Loading ...

Play interactive tourEdit tour

Windows Analysis Report VolumeConverter.dll

Overview

General Information

Sample Name:VolumeConverter.dll
Analysis ID:502669
MD5:fc505773010d767cc1eca83c1df804cb
SHA1:6de72a38a4e8dd0dade2cae8566fbd885123bb4a
SHA256:50711c59f53e618c7b3aefabea49f6355ef63ced5c217c3ab2f0be74aa45796c
Tags:dll
Infos:

Most interesting Screenshot:

Detection

Score:52
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
.NET source code contains method to dynamically call methods (often used by packers)
Uses 32bit PE files
Program does not show much activity (idle)
Creates a process in suspended mode (likely to inject code)
Binary contains a suspicious time stamp

Classification

Process Tree

  • System is w10x64
  • loaddll32.exe (PID: 6492 cmdline: loaddll32.exe 'C:\Users\user\Desktop\VolumeConverter.dll' MD5: 72FCD8FB0ADC38ED9050569AD673650E)
    • cmd.exe (PID: 5940 cmdline: cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\VolumeConverter.dll',#1 MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • rundll32.exe (PID: 6072 cmdline: rundll32.exe 'C:\Users\user\Desktop\VolumeConverter.dll',#1 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

No Sigma rule has matched

Jbx Signature Overview

Click to jump to signature section

Show All Signature Results

AV Detection:

barindex
Multi AV Scanner detection for submitted fileShow sources
Source: VolumeConverter.dllVirustotal: Detection: 28%Perma Link
Source: VolumeConverter.dllStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL, LINE_NUMS_STRIPPED
Source: VolumeConverter.dllStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
Source: Binary string: VolumeConverter.pdb source: VolumeConverter.dll
Source: VolumeConverter.dllStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL, LINE_NUMS_STRIPPED
Source: VolumeConverter.dllVirustotal: Detection: 28%
Source: VolumeConverter.dllStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: classification engineClassification label: mal52.evad.winDLL@5/0@0/0
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\VolumeConverter.dll',#1
Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe 'C:\Users\user\Desktop\VolumeConverter.dll'
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\VolumeConverter.dll',#1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\VolumeConverter.dll',#1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\VolumeConverter.dll',#1Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\VolumeConverter.dll',#1Jump to behavior
Source: VolumeConverter.dll, UyYuAtIRQWAJPkvDuT/FufmmOjfqBMhsFZBIN.csCryptographic APIs: 'CreateDecryptor'
Source: VolumeConverter.dll, UyYuAtIRQWAJPkvDuT/FufmmOjfqBMhsFZBIN.csCryptographic APIs: 'CreateDecryptor'
Source: VolumeConverter.dll, UyYuAtIRQWAJPkvDuT/FufmmOjfqBMhsFZBIN.csCryptographic APIs: 'CreateDecryptor'
Source: VolumeConverter.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: VolumeConverter.dllStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
Source: VolumeConverter.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: VolumeConverter.pdb source: VolumeConverter.dll

Data Obfuscation:

barindex
.NET source code contains method to dynamically call methods (often used by packers)Show sources
Source: VolumeConverter.dll, UyYuAtIRQWAJPkvDuT/FufmmOjfqBMhsFZBIN.cs.Net Code: stackVariable6.GetMethod("GetDelegateForFunctionPointer", V_0)
Source: VolumeConverter.dllStatic PE information: 0xE3671BCB [Fri Nov 24 05:42:35 2090 UTC]
Source: VolumeConverter.dll, UyYuAtIRQWAJPkvDuT/FufmmOjfqBMhsFZBIN.csHigh entropy of concatenated method names: '.cctor', 'yj0yHNuMrdpao', 'vkvqDuToQ', 'mrRwKpaeG', 'ePe66v97i', 'LOhH8kIuQ', 'OnjGyypT5', 'z0qpR2EH5', 'NKWZeaNup', 'AJF3hU2Kt'
Source: VolumeConverter.dll, VolumeConverter/volumeConverter.csHigh entropy of concatenated method names: '.ctor', 'HvNJVTSIf', 'zSZ4Odeln', 'Dispose', 'QLRvPUjC1', 'g8N7k6PVPZscc8xn6k', 'gX6EmcZJUjQFlks9cF', 'nMm0ETqL131gGHwf38', 'TcrFfqspiWR1dIdcHd', 'aPQv2Bw4MYLAtN3TMb'
Source: VolumeConverter.dll, ss/ff.csHigh entropy of concatenated method names: 'tIorFj6tD', 'gVdjINcNQ', 'vr0I6VLFM', 'dd', '.cctor', 'RMWchDXxxUZSmyN6ug', 'Gr4MufHA1NoZ7FuyRH', 'BuneWGTh51JfvPm2ci', 'iGZ2Zttd9SIKxE4qlG', 'I2eNcn0uqlUSJImKfc'
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 120000Jump to behavior
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\VolumeConverter.dll',#1Jump to behavior

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management InstrumentationPath InterceptionProcess Injection11Rundll321OS Credential DumpingVirtualization/Sandbox Evasion1Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumData ObfuscationEavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsVirtualization/Sandbox Evasion1LSASS MemorySystem Information Discovery1Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Software Packing1Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection11NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptDeobfuscate/Decode Files or Information1LSA SecretsRemote System DiscoverySSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
Replication Through Removable MediaLaunchdRc.commonRc.commonTimestomp1Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 502669 Sample: VolumeConverter.dll Startdate: 14/10/2021 Architecture: WINDOWS Score: 52 13 Multi AV Scanner detection for submitted file 2->13 15 .NET source code contains method to dynamically call methods (often used by packers) 2->15 7 loaddll32.exe 1 2->7         started        process3 process4 9 cmd.exe 1 7->9         started        process5 11 rundll32.exe 9->11         started       

Screenshots

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand

Antivirus, Machine Learning and Genetic Malware Detection

Initial Sample

SourceDetectionScannerLabelLink
VolumeConverter.dll28%VirustotalBrowse
VolumeConverter.dll7%ReversingLabs

Dropped Files

No Antivirus matches

Unpacked PE Files

No Antivirus matches

Domains

No Antivirus matches

URLs

No Antivirus matches

Domains and IPs

Contacted Domains

No contacted domains info

Contacted IPs

No contacted IP infos

General Information

Joe Sandbox Version:33.0.0 White Diamond
Analysis ID:502669
Start date:14.10.2021
Start time:08:44:09
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 2m 33s
Hypervisor based Inspection enabled:false
Report type:full
Sample file name:VolumeConverter.dll
Cookbook file name:default.jbs
Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
Number of analysed new started processes analysed:5
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • HDC enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Detection:MAL
Classification:mal52.evad.winDLL@5/0@0/0
EGA Information:Failed
HDC Information:Failed
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 0
  • Number of non-executed functions: 0
Cookbook Comments:
  • Adjust boot time
  • Enable AMSI
  • Found application associated with file extension: .dll
  • Stop behavior analysis, all processes terminated
Warnings:
Show All
  • Exclude process from analysis (whitelisted): BackgroundTransferHost.exe, backgroundTaskHost.exe
  • Excluded IPs from analysis (whitelisted): 20.190.160.8, 20.190.160.71, 20.190.160.67, 20.190.160.75, 20.190.160.129, 20.190.160.73, 20.190.160.134, 20.190.160.132, 2.20.178.10, 2.20.178.56, 20.50.102.62, 20.199.120.85, 95.100.218.151, 20.199.120.182, 23.203.141.148
  • Excluded domains from analysis (whitelisted): storeedgefd.dsx.mp.microsoft.com.edgekey.net.globalredir.akadns.net, client.wns.windows.com, wu-shim.trafficmanager.net, www.tm.lg.prod.aadmsa.akadns.net, ctldl.windowsupdate.com, store-images.s-microsoft.com-c.edgekey.net, www.tm.a.prd.aadg.akadns.net, a767.dspw65.akamai.net, iris-de-prod-azsc-uks.uksouth.cloudapp.azure.com, storeedgefd.dsx.mp.microsoft.com.edgekey.net, arc.msn.com, storeedgefd.xbetservices.akadns.net, login.msa.msidentity.com, download.windowsupdate.com.edgesuite.net, e12564.dspb.akamaiedge.net, wns.notify.trafficmanager.net, login.live.com, store-images.s-microsoft.com, arc.trafficmanager.net, e16646.dscg.akamaiedge.net, storeedgefd.dsx.mp.microsoft.com
  • Not all processes where analyzed, report is missing behavior information

Simulations

Behavior and APIs

TimeTypeDescription
08:45:07API Interceptor1x Sleep call for process: loaddll32.exe modified

Joe Sandbox View / Context

IPs

No context

Domains

No context

ASN

No context

JA3 Fingerprints

No context

Dropped Files

No context

Created / dropped Files

No created / dropped files found

Static File Info

General

File type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
Entropy (8bit):5.775670145513336
TrID:
  • Win32 Dynamic Link Library (generic) Net Framework (1011504/3) 44.80%
  • Win32 Dynamic Link Library (generic) (1002004/3) 44.38%
  • Generic .NET DLL/Assembly (238134/4) 10.55%
  • Win16/32 Executable Delphi generic (2074/23) 0.09%
  • Generic Win/DOS Executable (2004/3) 0.09%
File name:VolumeConverter.dll
File size:58880
MD5:fc505773010d767cc1eca83c1df804cb
SHA1:6de72a38a4e8dd0dade2cae8566fbd885123bb4a
SHA256:50711c59f53e618c7b3aefabea49f6355ef63ced5c217c3ab2f0be74aa45796c
SHA512:2a42fd240088569767c04815b94e5856b3b019111af059103a0236e72e3f846bb5bae5fe06c9a7943a1f3855dd1fa1860db1be590677603abadf4f28146c419a
SSDEEP:768:chZhjyuN7YNRnqIXxHHxV/3kaKPjpygwCV8SveN6K7sVppT2Gsy:chuS7kxxp0aWjrOQtK7stoy
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....g............!..................... ........@.. .......................`............`................................

File Icon

Icon Hash:74f0e4ecccdce0e4

Static PE Info

General

Entrypoint:0x40f9ce
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x400000
Subsystem:windows cui
Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL, LINE_NUMS_STRIPPED
DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
Time Stamp:0xE3671BCB [Fri Nov 24 05:42:35 2090 UTC]
TLS Callbacks:
CLR (.Net) Version:v4.0.30319
OS Version Major:4
OS Version Minor:0
File Version Major:4
File Version Minor:0
Subsystem Version Major:4
Subsystem Version Minor:0
Import Hash:dae02f32a21e03ce65412f6e56942daa

Entrypoint Preview

Instruction
jmp dword ptr [00402000h]
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al

Data Directories

NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0xf9800x4b.text
IMAGE_DIRECTORY_ENTRY_RESOURCE0x120000x3a4.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x140000xc.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0xf92a0x1c.text
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text

Sections

NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x20000xd9d40xda00False0.488317087156data5.88553278046IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
.sdata0x100000x1e80x200False0.861328125data6.61773120421IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
.rsrc0x120000x3a40x400False0.365234375data2.9247083034IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0x140000xc0x200False0.044921875data0.0815394123432IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

Resources

NameRVASizeTypeLanguageCountry
RT_VERSION0x120580x34cdata

Imports

DLLImport
mscoree.dll_CorDllMain

Version Infos

DescriptionData
Translation0x0000 0x04b0
LegalCopyrightCopyright 2021
Assembly Version1.0.0.0
InternalNameVolumeConverter.dll
FileVersion1.0.0.0
CompanyName
LegalTrademarks
Comments
ProductNameVolumeConverter
ProductVersion1.0.0.0
FileDescriptionVolumeConverter
OriginalFilenameVolumeConverter.dll

Network Behavior

No network behavior found

Code Manipulations

Statistics

CPU Usage

Click to jump to process

Memory Usage

Click to jump to process

Behavior

Click to jump to process

System Behavior

General

Start time:08:45:07
Start date:14/10/2021
Path:C:\Windows\System32\loaddll32.exe
Wow64 process (32bit):true
Commandline:loaddll32.exe 'C:\Users\user\Desktop\VolumeConverter.dll'
Imagebase:0xec0000
File size:893440 bytes
MD5 hash:72FCD8FB0ADC38ED9050569AD673650E
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:moderate

General

Start time:08:45:07
Start date:14/10/2021
Path:C:\Windows\SysWOW64\cmd.exe
Wow64 process (32bit):true
Commandline:cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\VolumeConverter.dll',#1
Imagebase:0xd80000
File size:232960 bytes
MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high

General

Start time:08:45:07
Start date:14/10/2021
Path:C:\Windows\SysWOW64\rundll32.exe
Wow64 process (32bit):true
Commandline:rundll32.exe 'C:\Users\user\Desktop\VolumeConverter.dll',#1
Imagebase:0x12a0000
File size:61952 bytes
MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high

Disassembly

Code Analysis

Reset < >