Windows Analysis Report
santolibre.net.mail.dll

Overview

General Information

Sample name: santolibre.net.mail.dll
Analysis ID: 1426558
MD5: 5a12ca110e48cad0900dcea778f20288
SHA1: 5dc8fc4d026a4b9c69f9d68334b2480a81cba7a6
SHA256: 6c73ad2e966b13bb077ce31f1ac927d43721ab9f0cb1cd46558fa28a55d6bcb6
Infos:

Detection

Score: 2
Range: 0 - 100
Whitelisted: false
Confidence: 60%

Signatures

Binary contains a suspicious time stamp
Creates a process in suspended mode (likely to inject code)
Program does not show much activity (idle)
Sample execution stops while process was sleeping (likely an evasion)

Classification

Source: santolibre.net.mail.dll Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: D:\Source\github.com\andywcoder\core-apps\vacation-planner-mk-web\api\Santolibre.Net.Mail\obj\Debug\netstandard2.1\Santolibre.Net.Mail.pdbSHA256baN source: santolibre.net.mail.dll
Source: Binary string: D:\Source\github.com\andywcoder\core-apps\vacation-planner-mk-web\api\Santolibre.Net.Mail\obj\Debug\netstandard2.1\Santolibre.Net.Mail.pdb source: santolibre.net.mail.dll
Source: classification engine Classification label: clean2.winDLL@6/0@0/0
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3196:120:WilError_03
Source: santolibre.net.mail.dll Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Windows\System32\loaddll32.exe Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\santolibre.net.mail.dll",#1
Source: unknown Process created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\santolibre.net.mail.dll"
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\santolibre.net.mail.dll",#1
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\santolibre.net.mail.dll",#1
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\santolibre.net.mail.dll",#1 Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\santolibre.net.mail.dll",#1 Jump to behavior
Source: C:\Windows\System32\loaddll32.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Windows\System32\loaddll32.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe Section loaded: apphelp.dll Jump to behavior
Source: santolibre.net.mail.dll Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: santolibre.net.mail.dll Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: santolibre.net.mail.dll Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: D:\Source\github.com\andywcoder\core-apps\vacation-planner-mk-web\api\Santolibre.Net.Mail\obj\Debug\netstandard2.1\Santolibre.Net.Mail.pdbSHA256baN source: santolibre.net.mail.dll
Source: Binary string: D:\Source\github.com\andywcoder\core-apps\vacation-planner-mk-web\api\Santolibre.Net.Mail\obj\Debug\netstandard2.1\Santolibre.Net.Mail.pdb source: santolibre.net.mail.dll
Source: santolibre.net.mail.dll Static PE information: 0xB62BAEC5 [Sun Nov 7 00:41:41 2066 UTC]
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: all processes Thread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: C:\Windows\System32\loaddll32.exe Thread delayed: delay time: 120000 Jump to behavior
Source: all processes Thread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\santolibre.net.mail.dll",#1 Jump to behavior
No contacted IP infos