Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
ijexogdf64.dll

Overview

General Information

Sample Name:ijexogdf64.dll
Analysis ID:682774
MD5:d243c07128ee42bccef33bda67ec61d9
SHA1:5089dd76080329877c488325bc8ef8f736d1d1e4
SHA256:d45c78fa400b32c11443061dcd1c286d971881ddf35a47143e4d426a3ec6bffd
Tags:BokbotDLLexeIcedID
Infos:

Detection

IcedID
Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Antivirus detection for URL or domain
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Yara detected IcedID
C2 URLs / IPs found in malware configuration
PE file does not import any functions
Yara signature match
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Program does not show much activity (idle)
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • loaddll64.exe (PID: 4612 cmdline: loaddll64.exe "C:\Users\user\Desktop\ijexogdf64.dll" MD5: 4E8A40CAD6CCC047914E3A7830A2D8AA)
    • cmd.exe (PID: 2812 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\ijexogdf64.dll",#1 MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
      • rundll32.exe (PID: 4276 cmdline: rundll32.exe "C:\Users\user\Desktop\ijexogdf64.dll",#1 MD5: 73C519F050C20580F8A62C849D49215A)
    • rundll32.exe (PID: 4592 cmdline: rundll32.exe C:\Users\user\Desktop\ijexogdf64.dll,JdXfbK MD5: 73C519F050C20580F8A62C849D49215A)
    • rundll32.exe (PID: 3812 cmdline: rundll32.exe C:\Users\user\Desktop\ijexogdf64.dll,MDlQdmktXg MD5: 73C519F050C20580F8A62C849D49215A)
    • rundll32.exe (PID: 5324 cmdline: rundll32.exe C:\Users\user\Desktop\ijexogdf64.dll,VejwwBbES MD5: 73C519F050C20580F8A62C849D49215A)
    • rundll32.exe (PID: 3784 cmdline: rundll32.exe "C:\Users\user\Desktop\ijexogdf64.dll",JdXfbK MD5: 73C519F050C20580F8A62C849D49215A)
    • rundll32.exe (PID: 4792 cmdline: rundll32.exe "C:\Users\user\Desktop\ijexogdf64.dll",MDlQdmktXg MD5: 73C519F050C20580F8A62C849D49215A)
    • rundll32.exe (PID: 3544 cmdline: rundll32.exe "C:\Users\user\Desktop\ijexogdf64.dll",VejwwBbES MD5: 73C519F050C20580F8A62C849D49215A)
    • rundll32.exe (PID: 2792 cmdline: rundll32.exe "C:\Users\user\Desktop\ijexogdf64.dll",XeZsfh MD5: 73C519F050C20580F8A62C849D49215A)
    • rundll32.exe (PID: 240 cmdline: rundll32.exe "C:\Users\user\Desktop\ijexogdf64.dll",YqufWwLNu MD5: 73C519F050C20580F8A62C849D49215A)
  • cleanup
{"url_path": "/news/", "C2 url": ["peranistaer.top", "gruvihabralo.nl", "klareqvino.com", "ultomductingbig.pro"], "Campaign ID": 1573268852}
SourceRuleDescriptionAuthorStrings
00000003.00000002.286218758.0000000180001000.00000020.00001000.00020000.00000000.sdmpJoeSecurity_IcedID_6Yara detected IcedIDJoe Security
    00000003.00000002.286218758.0000000180001000.00000020.00001000.00020000.00000000.sdmpWindows_Trojan_IcedID_91562d18unknownunknown
    • 0x400:$a: 44 8B 4C 19 2C 4C 03 D6 74 1C 4D 85 C0 74 17 4D 85 C9 74 12 41
    00000003.00000002.286266026.000001F73E077000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_IcedID_6Yara detected IcedIDJoe Security
      00000003.00000002.286266026.000001F73E077000.00000004.00000020.00020000.00000000.sdmpWindows_Trojan_IcedID_91562d18unknownunknown
      • 0x11f08:$a: 44 8B 4C 19 2C 4C 03 D6 74 1C 4D 85 C0 74 17 4D 85 C9 74 12 41
      SourceRuleDescriptionAuthorStrings
      3.2.rundll32.exe.180000000.0.unpackJoeSecurity_IcedID_6Yara detected IcedIDJoe Security
        3.2.rundll32.exe.180000000.0.unpackWindows_Trojan_IcedID_91562d18unknownunknown
        • 0x800:$a: 44 8B 4C 19 2C 4C 03 D6 74 1C 4D 85 C0 74 17 4D 85 C9 74 12 41
        3.2.rundll32.exe.1f73e088708.1.raw.unpackJoeSecurity_IcedID_6Yara detected IcedIDJoe Security
          3.2.rundll32.exe.1f73e088708.1.raw.unpackWindows_Trojan_IcedID_91562d18unknownunknown
          • 0x800:$a: 44 8B 4C 19 2C 4C 03 D6 74 1C 4D 85 C0 74 17 4D 85 C9 74 12 41
          No Sigma rule has matched
          No Snort rule has matched

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: ijexogdf64.dllVirustotal: Detection: 11%Perma Link
          Source: klareqvino.comAvira URL Cloud: Label: malware
          Source: peranistaer.topVirustotal: Detection: 15%Perma Link
          Source: klareqvino.comVirustotal: Detection: 12%Perma Link
          Source: gruvihabralo.nlVirustotal: Detection: 14%Perma Link
          Source: Yara matchFile source: 3.2.rundll32.exe.180000000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.rundll32.exe.1f73e088708.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000003.00000002.286218758.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.286266026.000001F73E077000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: 00000003.00000002.286266026.000001F73E077000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: IcedID {"url_path": "/news/", "C2 url": ["peranistaer.top", "gruvihabralo.nl", "klareqvino.com", "ultomductingbig.pro"], "Campaign ID": 1573268852}
          Source: ijexogdf64.dllStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT

          Networking

          barindex
          Source: Malware configuration extractorURLs: peranistaer.top
          Source: Malware configuration extractorURLs: gruvihabralo.nl
          Source: Malware configuration extractorURLs: klareqvino.com
          Source: Malware configuration extractorURLs: ultomductingbig.pro

          E-Banking Fraud

          barindex
          Source: Yara matchFile source: 3.2.rundll32.exe.180000000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.rundll32.exe.1f73e088708.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000003.00000002.286218758.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.286266026.000001F73E077000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY

          System Summary

          barindex
          Source: 3.2.rundll32.exe.180000000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_IcedID_91562d18 Author: unknown
          Source: 3.2.rundll32.exe.1f73e088708.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_IcedID_91562d18 Author: unknown
          Source: 00000003.00000002.286218758.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_IcedID_91562d18 Author: unknown
          Source: 00000003.00000002.286266026.000001F73E077000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_IcedID_91562d18 Author: unknown
          Source: ijexogdf64.dllStatic PE information: No import functions for PE file found
          Source: 3.2.rundll32.exe.180000000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_IcedID_91562d18 reference_sample = b9fb0a4c28613c556fb67a0b0e7c9d4c1236b60a161ad935e7387aec5911413a, os = windows, severity = x86, creation_date = 2022-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.IcedID, fingerprint = 024bbd15da6bc759e321779881b466b500f6364a1d67bbfdc950aedccbfbc022, id = 91562d18-28a1-4349-9e4b-92ad165510c9, last_modified = 2022-06-09
          Source: 3.2.rundll32.exe.1f73e088708.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_IcedID_91562d18 reference_sample = b9fb0a4c28613c556fb67a0b0e7c9d4c1236b60a161ad935e7387aec5911413a, os = windows, severity = x86, creation_date = 2022-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.IcedID, fingerprint = 024bbd15da6bc759e321779881b466b500f6364a1d67bbfdc950aedccbfbc022, id = 91562d18-28a1-4349-9e4b-92ad165510c9, last_modified = 2022-06-09
          Source: 00000003.00000002.286218758.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_IcedID_91562d18 reference_sample = b9fb0a4c28613c556fb67a0b0e7c9d4c1236b60a161ad935e7387aec5911413a, os = windows, severity = x86, creation_date = 2022-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.IcedID, fingerprint = 024bbd15da6bc759e321779881b466b500f6364a1d67bbfdc950aedccbfbc022, id = 91562d18-28a1-4349-9e4b-92ad165510c9, last_modified = 2022-06-09
          Source: 00000003.00000002.286266026.000001F73E077000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_IcedID_91562d18 reference_sample = b9fb0a4c28613c556fb67a0b0e7c9d4c1236b60a161ad935e7387aec5911413a, os = windows, severity = x86, creation_date = 2022-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.IcedID, fingerprint = 024bbd15da6bc759e321779881b466b500f6364a1d67bbfdc950aedccbfbc022, id = 91562d18-28a1-4349-9e4b-92ad165510c9, last_modified = 2022-06-09
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFC66E06111 NtCreateSection,NtMapViewOfSection,3_2_00007FFC66E06111
          Source: ijexogdf64.dllVirustotal: Detection: 11%
          Source: ijexogdf64.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: C:\Windows\System32\loaddll64.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\ijexogdf64.dll,JdXfbK
          Source: unknownProcess created: C:\Windows\System32\loaddll64.exe loaddll64.exe "C:\Users\user\Desktop\ijexogdf64.dll"
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\ijexogdf64.dll",#1
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\ijexogdf64.dll,JdXfbK
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\ijexogdf64.dll",#1
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\ijexogdf64.dll,MDlQdmktXg
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\ijexogdf64.dll,VejwwBbES
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\ijexogdf64.dll",JdXfbK
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\ijexogdf64.dll",MDlQdmktXg
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\ijexogdf64.dll",VejwwBbES
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\ijexogdf64.dll",XeZsfh
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\ijexogdf64.dll",YqufWwLNu
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\ijexogdf64.dll",#1Jump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\ijexogdf64.dll,JdXfbKJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\ijexogdf64.dll,MDlQdmktXgJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\ijexogdf64.dll,VejwwBbESJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\ijexogdf64.dll",JdXfbKJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\ijexogdf64.dll",MDlQdmktXgJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\ijexogdf64.dll",VejwwBbESJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\ijexogdf64.dll",XeZsfhJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\ijexogdf64.dll",YqufWwLNuJump to behavior
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\ijexogdf64.dll",#1Jump to behavior
          Source: classification engineClassification label: mal84.troj.winDLL@21/0@0/0
          Source: ijexogdf64.dllStatic PE information: Image base 0x180000000 > 0x60000000
          Source: ijexogdf64.dllStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFC66E03B20 push r13; ret 3_2_00007FFC66E03BA2
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFC66E012F6 push r10; ret 3_2_00007FFC66E01301
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800014A0 LoadLibraryA,GetProcAddress,GetLastError,3_2_00000001800014A0
          Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\loaddll64.exe TID: 1748Thread sleep time: -120000s >= -30000sJump to behavior
          Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
          Source: C:\Windows\System32\loaddll64.exeThread delayed: delay time: 120000Jump to behavior
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800014A0 LoadLibraryA,GetProcAddress,GetLastError,3_2_00000001800014A0
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180001044 GetLastError,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,lstrcpyA,lstrcpyA,3_2_0000000180001044
          Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\ijexogdf64.dll",#1Jump to behavior
          Source: C:\Windows\System32\rundll32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: 3.2.rundll32.exe.180000000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.rundll32.exe.1f73e088708.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000003.00000002.286218758.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.286266026.000001F73E077000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: 3.2.rundll32.exe.180000000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.rundll32.exe.1f73e088708.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000003.00000002.286218758.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.286266026.000001F73E077000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
          Valid Accounts1
          Native API
          Path Interception11
          Process Injection
          1
          Rundll32
          OS Credential Dumping1
          Security Software Discovery
          Remote ServicesData from Local SystemExfiltration Over Other Network Medium1
          Application Layer Protocol
          Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
          Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts11
          Virtualization/Sandbox Evasion
          LSASS Memory11
          Virtualization/Sandbox Evasion
          Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
          Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)11
          Process Injection
          Security Account Manager2
          System Information Discovery
          SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
          Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
          Obfuscated Files or Information
          NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 signatures2 2 Behavior Graph ID: 682774 Sample: ijexogdf64.dll Startdate: 12/08/2022 Architecture: WINDOWS Score: 84 19 Multi AV Scanner detection for domain / URL 2->19 21 Malicious sample detected (through community Yara rule) 2->21 23 Antivirus detection for URL or domain 2->23 25 3 other signatures 2->25 7 loaddll64.exe 1 2->7         started        process3 process4 9 cmd.exe 1 7->9         started        11 rundll32.exe 7->11         started        13 rundll32.exe 7->13         started        15 6 other processes 7->15 process5 17 rundll32.exe 9->17         started       

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          ijexogdf64.dll12%VirustotalBrowse
          No Antivirus matches
          SourceDetectionScannerLabelLinkDownload
          3.2.rundll32.exe.180000000.0.unpack100%AviraHEUR/AGEN.1205106Download File
          No Antivirus matches
          SourceDetectionScannerLabelLink
          peranistaer.top16%VirustotalBrowse
          peranistaer.top0%Avira URL Cloudsafe
          ultomductingbig.pro1%VirustotalBrowse
          ultomductingbig.pro0%Avira URL Cloudsafe
          klareqvino.com12%VirustotalBrowse
          klareqvino.com100%Avira URL Cloudmalware
          gruvihabralo.nl15%VirustotalBrowse
          gruvihabralo.nl0%Avira URL Cloudsafe
          No contacted domains info
          NameMaliciousAntivirus DetectionReputation
          peranistaer.toptrue
          • 16%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          ultomductingbig.protrue
          • 1%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          klareqvino.comtrue
          • 12%, Virustotal, Browse
          • Avira URL Cloud: malware
          unknown
          gruvihabralo.nltrue
          • 15%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          No contacted IP infos
          Joe Sandbox Version:35.0.0 Citrine
          Analysis ID:682774
          Start date and time:2022-08-12 00:31:20 +02:00
          Joe Sandbox Product:CloudBasic
          Overall analysis duration:0h 9m 26s
          Hypervisor based Inspection enabled:false
          Report type:full
          Sample file name:ijexogdf64.dll
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
          Run name:Run with higher sleep bypass
          Number of analysed new started processes analysed:38
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • HDC enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Detection:MAL
          Classification:mal84.troj.winDLL@21/0@0/0
          EGA Information:
          • Successful, ratio: 100%
          HDC Information:
          • Successful, ratio: 84.1% (good quality ratio 69.2%)
          • Quality average: 58.6%
          • Quality standard deviation: 38.6%
          HCA Information:
          • Successful, ratio: 93%
          • Number of executed functions: 7
          • Number of non-executed functions: 4
          Cookbook Comments:
          • Found application associated with file extension: .dll
          • Adjust boot time
          • Enable AMSI
          • Sleeps bigger than 300000ms are automatically reduced to 1000ms
          • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
          • Excluded IPs from analysis (whitelisted): 23.211.6.115
          • Excluded domains from analysis (whitelisted): www.bing.com, ris.api.iris.microsoft.com, e12564.dspb.akamaiedge.net, fs.microsoft.com, login.live.com, store-images.s-microsoft.com, sls.update.microsoft.com, ctldl.windowsupdate.com, store-images.s-microsoft.com-c.edgekey.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
          • Not all processes where analyzed, report is missing behavior information
          No simulations
          No context
          No context
          No context
          No context
          No context
          No created / dropped files found
          File type:PE32+ executable (DLL) (console) x86-64, for MS Windows
          Entropy (8bit):4.681680523290311
          TrID:
          • Win64 Dynamic Link Library (generic) (102004/3) 86.43%
          • Win64 Executable (generic) (12005/4) 10.17%
          • Generic Win/DOS Executable (2004/3) 1.70%
          • DOS Executable Generic (2002/1) 1.70%
          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.01%
          File name:ijexogdf64.dll
          File size:345600
          MD5:d243c07128ee42bccef33bda67ec61d9
          SHA1:5089dd76080329877c488325bc8ef8f736d1d1e4
          SHA256:d45c78fa400b32c11443061dcd1c286d971881ddf35a47143e4d426a3ec6bffd
          SHA512:91c4ca4b3c8051e2813387191414185add498ace63ccf52d420512d6f4fdbefd704b06472250489e4ea4206c18b88299d101f2921a9661adaaadfa7b0f3d5301
          SSDEEP:6144:7bCbif6Fsx+sjdfF+z/+Oz8A3z7S0+uiQ1j5X6UeoCcpWYnmajHcLGvUmVjQP:sa+sJArz8A3z7heeDeoCy9maj8LAj
          TLSH:7F749E78F704ADD6E56E467BCA92BCD912726E229F8EDDCD81647BC30463331EE06805
          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........4._.Z._.Z._.Z...Y.^.Z...Z.^.Z.....^.Z...X.^.Z.Rich_.Z.........................PE..d......T.........." .....>.................
          Icon Hash:74f0e4ecccdce0e4
          Entrypoint:0x180000000
          Entrypoint Section:
          Digitally signed:false
          Imagebase:0x180000000
          Subsystem:windows cui
          Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, DLL
          DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
          Time Stamp:0x54EF86E9 [Thu Feb 26 20:49:45 2015 UTC]
          TLS Callbacks:
          CLR (.Net) Version:
          OS Version Major:6
          OS Version Minor:0
          File Version Major:6
          File Version Minor:0
          Subsystem Version Major:6
          Subsystem Version Minor:0
          Import Hash:
          Instruction
          dec ebp
          pop edx
          nop
          add byte ptr [ebx], al
          add byte ptr [eax], al
          add byte ptr [eax+eax], al
          add byte ptr [eax], al
          NameVirtual AddressVirtual Size Is in Section
          IMAGE_DIRECTORY_ENTRY_EXPORT0x550000x133.rdata
          IMAGE_DIRECTORY_ENTRY_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_RESOURCE0x560000x1e0.rsrc
          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
          IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IAT0x00x0
          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
          NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
          .text0x10000x53df20x53e00False0.5699195463859911DOS executable (COM)4.663798377543847IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          .rdata0x550000x1330x200False0.525390625data3.6080974435457183IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          .rsrc0x560000x1e00x200False0.52734375data4.720822661998389IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          NameRVASizeTypeLanguageCountry
          RT_MANIFEST0x560600x17dXML 1.0 document textEnglishUnited States
          NameOrdinalAddress
          JdXfbK20x180009abe
          MDlQdmktXg30x180009706
          VejwwBbES40x180009500
          XeZsfh50x180009773
          YqufWwLNu60x1800094d8
          aFXQhh70x180009610
          douGisQTrEbuU80x1800097d7
          mcejso90x180009895
          sIwYjgNBY100x180009baa
          vwcKpBZWAuPZtofG110x180009a56
          wCUxVrXTsMGVxBGr120x1800099de
          zubitjkfnasyfujask10x1800010c0
          Language of compilation systemCountry where language is spokenMap
          EnglishUnited States
          No network behavior found

          Click to jump to process

          Click to jump to process

          Click to jump to process

          Target ID:0
          Start time:00:32:30
          Start date:12/08/2022
          Path:C:\Windows\System32\loaddll64.exe
          Wow64 process (32bit):false
          Commandline:loaddll64.exe "C:\Users\user\Desktop\ijexogdf64.dll"
          Imagebase:0x7ff6af5e0000
          File size:140288 bytes
          MD5 hash:4E8A40CAD6CCC047914E3A7830A2D8AA
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high

          Target ID:1
          Start time:00:32:30
          Start date:12/08/2022
          Path:C:\Windows\System32\cmd.exe
          Wow64 process (32bit):false
          Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\ijexogdf64.dll",#1
          Imagebase:0x7ff709f60000
          File size:273920 bytes
          MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high

          Target ID:2
          Start time:00:32:30
          Start date:12/08/2022
          Path:C:\Windows\System32\rundll32.exe
          Wow64 process (32bit):false
          Commandline:rundll32.exe C:\Users\user\Desktop\ijexogdf64.dll,JdXfbK
          Imagebase:0x7ff646e60000
          File size:69632 bytes
          MD5 hash:73C519F050C20580F8A62C849D49215A
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high

          Target ID:3
          Start time:00:32:31
          Start date:12/08/2022
          Path:C:\Windows\System32\rundll32.exe
          Wow64 process (32bit):false
          Commandline:rundll32.exe "C:\Users\user\Desktop\ijexogdf64.dll",#1
          Imagebase:0x7ff646e60000
          File size:69632 bytes
          MD5 hash:73C519F050C20580F8A62C849D49215A
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Yara matches:
          • Rule: JoeSecurity_IcedID_6, Description: Yara detected IcedID, Source: 00000003.00000002.286218758.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
          • Rule: Windows_Trojan_IcedID_91562d18, Description: unknown, Source: 00000003.00000002.286218758.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Author: unknown
          • Rule: JoeSecurity_IcedID_6, Description: Yara detected IcedID, Source: 00000003.00000002.286266026.000001F73E077000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
          • Rule: Windows_Trojan_IcedID_91562d18, Description: unknown, Source: 00000003.00000002.286266026.000001F73E077000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
          Reputation:high

          Target ID:6
          Start time:00:32:34
          Start date:12/08/2022
          Path:C:\Windows\System32\rundll32.exe
          Wow64 process (32bit):false
          Commandline:rundll32.exe C:\Users\user\Desktop\ijexogdf64.dll,MDlQdmktXg
          Imagebase:0x7ff646e60000
          File size:69632 bytes
          MD5 hash:73C519F050C20580F8A62C849D49215A
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high

          Target ID:7
          Start time:00:32:37
          Start date:12/08/2022
          Path:C:\Windows\System32\rundll32.exe
          Wow64 process (32bit):false
          Commandline:rundll32.exe C:\Users\user\Desktop\ijexogdf64.dll,VejwwBbES
          Imagebase:0x7ff646e60000
          File size:69632 bytes
          MD5 hash:73C519F050C20580F8A62C849D49215A
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high

          Target ID:9
          Start time:00:32:41
          Start date:12/08/2022
          Path:C:\Windows\System32\rundll32.exe
          Wow64 process (32bit):false
          Commandline:rundll32.exe "C:\Users\user\Desktop\ijexogdf64.dll",JdXfbK
          Imagebase:0x7ff646e60000
          File size:69632 bytes
          MD5 hash:73C519F050C20580F8A62C849D49215A
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language

          Target ID:10
          Start time:00:32:41
          Start date:12/08/2022
          Path:C:\Windows\System32\rundll32.exe
          Wow64 process (32bit):false
          Commandline:rundll32.exe "C:\Users\user\Desktop\ijexogdf64.dll",MDlQdmktXg
          Imagebase:0x7ff646e60000
          File size:69632 bytes
          MD5 hash:73C519F050C20580F8A62C849D49215A
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language

          Target ID:11
          Start time:00:32:41
          Start date:12/08/2022
          Path:C:\Windows\System32\rundll32.exe
          Wow64 process (32bit):false
          Commandline:rundll32.exe "C:\Users\user\Desktop\ijexogdf64.dll",VejwwBbES
          Imagebase:0x7ff646e60000
          File size:69632 bytes
          MD5 hash:73C519F050C20580F8A62C849D49215A
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language

          Target ID:12
          Start time:00:32:42
          Start date:12/08/2022
          Path:C:\Windows\System32\rundll32.exe
          Wow64 process (32bit):false
          Commandline:rundll32.exe "C:\Users\user\Desktop\ijexogdf64.dll",XeZsfh
          Imagebase:0x7ff646e60000
          File size:69632 bytes
          MD5 hash:73C519F050C20580F8A62C849D49215A
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language

          Target ID:13
          Start time:00:32:42
          Start date:12/08/2022
          Path:C:\Windows\System32\rundll32.exe
          Wow64 process (32bit):false
          Commandline:rundll32.exe "C:\Users\user\Desktop\ijexogdf64.dll",YqufWwLNu
          Imagebase:0x7ff646e60000
          File size:69632 bytes
          MD5 hash:73C519F050C20580F8A62C849D49215A
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language

          Reset < >

            Execution Graph

            Execution Coverage:3.8%
            Dynamic/Decrypted Code Coverage:56.3%
            Signature Coverage:31%
            Total number of Nodes:87
            Total number of Limit Nodes:8
            execution_graph 4850 7ffc66e03729 4851 7ffc66e0372d 4850->4851 4852 7ffc66e03a99 RtlAllocateHeap 4851->4852 4853 7ffc66e03a78 4851->4853 4852->4851 4852->4853 4772 7ffc66e02cc5 4773 7ffc66e02cf8 4772->4773 4774 7ffc66e02d49 LoadLibraryW 4773->4774 4775 7ffc66e02d05 4773->4775 4774->4773 4854 180001658 4855 180001661 GetModuleFileNameA 4854->4855 4856 18000167e 4854->4856 4855->4856 4857 180001678 GetLastError 4855->4857 4857->4856 4865 7ffc66e06262 4866 7ffc66e06111 4865->4866 4867 7ffc66e06132 NtCreateSection 4866->4867 4868 7ffc66e06142 4866->4868 4869 7ffc66e062f2 4866->4869 4867->4869 4870 7ffc66e062ca NtMapViewOfSection 4868->4870 4871 7ffc66e062ea 4868->4871 4870->4868 4870->4869 4776 7ffc66e062c1 4781 7ffc66e06111 4776->4781 4777 7ffc66e06132 NtCreateSection 4782 7ffc66e062f2 4777->4782 4778 7ffc66e06142 4779 7ffc66e062ca NtMapViewOfSection 4778->4779 4780 7ffc66e062ea 4778->4780 4779->4778 4779->4782 4781->4777 4781->4778 4781->4782 4858 7ffc66e06111 4863 7ffc66e06125 4858->4863 4859 7ffc66e06132 NtCreateSection 4864 7ffc66e062f2 4859->4864 4860 7ffc66e06142 4861 7ffc66e062ca NtMapViewOfSection 4860->4861 4862 7ffc66e062ea 4860->4862 4861->4860 4861->4864 4863->4858 4863->4859 4863->4860 4863->4864 4783 1f73e240000 4784 1f73e240036 4783->4784 4785 1f73e240127 GetNativeSystemInfo 4784->4785 4791 1f73e2404e1 4784->4791 4786 1f73e24015f VirtualAlloc 4785->4786 4785->4791 4787 1f73e24017d 4786->4787 4787->4787 4788 1f73e2402f1 LoadLibraryA 4787->4788 4789 1f73e240341 4787->4789 4788->4787 4790 1f73e2404bd VirtualProtect 4789->4790 4789->4791 4790->4789 4796 180001000 CreateThread 4797 180001030 4796->4797 4798 180001025 SleepEx 4797->4798 4799 180001039 ExitProcess 4797->4799 4798->4797 4800 180001570 4803 180001044 4800->4803 4820 180001688 GetCommandLineA 4803->4820 4808 180001097 4811 180001141 4808->4811 4812 18000111a GetProcessHeap HeapAlloc 4808->4812 4813 18000120a 4808->4813 4809 18000108c GetLastError 4819 18000122a 4809->4819 4810 180001216 GetProcessHeap HeapFree 4810->4819 4814 180001244 lstrcpyA lstrcpyA 4811->4814 4815 1800011ec 4811->4815 4812->4811 4812->4813 4813->4810 4813->4819 4814->4813 4816 180001297 4814->4816 4815->4813 4817 1800011f6 GetProcessHeap HeapFree 4815->4817 4837 1800013a0 VirtualAlloc 4816->4837 4817->4813 4821 180001071 4820->4821 4822 1800016ac StrStrIA 4820->4822 4828 1800012bc CreateFileA 4821->4828 4822->4821 4823 1800016c4 SHGetFolderPathA 4822->4823 4824 1800016e9 4823->4824 4825 1800016f0 lstrcatA lstrcpyA StrChrA 4823->4825 4824->4825 4826 180001716 4825->4826 4827 180001719 lstrcatA 4825->4827 4826->4827 4827->4821 4829 180001307 GetFileSize 4828->4829 4830 180001088 4828->4830 4831 180001381 CloseHandle 4829->4831 4832 18000131b GetProcessHeap HeapAlloc 4829->4832 4830->4808 4830->4809 4831->4830 4832->4831 4833 18000133b ReadFile 4832->4833 4834 18000135a 4833->4834 4834->4831 4835 18000136b GetProcessHeap HeapFree 4834->4835 4836 18000137f 4834->4836 4835->4836 4836->4831 4838 1800013d9 GetLastError 4837->4838 4840 1800013e6 4837->4840 4839 1800013df 4838->4839 4839->4813 4840->4839 4844 1800014a0 4840->4844 4843 180001450 VirtualProtect 4843->4839 4843->4843 4845 180001447 4844->4845 4848 1800014c6 4844->4848 4845->4839 4845->4843 4846 1800014d3 LoadLibraryA 4847 180001544 GetLastError 4846->4847 4846->4848 4847->4845 4848->4845 4848->4846 4849 18000150c GetProcAddress 4848->4849 4849->4847 4849->4848

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 0 7ffc66e06111-7ffc66e06123 1 7ffc66e06125-7ffc66e06130 0->1 2 7ffc66e06164-7ffc66e06173 0->2 3 7ffc66e0619a-7ffc66e061a4 1->3 4 7ffc66e06132-7ffc66e0613d NtCreateSection 1->4 2->1 5 7ffc66e06175-7ffc66e06184 2->5 3->4 7 7ffc66e061a6-7ffc66e061b5 3->7 6 7ffc66e06971-7ffc66e06976 4->6 5->7 8 7ffc66e06186-7ffc66e06198 5->8 12 7ffc66e0698b 6->12 13 7ffc66e06978 6->13 10 7ffc66e061b7-7ffc66e061cd 7->10 11 7ffc66e06142-7ffc66e06152 7->11 9 7ffc66e06154-7ffc66e0615f 8->9 14 7ffc66e062da-7ffc66e062e8 9->14 15 7ffc66e061cf-7ffc66e061e8 10->15 16 7ffc66e0621d-7ffc66e06230 10->16 11->8 11->9 18 7ffc66e06998-7ffc66e0699d 12->18 17 7ffc66e06984 13->17 19 7ffc66e062ca-7ffc66e062d8 NtMapViewOfSection 14->19 20 7ffc66e062ea-7ffc66e062f1 14->20 21 7ffc66e061ea-7ffc66e0621b 15->21 22 7ffc66e06232-7ffc66e06248 15->22 23 7ffc66e0624a-7ffc66e0625d 16->23 17->12 26 7ffc66e069c3 18->26 27 7ffc66e0699f 18->27 19->14 28 7ffc66e062f2-7ffc66e062fb 19->28 21->16 30 7ffc66e06298-7ffc66e062ae 21->30 22->23 24 7ffc66e0627d-7ffc66e06292 22->24 25 7ffc66e0637e-7ffc66e06393 23->25 24->10 24->30 31 7ffc66e0631b-7ffc66e06334 25->31 32 7ffc66e06395-7ffc66e063db 25->32 26->26 28->17 30->15 33 7ffc66e062b4-7ffc66e069a9 30->33 34 7ffc66e06336-7ffc66e064e0 31->34 35 7ffc66e06363-7ffc66e0637c 31->35 32->34 40 7ffc66e063e1-7ffc66e063f6 32->40 42 7ffc66e069ab-7ffc66e069b3 33->42 43 7ffc66e069c8-7ffc66e069cd 33->43 49 7ffc66e06446-7ffc66e06473 34->49 50 7ffc66e064e6-7ffc66e064f3 34->50 35->25 35->40 40->32 41 7ffc66e063f8-7ffc66e06443 40->41 41->49 42->18 46 7ffc66e0650d-7ffc66e0651b call 7ffc66e079d8 43->46 56 7ffc66e06563-7ffc66e06572 46->56 57 7ffc66e0651d-7ffc66e06531 46->57 58 7ffc66e06475-7ffc66e0648e 49->58 59 7ffc66e064a3-7ffc66e064ae 49->59 53 7ffc66e064bb-7ffc66e06765 50->53 54 7ffc66e064f5-7ffc66e0650b 50->54 61 7ffc66e06767-7ffc66e0676c 53->61 62 7ffc66e06771-7ffc66e06776 53->62 54->46 55 7ffc66e06551-7ffc66e06561 54->55 64 7ffc66e06574-7ffc66e06585 55->64 56->64 65 7ffc66e06596-7ffc66e065a3 call 7ffc66e079d8 56->65 57->54 63 7ffc66e06533-7ffc66e06543 57->63 74 7ffc66e069be 58->74 59->53 71 7ffc66e0677f-7ffc66e067c5 62->71 67 7ffc66e0658a-7ffc66e06594 call 7ffc66e079d8 63->67 68 7ffc66e06545-7ffc66e069ba 63->68 64->0 65->63 78 7ffc66e065a5-7ffc66e068dc 65->78 67->57 67->65 68->74 81 7ffc66e067c7-7ffc66e067d2 71->81 82 7ffc66e067f6-7ffc66e0680c 71->82 74->43 84 7ffc66e068de-7ffc66e068e9 78->84 85 7ffc66e0690d-7ffc66e0693c 78->85 88 7ffc66e067df-7ffc66e067f4 81->88 86 7ffc66e0683a-7ffc66e06852 82->86 87 7ffc66e0680e-7ffc66e06821 82->87 91 7ffc66e068f6-7ffc66e0690b 84->91 92 7ffc66e06955-7ffc66e0696b 85->92 93 7ffc66e0693e-7ffc66e06953 85->93 86->87 90 7ffc66e06854-7ffc66e0686a 86->90 87->81 88->71 88->82 90->88 94 7ffc66e06870-7ffc66e06994 90->94 91->85 95 7ffc66e06896-7ffc66e068ac 91->95 92->6 97 7ffc66e0687b-7ffc66e06890 92->97 93->91 93->92 94->18 95->84 97->93 97->95
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000003.00000002.286485184.00007FFC66E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFC66E00000, based on PE: true
            • Associated: 00000003.00000002.286480421.00007FFC66E00000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000003.00000002.286644465.00007FFC66E55000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_3_2_7ffc66e00000_rundll32.jbxd
            Similarity
            • API ID: CreateSection
            • String ID: !$%$%$&$)$*$*$,$-$2$3$<$?$@$@$D$H$H$`$y$~
            • API String ID: 2449625523-2699326552
            • Opcode ID: ae71ce33b2ff831bd31dc7ee09e58353459c4e54b112734a185f5b6d77d6ff7e
            • Instruction ID: 6143969bd6510824f7f795c613f13aa0c5e7f69dbae49eb936078337254cdee1
            • Opcode Fuzzy Hash: ae71ce33b2ff831bd31dc7ee09e58353459c4e54b112734a185f5b6d77d6ff7e
            • Instruction Fuzzy Hash: F3D1207290C2DACBE7B08B11E0583EAB7A0E794314F540135E2DD0A9D9DB7CD498EF61
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 98 180001688-1800016a6 GetCommandLineA 99 1800016a8-1800016aa 98->99 100 1800016ac-1800016c2 StrStrIA 98->100 101 18000172a-180001739 99->101 100->99 102 1800016c4-1800016e7 SHGetFolderPathA 100->102 103 1800016e9 102->103 104 1800016f0-180001714 lstrcatA lstrcpyA StrChrA 102->104 103->104 105 180001716 104->105 106 180001719-180001725 lstrcatA 104->106 105->106 106->101
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000003.00000002.286218758.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
            • Associated: 00000003.00000002.286214005.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000003.00000002.286223400.0000000180002000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000003.00000002.286227372.0000000180003000.00000004.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
            Yara matches
            Similarity
            • API ID: lstrcat$CommandFolderLinePathlstrcpy
            • String ID: c:\ProgramData\
            • API String ID: 1737627762-4167965204
            • Opcode ID: 20617e2baf8158c2edf60f7b48858558e409461de3a6bb6beb459add1b47c657
            • Instruction ID: e6560f335e628c7a2993b81ce91b1b856003c4fac3ee7d8d6e9e32c945d496e2
            • Opcode Fuzzy Hash: 20617e2baf8158c2edf60f7b48858558e409461de3a6bb6beb459add1b47c657
            • Instruction Fuzzy Hash: 10113635704B4892FB96CB25F8043D97362BB48BC1F88C425EA0A07B65EF78D64AC700
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 107 1f73e240000-1f73e24008f call 1f73e240618 * 6 120 1f73e2405fa 107->120 121 1f73e240095-1f73e240098 107->121 123 1f73e2405fc-1f73e240616 120->123 121->120 122 1f73e24009e-1f73e2400a1 121->122 122->120 124 1f73e2400a7-1f73e2400aa 122->124 124->120 125 1f73e2400b0-1f73e2400b3 124->125 125->120 126 1f73e2400b9-1f73e2400bc 125->126 126->120 127 1f73e2400c2-1f73e2400d0 126->127 127->120 128 1f73e2400d6-1f73e2400df 127->128 128->120 129 1f73e2400e5-1f73e2400ed 128->129 129->120 130 1f73e2400f3-1f73e240101 129->130 131 1f73e240127-1f73e240159 GetNativeSystemInfo 130->131 132 1f73e240103-1f73e240108 130->132 131->120 134 1f73e24015f-1f73e24017b VirtualAlloc 131->134 133 1f73e24010b-1f73e240125 132->133 133->131 133->133 135 1f73e24017d-1f73e240190 134->135 136 1f73e240192-1f73e24019d 134->136 135->136 137 1f73e24019f-1f73e2401ae 136->137 138 1f73e2401b0-1f73e2401cc 136->138 137->137 137->138 140 1f73e2401ce-1f73e2401cf 138->140 141 1f73e24020a-1f73e240217 138->141 142 1f73e2401d1-1f73e2401d7 140->142 143 1f73e24021d-1f73e240224 141->143 144 1f73e2402d2-1f73e2402d9 141->144 145 1f73e2401f9-1f73e240208 142->145 146 1f73e2401d9-1f73e2401f7 142->146 143->144 147 1f73e24022a-1f73e240237 143->147 148 1f73e2402db-1f73e2402eb 144->148 149 1f73e240345-1f73e24034c 144->149 145->141 145->142 146->145 146->146 147->144 152 1f73e24023d-1f73e240244 147->152 148->149 153 1f73e2402ed-1f73e2402ee 148->153 150 1f73e24034e-1f73e240361 149->150 151 1f73e2403c0-1f73e2403d1 149->151 150->151 156 1f73e240363-1f73e240364 150->156 154 1f73e2403d7-1f73e2403e0 151->154 155 1f73e2404e1-1f73e2404fa 151->155 157 1f73e240247-1f73e24024b 152->157 158 1f73e2402f1-1f73e24030a LoadLibraryA 153->158 159 1f73e2403e5-1f73e2403e7 154->159 174 1f73e2404fc-1f73e240504 155->174 175 1f73e240521-1f73e240525 155->175 160 1f73e240367-1f73e240380 156->160 161 1f73e2402ba-1f73e2402c4 157->161 162 1f73e24032c-1f73e240332 158->162 166 1f73e2404cc-1f73e2404db 159->166 167 1f73e2403ed-1f73e2403f8 159->167 188 1f73e2403a8-1f73e2403ab 160->188 168 1f73e24024d-1f73e240261 161->168 169 1f73e2402c6-1f73e2402cc 161->169 164 1f73e24030c 162->164 165 1f73e240334-1f73e24033f 162->165 170 1f73e24030e-1f73e240311 164->170 171 1f73e240313-1f73e240318 164->171 165->158 176 1f73e240341-1f73e240342 165->176 166->155 166->159 177 1f73e2403fa-1f73e2403fd 167->177 178 1f73e240411-1f73e240413 167->178 172 1f73e240263-1f73e240283 168->172 173 1f73e240285-1f73e240289 168->173 169->144 169->157 180 1f73e24031a-1f73e240329 170->180 171->180 181 1f73e2402b7-1f73e2402b8 172->181 182 1f73e24028b-1f73e24028d 173->182 183 1f73e24028f-1f73e240293 173->183 184 1f73e240508-1f73e24050e 174->184 185 1f73e240527-1f73e240540 175->185 186 1f73e240544-1f73e24054b 175->186 176->149 177->178 187 1f73e2403ff-1f73e240401 177->187 189 1f73e24044e-1f73e240451 178->189 190 1f73e240415-1f73e240418 178->190 180->162 181->161 193 1f73e2402aa-1f73e2402b4 182->193 194 1f73e240295-1f73e24029f 183->194 195 1f73e2402a1-1f73e2402a5 183->195 184->175 196 1f73e240510-1f73e24051f 184->196 185->186 199 1f73e2405f5-1f73e2405f8 186->199 200 1f73e240551-1f73e240569 186->200 187->178 203 1f73e240403-1f73e24040c 187->203 197 1f73e2403ad-1f73e2403ba 188->197 198 1f73e240382-1f73e240389 188->198 201 1f73e240453-1f73e240455 189->201 202 1f73e24045f-1f73e240461 189->202 191 1f73e24041a-1f73e24041c 190->191 192 1f73e240424-1f73e240426 190->192 191->192 207 1f73e24041e-1f73e240422 191->207 192->189 208 1f73e240428-1f73e24042b 192->208 193->181 194->193 195->181 204 1f73e2402a7 195->204 196->184 197->160 205 1f73e2403bc-1f73e2403bd 197->205 213 1f73e24038b-1f73e24038e 198->213 214 1f73e240390-1f73e240395 198->214 199->123 210 1f73e24057b-1f73e24058b 200->210 211 1f73e24056b-1f73e240579 200->211 201->202 212 1f73e240457-1f73e24045d 201->212 215 1f73e2404a7-1f73e2404a8 202->215 216 1f73e240463-1f73e240466 202->216 206 1f73e2404ab-1f73e2404b2 203->206 204->193 205->151 220 1f73e2404bd-1f73e2404ca VirtualProtect 206->220 221 1f73e2404b4-1f73e2404ba 206->221 222 1f73e240487-1f73e24048b 207->222 223 1f73e24042d-1f73e24042f 208->223 224 1f73e240437-1f73e240439 208->224 210->199 226 1f73e24058d-1f73e24058e 210->226 211->210 211->211 212->222 217 1f73e240397-1f73e2403a5 213->217 214->217 215->206 218 1f73e240468-1f73e24046a 216->218 219 1f73e240474-1f73e240476 216->219 217->188 218->219 227 1f73e24046c-1f73e240472 218->227 219->215 228 1f73e240478-1f73e24047b 219->228 220->166 221->220 222->206 223->224 229 1f73e240431-1f73e240435 223->229 224->189 230 1f73e24043b-1f73e24043e 224->230 231 1f73e240590-1f73e240594 226->231 227->222 235 1f73e24048d-1f73e24048f 228->235 236 1f73e24047d-1f73e24047f 228->236 229->222 237 1f73e24044a-1f73e24044c 230->237 238 1f73e240440-1f73e240442 230->238 232 1f73e2405b5-1f73e2405b8 231->232 233 1f73e240596-1f73e2405a0 231->233 240 1f73e2405ba-1f73e2405bd 232->240 241 1f73e2405bf-1f73e2405c3 232->241 239 1f73e2405a3-1f73e2405b3 233->239 235->215 243 1f73e240491-1f73e240494 235->243 236->235 242 1f73e240481-1f73e240482 236->242 237->189 237->215 238->237 244 1f73e240444-1f73e240448 238->244 239->232 239->239 240->241 245 1f73e2405d3-1f73e2405e2 240->245 246 1f73e2405e5-1f73e2405f3 241->246 247 1f73e2405c5-1f73e2405cf 241->247 242->222 243->215 248 1f73e240496-1f73e2404a5 243->248 244->222 245->246 246->199 247->199 249 1f73e2405d1 247->249 248->222 249->231
            APIs
            Memory Dump Source
            • Source File: 00000003.00000002.286453594.000001F73E240000.00000040.10000000.00040000.00000000.sdmp, Offset: 000001F73E240000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_3_2_1f73e240000_rundll32.jbxd
            Similarity
            • API ID: Virtual$AllocInfoLibraryLoadNativeProtectSystem
            • String ID:
            • API String ID: 395219687-0
            • Opcode ID: dd72a9d3825b757cb599c52874617b57d3dfc330cdb9a130d1801265dc8a93a8
            • Instruction ID: 1e2a4c26d0f47c1ca88e7fee654ec0a9ee29781b46fcf652de5e215c99153e74
            • Opcode Fuzzy Hash: dd72a9d3825b757cb599c52874617b57d3dfc330cdb9a130d1801265dc8a93a8
            • Instruction Fuzzy Hash: F622D83161CE2B9BEB689B58D845BF573D1FB54311F14093DD88BC32C1EA24EC869B86
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 250 7ffc66e0380c-7ffc66e038da 254 7ffc66e038c0-7ffc66e03986 call 7ffc66e08d81 250->254 255 7ffc66e038dc-7ffc66e038ea 250->255 268 7ffc66e03995-7ffc66e0399d 254->268 269 7ffc66e03988-7ffc66e0398e 254->269 257 7ffc66e038a5-7ffc66e038af 255->257 258 7ffc66e038ec-7ffc66e038f4 255->258 259 7ffc66e03903-7ffc66e03910 call 7ffc66e079d8 257->259 260 7ffc66e038b1-7ffc66e038be 257->260 262 7ffc66e03912-7ffc66e03adf call 7ffc66e079d8 258->262 259->258 259->262 260->254 263 7ffc66e03921-7ffc66e0392a 260->263 277 7ffc66e03a8a-7ffc66e03a8f call 7ffc66e0a49b 262->277 278 7ffc66e03ae1 262->278 263->268 268->255 273 7ffc66e03a53-7ffc66e03a5e 268->273 269->268 272 7ffc66e03990 269->272 272->259 272->260 275 7ffc66e03a6b-7ffc66e03a76 273->275 276 7ffc66e03a60-7ffc66e03a69 273->276 281 7ffc66e03a78-7ffc66e03a80 call 7ffc66e08ebe 275->281 282 7ffc66e03aa9-7ffc66e03ab3 275->282 276->275 276->281 284 7ffc66e03a94-7ffc66e03a97 277->284 279 7ffc66e03c29-7ffc66e03c31 278->279 288 7ffc66e03c25-7ffc66e03c27 279->288 289 7ffc66e03bc3-7ffc66e03bcb 279->289 290 7ffc66e03a85 281->290 286 7ffc66e03a99-7ffc66e03aa7 RtlAllocateHeap 282->286 287 7ffc66e03ab5-7ffc66e03ab8 282->287 284->273 284->286 286->282 286->287 288->279 291 7ffc66e03bfa-7ffc66e03c02 288->291 292 7ffc66e03bcd-7ffc66e03bda 289->292 293 7ffc66e03bec-7ffc66e03bf4 289->293 290->290 297 7ffc66e03c04-7ffc66e03c07 291->297 298 7ffc66e03c12-7ffc66e03c19 291->298 292->298 299 7ffc66e03bdc-7ffc66e03bde 292->299 295 7ffc66e03c09-7ffc66e03c10 293->295 296 7ffc66e03bf6-7ffc66e03bf8 293->296 301 7ffc66e03bbe-7ffc66e03c37 295->301 296->291 300 7ffc66e03be0-7ffc66e03be8 296->300 297->289 297->295 298->301 299->293 299->300 300->298 304 7ffc66e03bea 300->304 304->295
            C-Code - Quality: 100%
            			E00007FFC7FFC66E0380C(void* __eax, void* __ecx, long long __rax, long long __rcx, long long __rdx, long long _a8, long long _a16, char _a36, char _a37, void* _a40, long long _a56, long long _a72) {
            				signed int _t20;
            				signed long long _t36;
            
            				_a56 = __rax;
            				_a36 = 0x2c;
            				if (__eax == __eax) goto 0x66e0381a;
            				_a36 = _a36 + 4;
            				_a37 = 0xd;
            				goto 0x66e03826;
            				_a37 = _a37 + 0x6b;
            				r8d = 1;
            				goto 0x66e038cf;
            				_a16 = __rdx;
            				_a8 = __rcx;
            				if (__eax == __eax) goto 0x66e03880;
            				_a72 = __rax;
            				goto 0x66e0394a;
            				_t36 =  *((intOrPtr*)(__rax));
            				_t20 = E00007FFC7FFC66E091A6( *((intOrPtr*)(__rax + 8)));
            				goto 0x66e03767;
            				if (__ecx == __ecx) goto 0x66e03874;
            				goto 0x66e039d0;
            				if (_t20 % _t36 == _t20 % _t36) goto 0x66e03869;
            				goto 0x66e03754;
            				return _t20 / _t36;
            			}





            0x7ffc66e0380c
            0x7ffc66e03811
            0x7ffc66e03818
            0x7ffc66e0381a
            0x7ffc66e0381f
            0x7ffc66e03824
            0x7ffc66e03826
            0x7ffc66e0382b
            0x7ffc66e03831
            0x7ffc66e03836
            0x7ffc66e0383b
            0x7ffc66e03842
            0x7ffc66e03847
            0x7ffc66e0384c
            0x7ffc66e03851
            0x7ffc66e03854
            0x7ffc66e03859
            0x7ffc66e03867
            0x7ffc66e0386f
            0x7ffc66e0387e
            0x7ffc66e0388c
            0x7ffc66e03895

            Strings
            Memory Dump Source
            • Source File: 00000003.00000002.286485184.00007FFC66E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFC66E00000, based on PE: true
            • Associated: 00000003.00000002.286480421.00007FFC66E00000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000003.00000002.286644465.00007FFC66E55000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_3_2_7ffc66e00000_rundll32.jbxd
            Similarity
            • API ID:
            • String ID: ,$k
            • API String ID: 0-3852353504
            • Opcode ID: 8d47e0b8f4703087ead341db03715c6e46e51465191cc7a91b0e76fe85ba9493
            • Instruction ID: d0c3c6777a87b387d77b5f02d7c0f2a9416c18393ac6c7d6d19c0e3c261d7f82
            • Opcode Fuzzy Hash: 8d47e0b8f4703087ead341db03715c6e46e51465191cc7a91b0e76fe85ba9493
            • Instruction Fuzzy Hash: 0531D522D0C6ABC1EA708615A44467E67A1EB85740F940036F6CE4FBD9DE2CDCA0EF20
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 305 180001000-180001023 CreateThread 306 180001030-180001037 305->306 307 180001025-18000102a SleepEx 306->307 308 180001039-18000103b ExitProcess 306->308 307->306
            APIs
            Memory Dump Source
            • Source File: 00000003.00000002.286218758.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
            • Associated: 00000003.00000002.286214005.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000003.00000002.286223400.0000000180002000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000003.00000002.286227372.0000000180003000.00000004.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
            Yara matches
            Similarity
            • API ID: CreateExitProcessSleepThread
            • String ID:
            • API String ID: 2449228014-0
            • Opcode ID: b1b8a2a17d72b8737e3efd17204ea4dad189a46fee2ea6b5e80811851aa5669d
            • Instruction ID: 995a4160c592a8e52e300b06ff3b17f76acf510bf4ee65cde584781cdca54b36
            • Opcode Fuzzy Hash: b1b8a2a17d72b8737e3efd17204ea4dad189a46fee2ea6b5e80811851aa5669d
            • Instruction Fuzzy Hash: 63E09231518648C6F3AADB21A81A3EA3266B788386F40C119F186444E5CF7C878DC704
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 309 7ffc66e02cc5-7ffc66e02cf7 310 7ffc66e02cf8-7ffc66e02d03 309->310 311 7ffc66e02d05-7ffc66e02d0f call 7ffc66e079d8 310->311 312 7ffc66e02d2d-7ffc66e02d37 310->312 320 7ffc66e02d66-7ffc66e02d71 311->320 314 7ffc66e02d39-7ffc66e02d47 312->314 315 7ffc66e02d11-7ffc66e02d1d 312->315 314->311 319 7ffc66e02d49-7ffc66e02d57 LoadLibraryW 314->319 317 7ffc66e02d59-7ffc66e02d64 315->317 318 7ffc66e02d1f-7ffc66e02d2b 315->318 317->320 321 7ffc66e02d76-7ffc66e02d80 317->321 318->310 318->312 319->314 319->317 322 7ffc66e033b6-7ffc66e033c6 call 7ffc66e079d8 320->322 321->319 323 7ffc66e02d82-7ffc66e02d8a 321->323 332 7ffc66e0340b-7ffc66e03419 322->332 333 7ffc66e033c8-7ffc66e033cd 322->333 325 7ffc66e03325 323->325 326 7ffc66e035f1-7ffc66e035f6 323->326 330 7ffc66e03331-7ffc66e035a9 325->330 327 7ffc66e035f8-7ffc66e035fd 326->327 328 7ffc66e035d5 326->328 331 7ffc66e03719-7ffc66e0371d 327->331 328->326 328->331 339 7ffc66e035ab-7ffc66e035ad 330->339 340 7ffc66e035b1-7ffc66e035b6 330->340 341 7ffc66e0371f 331->341 336 7ffc66e0341b-7ffc66e0342a 332->336 337 7ffc66e033de-7ffc66e033ed call 7ffc66e079d8 332->337 333->325 342 7ffc66e033ff-7ffc66e03409 336->342 343 7ffc66e0342c-7ffc66e03598 336->343 347 7ffc66e033d2-7ffc66e033dc 337->347 348 7ffc66e033ef-7ffc66e033fd 337->348 345 7ffc66e0359b-7ffc66e035a2 339->345 340->328 341->341 342->333 343->345 347->337 349 7ffc66e033a7-7ffc66e033b4 call 7ffc66e079d8 347->349 348->342 351 7ffc66e03396-7ffc66e033a5 call 7ffc66e079d8 348->351 349->322 349->348 351->336 351->349
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000003.00000002.286485184.00007FFC66E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFC66E00000, based on PE: true
            • Associated: 00000003.00000002.286480421.00007FFC66E00000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000003.00000002.286644465.00007FFC66E55000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_3_2_7ffc66e00000_rundll32.jbxd
            Similarity
            • API ID: LibraryLoad
            • String ID: #+bV
            • API String ID: 1029625771-1914211113
            • Opcode ID: d142efb2de48434e45e95c7c8d1c0977c5999182573c305d870274eaa5e785a8
            • Instruction ID: fc8413829f569044d3619e85088b7533455e9cb70e946bf55efcf2658b2a9036
            • Opcode Fuzzy Hash: d142efb2de48434e45e95c7c8d1c0977c5999182573c305d870274eaa5e785a8
            • Instruction Fuzzy Hash: 0A41D22690C6AFC6F6B09650A058BBA5291EF54300F940136F6CE0F7D4EE2DEC65EF21
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            C-Code - Quality: 92%
            			E00007FFC7FFC66E03729(void* __eax, void* __ebx, void* __edx, void* __esp, void* __rax, intOrPtr* __rcx, long long __rdx) {
            				void* _t37;
            				char _t40;
            				char _t42;
            				void* _t43;
            				signed int _t45;
            				intOrPtr _t48;
            				intOrPtr _t50;
            				void* _t53;
            				intOrPtr* _t79;
            				void* _t83;
            				long long _t88;
            				signed long long _t89;
            				long long _t90;
            				void* _t91;
            				void* _t92;
            				void* _t93;
            				void* _t94;
            				void* _t98;
            				void* _t99;
            				void* _t100;
            				void* _t101;
            				void* _t102;
            				void* _t103;
            				void* _t104;
            
            				_t90 = __rdx;
            				_t53 = __edx;
            				if (__eax != 0) goto 0x66e03738;
            				r8d = 0xa;
            				goto 0x66e037d5;
            				_t48 =  *((intOrPtr*)(_t94 + 0x20));
            				_t37 = E00007FFC7FFC66E03DBF(__eax, _t48, __rdx, _t91, _t92, _t100, _t102);
            				goto 0x66e03a3b;
            				if (E00007FFC7FFC66E03AE1(_t37, _t83, __rcx, _t98, _t99) == 0) goto 0x66e0372d;
            				goto 0x66e037f0;
            				 *((intOrPtr*)(_t93 + 0x17)) =  *((intOrPtr*)(_t93 + 0x17)) + _t53;
            				goto 0x66e03851;
            				 *((long long*)(_t94 + 0x48)) =  *((intOrPtr*)(_t94 + 0x80));
            				if (__esp == __esp) goto 0x66e03793;
            				_t40 = E00007FFC7FFC66E0A49B( *__rcx, __rcx, __rcx, __rdx, _t92, _t98, _t99, _t100, _t101, _t102, _t103, _t104);
            				goto 0x66e037e0;
            				 *((char*)(_t94 + 0x20)) = _t40;
            				if (_t48 == _t48) goto 0x66e037bb;
            				if (_t53 == _t53) goto 0x66e037c8;
            				_t42 = E00007FFC7FFC66E08EBE( *((intOrPtr*)(__rcx + 1)));
            				if (_t48 == _t48) goto 0x66e03788;
            				if (__ebx == __ebx) goto 0x66e037a0;
            				 *((char*)(_t94 + 0x21)) = _t42;
            				goto 0x66e03746;
            				r8d = r8d + 6;
            				if (__esp == __esp) goto 0x66e037aa;
            				_t88 =  *((intOrPtr*)(_t94 + 0x88));
            				goto 0x66e03a14;
            				_t50 =  *((intOrPtr*)(_t94 + 0x21));
            				_t43 = E00007FFC7FFC66E03AE1(_t42, _t83, _t88, _t98, _t99);
            				_t79 =  *((intOrPtr*)(_t94 + 0x30)) + 2;
            				 *((long long*)(_t94 + 0x38)) = _t79;
            				 *((char*)(_t94 + 0x24)) = 0x2c;
            				if (_t43 == _t43) goto 0x66e0381a;
            				 *((char*)(_t94 + 0x24)) =  *((char*)(_t94 + 0x24)) + 4;
            				 *((char*)(_t94 + 0x25)) = 0xd;
            				goto 0x66e03826;
            				 *((char*)(_t94 + 0x25)) =  *((char*)(_t94 + 0x25)) + 0x6b;
            				r8d = 1;
            				goto 0x66e038cf;
            				 *((long long*)(_t94 + 0x10)) = _t90;
            				 *((long long*)(_t94 + 8)) = _t88;
            				if (_t43 == _t43) goto 0x66e03880;
            				 *((long long*)(_t94 + 0x48)) = _t79;
            				goto 0x66e0394a;
            				_t89 =  *_t79;
            				_t45 = E00007FFC7FFC66E091A6( *((intOrPtr*)(_t79 + 8)));
            				goto 0x66e03767;
            				if (_t50 == _t50) goto 0x66e03874;
            				goto 0x66e039d0;
            				if (_t45 % _t89 == _t45 % _t89) goto 0x66e03869;
            				goto 0x66e03754;
            				return _t45 / _t89;
            			}



























            0x7ffc66e03729
            0x7ffc66e03729
            0x7ffc66e0372b
            0x7ffc66e0372d
            0x7ffc66e03733
            0x7ffc66e03738
            0x7ffc66e0373c
            0x7ffc66e03741
            0x7ffc66e0374d
            0x7ffc66e0374f
            0x7ffc66e03757
            0x7ffc66e03762
            0x7ffc66e03767
            0x7ffc66e03786
            0x7ffc66e03788
            0x7ffc66e03791
            0x7ffc66e03793
            0x7ffc66e0379e
            0x7ffc66e037a8
            0x7ffc66e037b2
            0x7ffc66e037b9
            0x7ffc66e037c6
            0x7ffc66e037c8
            0x7ffc66e037d0
            0x7ffc66e037d5
            0x7ffc66e037de
            0x7ffc66e037e0
            0x7ffc66e037eb
            0x7ffc66e037f0
            0x7ffc66e037f4
            0x7ffc66e03803
            0x7ffc66e0380c
            0x7ffc66e03811
            0x7ffc66e03818
            0x7ffc66e0381a
            0x7ffc66e0381f
            0x7ffc66e03824
            0x7ffc66e03826
            0x7ffc66e0382b
            0x7ffc66e03831
            0x7ffc66e03836
            0x7ffc66e0383b
            0x7ffc66e03842
            0x7ffc66e03847
            0x7ffc66e0384c
            0x7ffc66e03851
            0x7ffc66e03854
            0x7ffc66e03859
            0x7ffc66e03867
            0x7ffc66e0386f
            0x7ffc66e0387e
            0x7ffc66e0388c
            0x7ffc66e03895

            Memory Dump Source
            • Source File: 00000003.00000002.286485184.00007FFC66E01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFC66E00000, based on PE: true
            • Associated: 00000003.00000002.286480421.00007FFC66E00000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000003.00000002.286644465.00007FFC66E55000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_3_2_7ffc66e00000_rundll32.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 6259535029c6565e0e1edbe0b2ce0dcec9b27bcc6421e556f39a3743fc6b1e1c
            • Instruction ID: ee4dfa2288b039f1cb49f088053a575b0360dbd5c7305de7a9eb11f0a113e8e8
            • Opcode Fuzzy Hash: 6259535029c6565e0e1edbe0b2ce0dcec9b27bcc6421e556f39a3743fc6b1e1c
            • Instruction Fuzzy Hash: DC318656A0C4BBC2EA70966594149BF5761AFC1B40F984032F5CE4F6D9CE2DEC61EF20
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 33%
            			E00000001180001044(long long __rbx, long long __rsi, void* __r11) {
            				void* _t109;
            				long long _t112;
            				intOrPtr _t117;
            				void* _t121;
            				signed long long _t127;
            				void* _t129;
            				long long _t130;
            				signed long long _t136;
            				signed long long _t137;
            				signed long long _t138;
            				signed long long _t139;
            				long _t141;
            				void* _t142;
            				void* _t144;
            				void* _t145;
            				signed long long _t148;
            				void* _t151;
            				void* _t155;
            				intOrPtr _t157;
            
            				_t135 = __rsi;
            				_t113 = __rbx;
            				 *((long long*)(_t144 + 0x18)) = __rbx;
            				 *((long long*)(_t144 + 0x20)) = __rsi;
            				_t142 = _t144 - 0x2b0;
            				_t145 = _t144 - 0x3b0;
            				E00000001180001688(_t109, __rbx, _t142 + 0x56, _t142 + 0x15a, __rsi, _t151, _t155);
            				if (E000000011800012BC(_t113, _t142 + 0x2d0, _t135, _t142 + 0x2d8) != 0) goto 0x80001097;
            				GetLastError();
            				goto 0x8000122a;
            				_t130 =  *((intOrPtr*)(_t142 + 0x2d0));
            				_t127 =  *((intOrPtr*)(_t142 + 0x2d8));
            				 *(_t145 + 0x38) =  *(_t145 + 0x38) & 0x00000000;
            				 *((long long*)(_t145 + 0x20)) = _t130;
            				 *((long long*)(_t145 + 0x28)) = _t130;
            				_t136 = _t127 - 0x10;
            				_t121 = _t136 + _t130;
            				 *(_t145 + 0x30) = _t136;
            				if (_t121 == 0) goto 0x800010ed;
            				asm("movups xmm0, [ecx]");
            				_t112 = _t121 - _t130 - _t127;
            				asm("movups [esp+eax+0x50], xmm0");
            				_t137 =  *(_t145 + 0x30);
            				_t157 =  *((intOrPtr*)(_t145 + 0x20));
            				r10d = 0;
            				if (_t157 == 0) goto 0x80001211;
            				if (_t137 - 4 < 0) goto 0x80001211;
            				_t138 = _t137 + 0xfffffffc;
            				 *(_t145 + 0x30) = _t138;
            				if ( *((intOrPtr*)(_t145 + 0x28)) != 0) goto 0x8000114e;
            				if (_t138 == 0) goto 0x80001211;
            				GetProcessHeap();
            				_t148 = _t138 + 1;
            				HeapAlloc(_t129, _t141);
            				 *((long long*)(_t145 + 0x28)) = _t112;
            				if (_t112 == 0) goto 0x8000120a;
            				r10d = 1;
            				r9d =  *(_t138 + _t157);
            				r11d = 0;
            				r9d = r9d ^  *(_t145 + 0x40);
            				 *(_t145 + 0x38) = _t138;
            				if (_t138 == 0) goto 0x800011cd;
            				r8d = _t127 + 1;
            				r8d = r8d & 0x00000003;
            				 *(__r11 + _t112) =  *((intOrPtr*)(_t145 + 0x40 + _t148 * 4)) +  *((intOrPtr*)(_t145 + 0x40 + _t127 * 4)) ^  *(__r11 + _t157);
            				asm("ror eax, cl");
            				 *((intOrPtr*)(_t145 + 0x40 + _t127 * 4)) =  *((intOrPtr*)(_t145 + 0x40 + _t127 * 4)) + 1;
            				asm("ror eax, cl");
            				 *((intOrPtr*)(_t145 + 0x40 + _t148 * 4)) =  *((intOrPtr*)(_t145 + 0x40 + _t148 * 4)) + 1;
            				_t117 =  *((intOrPtr*)(_t145 + 0x28));
            				if (__r11 + 1 -  *(_t145 + 0x30) >= 0) goto 0x800011c1;
            				goto 0x80001164;
            				_t139 =  *(_t145 + 0x38);
            				if (_t139 == 0) goto 0x800011e7;
            				asm("rol ecx, 0x3");
            				if (_t127 + 1 - _t139 < 0) goto 0x800011d6;
            				if (r9d == 0 + ( *(_t127 + _t117) & 0x000000ff)) goto 0x80001244;
            				if (r10d == 0) goto 0x80001211;
            				if (_t117 == 0) goto 0x80001211;
            				GetProcessHeap();
            				HeapFree(??, ??, ??);
            				if ( *((intOrPtr*)(_t142 + 0x2d0)) == 0) goto 0x8000122a;
            				GetProcessHeap();
            				HeapFree(??, ??, ??);
            				return 0;
            			}






















            0x180001044
            0x180001044
            0x180001044
            0x180001049
            0x180001052
            0x18000105a
            0x18000106c
            0x18000108a
            0x18000108c
            0x180001092
            0x180001097
            0x18000109e
            0x1800010a8
            0x1800010b1
            0x1800010b6
            0x1800010bb
            0x1800010bf
            0x1800010c3
            0x1800010cb
            0x1800010cd
            0x1800010d6
            0x1800010d9
            0x1800010de
            0x1800010e8
            0x1800010ed
            0x1800010f3
            0x1800010fd
            0x180001103
            0x180001107
            0x18000110f
            0x180001114
            0x18000111a
            0x180001123
            0x18000112a
            0x180001130
            0x18000113b
            0x180001148
            0x18000114e
            0x180001152
            0x180001155
            0x18000115a
            0x180001162
            0x180001168
            0x18000116f
            0x180001185
            0x180001193
            0x180001197
            0x1800011a5
            0x1800011a9
            0x1800011ae
            0x1800011b8
            0x1800011bf
            0x1800011c8
            0x1800011d4
            0x1800011df
            0x1800011e5
            0x1800011ea
            0x1800011ef
            0x1800011f4
            0x1800011f6
            0x180001204
            0x180001214
            0x180001216
            0x180001224
            0x180001243

            APIs
            Strings
            Memory Dump Source
            • Source File: 00000003.00000002.286218758.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
            • Associated: 00000003.00000002.286214005.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000003.00000002.286223400.0000000180002000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000003.00000002.286227372.0000000180003000.00000004.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
            Yara matches
            Similarity
            • API ID: Heap$Process$AllocCommandCreateErrorFileFreeLastLine
            • String ID: @$C:\Users\user\Desktop\ijexogdf64.dll
            • API String ID: 3306398369-2161034558
            • Opcode ID: 37e6d1a6bd61851543567811daaf37c24ed177b5ee092c65ccdc5420a2f6a0eb
            • Instruction ID: edb68f4d90fcc4c612c9dfadceab7a85852652e7e7ff21404a576820c97af2f2
            • Opcode Fuzzy Hash: 37e6d1a6bd61851543567811daaf37c24ed177b5ee092c65ccdc5420a2f6a0eb
            • Instruction Fuzzy Hash: 90619372205B84CAEBA6CF21E4443D97761F78C7D9F488221EB8957A99DF38C74AC700
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 16%
            			E000000011800014A0(long long __rbx, void* __rcx, void* __rdx, long long __rdi, long long __rsi, long long __rbp, void* _a8, void* _a16, void* _a24, void* _a32) {
            				long long _t40;
            				void* _t44;
            				long long* _t55;
            				long long _t63;
            				CHAR* _t66;
            
            				_t40 = _t63;
            				 *((long long*)(_t40 + 8)) = __rbx;
            				 *((long long*)(_t40 + 0x10)) = __rbp;
            				 *((long long*)(_t40 + 0x18)) = __rsi;
            				 *((long long*)(_t40 + 0x20)) = __rdi;
            				if ( *((intOrPtr*)(__rdx + 0x10)) == 0) goto 0x8000154e;
            				_t44 = __rbx + __rcx;
            				if ( *((intOrPtr*)(_t44 + 0xc)) == 0) goto 0x8000154e;
            				LoadLibraryA(_t66);
            				if (_t40 == 0) goto 0x80001544;
            				if ( *((intOrPtr*)(_t44 + 0x10)) != 0) goto 0x800014ef;
            				_t55 = __rdi + __rcx;
            				goto 0x80001536;
            				if (_t40 >= 0) goto 0x80001505;
            				goto 0x8000150c;
            				GetProcAddress(??, ??);
            				if (_t40 == 0) goto 0x80001544;
            				if ( *((intOrPtr*)(_t44 + 0x10)) == 0) goto 0x80001525;
            				 *_t55 = _t40;
            				goto 0x8000152f;
            				 *((long long*)(__rbp + _t40 + __rcx)) = _t40;
            				if ( *((intOrPtr*)(_t55 + 8)) != 0) goto 0x800014f8;
            				goto 0x800014cc;
            				GetLastError();
            				goto 0x80001553;
            				return 1;
            			}








            0x1800014a0
            0x1800014a3
            0x1800014a7
            0x1800014ab
            0x1800014af
            0x1800014c0
            0x1800014c9
            0x1800014d1
            0x1800014d8
            0x1800014e4
            0x1800014eb
            0x1800014f1
            0x1800014f6
            0x1800014fe
            0x180001503
            0x18000150c
            0x180001518
            0x18000151e
            0x180001520
            0x180001523
            0x18000152a
            0x18000153c
            0x180001542
            0x180001544
            0x18000154c
            0x18000156d

            APIs
            Memory Dump Source
            • Source File: 00000003.00000002.286218758.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
            • Associated: 00000003.00000002.286214005.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000003.00000002.286223400.0000000180002000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000003.00000002.286227372.0000000180003000.00000004.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
            Yara matches
            Similarity
            • API ID: AddressErrorLastLibraryLoadProc
            • String ID:
            • API String ID: 3511525774-0
            • Opcode ID: 79ae648c620947bd08369dc5fe77ed55b75f399bff2a9fb6986f004473391dde
            • Instruction ID: 64a7af8ad88c2c3b96373083f28d5d138c6f990d5ec75d668333d391b74bbb62
            • Opcode Fuzzy Hash: 79ae648c620947bd08369dc5fe77ed55b75f399bff2a9fb6986f004473391dde
            • Instruction Fuzzy Hash: 15213271701B48CBEB9ACB1598443E872E1FB4CBC6F04C415EA1A4B784DF38D659C710
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            Memory Dump Source
            • Source File: 00000003.00000002.286218758.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
            • Associated: 00000003.00000002.286214005.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000003.00000002.286223400.0000000180002000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000003.00000002.286227372.0000000180003000.00000004.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
            Yara matches
            Similarity
            • API ID: Heap$File$Process$AllocCloseCreateFreeHandleReadSize
            • String ID:
            • API String ID: 3250796435-0
            • Opcode ID: 8a1d482df51977014dd727990c7250e65c850332ea86aba0de0c0d4bb6bdac1d
            • Instruction ID: f60ffbd99cf11e45288eb7afa630b804957ff5650f430d5521e5d15354dff841
            • Opcode Fuzzy Hash: 8a1d482df51977014dd727990c7250e65c850332ea86aba0de0c0d4bb6bdac1d
            • Instruction Fuzzy Hash: E1215C32704B5886FB92CF26A80439976A5BB8DFE1F05C115EE1943BA1DF38C64AC700
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            Strings
            Memory Dump Source
            • Source File: 00000003.00000002.286218758.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
            • Associated: 00000003.00000002.286214005.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000003.00000002.286223400.0000000180002000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000003.00000002.286227372.0000000180003000.00000004.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
            Yara matches
            Similarity
            • API ID: ErrorFileLastModuleName
            • String ID: C:\Users\user\Desktop\ijexogdf64.dll
            • API String ID: 2776309574-26472434
            • Opcode ID: 9d9b05e47c826fc21c88ac6377e472fa158e23e895d5d211de74082a9615c76a
            • Instruction ID: d515e6b97e8712b693a122997f0648c0367dba3bf5d74b011ae3cc4b5a11ad40
            • Opcode Fuzzy Hash: 9d9b05e47c826fc21c88ac6377e472fa158e23e895d5d211de74082a9615c76a
            • Instruction Fuzzy Hash: DAD0C970B1460882FAA2A7669C853C43254B75C7C6F84C051E444412A4EE6A879DC700
            Uniqueness

            Uniqueness Score: -1.00%