metaflows logo
Category Started On Completed On Duration Cuckoo Version
FILE 2022-11-14 20:00:37.665697 2022-11-14 20:01:41.701970 64 seconds 2.0-dev
Machine Label Manager Started On Shutdown On
win7cuckoo win7 Clone 1 VirtualBox 2022-11-14 20:00:38 2022-11-14 20:01:40

File Details

File name 30fe96ed612b0afd3016a22938da79a88636cd36.dll
File size 231994 bytes
File type PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
CRC32 86936F7E
MD5 97a48f9d72a963c1867e08200c7015f0
SHA1 30fe96ed612b0afd3016a22938da79a88636cd36
SHA256 9608a3d760d5bf6cbe591fad5b34160e3b20477450f3c61427802532db983602
SHA512 2a9d96cf3e37b5987ba41e733a1a5b4bbe8411f04c64b6ba6fbfe0b6199e331118ce83c2a695117aacd66b7849b3ef0923ef30b9e8c7b9f21694d33d2ebae10a
Ssdeep None
PEiD None matched
Yara
  • contains_base64 (This rule finds for base64 strings)
  • screenshot (Take screenshot)
  • win_registry (Affect system registries)
  • CRC32_poly_Constant (Look for CRC32 [poly])
  • suspicious_packer_section (The packer/protector section names/keywords)
  • IsPE32 ()
  • IsWindowsGUI ()
  • IsPacked (Entropy Check)
  • HasOverlay (Overlay Check)
  • HasDigitalSignature (DigitalSignature Check)
  • HasRichSignature (Rich Signature Check)
  • UPXv20MarkusLaszloReiser ()
  • UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser ()
  • PackerUPX_CompresorGratuito_wwwupxsourceforgenet ()
  • UPX_wwwupxsourceforgenet_additional ()
  • yodas_Protector_v1033_dllocx_Ashkbiz_Danehkar_h ()
  • UPX_wwwupxsourceforgenet ()
  • UPX ()
VirusTotal File not found on VirusTotal

MetaFlows Scores

Metaflows Analysis Results (Signatures=50, Anomalies=0, PEiD=0, Yara=0, VT[1668474113]=0): Snort Events=0, AV Events=0
Total Score=50

Dropped File/Buffer Yara Signatures:
3c33bc6ec009c2ef_install-prodinfo.exe: contains_base64

Signatures

nolookup_communication details
packer_entropy details
packer_upx details

Screenshots

No screenshots available.

Static Analysis

Version Infos

Sections

Resources

Imports

Strings

Dropped Files

57fce2e63e9bea0a_bg_400.gif

3c33bc6ec009c2ef_install-prodinfo.exe

c248c06c5f6162f0_wtatom.html

80d8ac443868d7b3_wtatom.xml

fdd17447c564bd55_atomui.css

Network Analysis

Hosts Involved

DNS Requests

HTTP Requests

Behavior Summary

File-Read
  • C:\Users\Harry Dresden\AppData\Local\Temp\30fe96ed612b0afd3016a22938da79a88636cd36.dll
File-Written
  • C:\Users\Harry Dresden\AppData\Local\Temp\prodinfo_supergranny6_1.0.1.1171\bg_400.gif
  • C:\Users\Harry Dresden\AppData\Local\Temp\prodinfo_supergranny6_1.0.1.1171\install-prodinfo.exe
  • C:\Users\Harry Dresden\AppData\Local\Temp\prodinfo_supergranny6_1.0.1.1171\wtatom.html
  • C:\Users\Harry Dresden\AppData\Local\Temp\prodinfo_supergranny6_1.0.1.1171\wtatom.xml
  • C:\Users\Harry Dresden\AppData\Local\Temp\prodinfo_supergranny6_1.0.1.1171\atomui.css
File-Opened
  • C:\Users\Harry Dresden\AppData\Local\Temp\30fe96ed612b0afd3016a22938da79a88636cd36.dll
Directory-Created
  • C:\Users\Harry Dresden\AppData\Local\Temp\prodinfo_supergranny6_1.0.1.1171
Registry Key-Read
  • HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\GRE_Initialize\DisableMetaFiles
Mutex-Accessed
  • {EEF4DCB9-E47E-4ee9-A191-C303C366F66C}_Mutex

Processes

registry filesystem process services network synchronization

C:\Windows\system32\lsass.exe PID: 480, Parent PID: 384

"C:\Users\Harry Dresden\AppData\Local\Temp\30fe96ed612b0afd3016a22938da79a88636cd36.dll" PID: 948, Parent PID: 3384

Volatility

Nothing to display.