Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
activation.reg.exe

Overview

General Information

Sample Name:activation.reg.exe (renamed file extension from exe to dll)
Analysis ID:635341
MD5:e49b92466821b19645b618b6a09a6880
SHA1:b2bbafa02be38b07a4eb61049638ff86f0f8638b
SHA256:90a0e059cd3f4ed0c9fac00a88ea262988b4cd6635aeb23bb7f5aab64d6aca0a

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Uses 32bit PE files
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory

Classification

  • System is start
  • loaddll32.exe (PID: 7648 cmdline: loaddll32.exe "C:\Users\alfredo\Desktop\activation.reg.dll" MD5: 7DEB5DB86C0AC789123DEC286286B938)
    • cmd.exe (PID: 6804 cmdline: cmd.exe /C rundll32.exe "C:\Users\alfredo\Desktop\activation.reg.dll",#1 MD5: 4943BA1A9B41D69643F69685E35B2943)
      • rundll32.exe (PID: 7120 cmdline: rundll32.exe "C:\Users\alfredo\Desktop\activation.reg.dll",#1 MD5: D0432468FA4B7F66166C430E1334DBDA)
    • rundll32.exe (PID: 4228 cmdline: rundll32.exe C:\Users\alfredo\Desktop\activation.reg.dll,dummy MD5: D0432468FA4B7F66166C430E1334DBDA)
    • rundll32.exe (PID: 7468 cmdline: rundll32.exe "C:\Users\alfredo\Desktop\activation.reg.dll",dummy MD5: D0432468FA4B7F66166C430E1334DBDA)
  • rundll32.exe (PID: 6364 cmdline: C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding MD5: F68AF942FD7CCC0E7BAB1A2335D2AD26)
  • cleanup
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: activation.reg.exeVirustotal: Detection: 8%Perma Link
Source: activation.reg.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
Source: activation.reg.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT
Source: activation.reg.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\SysWOW64\SyncAppvPublishingServer.vbs
Source: activation.reg.exeVirustotal: Detection: 8%
Source: activation.reg.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
Source: classification engineClassification label: mal48.winEXE@10/1@0/0
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\alfredo\Desktop\activation.reg.dll,dummy
Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\alfredo\Desktop\activation.reg.dll"
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\alfredo\Desktop\activation.reg.dll",#1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\alfredo\Desktop\activation.reg.dll,dummy
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\alfredo\Desktop\activation.reg.dll",#1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\alfredo\Desktop\activation.reg.dll",dummy
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\alfredo\Desktop\activation.reg.dll",#1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\alfredo\Desktop\activation.reg.dll,dummy
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\alfredo\Desktop\activation.reg.dll",dummy
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\alfredo\Desktop\activation.reg.dll",#1
Source: unknownProcess created: C:\Windows\System32\rundll32.exe C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
Source: activation.reg.exeStatic file information: File size 6035976 > 1048576
Source: activation.reg.exeStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x546400
Source: activation.reg.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: activation.reg.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: activation.reg.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: activation.reg.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: activation.reg.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: activation.reg.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: activation.reg.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT
Source: activation.reg.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: activation.reg.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: activation.reg.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: activation.reg.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: activation.reg.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: activation.reg.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 120000
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\alfredo\Desktop\activation.reg.dll",#1
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management InstrumentationPath Interception11
Process Injection
1
Masquerading
OS Credential Dumping1
Virtualization/Sandbox Evasion
Remote ServicesData from Local SystemExfiltration Over Other Network MediumData ObfuscationEavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Rundll32
LSASS Memory1
System Information Discovery
Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
Virtualization/Sandbox Evasion
Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)11
Process Injection
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
activation.reg.exe9%VirustotalBrowse
activation.reg.exe0%MetadefenderBrowse
activation.reg.exe9%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos
Joe Sandbox Version:34.0.0 Boulder Opal
Analysis ID:635341
Start date and time: 27/05/202219:30:372022-05-27 19:30:37 +02:00
Joe Sandbox Product:CloudBasic
Hypervisor based Inspection enabled:false
Report type:full
Sample file name:activation.reg.exe (renamed file extension from exe to dll)
Cookbook file name:defaultwindowsinteractivecookbook.jbs
Number of analysed new started processes analysed:17
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • EGA enabled
Analysis Mode:stream
Analysis stop reason:Timeout
Detection:MAL
Classification:mal48.winEXE@10/1@0/0
Cookbook Comments:
  • Adjust boot time
  • Enable AMSI
  • Exclude process from analysis (whitelisted): SIHClient.exe, svchost.exe
  • Excluded domains from analysis (whitelisted): fs.microsoft.com, login.live.com, slscr.update.microsoft.com, nexusrules.officeapps.live.com
  • Not all processes where analyzed, report is missing behavior information
Process:C:\Windows\SysWOW64\rundll32.exe
File Type:ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):1504
Entropy (8bit):4.593124153231039
Encrypted:false
SSDEEP:
MD5:1036B168053FE25365402C8F4903335D
SHA1:3439C5DDE557FC629B70009296DDC2B5821791DF
SHA-256:7392CBE9B30701E83658892A9025F06FD1DFE2ECD1B6E5F670BD19F9034CD2F7
SHA-512:23F14F1732462E5F166162049C530E97236131C181E91781402FC2E9F092B7B646E2C26EDF55E8BB5E3005AB9B78FD7FE9E0783A14BDA46A0000186196E85A95
Malicious:false
Reputation:low
Preview:'---------------------------------------------------------------------------------------------..' Copyright: Microsoft Corp...'..' This script is designed to be used only for scheduled tasks(s)...' There is no extensive error check, and will not dump the output from the Powershell CmdLet...'..' Usage: SyncAppvPublishingServer {cmdline-args(passthrough to cmdlet)}..'---------------------------------------------------------------------------------------------....Option Explicit......Dim g_cmdArgs..g_cmdArgs = ""......' main entrance....' Enable error handling..On Error Resume Next....ParseCmdLine....if g_cmdArgs = "" Then...Wscript.echo "Command line arguments are required."...Wscript.quit 0..End If........Dim syncCmd..syncCmd = g_cmdArgs....Dim psCmd..psCmd = "powershell.exe -Command &{" & syncCmd & "}"......Dim WshShell..Set WshShell = WScript.CreateObject("WScript.Shell")..WshShell.Run psCmd, 0......' Reset error handling..On Error Goto 0..WScript.Quit 0.........'---------------------
File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
Entropy (8bit):7.85636255256613
TrID:
  • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
  • Generic Win/DOS Executable (2004/3) 0.20%
  • DOS Executable Generic (2002/1) 0.20%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:activation.reg.exe
File size:6035976
MD5:e49b92466821b19645b618b6a09a6880
SHA1:b2bbafa02be38b07a4eb61049638ff86f0f8638b
SHA256:90a0e059cd3f4ed0c9fac00a88ea262988b4cd6635aeb23bb7f5aab64d6aca0a
SHA512:745af8a642385353e806eb675792f2591f0c414378709a797fcafde66894bad8fa11ffcdbb503853849646ad8b1f5bec4c2db87c42af9541da783b00498b5431
SSDEEP:98304:mnjvqvbckqQludU/wVW3njOaInQR0yuVoQ9FQQNscWnjNOf28e24bUVO1EuMNs0:6vqvonQodSosqjQRQVnPQ+WnEfcsO1ET
TLSH:0F5633A075D1CC7BE2BA5431606C972988EEAE300F20DADBE7545DB34D356C1BE3A853
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........Dk4S%.gS%.gS%.gGN.f]%.gGN.f.%.g.P.f\%.g.P.fF%.g.P.f.%.gGN.fD%.gGN.fQ%.gGN.f^%.gS%.g.%.g.P.fQ%.g.P.fR%.g.P.gR%.gS%.gR%.g.P.fR%.
Icon Hash:74f0e4ecccdce0e4
Entrypoint:0x100098ce
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x10000000
Subsystem:windows gui
Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
DLL Characteristics:DYNAMIC_BASE, NX_COMPAT
Time Stamp:0x61FBE176 [Thu Feb 3 14:06:46 2022 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:6
OS Version Minor:0
File Version Major:6
File Version Minor:0
Subsystem Version Major:6
Subsystem Version Minor:0
Import Hash:96d3c2641591e37caeb685212dac8a26
Instruction
push ebp
mov ebp, esp
cmp dword ptr [ebp+0Ch], 01h
jne 00007F16DC4907E7h
call 00007F16DC490CFBh
push dword ptr [ebp+10h]
push dword ptr [ebp+0Ch]
push dword ptr [ebp+08h]
call 00007F16DC490693h
add esp, 0Ch
pop ebp
retn 000Ch
mov ecx, dword ptr [ebp-0Ch]
mov dword ptr fs:[00000000h], ecx
pop ecx
pop edi
pop edi
pop esi
pop ebx
mov esp, ebp
pop ebp
push ecx
ret
mov ecx, dword ptr [ebp-10h]
xor ecx, ebp
call 00007F16DC48FCF4h
jmp 00007F16DC4907C2h
push eax
push dword ptr fs:[00000000h]
lea eax, dword ptr [esp+0Ch]
sub esp, dword ptr [esp+0Ch]
push ebx
push esi
push edi
mov dword ptr [eax], ebp
mov ebp, eax
mov eax, dword ptr [10036054h]
xor eax, ebp
push eax
push dword ptr [ebp-04h]
mov dword ptr [ebp-04h], FFFFFFFFh
lea eax, dword ptr [ebp-0Ch]
mov dword ptr fs:[00000000h], eax
ret
push eax
push dword ptr fs:[00000000h]
lea eax, dword ptr [esp+0Ch]
sub esp, dword ptr [esp+0Ch]
push ebx
push esi
push edi
mov dword ptr [eax], ebp
mov ebp, eax
mov eax, dword ptr [10036054h]
xor eax, ebp
push eax
mov dword ptr [ebp-10h], eax
push dword ptr [ebp-04h]
mov dword ptr [ebp-04h], FFFFFFFFh
lea eax, dword ptr [ebp-0Ch]
mov dword ptr fs:[00000000h], eax
ret
push eax
push dword ptr fs:[00000000h]
lea eax, dword ptr [esp+0Ch]
sub esp, dword ptr [esp+0Ch]
push ebx
push esi
push edi
mov dword ptr [eax], ebp
mov ebp, eax
mov eax, dword ptr [00000054h]
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x355c00x48.rdata
IMAGE_DIRECTORY_ENTRY_IMPORT0x356080x78.rdata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x380000x546210.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x57f0000x1f00.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x333400x70.rdata
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x334800x18.rdata
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x333b00x40.rdata
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x270000x1b0.rdata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x257460x25800False0.5687890625data6.66228685301IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
.rdata0x270000xef800xf000False0.523795572917data5.65398004769IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0x360000x1fbc0x1000False0.20849609375DOS executable (block device driver)3.17515181057IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
.rsrc0x380000x5462100x546400unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0x57f0000x1f000x2000False0.756713867188data6.55565458928IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountry
BIN0x381100x5453c0dataEnglishUnited States
BIN0x57d4d00x5d0dataEnglishUnited States
BIN0x57daa00x5f0dataEnglishUnited States
RT_MANIFEST0x57e0900x17dXML 1.0 document textEnglishUnited States
DLLImport
KERNEL32.dllGetModuleFileNameA, SizeofResource, TerminateProcess, ExpandEnvironmentStringsA, InitializeCriticalSectionEx, FindResourceA, MultiByteToWideChar, GetLastError, LockResource, CloseHandle, RaiseException, LoadResource, DecodePointer, DeleteCriticalSection, CreateProcessA, GetModuleFileNameW, CreateMutexA, ReleaseMutex, GetProcAddress, WideCharToMultiByte, CreateDirectoryA, SetEndOfFile, WriteConsoleW, CreateFileW, SetStdHandle, GetProcessHeap, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineW, GetCommandLineA, GetOEMCP, GetACP, IsValidCodePage, FindNextFileW, FindFirstFileExW, FindClose, HeapReAlloc, HeapSize, ReadConsoleW, IsDebuggerPresent, OutputDebugStringW, EnterCriticalSection, LeaveCriticalSection, EncodePointer, LocalFree, LCMapStringEx, GetStringTypeW, GetCPInfo, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, IsProcessorFeaturePresent, InitializeCriticalSectionAndSpinCount, SetEvent, ResetEvent, WaitForSingleObjectEx, CreateEventW, GetModuleHandleW, GetStartupInfoW, QueryPerformanceCounter, GetCurrentProcessId, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, RtlUnwind, InterlockedFlushSList, SetLastError, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, FreeLibrary, LoadLibraryExW, VirtualQuery, ExitProcess, GetModuleHandleExW, LCMapStringW, GetLocaleInfoW, IsValidLocale, GetUserDefaultLCID, EnumSystemLocalesW, GetFileSizeEx, SetFilePointerEx, GetStdHandle, GetFileType, FlushFileBuffers, WriteFile, GetConsoleOutputCP, GetConsoleMode, HeapFree, HeapAlloc, ReadFile
USER32.dllGetSystemMetrics
ole32.dllCoUninitialize, CoInitializeSecurity, CoInitializeEx, CoCreateInstance
OLEAUT32.dllVariantInit, SysFreeString, SysAllocString, VariantClear
SHLWAPI.dllPathFileExistsA
NameOrdinalAddress
dummy10x10003a30
Language of compilation systemCountry where language is spokenMap
EnglishUnited States