Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
pmfoxWgt1q

Overview

General Information

Sample Name:pmfoxWgt1q (renamed file extension from none to dll)
Analysis ID:677709
MD5:6300568039c3d35aaa0fc0f59a6089df
SHA1:bef385861ab3ad1bf5c1c76384ccf45a75c80ed5
SHA256:55d87fda07c8550c926974930480cf4899fed628ef544164519984efa447014a
Infos:

Detection

Emotet
Score:64
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Yara detected Emotet
Multi AV Scanner detection for submitted file
Tries to load missing DLLs
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query locales information (e.g. system language)
Uses code obfuscation techniques (call, push, ret)
PE file contains sections with non-standard names
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Found potential string decryption / allocating functions
Registers a DLL
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Program does not show much activity (idle)
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • loaddll64.exe (PID: 5168 cmdline: loaddll64.exe "C:\Users\user\Desktop\pmfoxWgt1q.dll" MD5: 4E8A40CAD6CCC047914E3A7830A2D8AA)
    • cmd.exe (PID: 5176 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\pmfoxWgt1q.dll",#1 MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
      • rundll32.exe (PID: 5196 cmdline: rundll32.exe "C:\Users\user\Desktop\pmfoxWgt1q.dll",#1 MD5: 73C519F050C20580F8A62C849D49215A)
    • regsvr32.exe (PID: 5184 cmdline: regsvr32.exe /s C:\Users\user\Desktop\pmfoxWgt1q.dll MD5: D78B75FC68247E8A63ACBA846182740E)
    • rundll32.exe (PID: 5212 cmdline: rundll32.exe C:\Users\user\Desktop\pmfoxWgt1q.dll,DllRegisterServer MD5: 73C519F050C20580F8A62C849D49215A)
    • rundll32.exe (PID: 5316 cmdline: rundll32.exe C:\Users\user\Desktop\pmfoxWgt1q.dll,YAeJyEAYL7F4eDck6YUaf MD5: 73C519F050C20580F8A62C849D49215A)
    • rundll32.exe (PID: 5332 cmdline: rundll32.exe C:\Users\user\Desktop\pmfoxWgt1q.dll,fmFkmnQYB5TC2Sq5NGFkK MD5: 73C519F050C20580F8A62C849D49215A)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
pmfoxWgt1q.dllJoeSecurity_Emotet_2Yara detected EmotetJoe Security
    SourceRuleDescriptionAuthorStrings
    00000004.00000002.882940563.00007FFC739F1000.00000020.00000001.01000000.00000003.sdmpJoeSecurity_Emotet_2Yara detected EmotetJoe Security
      00000005.00000002.882553231.00007FFC739F1000.00000020.00000001.01000000.00000003.sdmpJoeSecurity_Emotet_2Yara detected EmotetJoe Security
        00000006.00000002.889058366.00007FFC739F1000.00000020.00000001.01000000.00000003.sdmpJoeSecurity_Emotet_2Yara detected EmotetJoe Security
          00000002.00000002.881462250.00007FFC739F1000.00000020.00000001.01000000.00000003.sdmpJoeSecurity_Emotet_2Yara detected EmotetJoe Security
            00000003.00000002.882940823.00007FFC739F1000.00000020.00000001.01000000.00000003.sdmpJoeSecurity_Emotet_2Yara detected EmotetJoe Security
              Click to see the 1 entries
              SourceRuleDescriptionAuthorStrings
              5.2.rundll32.exe.7ffc739f0000.0.unpackJoeSecurity_Emotet_2Yara detected EmotetJoe Security
                2.2.regsvr32.exe.7ffc739f0000.0.unpackJoeSecurity_Emotet_2Yara detected EmotetJoe Security
                  4.2.rundll32.exe.7ffc739f0000.0.unpackJoeSecurity_Emotet_2Yara detected EmotetJoe Security
                    3.2.rundll32.exe.7ffc739f0000.0.unpackJoeSecurity_Emotet_2Yara detected EmotetJoe Security
                      0.2.loaddll64.exe.7ffc739f0000.0.unpackJoeSecurity_Emotet_2Yara detected EmotetJoe Security
                        Click to see the 1 entries
                        No Sigma rule has matched
                        No Snort rule has matched

                        Click to jump to signature section

                        Show All Signature Results

                        AV Detection

                        barindex
                        Source: pmfoxWgt1q.dllAvira: detected
                        Source: pmfoxWgt1q.dllMetadefender: Detection: 34%Perma Link
                        Source: pmfoxWgt1q.dllReversingLabs: Detection: 72%
                        Source: pmfoxWgt1q.dllStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
                        Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFC73A78D1C FindFirstFileExW,
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFC73A78D1C FindFirstFileExW,

                        E-Banking Fraud

                        barindex
                        Source: Yara matchFile source: pmfoxWgt1q.dll, type: SAMPLE
                        Source: Yara matchFile source: 5.2.rundll32.exe.7ffc739f0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 2.2.regsvr32.exe.7ffc739f0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 4.2.rundll32.exe.7ffc739f0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 3.2.rundll32.exe.7ffc739f0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.loaddll64.exe.7ffc739f0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 6.2.rundll32.exe.7ffc739f0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000004.00000002.882940563.00007FFC739F1000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000005.00000002.882553231.00007FFC739F1000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000006.00000002.889058366.00007FFC739F1000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000002.00000002.881462250.00007FFC739F1000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000003.00000002.882940823.00007FFC739F1000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.880853299.00007FFC739F1000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dll
                        Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFC73A77C5C
                        Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFC73A6CBA9
                        Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFC73A75BD4
                        Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFC73A6C1FC
                        Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFC73A77198
                        Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFC73A7B9CC
                        Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFC73A70124
                        Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFC73A7A728
                        Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFC73A71DB0
                        Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFC73A78D1C
                        Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFC73A6BD28
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFC73A77C5C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFC73A6CBA9
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFC73A75BD4
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFC73A6C1FC
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFC73A77198
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFC73A7B9CC
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFC73A70124
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFC73A7A728
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFC73A71DB0
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFC73A78D1C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFC73A6BD28
                        Source: C:\Windows\System32\loaddll64.exeCode function: String function: 00007FFC73A60620 appears 2834 times
                        Source: C:\Windows\System32\regsvr32.exeCode function: String function: 00007FFC73A60620 appears 2834 times
                        Source: pmfoxWgt1q.dllMetadefender: Detection: 34%
                        Source: pmfoxWgt1q.dllReversingLabs: Detection: 72%
                        Source: pmfoxWgt1q.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        Source: C:\Windows\System32\loaddll64.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\pmfoxWgt1q.dll",#1
                        Source: unknownProcess created: C:\Windows\System32\loaddll64.exe loaddll64.exe "C:\Users\user\Desktop\pmfoxWgt1q.dll"
                        Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\pmfoxWgt1q.dll",#1
                        Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\pmfoxWgt1q.dll
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\pmfoxWgt1q.dll",#1
                        Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\pmfoxWgt1q.dll,DllRegisterServer
                        Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\pmfoxWgt1q.dll,YAeJyEAYL7F4eDck6YUaf
                        Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\pmfoxWgt1q.dll,fmFkmnQYB5TC2Sq5NGFkK
                        Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\pmfoxWgt1q.dll",#1
                        Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\pmfoxWgt1q.dll
                        Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\pmfoxWgt1q.dll,DllRegisterServer
                        Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\pmfoxWgt1q.dll,YAeJyEAYL7F4eDck6YUaf
                        Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\pmfoxWgt1q.dll,fmFkmnQYB5TC2Sq5NGFkK
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\pmfoxWgt1q.dll",#1
                        Source: classification engineClassification label: mal64.troj.winDLL@13/0@0/0
                        Source: pmfoxWgt1q.dllStatic PE information: Image base 0x180000000 > 0x60000000
                        Source: pmfoxWgt1q.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                        Source: pmfoxWgt1q.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                        Source: pmfoxWgt1q.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                        Source: pmfoxWgt1q.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                        Source: pmfoxWgt1q.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                        Source: pmfoxWgt1q.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                        Source: pmfoxWgt1q.dllStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
                        Source: pmfoxWgt1q.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                        Source: pmfoxWgt1q.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                        Source: pmfoxWgt1q.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                        Source: pmfoxWgt1q.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                        Source: pmfoxWgt1q.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                        Source: pmfoxWgt1q.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                        Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFC73A6DB15 push 830F0001h; retn 0000h
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFC73A6DB15 push 830F0001h; retn 0000h
                        Source: pmfoxWgt1q.dllStatic PE information: section name: _RDATA
                        Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\pmfoxWgt1q.dll
                        Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                        Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
                        Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFC73A78D1C FindFirstFileExW,
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFC73A78D1C FindFirstFileExW,
                        Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFC73A69F4C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                        Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFC73A7A0AC GetProcessHeap,
                        Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
                        Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFC73A64140 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                        Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFC73A69F4C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                        Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFC73A64500 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFC73A64140 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFC73A69F4C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFC73A64500 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\pmfoxWgt1q.dll",#1
                        Source: C:\Windows\System32\loaddll64.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,
                        Source: C:\Windows\System32\loaddll64.exeCode function: GetLocaleInfoW,
                        Source: C:\Windows\System32\loaddll64.exeCode function: EnumSystemLocalesW,
                        Source: C:\Windows\System32\loaddll64.exeCode function: EnumSystemLocalesW,
                        Source: C:\Windows\System32\loaddll64.exeCode function: EnumSystemLocalesW,GetUserDefaultLCID,ProcessCodePage,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,
                        Source: C:\Windows\System32\loaddll64.exeCode function: EnumSystemLocalesW,
                        Source: C:\Windows\System32\loaddll64.exeCode function: GetLocaleInfoW,
                        Source: C:\Windows\System32\loaddll64.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,
                        Source: C:\Windows\System32\loaddll64.exeCode function: TranslateName,TranslateName,GetACP,IsValidCodePage,GetLocaleInfoW,
                        Source: C:\Windows\System32\loaddll64.exeCode function: GetLocaleInfoW,
                        Source: C:\Windows\System32\regsvr32.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,
                        Source: C:\Windows\System32\regsvr32.exeCode function: GetLocaleInfoW,
                        Source: C:\Windows\System32\regsvr32.exeCode function: EnumSystemLocalesW,
                        Source: C:\Windows\System32\regsvr32.exeCode function: EnumSystemLocalesW,
                        Source: C:\Windows\System32\regsvr32.exeCode function: EnumSystemLocalesW,GetUserDefaultLCID,ProcessCodePage,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,
                        Source: C:\Windows\System32\regsvr32.exeCode function: EnumSystemLocalesW,
                        Source: C:\Windows\System32\regsvr32.exeCode function: GetLocaleInfoW,
                        Source: C:\Windows\System32\regsvr32.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,
                        Source: C:\Windows\System32\regsvr32.exeCode function: TranslateName,TranslateName,GetACP,IsValidCodePage,GetLocaleInfoW,
                        Source: C:\Windows\System32\regsvr32.exeCode function: GetLocaleInfoW,
                        Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFC73A78300 cpuid
                        Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFC73A64404 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,

                        Stealing of Sensitive Information

                        barindex
                        Source: Yara matchFile source: pmfoxWgt1q.dll, type: SAMPLE
                        Source: Yara matchFile source: 5.2.rundll32.exe.7ffc739f0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 2.2.regsvr32.exe.7ffc739f0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 4.2.rundll32.exe.7ffc739f0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 3.2.rundll32.exe.7ffc739f0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.loaddll64.exe.7ffc739f0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 6.2.rundll32.exe.7ffc739f0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000004.00000002.882940563.00007FFC739F1000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000005.00000002.882553231.00007FFC739F1000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000006.00000002.889058366.00007FFC739F1000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000002.00000002.881462250.00007FFC739F1000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000003.00000002.882940823.00007FFC739F1000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.880853299.00007FFC739F1000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
                        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                        Valid AccountsWindows Management Instrumentation1
                        DLL Side-Loading
                        11
                        Process Injection
                        1
                        Regsvr32
                        OS Credential Dumping1
                        System Time Discovery
                        Remote Services1
                        Archive Collected Data
                        Exfiltration Over Other Network Medium1
                        Encrypted Channel
                        Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                        Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                        DLL Side-Loading
                        1
                        Rundll32
                        LSASS Memory2
                        Security Software Discovery
                        Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                        Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)11
                        Process Injection
                        Security Account Manager1
                        File and Directory Discovery
                        SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                        Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
                        Deobfuscate/Decode Files or Information
                        NTDS22
                        System Information Discovery
                        Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                        Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                        DLL Side-Loading
                        LSA SecretsRemote System DiscoverySSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                        Replication Through Removable MediaLaunchdRc.commonRc.common2
                        Obfuscated Files or Information
                        Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                        Hide Legend

                        Legend:

                        • Process
                        • Signature
                        • Created File
                        • DNS/IP Info
                        • Is Dropped
                        • Is Windows Process
                        • Number of created Registry Values
                        • Number of created Files
                        • Visual Basic
                        • Delphi
                        • Java
                        • .Net C# or VB.NET
                        • C, C++ or other language
                        • Is malicious
                        • Internet
                        behaviorgraph top1 signatures2 2 Behavior Graph ID: 677709 Sample: pmfoxWgt1q Startdate: 02/08/2022 Architecture: WINDOWS Score: 64 19 Antivirus / Scanner detection for submitted sample 2->19 21 Multi AV Scanner detection for submitted file 2->21 23 Yara detected Emotet 2->23 7 loaddll64.exe 1 2->7         started        process3 process4 9 cmd.exe 1 7->9         started        11 rundll32.exe 7->11         started        13 rundll32.exe 7->13         started        15 2 other processes 7->15 process5 17 rundll32.exe 9->17         started       

                        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                        windows-stand
                        SourceDetectionScannerLabelLink
                        pmfoxWgt1q.dll34%MetadefenderBrowse
                        pmfoxWgt1q.dll72%ReversingLabsWin64.Trojan.Emotet
                        pmfoxWgt1q.dll100%AviraTR/Kryptik.assob
                        No Antivirus matches
                        No Antivirus matches
                        No Antivirus matches
                        No Antivirus matches
                        No contacted domains info
                        No contacted IP infos
                        Joe Sandbox Version:35.0.0 Citrine
                        Analysis ID:677709
                        Start date and time: 02/08/202222:11:312022-08-02 22:11:31 +02:00
                        Joe Sandbox Product:CloudBasic
                        Overall analysis duration:0h 11m 15s
                        Hypervisor based Inspection enabled:false
                        Report type:light
                        Sample file name:pmfoxWgt1q (renamed file extension from none to dll)
                        Cookbook file name:default.jbs
                        Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                        Number of analysed new started processes analysed:19
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • HDC enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Detection:MAL
                        Classification:mal64.troj.winDLL@13/0@0/0
                        EGA Information:Failed
                        HDC Information:Failed
                        HCA Information:
                        • Successful, ratio: 100%
                        • Number of executed functions: 0
                        • Number of non-executed functions: 0
                        Cookbook Comments:
                        • Adjust boot time
                        • Enable AMSI
                        • Override analysis time to 240s for rundll32
                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, WMIADAP.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                        • Excluded domains from analysis (whitelisted): fs.microsoft.com, ctldl.windowsupdate.com
                        • Not all processes where analyzed, report is missing behavior information
                        • Report creation exceeded maximum time and may have missing disassembly code information.
                        • VT rate limit hit for: pmfoxWgt1q.dll
                        No simulations
                        No context
                        No context
                        No context
                        No context
                        No context
                        No created / dropped files found
                        File type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                        Entropy (8bit):6.627867897691371
                        TrID:
                        • Win64 Dynamic Link Library (generic) (102004/3) 86.43%
                        • Win64 Executable (generic) (12005/4) 10.17%
                        • Generic Win/DOS Executable (2004/3) 1.70%
                        • DOS Executable Generic (2002/1) 1.70%
                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.01%
                        File name:pmfoxWgt1q.dll
                        File size:866816
                        MD5:6300568039c3d35aaa0fc0f59a6089df
                        SHA1:bef385861ab3ad1bf5c1c76384ccf45a75c80ed5
                        SHA256:55d87fda07c8550c926974930480cf4899fed628ef544164519984efa447014a
                        SHA512:2150699d801fe40d2fb7675799b85220ead4dde32b8fcd3e073b2765657a15259156f4d35b2b3b8386ebe3167e484452162fdb5246230343d7d3096753d0fbc3
                        SSDEEP:24576:sPMTg9U3G0ISDKvSeqfZaePWAy7ympE3:BTg9UXRD2SeqfZZi2m
                        TLSH:FD05283FD6590A62FC1F1235C642894BF591FA0223145D9EB3AE0A58DF3BE48F9A5F10
                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......K._]..1...1...1...2...1...4...1...5...1.m.5...1.m.2...1.m.4.I.1...0...1...0.l.1...8...1...1...1.......1.......1...3...1.Rich..1
                        Icon Hash:74f0e4ecccdce0e4
                        Entrypoint:0x180073c20
                        Entrypoint Section:.text
                        Digitally signed:false
                        Imagebase:0x180000000
                        Subsystem:windows gui
                        Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, DLL
                        DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
                        Time Stamp:0x6284F4EB [Wed May 18 13:30:19 2022 UTC]
                        TLS Callbacks:
                        CLR (.Net) Version:
                        OS Version Major:6
                        OS Version Minor:0
                        File Version Major:6
                        File Version Minor:0
                        Subsystem Version Major:6
                        Subsystem Version Minor:0
                        Import Hash:5c49ce3660f3f487a221bd7888983b24
                        Instruction
                        dec eax
                        mov dword ptr [esp+08h], ebx
                        dec eax
                        mov dword ptr [esp+10h], esi
                        push edi
                        dec eax
                        sub esp, 20h
                        dec ecx
                        mov edi, eax
                        mov ebx, edx
                        dec eax
                        mov esi, ecx
                        cmp edx, 01h
                        jne 00007F0EE09B8387h
                        call 00007F0EE09B8B48h
                        dec esp
                        mov eax, edi
                        mov edx, ebx
                        dec eax
                        mov ecx, esi
                        dec eax
                        mov ebx, dword ptr [esp+30h]
                        dec eax
                        mov esi, dword ptr [esp+38h]
                        dec eax
                        add esp, 20h
                        pop edi
                        jmp 00007F0EE09B8214h
                        int3
                        int3
                        int3
                        dec eax
                        sub esp, 28h
                        call 00007F0EE09B8F8Ch
                        test eax, eax
                        je 00007F0EE09B83A3h
                        dec eax
                        mov eax, dword ptr [00000030h]
                        dec eax
                        mov ecx, dword ptr [eax+08h]
                        jmp 00007F0EE09B8387h
                        dec eax
                        cmp ecx, eax
                        je 00007F0EE09B8396h
                        xor eax, eax
                        dec eax
                        cmpxchg dword ptr [000309E4h], ecx
                        jne 00007F0EE09B8370h
                        xor al, al
                        dec eax
                        add esp, 28h
                        ret
                        mov al, 01h
                        jmp 00007F0EE09B8379h
                        int3
                        int3
                        int3
                        dec eax
                        sub esp, 28h
                        call 00007F0EE09B8F50h
                        test eax, eax
                        je 00007F0EE09B8389h
                        call 00007F0EE09B8D9Bh
                        jmp 00007F0EE09B839Bh
                        call 00007F0EE09B65DCh
                        mov ecx, eax
                        call 00007F0EE09C43A1h
                        test eax, eax
                        je 00007F0EE09B8386h
                        xor al, al
                        jmp 00007F0EE09B8389h
                        call 00007F0EE09C4760h
                        mov al, 01h
                        dec eax
                        add esp, 28h
                        ret
                        dec eax
                        sub esp, 28h
                        xor ecx, ecx
                        call 00007F0EE09B84C2h
                        test al, al
                        setne al
                        dec eax
                        add esp, 28h
                        ret
                        int3
                        int3
                        NameVirtual AddressVirtual Size Is in Section
                        IMAGE_DIRECTORY_ENTRY_EXPORT0xa1de00xb0.rdata
                        IMAGE_DIRECTORY_ENTRY_IMPORT0xa1e900x3c.rdata
                        IMAGE_DIRECTORY_ENTRY_RESOURCE0xa90000x2ea20.rsrc
                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0xa60000x1fe0.pdata
                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                        IMAGE_DIRECTORY_ENTRY_BASERELOC0xd80000x914.reloc
                        IMAGE_DIRECTORY_ENTRY_DEBUG0x9e6e00x38.rdata
                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x9e5a00x140.rdata
                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IAT0x910000x2c0.rdata
                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                        NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                        .text0x10000x8f2600x8f400False0.3861392888307155data6.011164043310419IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        .rdata0x910000x117ce0x11800False0.4552734375data5.141486524366641IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .data0xa30000x29400x1200False0.17078993055555555DOS executable (block device driver)2.811233564125507IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .pdata0xa60000x1fe00x2000False0.48046875data5.507319499503956IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        _RDATA0xa80000x15c0x200False0.40625data3.363296824709797IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .rsrc0xa90000x2ea200x2ec00False0.8596361129679144data7.814152582292596IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .reloc0xd80000x9140xa00False0.4828125data5.246908112940421IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                        NameRVASizeTypeLanguageCountry
                        RT_FONTDIR0xa90a00x2e800dataEnglishUnited States
                        RT_MANIFEST0xd78a00x17dXML 1.0 document textEnglishUnited States
                        DLLImport
                        ole32.dllCoTaskMemFree, CoLoadLibrary, CoTaskMemAlloc
                        KERNEL32.dllExitProcess, WriteConsoleW, CreateFileW, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSectionEx, DeleteCriticalSection, EncodePointer, DecodePointer, MultiByteToWideChar, WideCharToMultiByte, LCMapStringEx, GetStringTypeW, GetCPInfo, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, TerminateProcess, IsProcessorFeaturePresent, QueryPerformanceCounter, GetCurrentProcessId, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, IsDebuggerPresent, GetStartupInfoW, GetModuleHandleW, RtlUnwindEx, RtlPcToFileHeader, RaiseException, InterlockedFlushSList, GetLastError, SetLastError, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, FreeLibrary, GetProcAddress, LoadLibraryExW, RtlUnwind, GetModuleHandleExW, GetModuleFileNameW, HeapFree, FlsAlloc, FlsGetValue, FlsSetValue, FlsFree, LCMapStringW, GetLocaleInfoW, IsValidLocale, GetUserDefaultLCID, EnumSystemLocalesW, HeapAlloc, GetStdHandle, GetFileType, CloseHandle, FlushFileBuffers, WriteFile, GetConsoleOutputCP, GetConsoleMode, ReadFile, GetFileSizeEx, SetFilePointerEx, ReadConsoleW, HeapReAlloc, FindClose, FindFirstFileExW, FindNextFileW, IsValidCodePage, GetACP, GetOEMCP, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, GetProcessHeap, SetStdHandle, HeapSize
                        NameOrdinalAddress
                        DllRegisterServer10x180070020
                        YAeJyEAYL7F4eDck6YUaf20x1800702c0
                        fmFkmnQYB5TC2Sq5NGFkK30x1800701e0
                        nrDjhnkd9nedaQwcCY40x180070100
                        Language of compilation systemCountry where language is spokenMap
                        EnglishUnited States
                        No network behavior found

                        Click to jump to process

                        Target ID:0
                        Start time:22:12:36
                        Start date:02/08/2022
                        Path:C:\Windows\System32\loaddll64.exe
                        Wow64 process (32bit):false
                        Commandline:loaddll64.exe "C:\Users\user\Desktop\pmfoxWgt1q.dll"
                        Imagebase:0x7ff66a740000
                        File size:140288 bytes
                        MD5 hash:4E8A40CAD6CCC047914E3A7830A2D8AA
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_Emotet_2, Description: Yara detected Emotet, Source: 00000000.00000002.880853299.00007FFC739F1000.00000020.00000001.01000000.00000003.sdmp, Author: Joe Security
                        Reputation:high

                        Target ID:1
                        Start time:22:12:36
                        Start date:02/08/2022
                        Path:C:\Windows\System32\cmd.exe
                        Wow64 process (32bit):false
                        Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\pmfoxWgt1q.dll",#1
                        Imagebase:0x7ff6499e0000
                        File size:273920 bytes
                        MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high

                        Target ID:2
                        Start time:22:12:37
                        Start date:02/08/2022
                        Path:C:\Windows\System32\regsvr32.exe
                        Wow64 process (32bit):false
                        Commandline:regsvr32.exe /s C:\Users\user\Desktop\pmfoxWgt1q.dll
                        Imagebase:0x7ff619650000
                        File size:24064 bytes
                        MD5 hash:D78B75FC68247E8A63ACBA846182740E
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_Emotet_2, Description: Yara detected Emotet, Source: 00000002.00000002.881462250.00007FFC739F1000.00000020.00000001.01000000.00000003.sdmp, Author: Joe Security
                        Reputation:high

                        Target ID:3
                        Start time:22:12:37
                        Start date:02/08/2022
                        Path:C:\Windows\System32\rundll32.exe
                        Wow64 process (32bit):false
                        Commandline:rundll32.exe "C:\Users\user\Desktop\pmfoxWgt1q.dll",#1
                        Imagebase:0x7ff6dbdb0000
                        File size:69632 bytes
                        MD5 hash:73C519F050C20580F8A62C849D49215A
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_Emotet_2, Description: Yara detected Emotet, Source: 00000003.00000002.882940823.00007FFC739F1000.00000020.00000001.01000000.00000003.sdmp, Author: Joe Security
                        Reputation:high

                        Target ID:4
                        Start time:22:12:37
                        Start date:02/08/2022
                        Path:C:\Windows\System32\rundll32.exe
                        Wow64 process (32bit):false
                        Commandline:rundll32.exe C:\Users\user\Desktop\pmfoxWgt1q.dll,DllRegisterServer
                        Imagebase:0x7ff6dbdb0000
                        File size:69632 bytes
                        MD5 hash:73C519F050C20580F8A62C849D49215A
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_Emotet_2, Description: Yara detected Emotet, Source: 00000004.00000002.882940563.00007FFC739F1000.00000020.00000001.01000000.00000003.sdmp, Author: Joe Security
                        Reputation:high

                        Target ID:5
                        Start time:22:12:41
                        Start date:02/08/2022
                        Path:C:\Windows\System32\rundll32.exe
                        Wow64 process (32bit):false
                        Commandline:rundll32.exe C:\Users\user\Desktop\pmfoxWgt1q.dll,YAeJyEAYL7F4eDck6YUaf
                        Imagebase:0x7ff6dbdb0000
                        File size:69632 bytes
                        MD5 hash:73C519F050C20580F8A62C849D49215A
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_Emotet_2, Description: Yara detected Emotet, Source: 00000005.00000002.882553231.00007FFC739F1000.00000020.00000001.01000000.00000003.sdmp, Author: Joe Security
                        Reputation:high

                        Target ID:6
                        Start time:22:12:45
                        Start date:02/08/2022
                        Path:C:\Windows\System32\rundll32.exe
                        Wow64 process (32bit):false
                        Commandline:rundll32.exe C:\Users\user\Desktop\pmfoxWgt1q.dll,fmFkmnQYB5TC2Sq5NGFkK
                        Imagebase:0x7ff6dbdb0000
                        File size:69632 bytes
                        MD5 hash:73C519F050C20580F8A62C849D49215A
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_Emotet_2, Description: Yara detected Emotet, Source: 00000006.00000002.889058366.00007FFC739F1000.00000020.00000001.01000000.00000003.sdmp, Author: Joe Security
                        Reputation:high

                        No disassembly