Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
fqJIOoSp5U.dll

Overview

General Information

Sample name:fqJIOoSp5U.dll
(renamed file extension from exe to dll, renamed because original name is a hash value)
Original sample name:aec915753612bb003330ce7ffc67cfa9d7e3c12310f0ecfd0b7e50abf427989a.exe
Analysis ID:1404636
MD5:d8a8cc25bf5ef5b96ff7a64f663cbd29
SHA1:d1e5e29c162566ce1d8a3d9c1a758fdbfef74174
SHA256:aec915753612bb003330ce7ffc67cfa9d7e3c12310f0ecfd0b7e50abf427989a
Infos:

Detection

Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Execute DLL with spoofed extension
System process connects to network (likely due to code injection or exploit)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates COM task schedule object (often to register a task for autostart)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Found dropped PE file which has not been started or loaded
Found evasive API chain (date check)
Found evasive API chain (may stop execution after checking a module file name)
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Sample execution stops while process was sleeping (likely an evasion)
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Tries to load missing DLLs
Uses Microsoft's Enhanced Cryptographic Provider

Classification

  • System is w10x64
  • loaddll64.exe (PID: 4236 cmdline: loaddll64.exe "C:\Users\user\Desktop\fqJIOoSp5U.dll" MD5: 763455F9DCB24DFEECC2B9D9F8D46D52)
    • conhost.exe (PID: 6044 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 5424 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\fqJIOoSp5U.dll",#1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • rundll32.exe (PID: 3696 cmdline: rundll32.exe "C:\Users\user\Desktop\fqJIOoSp5U.dll",#1 MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 880 cmdline: rundll32.exe C:\Users\user\Desktop\fqJIOoSp5U.dll,CalculateSum MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 6444 cmdline: rundll32.exe C:\Users\user\Desktop\fqJIOoSp5U.dll,CalculateSumW MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 5916 cmdline: rundll32.exe "C:\Users\user\Desktop\fqJIOoSp5U.dll",CalculateSum MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7144 cmdline: rundll32.exe "C:\Users\user\Desktop\fqJIOoSp5U.dll",CalculateSumW MD5: EF3179D498793BF4234F708D3BE28633)
  • rundll32.exe (PID: 2052 cmdline: RUNDLL32.exe C:\Windows\system32\config\systemprofile\AppData\Roaming\..\Local\Microsoft\Windows\usrgroup.dat,LoadDll C:\Windows\system32\config\systemprofile\AppData\Roaming\..\Local\Microsoft\Windows\Explorer\thumbcache_512.db "zjWy" 5555 MD5: EF3179D498793BF4234F708D3BE28633)
  • rundll32.exe (PID: 6804 cmdline: RUNDLL32.exe C:\Users\user\AppData\Roaming\..\Local\Microsoft\Windows\usrgroup.dat,LoadDll C:\Users\user\AppData\Roaming\..\Local\Microsoft\Windows\Explorer\thumbcache_512.db "zjWy" 5555 MD5: EF3179D498793BF4234F708D3BE28633)
  • cleanup
No configs have been found
No yara matches

Data Obfuscation

barindex
Source: Process startedAuthor: Joe Security: Data: Command: RUNDLL32.exe C:\Windows\system32\config\systemprofile\AppData\Roaming\..\Local\Microsoft\Windows\usrgroup.dat,LoadDll C:\Windows\system32\config\systemprofile\AppData\Roaming\..\Local\Microsoft\Windows\Explorer\thumbcache_512.db "zjWy" 5555, CommandLine: RUNDLL32.exe C:\Windows\system32\config\systemprofile\AppData\Roaming\..\Local\Microsoft\Windows\usrgroup.dat,LoadDll C:\Windows\system32\config\systemprofile\AppData\Roaming\..\Local\Microsoft\Windows\Explorer\thumbcache_512.db "zjWy" 5555, CommandLine|base64offset|contains: y, Image: C:\Windows\System32\rundll32.exe, NewProcessName: C:\Windows\System32\rundll32.exe, OriginalFileName: C:\Windows\System32\rundll32.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 932, ProcessCommandLine: RUNDLL32.exe C:\Windows\system32\config\systemprofile\AppData\Roaming\..\Local\Microsoft\Windows\usrgroup.dat,LoadDll C:\Windows\system32\config\systemprofile\AppData\Roaming\..\Local\Microsoft\Windows\Explorer\thumbcache_512.db "zjWy" 5555, ProcessId: 2052, ProcessName: rundll32.exe
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: fqJIOoSp5U.dllAvira: detected
Source: http://91.206.178.125/upload/upload.aspIVAvira URL Cloud: Label: malware
Source: http://91.206.178.125/upload/upload.aspjTAvira URL Cloud: Label: malware
Source: http://91.206.178.125/upload/upload.aspiAvira URL Cloud: Label: malware
Source: http://91.206.178.125/upload/upload.aspAvira URL Cloud: Label: malware
Source: http://91.206.178.125/upload/upload.aspEVAvira URL Cloud: Label: malware
Source: http://91.206.178.125/upload/upload.asp5/upload/upload.aspAvira URL Cloud: Label: malware
Source: http://91.206.178.125/upload/upload.aspQVAvira URL Cloud: Label: malware
Source: http://91.206.178.125/upload/upload.aspLzAvira URL Cloud: Label: malware
Source: http://91.206.178.125/upload/upload.asp.TMAvira URL Cloud: Label: malware
Source: http://91.206.178.125/upload/upload.aspXzAvira URL Cloud: Label: malware
Source: http://91.206.178.125/upload/upload.aspOVAvira URL Cloud: Label: malware
Source: http://91.206.178.125/upload/upload.aspParametersAvira URL Cloud: Label: malware
Source: http://91.206.178.125/upload/upload.asphttp://91.206.17Avira URL Cloud: Label: malware
Source: http://91.206.178.125/upload/upload.aspxAvira URL Cloud: Label: malware
Source: http://91.206.178.125/upload/upload.asp;Avira URL Cloud: Label: malware
Source: http://91.206.178.125/upload/upload.asp5029Avira URL Cloud: Label: malware
Source: http://91.206.178.125/upload/upload.aspXVAvira URL Cloud: Label: malware
Source: http://91.206.178.125/upload/upload.asp:TQAvira URL Cloud: Label: malware
Source: http://91.206.178.125/upload/upload.aspEzAvira URL Cloud: Label: malware
Source: http://91.206.178.125/upload/upload.asp$TKAvira URL Cloud: Label: malware
Source: http://91.206.178.125/upload/upload.aspBVAvira URL Cloud: Label: malware
Source: http://91.206.178.125/upload/upload.asp(TGAvira URL Cloud: Label: malware
Source: http://91.206.178.125/upload/upload.aspskAvira URL Cloud: Label: malware
Source: http://91.206.178.125/SnAvira URL Cloud: Label: malware
Source: C:\Users\user\AppData\Local\Microsoft\Windows\usrgroup.datAvira: detection malicious, Label: TR/ATRAPS.Gen
Source: http://91.206.178.125/upload/upload.aspVirustotal: Detection: 16%Perma Link
Source: C:\Users\user\AppData\Local\Microsoft\Windows\usrgroup.datReversingLabs: Detection: 47%
Source: C:\Users\user\AppData\Local\Microsoft\Windows\usrgroup.datVirustotal: Detection: 64%Perma Link
Source: fqJIOoSp5U.dllReversingLabs: Detection: 75%
Source: fqJIOoSp5U.dllVirustotal: Detection: 72%Perma Link
Source: C:\Windows\System32\rundll32.exeCode function: 19_2_0000000180007040 malloc,CryptAcquireContextW,GetLastError,wprintf,CryptCreateHash,GetLastError,wprintf,CryptReleaseContext,CryptHashData,GetLastError,wprintf,CryptReleaseContext,CryptDestroyHash,CryptGetHashParam,GetLastError,CryptReleaseContext,CryptDestroyHash,19_2_0000000180007040
Source: fqJIOoSp5U.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT
Source: Binary string: F:\workspace\CBG\npmLoaderDll\x64\Release\npmLoaderDll.pdb source: fqJIOoSp5U.dll
Source: Binary string: F:\workspace\CBG\npmLoaderDll\x64\Release\npmLoaderDll.pdb source: fqJIOoSp5U.dll
Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAsJump to behavior
Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32Jump to behavior
Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler32Jump to behavior
Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandlerJump to behavior
Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAsJump to behavior
Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32Jump to behavior
Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler32Jump to behavior
Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandlerJump to behavior
Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\LocalServer32Jump to behavior
Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\LocalServerJump to behavior
Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\ElevationJump to behavior
Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAsJump to behavior
Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAsJump to behavior
Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32Jump to behavior
Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler32Jump to behavior
Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandlerJump to behavior
Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAsJump to behavior
Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32Jump to behavior
Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler32Jump to behavior
Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandlerJump to behavior
Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\LocalServer32Jump to behavior
Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\LocalServerJump to behavior
Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\ElevationJump to behavior
Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAsJump to behavior
Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAsJump to behavior
Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32Jump to behavior
Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler32Jump to behavior
Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandlerJump to behavior
Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAsJump to behavior
Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32Jump to behavior
Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler32Jump to behavior
Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandlerJump to behavior
Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\LocalServer32Jump to behavior
Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\LocalServerJump to behavior
Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\ElevationJump to behavior
Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAsJump to behavior
Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAsJump to behavior
Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32Jump to behavior
Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler32Jump to behavior
Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandlerJump to behavior
Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAsJump to behavior
Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32Jump to behavior
Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler32Jump to behavior
Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandlerJump to behavior
Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\LocalServer32Jump to behavior
Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\LocalServerJump to behavior
Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\ElevationJump to behavior
Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAsJump to behavior

Networking

barindex
Source: C:\Windows\System32\rundll32.exeNetwork Connect: 91.206.178.125 80Jump to behavior
Source: Joe Sandbox ViewASN Name: ARTNET2PL ARTNET2PL
Source: global trafficTCP traffic: 192.168.2.7:49704 -> 91.206.178.125:80
Source: unknownTCP traffic detected without corresponding DNS query: 91.206.178.125
Source: unknownTCP traffic detected without corresponding DNS query: 91.206.178.125
Source: unknownTCP traffic detected without corresponding DNS query: 91.206.178.125
Source: unknownTCP traffic detected without corresponding DNS query: 91.206.178.125
Source: unknownTCP traffic detected without corresponding DNS query: 91.206.178.125
Source: unknownTCP traffic detected without corresponding DNS query: 91.206.178.125
Source: unknownTCP traffic detected without corresponding DNS query: 91.206.178.125
Source: unknownTCP traffic detected without corresponding DNS query: 91.206.178.125
Source: unknownTCP traffic detected without corresponding DNS query: 91.206.178.125
Source: unknownTCP traffic detected without corresponding DNS query: 91.206.178.125
Source: unknownTCP traffic detected without corresponding DNS query: 91.206.178.125
Source: unknownTCP traffic detected without corresponding DNS query: 91.206.178.125
Source: unknownTCP traffic detected without corresponding DNS query: 91.206.178.125
Source: unknownTCP traffic detected without corresponding DNS query: 91.206.178.125
Source: unknownTCP traffic detected without corresponding DNS query: 91.206.178.125
Source: unknownTCP traffic detected without corresponding DNS query: 91.206.178.125
Source: unknownTCP traffic detected without corresponding DNS query: 91.206.178.125
Source: unknownTCP traffic detected without corresponding DNS query: 91.206.178.125
Source: unknownTCP traffic detected without corresponding DNS query: 91.206.178.125
Source: unknownTCP traffic detected without corresponding DNS query: 91.206.178.125
Source: unknownTCP traffic detected without corresponding DNS query: 91.206.178.125
Source: unknownTCP traffic detected without corresponding DNS query: 91.206.178.125
Source: unknownTCP traffic detected without corresponding DNS query: 91.206.178.125
Source: unknownTCP traffic detected without corresponding DNS query: 91.206.178.125
Source: C:\Windows\System32\rundll32.exeCode function: 19_2_00000001800023F0 HttpQueryInfoA,InternetQueryDataAvailable,InternetReadFile,InternetQueryDataAvailable,19_2_00000001800023F0
Source: rundll32.exe, 00000013.00000003.1911259788.00000168A539A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.1697865690.00000168A539A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2122986845.00000168A539A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://91.206.178.125/Sn
Source: rundll32.exe, 00000013.00000002.2440336550.00000168A539A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://91.206.178.125/upload/upload.asp
Source: rundll32.exe, 00000013.00000003.1911259788.00000168A539A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2334701578.00000168A539A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2122986845.00000168A539A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000002.2440336550.00000168A539A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://91.206.178.125/upload/upload.asp$TK
Source: rundll32.exe, 00000013.00000003.1911259788.00000168A539A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2334701578.00000168A539A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2122986845.00000168A539A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000002.2440336550.00000168A539A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://91.206.178.125/upload/upload.asp(TG
Source: rundll32.exe, 00000013.00000003.1911259788.00000168A539A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2334701578.00000168A539A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2122986845.00000168A539A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000002.2440336550.00000168A539A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://91.206.178.125/upload/upload.asp.TM
Source: rundll32.exe, 00000013.00000003.2122986845.00000168A539A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://91.206.178.125/upload/upload.asp5/upload/upload.asp
Source: rundll32.exe, 00000013.00000003.2334701578.00000168A5348000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000002.2440336550.00000168A5348000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://91.206.178.125/upload/upload.asp5029
Source: rundll32.exe, 00000013.00000003.1911259788.00000168A539A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://91.206.178.125/upload/upload.asp:TQ
Source: rundll32.exe, 00000013.00000002.2439420006.0000001077D44000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://91.206.178.125/upload/upload.asp;
Source: rundll32.exe, 00000013.00000003.2334701578.00000168A539A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2122986845.00000168A539A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000002.2440336550.00000168A539A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://91.206.178.125/upload/upload.aspBV
Source: rundll32.exe, 00000013.00000003.1911259788.00000168A539A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2334701578.00000168A539A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2122986845.00000168A539A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000002.2440336550.00000168A539A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://91.206.178.125/upload/upload.aspEV
Source: rundll32.exe, 00000013.00000003.2334701578.00000168A5389000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2122986845.00000168A5389000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.1911259788.00000168A5380000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.1697865690.00000168A5380000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000002.2440336550.00000168A5389000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://91.206.178.125/upload/upload.aspEz
Source: rundll32.exe, 00000013.00000002.2440336550.00000168A539A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://91.206.178.125/upload/upload.aspIV
Source: rundll32.exe, 00000013.00000003.2334701578.00000168A5389000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2122986845.00000168A5389000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.1911259788.00000168A5380000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000002.2440336550.00000168A5389000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://91.206.178.125/upload/upload.aspLz
Source: rundll32.exe, 00000013.00000002.2440336550.00000168A539A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://91.206.178.125/upload/upload.aspOV
Source: rundll32.exe, 00000013.00000003.1911259788.00000168A5348000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://91.206.178.125/upload/upload.aspParameters
Source: rundll32.exe, 00000013.00000003.2334701578.00000168A539A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2122986845.00000168A539A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000002.2440336550.00000168A539A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://91.206.178.125/upload/upload.aspQV
Source: rundll32.exe, 00000013.00000003.2334701578.00000168A539A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000002.2440336550.00000168A539A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://91.206.178.125/upload/upload.aspXV
Source: rundll32.exe, 00000013.00000003.2334701578.00000168A5389000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2122986845.00000168A5389000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.1911259788.00000168A5380000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.1697865690.00000168A5380000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000002.2440336550.00000168A5389000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://91.206.178.125/upload/upload.aspXz
Source: rundll32.exe, 00000013.00000002.2439019102.0000000180051000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://91.206.178.125/upload/upload.asphttp://91.206.17
Source: rundll32.exe, 00000013.00000003.2334701578.00000168A539A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000002.2440336550.00000168A539A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://91.206.178.125/upload/upload.aspi
Source: rundll32.exe, 00000013.00000002.2440336550.00000168A539A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://91.206.178.125/upload/upload.aspjT
Source: rundll32.exe, 00000013.00000003.1911259788.00000168A5348000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://91.206.178.125/upload/upload.aspsk
Source: rundll32.exe, 00000013.00000003.1911259788.00000168A5380000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://91.206.178.125/upload/upload.aspx
Source: C:\Windows\System32\rundll32.exeCode function: 4_3_00000001800024304_3_0000000180002430
Source: C:\Windows\System32\rundll32.exeCode function: 4_3_000000018000966C4_3_000000018000966C
Source: C:\Windows\System32\rundll32.exeCode function: 4_3_00000001800017C04_3_00000001800017C0
Source: C:\Windows\System32\rundll32.exeCode function: 4_3_00000001800010004_3_0000000180001000
Source: C:\Windows\System32\rundll32.exeCode function: 4_3_00000001800088184_3_0000000180008818
Source: C:\Windows\System32\rundll32.exeCode function: 4_3_000000018001401C4_3_000000018001401C
Source: C:\Windows\System32\rundll32.exeCode function: 4_3_00000001800028C04_3_00000001800028C0
Source: C:\Windows\System32\rundll32.exeCode function: 4_3_00000001800011804_3_0000000180001180
Source: C:\Windows\System32\rundll32.exeCode function: 4_3_00000001800039CB4_3_00000001800039CB
Source: C:\Windows\System32\rundll32.exeCode function: 4_3_0000000180006A904_3_0000000180006A90
Source: C:\Windows\System32\rundll32.exeCode function: 4_3_0000000180014AD04_3_0000000180014AD0
Source: C:\Windows\System32\rundll32.exeCode function: 4_3_0000000180007AD84_3_0000000180007AD8
Source: C:\Windows\System32\rundll32.exeCode function: 4_3_0000000180011EEC4_3_0000000180011EEC
Source: C:\Windows\System32\rundll32.exeCode function: 4_3_0000000180009AEC4_3_0000000180009AEC
Source: C:\Windows\System32\rundll32.exeCode function: 4_3_0000000180004B204_3_0000000180004B20
Source: C:\Windows\System32\rundll32.exeCode function: 4_3_00000001800073604_3_0000000180007360
Source: C:\Windows\System32\rundll32.exeCode function: 4_3_000000018000BB9C4_3_000000018000BB9C
Source: C:\Windows\System32\rundll32.exeCode function: 4_3_00000001800137B84_3_00000001800137B8
Source: C:\Windows\System32\rundll32.exeCode function: 4_3_000000018000C7B84_3_000000018000C7B8
Source: C:\Windows\System32\rundll32.exeCode function: 4_3_00000001800013E04_3_00000001800013E0
Source: C:\Windows\System32\rundll32.exeCode function: 7_3_00000001800024307_3_0000000180002430
Source: C:\Windows\System32\rundll32.exeCode function: 7_3_000000018000966C7_3_000000018000966C
Source: C:\Windows\System32\rundll32.exeCode function: 7_3_00000001800017C07_3_00000001800017C0
Source: C:\Windows\System32\rundll32.exeCode function: 7_3_00000001800010007_3_0000000180001000
Source: C:\Windows\System32\rundll32.exeCode function: 7_3_00000001800088187_3_0000000180008818
Source: C:\Windows\System32\rundll32.exeCode function: 7_3_000000018001401C7_3_000000018001401C
Source: C:\Windows\System32\rundll32.exeCode function: 7_3_00000001800028C07_3_00000001800028C0
Source: C:\Windows\System32\rundll32.exeCode function: 7_3_00000001800011807_3_0000000180001180
Source: C:\Windows\System32\rundll32.exeCode function: 7_3_00000001800039CB7_3_00000001800039CB
Source: C:\Windows\System32\rundll32.exeCode function: 7_3_0000000180006A907_3_0000000180006A90
Source: C:\Windows\System32\rundll32.exeCode function: 7_3_0000000180014AD07_3_0000000180014AD0
Source: C:\Windows\System32\rundll32.exeCode function: 7_3_0000000180007AD87_3_0000000180007AD8
Source: C:\Windows\System32\rundll32.exeCode function: 7_3_0000000180011EEC7_3_0000000180011EEC
Source: C:\Windows\System32\rundll32.exeCode function: 7_3_0000000180009AEC7_3_0000000180009AEC
Source: C:\Windows\System32\rundll32.exeCode function: 7_3_0000000180004B207_3_0000000180004B20
Source: C:\Windows\System32\rundll32.exeCode function: 7_3_00000001800073607_3_0000000180007360
Source: C:\Windows\System32\rundll32.exeCode function: 7_3_000000018000BB9C7_3_000000018000BB9C
Source: C:\Windows\System32\rundll32.exeCode function: 7_3_00000001800137B87_3_00000001800137B8
Source: C:\Windows\System32\rundll32.exeCode function: 7_3_000000018000C7B87_3_000000018000C7B8
Source: C:\Windows\System32\rundll32.exeCode function: 7_3_00000001800013E07_3_00000001800013E0
Source: C:\Windows\System32\rundll32.exeCode function: 8_3_00000001800024308_3_0000000180002430
Source: C:\Windows\System32\rundll32.exeCode function: 8_3_000000018000966C8_3_000000018000966C
Source: C:\Windows\System32\rundll32.exeCode function: 8_3_00000001800017C08_3_00000001800017C0
Source: C:\Windows\System32\rundll32.exeCode function: 8_3_00000001800010008_3_0000000180001000
Source: C:\Windows\System32\rundll32.exeCode function: 8_3_00000001800088188_3_0000000180008818
Source: C:\Windows\System32\rundll32.exeCode function: 8_3_000000018001401C8_3_000000018001401C
Source: C:\Windows\System32\rundll32.exeCode function: 8_3_00000001800028C08_3_00000001800028C0
Source: C:\Windows\System32\rundll32.exeCode function: 8_3_00000001800011808_3_0000000180001180
Source: C:\Windows\System32\rundll32.exeCode function: 8_3_00000001800039CB8_3_00000001800039CB
Source: C:\Windows\System32\rundll32.exeCode function: 8_3_0000000180006A908_3_0000000180006A90
Source: C:\Windows\System32\rundll32.exeCode function: 8_3_0000000180014AD08_3_0000000180014AD0
Source: C:\Windows\System32\rundll32.exeCode function: 8_3_0000000180007AD88_3_0000000180007AD8
Source: C:\Windows\System32\rundll32.exeCode function: 8_3_0000000180011EEC8_3_0000000180011EEC
Source: C:\Windows\System32\rundll32.exeCode function: 8_3_0000000180009AEC8_3_0000000180009AEC
Source: C:\Windows\System32\rundll32.exeCode function: 8_3_0000000180004B208_3_0000000180004B20
Source: C:\Windows\System32\rundll32.exeCode function: 8_3_00000001800073608_3_0000000180007360
Source: C:\Windows\System32\rundll32.exeCode function: 8_3_000000018000BB9C8_3_000000018000BB9C
Source: C:\Windows\System32\rundll32.exeCode function: 8_3_00000001800137B88_3_00000001800137B8
Source: C:\Windows\System32\rundll32.exeCode function: 8_3_000000018000C7B88_3_000000018000C7B8
Source: C:\Windows\System32\rundll32.exeCode function: 8_3_00000001800013E08_3_00000001800013E0
Source: C:\Windows\System32\rundll32.exeCode function: 9_3_00000001800024309_3_0000000180002430
Source: C:\Windows\System32\rundll32.exeCode function: 9_3_000000018000966C9_3_000000018000966C
Source: C:\Windows\System32\rundll32.exeCode function: 9_3_00000001800017C09_3_00000001800017C0
Source: C:\Windows\System32\rundll32.exeCode function: 9_3_00000001800010009_3_0000000180001000
Source: C:\Windows\System32\rundll32.exeCode function: 9_3_00000001800088189_3_0000000180008818
Source: C:\Windows\System32\rundll32.exeCode function: 9_3_000000018001401C9_3_000000018001401C
Source: C:\Windows\System32\rundll32.exeCode function: 9_3_00000001800028C09_3_00000001800028C0
Source: C:\Windows\System32\rundll32.exeCode function: 9_3_00000001800011809_3_0000000180001180
Source: C:\Windows\System32\rundll32.exeCode function: 9_3_00000001800039CB9_3_00000001800039CB
Source: C:\Windows\System32\rundll32.exeCode function: 9_3_0000000180006A909_3_0000000180006A90
Source: C:\Windows\System32\rundll32.exeCode function: 9_3_0000000180014AD09_3_0000000180014AD0
Source: C:\Windows\System32\rundll32.exeCode function: 9_3_0000000180007AD89_3_0000000180007AD8
Source: C:\Windows\System32\rundll32.exeCode function: 9_3_0000000180011EEC9_3_0000000180011EEC
Source: C:\Windows\System32\rundll32.exeCode function: 9_3_0000000180009AEC9_3_0000000180009AEC
Source: C:\Windows\System32\rundll32.exeCode function: 9_3_0000000180004B209_3_0000000180004B20
Source: C:\Windows\System32\rundll32.exeCode function: 9_3_00000001800073609_3_0000000180007360
Source: C:\Windows\System32\rundll32.exeCode function: 9_3_000000018000BB9C9_3_000000018000BB9C
Source: C:\Windows\System32\rundll32.exeCode function: 9_3_00000001800137B89_3_00000001800137B8
Source: C:\Windows\System32\rundll32.exeCode function: 9_3_000000018000C7B89_3_000000018000C7B8
Source: C:\Windows\System32\rundll32.exeCode function: 9_3_00000001800013E09_3_00000001800013E0
Source: C:\Windows\System32\rundll32.exeCode function: 19_2_00007FFB226732F119_2_00007FFB226732F1
Source: C:\Windows\System32\rundll32.exeCode function: 19_2_00007FFB22671CCA19_2_00007FFB22671CCA
Source: C:\Windows\System32\rundll32.exeCode function: 19_2_00007FFB22674CC419_2_00007FFB22674CC4
Source: C:\Windows\System32\rundll32.exeCode function: 19_2_00007FFB22674F6819_2_00007FFB22674F68
Source: C:\Windows\System32\rundll32.exeCode function: 19_2_00007FFB22671C8419_2_00007FFB22671C84
Source: C:\Windows\System32\rundll32.exeCode function: 19_2_000000018000740019_2_0000000180007400
Source: C:\Windows\System32\rundll32.exeCode function: 19_2_000000018000204019_2_0000000180002040
Source: C:\Windows\System32\rundll32.exeCode function: 19_2_000000018000EA8C19_2_000000018000EA8C
Source: C:\Windows\System32\rundll32.exeCode function: 19_2_0000000180008ED019_2_0000000180008ED0
Source: C:\Windows\System32\rundll32.exeCode function: 19_2_00000001800047F019_2_00000001800047F0
Source: C:\Windows\System32\rundll32.exeCode function: 19_2_000000018000100019_2_0000000180001000
Source: C:\Windows\System32\rundll32.exeCode function: 19_2_0000000180007A3019_2_0000000180007A30
Source: C:\Windows\System32\rundll32.exeCode function: 19_2_000000018000704019_2_0000000180007040
Source: C:\Windows\System32\rundll32.exeCode function: 19_2_000000018000A28419_2_000000018000A284
Source: C:\Windows\System32\rundll32.exeCode function: 19_2_000000018000829019_2_0000000180008290
Source: C:\Windows\System32\rundll32.exeCode function: 19_2_000000018000369B19_2_000000018000369B
Source: C:\Windows\System32\rundll32.exeCode function: 19_2_0000000180009CE019_2_0000000180009CE0
Source: C:\Windows\System32\rundll32.exeCode function: 19_2_000000018000EF0C19_2_000000018000EF0C
Source: C:\Windows\System32\rundll32.exeCode function: 19_2_000000018000C51819_2_000000018000C518
Source: C:\Windows\System32\rundll32.exeCode function: 19_2_000000018000254019_2_0000000180002540
Source: C:\Windows\System32\rundll32.exeCode function: 19_2_000000018000677019_2_0000000180006770
Source: C:\Windows\System32\rundll32.exeCode function: 19_2_0000000180008B7019_2_0000000180008B70
Source: C:\Windows\System32\rundll32.exeCode function: 19_2_000000018000118019_2_0000000180001180
Source: C:\Windows\System32\rundll32.exeCode function: 19_2_000000018001119C19_2_000000018001119C
Source: C:\Windows\System32\rundll32.exeCode function: 19_2_000000018000B5A019_2_000000018000B5A0
Source: C:\Windows\System32\rundll32.exeCode function: 19_2_000000018000DFAC19_2_000000018000DFAC
Source: C:\Windows\System32\rundll32.exeCode function: 19_2_00000001800013E019_2_00000001800013E0
Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Microsoft\Windows\usrgroup.dat 00433EBF3B21C1C055D4AB8A599D3E84F03B328496236B54E56042CEF2146B1C
Source: C:\Windows\System32\rundll32.exeCode function: String function: 000000018000B40C appears 44 times
Source: C:\Windows\System32\loaddll64.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: kernel.appcore.dllJump to behavior
Source: fqJIOoSp5U.dllStatic PE information: Section: .data ZLIB complexity 0.9890470436151079
Source: classification engineClassification label: mal100.evad.winDLL@16/2@0/1
Source: C:\Windows\System32\rundll32.exeCode function: 4_3_00000001800017C0 CoInitializeEx,wprintf,CoCreateInstance,VariantInit,VariantInit,VariantInit,VariantInit,VariantClear,VariantClear,VariantClear,VariantClear,SysAllocString,SysFreeString,SysAllocString,SysFreeString,SysAllocString,SysFreeString,SysAllocString,SysFreeString,SysAllocString,SysFreeString,SysAllocString,SysFreeString,MultiByteToWideChar,SysAllocString,SysFreeString,SysAllocString,SysFreeString,SysFreeString,SysAllocString,VariantInit,VariantInit,SysAllocString,SysFreeString,VariantClear,VariantClear,VariantClear,CoUninitialize,wprintf,CoUninitialize,4_3_00000001800017C0
Source: C:\Windows\System32\rundll32.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\usrgroup.datJump to behavior
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6044:120:WilError_03
Source: fqJIOoSp5U.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Windows\System32\loaddll64.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\fqJIOoSp5U.dll,CalculateSum
Source: fqJIOoSp5U.dllReversingLabs: Detection: 75%
Source: fqJIOoSp5U.dllVirustotal: Detection: 72%
Source: unknownProcess created: C:\Windows\System32\loaddll64.exe loaddll64.exe "C:\Users\user\Desktop\fqJIOoSp5U.dll"
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\fqJIOoSp5U.dll",#1
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\fqJIOoSp5U.dll,CalculateSum
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\fqJIOoSp5U.dll",#1
Source: unknownProcess created: C:\Windows\System32\rundll32.exe RUNDLL32.exe C:\Windows\system32\config\systemprofile\AppData\Roaming\..\Local\Microsoft\Windows\usrgroup.dat,LoadDll C:\Windows\system32\config\systemprofile\AppData\Roaming\..\Local\Microsoft\Windows\Explorer\thumbcache_512.db "zjWy" 5555
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\fqJIOoSp5U.dll,CalculateSumW
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\fqJIOoSp5U.dll",CalculateSum
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\fqJIOoSp5U.dll",CalculateSumW
Source: unknownProcess created: C:\Windows\System32\rundll32.exe RUNDLL32.exe C:\Users\user\AppData\Roaming\..\Local\Microsoft\Windows\usrgroup.dat,LoadDll C:\Users\user\AppData\Roaming\..\Local\Microsoft\Windows\Explorer\thumbcache_512.db "zjWy" 5555
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\fqJIOoSp5U.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\fqJIOoSp5U.dll,CalculateSumJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\fqJIOoSp5U.dll,CalculateSumWJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\fqJIOoSp5U.dll",CalculateSumJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\fqJIOoSp5U.dll",CalculateSumWJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\fqJIOoSp5U.dll",#1Jump to behavior
Source: C:\Windows\System32\rundll32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32Jump to behavior
Source: fqJIOoSp5U.dllStatic PE information: Image base 0x180000000 > 0x60000000
Source: fqJIOoSp5U.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT
Source: fqJIOoSp5U.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: F:\workspace\CBG\npmLoaderDll\x64\Release\npmLoaderDll.pdb source: fqJIOoSp5U.dll
Source: Binary string: F:\workspace\CBG\npmLoaderDll\x64\Release\npmLoaderDll.pdb source: fqJIOoSp5U.dll
Source: C:\Windows\System32\rundll32.exeCode function: 4_3_000000018000EE74 LoadLibraryW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,4_3_000000018000EE74
Source: C:\Windows\System32\rundll32.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\usrgroup.datJump to dropped file
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\usrgroup.datJump to dropped file
Source: C:\Windows\System32\rundll32.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_19-18469
Source: C:\Windows\System32\rundll32.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcessgraph_19-16679
Source: C:\Windows\System32\loaddll64.exe TID: 1092Thread sleep time: -120000s >= -30000sJump to behavior
Source: C:\Windows\System32\rundll32.exe TID: 1432Thread sleep time: -240000s >= -30000sJump to behavior
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\loaddll64.exeThread delayed: delay time: 120000Jump to behavior
Source: C:\Windows\System32\rundll32.exeThread delayed: delay time: 60000Jump to behavior
Source: rundll32.exe, 00000013.00000002.2440336550.00000168A52EE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW\user
Source: rundll32.exe, 00000013.00000003.1911366916.00000168A53A5000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000002.2440336550.00000168A53A5000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.1697865690.00000168A535B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2334701578.00000168A5348000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.1911259788.00000168A535B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000002.2440336550.00000168A5348000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.1697865690.00000168A53A5000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.1911366916.00000168A5365000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2334701578.00000168A53A5000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2122986845.00000168A5348000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: C:\Windows\System32\rundll32.exeAPI call chain: ExitProcess graph end nodegraph_19-16681
Source: C:\Windows\System32\rundll32.exeCode function: 4_3_0000000180009284 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_3_0000000180009284
Source: C:\Windows\System32\rundll32.exeCode function: 4_3_000000018000EE74 LoadLibraryW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,4_3_000000018000EE74
Source: C:\Windows\System32\rundll32.exeCode function: 19_2_00007FFB22671440 VirtualAlloc,VirtualAlloc,GetProcessHeap,HeapAlloc,VirtualAlloc,VirtualAlloc,19_2_00007FFB22671440
Source: C:\Windows\System32\rundll32.exeCode function: 4_3_0000000180009284 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_3_0000000180009284
Source: C:\Windows\System32\rundll32.exeCode function: 4_3_00000001800072A0 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,4_3_00000001800072A0
Source: C:\Windows\System32\rundll32.exeCode function: 7_3_0000000180009284 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,7_3_0000000180009284
Source: C:\Windows\System32\rundll32.exeCode function: 7_3_00000001800072A0 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,7_3_00000001800072A0
Source: C:\Windows\System32\rundll32.exeCode function: 8_3_0000000180009284 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,8_3_0000000180009284
Source: C:\Windows\System32\rundll32.exeCode function: 8_3_00000001800072A0 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,8_3_00000001800072A0
Source: C:\Windows\System32\rundll32.exeCode function: 9_3_0000000180009284 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,9_3_0000000180009284
Source: C:\Windows\System32\rundll32.exeCode function: 9_3_00000001800072A0 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,9_3_00000001800072A0
Source: C:\Windows\System32\rundll32.exeCode function: 19_2_00007FFB22674318 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,19_2_00007FFB22674318
Source: C:\Windows\System32\rundll32.exeCode function: 19_2_00007FFB22673900 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,19_2_00007FFB22673900
Source: C:\Windows\System32\rundll32.exeCode function: 19_2_0000000180009400 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,19_2_0000000180009400
Source: C:\Windows\System32\rundll32.exeCode function: 19_2_000000018000C00C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,19_2_000000018000C00C

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Windows\System32\rundll32.exeNetwork Connect: 91.206.178.125 80Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\fqJIOoSp5U.dll",#1Jump to behavior
Source: C:\Windows\System32\rundll32.exeCode function: 4_3_0000000180007964 GetSystemTimeAsFileTime,4_3_0000000180007964
Source: C:\Windows\System32\rundll32.exeCode function: 4_3_000000018000966C _lock,_get_daylight,_get_daylight,_get_daylight,___lc_codepage_func,free,free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,4_3_000000018000966C
Source: C:\Windows\System32\rundll32.exeCode function: 4_3_000000018000BA5C HeapCreate,GetVersion,HeapSetInformation,4_3_000000018000BA5C
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Scheduled Task/Job
1
Scheduled Task/Job
111
Process Injection
1
Masquerading
OS Credential Dumping2
System Time Discovery
Remote Services1
Archive Collected Data
2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts3
Native API
1
DLL Side-Loading
1
Scheduled Task/Job
11
Virtualization/Sandbox Evasion
LSASS Memory121
Security Software Discovery
Remote Desktop ProtocolData from Removable Media1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
DLL Side-Loading
111
Process Injection
Security Account Manager11
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Deobfuscate/Decode Files or Information
NTDS3
System Information Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Obfuscated Files or Information
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
Rundll32
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
Software Packing
DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
DLL Side-Loading
Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1404636 Sample: fqJIOoSp5U.exe Startdate: 07/03/2024 Architecture: WINDOWS Score: 100 30 Multi AV Scanner detection for domain / URL 2->30 32 Antivirus detection for URL or domain 2->32 34 Antivirus detection for dropped file 2->34 36 4 other signatures 2->36 7 rundll32.exe 12 2->7         started        11 loaddll64.exe 1 2->11         started        13 rundll32.exe 2->13         started        process3 dnsIp4 28 91.206.178.125, 80 ARTNET2PL Poland 7->28 38 System process connects to network (likely due to code injection or exploit) 7->38 15 rundll32.exe 4 11->15         started        18 cmd.exe 1 11->18         started        20 rundll32.exe 2 11->20         started        22 3 other processes 11->22 signatures5 process6 file7 26 C:\Users\user\AppData\Local\...\usrgroup.dat, PE32+ 15->26 dropped 24 rundll32.exe 18->24         started        process8

This section contains all screenshots as thumbnails, including those not shown in the slideshow.