da.dll
This report is generated from a file or URL submitted to this webservice on May 9th 2017 10:50:37 (UTC)
Guest System:
Windows 7 32 bit, Home Premium, 6.1 (build 7601), Service Pack 1
Report generated by Falcon Sandbox © Hybrid Analysis
Incident Response
Risk Assessment
- Network Behavior
- Contacts 8 domains and 3 hosts. View all details
Indicators
Not all malicious and suspicious indicators are displayed. Get your own cloud service or the full version to view all details.
-
Malicious Indicators 3
-
Network Related
-
Found more than one unique User-Agent
- details
-
Found the following User-Agents: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
Microsoft-CryptoAPI/6.1 - source
- Network Traffic
- relevance
- 5/10
-
Malicious artifacts seen in the context of a contacted host
- details
-
Found malicious artifacts related to "69.172.200.235" (ASN: 19324, Owner: Dosarrest Internet Security LTD): ...
URL: http://test.com/ (AV positives: 1/65 scanned on 05/09/2017 08:17:02)
URL: http://www.test.com/ (AV positives: 1/65 scanned on 05/09/2017 08:16:52)
URL: https://www.test.com/ (AV positives: 1/65 scanned on 05/08/2017 07:28:19)
URL: https://www.test.com/?test=123?test=123 (AV positives: 1/64 scanned on 05/04/2017 20:13:01)
URL: http://test.com/xss.js (AV positives: 1/64 scanned on 05/02/2017 23:46:09)
File SHA256: 3e7500e723f54ee6f1ddeaea6657e92526f175c7caa4467071ac2cadc60c9519 (AV positives: 46/61 scanned on 04/29/2017 16:04:10)
File SHA256: 8b194919c2ef5c5c0558317e655a20a2afe78eff241f204007f5eec7a10094b2 (AV positives: 42/59 scanned on 04/24/2017 18:34:20)
File SHA256: 8d3a35b75c6eff85de7154f7760a621061d5c0cbb58bea53e2a84a911a851bd8 (AV positives: 28/61 scanned on 03/26/2017 20:47:31)
File SHA256: e5ef657586eaaf362d95e3d679b2a126366b2670fc9316f474974c2c27fa82fd (AV positives: 55/62 scanned on 03/22/2017 06:11:40)
File SHA256: eb2cd28db3fa7b413e29a7043b2d2bbb80372f79ad50cba38038cfbc6fe3be10 (AV positives: 46/59 scanned on 03/05/2017 05:23:25) - source
- Network Traffic
- relevance
- 10/10
-
Multiple malicious artifacts seen in the context of different hosts
- details
-
Found malicious artifacts related to "69.172.200.235" (ASN: 19324, Owner: Dosarrest Internet Security LTD): ...
URL: http://test.com/ (AV positives: 1/65 scanned on 05/09/2017 08:17:02)
URL: http://www.test.com/ (AV positives: 1/65 scanned on 05/09/2017 08:16:52)
URL: https://www.test.com/ (AV positives: 1/65 scanned on 05/08/2017 07:28:19)
URL: https://www.test.com/?test=123?test=123 (AV positives: 1/64 scanned on 05/04/2017 20:13:01)
URL: http://test.com/xss.js (AV positives: 1/64 scanned on 05/02/2017 23:46:09)
File SHA256: 3e7500e723f54ee6f1ddeaea6657e92526f175c7caa4467071ac2cadc60c9519 (AV positives: 46/61 scanned on 04/29/2017 16:04:10)
File SHA256: 8b194919c2ef5c5c0558317e655a20a2afe78eff241f204007f5eec7a10094b2 (AV positives: 42/59 scanned on 04/24/2017 18:34:20)
File SHA256: 8d3a35b75c6eff85de7154f7760a621061d5c0cbb58bea53e2a84a911a851bd8 (AV positives: 28/61 scanned on 03/26/2017 20:47:31)
File SHA256: e5ef657586eaaf362d95e3d679b2a126366b2670fc9316f474974c2c27fa82fd (AV positives: 55/62 scanned on 03/22/2017 06:11:40)
File SHA256: eb2cd28db3fa7b413e29a7043b2d2bbb80372f79ad50cba38038cfbc6fe3be10 (AV positives: 46/59 scanned on 03/05/2017 05:23:25) - source
- Network Traffic
- relevance
- 10/10
-
Found more than one unique User-Agent
-
Suspicious Indicators 2
-
Network Related
-
Uses a User Agent typical for browsers, although no browser was ever launched
- details
- Found user agent(s): Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
- source
- Network Traffic
- relevance
- 10/10
-
Uses a User Agent typical for browsers, although no browser was ever launched
-
Unusual Characteristics
-
Imports suspicious APIs
- details
-
GetFileAttributesA
GetVersionExA
GetModuleFileNameA
LoadLibraryA
GetCommandLineA
GetProcAddress
GetModuleHandleA
WriteFile
GetStartupInfoA
TerminateProcess
CreateProcessA
VirtualAlloc - source
- Static Parser
- relevance
- 1/10
-
Imports suspicious APIs
-
Informative 6
-
External Systems
-
Sample was identified as clean by Antivirus engines
- details
- 0/61 Antivirus vendors marked sample as malicious (0% detection rate)
- source
- External System
- relevance
- 10/10
-
Sample was identified as clean by Antivirus engines
-
General
-
Contacts domains
- details
-
"www.test.com"
"ocsp.netsolssl.com"
"crl.netsolssl.com"
"stats.g.doubleclick.net"
"fonts.googleapis.com"
"www.googletagmanager.com"
"www.google-analytics.com"
"fonts.gstatic.com" - source
- Network Traffic
- relevance
- 1/10
-
Contacts server
- details
-
"69.172.200.235:80"
"69.172.200.235:443"
"2.16.33.120:443" - source
- Network Traffic
- relevance
- 1/10
-
GETs files from a webserver
- details
-
"GET / HTTP/1.1
Accept: image/jpeg, application/x-ms-application, image/gif, application/xaml+xml, image/pjpeg, application/x-ms-xbap, application/vnd.ms-excel, application/vnd.ms-powerpoint, application/msword, */*
Accept-Language: en-us
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
Accept-Encoding: gzip, deflate
Host: www.test.com
Connection: Keep-Alive"
"GET /MFEwTzBNMEswSTAJBgUrDgMCGgUABBTaM15WuqpgzMcb2vjyKNO49Vo3CgQUUc7fVB23LFeraGFIAhrTsoXsQKoCEDee6%2Fy9H6fjn8WmaZue6LM%3D HTTP/1.1
Connection: Keep-Alive
Accept: */*
User-Agent: Microsoft-CryptoAPI/6.1
Host: ocsp.netsolssl.com"
"GET /NetworkSolutionsDVServerCA2.crl HTTP/1.1
Connection: Keep-Alive
Accept: */*
User-Agent: Microsoft-CryptoAPI/6.1
Host: crl.netsolssl.com" - source
- Network Traffic
- relevance
- 5/10
-
Contacts domains
-
Network Related
-
Found potential URL in binary/memory
- details
-
Heuristic match: "command.com"
Pattern match: "http://www.test.com"
Pattern match: "www.test.com"
Heuristic match: "ocsp.netsolssl.com"
Heuristic match: "crl.netsolssl.com" - source
- File/Memory
- relevance
- 10/10
-
Found potential URL in binary/memory
-
Unusual Characteristics
-
Matched Compiler/Packer signature
- details
- "da.dll.bin" was detected as "Armadillo v1.xx - v2.xx"
- source
- Static Parser
- relevance
- 10/10
-
Matched Compiler/Packer signature
File Details
da.dll
- Filename
- da.dll
- Size
- 48KiB (49152 bytes)
- Type
- pedll executable
- Description
- PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
- Architecture
- WINDOWS
- SHA256
- 9e7283dfcf72ec7611c3be196760a9aeb214643da2599e95ed7cc624f1cd0772
- MD5
- 9004b2ffaa493c829a048f511aed82f9
- SHA1
- 39962fc48fdbd6714b3d76be43805ae40850ccea
- ssdeep
-
768:JhTBvmwTLJhr8Y6VsedwHX2QOSdoghlVT:JhTBvxpq3Vspr3lV
- imphash
-
a4dc0bb70546387fd69afa63eaaf844c
- authentihash
-
1f2e3d70f31f5d3350255f0beece547718166e854f9339bcfdf5d7359879d1d1
- Compiler/Packer
- Armadillo v1.xx - v2.xx
- PDB Pathway
File Sections
| Details | ||||||
|---|---|---|---|---|---|---|
File Imports
File Exports
| Name | Ordinal | Address |
|---|---|---|
| ?KeyboardProc@@YAHH@Z | #1 | 0x10001000 |
| ?fun2@@YAHHPAD@Z | #2 | 0x10001020 |
| ?ttt2@@YAHHPADD@Z | #3 | 0x10001040 |
| ttt1 | #4 | 0x10001040 |
Screenshots
Loading content, please wait...
Hybrid Analysis
Tip: Click an analysed process below to view more details.
Analysed 1 process in total (System Resource Monitor).
-
RunDLL "C:\da.dll" (PID: 2704)
Network Analysis
DNS Requests
| Domain | Address | Registrar | Country |
|---|---|---|---|
| crl.netsolssl.com | 104.16.92.188 | - |
United States |
| stats.g.doubleclick.net | 74.125.133.154 | - |
United States |
| fonts.googleapis.com | 172.217.22.202 | - |
United States |
| www.test.com | 69.172.200.235 | - |
United States |
| ocsp.netsolssl.com | 178.255.83.1 | - |
United Kingdom |
| www.googletagmanager.com | 172.217.22.200 | - |
United States |
| www.google-analytics.com | 172.217.22.206 | - |
United States |
| fonts.gstatic.com | 172.217.22.195 | - |
United States |
Contacted Hosts
| IP Address | Port/Protocol | Associated Process | Details |
|---|---|---|---|
|
69.172.200.235 |
80
TCP |
iexplore.exe PID: 772 |
United States
ASN: 19324 (Dosarrest Internet Security LTD) |
|
69.172.200.235 |
443
TCP |
iexplore.exe PID: 772 |
United States
ASN: 19324 (Dosarrest Internet Security LTD) |
|
2.16.33.120 |
443
TCP |
iexplore.exe PID: 2920 |
European Union |
Contacted Countries
HTTP Traffic
| Endpoint | Request | URL | |
|---|---|---|---|
| 69.172.200.235:80 (www.test.com) | GET | www.test.com/ | GET / HTTP/1.1
Accept: image/jpeg, application/x-ms-application, image/gif, application/xaml+xml, image/pjpeg, application/x-ms-xbap, application/vnd.ms-excel, application/vnd.ms-powerpoint, application/msword, */*
Accept-Language: en-us
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
Accept-Encoding: gzip, deflate
Host: www.test.com
Connection: Keep-Alive 302 Moved Temporarily More Details |
| 178.255.83.1:80 (ocsp.netsolssl.com) | GET | ocsp.netsolssl.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTaM15WuqpgzMcb2vjyKNO49Vo3CgQUUc7fVB23LFeraGFIAhrTsoXsQKoCEDee6%2Fy9H6fjn8WmaZue6LM%3D | GET /MFEwTzBNMEswSTAJBgUrDgMCGgUABBTaM15WuqpgzMcb2vjyKNO49Vo3CgQUUc7fVB23LFeraGFIAhrTsoXsQKoCEDee6%2Fy9H6fjn8WmaZue6LM%3D HTTP/1.1
Connection: Keep-Alive
Accept: */*
User-Agent: Microsoft-CryptoAPI/6.1
Host: ocsp.netsolssl.com 200 OK More Details |
| 104.16.92.188:80 (crl.netsolssl.com) | GET | crl.netsolssl.com/NetworkSolutionsDVServerCA2.crl | GET /NetworkSolutionsDVServerCA2.crl HTTP/1.1
Connection: Keep-Alive
Accept: */*
User-Agent: Microsoft-CryptoAPI/6.1
Host: crl.netsolssl.com 200 OK More Details |
Memory Forensics
| String | Context | Stream UID |
|---|---|---|
| command.com | Domain/IP reference | 5115-84-10001080 |
| http://www.test.com | Domain/IP reference | 5115-83-10001060 |
Extracted Strings
Extracted Files
No significant files were extracted.
United States
United Kingdom
European Union