Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
wlbsctrl.dll

Overview

General Information

Sample Name:wlbsctrl.dll
Analysis ID:651262
MD5:8b2356cc4b0a382e79dcd4a844839e91
SHA1:ffb6a64c9996aa9e14ab69791f610babf98784c5
SHA256:1e57baa7d7c987aebd09b43788e9388c89a1cb9e89b4cbad24a8662e606d62f2
Infos:

Detection

Score:26
Range:0 - 100
Whitelisted:false
Confidence:60%

Signatures

Contains functionality to detect sleep reduction / modifications
Found inlined nop instructions (likely shell or obfuscated code)
Sample file is different than original file name gathered from version info
Contains functionality to check if a debugger is running (IsDebuggerPresent)
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
PE file contains sections with non-standard names
Detected potential crypto function
Contains functionality to call native functions
Contains functionality to detect sandboxes (mouse cursor move detection)
May check if the current machine is a sandbox (GetTickCount - Sleep)
Program does not show much activity (idle)
Creates a process in suspended mode (likely to inject code)

Classification

Analysis Advice

Sample monitors window changes (e.g. starting applications), analyze the sample with the 'Simulates keyboard and window changes' cookbook
Sample may be VM or Sandbox-aware, try analysis on a native machine
  • System is w10x64
  • loaddll64.exe (PID: 6288 cmdline: loaddll64.exe "C:\Users\user\Desktop\wlbsctrl.dll" MD5: 4E8A40CAD6CCC047914E3A7830A2D8AA)
    • cmd.exe (PID: 6296 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\wlbsctrl.dll",#1 MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
      • rundll32.exe (PID: 6316 cmdline: rundll32.exe "C:\Users\user\Desktop\wlbsctrl.dll",#1 MD5: 73C519F050C20580F8A62C849D49215A)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results
Source: wlbsctrl.dllStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
Source: Binary string: C:\Users\lemmy\Desktop\shellcodeless\syscall-xll-SecMods\x64\DLL\WhackAMole.pdb source: loaddll64.exe, 00000000.00000002.260656685.00007FFFE272A000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000002.00000002.264137592.00007FFFE272A000.00000002.00000001.01000000.00000003.sdmp, wlbsctrl.dll
Source: C:\Windows\System32\loaddll64.exeCode function: 4x nop then dec eax
Source: C:\Windows\System32\rundll32.exeCode function: 4x nop then dec eax
Source: wlbsctrl.dllBinary or memory string: OriginalFilenameOfficev1 vs wlbsctrl.dll
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFFE2721140
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFFE272102D
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001F279CA398A
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001F279C9C0CA
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001F279CAB46A
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001F279CA93DA
Source: C:\Windows\System32\rundll32.exeCode function: 2_2_000001D07AA1B46A
Source: C:\Windows\System32\rundll32.exeCode function: 2_2_000001D07AA0C0CA
Source: C:\Windows\System32\rundll32.exeCode function: 2_2_000001D07AA193DA
Source: C:\Windows\System32\rundll32.exeCode function: 2_2_000001D07AA1398A
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFFE2721140 GetModuleHandleA,memset,GetCurrentProcess,NtAddBootEntry,NtAddBootEntry,NtAddBootEntry,NtAddBootEntry,CloseHandle,
Source: wlbsctrl.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Windows\System32\loaddll64.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\wlbsctrl.dll",#1
Source: unknownProcess created: C:\Windows\System32\loaddll64.exe loaddll64.exe "C:\Users\user\Desktop\wlbsctrl.dll"
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\wlbsctrl.dll",#1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\wlbsctrl.dll",#1
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\wlbsctrl.dll",#1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\wlbsctrl.dll",#1
Source: classification engineClassification label: sus26.evad.winDLL@5/0@0/0
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFFE2722B00 GetTickCount,Sleep,GetCursorPos,Sleep,GetCursorPos,GetDiskFreeSpaceExA,GetModuleHandleA,GetProcAddress,GlobalMemoryStatusEx,K32EnumProcesses,EnumProcesses,Sleep,
Source: wlbsctrl.dllStatic PE information: Image base 0x180000000 > 0x60000000
Source: wlbsctrl.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: wlbsctrl.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: wlbsctrl.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: wlbsctrl.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: wlbsctrl.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: wlbsctrl.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: wlbsctrl.dllStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
Source: wlbsctrl.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: C:\Users\lemmy\Desktop\shellcodeless\syscall-xll-SecMods\x64\DLL\WhackAMole.pdb source: loaddll64.exe, 00000000.00000002.260656685.00007FFFE272A000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000002.00000002.264137592.00007FFFE272A000.00000002.00000001.01000000.00000003.sdmp, wlbsctrl.dll
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001F279CB2850 push ecx; retf 003Fh
Source: C:\Windows\System32\rundll32.exeCode function: 2_2_000001D07AA22850 push ecx; retf 003Fh
Source: wlbsctrl.dllStatic PE information: section name: .00cfg
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX

Malware Analysis System Evasion

barindex
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFFE27211F9
Source: C:\Windows\System32\loaddll64.exe TID: 6292Thread sleep time: -120000s >= -30000s
Source: C:\Windows\System32\loaddll64.exeCode function: GetTickCount,Sleep,GetCursorPos,Sleep,GetCursorPos,GetDiskFreeSpaceExA,GetModuleHandleA,GetProcAddress,GlobalMemoryStatusEx,K32EnumProcesses,EnumProcesses,Sleep,
Source: C:\Windows\System32\loaddll64.exeCode function: GetCursorPos,Sleep,GetCursorPos,IsProcessorFeaturePresent,capture_current_context,
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFFE27211F9
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Windows\System32\loaddll64.exeProcess information queried: ProcessInformation
Source: C:\Windows\System32\loaddll64.exeThread delayed: delay time: 120000
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFFE27211EA IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFFE27211EA IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\wlbsctrl.dll",#1
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFFE2721186 __security_init_cookie,GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management InstrumentationPath Interception11
Process Injection
1
Rundll32
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
Exfiltration Over Other Network Medium1
Encrypted Channel
Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts12
Virtualization/Sandbox Evasion
LSASS Memory13
Security Software Discovery
Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)11
Process Injection
Security Account Manager1
Process Discovery
SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)2
Obfuscated Files or Information
NTDS12
Virtualization/Sandbox Evasion
Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets1
Application Window Discovery
SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
Replication Through Removable MediaLaunchdRc.commonRc.commonSteganographyCached Domain Credentials3
System Information Discovery
VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 651262 Sample: wlbsctrl.dll Startdate: 23/06/2022 Architecture: WINDOWS Score: 26 6 loaddll64.exe 1 2->6         started        signatures3 13 Contains functionality to detect sleep reduction / modifications 6->13 9 cmd.exe 1 6->9         started        process4 process5 11 rundll32.exe 9->11         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos
Joe Sandbox Version:35.0.0 Citrine
Analysis ID:651262
Start date and time: 23/06/202218:13:122022-06-23 18:13:12 +02:00
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 7m 20s
Hypervisor based Inspection enabled:false
Report type:light
Sample file name:wlbsctrl.dll
Cookbook file name:default.jbs
Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
Run name:Run with higher sleep bypass
Number of analysed new started processes analysed:30
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • HDC enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Detection:SUS
Classification:sus26.evad.winDLL@5/0@0/0
EGA Information:
  • Successful, ratio: 100%
HDC Information:
  • Successful, ratio: 19.6% (good quality ratio 3.5%)
  • Quality average: 13.8%
  • Quality standard deviation: 31.9%
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 0
  • Number of non-executed functions: 0
Cookbook Comments:
  • Found application associated with file extension: .dll
  • Adjust boot time
  • Enable AMSI
  • Sleeps bigger than 300000ms are automatically reduced to 1000ms
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
  • Excluded domains from analysis (whitelisted): www.bing.com, ris.api.iris.microsoft.com, fs.microsoft.com, store-images.s-microsoft.com, login.live.com, sls.update.microsoft.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
  • Not all processes where analyzed, report is missing behavior information
  • Report size getting too big, too many NtWriteVirtualMemory calls found.
No simulations
No context
No context
No context
No context
No context
No created / dropped files found
File type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
Entropy (8bit):2.301165268606333
TrID:
  • Win64 Dynamic Link Library (generic) (102004/3) 86.43%
  • Win64 Executable (generic) (12005/4) 10.17%
  • Generic Win/DOS Executable (2004/3) 1.70%
  • DOS Executable Generic (2002/1) 1.70%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.01%
File name:wlbsctrl.dll
File size:775168
MD5:8b2356cc4b0a382e79dcd4a844839e91
SHA1:ffb6a64c9996aa9e14ab69791f610babf98784c5
SHA256:1e57baa7d7c987aebd09b43788e9388c89a1cb9e89b4cbad24a8662e606d62f2
SHA512:273c11f50ce23d01108c7edf484f10fc7d318cd89fcc51baf7f2721f1655340b0167214498f5e08a9e7fdae9e656f6f516a7eff7a25e7151e1f0ea5fc5d71ba0
SSDEEP:12288:FjwnXutNmopfRYxaKHFiPTLJsaVHct37frld/ibWcccccccccI6gRThD:
TLSH:59F4B75A0823D211D8244C3196377AC66F1672E9776C27D3F6A92FA2C1390C1AD77F3A
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........{Fv.(Fv.(Fv.(O.k(Bv.(...)Dv.(R..)Cv.(Fv.(pv.(...)Jv.(...)Nv.(...)Bv.(...)Gv.(...(Gv.(Fvo(Gv.(...)Gv.(RichFv.(...............
Icon Hash:74f0e4ecccdce0e4
Entrypoint:0x18000100a
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x180000000
Subsystem:windows gui
Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, DLL
DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
Time Stamp:0x62ACC1D8 [Fri Jun 17 18:03:04 2022 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:6
OS Version Minor:0
File Version Major:6
File Version Minor:0
Subsystem Version Major:6
Subsystem Version Minor:0
Import Hash:05dcd6eab6e64f86dc1e816425be7b14
Instruction
jmp 00007F7144AA6612h
jmp 00007F7144AA6AF9h
jmp 00007F7144AA568Ch
jmp 00007F7144AA6B67h
jmp 00007F7144AA5852h
jmp 00007F7144AA7385h
jmp 00007F7144AA75A4h
jmp 00007F7144AA44F3h
jmp 00007F7144AA6DA2h
jmp 00007F7144AA6B4Dh
jmp 00007F7144AAA9C4h
jmp 00007F7144AA7583h
jmp 00007F7144AA7592h
jmp 00007F7144AA5595h
jmp 00007F7144AAA990h
jmp 00007F7144AA87CBh
jmp 00007F7144AA5B82h
jmp 00007F7144AAAA01h
jmp 00007F7144AA60FCh
jmp 00007F7144AA731Bh
jmp 00007F7144AA7562h
jmp 00007F7144AA6C6Dh
jmp 00007F7144AA8788h
jmp 00007F7144AA6053h
jmp 00007F7144AA7546h
jmp 00007F7144AAAA39h
jmp 00007F7144AA597Ch
jmp 00007F7144AA5F37h
jmp 00007F7144AAA8EAh
jmp 00007F7144AA6E59h
jmp 00007F7144AA7534h
jmp 00007F7144AA6A67h
jmp 00007F7144AAA886h
jmp 00007F7144AA6A59h
jmp 00007F7144AA6CBCh
jmp 00007F7144AA4EC7h
jmp 00007F7144AAAA22h
jmp 00007F7144AA6AC9h
jmp 00007F7144AA56CCh
jmp 00007F7144AA4203h
Programming Language:
  • [IMP] VS2008 SP1 build 30729
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0xbe3b00x78.idata
IMAGE_DIRECTORY_ENTRY_RESOURCE0xc10000x890.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0xbd0000x420.pdata
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0xc20000x40.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0xab640x38.rdata
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0xb0a00x28.rdata
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xaba00x138.rdata
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0xbe0000x3b0.idata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x89b50x8a00False0.24363111413043478data3.5100227973693183IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rdata0xa0000x1f620x2000False0.1304931640625data1.5044615193257005IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0xc0000xb05390xafe00False0.1482459355010661data2.016608344146886IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.pdata0xbd0000x5ac0x600False0.3919270833333333data3.213440260810703IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.idata0xbe0000xe3d0x1000False0.23828125data3.0459227597586005IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.tls0xbf0000x3090x400False0.021484375data0.011173818721219527IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.00cfg0xc00000x1510x200False0.0546875data0.330964730370671IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.rsrc0xc10000x8900xa00False0.2640625data2.6030848233720585IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0xc20000x1f10x200False0.14453125data0.7368777605793444IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountry
RT_VERSION0xc11c00x354dataEnglishUnited States
RT_MANIFEST0xc15180x17dXML 1.0 document textEnglishUnited States
DLLImport
KERNEL32.dllCreateFileA, GetDiskFreeSpaceExA, CloseHandle, Sleep, GetCurrentProcess, GetTickCount, GetModuleHandleA, GetProcAddress, CreateFileMappingA, K32EnumProcesses, K32GetModuleInformation, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, SetEvent, ResetEvent, WaitForSingleObjectEx, CreateEventW, GetModuleHandleW, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, IsDebuggerPresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetStartupInfoW, IsProcessorFeaturePresent, TerminateProcess, QueryPerformanceCounter, GetCurrentProcessId, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead
USER32.dllGetCursorPos
VCRUNTIME140.dllmemset, __C_specific_handler, __current_exception, __current_exception_context, __std_type_info_destroy_list
api-ms-win-crt-stdio-l1-1-0.dll__acrt_iob_func, __stdio_common_vfprintf
api-ms-win-crt-runtime-l1-1-0.dllterminate, _initterm_e, _seh_filter_dll, _configure_narrow_argv, _initialize_narrow_environment, _initialize_onexit_table, _register_onexit_function, _execute_onexit_table, _crt_atexit, _crt_at_quick_exit, _cexit, _initterm
Language of compilation systemCountry where language is spokenMap
EnglishUnited States
No network behavior found

Click to jump to process

Target ID:0
Start time:18:14:12
Start date:23/06/2022
Path:C:\Windows\System32\loaddll64.exe
Wow64 process (32bit):false
Commandline:loaddll64.exe "C:\Users\user\Desktop\wlbsctrl.dll"
Imagebase:0x7ff6d4fc0000
File size:140288 bytes
MD5 hash:4E8A40CAD6CCC047914E3A7830A2D8AA
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high

Target ID:1
Start time:18:14:13
Start date:23/06/2022
Path:C:\Windows\System32\cmd.exe
Wow64 process (32bit):false
Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\wlbsctrl.dll",#1
Imagebase:0x7ff7bb450000
File size:273920 bytes
MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high

Target ID:2
Start time:18:14:13
Start date:23/06/2022
Path:C:\Windows\System32\rundll32.exe
Wow64 process (32bit):false
Commandline:rundll32.exe "C:\Users\user\Desktop\wlbsctrl.dll",#1
Imagebase:0x7ff675c30000
File size:69632 bytes
MD5 hash:73C519F050C20580F8A62C849D49215A
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high

No disassembly