Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
400000.dll

Overview

General Information

Sample Name:400000.dll
Analysis ID:632394
MD5:3b242348cab0068aa4ed98a0c4c8cf95
SHA1:ed28762dcfbd9e1892e56d261a3facf7248817c4
SHA256:c0f637c3bc32ba773e2a3ef78b086eb680521482bc5e46cb99f231237c9b9265
Tags:dll
Infos:

Detection

Ursnif
Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected Ursnif
Machine Learning detection for sample
Registers a DLL
Uses 32bit PE files
Tries to load missing DLLs
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • loaddll32.exe (PID: 1260 cmdline: loaddll32.exe "C:\Users\user\Desktop\400000.dll" MD5: 7DEB5DB86C0AC789123DEC286286B938)
    • cmd.exe (PID: 6444 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\400000.dll",#1 MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • rundll32.exe (PID: 6424 cmdline: rundll32.exe "C:\Users\user\Desktop\400000.dll",#1 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • regsvr32.exe (PID: 6440 cmdline: regsvr32.exe /s C:\Users\user\Desktop\400000.dll MD5: 426E7499F6A7346F0410DEAD0805586B)
    • rundll32.exe (PID: 4116 cmdline: rundll32.exe C:\Users\user\Desktop\400000.dll,DllRegisterServer MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
  • cleanup
{"RSA Public Key": "aVn5cc4yxmeeaLO1GhSDa9E9i9AhiobBqld00ioGlWOx7yX95FcGN3HicG7Ma8K4OSypooZMeS/Q9RHBbebiZB0htVqQfpLIdb7MhjDHDEBHCtTQeeoA8LfDaJAEQ2IdhSWjXZZqcMncDfNRXuwiAWQdEo+PTa9HSuW2G4AqVIhs9hBL2BAZZa8Egh74wCmZjW5gvEmkB+aIKoafUXWf9rJ70sGHrX3U1JPn9tSGnbML+e9g5HE/xe2QT/jXivxkLmTVQv5cQZbQWCQmVvKyQzH4ZmE8FDdAahhD8LLQyis0qatiz93QdIa9WeAg8/W3ijW7qgygdKBu/PDPFWkBFjL9Ourt+q4fqApYM+hMcvc=", "c2_domain": ["agenziaent.top", "agenziaentr.top", "statusline.ru", "statuslines.ru"], "botnet": "7631", "server": "50", "serpent_key": "xlmWrvhFyvbUdepr", "sleep_time": "1", "CONF_TIMEOUT": "20", "SetWaitableTimer_value": "0"}
SourceRuleDescriptionAuthorStrings
400000.dllJoeSecurity_Ursnif_1Yara detected UrsnifJoe Security
    No Sigma rule has matched
    No Snort rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: 400000.dllAvira: detected
    Source: 400000.dllMalware Configuration Extractor: Ursnif {"RSA Public Key": "aVn5cc4yxmeeaLO1GhSDa9E9i9AhiobBqld00ioGlWOx7yX95FcGN3HicG7Ma8K4OSypooZMeS/Q9RHBbebiZB0htVqQfpLIdb7MhjDHDEBHCtTQeeoA8LfDaJAEQ2IdhSWjXZZqcMncDfNRXuwiAWQdEo+PTa9HSuW2G4AqVIhs9hBL2BAZZa8Egh74wCmZjW5gvEmkB+aIKoafUXWf9rJ70sGHrX3U1JPn9tSGnbML+e9g5HE/xe2QT/jXivxkLmTVQv5cQZbQWCQmVvKyQzH4ZmE8FDdAahhD8LLQyis0qatiz93QdIa9WeAg8/W3ijW7qgygdKBu/PDPFWkBFjL9Ourt+q4fqApYM+hMcvc=", "c2_domain": ["agenziaent.top", "agenziaentr.top", "statusline.ru", "statuslines.ru"], "botnet": "7631", "server": "50", "serpent_key": "xlmWrvhFyvbUdepr", "sleep_time": "1", "CONF_TIMEOUT": "20", "SetWaitableTimer_value": "0"}
    Source: 400000.dllReversingLabs: Detection: 63%
    Source: 400000.dllJoe Sandbox ML: detected
    Source: 400000.dllStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
    Source: unknownDNS traffic detected: queries for: fp-afd.azureedge.us

    Key, Mouse, Clipboard, Microphone and Screen Capturing

    barindex
    Source: Yara matchFile source: 400000.dll, type: SAMPLE

    E-Banking Fraud

    barindex
    Source: Yara matchFile source: 400000.dll, type: SAMPLE
    Source: 400000.dllStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
    Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: sfc.dllJump to behavior
    Source: 400000.dllReversingLabs: Detection: 63%
    Source: 400000.dllStatic PE information: Section: .text IMAGE_SCN_LNK_REMOVE, IMAGE_SCN_MEM_SYSHEAP, IMAGE_SCN_MEM_PRELOAD, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_16BIT, IMAGE_SCN_LNK_INFO, IMAGE_SCN_LNK_OVER, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_PURGEABLE, IMAGE_SCN_MEM_READ
    Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: classification engineClassification label: mal76.troj.winDLL@9/0@1/0
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\400000.dll",#1
    Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\400000.dll"
    Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\400000.dll",#1
    Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\400000.dll
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\400000.dll",#1
    Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\400000.dll,DllRegisterServer
    Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\400000.dll",#1Jump to behavior
    Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\400000.dllJump to behavior
    Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\400000.dll,DllRegisterServerJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\400000.dll",#1Jump to behavior
    Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\400000.dll

    Hooking and other Techniques for Hiding and Protection

    barindex
    Source: Yara matchFile source: 400000.dll, type: SAMPLE
    Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 120000Jump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\400000.dll",#1Jump to behavior

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: 400000.dll, type: SAMPLE

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: 400000.dll, type: SAMPLE
    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid AccountsWindows Management Instrumentation1
    DLL Side-Loading
    11
    Process Injection
    1
    Regsvr32
    OS Credential Dumping1
    Virtualization/Sandbox Evasion
    Remote ServicesData from Local SystemExfiltration Over Other Network Medium1
    Non-Application Layer Protocol
    Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
    Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
    DLL Side-Loading
    1
    Rundll32
    LSASS Memory1
    System Information Discovery
    Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
    Application Layer Protocol
    Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
    Virtualization/Sandbox Evasion
    Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)11
    Process Injection
    NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
    Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
    DLL Side-Loading
    LSA SecretsRemote System DiscoverySSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet
    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 632394 Sample: 400000.dll Startdate: 23/05/2022 Architecture: WINDOWS Score: 76 18 t-0001.msedge.azure.us 2->18 20 fp-afd.azureedge.us 2->20 22 4 other IPs or domains 2->22 24 Found malware configuration 2->24 26 Antivirus / Scanner detection for submitted sample 2->26 28 Multi AV Scanner detection for submitted file 2->28 30 2 other signatures 2->30 8 loaddll32.exe 1 2->8         started        signatures3 process4 process5 10 cmd.exe 1 8->10         started        12 regsvr32.exe 8->12         started        14 rundll32.exe 8->14         started        process6 16 rundll32.exe 10->16         started       

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    400000.dll63%ReversingLabsWin32.Trojan.Ursnif
    400000.dll100%AviraTR/Crypt.XPACK.Gen
    400000.dll100%Joe Sandbox ML
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    eafd-ffgov-phx01.elasticafd.msedge.azure.us0%VirustotalBrowse
    b-9999.b-msedge.net0%VirustotalBrowse
    fp-afd.azureedge.us0%VirustotalBrowse
    No Antivirus matches
    NameIPActiveMaliciousAntivirus DetectionReputation
    eafd-ffgov-phx01.elasticafd.msedge.azure.us
    20.141.10.208
    truefalseunknown
    b-9999.b-msedge.net
    13.107.6.254
    truefalseunknown
    fp-afd.azureedge.us
    unknown
    unknownfalseunknown
    No contacted IP infos
    Joe Sandbox Version:34.0.0 Boulder Opal
    Analysis ID:632394
    Start date and time: 23/05/202216:36:262022-05-23 16:36:26 +02:00
    Joe Sandbox Product:CloudBasic
    Overall analysis duration:0h 3m 9s
    Hypervisor based Inspection enabled:false
    Report type:full
    Sample file name:400000.dll
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
    Number of analysed new started processes analysed:6
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • HDC enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Detection:MAL
    Classification:mal76.troj.winDLL@9/0@1/0
    EGA Information:Failed
    HDC Information:Failed
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 0
    • Number of non-executed functions: 0
    Cookbook Comments:
    • Found application associated with file extension: .dll
    • Adjust boot time
    • Enable AMSI
    • Stop behavior analysis, all processes terminated
    • Exclude process from analysis (whitelisted): backgroundTaskHost.exe
    • Excluded IPs from analysis (whitelisted): 152.199.19.161
    • Excluded domains from analysis (whitelisted): store-images.s-microsoft.com, fp-vp.azureedge.net, fp-vp.ec.azureedge.net, b-ring.msedge.net, cs9.wpc.v0cdn.net
    • Not all processes where analyzed, report is missing behavior information
    TimeTypeDescription
    16:37:47API Interceptor1x Sleep call for process: loaddll32.exe modified
    No context
    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
    b-9999.b-msedge.netSecuriteInfo.com.W32.AIDetectNet.01.23711.exeGet hashmaliciousBrowse
    • 13.107.6.254
    PAYMENT COPY_PDF__________________________.exeGet hashmaliciousBrowse
    • 13.107.6.254
    obrazac-207-22-xml.vbsGet hashmaliciousBrowse
    • 13.107.6.254
    rrmix.exeGet hashmaliciousBrowse
    • 13.107.6.254
    Order Documents .pdf.exeGet hashmaliciousBrowse
    • 13.107.6.254
    MWzqNJFzvh.exeGet hashmaliciousBrowse
    • 13.107.6.254
    SecuriteInfo.com.Variant.Ser.Lazy.948.25861.exeGet hashmaliciousBrowse
    • 13.107.6.254
    e-dekont.exeGet hashmaliciousBrowse
    • 13.107.6.254
    G0nnaC0pe.batGet hashmaliciousBrowse
    • 13.107.6.254
    f5.exeGet hashmaliciousBrowse
    • 13.107.6.254
    8.dllGet hashmaliciousBrowse
    • 13.107.6.254
    SecuriteInfo.com.W32.AIDetectNet.01.26448.exeGet hashmaliciousBrowse
    • 13.107.6.254
    terms .exeGet hashmaliciousBrowse
    • 13.107.6.254
    r0z.exeGet hashmaliciousBrowse
    • 13.107.6.254
    A4JE7z7NPM.exeGet hashmaliciousBrowse
    • 13.107.6.254
    qq3.exeGet hashmaliciousBrowse
    • 13.107.6.254
    Sucm35Ps2i.exeGet hashmaliciousBrowse
    • 13.107.6.254
    lista de pedidos y productos solicitados.pdf.exeGet hashmaliciousBrowse
    • 13.107.6.254
    BfcbXMZk2i.exeGet hashmaliciousBrowse
    • 13.107.6.254
    jeiIDatGCU.exeGet hashmaliciousBrowse
    • 13.107.6.254
    eafd-ffgov-phx01.elasticafd.msedge.azure.usPAYMENT COPY_PDF__________________________.exeGet hashmaliciousBrowse
    • 20.141.10.208
    obrazac-207-22-xml.vbsGet hashmaliciousBrowse
    • 20.141.10.208
    rrmix.exeGet hashmaliciousBrowse
    • 20.141.10.208
    No context
    No context
    No context
    No created / dropped files found
    File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
    Entropy (8bit):7.530069081172236
    TrID:
    • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
    • Generic Win/DOS Executable (2004/3) 0.20%
    • DOS Executable Generic (2002/1) 0.20%
    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
    File name:400000.dll
    File size:39424
    MD5:3b242348cab0068aa4ed98a0c4c8cf95
    SHA1:ed28762dcfbd9e1892e56d261a3facf7248817c4
    SHA256:c0f637c3bc32ba773e2a3ef78b086eb680521482bc5e46cb99f231237c9b9265
    SHA512:3708907f1a4dc46babef37015226943d4a78ebe865f090b92a1a759c3232b41cdf97ee7215794f5e85992ada22b4441873e921bf85c507c32e94371992abb56c
    SSDEEP:768:hoxUa+kzeq5v1yCJ9FdR+rqw5Lk6Pf44FqgQYNBarm+dL+84PgT:h/kze8fVkzfzF1QVT4PA
    TLSH:3C03E167AFA40B76C6CFA2B23130377E1527D3460359B8CA8751A52A4B26F4CEE7D051
    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......\o...............v.......v..........w............................v.......v.......v......Rich....................PE..L......b...
    Icon Hash:74f0e4ecccdce0e4
    Entrypoint:0x10001c13
    Entrypoint Section:.text
    Digitally signed:false
    Imagebase:0x10000000
    Subsystem:windows gui
    Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
    DLL Characteristics:
    Time Stamp:0x6213BE9D [Mon Feb 21 16:32:29 2022 UTC]
    TLS Callbacks:
    CLR (.Net) Version:
    OS Version Major:5
    OS Version Minor:0
    File Version Major:5
    File Version Minor:0
    Subsystem Version Major:5
    Subsystem Version Minor:0
    Import Hash:7c62ab7d5f2ed68e4989689e898c43c4
    Instruction
    push ebp
    mov ebp, esp
    push ecx
    mov eax, dword ptr [ebp+0Ch]
    push ebx
    push esi
    push edi
    xor edi, edi
    inc edi
    xor ebx, ebx
    sub eax, ebx
    mov dword ptr [ebp-04h], edi
    je 00007FCDFCA6DB51h
    dec eax
    jne 00007FCDFCA6DB9Bh
    push 10004188h
    call dword ptr [10003044h]
    cmp eax, edi
    jne 00007FCDFCA6DB88h
    push ebx
    push 00400000h
    push ebx
    call dword ptr [1000302Ch]
    mov dword ptr [10004190h], eax
    cmp eax, ebx
    je 00007FCDFCA6DB1Ch
    mov eax, dword ptr [ebp+08h]
    mov esi, 10004198h
    mov dword ptr [100041B0h], eax
    mov eax, esi
    lock xadd dword ptr [eax], edi
    mov ecx, dword ptr [ebp+10h]
    lea eax, dword ptr [ebp+0Ch]
    push eax
    call 00007FCDFCA6D39Ah
    push eax
    push 10001874h
    call 00007FCDFCA6DB51h
    mov dword ptr [1000418Ch], eax
    cmp eax, ebx
    jne 00007FCDFCA6DB3Bh
    or eax, FFFFFFFFh
    lock xadd dword ptr [esi], eax
    mov dword ptr [ebp-04h], ebx
    jmp 00007FCDFCA6DB2Fh
    push 10004188h
    call dword ptr [10003040h]
    test eax, eax
    jne 00007FCDFCA6DB20h
    cmp dword ptr [1000418Ch], ebx
    je 00007FCDFCA6DB0Ch
    mov esi, 00002328h
    push edi
    push 00000064h
    call dword ptr [10003038h]
    mov eax, dword ptr [10004198h]
    test eax, eax
    je 00007FCDFCA6DAE9h
    sub esi, 64h
    cmp esi, ebx
    jnle 00007FCDFCA6DAC9h
    push dword ptr [1000418Ch]
    call dword ptr [1000300Ch]
    push dword ptr [00000000h]
    Programming Language:
    • [ASM] VS2008 SP1 build 30729
    • [LNK] VS2008 SP1 build 30729
    • [IMP] VS2008 SP1 build 30729
    • [EXP] VS2008 SP1 build 30729
    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x35500x4e.rdata
    IMAGE_DIRECTORY_ENTRY_IMPORT0x31140x50.rdata
    IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0x60000x148.reloc
    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0x30000xb8.rdata
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
    .text0x10000x16b70x1800False0.686360677083data6.36921515644IMAGE_SCN_LNK_REMOVE, IMAGE_SCN_MEM_SYSHEAP, IMAGE_SCN_MEM_PRELOAD, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_16BIT, IMAGE_SCN_LNK_INFO, IMAGE_SCN_LNK_OVER, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_PURGEABLE, IMAGE_SCN_MEM_READ
    .rdata0x30000x59e0x600False0.633463541667data5.39585151919IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_MEM_LOCKED, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_LNK_OTHER, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_LNK_INFO, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_LNK_COMDAT, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_MEM_READ
    .data0x40000x25c0x200False0.18359375data0.925062804208IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_LNK_OTHER, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_16BIT, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_LNK_COMDAT, IMAGE_SCN_MEM_PURGEABLE, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_MEM_READ
    .bss0x50000x2dc0x400False0.412109375data4.62396270929IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_MEM_SYSHEAP, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_MEM_FARDATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_MEM_PRELOAD, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_16BIT, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_MEM_PROTECTED, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_GPREL, IMAGE_SCN_MEM_PURGEABLE, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_NO_DEFER_SPEC_EXC, IMAGE_SCN_MEM_READ
    .reloc0x60000x80000x7200False0.966317160088data7.84372410503IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_MEM_SYSHEAP, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_MEM_FARDATA, IMAGE_SCN_MEM_LOCKED, IMAGE_SCN_MEM_PRELOAD, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_LNK_OTHER, IMAGE_SCN_MEM_16BIT, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_MEM_PROTECTED, IMAGE_SCN_LNK_OVER, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_128BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_LNK_COMDAT, IMAGE_SCN_GPREL, IMAGE_SCN_MEM_PURGEABLE, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_NO_DEFER_SPEC_EXC, IMAGE_SCN_MEM_READ
    DLLImport
    ntdll.dll_snwprintf, memset, NtQuerySystemInformation, _aulldiv, RtlUnwind, NtQueryVirtualMemory
    KERNEL32.dllSetThreadAffinityMask, CloseHandle, HeapAlloc, SetThreadPriority, Sleep, ExitThread, lstrlenW, GetLastError, GetExitCodeThread, HeapCreate, HeapDestroy, GetCurrentThread, SleepEx, WaitForSingleObject, InterlockedDecrement, InterlockedIncrement, HeapFree, GetModuleFileNameW, SetLastError, GetModuleHandleA, VirtualProtect, OpenProcess, CreateEventA, GetLongPathNameW, GetVersion, GetCurrentProcessId, TerminateThread, QueueUserAPC, CreateThread, GetProcAddress, LoadLibraryA, VirtualFree, VirtualAlloc, MapViewOfFile, GetSystemTimeAsFileTime, CreateFileMappingW
    ADVAPI32.dllConvertStringSecurityDescriptorToSecurityDescriptorA
    NameOrdinalAddress
    DllRegisterServer10x10001e8b
    TimestampSource PortDest PortSource IPDest IP
    May 23, 2022 16:37:37.587388039 CEST6099653192.168.2.78.8.8.8
    May 23, 2022 16:37:37.744772911 CEST53609968.8.8.8192.168.2.7
    TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
    May 23, 2022 16:37:37.587388039 CEST192.168.2.78.8.8.80x1608Standard query (0)fp-afd.azureedge.usA (IP address)IN (0x0001)
    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
    May 23, 2022 16:37:37.076241016 CEST8.8.8.8192.168.2.70x15e4No error (0)b-ring.b-9999.b-msedge.netb-9999.b-msedge.netCNAME (Canonical name)IN (0x0001)
    May 23, 2022 16:37:37.076241016 CEST8.8.8.8192.168.2.70x15e4No error (0)b-9999.b-msedge.net13.107.6.254A (IP address)IN (0x0001)
    May 23, 2022 16:37:37.744772911 CEST8.8.8.8192.168.2.70x1608No error (0)fp-afd.azureedge.usfp-afd.afd.azureedge.usCNAME (Canonical name)IN (0x0001)
    May 23, 2022 16:37:37.744772911 CEST8.8.8.8192.168.2.70x1608No error (0)fp-afd.afd.azureedge.usafd.msedge.azure.usCNAME (Canonical name)IN (0x0001)
    May 23, 2022 16:37:37.744772911 CEST8.8.8.8192.168.2.70x1608No error (0)afd.msedge.azure.ust-0001.msedge.azure.usCNAME (Canonical name)IN (0x0001)
    May 23, 2022 16:37:37.744772911 CEST8.8.8.8192.168.2.70x1608No error (0)t-0001.msedge.azure.useafd-defaultvips-3p-gov.usgovtrafficmanager.netCNAME (Canonical name)IN (0x0001)
    May 23, 2022 16:37:37.744772911 CEST8.8.8.8192.168.2.70x1608No error (0)eafd-defaultvips-3p-gov.usgovtrafficmanager.neteafd-ffgov-phx01.elasticafd.msedge.azure.usCNAME (Canonical name)IN (0x0001)
    May 23, 2022 16:37:37.744772911 CEST8.8.8.8192.168.2.70x1608No error (0)eafd-ffgov-phx01.elasticafd.msedge.azure.us20.141.10.208A (IP address)IN (0x0001)

    Click to jump to process

    Click to jump to process

    Click to dive into process behavior distribution

    Click to jump to process

    Target ID:0
    Start time:16:37:42
    Start date:23/05/2022
    Path:C:\Windows\System32\loaddll32.exe
    Wow64 process (32bit):true
    Commandline:loaddll32.exe "C:\Users\user\Desktop\400000.dll"
    Imagebase:0x3a0000
    File size:116736 bytes
    MD5 hash:7DEB5DB86C0AC789123DEC286286B938
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high

    Target ID:1
    Start time:16:37:42
    Start date:23/05/2022
    Path:C:\Windows\SysWOW64\cmd.exe
    Wow64 process (32bit):true
    Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\400000.dll",#1
    Imagebase:0xdd0000
    File size:232960 bytes
    MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high

    Target ID:2
    Start time:16:37:43
    Start date:23/05/2022
    Path:C:\Windows\SysWOW64\regsvr32.exe
    Wow64 process (32bit):true
    Commandline:regsvr32.exe /s C:\Users\user\Desktop\400000.dll
    Imagebase:0x12a0000
    File size:20992 bytes
    MD5 hash:426E7499F6A7346F0410DEAD0805586B
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high

    Target ID:3
    Start time:16:37:43
    Start date:23/05/2022
    Path:C:\Windows\SysWOW64\rundll32.exe
    Wow64 process (32bit):true
    Commandline:rundll32.exe "C:\Users\user\Desktop\400000.dll",#1
    Imagebase:0xef0000
    File size:61952 bytes
    MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high

    Target ID:4
    Start time:16:37:43
    Start date:23/05/2022
    Path:C:\Windows\SysWOW64\rundll32.exe
    Wow64 process (32bit):true
    Commandline:rundll32.exe C:\Users\user\Desktop\400000.dll,DllRegisterServer
    Imagebase:0xef0000
    File size:61952 bytes
    MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high

    No disassembly