" (Path: "HKLM\SYSTEM\CONTROLSET001\CONTROL\NLS\CUSTOMLOCALE"; Key: "TN")
"wermgr.exe" (Path: "HKLM\SYSTEM\CONTROLSET001\CONTROL\NLS\EXTENDEDLOCALE"; Key: "TN")
"wermgr.exe" (Path: "HKLM\SYSTEM\CONTROLSET001\CONTROL\NLS\CUSTOMLOCALE"; Key: "TN-ZA")
"wermgr.exe" (Path: "HKLM\SYSTEM\CONTROLSET001\CONTROL\NLS\EXTENDEDLOCALE"; Key: "TN-ZA")
"wermgr.exe" (Path: "HKLM\SYSTEM\CONTROLSET001\CONTROL\NLS\CUSTOMLOCALE"; Key: "CA")
"wermgr.exe" (Path: "HKLM\SYSTEM\CONTROLSET001\CONTROL\NLS\EXTENDEDLOCALE"; Key: "CA")
"wermgr.exe" (Path: "HKLM\SYSTEM\CONTROLSET001\CONTROL\NLS\CUSTOMLOCALE"; Key: "CA-ES")
"wermgr.exe" (Path: "HKLM\SYSTEM\CONTROLSET001\CONTROL\NLS\EXTENDEDLOCALE"; Key: "CA-ES")
"wermgr.exe" (Path: "HKLM\SYSTEM\CONTROLSET001\CONTROL\NLS\CUSTOMLOCALE"; Key: "EN-US") - source
- Registry Access
- relevance
- 3/10
- ATT&CK ID
- T1012 (Show technique in the MITRE ATT&CK™ matrix)
-
Matched Compiler/Packer signature
CrowdStrike AI
-
Executable Process Memory Analysis (Learn More)
-
Malicious
1
-
00000000-00003116.00000001.67295.005F0000.00000040.mdmp
(Address: 005F0000, Flags: 00000040)
- File's Process
- rundll32.exe (PID: 3116)
- File's Process SHA256
- 3fa4912eb43fc304652d7b01f118589259861e2d628fa7c86193e54d5f987670
- File's Process Disc Pathway
- %WINDIR%\System32\rundll32.exe
- Action
- See Memory Dump Content Download Memory Dump
-
00000000-00003116.00000001.67295.005F0000.00000040.mdmp
(Address: 005F0000, Flags: 00000040)
-
Suspicious
1
-
00000000-00003116.00000001.67295.002E0000.00000040.mdmp
(Address: 002E0000, Flags: 00000040)
- File's Process
- rundll32.exe (PID: 3116)
- File's Process SHA256
- 3fa4912eb43fc304652d7b01f118589259861e2d628fa7c86193e54d5f987670
- File's Process Disc Pathway
- %WINDIR%\System32\rundll32.exe
- Action
- See Memory Dump Content Download Memory Dump
-
00000000-00003116.00000001.67295.002E0000.00000040.mdmp
(Address: 002E0000, Flags: 00000040)
File Details
opengl.dat
- Filename
- opengl.dat
- Size
- 353KiB (361952 bytes)
- Type
- pedll executable
- Description
- PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
- Architecture
- WINDOWS
- SHA256
- 122ca4d274ebe0850db490adb34b938a439eb1838b303cef0c6f37b52ad1d60e
- MD5
- 9d72c37dbf002a0069c85059ff0e7389
- SHA1
- b21aa6e7e6f59326ec1b252b5e33bd3491e15066
- ssdeep
-
6144:eumQ7wTa7g5+NUG7rVEs53B7m3hT0g7Na/aoKPxtCkT2QJx84aJXxw4x:5J7wTIJNVruKchoUaCujQJfAXxTx
- imphash
-
21e76aaf32fa6db6fd58a317fd4ebc7e
- authentihash
-
ccd61be3a2c51b2b1949d2bb4417f06de10e519e01cd591762616c6a0856075c
- Compiler/Packer
- Borland Delphi 3.0 (???)
Resources
- Language
- RUSSIAN,NEUTRAL
- Icon
-
Entrypoint Preview
- Instructions Count
- 34
- Actions
- Show Preview
Version Info
- LegalCopyright
- Copyright 1995-2009 McAfee, Inc. All Rights Reserved.
- BuildDate
- -
- CompanyName
- McAfee, Inc.
- ProductName
- McAfee System Tray
- BuildNumber
- 286
- FileDescription
- McTray Application
- FileVersion
- 2.1.0.286
- Translation
- 0x0000 0x04b0
Additional Static Data
- Entrypoint
- 0x1000f27b
- Entrypoint Section
- .text
- ImageBase
- 0x10000000
- Subsystem
- Windows Gui
- Image File Characteristics
- 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
- DLL Characteristics
- DYNAMIC_BASE, NX_COMPAT
- Major OS Version
- 6
- Minor OS Version
- 0
Classification (TrID)
- 45.8% (.EXE) Win32 Executable MS Visual C++ (generic)
- 15.4% (.EXE) Win64 Executable (generic)
- 9.6% (.DLL) Win32 Dynamic Link Library (generic)
- 7.4% (.EXE) Win16 NE executable (generic)
- 6.6% (.EXE) Win32 Executable (generic)
File Sections
| Details | ||||||
|---|---|---|---|---|---|---|
File Resources
| Details | ||||
|---|---|---|---|---|
File Data Directories
| Details | |||
|---|---|---|---|
File Imports
File Exports
| Name | Ordinal | Address |
|---|---|---|
| DrawThemeIcon | #1 | 0x100083b0 |
| apetaloid | #2 | 0x1000b740 |
| graben | #3 | 0x1000bdc0 |
| ladykind | #4 | 0x1000c780 |
| overindulge | #5 | 0x1000cd10 |
| spirometer | #6 | 0x1000d280 |
| townless | #7 | 0x1000d9c0 |
| zaparoan | #8 | 0x1000e1f0 |
File Certificates
Certificate chain was successfully validated.
Download Certificate File (6.5KiB)| Owner | Issuer | Validity | Hashes (MD5, SHA1) |
|---|---|---|---|
| CN=MASTER GADGETS LTD, O=MASTER GADGETS LTD, ST=Essex, C=GB | CN=Sectigo Public Code Signing CA R36, O=Sectigo Limited, C=GB Serial: 23840d4ff33ebae2618fcf874ad2f98 |
11/07/2022 00:00:00 11/07/2023 23:59:59 |
12:97:FB:D9:B6:AC:DC:BC:87:27:DD:3F:8B:2F:C8:9F FA:9C:C0:60:76:BB:DB:2E:C2:BD:BC:15:79:93:AA:AF:7A:A8:0C:5A |
| CN=AAA Certificate Services, O=Comodo CA Limited, L=Salford, ST=Greater Manchester, C=GB | CN=AAA Certificate Services, O=Comodo CA Limited, L=Salford, ST=Greater Manchester, C=GB Serial: 1 |
01/01/2004 00:00:00 12/31/2028 23:59:59 |
49:79:04:B0:EB:87:19:AC:47:B0:BC:11:51:9B:74:D0 D1:EB:23:A4:6D:17:D6:8F:D9:25:64:C2:F1:F1:60:17:64:D8:E3:49 |
| CN=Sectigo Public Code Signing Root R46, O=Sectigo Limited, C=GB | CN=AAA Certificate Services, O=Comodo CA Limited, L=Salford, ST=Greater Manchester, C=GB Serial: 48fc93b46055948d36a7c98a89d69416 |
05/25/2021 00:00:00 12/31/2028 23:59:59 |
2A:A3:20:98:2E:00:19:3F:AD:3B:D0:EA:54:06:E4:CD 32:9B:78:A5:C9:EB:C2:04:32:42:DE:90:CE:1B:7C:6B:1B:A6:C6:92 |
| CN=Sectigo Public Code Signing CA R36, O=Sectigo Limited, C=GB | CN=Sectigo Public Code Signing Root R46, O=Sectigo Limited, C=GB Serial: 621d6d0c52019e3b9079152089211c0a |
03/22/2021 00:00:00 03/21/2036 23:59:59 |
E8:8A:7F:88:DD:89:C6:2A:2B:B9:9C:C9:88:D2:D2:A4 0B:C5:E7:67:73:D2:E4:4F:C9:90:3D:4D:FE:FE:45:15:53:BB:EC:4A |
Screenshots
Loading content, please wait...
Hybrid Analysis
Tip: Click an analysed process below to view more details.
Analysed 13 processes in total (System Resource Monitor).
-
<Ignored Process>
-
rundll32.exe
"C:\opengl.dat.dll",#1
(PID: 3116)
-
wermgr.exe
(PID: 1420)
-
-
rundll32.exe
"C:\opengl.dat.dll",#2
(PID: 3172)
-
rundll32.exe
"C:\opengl.dat.dll",#3
(PID: 2148)
-
WerFault.exe
-u -p 2148 -s 212
(PID: 3556)
-
-
rundll32.exe
"C:\opengl.dat.dll",#4
(PID: 3732)
-
rundll32.exe
"C:\opengl.dat.dll",#5
(PID: 2528)
-
rundll32.exe
"C:\opengl.dat.dll",#6
(PID: 3884)
-
WerFault.exe
-u -p 3884 -s 212
(PID: 3780)
-
-
rundll32.exe
"C:\opengl.dat.dll",#7
(PID: 284)
-
WerFault.exe
-u -p 284 -s 212
(PID: 3148)
-
-
rundll32.exe
"C:\opengl.dat.dll",#8
(PID: 2936)
-
WerFault.exe
-u -p 2936 -s 212
(PID: 3120)
-
-
Network Analysis
DNS Requests
No relevant DNS requests were made.
Contacted Hosts
No relevant hosts were contacted.
HTTP Traffic
No relevant HTTP requests were made.
Extracted Strings
Extracted Files
No significant files were extracted.
Notifications
-
Runtime
- A process crash was detected during the runtime analysis
- Not all IP/URL string resources were checked online
- Not all sources for indicator ID "api-104" are available in the report
- Not all sources for indicator ID "api-113" are available in the report
- Not all sources for indicator ID "api-126" are available in the report
- Not all sources for indicator ID "api-47" are available in the report
- Not all sources for indicator ID "hooks-0" are available in the report
- Not all sources for indicator ID "hooks-8" are available in the report
- Not all sources for indicator ID "mutant-0" are available in the report
- Not all sources for indicator ID "registry-25" are available in the report
- Not all sources for indicator ID "string-101" are available in the report
- Not all sources for indicator ID "string-140" are available in the report
- Not all sources for indicator ID "string-83" are available in the report
- Not all sources for indicator ID "string-98" are available in the report
- Some low-level data is hidden, as this is only a slim report