Loading ...

Play interactive tourEdit tour

Windows Analysis Report aFqZ2vCizZ

Overview

General Information

Sample Name:aFqZ2vCizZ (renamed file extension from none to dll)
Analysis ID:458963
MD5:68c5b6d1c78a20a82a6c2693a6997fea
SHA1:b93df3c60247e3ce0654a509bd9e419cb7b8cd56
SHA256:d571a65edbdecd8530716dad1e96b6ef8239066fdc52eb8a9ad075659f36831b
Infos:

Most interesting Screenshot:

Detection

IcedID
Score:96
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
System process connects to network (likely due to code injection or exploit)
Yara detected IcedID
Contains functionality to detect hardware virtualization (CPUID execution measurement)
Performs DNS queries to domains with low reputation
Rundll32 performs DNS lookup (likely malicious behavior)
Tries to detect virtualization through RDTSC time measurements
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found large amount of non-executed APIs
PE / OLE file has an invalid certificate
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

Process Tree

  • System is w10x64
  • loaddll32.exe (PID: 4884 cmdline: loaddll32.exe 'C:\Users\user\Desktop\aFqZ2vCizZ.dll' MD5: 542795ADF7CC08EFCF675D65310596E8)
    • cmd.exe (PID: 5900 cmdline: cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\aFqZ2vCizZ.dll',#1 MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • rundll32.exe (PID: 5396 cmdline: rundll32.exe 'C:\Users\user\Desktop\aFqZ2vCizZ.dll',#1 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 5748 cmdline: rundll32.exe C:\Users\user\Desktop\aFqZ2vCizZ.dll,Rulefigure MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000005.00000003.356800062.0000000000420000.00000040.00000001.sdmpJoeSecurity_IcedID_5Yara detected IcedIDJoe Security
    00000001.00000002.470777736.000000006E143000.00000002.00020000.sdmpJoeSecurity_IcedID_5Yara detected IcedIDJoe Security
      00000005.00000002.472279306.000000006E143000.00000002.00020000.sdmpJoeSecurity_IcedID_5Yara detected IcedIDJoe Security
        00000001.00000003.363239046.00000000014A0000.00000040.00000001.sdmpJoeSecurity_IcedID_5Yara detected IcedIDJoe Security
          00000004.00000003.356776329.00000000003D0000.00000040.00000001.sdmpJoeSecurity_IcedID_5Yara detected IcedIDJoe Security
            Click to see the 2 entries

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            1.3.loaddll32.exe.14a1261.0.unpackJoeSecurity_IcedID_5Yara detected IcedIDJoe Security
              1.2.loaddll32.exe.6e140000.3.unpackJoeSecurity_IcedID_5Yara detected IcedIDJoe Security
                4.3.rundll32.exe.3d1261.0.raw.unpackJoeSecurity_IcedID_5Yara detected IcedIDJoe Security
                  4.3.rundll32.exe.3d1261.0.unpackJoeSecurity_IcedID_5Yara detected IcedIDJoe Security
                    5.2.rundll32.exe.6e140000.4.unpackJoeSecurity_IcedID_5Yara detected IcedIDJoe Security
                      Click to see the 3 entries

                      Sigma Overview

                      No Sigma rule has matched

                      Jbx Signature Overview

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection:

                      barindex
                      Antivirus / Scanner detection for submitted sampleShow sources
                      Source: aFqZ2vCizZ.dllAvira: detected
                      Multi AV Scanner detection for domain / URLShow sources
                      Source: 49vodysf.clubVirustotal: Detection: 6%Perma Link
                      Source: nazamoskaotp.xyzVirustotal: Detection: 5%Perma Link
                      Multi AV Scanner detection for submitted fileShow sources
                      Source: aFqZ2vCizZ.dllVirustotal: Detection: 7%Perma Link
                      Source: aFqZ2vCizZ.dllReversingLabs: Detection: 51%
                      Yara detected IcedIDShow sources
                      Source: Yara matchFile source: 1.3.loaddll32.exe.14a1261.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.loaddll32.exe.6e140000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.3.rundll32.exe.3d1261.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.3.rundll32.exe.3d1261.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.6e140000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.3.rundll32.exe.421261.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.3.loaddll32.exe.14a1261.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.3.rundll32.exe.421261.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000005.00000003.356800062.0000000000420000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.470777736.000000006E143000.00000002.00020000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.472279306.000000006E143000.00000002.00020000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000003.363239046.00000000014A0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000003.356776329.00000000003D0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 5748, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 5396, type: MEMORYSTR
                      Source: aFqZ2vCizZ.dllStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
                      Source: aFqZ2vCizZ.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT
                      Source: Binary string: c:\found\21\50\70\Them\43\35\40\Dad\60\cook.pdb source: loaddll32.exe, 00000001.00000002.471079471.000000006E16D000.00000002.00020000.sdmp, rundll32.exe, 00000005.00000002.472688978.000000006E16D000.00000002.00020000.sdmp, aFqZ2vCizZ.dll
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_6E1651B4 FindFirstFileExA,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_6E1651B4 FindFirstFileExA,

                      Networking:

                      barindex
                      Performs DNS queries to domains with low reputationShow sources
                      Source: C:\Windows\SysWOW64\rundll32.exeDNS query: nazamoskaotp.xyz
                      Source: C:\Windows\SysWOW64\rundll32.exeDNS query: nazamoskaotp.xyz
                      Source: C:\Windows\System32\loaddll32.exeDNS query: nazamoskaotp.xyz
                      Source: C:\Windows\SysWOW64\rundll32.exeDNS query: nazamoskaotp.xyz
                      Source: C:\Windows\System32\loaddll32.exeDNS query: nazamoskaotp.xyz
                      Source: C:\Windows\SysWOW64\rundll32.exeDNS query: nazamoskaotp.xyz
                      Source: C:\Windows\System32\loaddll32.exeDNS query: nazamoskaotp.xyz
                      Source: C:\Windows\SysWOW64\rundll32.exeDNS query: nazamoskaotp.xyz
                      Source: C:\Windows\System32\loaddll32.exeDNS query: nazamoskaotp.xyz
                      Source: C:\Windows\SysWOW64\rundll32.exeDNS query: nazamoskaotp.xyz
                      Source: C:\Windows\System32\loaddll32.exeDNS query: nazamoskaotp.xyz
                      Source: DNS query: nazamoskaotp.xyz
                      Source: DNS query: nazamoskaotp.xyz
                      Source: unknownDNS traffic detected: query: nazamoskaotp.xyz replaycode: Server failure (2)
                      Source: unknownDNS traffic detected: query: 49vodysf.club replaycode: Server failure (2)
                      Source: unknownDNS traffic detected: queries for: nazamoskaotp.xyz
                      Source: aFqZ2vCizZ.dllString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDCA-1.crt0
                      Source: aFqZ2vCizZ.dllString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
                      Source: aFqZ2vCizZ.dllString found in binary or memory: http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s
                      Source: aFqZ2vCizZ.dllString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDCA-1.crl08
                      Source: aFqZ2vCizZ.dllString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0:
                      Source: aFqZ2vCizZ.dllString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDCA-1.crl0w
                      Source: aFqZ2vCizZ.dllString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0
                      Source: aFqZ2vCizZ.dllString found in binary or memory: http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#
                      Source: aFqZ2vCizZ.dllString found in binary or memory: http://ocsp.digicert.com0A
                      Source: aFqZ2vCizZ.dllString found in binary or memory: http://ocsp.digicert.com0C
                      Source: aFqZ2vCizZ.dllString found in binary or memory: http://ocsp.sectigo.com0
                      Source: aFqZ2vCizZ.dllString found in binary or memory: http://www.digicert.com/ssl-cps-repository.htm0
                      Source: loaddll32.exe, 00000001.00000002.469315984.0000000001671000.00000004.00000020.sdmpString found in binary or memory: https://49vodysf.club/
                      Source: loaddll32.exe, 00000001.00000003.442595897.0000000001667000.00000004.00000001.sdmpString found in binary or memory: https://49vodysf.club/Z
                      Source: loaddll32.exe, 00000001.00000003.374734261.0000000001667000.00000004.00000001.sdmpString found in binary or memory: https://49vodysf.club/e
                      Source: loaddll32.exe, 00000001.00000003.420123389.000000000167C000.00000004.00000001.sdmp, loaddll32.exe, 00000001.00000002.469357450.000000000167C000.00000004.00000020.sdmp, loaddll32.exe, 00000001.00000003.442595897.0000000001667000.00000004.00000001.sdmpString found in binary or memory: https://49vodysf.club/image/?id=0138AFCD2917C220F300FF0000000000000000
                      Source: loaddll32.exe, 00000001.00000003.374700540.0000000001673000.00000004.00000001.sdmpString found in binary or memory: https://49vodysf.club/image/?id=0138AFCD2917C220F300FF0000000000000000$
                      Source: loaddll32.exe, 00000001.00000002.469315984.0000000001671000.00000004.00000020.sdmpString found in binary or memory: https://49vodysf.club/image/?id=0138AFCD2917C220F300FF000000000000000000$
                      Source: loaddll32.exe, 00000001.00000003.420123389.000000000167C000.00000004.00000001.sdmpString found in binary or memory: https://49vodysf.club/image/?id=0138AFCD2917C220F300FF0000000000000000g
                      Source: loaddll32.exe, 00000001.00000003.442660303.000000000167C000.00000004.00000001.sdmpString found in binary or memory: https://49vodysf.club/image/?id=0138AFCD2917C220F300FF0000000000000000ze6Q
                      Source: loaddll32.exe, 00000001.00000003.363811459.000000000165A000.00000004.00000001.sdmpString found in binary or memory: https://nazamoskaotp.xyz/
                      Source: loaddll32.exe, 00000001.00000003.420123389.000000000167C000.00000004.00000001.sdmp, loaddll32.exe, 00000001.00000003.363828561.0000000001667000.00000004.00000001.sdmpString found in binary or memory: https://nazamoskaotp.xyz/image/?id=0138AFCD2917C220F300FF0000000000000000
                      Source: loaddll32.exe, 00000001.00000003.430907985.0000000001674000.00000004.00000001.sdmpString found in binary or memory: https://nazamoskaotp.xyz/image/?id=0138AFCD2917C220F300FF0000000000000000$
                      Source: loaddll32.exe, 00000001.00000003.430917491.000000000167C000.00000004.00000001.sdmpString found in binary or memory: https://nazamoskaotp.xyz/image/?id=0138AFCD2917C220F300FF0000000000000000e
                      Source: aFqZ2vCizZ.dllString found in binary or memory: https://sectigo.com/CPS0
                      Source: aFqZ2vCizZ.dllString found in binary or memory: https://www.digicert.com/CPS0
                      Source: loaddll32.exe, 00000001.00000002.469054338.000000000162B000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

                      E-Banking Fraud:

                      barindex
                      Yara detected IcedIDShow sources
                      Source: Yara matchFile source: 1.3.loaddll32.exe.14a1261.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.loaddll32.exe.6e140000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.3.rundll32.exe.3d1261.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.3.rundll32.exe.3d1261.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.6e140000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.3.rundll32.exe.421261.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.3.loaddll32.exe.14a1261.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.3.rundll32.exe.421261.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000005.00000003.356800062.0000000000420000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.470777736.000000006E143000.00000002.00020000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.472279306.000000006E143000.00000002.00020000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000003.363239046.00000000014A0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000003.356776329.00000000003D0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 5748, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 5396, type: MEMORYSTR

                      System Summary:

                      barindex
                      Rundll32 performs DNS lookup (likely malicious behavior)Show sources
                      Source: C:\Windows\SysWOW64\rundll32.exeDNS query: name: nazamoskaotp.xyz
                      Source: C:\Windows\SysWOW64\rundll32.exeDNS query: name: nazamoskaotp.xyz
                      Source: C:\Windows\SysWOW64\rundll32.exeDNS query: name: 49vodysf.club
                      Source: C:\Windows\SysWOW64\rundll32.exeDNS query: name: nazamoskaotp.xyz
                      Source: C:\Windows\SysWOW64\rundll32.exeDNS query: name: 49vodysf.club
                      Source: C:\Windows\SysWOW64\rundll32.exeDNS query: name: nazamoskaotp.xyz
                      Source: C:\Windows\SysWOW64\rundll32.exeDNS query: name: 49vodysf.club
                      Source: C:\Windows\SysWOW64\rundll32.exeDNS query: name: nazamoskaotp.xyz
                      Source: C:\Windows\SysWOW64\rundll32.exeDNS query: name: 49vodysf.club
                      Source: C:\Windows\SysWOW64\rundll32.exeDNS query: name: nazamoskaotp.xyz
                      Source: C:\Windows\SysWOW64\rundll32.exeDNS query: name: 49vodysf.club
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_6E155A80
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_6E154FD0
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_6E146C30
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_6E162D1F
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_6E147810
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_6E155A80
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_6E154FD0
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_6E147810
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_6E146C30
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_6E162D1F
                      Source: aFqZ2vCizZ.dllStatic PE information: invalid certificate
                      Source: aFqZ2vCizZ.dllBinary or memory string: OriginalFilenamecook.dll8 vs aFqZ2vCizZ.dll
                      Source: aFqZ2vCizZ.dllStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
                      Source: classification engineClassification label: mal96.troj.evad.winDLL@7/0@24/0
                      Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\gaziizac32\Jump to behavior
                      Source: aFqZ2vCizZ.dllStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                      Source: C:\Windows\System32\loaddll32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\loaddll32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\aFqZ2vCizZ.dll,Rulefigure
                      Source: aFqZ2vCizZ.dllVirustotal: Detection: 7%
                      Source: aFqZ2vCizZ.dllReversingLabs: Detection: 51%
                      Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe 'C:\Users\user\Desktop\aFqZ2vCizZ.dll'
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\aFqZ2vCizZ.dll',#1
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\aFqZ2vCizZ.dll,Rulefigure
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\aFqZ2vCizZ.dll',#1
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\aFqZ2vCizZ.dll',#1
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\aFqZ2vCizZ.dll,Rulefigure
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\aFqZ2vCizZ.dll',#1
                      Source: aFqZ2vCizZ.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                      Source: aFqZ2vCizZ.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                      Source: aFqZ2vCizZ.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                      Source: aFqZ2vCizZ.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                      Source: aFqZ2vCizZ.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                      Source: aFqZ2vCizZ.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                      Source: aFqZ2vCizZ.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT
                      Source: aFqZ2vCizZ.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                      Source: Binary string: c:\found\21\50\70\Them\43\35\40\Dad\60\cook.pdb source: loaddll32.exe, 00000001.00000002.471079471.000000006E16D000.00000002.00020000.sdmp, rundll32.exe, 00000005.00000002.472688978.000000006E16D000.00000002.00020000.sdmp, aFqZ2vCizZ.dll
                      Source: aFqZ2vCizZ.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                      Source: aFqZ2vCizZ.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                      Source: aFqZ2vCizZ.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                      Source: aFqZ2vCizZ.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                      Source: aFqZ2vCizZ.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_6E14EF9C push dword ptr [ebx-1AD723F2h]; retf
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_6E158B76 push ecx; ret
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_6E1589C1 push ecx; ret
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_6E1851BC push dword ptr [ebx-1AD723F2h]; retf
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_6E158B76 push ecx; ret
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_6E1589C1 push ecx; ret
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_6E1851BC push dword ptr [ebx-1AD723F2h]; retf
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX

                      Malware Analysis System Evasion:

                      barindex
                      Contains functionality to detect hardware virtualization (CPUID execution measurement)Show sources
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_6E1415E6 wsprintfA,
                      Tries to detect virtualization through RDTSC time measurementsShow sources
                      Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006E141627 second address: 000000006E141647 instructions: 0x00000000 rdtsc 0x00000002 mov esi, eax 0x00000004 mov dword ptr [esp+1Ch], edx 0x00000008 xor eax, eax 0x0000000a lea edi, dword ptr [esp+28h] 0x0000000e inc eax 0x0000000f xor ecx, ecx 0x00000011 cpuid 0x00000013 mov dword ptr [edi], eax 0x00000015 mov eax, edi 0x00000017 mov dword ptr [eax+04h], ebx 0x0000001a mov dword ptr [eax+08h], ecx 0x0000001d mov dword ptr [eax+0Ch], edx 0x00000020 rdtsc
                      Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006E141647 second address: 000000006E141627 instructions: 0x00000000 rdtsc 0x00000002 sub eax, esi 0x00000004 sbb edx, dword ptr [esp+1Ch] 0x00000008 test edx, edx 0x0000000a jnbe 00007F9544BB979Ah 0x0000000c jc 00007F9544BB9759h 0x0000000e cmp eax, 000000FAh 0x00000013 jnc 00007F9544BB9758h 0x00000015 inc byte ptr [esp+1Ah] 0x00000019 jmp 00007F9544BB978Fh 0x0000001b sub ebp, 01h 0x0000001e jne 00007F9544BB96D5h 0x00000020 rdtsc
                      Source: C:\Windows\System32\loaddll32.exeRDTSC instruction interceptor: First address: 000000006E141627 second address: 000000006E141647 instructions: 0x00000000 rdtsc 0x00000002 mov esi, eax 0x00000004 mov dword ptr [esp+1Ch], edx 0x00000008 xor eax, eax 0x0000000a lea edi, dword ptr [esp+28h] 0x0000000e inc eax 0x0000000f xor ecx, ecx 0x00000011 cpuid 0x00000013 mov dword ptr [edi], eax 0x00000015 mov eax, edi 0x00000017 mov dword ptr [eax+04h], ebx 0x0000001a mov dword ptr [eax+08h], ecx 0x0000001d mov dword ptr [eax+0Ch], edx 0x00000020 rdtsc
                      Source: C:\Windows\System32\loaddll32.exeRDTSC instruction interceptor: First address: 000000006E141647 second address: 000000006E141627 instructions: 0x00000000 rdtsc 0x00000002 sub eax, esi 0x00000004 sbb edx, dword ptr [esp+1Ch] 0x00000008 test edx, edx 0x0000000a jnbe 00007F9544BB979Ah 0x0000000c jc 00007F9544BB9759h 0x0000000e cmp eax, 000000FAh 0x00000013 jnc 00007F9544BB9758h 0x00000015 inc byte ptr [esp+1Ah] 0x00000019 jmp 00007F9544BB978Fh 0x0000001b sub ebp, 01h 0x0000001e jne 00007F9544BB96D5h 0x00000020 rdtsc
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_6E14171A rdtsc
                      Source: C:\Windows\SysWOW64\rundll32.exeAPI coverage: 4.4 %
                      Source: C:\Windows\System32\loaddll32.exeLast function: Thread delayed
                      Source: C:\Windows\System32\loaddll32.exeLast function: Thread delayed
                      Source: C:\Windows\SysWOW64\rundll32.exeLast function: Thread delayed
                      Source: C:\Windows\SysWOW64\rundll32.exeLast function: Thread delayed
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_6E1651B4 FindFirstFileExA,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_6E1651B4 FindFirstFileExA,
                      Source: loaddll32.exe, 00000001.00000002.469054338.000000000162B000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_6E14171A rdtsc
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_6E15CCFF IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_6E15E9A8 mov eax, dword ptr fs:[00000030h]
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_6E1842F8 mov eax, dword ptr fs:[00000030h]
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_6E183E36 push dword ptr fs:[00000030h]
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_6E18422E mov eax, dword ptr fs:[00000030h]
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_6E15E9A8 mov eax, dword ptr fs:[00000030h]
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_6E1842F8 mov eax, dword ptr fs:[00000030h]
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_6E183E36 push dword ptr fs:[00000030h]
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_6E18422E mov eax, dword ptr fs:[00000030h]
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_6E141130 CreateFileA,GetFileSize,GetProcessHeap,HeapAlloc,ReadFile,GetProcessHeap,HeapFree,CloseHandle,
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_6E158EAF SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_6E15CCFF IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_6E158D8D IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_6E158EAF SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_6E15CCFF IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_6E158D8D IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,

                      HIPS / PFW / Operating System Protection Evasion:

                      barindex
                      System process connects to network (likely due to code injection or exploit)Show sources
                      Source: C:\Windows\SysWOW64\rundll32.exeDomain query: nazamoskaotp.xyz
                      Source: C:\Windows\SysWOW64\rundll32.exeDomain query: 49vodysf.club
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\aFqZ2vCizZ.dll',#1
                      Source: loaddll32.exe, 00000001.00000002.469457279.0000000001B70000.00000002.00000001.sdmp, rundll32.exe, 00000005.00000002.469608358.0000000002C50000.00000002.00000001.sdmpBinary or memory string: Program Manager
                      Source: loaddll32.exe, 00000001.00000002.469457279.0000000001B70000.00000002.00000001.sdmp, rundll32.exe, 00000005.00000002.469608358.0000000002C50000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
                      Source: loaddll32.exe, 00000001.00000002.469457279.0000000001B70000.00000002.00000001.sdmp, rundll32.exe, 00000005.00000002.469608358.0000000002C50000.00000002.00000001.sdmpBinary or memory string: Progman
                      Source: loaddll32.exe, 00000001.00000002.469457279.0000000001B70000.00000002.00000001.sdmp, rundll32.exe, 00000005.00000002.469608358.0000000002C50000.00000002.00000001.sdmpBinary or memory string: Progmanlock
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_6E1415E6 cpuid
                      Source: C:\Windows\System32\loaddll32.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,
                      Source: C:\Windows\System32\loaddll32.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,
                      Source: C:\Windows\System32\loaddll32.exeCode function: GetLocaleInfoW,
                      Source: C:\Windows\System32\loaddll32.exeCode function: GetLocaleInfoW,
                      Source: C:\Windows\System32\loaddll32.exeCode function: EnumSystemLocalesW,
                      Source: C:\Windows\System32\loaddll32.exeCode function: EnumSystemLocalesW,
                      Source: C:\Windows\System32\loaddll32.exeCode function: EnumSystemLocalesW,
                      Source: C:\Windows\System32\loaddll32.exeCode function: GetLocaleInfoW,
                      Source: C:\Windows\System32\loaddll32.exeCode function: EnumSystemLocalesW,
                      Source: C:\Windows\System32\loaddll32.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: EnumSystemLocalesW,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: EnumSystemLocalesW,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: EnumSystemLocalesW,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoW,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoW,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: EnumSystemLocalesW,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoW,
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_6E1590AA GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_6E1414D2 GetUserNameA,

                      Stealing of Sensitive Information:

                      barindex
                      Yara detected IcedIDShow sources
                      Source: Yara matchFile source: 1.3.loaddll32.exe.14a1261.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.loaddll32.exe.6e140000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.3.rundll32.exe.3d1261.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.3.rundll32.exe.3d1261.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.6e140000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.3.rundll32.exe.421261.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.3.loaddll32.exe.14a1261.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.3.rundll32.exe.421261.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000005.00000003.356800062.0000000000420000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.470777736.000000006E143000.00000002.00020000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.472279306.000000006E143000.00000002.00020000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000003.363239046.00000000014A0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000003.356776329.00000000003D0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 5748, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 5396, type: MEMORYSTR

                      Remote Access Functionality:

                      barindex
                      Yara detected IcedIDShow sources
                      Source: Yara matchFile source: 1.3.loaddll32.exe.14a1261.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.loaddll32.exe.6e140000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.3.rundll32.exe.3d1261.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.3.rundll32.exe.3d1261.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.6e140000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.3.rundll32.exe.421261.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.3.loaddll32.exe.14a1261.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.3.rundll32.exe.421261.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000005.00000003.356800062.0000000000420000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.470777736.000000006E143000.00000002.00020000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.472279306.000000006E143000.00000002.00020000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000003.363239046.00000000014A0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000003.356776329.00000000003D0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 5748, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 5396, type: MEMORYSTR

                      Mitre Att&ck Matrix

                      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                      Valid AccountsWindows Management InstrumentationPath InterceptionProcess Injection112Masquerading1Input Capture1System Time Discovery1Remote ServicesInput Capture1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                      Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsProcess Injection112LSASS MemorySecurity Software Discovery231Remote Desktop ProtocolArchive Collected Data1Exfiltration Over BluetoothNon-Application Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or Information1Security Account ManagerProcess Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationApplication Layer Protocol1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Rundll3211NTDSAccount Discovery1Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA SecretsSystem Owner/User Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                      Replication Through Removable MediaLaunchdRc.commonRc.commonSteganographyCached Domain CredentialsRemote System Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSyncFile and Directory Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc FilesystemSystem Information Discovery222Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

                      Behavior Graph

                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet

                      Screenshots

                      Thumbnails

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                      windows-stand

                      Antivirus, Machine Learning and Genetic Malware Detection

                      Initial Sample

                      SourceDetectionScannerLabelLink
                      aFqZ2vCizZ.dll7%VirustotalBrowse
                      aFqZ2vCizZ.dll52%ReversingLabsWin32.Trojan.Emotet
                      aFqZ2vCizZ.dll100%AviraTR/Crypt.Agent.eprxx

                      Dropped Files

                      No Antivirus matches

                      Unpacked PE Files

                      SourceDetectionScannerLabelLinkDownload
                      5.3.rundll32.exe.421261.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      1.3.loaddll32.exe.14a1261.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      1.2.loaddll32.exe.6e140000.3.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      4.3.rundll32.exe.3d1261.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      5.2.rundll32.exe.6e140000.4.unpack100%AviraTR/Crypt.XPACK.GenDownload File

                      Domains

                      SourceDetectionScannerLabelLink
                      49vodysf.club6%VirustotalBrowse
                      nazamoskaotp.xyz6%VirustotalBrowse

                      URLs

                      SourceDetectionScannerLabelLink
                      https://49vodysf.club/image/?id=0138AFCD2917C220F300FF0000000000000000g0%Avira URL Cloudsafe
                      https://49vodysf.club/image/?id=0138AFCD2917C220F300FF0000000000000000ze6Q0%Avira URL Cloudsafe
                      https://sectigo.com/CPS00%URL Reputationsafe
                      https://49vodysf.club/image/?id=0138AFCD2917C220F300FF0000000000000000$0%Avira URL Cloudsafe
                      https://49vodysf.club/image/?id=0138AFCD2917C220F300FF000000000000000000$0%Avira URL Cloudsafe
                      http://ocsp.sectigo.com00%URL Reputationsafe
                      https://49vodysf.club/e0%Avira URL Cloudsafe
                      https://nazamoskaotp.xyz/image/?id=0138AFCD2917C220F300FF00000000000000000%Avira URL Cloudsafe
                      https://nazamoskaotp.xyz/0%Avira URL Cloudsafe
                      https://nazamoskaotp.xyz/image/?id=0138AFCD2917C220F300FF0000000000000000e0%Avira URL Cloudsafe
                      https://nazamoskaotp.xyz/image/?id=0138AFCD2917C220F300FF0000000000000000$0%Avira URL Cloudsafe
                      https://49vodysf.club/0%Avira URL Cloudsafe
                      http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s0%URL Reputationsafe
                      https://49vodysf.club/image/?id=0138AFCD2917C220F300FF00000000000000000%Avira URL Cloudsafe
                      http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#0%URL Reputationsafe
                      https://49vodysf.club/Z0%Avira URL Cloudsafe

                      Domains and IPs

                      Contacted Domains

                      NameIPActiveMaliciousAntivirus DetectionReputation
                      49vodysf.club
                      unknown
                      unknowntrueunknown
                      nazamoskaotp.xyz
                      unknown
                      unknowntrueunknown

                      URLs from Memory and Binaries

                      NameSourceMaliciousAntivirus DetectionReputation
                      https://49vodysf.club/image/?id=0138AFCD2917C220F300FF0000000000000000gloaddll32.exe, 00000001.00000003.420123389.000000000167C000.00000004.00000001.sdmptrue
                      • Avira URL Cloud: safe
                      unknown
                      https://49vodysf.club/image/?id=0138AFCD2917C220F300FF0000000000000000ze6Qloaddll32.exe, 00000001.00000003.442660303.000000000167C000.00000004.00000001.sdmptrue
                      • Avira URL Cloud: safe
                      unknown
                      https://sectigo.com/CPS0aFqZ2vCizZ.dllfalse
                      • URL Reputation: safe
                      unknown
                      https://49vodysf.club/image/?id=0138AFCD2917C220F300FF0000000000000000$loaddll32.exe, 00000001.00000003.374700540.0000000001673000.00000004.00000001.sdmptrue
                      • Avira URL Cloud: safe
                      unknown
                      https://49vodysf.club/image/?id=0138AFCD2917C220F300FF000000000000000000$loaddll32.exe, 00000001.00000002.469315984.0000000001671000.00000004.00000020.sdmptrue
                      • Avira URL Cloud: safe
                      unknown
                      http://ocsp.sectigo.com0aFqZ2vCizZ.dllfalse
                      • URL Reputation: safe
                      unknown
                      https://49vodysf.club/eloaddll32.exe, 00000001.00000003.374734261.0000000001667000.00000004.00000001.sdmptrue
                      • Avira URL Cloud: safe
                      unknown
                      https://nazamoskaotp.xyz/image/?id=0138AFCD2917C220F300FF0000000000000000loaddll32.exe, 00000001.00000003.420123389.000000000167C000.00000004.00000001.sdmp, loaddll32.exe, 00000001.00000003.363828561.0000000001667000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://nazamoskaotp.xyz/loaddll32.exe, 00000001.00000003.363811459.000000000165A000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://nazamoskaotp.xyz/image/?id=0138AFCD2917C220F300FF0000000000000000eloaddll32.exe, 00000001.00000003.430917491.000000000167C000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://nazamoskaotp.xyz/image/?id=0138AFCD2917C220F300FF0000000000000000$loaddll32.exe, 00000001.00000003.430907985.0000000001674000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://49vodysf.club/loaddll32.exe, 00000001.00000002.469315984.0000000001671000.00000004.00000020.sdmptrue
                      • Avira URL Cloud: safe
                      unknown
                      http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0saFqZ2vCizZ.dllfalse
                      • URL Reputation: safe
                      unknown
                      https://49vodysf.club/image/?id=0138AFCD2917C220F300FF0000000000000000loaddll32.exe, 00000001.00000003.420123389.000000000167C000.00000004.00000001.sdmp, loaddll32.exe, 00000001.00000002.469357450.000000000167C000.00000004.00000020.sdmp, loaddll32.exe, 00000001.00000003.442595897.0000000001667000.00000004.00000001.sdmptrue
                      • Avira URL Cloud: safe
                      unknown
                      http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#aFqZ2vCizZ.dllfalse
                      • URL Reputation: safe
                      unknown
                      https://49vodysf.club/Zloaddll32.exe, 00000001.00000003.442595897.0000000001667000.00000004.00000001.sdmptrue
                      • Avira URL Cloud: safe
                      unknown

                      Contacted IPs

                      No contacted IP infos

                      General Information

                      Joe Sandbox Version:33.0.0 White Diamond
                      Analysis ID:458963
                      Start date:03.08.2021
                      Start time:23:10:46
                      Joe Sandbox Product:CloudBasic
                      Overall analysis duration:0h 6m 28s
                      Hypervisor based Inspection enabled:false
                      Report type:light
                      Sample file name:aFqZ2vCizZ (renamed file extension from none to dll)
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                      Number of analysed new started processes analysed:27
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • HDC enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Detection:MAL
                      Classification:mal96.troj.evad.winDLL@7/0@24/0
                      EGA Information:
                      • Successful, ratio: 66.7%
                      HDC Information:
                      • Successful, ratio: 2.5% (good quality ratio 2.4%)
                      • Quality average: 88.2%
                      • Quality standard deviation: 21.5%
                      HCA Information:
                      • Successful, ratio: 51%
                      • Number of executed functions: 0
                      • Number of non-executed functions: 0
                      Cookbook Comments:
                      • Adjust boot time
                      • Enable AMSI
                      Warnings:
                      Show All
                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, RuntimeBroker.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                      • Excluded IPs from analysis (whitelisted): 168.61.161.212, 104.42.151.234, 23.211.6.115, 13.64.90.137, 20.82.210.154, 23.211.4.86, 173.222.108.226, 173.222.108.210, 80.67.82.235, 80.67.82.211, 40.112.88.60
                      • Excluded domains from analysis (whitelisted): au.download.windowsupdate.com.edgesuite.net, store-images.s-microsoft.com-c.edgekey.net, iris-de-prod-azsc-neu-b.northeurope.cloudapp.azure.com, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, e12564.dspb.akamaiedge.net, audownload.windowsupdate.nsatc.net, arc.trafficmanager.net, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, au-bg-shim.trafficmanager.net, skypedataprdcolwus17.cloudapp.net, fs.microsoft.com, ris-prod.trafficmanager.net, asf-ris-prod-neu.northeurope.cloudapp.azure.com, skypedataprdcolcus17.cloudapp.net, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, a767.dscg3.akamai.net, ris.api.iris.microsoft.com, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net, skypedataprdcolwus16.cloudapp.net
                      • Execution Graph export aborted for target rundll32.exe, PID 5748 because there are no executed function
                      • Not all processes where analyzed, report is missing behavior information
                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                      • Report size getting too big, too many NtQueryValueKey calls found.

                      Simulations

                      Behavior and APIs

                      TimeTypeDescription
                      23:12:46API Interceptor11x Sleep call for process: rundll32.exe modified
                      23:12:49API Interceptor10x Sleep call for process: loaddll32.exe modified

                      Joe Sandbox View / Context

                      IPs

                      No context

                      Domains

                      No context

                      ASN

                      No context

                      JA3 Fingerprints

                      No context

                      Dropped Files

                      No context

                      Created / dropped Files

                      No created / dropped files found

                      Static File Info

                      General

                      File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                      Entropy (8bit):6.585836517428109
                      TrID:
                      • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
                      • Generic Win/DOS Executable (2004/3) 0.20%
                      • DOS Executable Generic (2002/1) 0.20%
                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                      File name:aFqZ2vCizZ.dll
                      File size:283952
                      MD5:68c5b6d1c78a20a82a6c2693a6997fea
                      SHA1:b93df3c60247e3ce0654a509bd9e419cb7b8cd56
                      SHA256:d571a65edbdecd8530716dad1e96b6ef8239066fdc52eb8a9ad075659f36831b
                      SHA512:19f11996e54209b60a3df2aee37bebbe927f611ba226746ef31d77fbc4ecad69d9c1b7cd0c8f58a4469c7dfdedd4a8b6d1f11785031256dca02592830cc4265d
                      SSDEEP:6144:BCVRhsJ5bLak1GyxVNuEwuJdTkrrwAOH/1EB:BCVRhYak1HZuEwuTTirw8B
                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........................j=......j?.)....j>.....a.......a.......a........._.............,.......,.......,.3.....,.......Rich...........

                      File Icon

                      Icon Hash:74f0e4ecccdce0e4

                      Static PE Info

                      General

                      Entrypoint:0x1001899e
                      Entrypoint Section:.text
                      Digitally signed:true
                      Imagebase:0x10000000
                      Subsystem:windows gui
                      Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT
                      Time Stamp:0x55351A7C [Mon Apr 20 15:25:48 2015 UTC]
                      TLS Callbacks:
                      CLR (.Net) Version:
                      OS Version Major:6
                      OS Version Minor:0
                      File Version Major:6
                      File Version Minor:0
                      Subsystem Version Major:6
                      Subsystem Version Minor:0
                      Import Hash:87f7f637e19a1ee1e2d0d955ecbd7599

                      Authenticode Signature

                      Signature Valid:false
                      Signature Issuer:CN=Sectigo RSA Code Signing CA, O=Sectigo Limited, L=Salford, S=Greater Manchester, C=GB
                      Signature Validation Error:The digital signature of the object did not verify
                      Error Number:-2146869232
                      Not Before, Not After
                      • 10/11/2020 5:00:00 PM 10/12/2021 4:59:59 PM
                      Subject Chain
                      • CN=FABO SP Z O O, O=FABO SP Z O O, STREET=7 Ul. Ofiar Firleja, L=Radom, S=MAZOWIECKIE, PostalCode=26-600, C=PL
                      Version:3
                      Thumbprint MD5:2217A1DC290135CD210CE3105E25FA56
                      Thumbprint SHA-1:BB1B413CC8678C2FB2AF345A53DA186BACE5850F
                      Thumbprint SHA-256:2EA2C7625C1A42FFF63F0B17CFC4FD0C0F76D7EB45A86B18EC9A630D3D8AD913
                      Serial:00CA7D54577243934F665FD1D443855A3D

                      Entrypoint Preview

                      Instruction
                      push ebp
                      mov ebp, esp
                      cmp dword ptr [ebp+0Ch], 01h
                      jne 00007F9544FD7487h
                      call 00007F9544FD7BD0h
                      push dword ptr [ebp+10h]
                      push dword ptr [ebp+0Ch]
                      push dword ptr [ebp+08h]
                      call 00007F9544FD7333h
                      add esp, 0Ch
                      pop ebp
                      retn 000Ch
                      mov ecx, dword ptr [ebp-0Ch]
                      mov dword ptr fs:[00000000h], ecx
                      pop ecx
                      pop edi
                      pop edi
                      pop esi
                      pop ebx
                      mov esp, ebp
                      pop ebp
                      push ecx
                      ret
                      push eax
                      push dword ptr fs:[00000000h]
                      lea eax, dword ptr [esp+0Ch]
                      sub esp, dword ptr [esp+0Ch]
                      push ebx
                      push esi
                      push edi
                      mov dword ptr [eax], ebp
                      mov ebp, eax
                      mov eax, dword ptr [10041834h]
                      xor eax, ebp
                      push eax
                      push dword ptr [ebp-04h]
                      mov dword ptr [ebp-04h], FFFFFFFFh
                      lea eax, dword ptr [ebp-0Ch]
                      mov dword ptr fs:[00000000h], eax
                      ret
                      push eax
                      push dword ptr fs:[00000000h]
                      lea eax, dword ptr [esp+0Ch]
                      sub esp, dword ptr [esp+0Ch]
                      push ebx
                      push esi
                      push edi
                      mov dword ptr [eax], ebp
                      mov ebp, eax
                      mov eax, dword ptr [10041834h]
                      xor eax, ebp
                      push eax
                      mov dword ptr [ebp-10h], esp
                      push dword ptr [ebp-04h]
                      mov dword ptr [ebp-04h], FFFFFFFFh
                      lea eax, dword ptr [ebp-0Ch]
                      mov dword ptr fs:[00000000h], eax
                      ret
                      ret
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      push ecx
                      lea ecx, dword ptr [esp+08h]
                      sub ecx, eax
                      and ecx, 0Fh
                      add eax, ecx
                      sbb ecx, ecx
                      or eax, ecx
                      pop ecx
                      jmp 00007F9544FD7BFFh

                      Rich Headers

                      Programming Language:
                      • [IMP] VS2008 SP1 build 30729

                      Data Directories

                      NameVirtual AddressVirtual Size Is in Section
                      IMAGE_DIRECTORY_ENTRY_EXPORT0x3f8700x48.rdata
                      IMAGE_DIRECTORY_ENTRY_IMPORT0x3f8b80x50.rdata
                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x4c0000x4a4.rsrc
                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                      IMAGE_DIRECTORY_ENTRY_SECURITY0x438000x1d30.data
                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x4d0000x2dc8.reloc
                      IMAGE_DIRECTORY_ENTRY_DEBUG0x3c9fc0x54.rdata
                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                      IMAGE_DIRECTORY_ENTRY_TLS0x3cb080x18.rdata
                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x3ca500x40.rdata
                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IAT0x2d0000x15c.rdata
                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                      Sections

                      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                      .text0x10000x2b3c50x2b400False0.545221053107data6.68096897507IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      .rdata0x2d0000x130760x13200False0.476983762255data5.41140229676IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .data0x410000xad600x1a00False0.254507211538data4.50074118182IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                      .rsrc0x4c0000x4a40x600False0.380208333333data4.61149850163IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .reloc0x4d0000x2dc80x2e00False0.732846467391data6.61767250601IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                      Resources

                      NameRVASizeTypeLanguageCountry
                      RT_VERSION0x4c0a00x2a8dataEnglishUnited States
                      RT_MANIFEST0x4c3480x15aASCII text, with CRLF line terminatorsEnglishUnited States

                      Imports

                      DLLImport
                      KERNEL32.dllGetEnvironmentVariableA, Sleep, VirtualProtectEx, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, EncodePointer, DecodePointer, MultiByteToWideChar, GetCPInfo, WideCharToMultiByte, SetLastError, InitializeCriticalSectionAndSpinCount, CreateEventW, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetSystemTimeAsFileTime, GetModuleHandleW, GetProcAddress, CompareStringW, LCMapStringW, GetLocaleInfoW, GetStringTypeW, CloseHandle, SetEvent, ResetEvent, WaitForSingleObjectEx, IsProcessorFeaturePresent, IsDebuggerPresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetStartupInfoW, GetCurrentProcess, TerminateProcess, QueryPerformanceCounter, GetCurrentProcessId, GetCurrentThreadId, InitializeSListHead, RaiseException, RtlUnwind, InterlockedFlushSList, GetLastError, FreeLibrary, LoadLibraryExW, ExitProcess, GetModuleHandleExW, GetModuleFileNameA, HeapFree, HeapAlloc, HeapReAlloc, GetACP, IsValidLocale, GetUserDefaultLCID, EnumSystemLocalesW, GetStdHandle, GetFileType, FindClose, FindFirstFileExA, FindNextFileA, IsValidCodePage, GetOEMCP, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, GetProcessHeap, SetStdHandle, HeapSize, WriteFile, GetConsoleCP, GetConsoleMode, SetFilePointerEx, FlushFileBuffers, WriteConsoleW, CreateFileW
                      AVIFIL32.dllAVIBuildFilterA, AVIFileGetStream, AVIFileInfoA, AVIFileInit, AVIFileOpenA, AVIFileExit
                      XOLEHLP.dll

                      Exports

                      NameOrdinalAddress
                      Rulefigure10x10016960

                      Version Infos

                      DescriptionData
                      LegalCopyrightCopyright 1997-2014 Oxygen bad, Inc.
                      InternalNameFact solve
                      FileVersion4.2.7.560
                      CompanyNameOxygen bad
                      ProductVersion4.2.7.560
                      FileDescriptionFact solve
                      OriginalFilenamecook.dll
                      Translation0x0409 0x04b0

                      Possible Origin

                      Language of compilation systemCountry where language is spokenMap
                      EnglishUnited States

                      Network Behavior

                      Network Port Distribution

                      UDP Packets

                      TimestampSource PortDest PortSource IPDest IP
                      Aug 3, 2021 23:11:26.985351086 CEST5836153192.168.2.38.8.8.8
                      Aug 3, 2021 23:11:27.010099888 CEST53583618.8.8.8192.168.2.3
                      Aug 3, 2021 23:11:27.751327038 CEST6349253192.168.2.38.8.8.8
                      Aug 3, 2021 23:11:27.785254002 CEST53634928.8.8.8192.168.2.3
                      Aug 3, 2021 23:11:27.974864006 CEST6083153192.168.2.38.8.8.8
                      Aug 3, 2021 23:11:28.009358883 CEST53608318.8.8.8192.168.2.3
                      Aug 3, 2021 23:11:28.776902914 CEST6010053192.168.2.38.8.8.8
                      Aug 3, 2021 23:11:28.809612036 CEST53601008.8.8.8192.168.2.3
                      Aug 3, 2021 23:11:30.021579981 CEST5319553192.168.2.38.8.8.8
                      Aug 3, 2021 23:11:30.048077106 CEST53531958.8.8.8192.168.2.3
                      Aug 3, 2021 23:11:31.270173073 CEST5014153192.168.2.38.8.8.8
                      Aug 3, 2021 23:11:31.298010111 CEST53501418.8.8.8192.168.2.3
                      Aug 3, 2021 23:11:32.712191105 CEST5302353192.168.2.38.8.8.8
                      Aug 3, 2021 23:11:32.739684105 CEST53530238.8.8.8192.168.2.3
                      Aug 3, 2021 23:11:33.734261990 CEST4956353192.168.2.38.8.8.8
                      Aug 3, 2021 23:11:33.761827946 CEST53495638.8.8.8192.168.2.3
                      Aug 3, 2021 23:12:02.005455017 CEST5135253192.168.2.38.8.8.8
                      Aug 3, 2021 23:12:02.032938004 CEST53513528.8.8.8192.168.2.3
                      Aug 3, 2021 23:12:02.875097990 CEST5934953192.168.2.38.8.8.8
                      Aug 3, 2021 23:12:02.917227983 CEST53593498.8.8.8192.168.2.3
                      Aug 3, 2021 23:12:03.997625113 CEST5708453192.168.2.38.8.8.8
                      Aug 3, 2021 23:12:04.022507906 CEST53570848.8.8.8192.168.2.3
                      Aug 3, 2021 23:12:04.499456882 CEST5882353192.168.2.38.8.8.8
                      Aug 3, 2021 23:12:04.536866903 CEST53588238.8.8.8192.168.2.3
                      Aug 3, 2021 23:12:05.017728090 CEST5756853192.168.2.38.8.8.8
                      Aug 3, 2021 23:12:05.045550108 CEST53575688.8.8.8192.168.2.3
                      Aug 3, 2021 23:12:05.981667042 CEST5054053192.168.2.38.8.8.8
                      Aug 3, 2021 23:12:06.011059999 CEST53505408.8.8.8192.168.2.3
                      Aug 3, 2021 23:12:07.847384930 CEST5436653192.168.2.38.8.8.8
                      Aug 3, 2021 23:12:07.879787922 CEST53543668.8.8.8192.168.2.3
                      Aug 3, 2021 23:12:08.890537024 CEST5303453192.168.2.38.8.8.8
                      Aug 3, 2021 23:12:08.924216032 CEST53530348.8.8.8192.168.2.3
                      Aug 3, 2021 23:12:10.094142914 CEST5776253192.168.2.38.8.8.8
                      Aug 3, 2021 23:12:10.122139931 CEST53577628.8.8.8192.168.2.3
                      Aug 3, 2021 23:12:11.096277952 CEST5543553192.168.2.38.8.8.8
                      Aug 3, 2021 23:12:11.124428034 CEST53554358.8.8.8192.168.2.3
                      Aug 3, 2021 23:12:12.099283934 CEST5071353192.168.2.38.8.8.8
                      Aug 3, 2021 23:12:12.140903950 CEST53507138.8.8.8192.168.2.3
                      Aug 3, 2021 23:12:22.757203102 CEST5613253192.168.2.38.8.8.8
                      Aug 3, 2021 23:12:22.794320107 CEST53561328.8.8.8192.168.2.3
                      Aug 3, 2021 23:12:47.263556957 CEST5898753192.168.2.38.8.8.8
                      Aug 3, 2021 23:12:47.293925047 CEST5657953192.168.2.38.8.8.8
                      Aug 3, 2021 23:12:47.320591927 CEST53589878.8.8.8192.168.2.3
                      Aug 3, 2021 23:12:47.355040073 CEST53565798.8.8.8192.168.2.3
                      Aug 3, 2021 23:12:50.066324949 CEST6063353192.168.2.38.8.8.8
                      Aug 3, 2021 23:12:50.126974106 CEST53606338.8.8.8192.168.2.3
                      Aug 3, 2021 23:12:53.033365965 CEST6129253192.168.2.38.8.8.8
                      Aug 3, 2021 23:12:53.093195915 CEST53612928.8.8.8192.168.2.3
                      Aug 3, 2021 23:12:54.370917082 CEST6361953192.168.2.38.8.8.8
                      Aug 3, 2021 23:12:54.406183004 CEST53636198.8.8.8192.168.2.3
                      Aug 3, 2021 23:12:55.174268961 CEST6493853192.168.2.38.8.8.8
                      Aug 3, 2021 23:12:55.236943007 CEST53649388.8.8.8192.168.2.3
                      Aug 3, 2021 23:12:58.160826921 CEST6194653192.168.2.38.8.8.8
                      Aug 3, 2021 23:12:58.219361067 CEST53619468.8.8.8192.168.2.3
                      Aug 3, 2021 23:13:00.314862013 CEST6491053192.168.2.38.8.8.8
                      Aug 3, 2021 23:13:00.374847889 CEST53649108.8.8.8192.168.2.3
                      Aug 3, 2021 23:13:01.084233046 CEST5212353192.168.2.38.8.8.8
                      Aug 3, 2021 23:13:01.120039940 CEST53521238.8.8.8192.168.2.3
                      Aug 3, 2021 23:13:03.274074078 CEST5613053192.168.2.38.8.8.8
                      Aug 3, 2021 23:13:03.341090918 CEST53561308.8.8.8192.168.2.3
                      Aug 3, 2021 23:13:05.448132992 CEST5633853192.168.2.38.8.8.8
                      Aug 3, 2021 23:13:05.513741970 CEST53563388.8.8.8192.168.2.3
                      Aug 3, 2021 23:13:08.457591057 CEST5942053192.168.2.38.8.8.8
                      Aug 3, 2021 23:13:08.522973061 CEST53594208.8.8.8192.168.2.3
                      Aug 3, 2021 23:13:11.206459045 CEST5878453192.168.2.38.8.8.8
                      Aug 3, 2021 23:13:11.276391983 CEST53587848.8.8.8192.168.2.3
                      Aug 3, 2021 23:13:13.573446989 CEST6397853192.168.2.38.8.8.8
                      Aug 3, 2021 23:13:13.629070044 CEST53639788.8.8.8192.168.2.3
                      Aug 3, 2021 23:13:14.882635117 CEST6293853192.168.2.38.8.8.8
                      Aug 3, 2021 23:13:14.930315971 CEST53629388.8.8.8192.168.2.3
                      Aug 3, 2021 23:13:16.337009907 CEST5570853192.168.2.38.8.8.8
                      Aug 3, 2021 23:13:16.405914068 CEST53557088.8.8.8192.168.2.3
                      Aug 3, 2021 23:13:18.714106083 CEST5680353192.168.2.38.8.8.8
                      Aug 3, 2021 23:13:18.775566101 CEST53568038.8.8.8192.168.2.3
                      Aug 3, 2021 23:13:21.490185022 CEST5714553192.168.2.38.8.8.8
                      Aug 3, 2021 23:13:21.552967072 CEST53571458.8.8.8192.168.2.3
                      Aug 3, 2021 23:13:23.868182898 CEST5535953192.168.2.38.8.8.8
                      Aug 3, 2021 23:13:23.925554991 CEST53553598.8.8.8192.168.2.3
                      Aug 3, 2021 23:13:26.585146904 CEST5830653192.168.2.38.8.8.8
                      Aug 3, 2021 23:13:26.644550085 CEST53583068.8.8.8192.168.2.3
                      Aug 3, 2021 23:13:29.179938078 CEST6412453192.168.2.38.8.8.8
                      Aug 3, 2021 23:13:29.242343903 CEST53641248.8.8.8192.168.2.3
                      Aug 3, 2021 23:13:31.385061979 CEST4936153192.168.2.38.8.8.8
                      Aug 3, 2021 23:13:31.427787066 CEST53493618.8.8.8192.168.2.3
                      Aug 3, 2021 23:13:31.702316999 CEST6315053192.168.2.38.8.8.8
                      Aug 3, 2021 23:13:31.760127068 CEST53631508.8.8.8192.168.2.3
                      Aug 3, 2021 23:13:33.406795979 CEST5327953192.168.2.38.8.8.8
                      Aug 3, 2021 23:13:33.458688021 CEST53532798.8.8.8192.168.2.3
                      Aug 3, 2021 23:13:34.308806896 CEST5688153192.168.2.38.8.8.8
                      Aug 3, 2021 23:13:34.365719080 CEST53568818.8.8.8192.168.2.3
                      Aug 3, 2021 23:13:36.805557966 CEST5364253192.168.2.38.8.8.8
                      Aug 3, 2021 23:13:36.865878105 CEST53536428.8.8.8192.168.2.3
                      Aug 3, 2021 23:13:39.380740881 CEST5566753192.168.2.38.8.8.8
                      Aug 3, 2021 23:13:39.445220947 CEST53556678.8.8.8192.168.2.3
                      Aug 3, 2021 23:13:41.881194115 CEST5483353192.168.2.38.8.8.8
                      Aug 3, 2021 23:13:41.944618940 CEST53548338.8.8.8192.168.2.3
                      Aug 3, 2021 23:13:44.458782911 CEST6247653192.168.2.38.8.8.8
                      Aug 3, 2021 23:13:44.517225027 CEST53624768.8.8.8192.168.2.3

                      DNS Queries

                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                      Aug 3, 2021 23:12:47.263556957 CEST192.168.2.38.8.8.80xa071Standard query (0)nazamoskaotp.xyzA (IP address)IN (0x0001)
                      Aug 3, 2021 23:12:47.293925047 CEST192.168.2.38.8.8.80xa7bStandard query (0)nazamoskaotp.xyzA (IP address)IN (0x0001)
                      Aug 3, 2021 23:12:50.066324949 CEST192.168.2.38.8.8.80xb592Standard query (0)nazamoskaotp.xyzA (IP address)IN (0x0001)
                      Aug 3, 2021 23:12:53.033365965 CEST192.168.2.38.8.8.80x5bdaStandard query (0)49vodysf.clubA (IP address)IN (0x0001)
                      Aug 3, 2021 23:12:55.174268961 CEST192.168.2.38.8.8.80xe744Standard query (0)49vodysf.clubA (IP address)IN (0x0001)
                      Aug 3, 2021 23:12:58.160826921 CEST192.168.2.38.8.8.80x26ffStandard query (0)nazamoskaotp.xyzA (IP address)IN (0x0001)
                      Aug 3, 2021 23:13:00.314862013 CEST192.168.2.38.8.8.80xd233Standard query (0)nazamoskaotp.xyzA (IP address)IN (0x0001)
                      Aug 3, 2021 23:13:03.274074078 CEST192.168.2.38.8.8.80xfb8bStandard query (0)49vodysf.clubA (IP address)IN (0x0001)
                      Aug 3, 2021 23:13:05.448132992 CEST192.168.2.38.8.8.80x42eStandard query (0)49vodysf.clubA (IP address)IN (0x0001)
                      Aug 3, 2021 23:13:08.457591057 CEST192.168.2.38.8.8.80x3e4Standard query (0)nazamoskaotp.xyzA (IP address)IN (0x0001)
                      Aug 3, 2021 23:13:11.206459045 CEST192.168.2.38.8.8.80x6e3Standard query (0)nazamoskaotp.xyzA (IP address)IN (0x0001)
                      Aug 3, 2021 23:13:13.573446989 CEST192.168.2.38.8.8.80xe102Standard query (0)49vodysf.clubA (IP address)IN (0x0001)
                      Aug 3, 2021 23:13:16.337009907 CEST192.168.2.38.8.8.80x9734Standard query (0)49vodysf.clubA (IP address)IN (0x0001)
                      Aug 3, 2021 23:13:18.714106083 CEST192.168.2.38.8.8.80xb8b7Standard query (0)nazamoskaotp.xyzA (IP address)IN (0x0001)
                      Aug 3, 2021 23:13:21.490185022 CEST192.168.2.38.8.8.80x7fe3Standard query (0)nazamoskaotp.xyzA (IP address)IN (0x0001)
                      Aug 3, 2021 23:13:23.868182898 CEST192.168.2.38.8.8.80xcdbdStandard query (0)49vodysf.clubA (IP address)IN (0x0001)
                      Aug 3, 2021 23:13:26.585146904 CEST192.168.2.38.8.8.80xf61bStandard query (0)49vodysf.clubA (IP address)IN (0x0001)
                      Aug 3, 2021 23:13:29.179938078 CEST192.168.2.38.8.8.80x3c29Standard query (0)nazamoskaotp.xyzA (IP address)IN (0x0001)
                      Aug 3, 2021 23:13:31.702316999 CEST192.168.2.38.8.8.80xbe85Standard query (0)nazamoskaotp.xyzA (IP address)IN (0x0001)
                      Aug 3, 2021 23:13:34.308806896 CEST192.168.2.38.8.8.80xb94aStandard query (0)49vodysf.clubA (IP address)IN (0x0001)
                      Aug 3, 2021 23:13:36.805557966 CEST192.168.2.38.8.8.80xaf4Standard query (0)49vodysf.clubA (IP address)IN (0x0001)
                      Aug 3, 2021 23:13:39.380740881 CEST192.168.2.38.8.8.80x7c52Standard query (0)nazamoskaotp.xyzA (IP address)IN (0x0001)
                      Aug 3, 2021 23:13:41.881194115 CEST192.168.2.38.8.8.80xd471Standard query (0)nazamoskaotp.xyzA (IP address)IN (0x0001)
                      Aug 3, 2021 23:13:44.458782911 CEST192.168.2.38.8.8.80x7b24Standard query (0)49vodysf.clubA (IP address)IN (0x0001)

                      DNS Answers

                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                      Aug 3, 2021 23:12:47.320591927 CEST8.8.8.8192.168.2.30xa071Server failure (2)nazamoskaotp.xyznonenoneA (IP address)IN (0x0001)
                      Aug 3, 2021 23:12:47.355040073 CEST8.8.8.8192.168.2.30xa7bServer failure (2)nazamoskaotp.xyznonenoneA (IP address)IN (0x0001)
                      Aug 3, 2021 23:12:50.126974106 CEST8.8.8.8192.168.2.30xb592Server failure (2)nazamoskaotp.xyznonenoneA (IP address)IN (0x0001)
                      Aug 3, 2021 23:12:53.093195915 CEST8.8.8.8192.168.2.30x5bdaServer failure (2)49vodysf.clubnonenoneA (IP address)IN (0x0001)
                      Aug 3, 2021 23:12:55.236943007 CEST8.8.8.8192.168.2.30xe744Server failure (2)49vodysf.clubnonenoneA (IP address)IN (0x0001)
                      Aug 3, 2021 23:12:58.219361067 CEST8.8.8.8192.168.2.30x26ffServer failure (2)nazamoskaotp.xyznonenoneA (IP address)IN (0x0001)
                      Aug 3, 2021 23:13:00.374847889 CEST8.8.8.8192.168.2.30xd233Server failure (2)nazamoskaotp.xyznonenoneA (IP address)IN (0x0001)
                      Aug 3, 2021 23:13:03.341090918 CEST8.8.8.8192.168.2.30xfb8bServer failure (2)49vodysf.clubnonenoneA (IP address)IN (0x0001)
                      Aug 3, 2021 23:13:05.513741970 CEST8.8.8.8192.168.2.30x42eServer failure (2)49vodysf.clubnonenoneA (IP address)IN (0x0001)
                      Aug 3, 2021 23:13:08.522973061 CEST8.8.8.8192.168.2.30x3e4Server failure (2)nazamoskaotp.xyznonenoneA (IP address)IN (0x0001)
                      Aug 3, 2021 23:13:11.276391983 CEST8.8.8.8192.168.2.30x6e3Server failure (2)nazamoskaotp.xyznonenoneA (IP address)IN (0x0001)
                      Aug 3, 2021 23:13:13.629070044 CEST8.8.8.8192.168.2.30xe102Server failure (2)49vodysf.clubnonenoneA (IP address)IN (0x0001)
                      Aug 3, 2021 23:13:16.405914068 CEST8.8.8.8192.168.2.30x9734Server failure (2)49vodysf.clubnonenoneA (IP address)IN (0x0001)
                      Aug 3, 2021 23:13:18.775566101 CEST8.8.8.8192.168.2.30xb8b7Server failure (2)nazamoskaotp.xyznonenoneA (IP address)IN (0x0001)
                      Aug 3, 2021 23:13:21.552967072 CEST8.8.8.8192.168.2.30x7fe3Server failure (2)nazamoskaotp.xyznonenoneA (IP address)IN (0x0001)
                      Aug 3, 2021 23:13:23.925554991 CEST8.8.8.8192.168.2.30xcdbdServer failure (2)49vodysf.clubnonenoneA (IP address)IN (0x0001)
                      Aug 3, 2021 23:13:26.644550085 CEST8.8.8.8192.168.2.30xf61bServer failure (2)49vodysf.clubnonenoneA (IP address)IN (0x0001)
                      Aug 3, 2021 23:13:29.242343903 CEST8.8.8.8192.168.2.30x3c29Server failure (2)nazamoskaotp.xyznonenoneA (IP address)IN (0x0001)
                      Aug 3, 2021 23:13:31.760127068 CEST8.8.8.8192.168.2.30xbe85Server failure (2)nazamoskaotp.xyznonenoneA (IP address)IN (0x0001)
                      Aug 3, 2021 23:13:34.365719080 CEST8.8.8.8192.168.2.30xb94aServer failure (2)49vodysf.clubnonenoneA (IP address)IN (0x0001)
                      Aug 3, 2021 23:13:36.865878105 CEST8.8.8.8192.168.2.30xaf4Server failure (2)49vodysf.clubnonenoneA (IP address)IN (0x0001)
                      Aug 3, 2021 23:13:39.445220947 CEST8.8.8.8192.168.2.30x7c52Server failure (2)nazamoskaotp.xyznonenoneA (IP address)IN (0x0001)
                      Aug 3, 2021 23:13:41.944618940 CEST8.8.8.8192.168.2.30xd471Server failure (2)nazamoskaotp.xyznonenoneA (IP address)IN (0x0001)
                      Aug 3, 2021 23:13:44.517225027 CEST8.8.8.8192.168.2.30x7b24Server failure (2)49vodysf.clubnonenoneA (IP address)IN (0x0001)

                      Code Manipulations

                      Statistics

                      Behavior

                      Click to jump to process

                      System Behavior

                      General

                      Start time:23:11:32
                      Start date:03/08/2021
                      Path:C:\Windows\System32\loaddll32.exe
                      Wow64 process (32bit):true
                      Commandline:loaddll32.exe 'C:\Users\user\Desktop\aFqZ2vCizZ.dll'
                      Imagebase:0x20000
                      File size:116736 bytes
                      MD5 hash:542795ADF7CC08EFCF675D65310596E8
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_IcedID_5, Description: Yara detected IcedID, Source: 00000001.00000002.470777736.000000006E143000.00000002.00020000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_IcedID_5, Description: Yara detected IcedID, Source: 00000001.00000003.363239046.00000000014A0000.00000040.00000001.sdmp, Author: Joe Security
                      Reputation:high

                      General

                      Start time:23:11:33
                      Start date:03/08/2021
                      Path:C:\Windows\SysWOW64\cmd.exe
                      Wow64 process (32bit):true
                      Commandline:cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\aFqZ2vCizZ.dll',#1
                      Imagebase:0xbd0000
                      File size:232960 bytes
                      MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high

                      General

                      Start time:23:11:33
                      Start date:03/08/2021
                      Path:C:\Windows\SysWOW64\rundll32.exe
                      Wow64 process (32bit):true
                      Commandline:rundll32.exe C:\Users\user\Desktop\aFqZ2vCizZ.dll,Rulefigure
                      Imagebase:0x8a0000
                      File size:61952 bytes
                      MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_IcedID_5, Description: Yara detected IcedID, Source: 00000004.00000003.356776329.00000000003D0000.00000040.00000001.sdmp, Author: Joe Security
                      Reputation:high

                      General

                      Start time:23:11:33
                      Start date:03/08/2021
                      Path:C:\Windows\SysWOW64\rundll32.exe
                      Wow64 process (32bit):true
                      Commandline:rundll32.exe 'C:\Users\user\Desktop\aFqZ2vCizZ.dll',#1
                      Imagebase:0x8a0000
                      File size:61952 bytes
                      MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_IcedID_5, Description: Yara detected IcedID, Source: 00000005.00000003.356800062.0000000000420000.00000040.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_IcedID_5, Description: Yara detected IcedID, Source: 00000005.00000002.472279306.000000006E143000.00000002.00020000.sdmp, Author: Joe Security
                      Reputation:high

                      Disassembly

                      Code Analysis

                      Reset < >