Loading ...

Play interactive tourEdit tour

Windows Analysis Report ZBvNS77A7a.dll

Overview

General Information

Sample Name:ZBvNS77A7a.dll
Analysis ID:490262
MD5:6484d8ffd4a6de7947534571e9907b4e
SHA1:41e1cbd037698c3329db4edfe4e6b28b0654e94c
SHA256:64a6039b2b3a347312f56170b5eb7deebe6d37ef6fb414fb929e84be4799dfa5
Tags:dllSquirrelwaffle
Infos:

Most interesting Screenshot:

Detection

Score:92
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Sigma detected: Schedule system process
Maps a DLL or memory area into another process
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Writes to foreign memory regions
Machine Learning detection for sample
Allocates memory in foreign processes
Injects code into the Windows Explorer (explorer.exe)
Sigma detected: Regsvr32 Command Line Without DLL
Machine Learning detection for dropped file
Uses schtasks.exe or at.exe to add and modify task schedules
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
One or more processes crash
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Creates files inside the system directory
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
PE file does not import any functions
Sample file is different than original file name gathered from version info
Drops PE files
Tries to load missing DLLs
Checks if the current process is being debugged
Registers a DLL
Creates a process in suspended mode (likely to inject code)

Classification

Process Tree

  • System is w10x64
  • loaddll32.exe (PID: 5756 cmdline: loaddll32.exe 'C:\Users\user\Desktop\ZBvNS77A7a.dll' MD5: 542795ADF7CC08EFCF675D65310596E8)
    • cmd.exe (PID: 796 cmdline: cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\ZBvNS77A7a.dll',#1 MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • rundll32.exe (PID: 6352 cmdline: rundll32.exe 'C:\Users\user\Desktop\ZBvNS77A7a.dll',#1 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
        • explorer.exe (PID: 5620 cmdline: C:\Windows\SysWOW64\explorer.exe MD5: 166AB1B9462E5C1D6D18EC5EC0B6A5F7)
    • explorer.exe (PID: 5616 cmdline: C:\Windows\SysWOW64\explorer.exe MD5: 166AB1B9462E5C1D6D18EC5EC0B6A5F7)
      • schtasks.exe (PID: 6604 cmdline: 'C:\Windows\system32\schtasks.exe' /Create /RU 'NT AUTHORITY\SYSTEM' /tn payuhfp /tr 'regsvr32.exe -s \'C:\Users\user\Desktop\ZBvNS77A7a.dll\'' /SC ONCE /Z /ST 10:25 /ET 10:37 MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 6624 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • regsvr32.exe (PID: 5912 cmdline: regsvr32.exe -s 'C:\Users\user\Desktop\ZBvNS77A7a.dll' MD5: D78B75FC68247E8A63ACBA846182740E)
    • regsvr32.exe (PID: 5944 cmdline: -s 'C:\Users\user\Desktop\ZBvNS77A7a.dll' MD5: 426E7499F6A7346F0410DEAD0805586B)
      • WerFault.exe (PID: 1372 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 5944 -s 660 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
  • regsvr32.exe (PID: 7080 cmdline: regsvr32.exe -s 'C:\Users\user\Desktop\ZBvNS77A7a.dll' MD5: D78B75FC68247E8A63ACBA846182740E)
    • regsvr32.exe (PID: 5576 cmdline: -s 'C:\Users\user\Desktop\ZBvNS77A7a.dll' MD5: 426E7499F6A7346F0410DEAD0805586B)
      • WerFault.exe (PID: 6788 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 5576 -s 652 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

System Summary:

barindex
Sigma detected: Regsvr32 Command Line Without DLLShow sources
Source: Process startedAuthor: Florian Roth: Data: Command: C:\Windows\SysWOW64\WerFault.exe -u -p 5944 -s 660, CommandLine: C:\Windows\SysWOW64\WerFault.exe -u -p 5944 -s 660, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\WerFault.exe, NewProcessName: C:\Windows\SysWOW64\WerFault.exe, OriginalFileName: C:\Windows\SysWOW64\WerFault.exe, ParentCommandLine: -s 'C:\Users\user\Desktop\ZBvNS77A7a.dll', ParentImage: C:\Windows\SysWOW64\regsvr32.exe, ParentProcessId: 5944, ProcessCommandLine: C:\Windows\SysWOW64\WerFault.exe -u -p 5944 -s 660, ProcessId: 1372

Persistence and Installation Behavior:

barindex
Sigma detected: Schedule system processShow sources
Source: Process startedAuthor: Joe Security: Data: Command: 'C:\Windows\system32\schtasks.exe' /Create /RU 'NT AUTHORITY\SYSTEM' /tn payuhfp /tr 'regsvr32.exe -s \'C:\Users\user\Desktop\ZBvNS77A7a.dll\'' /SC ONCE /Z /ST 10:25 /ET 10:37, CommandLine: 'C:\Windows\system32\schtasks.exe' /Create /RU 'NT AUTHORITY\SYSTEM' /tn payuhfp /tr 'regsvr32.exe -s \'C:\Users\user\Desktop\ZBvNS77A7a.dll\'' /SC ONCE /Z /ST 10:25 /ET 10:37, CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Windows\SysWOW64\explorer.exe, ParentImage: C:\Windows\SysWOW64\explorer.exe, ParentProcessId: 5616, ProcessCommandLine: 'C:\Windows\system32\schtasks.exe' /Create /RU 'NT AUTHORITY\SYSTEM' /tn payuhfp /tr 'regsvr32.exe -s \'C:\Users\user\Desktop\ZBvNS77A7a.dll\'' /SC ONCE /Z /ST 10:25 /ET 10:37, ProcessId: 6604

Jbx Signature Overview

Click to jump to signature section

Show All Signature Results

AV Detection:

barindex
Multi AV Scanner detection for submitted fileShow sources
Source: ZBvNS77A7a.dllVirustotal: Detection: 46%Perma Link
Source: ZBvNS77A7a.dllReversingLabs: Detection: 60%
Machine Learning detection for sampleShow sources
Source: ZBvNS77A7a.dllJoe Sandbox ML: detected
Machine Learning detection for dropped fileShow sources
Source: C:\Users\user\Desktop\ZBvNS77A7a.dllJoe Sandbox ML: detected
Source: ZBvNS77A7a.dllStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
Source: Binary string: ole32.pdb# source: WerFault.exe, 00000019.00000003.932307324.0000000003D36000.00000004.00000040.sdmp
Source: Binary string: wkernel32.pdb source: WerFault.exe, 0000000D.00000003.728766829.0000000003AC1000.00000004.00000001.sdmp, WerFault.exe, 00000019.00000003.932275167.0000000003D61000.00000004.00000001.sdmp
Source: Binary string: sfc_os.pdb source: WerFault.exe, 0000000D.00000003.737356835.0000000003DB6000.00000004.00000040.sdmp, WerFault.exe, 00000019.00000003.932307324.0000000003D36000.00000004.00000040.sdmp
Source: Binary string: bcrypt.pdb source: WerFault.exe, 0000000D.00000003.737356835.0000000003DB6000.00000004.00000040.sdmp, WerFault.exe, 00000019.00000003.932307324.0000000003D36000.00000004.00000040.sdmp
Source: Binary string: ucrtbase.pdb source: WerFault.exe, 0000000D.00000003.737117016.0000000003DE1000.00000004.00000001.sdmp, WerFault.exe, 00000019.00000003.932275167.0000000003D61000.00000004.00000001.sdmp
Source: Binary string: msvcrt.pdb source: WerFault.exe, 0000000D.00000003.737117016.0000000003DE1000.00000004.00000001.sdmp, WerFault.exe, 00000019.00000003.932275167.0000000003D61000.00000004.00000001.sdmp
Source: Binary string: wrpcrt4.pdb source: WerFault.exe, 0000000D.00000003.737253466.0000000003DB0000.00000004.00000040.sdmp, WerFault.exe, 00000019.00000003.932298953.0000000003D30000.00000004.00000040.sdmp
Source: Binary string: wntdll.pdb source: WerFault.exe, 0000000D.00000003.737117016.0000000003DE1000.00000004.00000001.sdmp, WerFault.exe, 00000019.00000003.932275167.0000000003D61000.00000004.00000001.sdmp
Source: Binary string: propsys.pdb$ source: WerFault.exe, 00000019.00000003.932307324.0000000003D36000.00000004.00000040.sdmp
Source: Binary string: shcore.pdb source: WerFault.exe, 0000000D.00000003.737253466.0000000003DB0000.00000004.00000040.sdmp, WerFault.exe, 00000019.00000003.932298953.0000000003D30000.00000004.00000040.sdmp
Source: Binary string: ole32.pdbBa source: WerFault.exe, 0000000D.00000003.737356835.0000000003DB6000.00000004.00000040.sdmp
Source: Binary string: shlwapi.pdb) source: WerFault.exe, 00000019.00000003.932307324.0000000003D36000.00000004.00000040.sdmp
Source: Binary string: wgdi32.pdb source: WerFault.exe, 0000000D.00000003.737117016.0000000003DE1000.00000004.00000001.sdmp, WerFault.exe, 00000019.00000003.932275167.0000000003D61000.00000004.00000001.sdmp
Source: Binary string: advapi32.pdb source: WerFault.exe, 0000000D.00000003.737356835.0000000003DB6000.00000004.00000040.sdmp, WerFault.exe, 00000019.00000003.932307324.0000000003D36000.00000004.00000040.sdmp
Source: Binary string: fltLib.pdb source: WerFault.exe, 0000000D.00000003.737356835.0000000003DB6000.00000004.00000040.sdmp, WerFault.exe, 00000019.00000003.932307324.0000000003D36000.00000004.00000040.sdmp
Source: Binary string: wsspicli.pdb source: WerFault.exe, 0000000D.00000003.737356835.0000000003DB6000.00000004.00000040.sdmp, WerFault.exe, 00000019.00000003.932307324.0000000003D36000.00000004.00000040.sdmp
Source: Binary string: regsvr32.pdbk source: WerFault.exe, 0000000D.00000003.737117016.0000000003DE1000.00000004.00000001.sdmp, WerFault.exe, 00000019.00000003.932275167.0000000003D61000.00000004.00000001.sdmp
Source: Binary string: shell32.pdb source: WerFault.exe, 0000000D.00000003.737117016.0000000003DE1000.00000004.00000001.sdmp, WerFault.exe, 00000019.00000003.932275167.0000000003D61000.00000004.00000001.sdmp
Source: Binary string: msvcp_win.pdb source: WerFault.exe, 0000000D.00000003.737117016.0000000003DE1000.00000004.00000001.sdmp, WerFault.exe, 00000019.00000003.932275167.0000000003D61000.00000004.00000001.sdmp
Source: Binary string: wkernelbase.pdb source: WerFault.exe, 0000000D.00000003.737117016.0000000003DE1000.00000004.00000001.sdmp, WerFault.exe, 00000019.00000003.932275167.0000000003D61000.00000004.00000001.sdmp
Source: Binary string: mpr.pdb source: WerFault.exe, 0000000D.00000003.737253466.0000000003DB0000.00000004.00000040.sdmp, WerFault.exe, 00000019.00000003.932298953.0000000003D30000.00000004.00000040.sdmp
Source: Binary string: shlwapi.pdb source: WerFault.exe, 0000000D.00000003.737356835.0000000003DB6000.00000004.00000040.sdmp, WerFault.exe, 00000019.00000003.932307324.0000000003D36000.00000004.00000040.sdmp
Source: Binary string: wwin32u.pdb source: WerFault.exe, 0000000D.00000003.737117016.0000000003DE1000.00000004.00000001.sdmp, WerFault.exe, 00000019.00000003.932275167.0000000003D61000.00000004.00000001.sdmp
Source: Binary string: setupapi.pdb source: WerFault.exe, 0000000D.00000003.737356835.0000000003DB6000.00000004.00000040.sdmp, WerFault.exe, 00000019.00000003.932307324.0000000003D36000.00000004.00000040.sdmp
Source: Binary string: combase.pdb|g source: WerFault.exe, 0000000D.00000003.737356835.0000000003DB6000.00000004.00000040.sdmp
Source: Binary string: regsvr32.pdb source: WerFault.exe, 0000000D.00000003.737117016.0000000003DE1000.00000004.00000001.sdmp, WerFault.exe, 00000019.00000003.932275167.0000000003D61000.00000004.00000001.sdmp
Source: Binary string: mpr.pdb7 source: WerFault.exe, 0000000D.00000003.737253466.0000000003DB0000.00000004.00000040.sdmp
Source: Binary string: shcore.pdbk source: WerFault.exe, 0000000D.00000003.737253466.0000000003DB0000.00000004.00000040.sdmp, WerFault.exe, 00000019.00000003.932298953.0000000003D30000.00000004.00000040.sdmp
Source: Binary string: profapi.pdb source: WerFault.exe, 0000000D.00000003.737356835.0000000003DB6000.00000004.00000040.sdmp, WerFault.exe, 00000019.00000003.932307324.0000000003D36000.00000004.00000040.sdmp
Source: Binary string: winspool.pdb source: WerFault.exe, 0000000D.00000003.737356835.0000000003DB6000.00000004.00000040.sdmp, WerFault.exe, 00000019.00000003.932307324.0000000003D36000.00000004.00000040.sdmp
Source: Binary string: wgdi32full.pdb source: WerFault.exe, 0000000D.00000003.737117016.0000000003DE1000.00000004.00000001.sdmp, WerFault.exe, 00000019.00000003.932275167.0000000003D61000.00000004.00000001.sdmp
Source: Binary string: fltLib.pdbd_ source: WerFault.exe, 0000000D.00000003.737356835.0000000003DB6000.00000004.00000040.sdmp
Source: Binary string: sechost.pdb source: WerFault.exe, 0000000D.00000003.737356835.0000000003DB6000.00000004.00000040.sdmp, WerFault.exe, 00000019.00000003.932307324.0000000003D36000.00000004.00000040.sdmp
Source: Binary string: iphlpapi.pdb source: WerFault.exe, 0000000D.00000003.737356835.0000000003DB6000.00000004.00000040.sdmp, WerFault.exe, 00000019.00000003.932307324.0000000003D36000.00000004.00000040.sdmp
Source: Binary string: amstream.pdb source: explorer.exe, 00000004.00000003.702172421.0000000005361000.00000004.00000001.sdmp, explorer.exe, 00000005.00000003.702205579.0000000004F11000.00000004.00000001.sdmp, regsvr32.exe, 00000009.00000000.716853295.0000000010001000.00000020.00020000.sdmp, regsvr32.exe, 00000017.00000000.923266428.0000000010001000.00000020.00020000.sdmp, ZBvNS77A7a.dll.5.dr
Source: Binary string: propsys.pdb source: WerFault.exe, 0000000D.00000003.737356835.0000000003DB6000.00000004.00000040.sdmp, WerFault.exe, 00000019.00000003.932307324.0000000003D36000.00000004.00000040.sdmp
Source: Binary string: cfgmgr32.pdbk source: WerFault.exe, 0000000D.00000003.737253466.0000000003DB0000.00000004.00000040.sdmp, WerFault.exe, 00000019.00000003.932298953.0000000003D30000.00000004.00000040.sdmp
Source: Binary string: sfc_os.pdb5 source: WerFault.exe, 00000019.00000003.932307324.0000000003D36000.00000004.00000040.sdmp
Source: Binary string: sfc.pdbK source: WerFault.exe, 0000000D.00000003.737356835.0000000003DB6000.00000004.00000040.sdmp, WerFault.exe, 00000019.00000003.932307324.0000000003D36000.00000004.00000040.sdmp
Source: Binary string: powrprof.pdb source: WerFault.exe, 0000000D.00000003.737356835.0000000003DB6000.00000004.00000040.sdmp, WerFault.exe, 00000019.00000003.932307324.0000000003D36000.00000004.00000040.sdmp
Source: Binary string: ole32.pdb source: WerFault.exe, 0000000D.00000003.737356835.0000000003DB6000.00000004.00000040.sdmp, WerFault.exe, 00000019.00000003.932307324.0000000003D36000.00000004.00000040.sdmp
Source: Binary string: AcLayers.pdb source: WerFault.exe, 0000000D.00000003.737117016.0000000003DE1000.00000004.00000001.sdmp, WerFault.exe, 00000019.00000003.932275167.0000000003D61000.00000004.00000001.sdmp
Source: Binary string: amstream.pdbGCTL source: explorer.exe, 00000004.00000003.702172421.0000000005361000.00000004.00000001.sdmp, explorer.exe, 00000005.00000003.702205579.0000000004F11000.00000004.00000001.sdmp, regsvr32.exe, 00000009.00000000.716853295.0000000010001000.00000020.00020000.sdmp, regsvr32.exe, 00000017.00000000.923266428.0000000010001000.00000020.00020000.sdmp, ZBvNS77A7a.dll.5.dr
Source: Binary string: annjrqnCReportStore::Prune: MaxReportCount=%d MaxSizeInMb=%dRSDSwkernel32.pdb source: WerFault.exe, 0000000D.00000002.764287027.0000000002C32000.00000004.00000001.sdmp, WerFault.exe, 00000019.00000002.938813664.0000000002962000.00000004.00000001.sdmp
Source: Binary string: Kernel.Appcore.pdb source: WerFault.exe, 0000000D.00000003.737253466.0000000003DB0000.00000004.00000040.sdmp, WerFault.exe, 00000019.00000003.932298953.0000000003D30000.00000004.00000040.sdmp
Source: Binary string: advapi32.pdbvm source: WerFault.exe, 0000000D.00000003.737356835.0000000003DB6000.00000004.00000040.sdmp
Source: Binary string: cryptbase.pdb source: WerFault.exe, 0000000D.00000003.737356835.0000000003DB6000.00000004.00000040.sdmp, WerFault.exe, 00000019.00000003.932307324.0000000003D36000.00000004.00000040.sdmp
Source: Binary string: cfgmgr32.pdb source: WerFault.exe, 0000000D.00000003.737253466.0000000003DB0000.00000004.00000040.sdmp, WerFault.exe, 00000019.00000003.932298953.0000000003D30000.00000004.00000040.sdmp
Source: Binary string: bcryptprimitives.pdb source: WerFault.exe, 0000000D.00000003.737253466.0000000003DB0000.00000004.00000040.sdmp, WerFault.exe, 00000019.00000003.932298953.0000000003D30000.00000004.00000040.sdmp
Source: Binary string: Windows.Storage.pdb source: WerFault.exe, 0000000D.00000003.737253466.0000000003DB0000.00000004.00000040.sdmp, WerFault.exe, 00000019.00000003.932298953.0000000003D30000.00000004.00000040.sdmp
Source: Binary string: combase.pdb source: WerFault.exe, 0000000D.00000003.737356835.0000000003DB6000.00000004.00000040.sdmp, WerFault.exe, 00000019.00000003.932307324.0000000003D36000.00000004.00000040.sdmp
Source: Binary string: oleaut32.pdb source: WerFault.exe, 0000000D.00000003.737356835.0000000003DB6000.00000004.00000040.sdmp, WerFault.exe, 00000019.00000003.932307324.0000000003D36000.00000004.00000040.sdmp
Source: Binary string: sfc.pdb source: WerFault.exe, 0000000D.00000003.737356835.0000000003DB6000.00000004.00000040.sdmp, WerFault.exe, 00000019.00000003.932307324.0000000003D36000.00000004.00000040.sdmp
Source: Binary string: apphelp.pdb source: WerFault.exe, 0000000D.00000003.737117016.0000000003DE1000.00000004.00000001.sdmp, WerFault.exe, 00000019.00000003.932275167.0000000003D61000.00000004.00000001.sdmp
Source: Binary string: wuser32.pdb source: WerFault.exe, 0000000D.00000003.737117016.0000000003DE1000.00000004.00000001.sdmp, WerFault.exe, 00000019.00000003.932275167.0000000003D61000.00000004.00000001.sdmp
Source: Binary string: powrprof.pdbH{ source: WerFault.exe, 0000000D.00000003.737356835.0000000003DB6000.00000004.00000040.sdmp
Source: Binary string: wntdll.pdbk source: WerFault.exe, 0000000D.00000003.737117016.0000000003DE1000.00000004.00000001.sdmp, WerFault.exe, 00000019.00000003.932275167.0000000003D61000.00000004.00000001.sdmp
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_1000AE9A FindFirstFileW,FindNextFileW,
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_1000AE9A FindFirstFileW,FindNextFileW,
Source: C:\Windows\SysWOW64\explorer.exeCode function: 4_2_0360AE9A FindFirstFileW,FindNextFileW,
Source: C:\Windows\SysWOW64\explorer.exeCode function: 5_2_00E5AE9A FindFirstFileW,FindNextFileW,

System Summary:

barindex
Source: ZBvNS77A7a.dllStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
Source: C:\Windows\SysWOW64\regsvr32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5944 -s 660
Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\DBGJump to behavior
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_030919A1
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_10016EC0
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_10012351
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_10011763
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_1001538F
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_10014FD0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_045819A1
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_10016EC0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_10012351
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_10011763
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_1001538F
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_10014FD0
Source: C:\Windows\SysWOW64\explorer.exeCode function: 4_2_03611763
Source: C:\Windows\SysWOW64\explorer.exeCode function: 4_2_03612351
Source: C:\Windows\SysWOW64\explorer.exeCode function: 4_2_03614FD0
Source: C:\Windows\SysWOW64\explorer.exeCode function: 4_2_0361538F
Source: C:\Windows\SysWOW64\explorer.exeCode function: 4_2_03616EC0
Source: C:\Windows\SysWOW64\explorer.exeCode function: 5_2_00E66EC0
Source: C:\Windows\SysWOW64\explorer.exeCode function: 5_2_00E64FD0
Source: C:\Windows\SysWOW64\explorer.exeCode function: 5_2_00E6538F
Source: C:\Windows\SysWOW64\explorer.exeCode function: 5_2_00E61763
Source: C:\Windows\SysWOW64\explorer.exeCode function: 5_2_00E62351
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_1000C6CB NtCreateSection,DefWindowProcA,RegisterClassExA,CreateWindowExA,DestroyWindow,UnregisterClassA,GetCurrentProcess,NtMapViewOfSection,NtMapViewOfSection,VirtualAllocEx,WriteProcessMemory,GetCurrentProcess,NtUnmapViewOfSection,NtClose,
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_1000CB82 memset,GetThreadContext,NtProtectVirtualMemory,NtWriteVirtualMemory,NtProtectVirtualMemory,FreeLibrary,
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_1000C6CB NtCreateSection,DefWindowProcA,RegisterClassExA,CreateWindowExA,DestroyWindow,UnregisterClassA,GetCurrentProcess,NtMapViewOfSection,NtMapViewOfSection,VirtualAllocEx,WriteProcessMemory,GetCurrentProcess,NtUnmapViewOfSection,NtClose,
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_1000CB82 memset,GetThreadContext,NtProtectVirtualMemory,NtWriteVirtualMemory,NtProtectVirtualMemory,FreeLibrary,
Source: ZBvNS77A7a.dll.5.drStatic PE information: No import functions for PE file found
Source: ZBvNS77A7a.dll.4.drStatic PE information: No import functions for PE file found
Source: ZBvNS77A7a.dll.5.drBinary or memory string: OriginalFilenameAMStream.dllj% vs ZBvNS77A7a.dll
Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dll
Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: sfc.dll
Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dll
Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: sfc.dll
Source: ZBvNS77A7a.dllVirustotal: Detection: 46%
Source: ZBvNS77A7a.dllReversingLabs: Detection: 60%
Source: ZBvNS77A7a.dllStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe 'C:\Users\user\Desktop\ZBvNS77A7a.dll'
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\ZBvNS77A7a.dll',#1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\ZBvNS77A7a.dll',#1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exe
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exe
Source: C:\Windows\SysWOW64\explorer.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\system32\schtasks.exe' /Create /RU 'NT AUTHORITY\SYSTEM' /tn payuhfp /tr 'regsvr32.exe -s \'C:\Users\user\Desktop\ZBvNS77A7a.dll\'' /SC ONCE /Z /ST 10:25 /ET 10:37
Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: unknownProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe -s 'C:\Users\user\Desktop\ZBvNS77A7a.dll'
Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe -s 'C:\Users\user\Desktop\ZBvNS77A7a.dll'
Source: C:\Windows\SysWOW64\regsvr32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5944 -s 660
Source: unknownProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe -s 'C:\Users\user\Desktop\ZBvNS77A7a.dll'
Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe -s 'C:\Users\user\Desktop\ZBvNS77A7a.dll'
Source: C:\Windows\SysWOW64\regsvr32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5576 -s 652
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\ZBvNS77A7a.dll',#1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exe
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\ZBvNS77A7a.dll',#1
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exe
Source: C:\Windows\SysWOW64\explorer.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\system32\schtasks.exe' /Create /RU 'NT AUTHORITY\SYSTEM' /tn payuhfp /tr 'regsvr32.exe -s \'C:\Users\user\Desktop\ZBvNS77A7a.dll\'' /SC ONCE /Z /ST 10:25 /ET 10:37
Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe -s 'C:\Users\user\Desktop\ZBvNS77A7a.dll'
Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe -s 'C:\Users\user\Desktop\ZBvNS77A7a.dll'
Source: C:\Windows\SysWOW64\explorer.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\PzjqjshjoyJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\WERF241.tmpJump to behavior
Source: classification engineClassification label: mal92.evad.winDLL@20/10@0/0
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_1000D52E CoInitializeEx,CoInitializeSecurity,CoCreateInstance,SysAllocString,CoSetProxyBlanket,
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_1000AB89 CreateToolhelp32Snapshot,memset,Process32First,Process32Next,CloseHandle,
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\ZBvNS77A7a.dll',#1
Source: C:\Windows\SysWOW64\explorer.exeMutant created: \Sessions\1\BaseNamedObjects\{9A57D251-8185-479A-AC5F-1814AF591876}
Source: C:\Windows\SysWOW64\explorer.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{62D2F15B-1C9B-4191-87B4-71874D8982FF}
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \BaseNamedObjects\Local\WERReportingForProcess5944
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \BaseNamedObjects\Local\WERReportingForProcess5576
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6624:120:WilError_01
Source: C:\Windows\SysWOW64\explorer.exeMutant created: \Sessions\1\BaseNamedObjects\{62D2F15B-1C9B-4191-87B4-71874D8982FF}
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\explorer.exe
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\explorer.exe
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\explorer.exe
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\explorer.exe
Source: Binary string: ole32.pdb# source: WerFault.exe, 00000019.00000003.932307324.0000000003D36000.00000004.00000040.sdmp
Source: Binary string: wkernel32.pdb source: WerFault.exe, 0000000D.00000003.728766829.0000000003AC1000.00000004.00000001.sdmp, WerFault.exe, 00000019.00000003.932275167.0000000003D61000.00000004.00000001.sdmp
Source: Binary string: sfc_os.pdb source: WerFault.exe, 0000000D.00000003.737356835.0000000003DB6000.00000004.00000040.sdmp, WerFault.exe, 00000019.00000003.932307324.0000000003D36000.00000004.00000040.sdmp
Source: Binary string: bcrypt.pdb source: WerFault.exe, 0000000D.00000003.737356835.0000000003DB6000.00000004.00000040.sdmp, WerFault.exe, 00000019.00000003.932307324.0000000003D36000.00000004.00000040.sdmp
Source: Binary string: ucrtbase.pdb source: WerFault.exe, 0000000D.00000003.737117016.0000000003DE1000.00000004.00000001.sdmp, WerFault.exe, 00000019.00000003.932275167.0000000003D61000.00000004.00000001.sdmp
Source: Binary string: msvcrt.pdb source: WerFault.exe, 0000000D.00000003.737117016.0000000003DE1000.00000004.00000001.sdmp, WerFault.exe, 00000019.00000003.932275167.0000000003D61000.00000004.00000001.sdmp
Source: Binary string: wrpcrt4.pdb source: WerFault.exe, 0000000D.00000003.737253466.0000000003DB0000.00000004.00000040.sdmp, WerFault.exe, 00000019.00000003.932298953.0000000003D30000.00000004.00000040.sdmp
Source: Binary string: wntdll.pdb source: WerFault.exe, 0000000D.00000003.737117016.0000000003DE1000.00000004.00000001.sdmp, WerFault.exe, 00000019.00000003.932275167.0000000003D61000.00000004.00000001.sdmp
Source: Binary string: propsys.pdb$ source: WerFault.exe, 00000019.00000003.932307324.0000000003D36000.00000004.00000040.sdmp
Source: Binary string: shcore.pdb source: WerFault.exe, 0000000D.00000003.737253466.0000000003DB0000.00000004.00000040.sdmp, WerFault.exe, 00000019.00000003.932298953.0000000003D30000.00000004.00000040.sdmp
Source: Binary string: ole32.pdbBa source: WerFault.exe, 0000000D.00000003.737356835.0000000003DB6000.00000004.00000040.sdmp
Source: Binary string: shlwapi.pdb) source: WerFault.exe, 00000019.00000003.932307324.0000000003D36000.00000004.00000040.sdmp
Source: Binary string: wgdi32.pdb source: WerFault.exe, 0000000D.00000003.737117016.0000000003DE1000.00000004.00000001.sdmp, WerFault.exe, 00000019.00000003.932275167.0000000003D61000.00000004.00000001.sdmp
Source: Binary string: advapi32.pdb source: WerFault.exe, 0000000D.00000003.737356835.0000000003DB6000.00000004.00000040.sdmp, WerFault.exe, 00000019.00000003.932307324.0000000003D36000.00000004.00000040.sdmp
Source: Binary string: fltLib.pdb source: WerFault.exe, 0000000D.00000003.737356835.0000000003DB6000.00000004.00000040.sdmp, WerFault.exe, 00000019.00000003.932307324.0000000003D36000.00000004.00000040.sdmp
Source: Binary string: wsspicli.pdb source: WerFault.exe, 0000000D.00000003.737356835.0000000003DB6000.00000004.00000040.sdmp, WerFault.exe, 00000019.00000003.932307324.0000000003D36000.00000004.00000040.sdmp
Source: Binary string: regsvr32.pdbk source: WerFault.exe, 0000000D.00000003.737117016.0000000003DE1000.00000004.00000001.sdmp, WerFault.exe, 00000019.00000003.932275167.0000000003D61000.00000004.00000001.sdmp
Source: Binary string: shell32.pdb source: WerFault.exe, 0000000D.00000003.737117016.0000000003DE1000.00000004.00000001.sdmp, WerFault.exe, 00000019.00000003.932275167.0000000003D61000.00000004.00000001.sdmp
Source: Binary string: msvcp_win.pdb source: WerFault.exe, 0000000D.00000003.737117016.0000000003DE1000.00000004.00000001.sdmp, WerFault.exe, 00000019.00000003.932275167.0000000003D61000.00000004.00000001.sdmp
Source: Binary string: wkernelbase.pdb source: WerFault.exe, 0000000D.00000003.737117016.0000000003DE1000.00000004.00000001.sdmp, WerFault.exe, 00000019.00000003.932275167.0000000003D61000.00000004.00000001.sdmp
Source: Binary string: mpr.pdb source: WerFault.exe, 0000000D.00000003.737253466.0000000003DB0000.00000004.00000040.sdmp, WerFault.exe, 00000019.00000003.932298953.0000000003D30000.00000004.00000040.sdmp
Source: Binary string: shlwapi.pdb source: WerFault.exe, 0000000D.00000003.737356835.0000000003DB6000.00000004.00000040.sdmp, WerFault.exe, 00000019.00000003.932307324.0000000003D36000.00000004.00000040.sdmp
Source: Binary string: wwin32u.pdb source: WerFault.exe, 0000000D.00000003.737117016.0000000003DE1000.00000004.00000001.sdmp, WerFault.exe, 00000019.00000003.932275167.0000000003D61000.00000004.00000001.sdmp
Source: Binary string: setupapi.pdb source: WerFault.exe, 0000000D.00000003.737356835.0000000003DB6000.00000004.00000040.sdmp, WerFault.exe, 00000019.00000003.932307324.0000000003D36000.00000004.00000040.sdmp
Source: Binary string: combase.pdb|g source: WerFault.exe, 0000000D.00000003.737356835.0000000003DB6000.00000004.00000040.sdmp
Source: Binary string: regsvr32.pdb source: WerFault.exe, 0000000D.00000003.737117016.0000000003DE1000.00000004.00000001.sdmp, WerFault.exe, 00000019.00000003.932275167.0000000003D61000.00000004.00000001.sdmp
Source: Binary string: mpr.pdb7 source: WerFault.exe, 0000000D.00000003.737253466.0000000003DB0000.00000004.00000040.sdmp
Source: Binary string: shcore.pdbk source: WerFault.exe, 0000000D.00000003.737253466.0000000003DB0000.00000004.00000040.sdmp, WerFault.exe, 00000019.00000003.932298953.0000000003D30000.00000004.00000040.sdmp
Source: Binary string: profapi.pdb source: WerFault.exe, 0000000D.00000003.737356835.0000000003DB6000.00000004.00000040.sdmp, WerFault.exe, 00000019.00000003.932307324.0000000003D36000.00000004.00000040.sdmp
Source: Binary string: winspool.pdb source: WerFault.exe, 0000000D.00000003.737356835.0000000003DB6000.00000004.00000040.sdmp, WerFault.exe, 00000019.00000003.932307324.0000000003D36000.00000004.00000040.sdmp
Source: Binary string: wgdi32full.pdb source: WerFault.exe, 0000000D.00000003.737117016.0000000003DE1000.00000004.00000001.sdmp, WerFault.exe, 00000019.00000003.932275167.0000000003D61000.00000004.00000001.sdmp
Source: Binary string: fltLib.pdbd_ source: WerFault.exe, 0000000D.00000003.737356835.0000000003DB6000.00000004.00000040.sdmp
Source: Binary string: sechost.pdb source: WerFault.exe, 0000000D.00000003.737356835.0000000003DB6000.00000004.00000040.sdmp, WerFault.exe, 00000019.00000003.932307324.0000000003D36000.00000004.00000040.sdmp
Source: Binary string: iphlpapi.pdb source: WerFault.exe, 0000000D.00000003.737356835.0000000003DB6000.00000004.00000040.sdmp, WerFault.exe, 00000019.00000003.932307324.0000000003D36000.00000004.00000040.sdmp
Source: Binary string: amstream.pdb source: explorer.exe, 00000004.00000003.702172421.0000000005361000.00000004.00000001.sdmp, explorer.exe, 00000005.00000003.702205579.0000000004F11000.00000004.00000001.sdmp, regsvr32.exe, 00000009.00000000.716853295.0000000010001000.00000020.00020000.sdmp, regsvr32.exe, 00000017.00000000.923266428.0000000010001000.00000020.00020000.sdmp, ZBvNS77A7a.dll.5.dr
Source: Binary string: propsys.pdb source: WerFault.exe, 0000000D.00000003.737356835.0000000003DB6000.00000004.00000040.sdmp, WerFault.exe, 00000019.00000003.932307324.0000000003D36000.00000004.00000040.sdmp
Source: Binary string: cfgmgr32.pdbk source: WerFault.exe, 0000000D.00000003.737253466.0000000003DB0000.00000004.00000040.sdmp, WerFault.exe, 00000019.00000003.932298953.0000000003D30000.00000004.00000040.sdmp
Source: Binary string: sfc_os.pdb5 source: WerFault.exe, 00000019.00000003.932307324.0000000003D36000.00000004.00000040.sdmp
Source: Binary string: sfc.pdbK source: WerFault.exe, 0000000D.00000003.737356835.0000000003DB6000.00000004.00000040.sdmp, WerFault.exe, 00000019.00000003.932307324.0000000003D36000.00000004.00000040.sdmp
Source: Binary string: powrprof.pdb source: WerFault.exe, 0000000D.00000003.737356835.0000000003DB6000.00000004.00000040.sdmp, WerFault.exe, 00000019.00000003.932307324.0000000003D36000.00000004.00000040.sdmp
Source: Binary string: ole32.pdb source: WerFault.exe, 0000000D.00000003.737356835.0000000003DB6000.00000004.00000040.sdmp, WerFault.exe, 00000019.00000003.932307324.0000000003D36000.00000004.00000040.sdmp
Source: Binary string: AcLayers.pdb source: WerFault.exe, 0000000D.00000003.737117016.0000000003DE1000.00000004.00000001.sdmp, WerFault.exe, 00000019.00000003.932275167.0000000003D61000.00000004.00000001.sdmp
Source: Binary string: amstream.pdbGCTL source: explorer.exe, 00000004.00000003.702172421.0000000005361000.00000004.00000001.sdmp, explorer.exe, 00000005.00000003.702205579.0000000004F11000.00000004.00000001.sdmp, regsvr32.exe, 00000009.00000000.716853295.0000000010001000.00000020.00020000.sdmp, regsvr32.exe, 00000017.00000000.923266428.0000000010001000.00000020.00020000.sdmp, ZBvNS77A7a.dll.5.dr
Source: Binary string: annjrqnCReportStore::Prune: MaxReportCount=%d MaxSizeInMb=%dRSDSwkernel32.pdb source: WerFault.exe, 0000000D.00000002.764287027.0000000002C32000.00000004.00000001.sdmp, WerFault.exe, 00000019.00000002.938813664.0000000002962000.00000004.00000001.sdmp
Source: Binary string: Kernel.Appcore.pdb source: WerFault.exe, 0000000D.00000003.737253466.0000000003DB0000.00000004.00000040.sdmp, WerFault.exe, 00000019.00000003.932298953.0000000003D30000.00000004.00000040.sdmp
Source: Binary string: advapi32.pdbvm source: WerFault.exe, 0000000D.00000003.737356835.0000000003DB6000.00000004.00000040.sdmp
Source: Binary string: cryptbase.pdb source: WerFault.exe, 0000000D.00000003.737356835.0000000003DB6000.00000004.00000040.sdmp, WerFault.exe, 00000019.00000003.932307324.0000000003D36000.00000004.00000040.sdmp
Source: Binary string: cfgmgr32.pdb source: WerFault.exe, 0000000D.00000003.737253466.0000000003DB0000.00000004.00000040.sdmp, WerFault.exe, 00000019.00000003.932298953.0000000003D30000.00000004.00000040.sdmp
Source: Binary string: bcryptprimitives.pdb source: WerFault.exe, 0000000D.00000003.737253466.0000000003DB0000.00000004.00000040.sdmp, WerFault.exe, 00000019.00000003.932298953.0000000003D30000.00000004.00000040.sdmp
Source: Binary string: Windows.Storage.pdb source: WerFault.exe, 0000000D.00000003.737253466.0000000003DB0000.00000004.00000040.sdmp, WerFault.exe, 00000019.00000003.932298953.0000000003D30000.00000004.00000040.sdmp
Source: Binary string: combase.pdb source: WerFault.exe, 0000000D.00000003.737356835.0000000003DB6000.00000004.00000040.sdmp, WerFault.exe, 00000019.00000003.932307324.0000000003D36000.00000004.00000040.sdmp
Source: Binary string: oleaut32.pdb source: WerFault.exe, 0000000D.00000003.737356835.0000000003DB6000.00000004.00000040.sdmp, WerFault.exe, 00000019.00000003.932307324.0000000003D36000.00000004.00000040.sdmp
Source: Binary string: sfc.pdb source: WerFault.exe, 0000000D.00000003.737356835.0000000003DB6000.00000004.00000040.sdmp, WerFault.exe, 00000019.00000003.932307324.0000000003D36000.00000004.00000040.sdmp
Source: Binary string: apphelp.pdb source: WerFault.exe, 0000000D.00000003.737117016.0000000003DE1000.00000004.00000001.sdmp, WerFault.exe, 00000019.00000003.932275167.0000000003D61000.00000004.00000001.sdmp
Source: Binary string: wuser32.pdb source: WerFault.exe, 0000000D.00000003.737117016.0000000003DE1000.00000004.00000001.sdmp, WerFault.exe, 00000019.00000003.932275167.0000000003D61000.00000004.00000001.sdmp
Source: Binary string: powrprof.pdbH{ source: WerFault.exe, 0000000D.00000003.737356835.0000000003DB6000.00000004.00000040.sdmp
Source: Binary string: wntdll.pdbk source: WerFault.exe, 0000000D.00000003.737117016.0000000003DE1000.00000004.00000001.sdmp, WerFault.exe, 00000019.00000003.932275167.0000000003D61000.00000004.00000001.sdmp
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_030944AB push edi; mov dword ptr [esp], 00000003h
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_030944AB push edx; mov dword ptr [esp], 00F00000h
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_030919A1 push 00000000h; mov dword ptr [esp], eax
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_030919A1 push 00000000h; mov dword ptr [esp], edx
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_030919A1 push 00000000h; mov dword ptr [esp], ecx
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_030919A1 push ebp; mov dword ptr [esp], 000FFFFFh
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_1001A006 push ebx; ret
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_1001D485 push FFFFFF8Ah; iretd
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_1001D4B6 push FFFFFF8Ah; iretd
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_10019D54 push cs; iretd
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_10019E56 push cs; iretd
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_1001BB21 push esi; iretd
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_045844AB push edi; mov dword ptr [esp], 00000003h
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_045844AB push edx; mov dword ptr [esp], 00F00000h
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_045819A1 push 00000000h; mov dword ptr [esp], eax
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_045819A1 push 00000000h; mov dword ptr [esp], edx
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_045819A1 push 00000000h; mov dword ptr [esp], ecx
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_045819A1 push ebp; mov dword ptr [esp], 000FFFFFh
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_1001A006 push ebx; ret
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_1001D485 push FFFFFF8Ah; iretd
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_1001D4B6 push FFFFFF8Ah; iretd
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_10019D54 push cs; iretd
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_10019E56 push cs; iretd
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_1001BB21 push esi; iretd
Source: C:\Windows\SysWOW64\explorer.exeCode function: 4_2_0361BB21 push esi; iretd
Source: C:\Windows\SysWOW64\explorer.exeCode function: 4_2_03619E56 push cs; iretd
Source: C:\Windows\SysWOW64\explorer.exeCode function: 4_2_03619D54 push cs; iretd
Source: C:\Windows\SysWOW64\explorer.exeCode function: 4_2_0361A006 push ebx; ret
Source: C:\Windows\SysWOW64\explorer.exeCode function: 4_2_0361D4B6 push FFFFFF8Ah; iretd
Source: C:\Windows\SysWOW64\explorer.exeCode function: 4_2_0361D485 push FFFFFF8Ah; iretd
Source: C:\Windows\SysWOW64\explorer.exeCode function: 5_2_00E6D4B6 push FFFFFF8Ah; iretd
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_1000DFB8 LoadLibraryA,GetProcAddress,
Source: unknownProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe -s 'C:\Users\user\Desktop\ZBvNS77A7a.dll'

Persistence and Installation Behavior:

barindex
Source: C:\Windows\SysWOW64\explorer.exeFile created: C:\Users\user\Desktop\ZBvNS77A7a.dllJump to dropped file

Boot Survival:

barindex
Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
Source: C:\Windows\SysWOW64\explorer.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\system32\schtasks.exe' /Create /RU 'NT AUTHORITY\SYSTEM' /tn payuhfp /tr 'regsvr32.exe -s \'C:\Users\user\Desktop\ZBvNS77A7a.dll\'' /SC ONCE /Z /ST 10:25 /ET 10:37

Hooking and other Techniques for Hiding and Protection:

barindex
Overwrites code with unconditional jumps - possibly settings hooks in foreign processShow sources
Source: C:\Windows\System32\loaddll32.exeMemory written: PID: 5616 base: 10DF380 value: E9 4F 69 52 02
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 5620 base: 10DF380 value: E9 4F 69 D7 FF
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\explorer.exe TID: 4676Thread sleep time: -100000s >= -30000s
Source: C:\Windows\SysWOW64\explorer.exe TID: 6616Thread sleep count: 90 > 30
Source: C:\Windows\SysWOW64\explorer.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\loaddll32.exeProcess information queried: ProcessInformation
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_1000D02A GetCurrentProcessId,GetModuleFileNameW,GetCurrentProcess,GetCurrentProcess,GetLastError,GetLastError,GetSystemMetrics,GetModuleFileNameW,GetLastError,MultiByteToWideChar,GetCurrentProcess,memset,GetVersionExA,GetCurrentProcess,GetSystemInfo,GetWindowsDirectoryW,
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_1000AE9A FindFirstFileW,FindNextFileW,
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_1000AE9A FindFirstFileW,FindNextFileW,
Source: C:\Windows\SysWOW64\explorer.exeCode function: 4_2_0360AE9A FindFirstFileW,FindNextFileW,
Source: C:\Windows\SysWOW64\explorer.exeCode function: 5_2_00E5AE9A FindFirstFileW,FindNextFileW,
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_1000DFB8 LoadLibraryA,GetProcAddress,
Source: C:\Windows\SysWOW64\regsvr32.exeProcess queried: DebugPort
Source: C:\Windows\SysWOW64\regsvr32.exeProcess queried: DebugPort
Source: C:\Windows\SysWOW64\explorer.exeCode function: 4_2_03605A49 RtlAddVectoredExceptionHandler,

HIPS / PFW / Operating System Protection Evasion:

barindex
Maps a DLL or memory area into another processShow sources
Source: C:\Windows\System32\loaddll32.exeSection loaded: unknown target: C:\Windows\SysWOW64\explorer.exe protection: execute and read and write
Source: C:\Windows\SysWOW64\rundll32.exeSection loaded: unknown target: C:\Windows\SysWOW64\explorer.exe protection: execute and read and write
Writes to foreign memory regionsShow sources
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: E80000
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 10DF380
Allocates memory in foreign processesShow sources
Source: C:\Windows\SysWOW64\rundll32.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: E80000 protect: page read and write
Injects code into the Windows Explorer (explorer.exe)Show sources
Source: C:\Windows\System32\loaddll32.exeMemory written: PID: 5616 base: 33E0000 value: B8
Source: C:\Windows\System32\loaddll32.exeMemory written: PID: 5616 base: 347A2D8 value: 00
Source: C:\Windows\System32\loaddll32.exeMemory written: PID: 5616 base: 347B1E8 value: 00
Source: C:\Windows\System32\loaddll32.exeMemory written: PID: 5616 base: 33F0000 value: 9C
Source: C:\Windows\System32\loaddll32.exeMemory written: PID: 5616 base: 10DF380 value: E9
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 5620 base: E80000 value: 9C
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 5620 base: 10DF380 value: E9
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exe
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\ZBvNS77A7a.dll',#1
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exe
Source: explorer.exe, 00000004.00000002.951903725.0000000003E50000.00000002.00020000.sdmpBinary or memory string: Program Manager
Source: explorer.exe, 00000004.00000002.951903725.0000000003E50000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
Source: explorer.exe, 00000004.00000002.951903725.0000000003E50000.00000002.00020000.sdmpBinary or memory string: Progman
Source: explorer.exe, 00000004.00000002.951903725.0000000003E50000.00000002.00020000.sdmpBinary or memory string: Progmanlock
Source: C:\Windows\System32\loaddll32.exeQueries volume information: C:\ VolumeInformation
Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\ VolumeInformation
Source: C:\Windows\SysWOW64\explorer.exeQueries volume information: C:\ VolumeInformation
Source: C:\Windows\SysWOW64\explorer.exeQueries volume information: C:\ VolumeInformation
Source: C:\Windows\SysWOW64\explorer.exeCode function: 4_2_036031C2 CreateNamedPipeA,
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_100097F2 GetSystemTimeAsFileTime,
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_1000D02A GetCurrentProcessId,GetModuleFileNameW,GetCurrentProcess,GetCurrentProcess,GetLastError,GetLastError,GetSystemMetrics,GetModuleFileNameW,GetLastError,MultiByteToWideChar,GetCurrentProcess,memset,GetVersionExA,GetCurrentProcess,GetSystemInfo,GetWindowsDirectoryW,

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsScheduled Task/Job1Scheduled Task/Job1Process Injection413Masquerading11Credential API Hooking1System Time Discovery1Remote ServicesCredential API Hooking1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsNative API1DLL Side-Loading1Scheduled Task/Job1Virtualization/Sandbox Evasion2LSASS MemorySecurity Software Discovery1Remote Desktop ProtocolArchive Collected Data1Exfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)DLL Side-Loading1Process Injection413Security Account ManagerVirtualization/Sandbox Evasion2SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Obfuscated Files or Information1NTDSProcess Discovery3Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptRegsvr321LSA SecretsFile and Directory Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
Replication Through Removable MediaLaunchdRc.commonRc.commonRundll321Cached Domain CredentialsSystem Information Discovery14VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
External Remote ServicesScheduled TaskStartup ItemsStartup ItemsDLL Side-Loading1DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 490262 Sample: ZBvNS77A7a.dll Startdate: 25/09/2021 Architecture: WINDOWS Score: 92 42 Multi AV Scanner detection for submitted file 2->42 44 Sigma detected: Schedule system process 2->44 46 Machine Learning detection for sample 2->46 48 2 other signatures 2->48 8 loaddll32.exe 1 2->8         started        11 regsvr32.exe 2->11         started        13 regsvr32.exe 2->13         started        process3 signatures4 50 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 8->50 52 Injects code into the Windows Explorer (explorer.exe) 8->52 54 Maps a DLL or memory area into another process 8->54 15 cmd.exe 1 8->15         started        17 explorer.exe 8 1 8->17         started        20 regsvr32.exe 11->20         started        22 regsvr32.exe 13->22         started        process5 signatures6 24 rundll32.exe 15->24         started        40 Uses schtasks.exe or at.exe to add and modify task schedules 17->40 27 schtasks.exe 1 17->27         started        29 WerFault.exe 20 9 20->29         started        31 WerFault.exe 9 22->31         started        process7 signatures8 56 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 24->56 58 Injects code into the Windows Explorer (explorer.exe) 24->58 60 Writes to foreign memory regions 24->60 62 2 other signatures 24->62 33 explorer.exe 24->33         started        36 conhost.exe 27->36         started        process9 file10 38 C:\Users\user\Desktop\ZBvNS77A7a.dll, PE32 33->38 dropped

Screenshots

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand

Antivirus, Machine Learning and Genetic Malware Detection

Initial Sample

SourceDetectionScannerLabelLink
ZBvNS77A7a.dll46%VirustotalBrowse
ZBvNS77A7a.dll60%ReversingLabsWin32.Backdoor.Quakbot
ZBvNS77A7a.dll100%Joe Sandbox ML

Dropped Files

SourceDetectionScannerLabelLink
C:\Users\user\Desktop\ZBvNS77A7a.dll100%Joe Sandbox ML

Unpacked PE Files

No Antivirus matches

Domains

No Antivirus matches

URLs

No Antivirus matches

Domains and IPs

Contacted Domains

No contacted domains info

Contacted IPs

No contacted IP infos

General Information

Joe Sandbox Version:33.0.0 White Diamond
Analysis ID:490262
Start date:25.09.2021
Start time:10:22:02
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 10m 34s
Hypervisor based Inspection enabled:false
Report type:light
Sample file name:ZBvNS77A7a.dll
Cookbook file name:default.jbs
Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
Number of analysed new started processes analysed:26
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • HDC enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Detection:MAL
Classification:mal92.evad.winDLL@20/10@0/0
EGA Information:Failed
HDC Information:
  • Successful, ratio: 22.6% (good quality ratio 21.6%)
  • Quality average: 76.7%
  • Quality standard deviation: 26.5%
HCA Information:
  • Successful, ratio: 74%
  • Number of executed functions: 0
  • Number of non-executed functions: 0
Cookbook Comments:
  • Adjust boot time
  • Enable AMSI
  • Found application associated with file extension: .dll
Warnings:
Show All
  • Exclude process from analysis (whitelisted): BackgroundTransferHost.exe, WerFault.exe, backgroundTaskHost.exe, svchost.exe, wuapihost.exe
  • Excluded IPs from analysis (whitelisted): 23.211.6.115, 20.82.210.154, 20.54.110.249, 40.112.88.60, 80.67.82.211, 80.67.82.235, 20.50.102.62
  • Excluded domains from analysis (whitelisted): displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, neu-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, ris-prod.trafficmanager.net, asf-ris-prod-neu.northeurope.cloudapp.azure.com, store-images.s-microsoft.com-c.edgekey.net, iris-de-prod-azsc-neu-b.northeurope.cloudapp.azure.com, a1449.dscg2.akamai.net, iris-de-prod-azsc-uks.uksouth.cloudapp.azure.com, arc.msn.com, ris.api.iris.microsoft.com, e12564.dspb.akamaiedge.net, consumer-displaycatalogrp-aks2aks-europe.md.mp.microsoft.com.akadns.net, store-images.s-microsoft.com, arc.trafficmanager.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
  • Not all processes where analyzed, report is missing behavior information
  • Report size exceeded maximum capacity and may have missing behavior information.

Simulations

Behavior and APIs

TimeTypeDescription
10:23:21Task SchedulerRun new task: payuhfp path: regsvr32.exe s>-s "C:\Users\user\Desktop\ZBvNS77A7a.dll"

Joe Sandbox View / Context

IPs

No context

Domains

No context

ASN

No context

JA3 Fingerprints

No context

Dropped Files

No context

Created / dropped Files

C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_regsvr32.exe_e9a58211ba4d9ba1b3cadfec684f66ac60801b0_7a325c51_04ce1181\Report.wer
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:Little-endian UTF-16 Unicode text, with CRLF line terminators
Category:dropped
Size (bytes):11500
Entropy (8bit):3.7763436141995625
Encrypted:false
SSDEEP:192:Wzcub6VYkH/RS5uGXx3RjetM/u7sJS274ItUW:Qcw6Vb/RS5n3jee/u7sJX4ItUW
MD5:463A67AC9E7EC8B0B962C5386749B5EB
SHA1:9932B716AE52E8D904602F53D26727C9DA8F8CB2
SHA-256:50C6047B7D3199121C82DF91533E16362CE4E85BBE34308E8F3A91643E419B65
SHA-512:06825E10486556D11CFC1CB5AD0ED36E63A27ADF107DE3C4AF6687486E299A819094E4D919030B3A2ECA17BE1AEF51DB36743C6F90712FE2951BCDAE89E59A39
Malicious:false
Preview: ..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.2.7.7.0.3.1.8.1.2.1.5.9.7.0.8.9.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.6.e.e.1.1.c.7.2.-.4.2.d.e.-.4.4.1.e.-.8.c.1.1.-.6.e.4.8.9.a.8.f.d.e.2.9.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.c.9.0.8.b.4.3.a.-.f.a.2.e.-.4.6.4.2.-.a.b.9.2.-.7.a.c.3.5.3.0.f.2.e.0.a.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.r.e.g.s.v.r.3.2...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.E.G.S.V.R.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.7.3.8.-.0.0.0.0.-.0.0.1.b.-.2.c.4.4.-.b.f.9.a.e.6.b.1.d.7.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.8.8.6.3.0.f.6.0.e.7.3.4.5.4.6.7.0.a.7.d.9.b.6.4.c.9.8.b.4.7.9.8.d.1.d.e.8.8.7.2.!.r.e.g.s.v.r.3.2...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.1.9.7.1././.0.4././.0.9.:.1.7.:.2.8.:.2.3.
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_regsvr32.exe_e9a58211ba4d9ba1b3cadfec684f66ac60801b0_7a325c51_1b176866\Report.wer
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:Little-endian UTF-16 Unicode text, with CRLF line terminators
Category:dropped
Size (bytes):11496
Entropy (8bit):3.7784669961245267
Encrypted:false
SSDEEP:192:Kdzcdb6VVkH/RS5uGXx3RjetM/u7suS274ItUO:KBcJ6Vu/RS5n3jee/u7suX4ItUO
MD5:5A8B6D5D1EA2CD3F25FCB3E2EAC13AA0
SHA1:238C25DC1680448F8C61684641FDBDB6B330C23A
SHA-256:90162554559683001CCA548AF5C6D07754B326EED7F428389958A764AB53DEC1
SHA-512:ED4678FE08C2861F42957B4057FC25CF22D441BDCEEAB005F094885621B8046F7CD2EC5C2F7E586CD56E56A3A9971726BE31186BADEB7992A8F9496D20A65E9C
Malicious:false
Preview: ..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.2.7.7.0.3.1.9.0.4.8.4.2.5.8.7.5.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.3.8.1.3.b.e.4.d.-.9.a.2.c.-.4.3.b.f.-.a.6.5.d.-.7.7.7.0.7.6.9.c.e.a.5.0.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.d.9.0.a.d.8.5.0.-.4.f.b.4.-.4.1.2.9.-.b.f.f.2.-.9.f.f.9.c.8.9.e.5.a.6.6.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.r.e.g.s.v.r.3.2...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.E.G.S.V.R.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.5.c.8.-.0.0.0.0.-.0.0.1.b.-.b.8.7.9.-.f.f.d.4.e.6.b.1.d.7.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.8.8.6.3.0.f.6.0.e.7.3.4.5.4.6.7.0.a.7.d.9.b.6.4.c.9.8.b.4.7.9.8.d.1.d.e.8.8.7.2.!.r.e.g.s.v.r.3.2...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.1.9.7.1././.0.4././.0.9.:.1.7.:.2.8.:.2.3.
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5C6F.tmp.dmp
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:Mini DuMP crash report, 14 streams, Sat Sep 25 08:25:06 2021, 0x1205a4 type
Category:dropped
Size (bytes):35026
Entropy (8bit):2.6261355120448786
Encrypted:false
SSDEEP:192:OCLJ0+qAUUFDMiwFHYYEcTAsOW+N8dLOglhcTgpmax9ZnANM:XLOWLF1wFHhPTvoGHhckpjxPSM
MD5:5D31475311D93231DDBCD9BA6BD5BA55
SHA1:7BDFAB76DF8E9B510E25F314B3609C9590004992
SHA-256:B64A5890E8F04D4A6BA99601781CC64D9C6B1536A0781143CBD3DD9F052A3346
SHA-512:C3247C860C7F77EF643B28453AAA64215A86D24484CC882661056C8404CD493AEC831CD2E15A0DA3FD1EBAC84819D0EA9952C7AED7F4BB01F146230D80015621
Malicious:false
Preview: MDMP....... .........Na...................U...........B..............GenuineIntelW...........T.............Na.............................@..1...............W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .D.a.y.l.i.g.h.t. .T.i.m.e.......................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.............................................................................................................................................................................................................................................................................................................................................................................................................................................................d.b.g.c.o.r.e...i.3.8.6.,.1.0...0...1.7.1.3.4...1.........................................................................................................
C:\ProgramData\Microsoft\Windows\WER\Temp\WER62E9.tmp.WERInternalMetadata.xml
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
Category:dropped
Size (bytes):8278
Entropy (8bit):3.6950810684096487
Encrypted:false
SSDEEP:192:Rrl7r3GLNimw6Dqxve6YwDSU+gmfJjSx+pBB89bcbsfi0m:RrlsNih6Z6Y8SU+gmfJjSpcgfg
MD5:F94634BA3AA7A1D7A0BC36B4676D37F4
SHA1:57D96DFC0FB1DF4004A3984443F4D3A1BEB37A00
SHA-256:99BCE543BB148DE22D98A4DA12C00494DE1851984C579314CF178C85E3DB0B39
SHA-512:F8616AE3E68C03B59F132A18F8313369E53407D5C37385C0633098FD077E3BDA69F87E739152BE69C1942337B06345877D6E24C49B041C482A79B0E63C62C10E
Malicious:false
Preview: ..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.5.7.6.<./.P.i.d.>.......
C:\ProgramData\Microsoft\Windows\WER\Temp\WER653B.tmp.xml
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:XML 1.0 document, ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):4630
Entropy (8bit):4.465614395578264
Encrypted:false
SSDEEP:48:cvIwSD8zsbJgtWI9jbWSC8BL8fm8M4JkxWFfT+q8zduKJYegd:uITf1AqSNqJnT9qYegd
MD5:A22317ACAD0A7881DEEFD578FD331502
SHA1:8D81BFD8496A4591D9E65D9E59A7D1099C9D94AC
SHA-256:7B5623B3AC94AFF4431845877E8372C08FEEF5FAC00C5577C2BFE54E42711D2A
SHA-512:0CBCB0AB7B9C8102442B7685907DE4D9357F522EFAC9347FF0950879BE1E625267E931C297DDADB09A2B78BDB0699E5ABB466557C23F6537DA1243FF1C9406F9
Malicious:false
Preview: <?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="1181855" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
C:\ProgramData\Microsoft\Windows\WER\Temp\WER955.tmp.xml
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:XML 1.0 document, ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):4630
Entropy (8bit):4.462098660842768
Encrypted:false
SSDEEP:48:cvIwSD8zs0JgtWI9jbWSC8BT8fm8M4JkxWFAgP+q8zd9KJYyRgd:uITfyAqSN2J9POqYyRgd
MD5:C3F41612D9BFFE36894E5765A49D50E3
SHA1:0B38B318423E6242D3F1F55779B7B2089B88F192
SHA-256:073E01EF57E9934CE18E57CBD7B3404B4C8F347D29703EBD80C87B9DBC74CDD1
SHA-512:F34619CF44959E7BFFE6A63D975EAB84BA2A61663508A88AEE3B2DF222A328F3FC43F6CA7553D37447A045AEFBC152B8A45FE212FF00B08D9EB848A5BE6540CA
Malicious:false
Preview: <?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="1181854" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF241.tmp.dmp
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:Mini DuMP crash report, 14 streams, Sat Sep 25 08:23:34 2021, 0x1205a4 type
Category:dropped
Size (bytes):35382
Entropy (8bit):2.6628405818008596
Encrypted:false
SSDEEP:384:z6pIXEp7k/8JpD1iDWmUrgnGwhctnFl9h:zUg/srrM9ctndh
MD5:91DF5FF5B9BC1DA3D1644ECA8FBB2F8E
SHA1:E49D85C5C4A9D110B3DE839FE920C877893BB7F2
SHA-256:5430CB813F7DB685ECEB2F6FD30264D0A7396769BB6A96CD302773ABC871D819
SHA-512:BF86BDCDBE3B3B9BBF3338758B8835A2AA8211D0FD1D8A64D5A361832D77C037606B747909082756BA6A650D48DC2525D48EB20A7F02B956398F23C7A7EA147C
Malicious:false
Preview: MDMP....... .........Na...................U...........B..............GenuineIntelW...........T.......8...z.Na.............................@..1...............W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .D.a.y.l.i.g.h.t. .T.i.m.e.......................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.............................................................................................................................................................................................................................................................................................................................................................................................................................................................d.b.g.c.o.r.e...i.3.8.6.,.1.0...0...1.7.1.3.4...1.........................................................................................................
C:\ProgramData\Microsoft\Windows\WER\Temp\WERFFEE.tmp.WERInternalMetadata.xml
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
Category:dropped
Size (bytes):8282
Entropy (8bit):3.695195907500495
Encrypted:false
SSDEEP:192:Rrl7r3GLNipFd676YB+MSUBgmfJjSx+pBB89bpisfLajm:RrlsNipv676YBlSUBgmfJjSpphfT
MD5:7E717EA850E4710974F964DA9347D310
SHA1:80858E5218A190A1BD271098947A15BF1422A4FA
SHA-256:2843D9EBCCD91B310DE9C2661F45278B4EED0DC5A83A18B5FCC791577EBE84F0
SHA-512:752BC595A439DB591B5E7AF93408FAE2793BAD55F3501D139DD01B9CFBFC57F33D38BD05C39B2B09819B83C594C26152E40E75F7C28937FB90BE5BDAFFBC073B
Malicious:false
Preview: ..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.9.4.4.<./.P.i.d.>.......
C:\Users\user\Desktop\ZBvNS77A7a.dll
Process:C:\Windows\SysWOW64\explorer.exe
File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
Category:dropped
Size (bytes):330189
Entropy (8bit):2.2090413355109213
Encrypted:false
SSDEEP:1536:/IUtVWns2GwmzYSbbz1j+xEXnQud+3VLuoXBYjPYH+ryO3O:/ZVWsP/sSb1ax0A3tDXBYjPYH+ryyO
MD5:9147A4BB8EFF884F129AAD7E0C68D1C5
SHA1:BA7E1C01F60E38FA8E0C420332BEAA82B647400D
SHA-256:31682BA44B1B11AC8C4F9FDE98E63AFCF32D7AD143587FA631496E83464FF7C3
SHA-512:46810C2FEE829EDF0FA52FD75DD25DAF32F2064629EF778BF94A73A54CBCE07770303F52B16808DFC97C3ED3C81188BFE4AF1491F6B98FD5DC8A679F8F24FDDE
Malicious:true
Antivirus:
  • Antivirus: Joe Sandbox ML, Detection: 100%
Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....;a...........!......................... ..............................................................................lZ..x....@...b...........................................................................Z..l............................text...t........................... ..`.data........ ......................@....data...d....0...0..................@....rsrc....b...@...d...F..............@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................

Static File Info

General

File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
Entropy (8bit):5.5705642690440875
TrID:
  • Win32 Dynamic Link Library (generic) (1002004/3) 99.40%
  • Win16/32 Executable Delphi generic (2074/23) 0.21%
  • Generic Win/DOS Executable (2004/3) 0.20%
  • DOS Executable Generic (2002/1) 0.20%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:ZBvNS77A7a.dll
File size:330189
MD5:6484d8ffd4a6de7947534571e9907b4e
SHA1:41e1cbd037698c3329db4edfe4e6b28b0654e94c
SHA256:64a6039b2b3a347312f56170b5eb7deebe6d37ef6fb414fb929e84be4799dfa5
SHA512:5545f50a5c5d2367c03a199832ff78d00fa7f172017007ba0e45c75190640cd79540d351db14279d3a505014ff380a12e00f796ec08038634f4d3641a61b7da0
SSDEEP:6144:9/st+16ZWiobj+n5QZRO0Xj/Ee+aRLvccAOPyI:A+QoOaEFA7RD
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....;a...........!......................... .............................................................................

File Icon

Icon Hash:aca9a8acaca6a888

Static PE Info

General

Entrypoint:0x100019a1
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x10000000
Subsystem:windows gui
Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
DLL Characteristics:
Time Stamp:0x613B8C85 [Fri Sep 10 16:49:09 2021 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:4
OS Version Minor:0
File Version Major:4
File Version Minor:0
Subsystem Version Major:4
Subsystem Version Minor:0
Import Hash:6527345f9aee9363b094aad01304de88

Entrypoint Preview

Instruction
push 00000000h
push ebp
mov ebp, esp
add esp, FFFFFFF4h
call 00007FA5388AF212h
cmp ebx, eax
je 00007FA5388AC9B9h
pushad
add edi, ebx
inc ecx
add ecx, eax
push eax
push ecx
push 00000025h
cmp dword ptr [ebx+00433230h], 00000000h
jne 00007FA5388AC72Eh
push 00000000h
call dword ptr [ebx+00435A3Ch]
push ecx
and ecx, 00000000h
xor ecx, eax
and dword ptr [ebx+00433230h], 00000000h
or dword ptr [ebx+00433230h], ecx
pop ecx
cmp dword ptr [ebx+004333D8h], 00000000h
jne 00007FA5388AC7B2h
cmp dword ptr [ebx+0043384Ch], 00000000h
jne 00007FA5388AC730h
call dword ptr [ebx+00435A38h]
mov dword ptr [ebp-04h], ecx
xor ecx, dword ptr [ebp-04h]
xor ecx, eax
and dword ptr [ebx+0043384Ch], 00000000h
or dword ptr [ebx+0043384Ch], ecx
mov ecx, dword ptr [ebp-04h]
push dword ptr [ebx+00433490h]
cmp dword ptr [ebx+0043342Ch], 00000000h
jne 00007FA5388AC733h
lea eax, dword ptr [ebx+0043325Ch]
push eax
call dword ptr [ebx+00435A24h]
push edi
xor edi, dword ptr [esp]
xor edi, eax
and dword ptr [ebx+0043342Ch], 00000000h
xor dword ptr [ebx+0043342Ch], edi
pop edi
push FFFFFFDEh
cmp dword ptr [ebx+004332F8h], 00000000h
jne 00007FA5388AC72Ch
call dword ptr [ebx+00435A34h]
push edx
and edx, 00000000h
xor edx, eax
and dword ptr [ebx+004332F8h], 00000000h

Data Directories

NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x35a6c0x78.data
IMAGE_DIRECTORY_ENTRY_RESOURCE0x40340000x162e0.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x35a000x6c.data
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

Sections

NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x309740x30a00False0.564327602828data6.10041951577IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
.data0x320000x10000x800False0.01123046875data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
.data0x330000x4000c640x3000unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
.rsrc0x40340000x162e00x16400False0.151454968399data4.89622756249IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

Resources

NameRVASizeTypeLanguageCountry
RT_ICON0x40343d00x10828dBase III DBT, version number 0, next free block index 40EnglishUnited States
RT_ICON0x4044bf80x25a8dBase III DBT, version number 0, next free block index 40EnglishUnited States
RT_ICON0x40471a00x10a8dataEnglishUnited States
RT_ICON0x40482480x988dataEnglishUnited States
RT_MENU0x4048bd00x2d4dataEnglishUnited States
RT_MENU0x4048ea40x196dataEnglishUnited States
RT_MENU0x404903c0x1a6dataEnglishUnited States
RT_MENU0x40491e40xb8dataEnglishUnited States
RT_STRING0x404929c0x934dataEnglishUnited States
RT_STRING0x4049bd00x4a8dataEnglishUnited States
RT_RCDATA0x404a0780x23dataEnglishUnited States
RT_RCDATA0x404a09c0xcdataEnglishUnited States
RT_RCDATA0x404a0a80xfdataEnglishUnited States
RT_RCDATA0x404a0b80x24dataEnglishUnited States
RT_RCDATA0x404a0dc0x2ddataEnglishUnited States
RT_GROUP_ICON0x404a10c0x46dataEnglishUnited States
RT_MANIFEST0x404a1540x18aXML 1.0 document, ASCII textEnglishUnited States

Imports

DLLImport
kernel32.dllGetProcAddress, LoadLibraryA, VirtualAlloc, VirtualProtect, GetCurrentThread
user32.dllCheckDlgButton, GetCursorInfo, CheckMenuRadioItem, GetCaretBlinkTime, CheckRadioButton, GetCapture, CheckMenuItem
ole32.dllCoCreateGuid, CoGetCurrentLogicalThreadId, CoFileTimeNow, OleUninitialize, CoGetContextToken, CoFreeUnusedLibraries, CoGetCurrentProcess, OleInitialize
advapi32.dllLsaOpenTrustedDomain

Possible Origin

Language of compilation systemCountry where language is spokenMap
EnglishUnited States

Network Behavior

Network Port Distribution

UDP Packets

TimestampSource PortDest PortSource IPDest IP
Sep 25, 2021 10:22:56.624871016 CEST5912353192.168.2.48.8.8.8
Sep 25, 2021 10:22:56.648972034 CEST53591238.8.8.8192.168.2.4
Sep 25, 2021 10:23:29.761882067 CEST5453153192.168.2.48.8.8.8
Sep 25, 2021 10:23:29.790786028 CEST53545318.8.8.8192.168.2.4
Sep 25, 2021 10:23:56.157160997 CEST4971453192.168.2.48.8.8.8
Sep 25, 2021 10:23:56.209856033 CEST53497148.8.8.8192.168.2.4
Sep 25, 2021 10:23:56.811824083 CEST5802853192.168.2.48.8.8.8
Sep 25, 2021 10:23:56.893886089 CEST53580288.8.8.8192.168.2.4
Sep 25, 2021 10:23:57.427287102 CEST5309753192.168.2.48.8.8.8
Sep 25, 2021 10:23:57.446943998 CEST53530978.8.8.8192.168.2.4
Sep 25, 2021 10:23:57.723603964 CEST4925753192.168.2.48.8.8.8
Sep 25, 2021 10:23:57.753066063 CEST53492578.8.8.8192.168.2.4
Sep 25, 2021 10:23:57.809922934 CEST6238953192.168.2.48.8.8.8
Sep 25, 2021 10:23:57.855709076 CEST53623898.8.8.8192.168.2.4
Sep 25, 2021 10:23:58.297625065 CEST4991053192.168.2.48.8.8.8
Sep 25, 2021 10:23:58.317385912 CEST53499108.8.8.8192.168.2.4
Sep 25, 2021 10:23:58.721641064 CEST5585453192.168.2.48.8.8.8
Sep 25, 2021 10:23:58.741311073 CEST53558548.8.8.8192.168.2.4
Sep 25, 2021 10:23:59.169665098 CEST6454953192.168.2.48.8.8.8
Sep 25, 2021 10:23:59.232000113 CEST53645498.8.8.8192.168.2.4
Sep 25, 2021 10:23:59.971780062 CEST6315353192.168.2.48.8.8.8
Sep 25, 2021 10:23:59.991473913 CEST53631538.8.8.8192.168.2.4
Sep 25, 2021 10:24:00.670408964 CEST5299153192.168.2.48.8.8.8
Sep 25, 2021 10:24:00.695043087 CEST53529918.8.8.8192.168.2.4
Sep 25, 2021 10:24:01.096482038 CEST5370053192.168.2.48.8.8.8
Sep 25, 2021 10:24:01.116421938 CEST53537008.8.8.8192.168.2.4
Sep 25, 2021 10:24:11.056459904 CEST5172653192.168.2.48.8.8.8
Sep 25, 2021 10:24:11.078437090 CEST53517268.8.8.8192.168.2.4
Sep 25, 2021 10:24:45.691792965 CEST5679453192.168.2.48.8.8.8
Sep 25, 2021 10:24:45.709078074 CEST53567948.8.8.8192.168.2.4
Sep 25, 2021 10:24:46.783740044 CEST5653453192.168.2.48.8.8.8
Sep 25, 2021 10:24:46.817936897 CEST53565348.8.8.8192.168.2.4
Sep 25, 2021 10:25:18.700589895 CEST5662753192.168.2.48.8.8.8
Sep 25, 2021 10:25:18.728830099 CEST53566278.8.8.8192.168.2.4

Code Manipulations

Statistics

Behavior

Click to jump to process

System Behavior

General

Start time:10:23:08
Start date:25/09/2021
Path:C:\Windows\System32\loaddll32.exe
Wow64 process (32bit):true
Commandline:loaddll32.exe 'C:\Users\user\Desktop\ZBvNS77A7a.dll'
Imagebase:0x2e0000
File size:116736 bytes
MD5 hash:542795ADF7CC08EFCF675D65310596E8
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high

General

Start time:10:23:09
Start date:25/09/2021
Path:C:\Windows\SysWOW64\cmd.exe
Wow64 process (32bit):true
Commandline:cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\ZBvNS77A7a.dll',#1
Imagebase:0x11d0000
File size:232960 bytes
MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high

General

Start time:10:23:10
Start date:25/09/2021
Path:C:\Windows\SysWOW64\rundll32.exe
Wow64 process (32bit):true
Commandline:rundll32.exe 'C:\Users\user\Desktop\ZBvNS77A7a.dll',#1
Imagebase:0x370000
File size:61952 bytes
MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high

General

Start time:10:23:15
Start date:25/09/2021
Path:C:\Windows\SysWOW64\explorer.exe
Wow64 process (32bit):true
Commandline:C:\Windows\SysWOW64\explorer.exe
Imagebase:0x1020000
File size:3611360 bytes
MD5 hash:166AB1B9462E5C1D6D18EC5EC0B6A5F7
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high

General

Start time:10:23:17
Start date:25/09/2021
Path:C:\Windows\SysWOW64\explorer.exe
Wow64 process (32bit):true
Commandline:C:\Windows\SysWOW64\explorer.exe
Imagebase:0x1020000
File size:3611360 bytes
MD5 hash:166AB1B9462E5C1D6D18EC5EC0B6A5F7
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high

General

Start time:10:23:19
Start date:25/09/2021
Path:C:\Windows\SysWOW64\schtasks.exe
Wow64 process (32bit):true
Commandline:'C:\Windows\system32\schtasks.exe' /Create /RU 'NT AUTHORITY\SYSTEM' /tn payuhfp /tr 'regsvr32.exe -s \'C:\Users\user\Desktop\ZBvNS77A7a.dll\'' /SC ONCE /Z /ST 10:25 /ET 10:37
Imagebase:0x8b0000
File size:185856 bytes
MD5 hash:15FF7D8324231381BAD48A052F85DF04
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high

General

Start time:10:23:20
Start date:25/09/2021
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff724c50000
File size:625664 bytes
MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high

General

Start time:10:23:22
Start date:25/09/2021
Path:C:\Windows\System32\regsvr32.exe
Wow64 process (32bit):false
Commandline:regsvr32.exe -s 'C:\Users\user\Desktop\ZBvNS77A7a.dll'
Imagebase:0x7ff674450000
File size:24064 bytes
MD5 hash:D78B75FC68247E8A63ACBA846182740E
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high

General

Start time:10:23:22
Start date:25/09/2021
Path:C:\Windows\SysWOW64\regsvr32.exe
Wow64 process (32bit):true
Commandline: -s 'C:\Users\user\Desktop\ZBvNS77A7a.dll'
Imagebase:0x1320000
File size:20992 bytes
MD5 hash:426E7499F6A7346F0410DEAD0805586B
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high

General

Start time:10:23:28
Start date:25/09/2021
Path:C:\Windows\SysWOW64\WerFault.exe
Wow64 process (32bit):true
Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 5944 -s 660
Imagebase:0x1c0000
File size:434592 bytes
MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language

General

Start time:10:25:00
Start date:25/09/2021
Path:C:\Windows\System32\regsvr32.exe
Wow64 process (32bit):false
Commandline:regsvr32.exe -s 'C:\Users\user\Desktop\ZBvNS77A7a.dll'
Imagebase:0x7ff674450000
File size:24064 bytes
MD5 hash:D78B75FC68247E8A63ACBA846182740E
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language

General

Start time:10:25:00
Start date:25/09/2021
Path:C:\Windows\SysWOW64\regsvr32.exe
Wow64 process (32bit):true
Commandline: -s 'C:\Users\user\Desktop\ZBvNS77A7a.dll'
Imagebase:0x1320000
File size:20992 bytes
MD5 hash:426E7499F6A7346F0410DEAD0805586B
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language

General

Start time:10:25:02
Start date:25/09/2021
Path:C:\Windows\SysWOW64\WerFault.exe
Wow64 process (32bit):true
Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 5576 -s 652
Imagebase:0x1c0000
File size:434592 bytes
MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language

Disassembly

Code Analysis

Reset < >