Windows
Analysis Report
QUclYxO7PA.dll
Overview
General Information
Detection
CryptOne Matanbuchus
Score: | 96 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Found malware configuration
Yara detected Matanbuchus
Multi AV Scanner detection for submitted file
Yara detected CryptOne packer
Antivirus / Scanner detection for submitted sample
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Sigma detected: Suspicious Call by Ordinal
C2 URLs / IPs found in malware configuration
Contains functionality to detect sleep reduction / modifications
Uses 32bit PE files
Yara signature match
One or more processes crash
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query locales information (e.g. system language)
Uses code obfuscation techniques (call, push, ret)
Found evasive API chain (date check)
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Found potential string decryption / allocating functions
Contains functionality to call native functions
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to dynamically determine API calls
Contains functionality to record screenshots
Uses the system / local time for branch decision (may execute only at specific dates)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Sample file is different than original file name gathered from version info
Extensive use of GetProcAddress (often used to hide API calls)
PE file contains strange resources
Contains functionality to read the PEB
Checks if the current process is being debugged
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Found large amount of non-executed APIs
May check if the current machine is a sandbox (GetTickCount - Sleep)
Creates a process in suspended mode (likely to inject code)
Classification
- System is w10x64
loaddll32.exe (PID: 4816 cmdline:
loaddll32. exe "C:\Us ers\user\D esktop\QUc lYxO7PA.dl l" MD5: 7DEB5DB86C0AC789123DEC286286B938) cmd.exe (PID: 6356 cmdline:
cmd.exe /C rundll32. exe "C:\Us ers\user\D esktop\QUc lYxO7PA.dl l",#1 MD5: F3BDBE3BB6F734E357235F4D5898582D) rundll32.exe (PID: 5892 cmdline:
rundll32.e xe "C:\Use rs\user\De sktop\QUcl YxO7PA.dll ",#1 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D) WerFault.exe (PID: 2088 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -u -p 5 892 -s 720 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
- cleanup
{"C2 list": ["https://belialw869367.at/f5126584-3f68-4e0c-868a-dcb2455f8146/Y2xpbnRvbjQ1.xml", "https://belialr878539.at/b0868b6b-7f2c-4ac6-ba54-ba9b13744d17/clinton45.xml", "https://beliale232634.at/b0868b6b-7f2c-4ac6-ba54-ba9b13744d17/clinton45.xml", "https://belialp632298.at/b0868b6b-7f2c-4ac6-ba54-ba9b13744d17/clinton45.xml", "https://belialq449663.at/f5126584-3f68-4e0c-868a-dcb2455f8146/Y2xpbnRvbjQ1.xml"]}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Crypt | Yara detected CryptOne packer | Joe Security | ||
JoeSecurity_Crypt | Yara detected CryptOne packer | Joe Security | ||
JoeSecurity_Matanbuchus | Yara detected Matanbuchus | Joe Security | ||
JoeSecurity_Matanbuchus | Yara detected Matanbuchus | Joe Security | ||
SUSP_XORed_URL_in_EXE | Detects an XORed URL in an executable | Florian Roth |
| |
Click to see the 11 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
SUSP_XORed_URL_in_EXE | Detects an XORed URL in an executable | Florian Roth |
| |
JoeSecurity_Matanbuchus | Yara detected Matanbuchus | Joe Security | ||
SUSP_XORed_URL_in_EXE | Detects an XORed URL in an executable | Florian Roth |
| |
JoeSecurity_Matanbuchus | Yara detected Matanbuchus | Joe Security | ||
JoeSecurity_Matanbuchus | Yara detected Matanbuchus | Joe Security | ||
Click to see the 15 entries |
System Summary |
---|
Source: | Author: Florian Roth: |
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Malware Configuration Extractor: |
Source: | Virustotal: | Perma Link | ||
Source: | Metadefender: | Perma Link | ||
Source: | ReversingLabs: |
Source: | Avira: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Code function: | 1_2_027AD51A | |
Source: | Code function: |