Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
ijexogdf64.dll

Overview

General Information

Sample Name:ijexogdf64.dll
Analysis ID:682774
MD5:d243c07128ee42bccef33bda67ec61d9
SHA1:5089dd76080329877c488325bc8ef8f736d1d1e4
SHA256:d45c78fa400b32c11443061dcd1c286d971881ddf35a47143e4d426a3ec6bffd
Tags:BokbotDLLexeIcedID
Infos:

Detection

IcedID
Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Antivirus detection for URL or domain
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Yara detected IcedID
C2 URLs / IPs found in malware configuration
PE file does not import any functions
Yara signature match
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Program does not show much activity (idle)
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • loaddll64.exe (PID: 5140 cmdline: loaddll64.exe "C:\Users\user\Desktop\ijexogdf64.dll" MD5: 4E8A40CAD6CCC047914E3A7830A2D8AA)
    • cmd.exe (PID: 5248 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\ijexogdf64.dll",#1 MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
      • rundll32.exe (PID: 4220 cmdline: rundll32.exe "C:\Users\user\Desktop\ijexogdf64.dll",#1 MD5: 73C519F050C20580F8A62C849D49215A)
    • rundll32.exe (PID: 5300 cmdline: rundll32.exe C:\Users\user\Desktop\ijexogdf64.dll,JdXfbK MD5: 73C519F050C20580F8A62C849D49215A)
    • rundll32.exe (PID: 1004 cmdline: rundll32.exe C:\Users\user\Desktop\ijexogdf64.dll,MDlQdmktXg MD5: 73C519F050C20580F8A62C849D49215A)
    • rundll32.exe (PID: 5344 cmdline: rundll32.exe C:\Users\user\Desktop\ijexogdf64.dll,VejwwBbES MD5: 73C519F050C20580F8A62C849D49215A)
    • rundll32.exe (PID: 5596 cmdline: rundll32.exe "C:\Users\user\Desktop\ijexogdf64.dll",JdXfbK MD5: 73C519F050C20580F8A62C849D49215A)
    • rundll32.exe (PID: 2552 cmdline: rundll32.exe "C:\Users\user\Desktop\ijexogdf64.dll",MDlQdmktXg MD5: 73C519F050C20580F8A62C849D49215A)
    • rundll32.exe (PID: 5732 cmdline: rundll32.exe "C:\Users\user\Desktop\ijexogdf64.dll",VejwwBbES MD5: 73C519F050C20580F8A62C849D49215A)
    • rundll32.exe (PID: 6020 cmdline: rundll32.exe "C:\Users\user\Desktop\ijexogdf64.dll",XeZsfh MD5: 73C519F050C20580F8A62C849D49215A)
    • rundll32.exe (PID: 760 cmdline: rundll32.exe "C:\Users\user\Desktop\ijexogdf64.dll",YqufWwLNu MD5: 73C519F050C20580F8A62C849D49215A)
  • cleanup
{"url_path": "/news/", "C2 url": ["peranistaer.top", "gruvihabralo.nl", "klareqvino.com", "ultomductingbig.pro"], "Campaign ID": 1573268852}
SourceRuleDescriptionAuthorStrings
00000003.00000002.244835062.0000000180001000.00000020.00001000.00020000.00000000.sdmpJoeSecurity_IcedID_6Yara detected IcedIDJoe Security
    00000003.00000002.244835062.0000000180001000.00000020.00001000.00020000.00000000.sdmpWindows_Trojan_IcedID_91562d18unknownunknown
    • 0x400:$a: 44 8B 4C 19 2C 4C 03 D6 74 1C 4D 85 C0 74 17 4D 85 C9 74 12 41
    00000003.00000002.244948572.0000018E2E579000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_IcedID_6Yara detected IcedIDJoe Security
      00000003.00000002.244948572.0000018E2E579000.00000004.00000020.00020000.00000000.sdmpWindows_Trojan_IcedID_91562d18unknownunknown
      • 0x10ff8:$a: 44 8B 4C 19 2C 4C 03 D6 74 1C 4D 85 C0 74 17 4D 85 C9 74 12 41
      SourceRuleDescriptionAuthorStrings
      3.2.rundll32.exe.180000000.0.unpackJoeSecurity_IcedID_6Yara detected IcedIDJoe Security
        3.2.rundll32.exe.180000000.0.unpackWindows_Trojan_IcedID_91562d18unknownunknown
        • 0x800:$a: 44 8B 4C 19 2C 4C 03 D6 74 1C 4D 85 C0 74 17 4D 85 C9 74 12 41
        3.2.rundll32.exe.18e2e5897f8.1.raw.unpackJoeSecurity_IcedID_6Yara detected IcedIDJoe Security
          3.2.rundll32.exe.18e2e5897f8.1.raw.unpackWindows_Trojan_IcedID_91562d18unknownunknown
          • 0x800:$a: 44 8B 4C 19 2C 4C 03 D6 74 1C 4D 85 C0 74 17 4D 85 C9 74 12 41
          No Sigma rule has matched
          No Snort rule has matched

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: ijexogdf64.dllVirustotal: Detection: 7%Perma Link
          Source: klareqvino.comAvira URL Cloud: Label: malware
          Source: peranistaer.topVirustotal: Detection: 15%Perma Link
          Source: klareqvino.comVirustotal: Detection: 12%Perma Link
          Source: gruvihabralo.nlVirustotal: Detection: 14%Perma Link
          Source: Yara matchFile source: 3.2.rundll32.exe.180000000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.rundll32.exe.18e2e5897f8.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000003.00000002.244835062.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.244948572.0000018E2E579000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: 00000003.00000002.244948572.0000018E2E579000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: IcedID {"url_path": "/news/", "C2 url": ["peranistaer.top", "gruvihabralo.nl", "klareqvino.com", "ultomductingbig.pro"], "Campaign ID": 1573268852}
          Source: ijexogdf64.dllStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT

          Networking

          barindex
          Source: Malware configuration extractorURLs: peranistaer.top
          Source: Malware configuration extractorURLs: gruvihabralo.nl
          Source: Malware configuration extractorURLs: klareqvino.com
          Source: Malware configuration extractorURLs: ultomductingbig.pro

          E-Banking Fraud

          barindex
          Source: Yara matchFile source: 3.2.rundll32.exe.180000000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.rundll32.exe.18e2e5897f8.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000003.00000002.244835062.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.244948572.0000018E2E579000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY

          System Summary

          barindex
          Source: 3.2.rundll32.exe.180000000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_IcedID_91562d18 Author: unknown
          Source: 3.2.rundll32.exe.18e2e5897f8.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_IcedID_91562d18 Author: unknown
          Source: 00000003.00000002.244835062.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_IcedID_91562d18 Author: unknown
          Source: 00000003.00000002.244948572.0000018E2E579000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_IcedID_91562d18 Author: unknown
          Source: ijexogdf64.dllStatic PE information: No import functions for PE file found
          Source: 3.2.rundll32.exe.180000000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_IcedID_91562d18 reference_sample = b9fb0a4c28613c556fb67a0b0e7c9d4c1236b60a161ad935e7387aec5911413a, os = windows, severity = x86, creation_date = 2022-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.IcedID, fingerprint = 024bbd15da6bc759e321779881b466b500f6364a1d67bbfdc950aedccbfbc022, id = 91562d18-28a1-4349-9e4b-92ad165510c9, last_modified = 2022-06-09
          Source: 3.2.rundll32.exe.18e2e5897f8.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_IcedID_91562d18 reference_sample = b9fb0a4c28613c556fb67a0b0e7c9d4c1236b60a161ad935e7387aec5911413a, os = windows, severity = x86, creation_date = 2022-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.IcedID, fingerprint = 024bbd15da6bc759e321779881b466b500f6364a1d67bbfdc950aedccbfbc022, id = 91562d18-28a1-4349-9e4b-92ad165510c9, last_modified = 2022-06-09
          Source: 00000003.00000002.244835062.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_IcedID_91562d18 reference_sample = b9fb0a4c28613c556fb67a0b0e7c9d4c1236b60a161ad935e7387aec5911413a, os = windows, severity = x86, creation_date = 2022-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.IcedID, fingerprint = 024bbd15da6bc759e321779881b466b500f6364a1d67bbfdc950aedccbfbc022, id = 91562d18-28a1-4349-9e4b-92ad165510c9, last_modified = 2022-06-09
          Source: 00000003.00000002.244948572.0000018E2E579000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_IcedID_91562d18 reference_sample = b9fb0a4c28613c556fb67a0b0e7c9d4c1236b60a161ad935e7387aec5911413a, os = windows, severity = x86, creation_date = 2022-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.IcedID, fingerprint = 024bbd15da6bc759e321779881b466b500f6364a1d67bbfdc950aedccbfbc022, id = 91562d18-28a1-4349-9e4b-92ad165510c9, last_modified = 2022-06-09
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFFF0316111 NtCreateSection,NtMapViewOfSection,3_2_00007FFFF0316111
          Source: ijexogdf64.dllVirustotal: Detection: 7%
          Source: ijexogdf64.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: C:\Windows\System32\loaddll64.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\ijexogdf64.dll,JdXfbK
          Source: unknownProcess created: C:\Windows\System32\loaddll64.exe loaddll64.exe "C:\Users\user\Desktop\ijexogdf64.dll"
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\ijexogdf64.dll",#1
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\ijexogdf64.dll,JdXfbK
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\ijexogdf64.dll",#1
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\ijexogdf64.dll,MDlQdmktXg
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\ijexogdf64.dll,VejwwBbES
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\ijexogdf64.dll",JdXfbK
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\ijexogdf64.dll",MDlQdmktXg
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\ijexogdf64.dll",VejwwBbES
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\ijexogdf64.dll",XeZsfh
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\ijexogdf64.dll",YqufWwLNu
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\ijexogdf64.dll",#1Jump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\ijexogdf64.dll,JdXfbKJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\ijexogdf64.dll,MDlQdmktXgJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\ijexogdf64.dll,VejwwBbESJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\ijexogdf64.dll",JdXfbKJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\ijexogdf64.dll",MDlQdmktXgJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\ijexogdf64.dll",VejwwBbESJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\ijexogdf64.dll",XeZsfhJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\ijexogdf64.dll",YqufWwLNuJump to behavior
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\ijexogdf64.dll",#1Jump to behavior
          Source: classification engineClassification label: mal84.troj.winDLL@21/0@0/0
          Source: ijexogdf64.dllStatic PE information: Image base 0x180000000 > 0x60000000
          Source: ijexogdf64.dllStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFFF03112F6 push r10; ret 3_2_00007FFFF0311301
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFFF0313B20 push r13; ret 3_2_00007FFFF0313BA2
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800014A0 LoadLibraryA,GetProcAddress,GetLastError,3_2_00000001800014A0
          Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\loaddll64.exe TID: 5316Thread sleep time: -120000s >= -30000sJump to behavior
          Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
          Source: C:\Windows\System32\loaddll64.exeThread delayed: delay time: 120000Jump to behavior
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800014A0 LoadLibraryA,GetProcAddress,GetLastError,3_2_00000001800014A0
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180001044 GetLastError,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,lstrcpyA,lstrcpyA,3_2_0000000180001044
          Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\ijexogdf64.dll",#1Jump to behavior
          Source: C:\Windows\System32\rundll32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: 3.2.rundll32.exe.180000000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.rundll32.exe.18e2e5897f8.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000003.00000002.244835062.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.244948572.0000018E2E579000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: 3.2.rundll32.exe.180000000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.rundll32.exe.18e2e5897f8.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000003.00000002.244835062.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.244948572.0000018E2E579000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
          Valid Accounts1
          Native API
          Path Interception11
          Process Injection
          1
          Rundll32
          OS Credential Dumping1
          Security Software Discovery
          Remote ServicesData from Local SystemExfiltration Over Other Network Medium1
          Application Layer Protocol
          Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
          Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts11
          Virtualization/Sandbox Evasion
          LSASS Memory11
          Virtualization/Sandbox Evasion
          Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
          Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)11
          Process Injection
          Security Account Manager2
          System Information Discovery
          SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
          Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
          Obfuscated Files or Information
          NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 signatures2 2 Behavior Graph ID: 682774 Sample: ijexogdf64.dll Startdate: 12/08/2022 Architecture: WINDOWS Score: 84 19 Multi AV Scanner detection for domain / URL 2->19 21 Malicious sample detected (through community Yara rule) 2->21 23 Antivirus detection for URL or domain 2->23 25 3 other signatures 2->25 7 loaddll64.exe 1 2->7         started        process3 process4 9 cmd.exe 1 7->9         started        11 rundll32.exe 7->11         started        13 rundll32.exe 7->13         started        15 6 other processes 7->15 process5 17 rundll32.exe 9->17         started       
          SourceDetectionScannerLabelLink
          ijexogdf64.dll7%VirustotalBrowse
          No Antivirus matches
          SourceDetectionScannerLabelLinkDownload
          3.2.rundll32.exe.180000000.0.unpack100%AviraHEUR/AGEN.1205106Download File
          No Antivirus matches
          SourceDetectionScannerLabelLink
          peranistaer.top16%VirustotalBrowse
          peranistaer.top0%Avira URL Cloudsafe
          ultomductingbig.pro1%VirustotalBrowse
          ultomductingbig.pro0%Avira URL Cloudsafe
          klareqvino.com12%VirustotalBrowse
          klareqvino.com100%Avira URL Cloudmalware
          gruvihabralo.nl15%VirustotalBrowse
          gruvihabralo.nl0%Avira URL Cloudsafe
          No contacted domains info
          NameMaliciousAntivirus DetectionReputation
          peranistaer.toptrue
          • 16%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          ultomductingbig.protrue
          • 1%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          klareqvino.comtrue
          • 12%, Virustotal, Browse
          • Avira URL Cloud: malware
          unknown
          gruvihabralo.nltrue
          • 15%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          No contacted IP infos
          Joe Sandbox Version:35.0.0 Citrine
          Analysis ID:682774
          Start date and time:2022-08-12 00:27:07 +02:00
          Joe Sandbox Product:CloudBasic
          Overall analysis duration:0h 3m 33s
          Hypervisor based Inspection enabled:false
          Report type:full
          Sample file name:ijexogdf64.dll
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
          Number of analysed new started processes analysed:16
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • HDC enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Detection:MAL
          Classification:mal84.troj.winDLL@21/0@0/0
          EGA Information:
          • Successful, ratio: 100%
          HDC Information:
          • Successful, ratio: 84.1% (good quality ratio 69.2%)
          • Quality average: 58.6%
          • Quality standard deviation: 38.6%
          HCA Information:
          • Successful, ratio: 93%
          • Number of executed functions: 7
          • Number of non-executed functions: 4
          Cookbook Comments:
          • Found application associated with file extension: .dll
          • Adjust boot time
          • Enable AMSI
          • Stop behavior analysis, all processes terminated
          • Exclude process from analysis (whitelisted): BackgroundTransferHost.exe, backgroundTaskHost.exe, svchost.exe
          • Excluded IPs from analysis (whitelisted): 20.40.129.122, 23.211.6.115
          • Excluded domains from analysis (whitelisted): e12564.dspb.akamaiedge.net, store-images.s-microsoft.com, arc.trafficmanager.net, store-images.s-microsoft.com-c.edgekey.net, iris-de-prod-azsc-frc.francecentral.cloudapp.azure.com, arc.msn.com
          • Not all processes where analyzed, report is missing behavior information
          TimeTypeDescription
          00:28:16API Interceptor1x Sleep call for process: loaddll64.exe modified
          No context
          No context
          No context
          No context
          No context
          No created / dropped files found
          File type:PE32+ executable (DLL) (console) x86-64, for MS Windows
          Entropy (8bit):4.681680523290311
          TrID:
          • Win64 Dynamic Link Library (generic) (102004/3) 86.43%
          • Win64 Executable (generic) (12005/4) 10.17%
          • Generic Win/DOS Executable (2004/3) 1.70%
          • DOS Executable Generic (2002/1) 1.70%
          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.01%
          File name:ijexogdf64.dll
          File size:345600
          MD5:d243c07128ee42bccef33bda67ec61d9
          SHA1:5089dd76080329877c488325bc8ef8f736d1d1e4
          SHA256:d45c78fa400b32c11443061dcd1c286d971881ddf35a47143e4d426a3ec6bffd
          SHA512:91c4ca4b3c8051e2813387191414185add498ace63ccf52d420512d6f4fdbefd704b06472250489e4ea4206c18b88299d101f2921a9661adaaadfa7b0f3d5301
          SSDEEP:6144:7bCbif6Fsx+sjdfF+z/+Oz8A3z7S0+uiQ1j5X6UeoCcpWYnmajHcLGvUmVjQP:sa+sJArz8A3z7heeDeoCy9maj8LAj
          TLSH:7F749E78F704ADD6E56E467BCA92BCD912726E229F8EDDCD81647BC30463331EE06805
          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........4._.Z._.Z._.Z...Y.^.Z...Z.^.Z.....^.Z...X.^.Z.Rich_.Z.........................PE..d......T.........." .....>.................
          Icon Hash:74f0e4ecccdce0e4
          Entrypoint:0x180000000
          Entrypoint Section:
          Digitally signed:false
          Imagebase:0x180000000
          Subsystem:windows cui
          Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, DLL
          DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
          Time Stamp:0x54EF86E9 [Thu Feb 26 20:49:45 2015 UTC]
          TLS Callbacks:
          CLR (.Net) Version:
          OS Version Major:6
          OS Version Minor:0
          File Version Major:6
          File Version Minor:0
          Subsystem Version Major:6
          Subsystem Version Minor:0
          Import Hash:
          Instruction
          dec ebp
          pop edx
          nop
          add byte ptr [ebx], al
          add byte ptr [eax], al
          add byte ptr [eax+eax], al
          add byte ptr [eax], al
          NameVirtual AddressVirtual Size Is in Section
          IMAGE_DIRECTORY_ENTRY_EXPORT0x550000x133.rdata
          IMAGE_DIRECTORY_ENTRY_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_RESOURCE0x560000x1e0.rsrc
          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
          IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IAT0x00x0
          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
          NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
          .text0x10000x53df20x53e00False0.5699195463859911DOS executable (COM)4.663798377543847IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          .rdata0x550000x1330x200False0.525390625data3.6080974435457183IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          .rsrc0x560000x1e00x200False0.52734375data4.720822661998389IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          NameRVASizeTypeLanguageCountry
          RT_MANIFEST0x560600x17dXML 1.0 document textEnglishUnited States
          NameOrdinalAddress
          JdXfbK20x180009abe
          MDlQdmktXg30x180009706
          VejwwBbES40x180009500
          XeZsfh50x180009773
          YqufWwLNu60x1800094d8
          aFXQhh70x180009610
          douGisQTrEbuU80x1800097d7
          mcejso90x180009895
          sIwYjgNBY100x180009baa
          vwcKpBZWAuPZtofG110x180009a56
          wCUxVrXTsMGVxBGr120x1800099de
          zubitjkfnasyfujask10x1800010c0
          Language of compilation systemCountry where language is spokenMap
          EnglishUnited States
          No network behavior found

          Click to jump to process

          Click to jump to process

          Click to jump to process

          Target ID:0
          Start time:00:28:03
          Start date:12/08/2022
          Path:C:\Windows\System32\loaddll64.exe
          Wow64 process (32bit):false
          Commandline:loaddll64.exe "C:\Users\user\Desktop\ijexogdf64.dll"
          Imagebase:0x7ff79b990000
          File size:140288 bytes
          MD5 hash:4E8A40CAD6CCC047914E3A7830A2D8AA
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high

          Target ID:1
          Start time:00:28:04
          Start date:12/08/2022
          Path:C:\Windows\System32\cmd.exe
          Wow64 process (32bit):false
          Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\ijexogdf64.dll",#1
          Imagebase:0x7ff7bb450000
          File size:273920 bytes
          MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high

          Target ID:2
          Start time:00:28:04
          Start date:12/08/2022
          Path:C:\Windows\System32\rundll32.exe
          Wow64 process (32bit):false
          Commandline:rundll32.exe C:\Users\user\Desktop\ijexogdf64.dll,JdXfbK
          Imagebase:0x7ff7b21b0000
          File size:69632 bytes
          MD5 hash:73C519F050C20580F8A62C849D49215A
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high

          Target ID:3
          Start time:00:28:04
          Start date:12/08/2022
          Path:C:\Windows\System32\rundll32.exe
          Wow64 process (32bit):false
          Commandline:rundll32.exe "C:\Users\user\Desktop\ijexogdf64.dll",#1
          Imagebase:0x7ff7b21b0000
          File size:69632 bytes
          MD5 hash:73C519F050C20580F8A62C849D49215A
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Yara matches:
          • Rule: JoeSecurity_IcedID_6, Description: Yara detected IcedID, Source: 00000003.00000002.244835062.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
          • Rule: Windows_Trojan_IcedID_91562d18, Description: unknown, Source: 00000003.00000002.244835062.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Author: unknown
          • Rule: JoeSecurity_IcedID_6, Description: Yara detected IcedID, Source: 00000003.00000002.244948572.0000018E2E579000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
          • Rule: Windows_Trojan_IcedID_91562d18, Description: unknown, Source: 00000003.00000002.244948572.0000018E2E579000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
          Reputation:high

          Target ID:4
          Start time:00:28:07
          Start date:12/08/2022
          Path:C:\Windows\System32\rundll32.exe
          Wow64 process (32bit):false
          Commandline:rundll32.exe C:\Users\user\Desktop\ijexogdf64.dll,MDlQdmktXg
          Imagebase:0x7ff7b21b0000
          File size:69632 bytes
          MD5 hash:73C519F050C20580F8A62C849D49215A
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high

          Target ID:7
          Start time:00:28:11
          Start date:12/08/2022
          Path:C:\Windows\System32\rundll32.exe
          Wow64 process (32bit):false
          Commandline:rundll32.exe C:\Users\user\Desktop\ijexogdf64.dll,VejwwBbES
          Imagebase:0x7ff7b21b0000
          File size:69632 bytes
          MD5 hash:73C519F050C20580F8A62C849D49215A
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high

          Target ID:9
          Start time:00:28:14
          Start date:12/08/2022
          Path:C:\Windows\System32\rundll32.exe
          Wow64 process (32bit):false
          Commandline:rundll32.exe "C:\Users\user\Desktop\ijexogdf64.dll",JdXfbK
          Imagebase:0x7ff7b21b0000
          File size:69632 bytes
          MD5 hash:73C519F050C20580F8A62C849D49215A
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high

          Target ID:10
          Start time:00:28:15
          Start date:12/08/2022
          Path:C:\Windows\System32\rundll32.exe
          Wow64 process (32bit):false
          Commandline:rundll32.exe "C:\Users\user\Desktop\ijexogdf64.dll",MDlQdmktXg
          Imagebase:0x7ff7b21b0000
          File size:69632 bytes
          MD5 hash:73C519F050C20580F8A62C849D49215A
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high

          Target ID:11
          Start time:00:28:15
          Start date:12/08/2022
          Path:C:\Windows\System32\rundll32.exe
          Wow64 process (32bit):false
          Commandline:rundll32.exe "C:\Users\user\Desktop\ijexogdf64.dll",VejwwBbES
          Imagebase:0x7ff7b21b0000
          File size:69632 bytes
          MD5 hash:73C519F050C20580F8A62C849D49215A
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high

          Target ID:12
          Start time:00:28:16
          Start date:12/08/2022
          Path:C:\Windows\System32\rundll32.exe
          Wow64 process (32bit):false
          Commandline:rundll32.exe "C:\Users\user\Desktop\ijexogdf64.dll",XeZsfh
          Imagebase:0x7ff7b21b0000
          File size:69632 bytes
          MD5 hash:73C519F050C20580F8A62C849D49215A
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high

          Target ID:13
          Start time:00:28:16
          Start date:12/08/2022
          Path:C:\Windows\System32\rundll32.exe
          Wow64 process (32bit):false
          Commandline:rundll32.exe "C:\Users\user\Desktop\ijexogdf64.dll",YqufWwLNu
          Imagebase:0x7ff7b21b0000
          File size:69632 bytes
          MD5 hash:73C519F050C20580F8A62C849D49215A
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high

          Reset < >

            Execution Graph

            Execution Coverage:4.1%
            Dynamic/Decrypted Code Coverage:56.3%
            Signature Coverage:31%
            Total number of Nodes:87
            Total number of Limit Nodes:8
            execution_graph 4471 7ffff03162c1 4472 7ffff0316111 4471->4472 4473 7ffff0316132 NtCreateSection 4472->4473 4474 7ffff0316142 4472->4474 4477 7ffff03162f2 4472->4477 4473->4477 4475 7ffff03162ca NtMapViewOfSection 4474->4475 4476 7ffff03162ea 4474->4476 4475->4474 4475->4477 4560 7ffff0316111 4565 7ffff0316125 4560->4565 4561 7ffff0316132 NtCreateSection 4566 7ffff03162f2 4561->4566 4562 7ffff0316142 4563 7ffff03162ca NtMapViewOfSection 4562->4563 4564 7ffff03162ea 4562->4564 4563->4562 4563->4566 4565->4560 4565->4561 4565->4562 4565->4566 4549 7ffff0316262 4550 7ffff0316111 4549->4550 4551 7ffff0316132 NtCreateSection 4550->4551 4552 7ffff0316142 4550->4552 4555 7ffff03162f2 4550->4555 4551->4555 4553 7ffff03162ca NtMapViewOfSection 4552->4553 4554 7ffff03162ea 4552->4554 4553->4552 4553->4555 4478 18e30360000 4479 18e30360036 4478->4479 4480 18e30360127 GetNativeSystemInfo 4479->4480 4486 18e303604e1 4479->4486 4481 18e3036015f VirtualAlloc 4480->4481 4480->4486 4483 18e3036017d 4481->4483 4482 18e303602f1 LoadLibraryA 4482->4483 4483->4482 4485 18e30360341 4483->4485 4484 18e303604bd VirtualProtect 4484->4485 4485->4484 4485->4486 4487 7ffff0312cc5 4488 7ffff0312cf8 4487->4488 4489 7ffff0312d49 LoadLibraryW 4488->4489 4490 7ffff0312d05 4488->4490 4489->4488 4490->4490 4556 180001658 4557 180001661 GetModuleFileNameA 4556->4557 4558 18000167e 4556->4558 4557->4558 4559 180001678 GetLastError 4557->4559 4559->4558 4571 7ffff0313729 4574 7ffff031372d 4571->4574 4572 7ffff0313ab5 4573 7ffff0313a99 RtlAllocateHeap 4573->4572 4573->4574 4574->4572 4574->4573 4495 180001000 CreateThread 4496 180001030 4495->4496 4497 180001025 SleepEx 4496->4497 4498 180001039 ExitProcess 4496->4498 4497->4496 4499 180001570 4502 180001044 4499->4502 4519 180001688 GetCommandLineA 4502->4519 4507 180001097 4510 180001141 4507->4510 4511 18000111a GetProcessHeap HeapAlloc 4507->4511 4512 18000120a 4507->4512 4508 18000108c GetLastError 4518 18000122a 4508->4518 4509 180001216 GetProcessHeap HeapFree 4509->4518 4513 180001244 lstrcpyA lstrcpyA 4510->4513 4514 1800011ec 4510->4514 4511->4510 4511->4512 4512->4509 4512->4518 4513->4512 4515 180001297 4513->4515 4514->4512 4516 1800011f6 GetProcessHeap HeapFree 4514->4516 4536 1800013a0 VirtualAlloc 4515->4536 4516->4512 4520 180001071 4519->4520 4521 1800016ac StrStrIA 4519->4521 4527 1800012bc CreateFileA 4520->4527 4521->4520 4522 1800016c4 SHGetFolderPathA 4521->4522 4523 1800016e9 4522->4523 4524 1800016f0 lstrcatA lstrcpyA StrChrA 4522->4524 4523->4524 4525 180001716 4524->4525 4526 180001719 lstrcatA 4524->4526 4525->4526 4526->4520 4528 180001307 GetFileSize 4527->4528 4529 180001088 4527->4529 4530 180001381 CloseHandle 4528->4530 4531 18000131b GetProcessHeap HeapAlloc 4528->4531 4529->4507 4529->4508 4530->4529 4531->4530 4532 18000133b ReadFile 4531->4532 4533 18000135a 4532->4533 4533->4530 4534 18000136b GetProcessHeap HeapFree 4533->4534 4535 18000137f 4533->4535 4534->4535 4535->4530 4537 1800013d9 GetLastError 4536->4537 4539 1800013e6 4536->4539 4538 1800013df 4537->4538 4538->4512 4539->4538 4543 1800014a0 4539->4543 4542 180001450 VirtualProtect 4542->4538 4542->4542 4544 180001447 4543->4544 4547 1800014c6 4543->4547 4544->4538 4544->4542 4545 1800014d3 LoadLibraryA 4546 180001544 GetLastError 4545->4546 4545->4547 4546->4544 4547->4544 4547->4545 4548 18000150c GetProcAddress 4547->4548 4548->4546 4548->4547

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 0 7ffff0316111-7ffff0316123 1 7ffff0316164-7ffff0316173 0->1 2 7ffff0316125-7ffff0316130 0->2 1->2 3 7ffff0316175-7ffff0316184 1->3 4 7ffff0316132-7ffff031613d NtCreateSection 2->4 5 7ffff031619a-7ffff03161a4 2->5 7 7ffff03161a6-7ffff03161b5 3->7 8 7ffff0316186-7ffff0316198 3->8 6 7ffff0316971-7ffff0316976 4->6 5->4 5->7 12 7ffff0316978 6->12 13 7ffff031698b 6->13 10 7ffff0316142-7ffff0316152 7->10 11 7ffff03161b7-7ffff03161cd 7->11 9 7ffff0316154-7ffff031615f 8->9 15 7ffff03162da-7ffff03162e8 9->15 10->8 10->9 16 7ffff03161cf-7ffff03161e8 11->16 17 7ffff031621d-7ffff0316230 11->17 25 7ffff0316984 12->25 14 7ffff0316998-7ffff031699d 13->14 21 7ffff031699f 14->21 22 7ffff03169c3 14->22 19 7ffff03162ca-7ffff03162d8 NtMapViewOfSection 15->19 20 7ffff03162ea-7ffff03162f1 15->20 23 7ffff0316232-7ffff0316248 16->23 24 7ffff03161ea-7ffff031621b 16->24 18 7ffff031624a-7ffff031625d 17->18 28 7ffff031637e-7ffff0316393 18->28 19->15 27 7ffff03162f2-7ffff03162fb 19->27 22->22 23->18 29 7ffff031627d-7ffff0316292 23->29 24->17 30 7ffff0316298-7ffff03162ae 24->30 25->13 27->25 31 7ffff0316395-7ffff03163db 28->31 32 7ffff031631b-7ffff0316334 28->32 29->11 29->30 30->16 33 7ffff03162b4-7ffff03169a9 30->33 35 7ffff0316336-7ffff03164e0 31->35 39 7ffff03163e1-7ffff03163f6 31->39 34 7ffff0316363-7ffff031637c 32->34 32->35 41 7ffff03169c8-7ffff03169cd 33->41 42 7ffff03169ab-7ffff03169b3 33->42 34->28 34->39 47 7ffff0316446-7ffff0316473 35->47 48 7ffff03164e6-7ffff03164f3 35->48 39->31 44 7ffff03163f8-7ffff0316443 39->44 45 7ffff031650d-7ffff031651b call 7ffff03179d8 41->45 42->14 44->47 55 7ffff0316563-7ffff0316572 45->55 56 7ffff031651d-7ffff0316531 45->56 57 7ffff03164a3-7ffff03164ae 47->57 58 7ffff0316475-7ffff031648e 47->58 52 7ffff03164f5-7ffff031650b 48->52 53 7ffff03164bb-7ffff03164c6 48->53 52->45 60 7ffff0316551-7ffff0316561 52->60 59 7ffff0316760-7ffff0316765 53->59 63 7ffff0316574-7ffff0316585 55->63 64 7ffff0316596-7ffff03165a3 call 7ffff03179d8 55->64 56->52 61 7ffff0316533-7ffff0316543 56->61 57->53 72 7ffff03169be 58->72 65 7ffff0316771-7ffff0316776 59->65 66 7ffff0316767-7ffff031676c 59->66 60->63 67 7ffff0316545-7ffff03169ba 61->67 68 7ffff031658a-7ffff0316594 call 7ffff03179d8 61->68 63->0 64->61 76 7ffff03165a5-7ffff03165b8 64->76 66->65 67->72 68->56 68->64 72->72 76->59 77 7ffff03168ae-7ffff03168dc 76->77 79 7ffff031690d-7ffff031693c 77->79 80 7ffff03168de-7ffff03168e9 77->80 83 7ffff0316955-7ffff031696b 79->83 84 7ffff031693e-7ffff0316953 79->84 82 7ffff03168f6-7ffff031690b 80->82 82->79 85 7ffff0316896-7ffff03168ac 82->85 83->6 86 7ffff031687b-7ffff0316890 83->86 84->82 84->83 85->80 86->84 86->85
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000003.00000002.245500356.00007FFFF0311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFFF0310000, based on PE: true
            • Associated: 00000003.00000002.245493238.00007FFFF0310000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000003.00000002.245598214.00007FFFF0365000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_3_2_7ffff0310000_rundll32.jbxd
            Similarity
            • API ID: CreateSection
            • String ID: !$%$%$&$)$*$*$,$-$2$3$<$?$@$@$D$H$H$`$y$~
            • API String ID: 2449625523-2699326552
            • Opcode ID: ae71ce33b2ff831bd31dc7ee09e58353459c4e54b112734a185f5b6d77d6ff7e
            • Instruction ID: 9b82528146ac50ec01c9607f4073eceba977ab99bd7058288e54287de13abfdf
            • Opcode Fuzzy Hash: ae71ce33b2ff831bd31dc7ee09e58353459c4e54b112734a185f5b6d77d6ff7e
            • Instruction Fuzzy Hash: 5CD12BB6D0C2D2CBE7B08B90E4583EAB6E0E798314F544639C2E916BD9DB7DD4489F01
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            APIs
            Strings
            Memory Dump Source
            • Source File: 00000003.00000002.244835062.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
            • Associated: 00000003.00000002.244829729.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000003.00000002.244838553.0000000180002000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000003.00000002.244842939.0000000180003000.00000004.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
            Yara matches
            Similarity
            • API ID: lstrcat$CommandFolderLinePathlstrcpy
            • String ID: c:\ProgramData\
            • API String ID: 1737627762-4167965204
            • Opcode ID: 20617e2baf8158c2edf60f7b48858558e409461de3a6bb6beb459add1b47c657
            • Instruction ID: e6560f335e628c7a2993b81ce91b1b856003c4fac3ee7d8d6e9e32c945d496e2
            • Opcode Fuzzy Hash: 20617e2baf8158c2edf60f7b48858558e409461de3a6bb6beb459add1b47c657
            • Instruction Fuzzy Hash: 10113635704B4892FB96CB25F8043D97362BB48BC1F88C425EA0A07B65EF78D64AC700
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 96 18e30360000-18e3036008f call 18e30360618 * 6 109 18e30360095-18e30360098 96->109 110 18e303605fa 96->110 109->110 111 18e3036009e-18e303600a1 109->111 112 18e303605fc-18e30360616 110->112 111->110 113 18e303600a7-18e303600aa 111->113 113->110 114 18e303600b0-18e303600b3 113->114 114->110 115 18e303600b9-18e303600bc 114->115 115->110 116 18e303600c2-18e303600d0 115->116 116->110 117 18e303600d6-18e303600df 116->117 117->110 118 18e303600e5-18e303600ed 117->118 118->110 119 18e303600f3-18e30360101 118->119 120 18e30360103-18e30360108 119->120 121 18e30360127-18e30360159 GetNativeSystemInfo 119->121 122 18e3036010b-18e30360125 120->122 121->110 123 18e3036015f-18e3036017b VirtualAlloc 121->123 122->121 122->122 124 18e30360192-18e3036019d 123->124 125 18e3036017d-18e30360190 123->125 126 18e303601b0-18e303601cc 124->126 127 18e3036019f-18e303601ae 124->127 125->124 129 18e303601ce-18e303601cf 126->129 130 18e3036020a-18e30360217 126->130 127->126 127->127 131 18e303601d1-18e303601d7 129->131 132 18e303602d2-18e303602d9 130->132 133 18e3036021d-18e30360224 130->133 137 18e303601f9-18e30360208 131->137 138 18e303601d9-18e303601f7 131->138 134 18e30360345-18e3036034c 132->134 135 18e303602db-18e303602eb 132->135 133->132 136 18e3036022a-18e30360237 133->136 141 18e303603c0-18e303603d1 134->141 142 18e3036034e-18e30360361 134->142 135->134 139 18e303602ed-18e303602ee 135->139 136->132 140 18e3036023d-18e30360244 136->140 137->130 137->131 138->137 138->138 143 18e303602f1-18e3036030a LoadLibraryA 139->143 144 18e30360247-18e3036024b 140->144 145 18e303604e1-18e303604fa 141->145 146 18e303603d7-18e303603e0 141->146 142->141 147 18e30360363-18e30360364 142->147 148 18e3036032c-18e30360332 143->148 149 18e303602ba-18e303602c4 144->149 164 18e30360521-18e30360525 145->164 165 18e303604fc-18e30360504 145->165 150 18e303603e5-18e303603e7 146->150 151 18e30360367-18e30360380 147->151 153 18e30360334-18e3036033f 148->153 154 18e3036030c 148->154 155 18e3036024d-18e30360261 149->155 156 18e303602c6-18e303602cc 149->156 157 18e303604cc-18e303604db 150->157 158 18e303603ed-18e303603f8 150->158 170 18e303603a8-18e303603ab 151->170 153->143 166 18e30360341-18e30360342 153->166 160 18e30360313-18e30360318 154->160 161 18e3036030e-18e30360311 154->161 162 18e30360285-18e30360289 155->162 163 18e30360263-18e30360283 155->163 156->132 156->144 157->145 157->150 167 18e30360411-18e30360413 158->167 168 18e303603fa-18e303603fd 158->168 173 18e3036031a-18e30360329 160->173 161->173 175 18e3036028f-18e30360293 162->175 176 18e3036028b-18e3036028d 162->176 174 18e303602b7-18e303602b8 163->174 178 18e30360544-18e3036054b 164->178 179 18e30360527-18e30360540 164->179 177 18e30360508-18e3036050e 165->177 166->134 171 18e30360415-18e30360418 167->171 172 18e3036044e-18e30360451 167->172 168->167 169 18e303603ff-18e30360401 168->169 169->167 182 18e30360403-18e3036040c 169->182 189 18e30360382-18e30360389 170->189 190 18e303603ad-18e303603ba 170->190 183 18e30360424-18e30360426 171->183 184 18e3036041a-18e3036041c 171->184 180 18e30360453-18e30360455 172->180 181 18e3036045f-18e30360461 172->181 173->148 174->149 186 18e30360295-18e3036029f 175->186 187 18e303602a1-18e303602a5 175->187 185 18e303602aa-18e303602b4 176->185 177->164 188 18e30360510-18e3036051f 177->188 191 18e303605f5-18e303605f8 178->191 192 18e30360551-18e30360569 178->192 179->178 180->181 199 18e30360457-18e3036045d 180->199 200 18e30360463-18e30360466 181->200 201 18e303604a7-18e303604a8 181->201 193 18e303604ab-18e303604b2 182->193 183->172 195 18e30360428-18e3036042b 183->195 184->183 194 18e3036041e-18e30360422 184->194 185->174 186->185 187->174 204 18e303602a7 187->204 188->177 202 18e30360390-18e30360395 189->202 203 18e3036038b-18e3036038e 189->203 190->151 205 18e303603bc-18e303603bd 190->205 191->112 197 18e3036057b-18e3036058b 192->197 198 18e3036056b-18e30360579 192->198 206 18e303604b4-18e303604ba 193->206 207 18e303604bd-18e303604ca VirtualProtect 193->207 208 18e30360487-18e3036048b 194->208 209 18e3036042d-18e3036042f 195->209 210 18e30360437-18e30360439 195->210 197->191 212 18e3036058d-18e3036058e 197->212 198->197 198->198 199->208 213 18e30360474-18e30360476 200->213 214 18e30360468-18e3036046a 200->214 201->193 215 18e30360397-18e303603a5 202->215 203->215 204->185 205->141 206->207 207->157 208->193 209->210 216 18e30360431-18e30360435 209->216 210->172 217 18e3036043b-18e3036043e 210->217 218 18e30360590-18e30360594 212->218 213->201 220 18e30360478-18e3036047b 213->220 214->213 219 18e3036046c-18e30360472 214->219 215->170 216->208 221 18e30360440-18e30360442 217->221 222 18e3036044a-18e3036044c 217->222 223 18e303605b5-18e303605b8 218->223 224 18e30360596-18e303605a0 218->224 219->208 226 18e3036048d-18e3036048f 220->226 227 18e3036047d-18e3036047f 220->227 221->222 228 18e30360444-18e30360448 221->228 222->172 222->201 230 18e303605bf-18e303605c3 223->230 231 18e303605ba-18e303605bd 223->231 229 18e303605a3-18e303605b3 224->229 226->201 233 18e30360491-18e30360494 226->233 227->226 232 18e30360481-18e30360482 227->232 228->208 229->223 229->229 235 18e303605e5-18e303605f3 230->235 236 18e303605c5-18e303605cf 230->236 231->230 234 18e303605d3-18e303605e2 231->234 232->208 233->201 237 18e30360496-18e303604a5 233->237 234->235 235->191 236->191 238 18e303605d1 236->238 237->208 238->218
            APIs
            Memory Dump Source
            • Source File: 00000003.00000002.245471735.0000018E30360000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000018E30360000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_3_2_18e30360000_rundll32.jbxd
            Similarity
            • API ID: Virtual$AllocInfoLibraryLoadNativeProtectSystem
            • String ID:
            • API String ID: 395219687-0
            • Opcode ID: dd72a9d3825b757cb599c52874617b57d3dfc330cdb9a130d1801265dc8a93a8
            • Instruction ID: e574320a55fd866874c48a42dd2c1f9002ba192134b1b4e7eff8a21cbcffa022
            • Opcode Fuzzy Hash: dd72a9d3825b757cb599c52874617b57d3dfc330cdb9a130d1801265dc8a93a8
            • Instruction Fuzzy Hash: 9D220830618A0D8BEB789A5AC8D63F677D1FB55311F26852DDD87C3281EF24ED428B81
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 239 7ffff031380c-7ffff03138da 243 7ffff03138c0-7ffff0313986 call 7ffff0318d81 239->243 244 7ffff03138dc-7ffff03138ea 239->244 257 7ffff0313995-7ffff031399d 243->257 258 7ffff0313988-7ffff031398e 243->258 246 7ffff03138a5-7ffff03138af 244->246 247 7ffff03138ec-7ffff03138f4 244->247 248 7ffff03138b1-7ffff03138be 246->248 249 7ffff0313903-7ffff0313910 call 7ffff03179d8 246->249 251 7ffff0313912-7ffff0313adf call 7ffff03179d8 247->251 248->243 253 7ffff0313921-7ffff031392a 248->253 249->247 249->251 263 7ffff0313ae1 251->263 264 7ffff0313a8a-7ffff0313a8f call 7ffff031a49b 251->264 253->257 257->244 262 7ffff0313a53-7ffff0313a5e 257->262 258->257 261 7ffff0313990 258->261 261->248 261->249 266 7ffff0313a60-7ffff0313a69 262->266 267 7ffff0313a6b-7ffff0313a76 262->267 271 7ffff0313c29-7ffff0313c31 263->271 275 7ffff0313a94-7ffff0313a97 264->275 266->267 268 7ffff0313a78-7ffff0313a80 call 7ffff0318ebe 266->268 267->268 269 7ffff0313aa9-7ffff0313ab3 267->269 277 7ffff0313a85 268->277 273 7ffff0313ab5-7ffff0313ab8 269->273 274 7ffff0313a99-7ffff0313aa7 RtlAllocateHeap 269->274 278 7ffff0313bc3-7ffff0313bcb 271->278 279 7ffff0313c25-7ffff0313c27 271->279 274->269 274->273 275->262 275->274 277->274 281 7ffff0313bec-7ffff0313bf4 278->281 282 7ffff0313bcd-7ffff0313bda 278->282 279->271 280 7ffff0313bfa-7ffff0313c02 279->280 285 7ffff0313c12-7ffff0313c19 280->285 286 7ffff0313c04-7ffff0313c07 280->286 283 7ffff0313bf6-7ffff0313bf8 281->283 284 7ffff0313c09-7ffff0313c10 281->284 282->285 288 7ffff0313bdc-7ffff0313bde 282->288 283->280 289 7ffff0313be0-7ffff0313be8 283->289 290 7ffff0313bbe-7ffff0313c37 284->290 285->290 286->278 286->284 288->281 288->289 289->285 292 7ffff0313bea 289->292 292->284
            C-Code - Quality: 100%
            			E00007FFF7FFFF031380C(void* __eax, void* __ecx, long long __rax, long long __rcx, long long __rdx, long long _a8, long long _a16, char _a36, char _a37, void* _a40, long long _a56, long long _a72) {
            				signed int _t20;
            				signed long long _t36;
            
            				_a56 = __rax;
            				_a36 = 0x2c;
            				if (__eax == __eax) goto 0xf031381a;
            				_a36 = _a36 + 4;
            				_a37 = 0xd;
            				goto 0xf0313826;
            				_a37 = _a37 + 0x6b;
            				r8d = 1;
            				goto 0xf03138cf;
            				_a16 = __rdx;
            				_a8 = __rcx;
            				if (__eax == __eax) goto 0xf0313880;
            				_a72 = __rax;
            				goto 0xf031394a;
            				_t36 =  *((intOrPtr*)(__rax));
            				_t20 = E00007FFF7FFFF03191A6( *((intOrPtr*)(__rax + 8)));
            				goto 0xf0313767;
            				if (__ecx == __ecx) goto 0xf0313874;
            				goto 0xf03139d0;
            				if (_t20 % _t36 == _t20 % _t36) goto 0xf0313869;
            				goto 0xf0313754;
            				return _t20 / _t36;
            			}





            0x7ffff031380c
            0x7ffff0313811
            0x7ffff0313818
            0x7ffff031381a
            0x7ffff031381f
            0x7ffff0313824
            0x7ffff0313826
            0x7ffff031382b
            0x7ffff0313831
            0x7ffff0313836
            0x7ffff031383b
            0x7ffff0313842
            0x7ffff0313847
            0x7ffff031384c
            0x7ffff0313851
            0x7ffff0313854
            0x7ffff0313859
            0x7ffff0313867
            0x7ffff031386f
            0x7ffff031387e
            0x7ffff031388c
            0x7ffff0313895

            Strings
            Memory Dump Source
            • Source File: 00000003.00000002.245500356.00007FFFF0311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFFF0310000, based on PE: true
            • Associated: 00000003.00000002.245493238.00007FFFF0310000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000003.00000002.245598214.00007FFFF0365000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_3_2_7ffff0310000_rundll32.jbxd
            Similarity
            • API ID:
            • String ID: ,$k
            • API String ID: 0-3852353504
            • Opcode ID: 8d47e0b8f4703087ead341db03715c6e46e51465191cc7a91b0e76fe85ba9493
            • Instruction ID: 71b7b793cb2416b43c91db733fd1ae09fe45be5ac3cd3e8cf56de625d600c525
            • Opcode Fuzzy Hash: 8d47e0b8f4703087ead341db03715c6e46e51465191cc7a91b0e76fe85ba9493
            • Instruction Fuzzy Hash: 2B31A322D0C68283EB709715A65437AA6D1EF8D740F880235E6DE67BD5CF7CD8848701
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 294 180001000-180001023 CreateThread 295 180001030-180001037 294->295 296 180001025-18000102a SleepEx 295->296 297 180001039-18000103b ExitProcess 295->297 296->295
            APIs
            Memory Dump Source
            • Source File: 00000003.00000002.244835062.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
            • Associated: 00000003.00000002.244829729.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000003.00000002.244838553.0000000180002000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000003.00000002.244842939.0000000180003000.00000004.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
            Yara matches
            Similarity
            • API ID: CreateExitProcessSleepThread
            • String ID:
            • API String ID: 2449228014-0
            • Opcode ID: b1b8a2a17d72b8737e3efd17204ea4dad189a46fee2ea6b5e80811851aa5669d
            • Instruction ID: 995a4160c592a8e52e300b06ff3b17f76acf510bf4ee65cde584781cdca54b36
            • Opcode Fuzzy Hash: b1b8a2a17d72b8737e3efd17204ea4dad189a46fee2ea6b5e80811851aa5669d
            • Instruction Fuzzy Hash: 63E09231518648C6F3AADB21A81A3EA3266B788386F40C119F186444E5CF7C878DC704
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 298 7ffff0312cc5-7ffff0312cf7 299 7ffff0312cf8-7ffff0312d03 298->299 300 7ffff0312d05-7ffff0312d0f call 7ffff03179d8 299->300 301 7ffff0312d2d-7ffff0312d37 299->301 309 7ffff0312d66-7ffff0312d71 300->309 303 7ffff0312d11-7ffff0312d1d 301->303 304 7ffff0312d39-7ffff0312d47 301->304 306 7ffff0312d1f-7ffff0312d2b 303->306 307 7ffff0312d59-7ffff0312d64 303->307 304->300 308 7ffff0312d49-7ffff0312d57 LoadLibraryW 304->308 306->299 306->301 307->309 310 7ffff0312d76-7ffff0312d80 307->310 308->304 308->307 311 7ffff03133b6-7ffff03133c6 call 7ffff03179d8 309->311 310->308 312 7ffff0312d82-7ffff0312d8a 310->312 321 7ffff03133c8-7ffff03133cd 311->321 322 7ffff031340b-7ffff0313419 311->322 313 7ffff03135f1-7ffff03135f6 312->313 314 7ffff0313325 312->314 317 7ffff03135d5 313->317 318 7ffff03135f8-7ffff03135fd 313->318 320 7ffff0313331-7ffff03135a9 314->320 317->313 319 7ffff0313719-7ffff031371d 317->319 318->319 327 7ffff031371f 319->327 328 7ffff03135b1-7ffff03135b6 320->328 329 7ffff03135ab-7ffff03135ad 320->329 321->314 325 7ffff031341b-7ffff031342a 322->325 326 7ffff03133de-7ffff03133ed call 7ffff03179d8 322->326 331 7ffff03133ff-7ffff0313409 325->331 332 7ffff031342c-7ffff0313598 325->332 335 7ffff03133ef-7ffff03133fd 326->335 336 7ffff03133d2-7ffff03133dc 326->336 327->327 328->317 333 7ffff031359b-7ffff03135a2 329->333 331->321 332->333 335->331 339 7ffff0313396-7ffff03133a5 call 7ffff03179d8 335->339 336->326 338 7ffff03133a7-7ffff03133b4 call 7ffff03179d8 336->338 338->311 338->335 339->325 339->338
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000003.00000002.245500356.00007FFFF0311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFFF0310000, based on PE: true
            • Associated: 00000003.00000002.245493238.00007FFFF0310000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000003.00000002.245598214.00007FFFF0365000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_3_2_7ffff0310000_rundll32.jbxd
            Similarity
            • API ID: LibraryLoad
            • String ID: #+bV
            • API String ID: 1029625771-1914211113
            • Opcode ID: d142efb2de48434e45e95c7c8d1c0977c5999182573c305d870274eaa5e785a8
            • Instruction ID: 2fc799615501335acfd88c4a93215f63effa8ea73dad02cea7d8ab1d80bb89c1
            • Opcode Fuzzy Hash: d142efb2de48434e45e95c7c8d1c0977c5999182573c305d870274eaa5e785a8
            • Instruction Fuzzy Hash: 7B41D326D0C68683F3B09A10E6543BD62E1EF49700F940735E5BE677D5EE2DE9458B01
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            C-Code - Quality: 92%
            			E00007FFF7FFFF0313729(void* __eax, void* __ebx, void* __edx, void* __esp, void* __rax, intOrPtr* __rcx, long long __rdx) {
            				void* _t37;
            				char _t40;
            				char _t42;
            				void* _t43;
            				signed int _t45;
            				intOrPtr _t48;
            				intOrPtr _t50;
            				void* _t53;
            				intOrPtr* _t79;
            				void* _t83;
            				long long _t88;
            				signed long long _t89;
            				long long _t90;
            				void* _t91;
            				void* _t92;
            				void* _t93;
            				void* _t94;
            				void* _t98;
            				void* _t99;
            				void* _t100;
            				void* _t101;
            				void* _t102;
            				void* _t103;
            				void* _t104;
            
            				_t90 = __rdx;
            				_t53 = __edx;
            				if (__eax != 0) goto 0xf0313738;
            				r8d = 0xa;
            				goto 0xf03137d5;
            				_t48 =  *((intOrPtr*)(_t94 + 0x20));
            				_t37 = E00007FFF7FFFF0313DBF(__eax, _t48, __rdx, _t91, _t92, _t100, _t102);
            				goto 0xf0313a3b;
            				if (E00007FFF7FFFF0313AE1(_t37, _t83, __rcx, _t98, _t99) == 0) goto 0xf031372d;
            				goto 0xf03137f0;
            				 *((intOrPtr*)(_t93 + 0x17)) =  *((intOrPtr*)(_t93 + 0x17)) + _t53;
            				goto 0xf0313851;
            				 *((long long*)(_t94 + 0x48)) =  *((intOrPtr*)(_t94 + 0x80));
            				if (__esp == __esp) goto 0xf0313793;
            				_t40 = E00007FFF7FFFF031A49B( *__rcx, __rcx, __rcx, __rdx, _t92, _t98, _t99, _t100, _t101, _t102, _t103, _t104);
            				goto 0xf03137e0;
            				 *((char*)(_t94 + 0x20)) = _t40;
            				if (_t48 == _t48) goto 0xf03137bb;
            				if (_t53 == _t53) goto 0xf03137c8;
            				_t42 = E00007FFF7FFFF0318EBE( *((intOrPtr*)(__rcx + 1)));
            				if (_t48 == _t48) goto 0xf0313788;
            				if (__ebx == __ebx) goto 0xf03137a0;
            				 *((char*)(_t94 + 0x21)) = _t42;
            				goto 0xf0313746;
            				r8d = r8d + 6;
            				if (__esp == __esp) goto 0xf03137aa;
            				_t88 =  *((intOrPtr*)(_t94 + 0x88));
            				goto 0xf0313a14;
            				_t50 =  *((intOrPtr*)(_t94 + 0x21));
            				_t43 = E00007FFF7FFFF0313AE1(_t42, _t83, _t88, _t98, _t99);
            				_t79 =  *((intOrPtr*)(_t94 + 0x30)) + 2;
            				 *((long long*)(_t94 + 0x38)) = _t79;
            				 *((char*)(_t94 + 0x24)) = 0x2c;
            				if (_t43 == _t43) goto 0xf031381a;
            				 *((char*)(_t94 + 0x24)) =  *((char*)(_t94 + 0x24)) + 4;
            				 *((char*)(_t94 + 0x25)) = 0xd;
            				goto 0xf0313826;
            				 *((char*)(_t94 + 0x25)) =  *((char*)(_t94 + 0x25)) + 0x6b;
            				r8d = 1;
            				goto 0xf03138cf;
            				 *((long long*)(_t94 + 0x10)) = _t90;
            				 *((long long*)(_t94 + 8)) = _t88;
            				if (_t43 == _t43) goto 0xf0313880;
            				 *((long long*)(_t94 + 0x48)) = _t79;
            				goto 0xf031394a;
            				_t89 =  *_t79;
            				_t45 = E00007FFF7FFFF03191A6( *((intOrPtr*)(_t79 + 8)));
            				goto 0xf0313767;
            				if (_t50 == _t50) goto 0xf0313874;
            				goto 0xf03139d0;
            				if (_t45 % _t89 == _t45 % _t89) goto 0xf0313869;
            				goto 0xf0313754;
            				return _t45 / _t89;
            			}



























            0x7ffff0313729
            0x7ffff0313729
            0x7ffff031372b
            0x7ffff031372d
            0x7ffff0313733
            0x7ffff0313738
            0x7ffff031373c
            0x7ffff0313741
            0x7ffff031374d
            0x7ffff031374f
            0x7ffff0313757
            0x7ffff0313762
            0x7ffff0313767
            0x7ffff0313786
            0x7ffff0313788
            0x7ffff0313791
            0x7ffff0313793
            0x7ffff031379e
            0x7ffff03137a8
            0x7ffff03137b2
            0x7ffff03137b9
            0x7ffff03137c6
            0x7ffff03137c8
            0x7ffff03137d0
            0x7ffff03137d5
            0x7ffff03137de
            0x7ffff03137e0
            0x7ffff03137eb
            0x7ffff03137f0
            0x7ffff03137f4
            0x7ffff0313803
            0x7ffff031380c
            0x7ffff0313811
            0x7ffff0313818
            0x7ffff031381a
            0x7ffff031381f
            0x7ffff0313824
            0x7ffff0313826
            0x7ffff031382b
            0x7ffff0313831
            0x7ffff0313836
            0x7ffff031383b
            0x7ffff0313842
            0x7ffff0313847
            0x7ffff031384c
            0x7ffff0313851
            0x7ffff0313854
            0x7ffff0313859
            0x7ffff0313867
            0x7ffff031386f
            0x7ffff031387e
            0x7ffff031388c
            0x7ffff0313895

            Memory Dump Source
            • Source File: 00000003.00000002.245500356.00007FFFF0311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFFF0310000, based on PE: true
            • Associated: 00000003.00000002.245493238.00007FFFF0310000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000003.00000002.245598214.00007FFFF0365000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_3_2_7ffff0310000_rundll32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 6259535029c6565e0e1edbe0b2ce0dcec9b27bcc6421e556f39a3743fc6b1e1c
            • Instruction ID: c12f48e8ce9f57ff4e2cae38cffeed81619ecbc61cb738f8540c422cec3d059c
            • Opcode Fuzzy Hash: 6259535029c6565e0e1edbe0b2ce0dcec9b27bcc6421e556f39a3743fc6b1e1c
            • Instruction Fuzzy Hash: 7B319596E0C48283F7B0D66596142BE67E1AFCDB40F988231D6EE677C5CE3DE8458700
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 33%
            			E00000001180001044(long long __rbx, long long __rsi, void* __r11) {
            				void* _t109;
            				long long _t112;
            				intOrPtr _t117;
            				void* _t121;
            				signed long long _t127;
            				void* _t129;
            				long long _t130;
            				signed long long _t136;
            				signed long long _t137;
            				signed long long _t138;
            				signed long long _t139;
            				long _t141;
            				void* _t142;
            				void* _t144;
            				void* _t145;
            				signed long long _t148;
            				void* _t151;
            				void* _t155;
            				intOrPtr _t157;
            
            				_t135 = __rsi;
            				_t113 = __rbx;
            				 *((long long*)(_t144 + 0x18)) = __rbx;
            				 *((long long*)(_t144 + 0x20)) = __rsi;
            				_t142 = _t144 - 0x2b0;
            				_t145 = _t144 - 0x3b0;
            				E00000001180001688(_t109, __rbx, _t142 + 0x56, _t142 + 0x15a, __rsi, _t151, _t155);
            				if (E000000011800012BC(_t113, _t142 + 0x2d0, _t135, _t142 + 0x2d8) != 0) goto 0x80001097;
            				GetLastError();
            				goto 0x8000122a;
            				_t130 =  *((intOrPtr*)(_t142 + 0x2d0));
            				_t127 =  *((intOrPtr*)(_t142 + 0x2d8));
            				 *(_t145 + 0x38) =  *(_t145 + 0x38) & 0x00000000;
            				 *((long long*)(_t145 + 0x20)) = _t130;
            				 *((long long*)(_t145 + 0x28)) = _t130;
            				_t136 = _t127 - 0x10;
            				_t121 = _t136 + _t130;
            				 *(_t145 + 0x30) = _t136;
            				if (_t121 == 0) goto 0x800010ed;
            				asm("movups xmm0, [ecx]");
            				_t112 = _t121 - _t130 - _t127;
            				asm("movups [esp+eax+0x50], xmm0");
            				_t137 =  *(_t145 + 0x30);
            				_t157 =  *((intOrPtr*)(_t145 + 0x20));
            				r10d = 0;
            				if (_t157 == 0) goto 0x80001211;
            				if (_t137 - 4 < 0) goto 0x80001211;
            				_t138 = _t137 + 0xfffffffc;
            				 *(_t145 + 0x30) = _t138;
            				if ( *((intOrPtr*)(_t145 + 0x28)) != 0) goto 0x8000114e;
            				if (_t138 == 0) goto 0x80001211;
            				GetProcessHeap();
            				_t148 = _t138 + 1;
            				HeapAlloc(_t129, _t141);
            				 *((long long*)(_t145 + 0x28)) = _t112;
            				if (_t112 == 0) goto 0x8000120a;
            				r10d = 1;
            				r9d =  *(_t138 + _t157);
            				r11d = 0;
            				r9d = r9d ^  *(_t145 + 0x40);
            				 *(_t145 + 0x38) = _t138;
            				if (_t138 == 0) goto 0x800011cd;
            				r8d = _t127 + 1;
            				r8d = r8d & 0x00000003;
            				 *(__r11 + _t112) =  *((intOrPtr*)(_t145 + 0x40 + _t148 * 4)) +  *((intOrPtr*)(_t145 + 0x40 + _t127 * 4)) ^  *(__r11 + _t157);
            				asm("ror eax, cl");
            				 *((intOrPtr*)(_t145 + 0x40 + _t127 * 4)) =  *((intOrPtr*)(_t145 + 0x40 + _t127 * 4)) + 1;
            				asm("ror eax, cl");
            				 *((intOrPtr*)(_t145 + 0x40 + _t148 * 4)) =  *((intOrPtr*)(_t145 + 0x40 + _t148 * 4)) + 1;
            				_t117 =  *((intOrPtr*)(_t145 + 0x28));
            				if (__r11 + 1 -  *(_t145 + 0x30) >= 0) goto 0x800011c1;
            				goto 0x80001164;
            				_t139 =  *(_t145 + 0x38);
            				if (_t139 == 0) goto 0x800011e7;
            				asm("rol ecx, 0x3");
            				if (_t127 + 1 - _t139 < 0) goto 0x800011d6;
            				if (r9d == 0 + ( *(_t127 + _t117) & 0x000000ff)) goto 0x80001244;
            				if (r10d == 0) goto 0x80001211;
            				if (_t117 == 0) goto 0x80001211;
            				GetProcessHeap();
            				HeapFree(??, ??, ??);
            				if ( *((intOrPtr*)(_t142 + 0x2d0)) == 0) goto 0x8000122a;
            				GetProcessHeap();
            				HeapFree(??, ??, ??);
            				return 0;
            			}






















            0x180001044
            0x180001044
            0x180001044
            0x180001049
            0x180001052
            0x18000105a
            0x18000106c
            0x18000108a
            0x18000108c
            0x180001092
            0x180001097
            0x18000109e
            0x1800010a8
            0x1800010b1
            0x1800010b6
            0x1800010bb
            0x1800010bf
            0x1800010c3
            0x1800010cb
            0x1800010cd
            0x1800010d6
            0x1800010d9
            0x1800010de
            0x1800010e8
            0x1800010ed
            0x1800010f3
            0x1800010fd
            0x180001103
            0x180001107
            0x18000110f
            0x180001114
            0x18000111a
            0x180001123
            0x18000112a
            0x180001130
            0x18000113b
            0x180001148
            0x18000114e
            0x180001152
            0x180001155
            0x18000115a
            0x180001162
            0x180001168
            0x18000116f
            0x180001185
            0x180001193
            0x180001197
            0x1800011a5
            0x1800011a9
            0x1800011ae
            0x1800011b8
            0x1800011bf
            0x1800011c8
            0x1800011d4
            0x1800011df
            0x1800011e5
            0x1800011ea
            0x1800011ef
            0x1800011f4
            0x1800011f6
            0x180001204
            0x180001214
            0x180001216
            0x180001224
            0x180001243

            APIs
            Strings
            Memory Dump Source
            • Source File: 00000003.00000002.244835062.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
            • Associated: 00000003.00000002.244829729.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000003.00000002.244838553.0000000180002000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000003.00000002.244842939.0000000180003000.00000004.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
            Yara matches
            Similarity
            • API ID: Heap$Process$AllocCommandCreateErrorFileFreeLastLine
            • String ID: @$C:\Users\user\Desktop\ijexogdf64.dll
            • API String ID: 3306398369-3727859140
            • Opcode ID: 37e6d1a6bd61851543567811daaf37c24ed177b5ee092c65ccdc5420a2f6a0eb
            • Instruction ID: edb68f4d90fcc4c612c9dfadceab7a85852652e7e7ff21404a576820c97af2f2
            • Opcode Fuzzy Hash: 37e6d1a6bd61851543567811daaf37c24ed177b5ee092c65ccdc5420a2f6a0eb
            • Instruction Fuzzy Hash: 90619372205B84CAEBA6CF21E4443D97761F78C7D9F488221EB8957A99DF38C74AC700
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 16%
            			E000000011800014A0(long long __rbx, void* __rcx, void* __rdx, long long __rdi, long long __rsi, long long __rbp, void* _a8, void* _a16, void* _a24, void* _a32) {
            				long long _t40;
            				void* _t44;
            				long long* _t55;
            				long long _t63;
            				CHAR* _t66;
            
            				_t40 = _t63;
            				 *((long long*)(_t40 + 8)) = __rbx;
            				 *((long long*)(_t40 + 0x10)) = __rbp;
            				 *((long long*)(_t40 + 0x18)) = __rsi;
            				 *((long long*)(_t40 + 0x20)) = __rdi;
            				if ( *((intOrPtr*)(__rdx + 0x10)) == 0) goto 0x8000154e;
            				_t44 = __rbx + __rcx;
            				if ( *((intOrPtr*)(_t44 + 0xc)) == 0) goto 0x8000154e;
            				LoadLibraryA(_t66);
            				if (_t40 == 0) goto 0x80001544;
            				if ( *((intOrPtr*)(_t44 + 0x10)) != 0) goto 0x800014ef;
            				_t55 = __rdi + __rcx;
            				goto 0x80001536;
            				if (_t40 >= 0) goto 0x80001505;
            				goto 0x8000150c;
            				GetProcAddress(??, ??);
            				if (_t40 == 0) goto 0x80001544;
            				if ( *((intOrPtr*)(_t44 + 0x10)) == 0) goto 0x80001525;
            				 *_t55 = _t40;
            				goto 0x8000152f;
            				 *((long long*)(__rbp + _t40 + __rcx)) = _t40;
            				if ( *((intOrPtr*)(_t55 + 8)) != 0) goto 0x800014f8;
            				goto 0x800014cc;
            				GetLastError();
            				goto 0x80001553;
            				return 1;
            			}








            0x1800014a0
            0x1800014a3
            0x1800014a7
            0x1800014ab
            0x1800014af
            0x1800014c0
            0x1800014c9
            0x1800014d1
            0x1800014d8
            0x1800014e4
            0x1800014eb
            0x1800014f1
            0x1800014f6
            0x1800014fe
            0x180001503
            0x18000150c
            0x180001518
            0x18000151e
            0x180001520
            0x180001523
            0x18000152a
            0x18000153c
            0x180001542
            0x180001544
            0x18000154c
            0x18000156d

            APIs
            Memory Dump Source
            • Source File: 00000003.00000002.244835062.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
            • Associated: 00000003.00000002.244829729.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000003.00000002.244838553.0000000180002000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000003.00000002.244842939.0000000180003000.00000004.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
            Yara matches
            Similarity
            • API ID: AddressErrorLastLibraryLoadProc
            • String ID:
            • API String ID: 3511525774-0
            • Opcode ID: 79ae648c620947bd08369dc5fe77ed55b75f399bff2a9fb6986f004473391dde
            • Instruction ID: 64a7af8ad88c2c3b96373083f28d5d138c6f990d5ec75d668333d391b74bbb62
            • Opcode Fuzzy Hash: 79ae648c620947bd08369dc5fe77ed55b75f399bff2a9fb6986f004473391dde
            • Instruction Fuzzy Hash: 15213271701B48CBEB9ACB1598443E872E1FB4CBC6F04C415EA1A4B784DF38D659C710
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            Memory Dump Source
            • Source File: 00000003.00000002.244835062.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
            • Associated: 00000003.00000002.244829729.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000003.00000002.244838553.0000000180002000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000003.00000002.244842939.0000000180003000.00000004.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
            Yara matches
            Similarity
            • API ID: Heap$File$Process$AllocCloseCreateFreeHandleReadSize
            • String ID:
            • API String ID: 3250796435-0
            • Opcode ID: 8a1d482df51977014dd727990c7250e65c850332ea86aba0de0c0d4bb6bdac1d
            • Instruction ID: f60ffbd99cf11e45288eb7afa630b804957ff5650f430d5521e5d15354dff841
            • Opcode Fuzzy Hash: 8a1d482df51977014dd727990c7250e65c850332ea86aba0de0c0d4bb6bdac1d
            • Instruction Fuzzy Hash: E1215C32704B5886FB92CF26A80439976A5BB8DFE1F05C115EE1943BA1DF38C64AC700
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            Strings
            Memory Dump Source
            • Source File: 00000003.00000002.244835062.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
            • Associated: 00000003.00000002.244829729.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000003.00000002.244838553.0000000180002000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000003.00000002.244842939.0000000180003000.00000004.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
            Yara matches
            Similarity
            • API ID: ErrorFileLastModuleName
            • String ID: C:\Users\user\Desktop\ijexogdf64.dll
            • API String ID: 2776309574-1601156872
            • Opcode ID: 9d9b05e47c826fc21c88ac6377e472fa158e23e895d5d211de74082a9615c76a
            • Instruction ID: d515e6b97e8712b693a122997f0648c0367dba3bf5d74b011ae3cc4b5a11ad40
            • Opcode Fuzzy Hash: 9d9b05e47c826fc21c88ac6377e472fa158e23e895d5d211de74082a9615c76a
            • Instruction Fuzzy Hash: DAD0C970B1460882FAA2A7669C853C43254B75C7C6F84C051E444412A4EE6A879DC700
            Uniqueness

            Uniqueness Score: -1.00%