Loading ...

Play interactive tourEdit tour

Analysis Report c63f1121_by_Libranalysis

Overview

General Information

Sample Name:c63f1121_by_Libranalysis (renamed file extension from none to dll)
Analysis ID:412403
MD5:c63f11211f899e38c1c230594024950a
SHA1:4d5baeaf852156dbe8053a1c600c7d96049f5967
SHA256:70f617d8686bdc7d17d4f3b992a27f2532686815aaf5289841b87fd0c198ff3a
Infos:

Most interesting Screenshot:

Detection

Ursnif
Score:56
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected Ursnif
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found potential string decryption / allocating functions
PE file contains an invalid checksum
Program does not show much activity (idle)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

Startup

  • System is w10x64
  • loaddll32.exe (PID: 6632 cmdline: loaddll32.exe 'C:\Users\user\Desktop\c63f1121_by_Libranalysis.dll' MD5: 542795ADF7CC08EFCF675D65310596E8)
    • cmd.exe (PID: 6640 cmdline: cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\c63f1121_by_Libranalysis.dll',#1 MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • rundll32.exe (PID: 6664 cmdline: rundll32.exe 'C:\Users\user\Desktop\c63f1121_by_Libranalysis.dll',#1 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 6652 cmdline: rundll32.exe C:\Users\user\Desktop\c63f1121_by_Libranalysis.dll,Dark@@4 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 6708 cmdline: rundll32.exe C:\Users\user\Desktop\c63f1121_by_Libranalysis.dll,Schoolpress@@8 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 6724 cmdline: rundll32.exe C:\Users\user\Desktop\c63f1121_by_Libranalysis.dll,Triangleart@@8 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Sigma Overview

No Sigma rule has matched

Signature Overview

Click to jump to signature section

Show All Signature Results

AV Detection:

barindex
Multi AV Scanner detection for submitted fileShow sources
Source: c63f1121_by_Libranalysis.dllVirustotal: Detection: 21%Perma Link
Source: c63f1121_by_Libranalysis.dllReversingLabs: Detection: 10%
Source: c63f1121_by_Libranalysis.dllStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
Source: c63f1121_by_Libranalysis.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT
Source: Binary string: c:\start\populate-Been\early\Cell.pdb source: loaddll32.exe, 00000001.00000002.967487955.000000006D55E000.00000002.00020000.sdmp, rundll32.exe, 00000003.00000002.979819270.000000006D55E000.00000002.00020000.sdmp, rundll32.exe, 00000004.00000002.973298703.000000006D55E000.00000002.00020000.sdmp, rundll32.exe, 00000005.00000002.934749733.000000006D55E000.00000002.00020000.sdmp, rundll32.exe, 00000006.00000002.945802512.000000006D55E000.00000002.00020000.sdmp, c63f1121_by_Libranalysis.dll
Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_6D546773 FindFirstFileExW,FindNextFileW,FindClose,
Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_6D5463B7 FindFirstFileExW,
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D546773 FindFirstFileExW,FindNextFileW,FindClose,
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D5463B7 FindFirstFileExW,
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6D546773 FindFirstFileExW,FindNextFileW,FindClose,
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6D5463B7 FindFirstFileExW,

Key, Mouse, Clipboard, Microphone and Screen Capturing:

barindex
Yara detected UrsnifShow sources
Source: Yara matchFile source: 3.2.rundll32.exe.6d500000.1.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 4.2.rundll32.exe.6d500000.1.unpack, type: UNPACKEDPE

E-Banking Fraud:

barindex
Yara detected UrsnifShow sources
Source: Yara matchFile source: 3.2.rundll32.exe.6d500000.1.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 4.2.rundll32.exe.6d500000.1.unpack, type: UNPACKEDPE
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D502485 NtQueryVirtualMemory,
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6D502485 NtQueryVirtualMemory,
Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_6D53DDE0
Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_6D553CA0
Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_6D551FD3
Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_6D53D96D
Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_6D53E991
Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_6D553870
Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_6D53DB9F
Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_6D5594E3
Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_6D54E490
Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_6D53E4B8
Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_6D53E72C
Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_6D5307FD
Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_6D53E012
Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_6D5593C3
Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_6D53E253
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D502264
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D53DDE0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D5594E3
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D53E4B8
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D53E72C
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D5307FD
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D55B94E
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D53D96D
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D53E991
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D53E012
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D553350
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D5593C3
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D53DB9F
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D53E253
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6D502264
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6D53DDE0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6D5594E3
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6D53E4B8
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6D53E72C
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6D5307FD
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6D55B94E
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6D53D96D
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6D53E991
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6D53E012
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6D553350
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6D5593C3
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6D53DB9F
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6D53E253
Source: C:\Windows\System32\loaddll32.exeCode function: String function: 6D548CA9 appears 32 times
Source: C:\Windows\System32\loaddll32.exeCode function: String function: 6D52AEA0 appears 50 times
Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 6D545A57 appears 44 times
Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 6D52AEA0 appears 82 times
Source: c63f1121_by_Libranalysis.dllBinary or memory string: OriginalFilenameCell.dll8 vs c63f1121_by_Libranalysis.dll
Source: c63f1121_by_Libranalysis.dllStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
Source: classification engineClassification label: mal56.troj.winDLL@11/0@0/0
Source: c63f1121_by_Libranalysis.dllStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\c63f1121_by_Libranalysis.dll,Dark@@4
Source: c63f1121_by_Libranalysis.dllVirustotal: Detection: 21%
Source: c63f1121_by_Libranalysis.dllReversingLabs: Detection: 10%
Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe 'C:\Users\user\Desktop\c63f1121_by_Libranalysis.dll'
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\c63f1121_by_Libranalysis.dll',#1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\c63f1121_by_Libranalysis.dll,Dark@@4
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\c63f1121_by_Libranalysis.dll',#1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\c63f1121_by_Libranalysis.dll,Schoolpress@@8
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\c63f1121_by_Libranalysis.dll,Triangleart@@8
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\c63f1121_by_Libranalysis.dll',#1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\c63f1121_by_Libranalysis.dll,Dark@@4
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\c63f1121_by_Libranalysis.dll,Schoolpress@@8
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\c63f1121_by_Libranalysis.dll,Triangleart@@8
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\c63f1121_by_Libranalysis.dll',#1
Source: C:\Windows\SysWOW64\rundll32.exeAutomated click: OK
Source: C:\Windows\SysWOW64\rundll32.exeAutomated click: OK
Source: C:\Windows\SysWOW64\rundll32.exeAutomated click: OK
Source: c63f1121_by_Libranalysis.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: c63f1121_by_Libranalysis.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: c63f1121_by_Libranalysis.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: c63f1121_by_Libranalysis.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: c63f1121_by_Libranalysis.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: c63f1121_by_Libranalysis.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: c63f1121_by_Libranalysis.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT
Source: c63f1121_by_Libranalysis.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: c:\start\populate-Been\early\Cell.pdb source: loaddll32.exe, 00000001.00000002.967487955.000000006D55E000.00000002.00020000.sdmp, rundll32.exe, 00000003.00000002.979819270.000000006D55E000.00000002.00020000.sdmp, rundll32.exe, 00000004.00000002.973298703.000000006D55E000.00000002.00020000.sdmp, rundll32.exe, 00000005.00000002.934749733.000000006D55E000.00000002.00020000.sdmp, rundll32.exe, 00000006.00000002.945802512.000000006D55E000.00000002.00020000.sdmp, c63f1121_by_Libranalysis.dll
Source: c63f1121_by_Libranalysis.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: c63f1121_by_Libranalysis.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: c63f1121_by_Libranalysis.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: c63f1121_by_Libranalysis.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: c63f1121_by_Libranalysis.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D501F31 LoadLibraryA,GetProcAddress,
Source: c63f1121_by_Libranalysis.dllStatic PE information: real checksum: 0x792ff should be: 0x83549
Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_6D504FE6 push ds; iretd
Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_6D509EF3 push esp; retf
Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_6D50887D push ss; retf
Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_6D50AAC5 push FFFF7185h; iretd
Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_6D52A5CF push ecx; ret
Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_6D50532C push edi; iretd
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D502253 push ecx; ret
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D502200 push ecx; ret
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D52A5CF push ecx; ret
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6D502253 push ecx; ret
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6D502200 push ecx; ret
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6D52A5CF push ecx; ret

Hooking and other Techniques for Hiding and Protection:

barindex
Yara detected UrsnifShow sources
Source: Yara matchFile source: 3.2.rundll32.exe.6d500000.1.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 4.2.rundll32.exe.6d500000.1.unpack, type: UNPACKEDPE
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_6D546773 FindFirstFileExW,FindNextFileW,FindClose,
Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_6D5463B7 FindFirstFileExW,
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D546773 FindFirstFileExW,FindNextFileW,FindClose,
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D5463B7 FindFirstFileExW,
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6D546773 FindFirstFileExW,FindNextFileW,FindClose,
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6D5463B7 FindFirstFileExW,
Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_6D52AC9F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D501F31 LoadLibraryA,GetProcAddress,
Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_6D545C5F mov eax, dword ptr fs:[00000030h]
Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_6D545C1B mov eax, dword ptr fs:[00000030h]
Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_6D545CD4 mov eax, dword ptr fs:[00000030h]
Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_6D545CA3 mov eax, dword ptr fs:[00000030h]
Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_6D545B66 mov eax, dword ptr fs:[00000030h]
Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_6D545B0B mov eax, dword ptr fs:[00000030h]
Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_6D545AC8 mov eax, dword ptr fs:[00000030h]
Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_6D545A85 mov eax, dword ptr fs:[00000030h]
Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_6D537381 mov eax, dword ptr fs:[00000030h]
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D545C5F mov eax, dword ptr fs:[00000030h]
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D545C1B mov eax, dword ptr fs:[00000030h]
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D545CD4 mov eax, dword ptr fs:[00000030h]
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D545CA3 mov eax, dword ptr fs:[00000030h]
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D545B66 mov eax, dword ptr fs:[00000030h]
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D545B0B mov eax, dword ptr fs:[00000030h]
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D537381 mov eax, dword ptr fs:[00000030h]
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D545AC8 mov eax, dword ptr fs:[00000030h]
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D545A85 mov eax, dword ptr fs:[00000030h]
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6D545C5F mov eax, dword ptr fs:[00000030h]
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6D545C1B mov eax, dword ptr fs:[00000030h]
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6D545CD4 mov eax, dword ptr fs:[00000030h]
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6D545CA3 mov eax, dword ptr fs:[00000030h]
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6D545B66 mov eax, dword ptr fs:[00000030h]
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6D545B0B mov eax, dword ptr fs:[00000030h]
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6D537381 mov eax, dword ptr fs:[00000030h]
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6D545AC8 mov eax, dword ptr fs:[00000030h]
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6D545A85 mov eax, dword ptr fs:[00000030h]
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_6D52AC9F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_6D5369B4 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_6D52B066 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D52AC9F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D5369B4 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D52B066 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6D52AC9F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6D5369B4 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6D52B066 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\c63f1121_by_Libranalysis.dll',#1
Source: rundll32.exe, 00000003.00000002.946005518.0000000003190000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.965930684.0000000003770000.00000002.00000001.sdmp, rundll32.exe, 00000005.00000002.920545655.0000000003190000.00000002.00000001.sdmp, rundll32.exe, 00000006.00000002.920545948.0000000003190000.00000002.00000001.sdmpBinary or memory string: Program Manager
Source: rundll32.exe, 00000003.00000002.946005518.0000000003190000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.965930684.0000000003770000.00000002.00000001.sdmp, rundll32.exe, 00000005.00000002.920545655.0000000003190000.00000002.00000001.sdmp, rundll32.exe, 00000006.00000002.920545948.0000000003190000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
Source: rundll32.exe, 00000003.00000002.946005518.0000000003190000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.965930684.0000000003770000.00000002.00000001.sdmp, rundll32.exe, 00000005.00000002.920545655.0000000003190000.00000002.00000001.sdmp, rundll32.exe, 00000006.00000002.920545948.0000000003190000.00000002.00000001.sdmpBinary or memory string: Progman
Source: rundll32.exe, 00000003.00000002.946005518.0000000003190000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.965930684.0000000003770000.00000002.00000001.sdmp, rundll32.exe, 00000005.00000002.920545655.0000000003190000.00000002.00000001.sdmp, rundll32.exe, 00000006.00000002.920545948.0000000003190000.00000002.00000001.sdmpBinary or memory string: Progmanlock
Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_6D52AABF cpuid
Source: C:\Windows\System32\loaddll32.exeCode function: EnumSystemLocalesW,
Source: C:\Windows\System32\loaddll32.exeCode function: EnumSystemLocalesW,
Source: C:\Windows\System32\loaddll32.exeCode function: EnumSystemLocalesW,
Source: C:\Windows\System32\loaddll32.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,
Source: C:\Windows\System32\loaddll32.exeCode function: EnumSystemLocalesW,
Source: C:\Windows\System32\loaddll32.exeCode function: GetACP,IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,
Source: C:\Windows\System32\loaddll32.exeCode function: EnumSystemLocalesW,
Source: C:\Windows\System32\loaddll32.exeCode function: GetLocaleInfoW,
Source: C:\Windows\System32\loaddll32.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,
Source: C:\Windows\System32\loaddll32.exeCode function: GetLocaleInfoW,
Source: C:\Windows\System32\loaddll32.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,
Source: C:\Windows\System32\loaddll32.exeCode function: GetLocaleInfoW,
Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoA,GetSystemDefaultUILanguage,VerLanguageNameA,
Source: C:\Windows\SysWOW64\rundll32.exeCode function: EnumSystemLocalesW,
Source: C:\Windows\SysWOW64\rundll32.exeCode function: EnumSystemLocalesW,
Source: C:\Windows\SysWOW64\rundll32.exeCode function: EnumSystemLocalesW,
Source: C:\Windows\SysWOW64\rundll32.exeCode function: EnumSystemLocalesW,
Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoW,
Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,
Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,
Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetACP,IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,
Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoA,GetSystemDefaultUILanguage,VerLanguageNameA,
Source: C:\Windows\SysWOW64\rundll32.exeCode function: EnumSystemLocalesW,
Source: C:\Windows\SysWOW64\rundll32.exeCode function: EnumSystemLocalesW,
Source: C:\Windows\SysWOW64\rundll32.exeCode function: EnumSystemLocalesW,
Source: C:\Windows\SysWOW64\rundll32.exeCode function: EnumSystemLocalesW,
Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoW,
Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,
Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,
Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetACP,IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,
Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_6D5491A2 GetSystemTimeAsFileTime,
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D50146C CreateEventA,GetVersion,GetCurrentProcessId,OpenProcess,GetLastError,

Stealing of Sensitive Information:

barindex
Yara detected UrsnifShow sources
Source: Yara matchFile source: 3.2.rundll32.exe.6d500000.1.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 4.2.rundll32.exe.6d500000.1.unpack, type: UNPACKEDPE

Remote Access Functionality:

barindex
Yara detected UrsnifShow sources
Source: Yara matchFile source: 3.2.rundll32.exe.6d500000.1.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 4.2.rundll32.exe.6d500000.1.unpack, type: UNPACKEDPE

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsNative API1Path InterceptionProcess Injection12Rundll321OS Credential DumpingSystem Time Discovery1Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsProcess Injection12LSASS MemorySecurity Software Discovery1Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Deobfuscate/Decode Files or Information1Security Account ManagerProcess Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Obfuscated Files or Information2NTDSFile and Directory Discovery1Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA SecretsSystem Information Discovery23SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 412403 Sample: c63f1121_by_Libranalysis Startdate: 12/05/2021 Architecture: WINDOWS Score: 56 19 Multi AV Scanner detection for submitted file 2->19 21 Yara detected  Ursnif 2->21 7 loaddll32.exe 1 2->7         started        process3 process4 9 cmd.exe 1 7->9         started        11 rundll32.exe 7->11         started        13 rundll32.exe 7->13         started        15 rundll32.exe 7->15         started        process5 17 rundll32.exe 9->17         started       

Screenshots

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand

Antivirus, Machine Learning and Genetic Malware Detection

Initial Sample

SourceDetectionScannerLabelLink
c63f1121_by_Libranalysis.dll21%VirustotalBrowse
c63f1121_by_Libranalysis.dll11%ReversingLabsWin32.Trojan.Razy

Dropped Files

No Antivirus matches

Unpacked PE Files

No Antivirus matches

Domains

No Antivirus matches

URLs

No Antivirus matches

Domains and IPs

Contacted Domains

No contacted domains info

Contacted IPs

No contacted IP infos

General Information

Joe Sandbox Version:32.0.0 Black Diamond
Analysis ID:412403
Start date:12.05.2021
Start time:17:12:28
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 7m 53s
Hypervisor based Inspection enabled:false
Report type:light
Sample file name:c63f1121_by_Libranalysis (renamed file extension from none to dll)
Cookbook file name:default.jbs
Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
Number of analysed new started processes analysed:7
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • HDC enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Detection:MAL
Classification:mal56.troj.winDLL@11/0@0/0
EGA Information:Failed
HDC Information:
  • Successful, ratio: 4.2% (good quality ratio 4%)
  • Quality average: 78.8%
  • Quality standard deviation: 29.2%
HCA Information:Failed
Cookbook Comments:
  • Adjust boot time
  • Enable AMSI

Simulations

Behavior and APIs

No simulations

Joe Sandbox View / Context

IPs

No context

Domains

No context

ASN

No context

JA3 Fingerprints

No context

Dropped Files

No context

Created / dropped Files

No created / dropped files found

Static File Info

General

File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
Entropy (8bit):6.694754169899549
TrID:
  • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
  • Generic Win/DOS Executable (2004/3) 0.20%
  • DOS Executable Generic (2002/1) 0.20%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:c63f1121_by_Libranalysis.dll
File size:482816
MD5:c63f11211f899e38c1c230594024950a
SHA1:4d5baeaf852156dbe8053a1c600c7d96049f5967
SHA256:70f617d8686bdc7d17d4f3b992a27f2532686815aaf5289841b87fd0c198ff3a
SHA512:acb47d73ee0ae648188d90ba65584e4261ca8c174305e30e7249d7c8daeccb7b1ac71d8c85d269077b1397adbd29e3deba99ffb89f24c02e8dccbefab14f556b
SSDEEP:12288:I5wfdldhr+GsAmRljPDeV1QlPqY5ExsETZCnMWxGuXPmEb8bVFaJ:I5adldhlDmfjPdglZCnR6jw
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........R...R...R...[.......7...P...7...@...R.......7...W...7...X...7...S...7...J...7.u.S...7...S...RichR...................PE..L..

File Icon

Icon Hash:74f0e4ecccdce0e4

Static PE Info

General

Entrypoint:0x102aa97
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x1000000
Subsystem:windows gui
Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
DLL Characteristics:DYNAMIC_BASE, NX_COMPAT
Time Stamp:0x6092A053 [Wed May 5 13:40:35 2021 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:6
OS Version Minor:0
File Version Major:6
File Version Minor:0
Subsystem Version Major:6
Subsystem Version Minor:0
Import Hash:9c4dbee4f67fcf1f44b302fd37d240a5

Entrypoint Preview

Instruction
push ebp
mov ebp, esp
cmp dword ptr [ebp+0Ch], 01h
jne 00007FE828F11C07h
call 00007FE828F12522h
push dword ptr [ebp+10h]
push dword ptr [ebp+0Ch]
push dword ptr [ebp+08h]
call 00007FE828F11AAAh
add esp, 0Ch
pop ebp
retn 000Ch
jmp 00007FE828F1F976h
push ebp
mov ebp, esp
and dword ptr [01088AA0h], 00000000h
sub esp, 24h
or dword ptr [010740ACh], 01h
push 0000000Ah
call 00007FE828F43CEBh
test eax, eax
je 00007FE828F11DAFh
and dword ptr [ebp-10h], 00000000h
xor eax, eax
push ebx
push esi
push edi
xor ecx, ecx
lea edi, dword ptr [ebp-24h]
push ebx
cpuid
mov esi, ebx
pop ebx
mov dword ptr [edi], eax
mov dword ptr [edi+04h], esi
mov dword ptr [edi+08h], ecx
xor ecx, ecx
mov dword ptr [edi+0Ch], edx
mov eax, dword ptr [ebp-24h]
mov edi, dword ptr [ebp-1Ch]
mov dword ptr [ebp-0Ch], eax
xor edi, 6C65746Eh
mov eax, dword ptr [ebp-18h]
xor eax, 49656E69h
mov dword ptr [ebp-08h], eax
mov eax, dword ptr [ebp-20h]
xor eax, 756E6547h
mov dword ptr [ebp-04h], eax
xor eax, eax
inc eax
push ebx
cpuid
mov esi, ebx
pop ebx
lea ebx, dword ptr [ebp-24h]
mov dword ptr [ebx], eax
mov eax, dword ptr [ebp-04h]
mov dword ptr [ebx+04h], esi
or eax, edi
or eax, dword ptr [ebp-08h]
mov dword ptr [ebx+08h], ecx
mov dword ptr [ebx+0Ch], edx
jne 00007FE828F11C45h
mov eax, dword ptr [ebp-24h]
and eax, 0FFF3FF0h
cmp eax, 000106C0h
je 00007FE828F11C25h
cmp eax, 00020660h
je 00007FE828F11C1Eh

Rich Headers

Programming Language:
  • [IMP] VS2008 SP1 build 30729

Data Directories

NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x725e00x78.rdata
IMAGE_DIRECTORY_ENTRY_IMPORT0x726580x50.rdata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x8a0000x4a8.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x8b0000x2984.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x70d0c0x54.rdata
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x70d600x40.rdata
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x5e0000x1b4.rdata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

Sections

NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x5c9e80x5ca00False0.615445238698data6.76388282152IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
.rdata0x5e0000x150ea0x15200False0.523761094675data5.71930655491IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0x740000x15d140xe00False0.208426339286DOS executable (COM, 0x8C-variant)2.91984916435IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
.rsrc0x8a0000x4a80x600False0.367838541667data3.03803804684IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0x8b0000x29840x2a00False0.793712797619data6.70935013464IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

Resources

NameRVASizeTypeLanguageCountry
RT_VERSION0x8a0a00x36cdataEnglishUnited States
RT_MANIFEST0x8a4100x91XML 1.0 document textEnglishUnited States

Imports

DLLImport
KERNEL32.dllWriteConsoleW, FindFirstChangeNotificationW, GetEnvironmentVariableW, LoadLibraryW, CreateEventW, FileTimeToLocalFileTime, DeviceIoControl, WaitForSingleObject, VirtualProtectEx, VirtualProtect, GetVersion, CloseHandle, CreateFileW, OutputDebugStringW, ReadConsoleW, ReadFile, IsProcessorFeaturePresent, IsDebuggerPresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetStartupInfoW, GetModuleHandleW, GetCurrentProcess, TerminateProcess, QueryPerformanceCounter, GetCurrentProcessId, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, RaiseException, RtlUnwind, InterlockedPushEntrySList, InterlockedFlushSList, GetLastError, SetLastError, EncodePointer, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, FreeLibrary, GetProcAddress, LoadLibraryExW, ExitProcess, GetModuleHandleExW, GetModuleFileNameW, GetCurrentThread, HeapAlloc, GetCPInfo, HeapFree, FindClose, FindFirstFileExW, FindNextFileW, IsValidCodePage, GetACP, GetOEMCP, GetCommandLineA, GetCommandLineW, MultiByteToWideChar, WideCharToMultiByte, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableW, GetDateFormatW, GetTimeFormatW, CompareStringW, LCMapStringW, GetLocaleInfoW, IsValidLocale, GetUserDefaultLCID, EnumSystemLocalesW, GetProcessHeap, GetStdHandle, GetFileType, SetConsoleCtrlHandler, GetStringTypeW, HeapSize, HeapReAlloc, SetStdHandle, FlushFileBuffers, WriteFile, GetConsoleCP, GetConsoleMode, GetFileSizeEx, SetFilePointerEx, DecodePointer
CRYPT32.dllCryptDecodeObject, CertVerifyCertificateChainPolicy, CertFreeCertificateChain, CertGetCertificateChain, CryptAcquireCertificatePrivateKey, CryptImportPublicKeyInfo, CertDeleteCertificateFromStore, CertAddCertificateContextToStore, CertFreeCertificateContext, CertCreateCertificateContext, CertCloseStore, CryptEncodeObject
Secur32.dllImpersonateSecurityContext, InitializeSecurityContextW, DeleteSecurityContext, FreeContextBuffer

Exports

NameOrdinalAddress
Dark@@410x1029882
Schoolpress@@820x1029898
Triangleart@@830x10299a8

Version Infos

DescriptionData
LegalCopyright Settle equal Corporation. All rights reserved
InternalNameProperty Womentogether
FileVersion6.6.8.172
CompanyNameSettle equal Corporation
Money90
ProductNameSettle equal Rope lie
ProductVersion6.6.8.172
FileDescriptionSettle equal Rope lie
OriginalFilenameCell.dll
Translation0x0409 0x04b0

Possible Origin

Language of compilation systemCountry where language is spokenMap
EnglishUnited States

Network Behavior

No network behavior found

Code Manipulations

Statistics

Behavior

Click to jump to process

System Behavior

General

Start time:17:13:16
Start date:12/05/2021
Path:C:\Windows\System32\loaddll32.exe
Wow64 process (32bit):true
Commandline:loaddll32.exe 'C:\Users\user\Desktop\c63f1121_by_Libranalysis.dll'
Imagebase:0xcf0000
File size:116736 bytes
MD5 hash:542795ADF7CC08EFCF675D65310596E8
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high

General

Start time:17:13:16
Start date:12/05/2021
Path:C:\Windows\SysWOW64\cmd.exe
Wow64 process (32bit):true
Commandline:cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\c63f1121_by_Libranalysis.dll',#1
Imagebase:0x11d0000
File size:232960 bytes
MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high

General

Start time:17:13:16
Start date:12/05/2021
Path:C:\Windows\SysWOW64\rundll32.exe
Wow64 process (32bit):true
Commandline:rundll32.exe C:\Users\user\Desktop\c63f1121_by_Libranalysis.dll,Dark@@4
Imagebase:0x1170000
File size:61952 bytes
MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high

General

Start time:17:13:16
Start date:12/05/2021
Path:C:\Windows\SysWOW64\rundll32.exe
Wow64 process (32bit):true
Commandline:rundll32.exe 'C:\Users\user\Desktop\c63f1121_by_Libranalysis.dll',#1
Imagebase:0x1170000
File size:61952 bytes
MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high

General

Start time:17:13:20
Start date:12/05/2021
Path:C:\Windows\SysWOW64\rundll32.exe
Wow64 process (32bit):true
Commandline:rundll32.exe C:\Users\user\Desktop\c63f1121_by_Libranalysis.dll,Schoolpress@@8
Imagebase:0x1170000
File size:61952 bytes
MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high

General

Start time:17:13:23
Start date:12/05/2021
Path:C:\Windows\SysWOW64\rundll32.exe
Wow64 process (32bit):true
Commandline:rundll32.exe C:\Users\user\Desktop\c63f1121_by_Libranalysis.dll,Triangleart@@8
Imagebase:0x1170000
File size:61952 bytes
MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high

Disassembly

Code Analysis

Reset < >