Loading ...

Play interactive tourEdit tour

Analysis Report JbVn44CzFw

Overview

General Information

Sample Name:JbVn44CzFw (renamed file extension from none to dll)
Analysis ID:324360
MD5:ac716ad4ce2461246e783bda05ba40a4
SHA1:bf3a28737bb643e478021b279aec7213e5216666
SHA256:1c2d38dda5eb14c8870b4ef6a95f054f30a88dda3474712b956094c65d063103

Most interesting Screenshot:

Detection

Score:56
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Creates a DirectInput object (often for capturing keystrokes)
May sleep (evasive loops) to hinder dynamic analysis
PE file contains strange resources
Program does not show much activity (idle)
Sample file is different than original file name gathered from version info
Tries to load missing DLLs

Classification

Startup

  • System is w10x64
  • loaddll32.exe (PID: 5740 cmdline: loaddll32.exe 'C:\Users\user\Desktop\JbVn44CzFw.dll' MD5: 76E2251D0E9772B9DA90208AD741A205)
    • rundll32.exe (PID: 5912 cmdline: rundll32.exe C:\Users\user\Desktop\JbVn44CzFw.dll,Continentmark MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 2148 cmdline: rundll32.exe C:\Users\user\Desktop\JbVn44CzFw.dll,Thankclaim MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

No Sigma rule has matched

Signature Overview

Click to jump to signature section

Show All Signature Results

AV Detection:

barindex
Antivirus / Scanner detection for submitted sampleShow sources
Source: JbVn44CzFw.dllAvira: detected
Multi AV Scanner detection for submitted fileShow sources
Source: JbVn44CzFw.dllVirustotal: Detection: 65%Perma Link
Source: JbVn44CzFw.dllReversingLabs: Detection: 66%
Source: loaddll32.exe, 00000000.00000002.244753510.0000000000F3B000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
Source: JbVn44CzFw.dllStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: JbVn44CzFw.dllBinary or memory string: OriginalFilenameplay1.dllF vs JbVn44CzFw.dll
Source: C:\Windows\SysWOW64\rundll32.exeSection loaded: sfc.dllJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeSection loaded: sfc.dllJump to behavior
Source: classification engineClassification label: mal56.winDLL@5/0@0/0
Source: JbVn44CzFw.dllStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: unknownProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\JbVn44CzFw.dll,Continentmark
Source: JbVn44CzFw.dllVirustotal: Detection: 65%
Source: JbVn44CzFw.dllReversingLabs: Detection: 66%
Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe 'C:\Users\user\Desktop\JbVn44CzFw.dll'
Source: unknownProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\JbVn44CzFw.dll,Continentmark
Source: unknownProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\JbVn44CzFw.dll,Thankclaim
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\JbVn44CzFw.dll,ContinentmarkJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\JbVn44CzFw.dll,ThankclaimJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeAutomated click: OK
Source: C:\Windows\SysWOW64\rundll32.exeAutomated click: OK
Source: JbVn44CzFw.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: c:\Hunt\Dad\Stick\Hope\Gold\whichchart.pdb source: JbVn44CzFw.dll
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\loaddll32.exe TID: 992Thread sleep time: -60000s >= -30000sJump to behavior
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management InstrumentationDLL Side-Loading1Process Injection1Virtualization/Sandbox Evasion1Input Capture1Virtualization/Sandbox Evasion1Remote ServicesInput Capture1Exfiltration Over Other Network MediumData ObfuscationEavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsDLL Side-Loading1Rundll321LSASS MemorySystem Information Discovery1Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Process Injection1Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)DLL Side-Loading1NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 324360 Sample: JbVn44CzFw Startdate: 29/11/2020 Architecture: WINDOWS Score: 56 12 Antivirus / Scanner detection for submitted sample 2->12 14 Multi AV Scanner detection for submitted file 2->14 6 loaddll32.exe 1 2->6         started        process3 process4 8 rundll32.exe 6->8         started        10 rundll32.exe 6->10         started       

Screenshots

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand

Antivirus, Machine Learning and Genetic Malware Detection

Initial Sample

SourceDetectionScannerLabelLink
JbVn44CzFw.dll65%VirustotalBrowse
JbVn44CzFw.dll67%ReversingLabsWin32.Trojan.Kryptik
JbVn44CzFw.dll100%AviraTR/AD.Dridex.cpgs

Dropped Files

No Antivirus matches

Unpacked PE Files

No Antivirus matches

Domains

No Antivirus matches

URLs

No Antivirus matches

Domains and IPs

Contacted Domains

No contacted domains info

Contacted IPs

No contacted IP infos

General Information

Joe Sandbox Version:31.0.0 Red Diamond
Analysis ID:324360
Start date:29.11.2020
Start time:16:32:05
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 4m 2s
Hypervisor based Inspection enabled:false
Report type:full
Sample file name:JbVn44CzFw (renamed file extension from none to dll)
Cookbook file name:default.jbs
Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
Number of analysed new started processes analysed:23
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • HDC enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Detection:MAL
Classification:mal56.winDLL@5/0@0/0
EGA Information:Failed
HDC Information:Failed
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 0
  • Number of non-executed functions: 0
Cookbook Comments:
  • Adjust boot time
  • Enable AMSI
Warnings:
Show All
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, UsoClient.exe

Simulations

Behavior and APIs

TimeTypeDescription
16:33:01API Interceptor2x Sleep call for process: loaddll32.exe modified
16:33:13API Interceptor2x Sleep call for process: rundll32.exe modified

Joe Sandbox View / Context

IPs

No context

Domains

No context

ASN

No context

JA3 Fingerprints

No context

Dropped Files

No context

Created / dropped Files

No created / dropped files found

Static File Info

General

File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
Entropy (8bit):6.299075820327542
TrID:
  • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
  • Generic Win/DOS Executable (2004/3) 0.20%
  • DOS Executable Generic (2002/1) 0.20%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:JbVn44CzFw.dll
File size:491008
MD5:ac716ad4ce2461246e783bda05ba40a4
SHA1:bf3a28737bb643e478021b279aec7213e5216666
SHA256:1c2d38dda5eb14c8870b4ef6a95f054f30a88dda3474712b956094c65d063103
SHA512:b6366b6813e88c43b58f5217629b9f485d92b0baa294913f007fa6a7d87e0091cbb385e5c119579ff766f3611dad61439335b0b032719702a0f2ccf954afbdf7
SSDEEP:6144:bBtHoA+cBYUrraE4Cx/chlPmXYDWhPsmZWGOYnKw0JKYflkBTKilaC0u:U0aFCqTPmXYDWdsmZWGOLw0btCui
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......... ...s...s...s..2s...s..1s...s.. s...s..'s4..s..7s...s...s...s...s...s..6s...s..0s...s..5s...sRich...s................PE..L..

File Icon

Icon Hash:f0f0cccccccecc68

Static PE Info

General

Entrypoint:0x420090
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
DLL Characteristics:
Time Stamp:0x5DD16C15 [Sun Nov 17 15:49:41 2019 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:5
OS Version Minor:0
File Version Major:5
File Version Minor:0
Subsystem Version Major:5
Subsystem Version Minor:0
Import Hash:7f464f31966f9c77555f8117da4c066c

Entrypoint Preview

Instruction
mov edi, edi
push ebp
mov ebp, esp
cmp dword ptr [ebp+0Ch], 01h
jne 00007F089446C377h
call 00007F089447B0E5h
mov eax, dword ptr [ebp+10h]
push eax
mov ecx, dword ptr [ebp+0Ch]
push ecx
mov edx, dword ptr [ebp+08h]
push edx
call 00007F089446C384h
add esp, 0Ch
pop ebp
retn 000Ch
int3
int3
int3
int3
int3
int3
int3
int3
mov edi, edi
push ebp
mov ebp, esp
push FFFFFFFEh
push 00463B70h
push 0042B470h
mov eax, dword ptr fs:[00000000h]
push eax
add esp, FFFFFFE8h
push ebx
push esi
push edi
mov eax, dword ptr [0046673Ch]
xor dword ptr [ebp-08h], eax
xor eax, ebp
push eax
lea eax, dword ptr [ebp-10h]
mov dword ptr fs:[00000000h], eax
mov dword ptr [ebp-18h], esp
mov dword ptr [ebp-1Ch], 00000001h
cmp dword ptr [ebp+0Ch], 00000000h
jne 00007F089446C382h
cmp dword ptr [0046B4E4h], 00000000h
jne 00007F089446C379h
xor eax, eax
jmp 00007F089446C4C3h
mov dword ptr [ebp-04h], 00000000h
cmp dword ptr [ebp+0Ch], 01h
je 00007F089446C378h
cmp dword ptr [ebp+0Ch], 02h
jne 00007F089446C3C6h
cmp dword ptr [00449318h], 00000000h
je 00007F089446C387h
mov eax, dword ptr [ebp+10h]
push eax
mov ecx, dword ptr [ebp+0Ch]
push ecx
mov edx, dword ptr [ebp+08h]
push edx
call dword ptr [00449318h]
mov dword ptr [ebp-1Ch], eax
cmp dword ptr [ebp-1Ch], 00000000h
je 00007F089446C386h
mov eax, dword ptr [ebp+10h]
push eax
mov ecx, dword ptr [ebp+0Ch]
push ecx
mov edx, dword ptr [ebp+08h]
push edx
call 00007F089447C0DBh

Rich Headers

Programming Language:
  • [ C ] VS2008 build 21022
  • [ASM] VS2008 build 21022
  • [LNK] VS2008 SP1 build 30729
  • [EXP] VS2008 SP1 build 30729
  • [IMP] VS2008 SP1 build 30729
  • [C++] VS2008 build 21022

Data Directories

NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x655b00x5e.rdata
IMAGE_DIRECTORY_ENTRY_IMPORT0x64b6c0x64.rdata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x9770000x4928.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x97c0000x2af4.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x482500x1c.rdata
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x480000x1c8.rdata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

Sections

NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x460810x46200False0.57083124443data6.54741114063IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
.rdata0x480000x1d60e0x1d800False0.606652211335data5.973702872IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0x660000x9101c80x5200unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
.rsrc0x9770000x49280x4a00False0.490023226351data5.47494215962IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0x97c0000xa2b60xa400False0.215653582317data2.52515301313IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

Resources

NameRVASizeTypeLanguageCountry
RT_ICON0x9774a80x25a8dataEnglishUnited States
RT_ICON0x979a500x10a8dataEnglishUnited States
RT_ICON0x97aaf80x988dataEnglishUnited States
RT_ICON0x97b4800x468GLS_BINARY_LSB_FIRSTEnglishUnited States
RT_GROUP_ICON0x97b8e80x3edataEnglishUnited States
RT_VERSION0x9771800x328dataEnglishUnited States

Imports

DLLImport
KERNEL32.dllCreateFileA, HeapAlloc, QueryPerformanceCounter, WaitForSingleObject, SetEvent, GetProcessHeap, GetDateFormatA, OpenProcess, GetVolumeInformationA, Sleep, GetFileAttributesA, CreateProcessA, VirtualProtectEx, LoadLibraryA, GetSystemInfo, GetModuleFileNameA, GetModuleHandleA, GetCurrentDirectoryA, GetVersionExA, GetSystemTime, GetConsoleOutputCP, WriteConsoleA, SetStdHandle, GetLocaleInfoW, InitializeCriticalSectionAndSpinCount, GetUserDefaultLCID, EnumSystemLocalesA, IsValidLocale, GetLocaleInfoA, WideCharToMultiByte, InterlockedIncrement, InterlockedDecrement, MultiByteToWideChar, InterlockedExchange, InitializeCriticalSection, DeleteCriticalSection, EnterCriticalSection, LeaveCriticalSection, TerminateProcess, GetCurrentProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, GetModuleFileNameW, GetCurrentThreadId, GetCommandLineA, GetCPInfo, HeapValidate, IsBadReadPtr, RaiseException, RtlUnwind, LCMapStringA, GetLastError, LCMapStringW, GetProcAddress, TlsGetValue, GetModuleHandleW, TlsAlloc, TlsSetValue, TlsFree, SetLastError, DebugBreak, GetStdHandle, WriteFile, OutputDebugStringA, WriteConsoleW, GetFileType, OutputDebugStringW, ExitProcess, LoadLibraryW, SetHandleCount, GetStartupInfoA, FreeEnvironmentStringsA, GetEnvironmentStrings, FreeEnvironmentStringsW, GetEnvironmentStringsW, HeapDestroy, HeapCreate, HeapFree, VirtualFree, GetTickCount, GetCurrentProcessId, GetSystemTimeAsFileTime, GetStringTypeA, GetStringTypeW, FlushFileBuffers, GetConsoleCP, GetConsoleMode, HeapSize, HeapReAlloc, VirtualAlloc, GetACP, GetOEMCP, IsValidCodePage, ReadFile, SetFilePointer, CloseHandle
ole32.dllOleCreate, CoInitialize, StgCreateDocfile, OleUninitialize, CoSuspendClassObjects, OleInitialize, CoUninitialize
UxTheme.dllGetThemeTextExtent, GetThemeFont, CloseThemeData
MPR.dllWNetGetConnectionA, WNetGetUserA, WNetGetUniversalNameA

Exports

NameOrdinalAddress
Continentmark10x4165f0
Thankclaim20x416650

Version Infos

DescriptionData
LegalCopyright 2007. All rights reserved. condition.
InternalNameplay1.dll
FileVersion1.1.4756.2976
CompanyNameGovernThese Solver Least
ProductNameLawThey Whole Wire
ProductVersion1.1.4756.2976
FileDescriptionLawThey Whole Wire
OriginalFilenameplay1.dll
Translation0x0409 0x04b0

Possible Origin

Language of compilation systemCountry where language is spokenMap
EnglishUnited States

Network Behavior

No network behavior found

Code Manipulations

Statistics

CPU Usage

Click to jump to process

Memory Usage

Click to jump to process

Behavior

Click to jump to process

System Behavior

General

Start time:16:32:51
Start date:29/11/2020
Path:C:\Windows\System32\loaddll32.exe
Wow64 process (32bit):true
Commandline:loaddll32.exe 'C:\Users\user\Desktop\JbVn44CzFw.dll'
Imagebase:0x8e0000
File size:119808 bytes
MD5 hash:76E2251D0E9772B9DA90208AD741A205
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:moderate

General

Start time:16:33:01
Start date:29/11/2020
Path:C:\Windows\SysWOW64\rundll32.exe
Wow64 process (32bit):true
Commandline:rundll32.exe C:\Users\user\Desktop\JbVn44CzFw.dll,Continentmark
Imagebase:0x110000
File size:61952 bytes
MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high

General

Start time:16:33:04
Start date:29/11/2020
Path:C:\Windows\SysWOW64\rundll32.exe
Wow64 process (32bit):true
Commandline:rundll32.exe C:\Users\user\Desktop\JbVn44CzFw.dll,Thankclaim
Imagebase:0x110000
File size:61952 bytes
MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high

Disassembly

Code Analysis

Reset < >