Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
1.dll

Overview

General Information

Sample name:1.dll
(renamed file extension from exe to dll)
Original sample name:1.exe
Analysis ID:1417057
MD5:4a77fb2014f6d9a165a139bd550916ae
SHA1:9f717b1a5d22f74979934b6c55d22f8990608c3f
SHA256:f2d850025dd7b65c44d979ec74a3f5a77e1c15b4070812be5656887cee95dc59
Infos:

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Binary contains a suspicious time stamp
Creates a process in suspended mode (likely to inject code)
May sleep (evasive loops) to hinder dynamic analysis
PE file does not import any functions
Program does not show much activity (idle)
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Tries to load missing DLLs

Classification

  • System is w10x64
  • loaddll64.exe (PID: 760 cmdline: loaddll64.exe "C:\Users\user\Desktop\1.dll" MD5: 763455F9DCB24DFEECC2B9D9F8D46D52)
    • conhost.exe (PID: 2884 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 4512 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\1.dll",#1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • rundll32.exe (PID: 6416 cmdline: rundll32.exe "C:\Users\user\Desktop\1.dll",#1 MD5: EF3179D498793BF4234F708D3BE28633)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: 1.dllVirustotal: Detection: 11%Perma Link
Source: 1.dllStatic PE information: certificate valid
Source: 1.dllStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: C:\ArchonCore6\Common\Dell.FrontEndPlugin\obj\x64\Release\Dell.FrontEndPlugin.pdb source: 1.dll
Source: Binary string: C:\ArchonCore6\Common\Dell.FrontEndPlugin\obj\x64\Release\Dell.FrontEndPlugin.pdbSHA256qm source: 1.dll
Source: 1.dllString found in binary or memory: http://aia.entrust.net/evcs2-chain.p7c01
Source: 1.dllString found in binary or memory: http://aia.entrust.net/ts1-chain256.cer01
Source: 1.dllString found in binary or memory: http://crl.entrust.net/2048ca.crl0
Source: 1.dllString found in binary or memory: http://crl.entrust.net/csbr1.crl0
Source: 1.dllString found in binary or memory: http://crl.entrust.net/evcs2.crl0
Source: 1.dllString found in binary or memory: http://crl.entrust.net/g2ca.crl0
Source: 1.dllString found in binary or memory: http://crl.entrust.net/ts1ca.crl0
Source: 1.dllString found in binary or memory: http://ocsp.entrust.net00
Source: 1.dllString found in binary or memory: http://ocsp.entrust.net01
Source: 1.dllString found in binary or memory: http://ocsp.entrust.net02
Source: 1.dllString found in binary or memory: http://ocsp.entrust.net03
Source: 1.dllString found in binary or memory: http://www.entrust.net/rpa0
Source: 1.dllString found in binary or memory: http://www.entrust.net/rpa03
Source: 1.dllString found in binary or memory: https://www.entrust.net/rpa0
Source: 1.dllStatic PE information: No import functions for PE file found
Source: 1.dllBinary or memory string: OriginalFilenameDell.FrontEndPlugin.dllH vs 1.dll
Source: C:\Windows\System32\loaddll64.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: kernel.appcore.dllJump to behavior
Source: classification engineClassification label: mal48.winDLL@6/0@0/0
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2884:120:WilError_03
Source: 1.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Windows\System32\loaddll64.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\1.dll",#1
Source: 1.dllVirustotal: Detection: 11%
Source: unknownProcess created: C:\Windows\System32\loaddll64.exe loaddll64.exe "C:\Users\user\Desktop\1.dll"
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\1.dll",#1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\1.dll",#1
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\1.dll",#1Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\1.dll",#1Jump to behavior
Source: 1.dllStatic PE information: certificate valid
Source: 1.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: 1.dllStatic PE information: Image base 0x180000000 > 0x60000000
Source: 1.dllStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: 1.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: C:\ArchonCore6\Common\Dell.FrontEndPlugin\obj\x64\Release\Dell.FrontEndPlugin.pdb source: 1.dll
Source: Binary string: C:\ArchonCore6\Common\Dell.FrontEndPlugin\obj\x64\Release\Dell.FrontEndPlugin.pdbSHA256qm source: 1.dll
Source: 1.dllStatic PE information: 0x8093189B [Mon May 10 17:02:19 2038 UTC]
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\loaddll64.exe TID: 6044Thread sleep time: -120000s >= -30000sJump to behavior
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\loaddll64.exeThread delayed: delay time: 120000Jump to behavior
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\1.dll",#1Jump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
11
Process Injection
1
Rundll32
OS Credential Dumping11
Virtualization/Sandbox Evasion
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
11
Virtualization/Sandbox Evasion
LSASS Memory1
System Information Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
Process Injection
Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Timestomp
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
DLL Side-Loading
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1417057 Sample: 1.exe Startdate: 28/03/2024 Architecture: WINDOWS Score: 48 15 Multi AV Scanner detection for submitted file 2->15 7 loaddll64.exe 1 2->7         started        process3 process4 9 cmd.exe 1 7->9         started        11 conhost.exe 7->11         started        process5 13 rundll32.exe 9->13         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
1.dll9%ReversingLabs
1.dll11%VirustotalBrowse
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://ocsp.entrust.net030%URL Reputationsafe
http://ocsp.entrust.net020%URL Reputationsafe
http://ocsp.entrust.net010%URL Reputationsafe
http://ocsp.entrust.net000%URL Reputationsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://crl.entrust.net/g2ca.crl01.dllfalse
    high
    http://crl.entrust.net/csbr1.crl01.dllfalse
      high
      http://ocsp.entrust.net031.dllfalse
      • URL Reputation: safe
      unknown
      http://ocsp.entrust.net021.dllfalse
      • URL Reputation: safe
      unknown
      http://ocsp.entrust.net011.dllfalse
      • URL Reputation: safe
      unknown
      http://www.entrust.net/rpa031.dllfalse
        high
        http://ocsp.entrust.net001.dllfalse
        • URL Reputation: safe
        unknown
        http://aia.entrust.net/ts1-chain256.cer011.dllfalse
          high
          http://aia.entrust.net/evcs2-chain.p7c011.dllfalse
            high
            http://crl.entrust.net/ts1ca.crl01.dllfalse
              high
              http://crl.entrust.net/evcs2.crl01.dllfalse
                high
                http://www.entrust.net/rpa01.dllfalse
                  high
                  http://crl.entrust.net/2048ca.crl01.dllfalse
                    high
                    https://www.entrust.net/rpa01.dllfalse
                      high
                      No contacted IP infos
                      Joe Sandbox version:40.0.0 Tourmaline
                      Analysis ID:1417057
                      Start date and time:2024-03-28 15:09:07 +01:00
                      Joe Sandbox product:CloudBasic
                      Overall analysis duration:0h 1m 52s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                      Number of analysed new started processes analysed:5
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Sample name:1.dll
                      (renamed file extension from exe to dll)
                      Original Sample Name:1.exe
                      Detection:MAL
                      Classification:mal48.winDLL@6/0@0/0
                      EGA Information:Failed
                      HCA Information:
                      • Successful, ratio: 100%
                      • Number of executed functions: 0
                      • Number of non-executed functions: 0
                      Cookbook Comments:
                      • Stop behavior analysis, all processes terminated
                      • Exclude process from analysis (whitelisted): dllhost.exe
                      • Not all processes where analyzed, report is missing behavior information
                      TimeTypeDescription
                      15:09:57API Interceptor1x Sleep call for process: loaddll64.exe modified
                      No context
                      No context
                      No context
                      No context
                      No context
                      No created / dropped files found
                      File type:PE32+ executable (DLL) (console) x86-64 Mono/.Net assembly, for MS Windows
                      Entropy (8bit):6.9113178018830155
                      TrID:
                      • Win64 Dynamic Link Library (generic) (102004/3) 86.43%
                      • Win64 Executable (generic) (12005/4) 10.17%
                      • Generic Win/DOS Executable (2004/3) 1.70%
                      • DOS Executable Generic (2002/1) 1.70%
                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.01%
                      File name:1.dll
                      File size:16'312 bytes
                      MD5:4a77fb2014f6d9a165a139bd550916ae
                      SHA1:9f717b1a5d22f74979934b6c55d22f8990608c3f
                      SHA256:f2d850025dd7b65c44d979ec74a3f5a77e1c15b4070812be5656887cee95dc59
                      SHA512:e631cced344b322f56bf47e5b8492a0dfa0f7c90ebc2c89c05b71802c2b2c91da632f5b09dfbb3b2fbbb0da4eef29797c2c65ddf0f5474d379ce06f879d548f1
                      SSDEEP:384:lh4OElVMetbFP27xWkVbuWFrewThW/wi9NEwi2jHnn1H2:l6PjMspKxnVbuqHThlCN0EHn4
                      TLSH:9772295A17A81321FDDE4E3278D5D7136EB4D6B0F78388E7A015C5BADC823293A1073A
                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d................." ..0.................. ........... .......................`.......h....`...@......@............... .....
                      Icon Hash:7ae282899bbab082
                      Entrypoint:0x180000000
                      Entrypoint Section:
                      Digitally signed:true
                      Imagebase:0x180000000
                      Subsystem:windows cui
                      Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, DLL
                      DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                      Time Stamp:0x8093189B [Mon May 10 17:02:19 2038 UTC]
                      TLS Callbacks:
                      CLR (.Net) Version:
                      OS Version Major:4
                      OS Version Minor:0
                      File Version Major:4
                      File Version Minor:0
                      Subsystem Version Major:4
                      Subsystem Version Minor:0
                      Import Hash:
                      Signature Valid:true
                      Signature Issuer:CN=Entrust Extended Validation Code Signing CA - EVCS2, O="Entrust, Inc.", C=US
                      Signature Validation Error:The operation completed successfully
                      Error Number:0
                      Not Before, Not After
                      • 06/05/2022 22:05:44 03/12/2023 21:05:44
                      Subject Chain
                      • CN=Dell Inc, SERIALNUMBER=2141541, OU=Alienware, OID.2.5.4.15=Private Organization, O=Dell Inc, OID.1.3.6.1.4.1.311.60.2.1.2=Delaware, OID.1.3.6.1.4.1.311.60.2.1.3=US, L=Round Rock, S=Texas, C=US
                      Version:3
                      Thumbprint MD5:24714D472FF58BE6FF5A2C38E89589F9
                      Thumbprint SHA-1:21CB2B7BA0D44995482C2132B93A8BD009C531DC
                      Thumbprint SHA-256:2B63F54EA29916A25E161AABA79A2F07E46DBDE9CADDC6A1269D591ED59B34B2
                      Serial:6A51394839DF91350F87EF396D6B4F5A
                      Instruction
                      dec ebp
                      pop edx
                      nop
                      add byte ptr [ebx], al
                      add byte ptr [eax], al
                      add byte ptr [eax+eax], al
                      add byte ptr [eax], al
                      NameVirtual AddressVirtual Size Is in Section
                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x40000x380.rsrc
                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                      IMAGE_DIRECTORY_ENTRY_SECURITY0x14000x2bb8
                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                      IMAGE_DIRECTORY_ENTRY_DEBUG0x2c5c0x54.text
                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20000x48.text
                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                      .text0x20000xd410xe005d8b67081b4db69f52e9fcafbe839e2cFalse0.5022321428571429data5.0985066706174385IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      .rsrc0x40000x3800x4002e3b8b4e59550431f329f57217fbe71cFalse0.3408203125data2.8343863879375557IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      NameRVASizeTypeLanguageCountryZLIB Complexity
                      RT_VERSION0x40580x324data0.39676616915422885
                      No network behavior found

                      Click to jump to process

                      Click to jump to process

                      Click to jump to process

                      Target ID:0
                      Start time:15:09:56
                      Start date:28/03/2024
                      Path:C:\Windows\System32\loaddll64.exe
                      Wow64 process (32bit):false
                      Commandline:loaddll64.exe "C:\Users\user\Desktop\1.dll"
                      Imagebase:0x7ff716ea0000
                      File size:165'888 bytes
                      MD5 hash:763455F9DCB24DFEECC2B9D9F8D46D52
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:moderate
                      Has exited:true

                      Target ID:1
                      Start time:15:09:57
                      Start date:28/03/2024
                      Path:C:\Windows\System32\conhost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Imagebase:0x7ff6d64d0000
                      File size:862'208 bytes
                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:2
                      Start time:15:09:57
                      Start date:28/03/2024
                      Path:C:\Windows\System32\cmd.exe
                      Wow64 process (32bit):false
                      Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\1.dll",#1
                      Imagebase:0x7ff64f850000
                      File size:289'792 bytes
                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:3
                      Start time:15:09:57
                      Start date:28/03/2024
                      Path:C:\Windows\System32\rundll32.exe
                      Wow64 process (32bit):false
                      Commandline:rundll32.exe "C:\Users\user\Desktop\1.dll",#1
                      Imagebase:0x7ff6aaf30000
                      File size:71'680 bytes
                      MD5 hash:EF3179D498793BF4234F708D3BE28633
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      No disassembly