Windows Analysis Report
x318002.dll

Overview

General Information

Sample name: x318002.dll
(renamed file extension from dat to dll)
Original sample name: x318002.dat
Analysis ID: 1523787
MD5: 7dd99317e2bc5ccd7cd7e60c277113f8
SHA1: 9494b5a56952ba3228e03b2c129d825fc2ee2f9c
SHA256: ea01cb8fb7aee6688008aadcc043cc45b5c3d3e7ecbe0472e863065c01c9a8ac
Infos:

Detection

Score: 60
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Machine Learning detection for sample
Checks if the current process is being debugged
Creates a process in suspended mode (likely to inject code)
PE file contains sections with non-standard names
Program does not show much activity (idle)

Classification

AV Detection

barindex
Source: x318002.dll Avira: detected
Source: x318002.dll ReversingLabs: Detection: 44%
Source: x318002.dll Virustotal: Detection: 36% Perma Link
Source: x318002.dll Joe Sandbox ML: detected
Source: x318002.dll Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
Source: x318002.dll String found in binary or memory: https://ipinfo.io/json
Source: classification engine Classification label: mal60.winDLL@7/0@0/0
Source: x318002.dll Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Windows\System32\loaddll64.exe Key opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: C:\Windows\System32\loaddll64.exe Process created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\x318002.dll,ServiceMain
Source: x318002.dll ReversingLabs: Detection: 44%
Source: x318002.dll Virustotal: Detection: 36%
Source: unknown Process created: C:\Windows\System32\loaddll64.exe loaddll64.exe "C:\Users\user\Desktop\x318002.dll"
Source: C:\Windows\System32\loaddll64.exe Process created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\x318002.dll",#1
Source: C:\Windows\System32\loaddll64.exe Process created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\x318002.dll,ServiceMain
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\x318002.dll",#1
Source: C:\Windows\System32\loaddll64.exe Process created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\x318002.dll",#1 Jump to behavior
Source: C:\Windows\System32\loaddll64.exe Process created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\x318002.dll,ServiceMain Jump to behavior
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\x318002.dll",#1 Jump to behavior
Source: C:\Windows\System32\loaddll64.exe Section loaded: dxgi.dll Jump to behavior
Source: C:\Windows\System32\loaddll64.exe Section loaded: version.dll Jump to behavior
Source: C:\Windows\System32\loaddll64.exe Section loaded: dwmapi.dll Jump to behavior
Source: C:\Windows\System32\loaddll64.exe Section loaded: powrprof.dll Jump to behavior
Source: C:\Windows\System32\loaddll64.exe Section loaded: wtsapi32.dll Jump to behavior
Source: C:\Windows\System32\loaddll64.exe Section loaded: libcurl.dll Jump to behavior
Source: C:\Windows\System32\cmd.exe Section loaded: winbrand.dll Jump to behavior
Source: C:\Windows\System32\rundll32.exe Automated click: OK
Source: C:\Windows\System32\rundll32.exe Automated click: OK
Source: C:\Windows\System32\rundll32.exe Automated click: OK
Source: C:\Windows\System32\rundll32.exe Automated click: OK
Source: Window Recorder Window detected: More than 3 window changes detected
Source: x318002.dll Static PE information: Image base 0x180000000 > 0x60000000
Source: x318002.dll Static file information: File size 2258944 > 1048576
Source: x318002.dll Static PE information: Raw size of .rdata is bigger than: 0x100000 < 0x156400
Source: x318002.dll Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: x318002.dll Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: x318002.dll Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: x318002.dll Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: x318002.dll Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: x318002.dll Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: x318002.dll Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
Source: x318002.dll Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: x318002.dll Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: x318002.dll Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: x318002.dll Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: x318002.dll Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: x318002.dll Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: x318002.dll Static PE information: section name: .fptable
Source: C:\Windows\System32\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: all processes Thread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Windows\System32\loaddll64.exe Process queried: DebugPort Jump to behavior
Source: all processes Thread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Windows\System32\loaddll64.exe Process created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\x318002.dll",#1 Jump to behavior
Source: C:\Windows\System32\loaddll64.exe Process created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\x318002.dll,ServiceMain Jump to behavior
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\x318002.dll",#1 Jump to behavior