Windows Analysis Report EcJ8rbg.dll

Overview

General Information

Sample Name: EcJ8rbg.dll
Analysis ID: 553239
MD5: 8d7dd249f2a87f71b1588ce7d9855c80
SHA1: a0776075300b15a404955bf669674d88df3a84ae
SHA256: 52faccb896886829a34782bd88a943f4e9a883ca5126aa147bbc177b9aaf8273
Tags: dll
Infos:

Most interesting Screenshot:

Detection

Emotet
Score: 96
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Found malware configuration
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Multi AV Scanner detection for submitted file
Yara detected Emotet
System process connects to network (likely due to code injection or exploit)
Machine Learning detection for sample
Sigma detected: Suspicious Call by Ordinal
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query locales information (e.g. system language)
Deletes files inside the Windows folder
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Creates files inside the system directory
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to dynamically determine API calls
Contains functionality which may be used to detect a debugger (GetProcessHeap)
IP address seen in connection with other malware
Sample file is different than original file name gathered from version info
PE file contains an invalid checksum
PE file contains strange resources
Tries to load missing DLLs
Contains functionality to read the PEB
Drops PE files to the windows directory (C:\Windows)
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Detected TCP or UDP traffic on non-standard ports
Checks if the current process is being debugged
Connects to several IPs in different countries
Potential key logger detected (key state polling based)
Registers a DLL
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Found large amount of non-executed APIs
Creates a process in suspended mode (likely to inject code)

Classification

AV Detection:

barindex
Found malware configuration
Source: 7.2.rundll32.exe.4760000.3.unpack Malware Configuration Extractor: Emotet {"C2 list": ["45.138.98.34:80", "69.16.218.101:8080", "51.210.242.234:8080", "185.148.168.220:8080", "142.4.219.173:8080", "54.38.242.185:443", "191.252.103.16:80", "104.131.62.48:8080", "62.171.178.147:8080", "217.182.143.207:443", "168.197.250.14:80", "37.44.244.177:8080", "66.42.57.149:443", "210.57.209.142:8080", "159.69.237.188:443", "116.124.128.206:8080", "128.199.192.135:8080", "195.154.146.35:443", "185.148.168.15:8080", "195.77.239.39:8080", "207.148.81.119:8080", "85.214.67.203:8080", "190.90.233.66:443", "78.46.73.125:443", "78.47.204.80:443", "37.59.209.141:8080", "54.37.228.122:443"], "Public Key": ["RUNTMSAAAAD0LxqDNhonUYwk8sqo7IWuUllRdUiUBnACc6romsQoe1YJD7wIe4AheqYofpZFucPDXCZ0z9i+ooUffqeoLZU0", "RUNLMSAAAADYNZPXY4tQxd/N4Wn5sTYAm5tUOxY2ol1ELrI4MNhHNi640vSLasjYTHpFRBoG+o84vtr7AJachCzOHjaAJFCW"]}
Multi AV Scanner detection for submitted file
Source: EcJ8rbg.dll Virustotal: Detection: 40% Perma Link
Machine Learning detection for sample
Source: EcJ8rbg.dll Joe Sandbox ML: detected

Compliance:

barindex
Uses 32bit PE files
Source: EcJ8rbg.dll Static PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL

Networking:

barindex
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Source: Traffic Snort IDS: 2404332 ET CNC Feodo Tracker Reported CnC Server TCP group 17 192.168.2.4:49781 -> 45.138.98.34:80
Source: Traffic Snort IDS: 2404338 ET CNC Feodo Tracker Reported CnC Server TCP group 20 192.168.2.4:49782 -> 69.16.218.101:8080
System process connects to network (likely due to code injection or exploit)
Source: C:\Windows\SysWOW64\rundll32.exe Network Connect: 69.16.218.101 144 Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Network Connect: 45.138.98.34 80 Jump to behavior
C2 URLs / IPs found in malware configuration
Source: Malware configuration extractor IPs: 45.138.98.34:80
Source: Malware configuration extractor IPs: 69.16.218.101:8080
Source: Malware configuration extractor IPs: 51.210.242.234:8080
Source: Malware configuration extractor IPs: 185.148.168.220:8080
Source: Malware configuration extractor IPs: 142.4.219.173:8080
Source: Malware configuration extractor IPs: 54.38.242.185:443
Source: Malware configuration extractor IPs: 191.252.103.16:80
Source: Malware configuration extractor IPs: 104.131.62.48:8080
Source: Malware configuration extractor IPs: 62.171.178.147:8080
Source: Malware configuration extractor IPs: 217.182.143.207:443
Source: Malware configuration extractor IPs: 168.197.250.14:80
Source: Malware configuration extractor IPs: 37.44.244.177:8080
Source: Malware configuration extractor IPs: 66.42.57.149:443
Source: Malware configuration extractor IPs: 210.57.209.142:8080
Source: Malware configuration extractor IPs: 159.69.237.188:443
Source: Malware configuration extractor IPs: 116.124.128.206:8080
Source: Malware configuration extractor IPs: 128.199.192.135:8080
Source: Malware configuration extractor IPs: 195.154.146.35:443
Source: Malware configuration extractor IPs: 185.148.168.15:8080
Source: Malware configuration extractor IPs: 195.77.239.39:8080
Source: Malware configuration extractor IPs: 207.148.81.119:8080
Source: Malware configuration extractor IPs: 85.214.67.203:8080
Source: Malware configuration extractor IPs: 190.90.233.66:443
Source: Malware configuration extractor IPs: 78.46.73.125:443
Source: Malware configuration extractor IPs: 78.47.204.80:443
Source: Malware configuration extractor IPs: 37.59.209.141:8080
Source: Malware configuration extractor IPs: 54.37.228.122:443
Internet Provider seen in connection with other malware
Source: Joe Sandbox View ASN Name: AS-CHOOPAUS AS-CHOOPAUS
Source: Joe Sandbox View ASN Name: DIGITALOCEAN-ASNUS DIGITALOCEAN-ASNUS
IP address seen in connection with other malware
Source: Joe Sandbox View IP Address: 207.148.81.119 207.148.81.119
Source: Joe Sandbox View IP Address: 104.131.62.48 104.131.62.48
Detected TCP or UDP traffic on non-standard ports
Source: global traffic TCP traffic: 192.168.2.4:49782 -> 69.16.218.101:8080
Connects to several IPs in different countries
Source: unknown Network traffic detected: IP country count 11
Source: unknown TCP traffic detected without corresponding DNS query: 45.138.98.34
Source: unknown TCP traffic detected without corresponding DNS query: 45.138.98.34
Source: unknown TCP traffic detected without corresponding DNS query: 45.138.98.34
Source: unknown TCP traffic detected without corresponding DNS query: 69.16.218.101
Source: unknown TCP traffic detected without corresponding DNS query: 69.16.218.101
Source: unknown TCP traffic detected without corresponding DNS query: 69.16.218.101
Source: unknown TCP traffic detected without corresponding DNS query: 69.16.218.101
Source: unknown TCP traffic detected without corresponding DNS query: 69.16.218.101
Source: unknown TCP traffic detected without corresponding DNS query: 69.16.218.101
Source: unknown TCP traffic detected without corresponding DNS query: 69.16.218.101
Source: unknown TCP traffic detected without corresponding DNS query: 69.16.218.101
Source: unknown TCP traffic detected without corresponding DNS query: 69.16.218.101
Source: unknown TCP traffic detected without corresponding DNS query: 69.16.218.101
Source: unknown TCP traffic detected without corresponding DNS query: 69.16.218.101
Source: svchost.exe, 00000011.00000003.767138150.00000289AE99D000.00000004.00000001.sdmp String found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify - Music and Podcasts","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"podcasts","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG","VI","VG","WF","EH","ZM","ZW","UZ","VU","SR","SZ","AD","MC","SM","ME","VA","NEUTRAL"]}],"MarketProperties":[{"RelatedProducts":[],"Markets":["US"]}],"ProductASchema":"Product;3","ProductBSchema":"ProductUnifiedApp;3","ProductId":"9NCBCSZSJRSB","Properties":{"PackageFamilyName":"SpotifyAB.SpotifyMusic_zpdnekdrzrea0","PackageIdentityName":"SpotifyAB.SpotifyMusic","PublisherCertificateName":"CN=453637B3-4E12-4CDF-B0D3-2A3C863BF6EF","XboxCrossGenSetId":null,"XboxConsoleGenOptimized":null,"XboxConsoleGenCompatible":null},"AlternateIds":[{"IdType":"LegacyWindowsStoreProductId","Value":"ceac5d3f-8a4f-40e1-9a67-76d9108c7cb5"},{"IdType":"LegacyWindowsPhoneProductId","Value":"caac1b9d-621b-4f96-b143-e10e1397740a"},{"IdType":"XboxTitleId","Value":"1681279293"}],"IngestionSource":"DCE","IsMicrosoftProduct":false,"PreferredSkuId":"0010","ProductType":"Application","ValidationData":{"PassedValidation":false,"RevisionId":"2022-01-07T11:33:20.1626869Z||.||d5cdcec3-04df-404e-ba07-3240047c89f9||1152921505694348672||Null||fullrelease","ValidationResultUri":""},"MerchandizingTags":[],"PartD":"","ProductFamily":"Apps","ProductKind":"Application","DisplaySkuAvailab
Source: svchost.exe, 00000011.00000003.767138150.00000289AE99D000.00000004.00000001.sdmp String found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify - Music and Podcasts","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"podcasts","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG","VI","VG","WF","EH","ZM","ZW","UZ","VU","SR","SZ","AD","MC","SM","ME","VA","NEUTRAL"]}],"MarketProperties":[{"RelatedProducts":[],"Markets":["US"]}],"ProductASchema":"Product;3","ProductBSchema":"ProductUnifiedApp;3","ProductId":"9NCBCSZSJRSB","Properties":{"PackageFamilyName":"SpotifyAB.SpotifyMusic_zpdnekdrzrea0","PackageIdentityName":"SpotifyAB.SpotifyMusic","PublisherCertificateName":"CN=453637B3-4E12-4CDF-B0D3-2A3C863BF6EF","XboxCrossGenSetId":null,"XboxConsoleGenOptimized":null,"XboxConsoleGenCompatible":null},"AlternateIds":[{"IdType":"LegacyWindowsStoreProductId","Value":"ceac5d3f-8a4f-40e1-9a67-76d9108c7cb5"},{"IdType":"LegacyWindowsPhoneProductId","Value":"caac1b9d-621b-4f96-b143-e10e1397740a"},{"IdType":"XboxTitleId","Value":"1681279293"}],"IngestionSource":"DCE","IsMicrosoftProduct":false,"PreferredSkuId":"0010","ProductType":"Application","ValidationData":{"PassedValidation":false,"RevisionId":"2022-01-07T11:33:20.1626869Z||.||d5cdcec3-04df-404e-ba07-3240047c89f9||1152921505694348672||Null||fullrelease","ValidationResultUri":""},"MerchandizingTags":[],"PartD":"","ProductFamily":"Apps","ProductKind":"Application","DisplaySkuAvailab
Source: svchost.exe, 00000011.00000003.761015443.00000289AE90C000.00000004.00000001.sdmp, svchost.exe, 00000011.00000002.782664257.00000289AE900000.00000004.00000001.sdmp String found in binary or memory: http://crl.globalsign.net/root-r2.crl0
Source: 77EC63BDA74BD0D0E0426DC8F80085060.10.dr String found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
Source: svchost.exe, 00000011.00000003.761511739.00000289AE991000.00000004.00000001.sdmp, svchost.exe, 00000011.00000003.761615718.00000289AE9B1000.00000004.00000001.sdmp, svchost.exe, 00000011.00000003.761553202.00000289AE97F000.00000004.00000001.sdmp String found in binary or memory: http://help.disneyplus.com.
Source: svchost.exe, 00000011.00000003.761511739.00000289AE991000.00000004.00000001.sdmp, svchost.exe, 00000011.00000003.761615718.00000289AE9B1000.00000004.00000001.sdmp, svchost.exe, 00000011.00000003.761553202.00000289AE97F000.00000004.00000001.sdmp String found in binary or memory: https://disneyplus.com/legal.
Source: svchost.exe, 00000011.00000003.761511739.00000289AE991000.00000004.00000001.sdmp, svchost.exe, 00000011.00000003.761615718.00000289AE9B1000.00000004.00000001.sdmp, svchost.exe, 00000011.00000003.761553202.00000289AE97F000.00000004.00000001.sdmp String found in binary or memory: https://www.disneyplus.com/legal/privacy-policy
Source: svchost.exe, 00000011.00000003.761511739.00000289AE991000.00000004.00000001.sdmp, svchost.exe, 00000011.00000003.761615718.00000289AE9B1000.00000004.00000001.sdmp, svchost.exe, 00000011.00000003.761553202.00000289AE97F000.00000004.00000001.sdmp String found in binary or memory: https://www.disneyplus.com/legal/your-california-privacy-rights
Source: svchost.exe, 00000011.00000003.762429970.00000289AE978000.00000004.00000001.sdmp, svchost.exe, 00000011.00000003.762444639.00000289AE989000.00000004.00000001.sdmp, svchost.exe, 00000011.00000003.762645244.00000289AE99A000.00000004.00000001.sdmp, svchost.exe, 00000011.00000003.762542665.00000289AE9D2000.00000004.00000001.sdmp, svchost.exe, 00000011.00000003.762524654.00000289AE9D2000.00000004.00000001.sdmp, svchost.exe, 00000011.00000003.762611865.00000289AE978000.00000004.00000001.sdmp, svchost.exe, 00000011.00000003.762579318.00000289AE9BB000.00000004.00000001.sdmp String found in binary or memory: https://www.tiktok.com/legal/report/feedback
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_100012D0 recvfrom, 2_2_100012D0

Key, Mouse, Clipboard, Microphone and Screen Capturing:

barindex
Potential key logger detected (key state polling based)
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_1000FF59 GetKeyState,GetKeyState,GetKeyState,GetKeyState,SendMessageA, 2_2_1000FF59
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_1000FF59 GetKeyState,GetKeyState,GetKeyState,GetKeyState,SendMessageA, 3_2_1000FF59

E-Banking Fraud:

barindex
Yara detected Emotet
Source: Yara match File source: 5.2.rundll32.exe.48d0000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.rundll32.exe.4e50000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.rundll32.exe.5140000.8.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.49c0000.6.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.rundll32.exe.2e20000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 2.2.regsvr32.exe.3250000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.2.rundll32.exe.4240000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.rundll32.exe.5140000.8.unpack, type: UNPACKEDPE
Source: Yara match File source: 9.2.rundll32.exe.49f0000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.4a20000.8.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.rundll32.exe.5110000.7.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.rundll32.exe.52a0000.10.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.49f0000.7.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.4760000.3.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.2.rundll32.exe.2940000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.rundll32.exe.5170000.9.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.4a50000.9.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.rundll32.exe.50e0000.6.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.4a20000.8.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 2.2.regsvr32.exe.3250000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.49c0000.6.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.4b80000.10.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.8b0000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 2.2.regsvr32.exe.4b30000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.rundll32.exe.50e0000.6.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.4b80000.10.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.8b0000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.4730000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 9.2.rundll32.exe.2f90000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.4860000.4.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.4860000.4.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.4730000.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.rundll32.exe.4f80000.4.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.rundll32.exe.4f80000.4.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.4890000.5.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.rundll32.exe.52a0000.10.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.2.rundll32.exe.2940000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.8e0000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.4bb0000.11.unpack, type: UNPACKEDPE
Source: Yara match File source: 9.2.rundll32.exe.2f90000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.rundll32.exe.4fb0000.5.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.rundll32.exe.4e50000.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.rundll32.exe.4e80000.3.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.rundll32.exe.52d0000.11.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.rundll32.exe.2e20000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000002.00000002.651219135.0000000003250000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.658773887.00000000052D1000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000009.00000002.663246683.0000000002F90000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.658783740.0000000004A51000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.658642834.00000000050E0000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000002.651296715.0000000004B31000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.658723299.0000000005171000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.657974448.00000000008B0000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.655430157.0000000002940000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.658619486.0000000004860000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.658016233.00000000008E1000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.658517019.0000000004E81000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.658811817.0000000004B80000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.658095730.0000000002E20000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.658757089.0000000004A20000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.655623941.0000000004241000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.658582876.0000000004FB1000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.658656384.0000000004891000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.658747642.00000000052A0000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.658668655.0000000005111000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.658839063.0000000004BB1000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.658706042.00000000049C0000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.658328602.00000000048D1000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.658574169.0000000004761000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000009.00000002.663415496.00000000049F1000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.658548495.0000000004730000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.658494027.0000000004E50000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.658732893.00000000049F1000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.658556614.0000000004F80000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.658697305.0000000005140000.00000040.00000001.sdmp, type: MEMORY

System Summary:

barindex
Uses 32bit PE files
Source: EcJ8rbg.dll Static PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
Deletes files inside the Windows folder
Source: C:\Windows\SysWOW64\rundll32.exe File deleted: C:\Windows\SysWOW64\Twpdaikokj\mcaqvcjuoohw.tdj:Zone.Identifier Jump to behavior
Creates files inside the system directory
Source: C:\Windows\SysWOW64\rundll32.exe File created: C:\Windows\SysWOW64\Twpdaikokj\ Jump to behavior
Detected potential crypto function
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_10020011 2_2_10020011
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_100181CA 2_2_100181CA
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_1001929D 2_2_1001929D
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_1002542D 2_2_1002542D
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_100274AE 2_2_100274AE
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_10026575 2_2_10026575
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_1001869D 2_2_1001869D
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_1001178A 2_2_1001178A
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_10016860 2_2_10016860
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_1002596F 2_2_1002596F
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_10022A5C 2_2_10022A5C
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_10018A71 2_2_10018A71
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_1001AAB7 2_2_1001AAB7
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_1001CB16 2_2_1001CB16
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_10018E7D 2_2_10018E7D
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_10025EB1 2_2_10025EB1
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_04B485FF 2_2_04B485FF
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_04B4EFDD 2_2_04B4EFDD
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_04B31CA1 2_2_04B31CA1
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_04B4E4E5 2_2_04B4E4E5
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_04B4CCD9 2_2_04B4CCD9
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_04B33431 2_2_04B33431
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_04B4A474 2_2_04B4A474
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_04B4DC71 2_2_04B4DC71
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_04B37442 2_2_04B37442
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_04B3A445 2_2_04B3A445
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_04B43D85 2_2_04B43D85
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_04B49DF5 2_2_04B49DF5
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_04B355FF 2_2_04B355FF
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_04B4C5D5 2_2_04B4C5D5
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_04B3C5D8 2_2_04B3C5D8
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_04B48D3D 2_2_04B48D3D
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_04B45515 2_2_04B45515
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_04B4AD08 2_2_04B4AD08
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_04B52D53 2_2_04B52D53
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_04B47D5B 2_2_04B47D5B
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_04B4654A 2_2_04B4654A
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_04B40EBC 2_2_04B40EBC
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_04B546BD 2_2_04B546BD
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_04B3C6B8 2_2_04B3C6B8
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_04B43EAA 2_2_04B43EAA
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_04B536AA 2_2_04B536AA
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_04B4BEFD 2_2_04B4BEFD
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_04B53EE9 2_2_04B53EE9
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_04B38636 2_2_04B38636
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_04B3DE74 2_2_04B3DE74
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_04B37E79 2_2_04B37E79
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_04B4567B 2_2_04B4567B
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_04B42E5D 2_2_04B42E5D
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_04B3E640 2_2_04B3E640
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_04B517BD 2_2_04B517BD
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_04B357B8 2_2_04B357B8
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_04B3BFBE 2_2_04B3BFBE
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_04B377A3 2_2_04B377A3
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_04B48FAE 2_2_04B48FAE
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_04B507AA 2_2_04B507AA
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_04B40F86 2_2_04B40F86
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_04B407F4 2_2_04B407F4
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_04B427F9 2_2_04B427F9
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_04B467E6 2_2_04B467E6
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_04B3E7DE 2_2_04B3E7DE
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_04B31F38 2_2_04B31F38
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_04B3670B 2_2_04B3670B
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_04B3EF0C 2_2_04B3EF0C
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_04B44F74 2_2_04B44F74
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_04B49774 2_2_04B49774
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_04B45779 2_2_04B45779
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_04B4FF58 2_2_04B4FF58
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_04B3F0E9 2_2_04B3F0E9
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_04B500EF 2_2_04B500EF
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_04B4D8DB 2_2_04B4D8DB
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_04B380C0 2_2_04B380C0
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_04B3B820 2_2_04B3B820
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_04B48806 2_2_04B48806
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_04B52009 2_2_04B52009
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_04B3A871 2_2_04B3A871
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_04B37078 2_2_04B37078
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_04B4F840 2_2_04B4F840
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_04B4D1BC 2_2_04B4D1BC
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_04B32194 2_2_04B32194
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_04B46187 2_2_04B46187
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_04B4E1F8 2_2_04B4E1F8
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_04B4017B 2_2_04B4017B
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_10020011 3_2_10020011
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_100181CA 3_2_100181CA
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_1001929D 3_2_1001929D
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_1002542D 3_2_1002542D
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_100274AE 3_2_100274AE
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_10026575 3_2_10026575
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_1001869D 3_2_1001869D
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_1001178A 3_2_1001178A
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_10016860 3_2_10016860
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_1002596F 3_2_1002596F
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_10022A5C 3_2_10022A5C
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_10018A71 3_2_10018A71
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_1001AAB7 3_2_1001AAB7
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_1001CB16 3_2_1001CB16
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_10018E7D 3_2_10018E7D
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_10025EB1 3_2_10025EB1
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_042585FF 3_2_042585FF
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_0425EFDD 3_2_0425EFDD
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_04243431 3_2_04243431
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_0425A474 3_2_0425A474
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_0425DC71 3_2_0425DC71
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_0424A445 3_2_0424A445
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_04247442 3_2_04247442
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_04241CA1 3_2_04241CA1
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_0425E4E5 3_2_0425E4E5
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_0425CCD9 3_2_0425CCD9
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_04258D3D 3_2_04258D3D
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_0425AD08 3_2_0425AD08
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_04255515 3_2_04255515
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_0425654A 3_2_0425654A
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_04262D53 3_2_04262D53
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_04257D5B 3_2_04257D5B
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_04253D85 3_2_04253D85
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_04259DF5 3_2_04259DF5
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_042455FF 3_2_042455FF
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_0425C5D5 3_2_0425C5D5
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_0424C5D8 3_2_0424C5D8
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_04248636 3_2_04248636
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_0424DE74 3_2_0424DE74
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_04247E79 3_2_04247E79
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_0425567B 3_2_0425567B
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_0424E640 3_2_0424E640
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_04252E5D 3_2_04252E5D
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_042636AA 3_2_042636AA
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_04253EAA 3_2_04253EAA
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_04250EBC 3_2_04250EBC
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_042646BD 3_2_042646BD
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_0424C6B8 3_2_0424C6B8
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_04263EE9 3_2_04263EE9
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_0425BEFD 3_2_0425BEFD
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_04241F38 3_2_04241F38
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_0424EF0C 3_2_0424EF0C
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_0424670B 3_2_0424670B
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_04254F74 3_2_04254F74
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_04259774 3_2_04259774
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_04255779 3_2_04255779
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_0425FF58 3_2_0425FF58
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_042477A3 3_2_042477A3
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_04258FAE 3_2_04258FAE
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_042607AA 3_2_042607AA
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_0424BFBE 3_2_0424BFBE
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_042617BD 3_2_042617BD
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_042457B8 3_2_042457B8
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_04250F86 3_2_04250F86
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_042567E6 3_2_042567E6
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_042507F4 3_2_042507F4
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_042527F9 3_2_042527F9
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_0424E7DE 3_2_0424E7DE
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_0424B820 3_2_0424B820
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_04258806 3_2_04258806
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_04262009 3_2_04262009
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_0424A871 3_2_0424A871
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_04247078 3_2_04247078
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_0425F840 3_2_0425F840
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_042600EF 3_2_042600EF
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_0424F0E9 3_2_0424F0E9
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_042480C0 3_2_042480C0
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_0425D8DB 3_2_0425D8DB
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_0425017B 3_2_0425017B
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_04252142 3_2_04252142
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_0424D14C 3_2_0424D14C
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_0425E955 3_2_0425E955
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_0425D1BC 3_2_0425D1BC
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_04256187 3_2_04256187
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_04242194 3_2_04242194
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_0425E1F8 3_2_0425E1F8
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_04259A01 3_2_04259A01
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_04257A0F 3_2_04257A0F
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_04260A64 3_2_04260A64
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_04254A66 3_2_04254A66
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_04263263 3_2_04263263
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_04254244 3_2_04254244
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_0425B257 3_2_0425B257
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_0425A2A5 3_2_0425A2A5
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_0424BAA9 3_2_0424BAA9
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_04250ABA 3_2_04250ABA
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_0425CAD5 3_2_0425CAD5
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_04255333 3_2_04255333
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_04262B09 3_2_04262B09
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_0424F369 3_2_0424F369
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_04246B7A 3_2_04246B7A
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_0425437A 3_2_0425437A
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_0424238C 3_2_0424238C
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_0424FB8E 3_2_0424FB8E
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_04244BFC 3_2_04244BFC
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_0425FBDE 3_2_0425FBDE
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_048E7A0F 5_2_048E7A0F
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_048F2009 5_2_048F2009
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_048D8636 5_2_048D8636
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_048DA445 5_2_048DA445
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_048EB257 5_2_048EB257
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_048E4A66 5_2_048E4A66
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_048DDE74 5_2_048DDE74
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_048F17BD 5_2_048F17BD
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_048EEFDD 5_2_048EEFDD
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_048DC5D8 5_2_048DC5D8
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_048E85FF 5_2_048E85FF
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_048D670B 5_2_048D670B
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_048EAD08 5_2_048EAD08
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_048E654A 5_2_048E654A
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_048E2142 5_2_048E2142
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_048EFF58 5_2_048EFF58
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_048EE955 5_2_048EE955
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_048E3EAA 5_2_048E3EAA
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_048DBAA9 5_2_048DBAA9
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_048F36AA 5_2_048F36AA
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_048EA2A5 5_2_048EA2A5
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_048D1CA1 5_2_048D1CA1
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_048F46BD 5_2_048F46BD
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_048E0EBC 5_2_048E0EBC
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_048E0ABA 5_2_048E0ABA
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_048DC6B8 5_2_048DC6B8
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_048D80C0 5_2_048D80C0
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_048ED8DB 5_2_048ED8DB
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_048ECCD9 5_2_048ECCD9
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_048ECAD5 5_2_048ECAD5
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_048F00EF 5_2_048F00EF
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_048DF0E9 5_2_048DF0E9
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_048F3EE9 5_2_048F3EE9
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_048EE4E5 5_2_048EE4E5
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_048EBEFD 5_2_048EBEFD
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_048E8806 5_2_048E8806
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_048E9A01 5_2_048E9A01
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_048DB820 5_2_048DB820
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_048D3431 5_2_048D3431
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_048E4244 5_2_048E4244
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_048DE640 5_2_048DE640
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_048EF840 5_2_048EF840
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_048D7442 5_2_048D7442
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_048E2E5D 5_2_048E2E5D
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_048F0A64 5_2_048F0A64
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_048F3263 5_2_048F3263
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_048D7E79 5_2_048D7E79
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_048D7078 5_2_048D7078
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_048E567B 5_2_048E567B
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_048EA474 5_2_048EA474
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_048DA871 5_2_048DA871
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_048EDC71 5_2_048EDC71
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_048D238C 5_2_048D238C
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_048DFB8E 5_2_048DFB8E
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_048E0F86 5_2_048E0F86
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_048E6187 5_2_048E6187
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_048E3D85 5_2_048E3D85
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_048D2194 5_2_048D2194
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_048E8FAE 5_2_048E8FAE
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_048F07AA 5_2_048F07AA
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_048D77A3 5_2_048D77A3
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_048ED1BC 5_2_048ED1BC
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_048DBFBE 5_2_048DBFBE
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_048D57B8 5_2_048D57B8
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_048EFBDE 5_2_048EFBDE
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_048DE7DE 5_2_048DE7DE
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_048EC5D5 5_2_048EC5D5
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_048E67E6 5_2_048E67E6
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_048D4BFC 5_2_048D4BFC
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_048D55FF 5_2_048D55FF
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_048EE1F8 5_2_048EE1F8
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_048E27F9 5_2_048E27F9
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_048E07F4 5_2_048E07F4
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_048E9DF5 5_2_048E9DF5
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_048DEF0C 5_2_048DEF0C
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_048F2B09 5_2_048F2B09
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_048E5515 5_2_048E5515
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_048E8D3D 5_2_048E8D3D
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_048D1F38 5_2_048D1F38
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_048E5333 5_2_048E5333
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_048DD14C 5_2_048DD14C
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_048E7D5B 5_2_048E7D5B
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_048F2D53 5_2_048F2D53
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_048DF369 5_2_048DF369
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_048E437A 5_2_048E437A
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_048E017B 5_2_048E017B
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_048E5779 5_2_048E5779
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_048D6B7A 5_2_048D6B7A
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_048E4F74 5_2_048E4F74
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_048E9774 5_2_048E9774
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_008F7A0F 7_2_008F7A0F
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_00902009 7_2_00902009
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_008E8636 7_2_008E8636
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_008EA445 7_2_008EA445
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_008F4A66 7_2_008F4A66
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_008EDE74 7_2_008EDE74
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_008FEFDD 7_2_008FEFDD
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_008EC5D8 7_2_008EC5D8
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_008E670B 7_2_008E670B
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_008FAD08 7_2_008FAD08
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_008F654A 7_2_008F654A
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_008F2142 7_2_008F2142
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_008FFF58 7_2_008FFF58
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_008F3EAA 7_2_008F3EAA
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_008EBAA9 7_2_008EBAA9
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_008FA2A5 7_2_008FA2A5
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_009046BD 7_2_009046BD
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_008E1CA1 7_2_008E1CA1
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_008F0EBC 7_2_008F0EBC
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_008F0ABA 7_2_008F0ABA
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_008EC6B8 7_2_008EC6B8
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_009036AA 7_2_009036AA
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_008E80C0 7_2_008E80C0
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_008FD8DB 7_2_008FD8DB
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_008FCCD9 7_2_008FCCD9
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_008FCAD5 7_2_008FCAD5
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_008EF0E9 7_2_008EF0E9
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_008FE4E5 7_2_008FE4E5
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_008FBEFD 7_2_008FBEFD
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_00903EE9 7_2_00903EE9
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_009000EF 7_2_009000EF
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_008F8806 7_2_008F8806
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_008F9A01 7_2_008F9A01
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_008EB820 7_2_008EB820
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_008E3431 7_2_008E3431
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_008F4244 7_2_008F4244
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_008E7442 7_2_008E7442
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_008EE640 7_2_008EE640
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_008FF840 7_2_008FF840
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_008F2E5D 7_2_008F2E5D
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_008FB257 7_2_008FB257
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_00903263 7_2_00903263
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_00900A64 7_2_00900A64
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_008F567B 7_2_008F567B
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_008E7078 7_2_008E7078
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_008E7E79 7_2_008E7E79
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_008FA474 7_2_008FA474
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_008FDC71 7_2_008FDC71
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_008EA871 7_2_008EA871
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_008EFB8E 7_2_008EFB8E
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_008E238C 7_2_008E238C
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_008F6187 7_2_008F6187
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_008F0F86 7_2_008F0F86
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_008F3D85 7_2_008F3D85
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_008E2194 7_2_008E2194
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_008F8FAE 7_2_008F8FAE
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_009017BD 7_2_009017BD
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_008E77A3 7_2_008E77A3
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_008EBFBE 7_2_008EBFBE
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_008FD1BC 7_2_008FD1BC
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_008E57B8 7_2_008E57B8
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_009007AA 7_2_009007AA
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_008EE7DE 7_2_008EE7DE
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_008FFBDE 7_2_008FFBDE
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_008FC5D5 7_2_008FC5D5
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_008F67E6 7_2_008F67E6
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_008F85FF 7_2_008F85FF
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_008E55FF 7_2_008E55FF
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_008E4BFC 7_2_008E4BFC
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_008F27F9 7_2_008F27F9
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_008FE1F8 7_2_008FE1F8
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_008F9DF5 7_2_008F9DF5
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_008F07F4 7_2_008F07F4
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_008EEF0C 7_2_008EEF0C
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_00902B09 7_2_00902B09
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_008F5515 7_2_008F5515
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_008F8D3D 7_2_008F8D3D
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_008E1F38 7_2_008E1F38
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_008F5333 7_2_008F5333
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_008ED14C 7_2_008ED14C
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_00902D53 7_2_00902D53
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_008F7D5B 7_2_008F7D5B
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_008FE955 7_2_008FE955
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_008EF369 7_2_008EF369
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_008E6B7A 7_2_008E6B7A
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_008F017B 7_2_008F017B
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_008F437A 7_2_008F437A
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_008F5779 7_2_008F5779
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_008F4F74 7_2_008F4F74
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_008F9774 7_2_008F9774
Found potential string decryption / allocating functions
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: String function: 10017BC1 appears 68 times
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: String function: 1001984C appears 48 times
Source: C:\Windows\SysWOW64\rundll32.exe Code function: String function: 10017BC1 appears 68 times
Source: C:\Windows\SysWOW64\rundll32.exe Code function: String function: 1001984C appears 48 times
Sample file is different than original file name gathered from version info
Source: EcJ8rbg.dll Binary or memory string: OriginalFilenameUDPTool.EXE: vs EcJ8rbg.dll
PE file contains strange resources
Source: EcJ8rbg.dll Static PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Tries to load missing DLLs
Source: C:\Windows\SysWOW64\regsvr32.exe Section loaded: sfc.dll Jump to behavior
Source: EcJ8rbg.dll Virustotal: Detection: 40%
Source: EcJ8rbg.dll Static PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: C:\Windows\System32\loaddll32.exe Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: unknown Process created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\EcJ8rbg.dll"
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\EcJ8rbg.dll",#1
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\EcJ8rbg.dll
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\EcJ8rbg.dll",#1
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\EcJ8rbg.dll,DllRegisterServer
Source: C:\Windows\SysWOW64\regsvr32.exe Process created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\Desktop\EcJ8rbg.dll",DllRegisterServer
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\Desktop\EcJ8rbg.dll",DllRegisterServer
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Twpdaikokj\mcaqvcjuoohw.tdj",GacrURwyZJOcX
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Windows\System32\Twpdaikokj\mcaqvcjuoohw.tdj",DllRegisterServer
Source: unknown Process created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
Source: unknown Process created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
Source: unknown Process created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
Source: unknown Process created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\EcJ8rbg.dll",#1 Jump to behavior
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\EcJ8rbg.dll Jump to behavior
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\EcJ8rbg.dll,DllRegisterServer Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\EcJ8rbg.dll",#1 Jump to behavior
Source: C:\Windows\SysWOW64\regsvr32.exe Process created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\Desktop\EcJ8rbg.dll",DllRegisterServer Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\Desktop\EcJ8rbg.dll",DllRegisterServer Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Twpdaikokj\mcaqvcjuoohw.tdj",GacrURwyZJOcX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Windows\System32\Twpdaikokj\mcaqvcjuoohw.tdj",DllRegisterServer Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32 Jump to behavior
Source: classification engine Classification label: mal96.troj.evad.winDLL@21/2@0/27
Source: C:\Windows\SysWOW64\rundll32.exe File read: C:\Users\desktop.ini Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\EcJ8rbg.dll",#1
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_100126F9 FindResourceA,LoadResource,LockResource,FreeResource, 2_2_100126F9
Source: C:\Windows\SysWOW64\rundll32.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Windows\System32\svchost.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Windows\System32\svchost.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: EcJ8rbg.dll Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: EcJ8rbg.dll Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: EcJ8rbg.dll Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: EcJ8rbg.dll Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: EcJ8rbg.dll Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

Data Obfuscation:

barindex
Uses code obfuscation techniques (call, push, ret)
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_10019891 push ecx; ret 2_2_100198A4
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_10017C60 push ecx; ret 2_2_10017C73
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_04B31195 push cs; iretd 2_2_04B31197
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_10019891 push ecx; ret 3_2_100198A4
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_10017C60 push ecx; ret 3_2_10017C73
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_04241195 push cs; iretd 3_2_04241197
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_048D1195 push cs; iretd 5_2_048D1197
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_008E1195 push cs; iretd 7_2_008E1197
Contains functionality to dynamically determine API calls
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_10023A79 LoadLibraryA,GetProcAddress,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__invoke_watson,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__decode_pointer,__decode_pointer,__invoke_watson,__decode_pointer,__decode_pointer,__decode_pointer, 2_2_10023A79
PE file contains an invalid checksum
Source: EcJ8rbg.dll Static PE information: real checksum: 0x66354 should be: 0x6aec8
Registers a DLL
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\EcJ8rbg.dll

Persistence and Installation Behavior:

barindex
Drops PE files to the windows directory (C:\Windows)
Source: C:\Windows\SysWOW64\rundll32.exe PE file moved: C:\Windows\SysWOW64\Twpdaikokj\mcaqvcjuoohw.tdj Jump to behavior

Hooking and other Techniques for Hiding and Protection:

barindex
Hides that the sample has been downloaded from the Internet (zone.identifier)
Source: C:\Windows\SysWOW64\rundll32.exe File opened: C:\Windows\SysWOW64\Twpdaikokj\mcaqvcjuoohw.tdj:Zone.Identifier read attributes | delete Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe File opened: C:\Windows\SysWOW64\Jicbdwjegkdwrax\kyymjqgoejyy.lye:Zone.Identifier read attributes | delete Jump to behavior
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_1000D804 IsIconic,GetWindowPlacement,GetWindowRect, 2_2_1000D804
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_10008B90 IsIconic,SendMessageA,GetSystemMetrics,GetSystemMetrics,GetClientRect,DrawIcon, 2_2_10008B90
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_1000D804 IsIconic,GetWindowPlacement,GetWindowRect, 3_2_1000D804
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_10008B90 IsIconic,SendMessageA,GetSystemMetrics,GetSystemMetrics,GetClientRect,DrawIcon, 3_2_10008B90
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Source: C:\Windows\SysWOW64\rundll32.exe Registry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior

Malware Analysis System Evasion:

barindex
May sleep (evasive loops) to hinder dynamic analysis
Source: C:\Windows\System32\svchost.exe TID: 2432 Thread sleep time: -120000s >= -30000s Jump to behavior
Sample execution stops while process was sleeping (likely an evasion)
Source: C:\Windows\System32\loaddll32.exe Last function: Thread delayed
Found large amount of non-executed APIs
Source: C:\Windows\SysWOW64\regsvr32.exe API coverage: 4.6 %
Source: C:\Windows\SysWOW64\rundll32.exe API coverage: 4.9 %
Source: C:\Windows\SysWOW64\regsvr32.exe API call chain: ExitProcess graph end node
Source: C:\Windows\SysWOW64\rundll32.exe API call chain: ExitProcess graph end node
Source: C:\Windows\SysWOW64\rundll32.exe File Volume queried: C:\ FullSizeInformation Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe File Volume queried: C:\ FullSizeInformation Jump to behavior
Source: svchost.exe, 00000011.00000002.782416042.00000289AE082000.00000004.00000001.sdmp, svchost.exe, 00000011.00000002.782568304.00000289AE0EC000.00000004.00000001.sdmp Binary or memory string: Hyper-V RAW

Anti Debugging:

barindex
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_1001C49A _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, 2_2_1001C49A
Contains functionality to dynamically determine API calls
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_10023A79 LoadLibraryA,GetProcAddress,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__invoke_watson,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__decode_pointer,__decode_pointer,__invoke_watson,__decode_pointer,__decode_pointer,__decode_pointer, 2_2_10023A79
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_100178B6 GetProcessHeap,GetProcessHeap,HeapAlloc,GetVersionExA,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,__heap_term,__RTC_Initialize,GetCommandLineA,___crtGetEnvironmentStringsA,__ioinit,__mtterm,__setargv,__setenvp,__cinit,__ioterm,__ioterm,__mtterm,__heap_term,___set_flsgetvalue,__calloc_crt,__decode_pointer,__initptd,GetCurrentThreadId,__freeptd, 2_2_100178B6
Contains functionality to read the PEB
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_04B3F7F7 mov eax, dword ptr fs:[00000030h] 2_2_04B3F7F7
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_0424F7F7 mov eax, dword ptr fs:[00000030h] 3_2_0424F7F7
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_048DF7F7 mov eax, dword ptr fs:[00000030h] 5_2_048DF7F7
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_008EF7F7 mov eax, dword ptr fs:[00000030h] 7_2_008EF7F7
Checks if the current process is being debugged
Source: C:\Windows\System32\loaddll32.exe Process queried: DebugPort Jump to behavior
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_1001C49A _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, 2_2_1001C49A
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_10021743 __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 2_2_10021743
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_100167D5 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, 2_2_100167D5
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_1001FC21 SetUnhandledExceptionFilter,__encode_pointer, 2_2_1001FC21
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_1001FC43 __decode_pointer,SetUnhandledExceptionFilter, 2_2_1001FC43
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_1001C49A _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, 3_2_1001C49A
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_10021743 __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 3_2_10021743
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_100167D5 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, 3_2_100167D5
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_1001FC21 SetUnhandledExceptionFilter,__encode_pointer, 3_2_1001FC21
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_1001FC43 __decode_pointer,SetUnhandledExceptionFilter, 3_2_1001FC43

HIPS / PFW / Operating System Protection Evasion:

barindex
System process connects to network (likely due to code injection or exploit)
Source: C:\Windows\SysWOW64\rundll32.exe Network Connect: 69.16.218.101 144 Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Network Connect: 45.138.98.34 80 Jump to behavior
Creates a process in suspended mode (likely to inject code)
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\EcJ8rbg.dll",#1 Jump to behavior

Language, Device and Operating System Detection:

barindex
Queries the volume information (name, serial number etc) of a device
Source: C:\Windows\SysWOW64\rundll32.exe Queries volume information: C:\ VolumeInformation Jump to behavior
Contains functionality to query locales information (e.g. system language)
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: GetThreadLocale,GetLocaleInfoA,GetACP, 2_2_10027704
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: _strcpy_s,__snprintf_s,GetLocaleInfoA,LoadLibraryA, 2_2_1000A803
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: GetLocaleInfoA, 2_2_10023880
Source: C:\Windows\SysWOW64\rundll32.exe Code function: GetThreadLocale,GetLocaleInfoA,GetACP, 3_2_10027704
Source: C:\Windows\SysWOW64\rundll32.exe Code function: _strcpy_s,__snprintf_s,GetLocaleInfoA,LoadLibraryA, 3_2_1000A803
Source: C:\Windows\SysWOW64\rundll32.exe Code function: GetLocaleInfoA, 3_2_10023880
Contains functionality to query CPU information (cpuid)
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_10022853 cpuid 2_2_10022853
Source: C:\Windows\SysWOW64\rundll32.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid Jump to behavior
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_1001F914 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter, 2_2_1001F914
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_100178B6 GetProcessHeap,GetProcessHeap,HeapAlloc,GetVersionExA,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,__heap_term,__RTC_Initialize,GetCommandLineA,___crtGetEnvironmentStringsA,__ioinit,__mtterm,__setargv,__setenvp,__cinit,__ioterm,__ioterm,__mtterm,__heap_term,___set_flsgetvalue,__calloc_crt,__decode_pointer,__initptd,GetCurrentThreadId,__freeptd, 2_2_100178B6

Stealing of Sensitive Information:

barindex
Yara detected Emotet
Source: Yara match File source: 5.2.rundll32.exe.48d0000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.rundll32.exe.4e50000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.rundll32.exe.5140000.8.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.49c0000.6.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.rundll32.exe.2e20000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 2.2.regsvr32.exe.3250000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.2.rundll32.exe.4240000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.rundll32.exe.5140000.8.unpack, type: UNPACKEDPE
Source: Yara match File source: 9.2.rundll32.exe.49f0000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.4a20000.8.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.rundll32.exe.5110000.7.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.rundll32.exe.52a0000.10.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.49f0000.7.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.4760000.3.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.2.rundll32.exe.2940000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.rundll32.exe.5170000.9.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.4a50000.9.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.rundll32.exe.50e0000.6.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.4a20000.8.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 2.2.regsvr32.exe.3250000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.49c0000.6.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.4b80000.10.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.8b0000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 2.2.regsvr32.exe.4b30000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.rundll32.exe.50e0000.6.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.4b80000.10.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.8b0000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.4730000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 9.2.rundll32.exe.2f90000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.4860000.4.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.4860000.4.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.4730000.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.rundll32.exe.4f80000.4.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.rundll32.exe.4f80000.4.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.4890000.5.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.rundll32.exe.52a0000.10.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.2.rundll32.exe.2940000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.8e0000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.4bb0000.11.unpack, type: UNPACKEDPE
Source: Yara match File source: 9.2.rundll32.exe.2f90000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.rundll32.exe.4fb0000.5.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.rundll32.exe.4e50000.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.rundll32.exe.4e80000.3.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.rundll32.exe.52d0000.11.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.rundll32.exe.2e20000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000002.00000002.651219135.0000000003250000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.658773887.00000000052D1000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000009.00000002.663246683.0000000002F90000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.658783740.0000000004A51000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.658642834.00000000050E0000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000002.651296715.0000000004B31000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.658723299.0000000005171000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.657974448.00000000008B0000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.655430157.0000000002940000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.658619486.0000000004860000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.658016233.00000000008E1000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.658517019.0000000004E81000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.658811817.0000000004B80000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.658095730.0000000002E20000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.658757089.0000000004A20000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.655623941.0000000004241000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.658582876.0000000004FB1000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.658656384.0000000004891000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.658747642.00000000052A0000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.658668655.0000000005111000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.658839063.0000000004BB1000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.658706042.00000000049C0000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.658328602.00000000048D1000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.658574169.0000000004761000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000009.00000002.663415496.00000000049F1000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.658548495.0000000004730000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.658494027.0000000004E50000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.658732893.00000000049F1000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.658556614.0000000004F80000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.658697305.0000000005140000.00000040.00000001.sdmp, type: MEMORY

Remote Access Functionality:

barindex
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_100011C0 WSAStartup,_memset,htonl,htons,socket,bind,setsockopt, 2_2_100011C0
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_100011C0 WSAStartup,_memset,htonl,htons,socket,bind,setsockopt, 3_2_100011C0
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs