Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
6k00SOeMjU.dll

Overview

General Information

Sample Name:6k00SOeMjU.dll
Analysis ID:764036
MD5:0d079a931e42f554016db36476e55ba7
SHA1:d5f1ab52221019c746f1cc59a45ce18d0b817496
SHA256:ead2c5aaf92fe07db45b99587f586c7a45f92c67220cd8113a5d2e7bcb320798
Tags:32dllexe
Infos:

Detection

SystemBC
Score:96
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

System process connects to network (likely due to code injection or exploit)
Yara detected SystemBC
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Hides threads from debuggers
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Overwrites code with function prologues
Tries to evade analysis by execution special instruction (VM detection)
Tries to detect virtualization through RDTSC time measurements
PE file contains section with special chars
Creates a DirectInput object (often for capturing keystrokes)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Sample file is different than original file name gathered from version info
Checks for kernel debuggers (NtQuerySystemInformation(SystemKernelDebuggerInformation))
Detected TCP or UDP traffic on non-standard ports
Checks if the current process is being debugged
PE file contains sections with non-standard names
Internet Provider seen in connection with other malware
Sample execution stops while process was sleeping (likely an evasion)
PE / OLE file has an invalid certificate
Program does not show much activity (idle)
Creates a process in suspended mode (likely to inject code)
IP address seen in connection with other malware
Entry point lies outside standard sections

Classification

  • System is w10x64
  • loaddll32.exe (PID: 5288 cmdline: loaddll32.exe "C:\Users\user\Desktop\6k00SOeMjU.dll" MD5: 1F562FBF37040EC6C43C8D5EF619EA39)
    • conhost.exe (PID: 5260 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • cmd.exe (PID: 5316 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\6k00SOeMjU.dll",#1 MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • rundll32.exe (PID: 5476 cmdline: rundll32.exe "C:\Users\user\Desktop\6k00SOeMjU.dll",#1 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 5448 cmdline: rundll32.exe C:\Users\user\Desktop\6k00SOeMjU.dll,rundll MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 3920 cmdline: rundll32.exe "C:\Users\user\Desktop\6k00SOeMjU.dll",rundll MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000005.00000002.764703413.0000000010005000.00000004.00000001.01000000.00000003.sdmpEXT_MAL_SystemBC_Mar22_1Detects unpacked SystemBC module as used by Emotet in March 2022Thomas Barabosch, Deutsche Telekom Security
  • 0x173:$sx1: -WindowStyle Hidden -ep bypass -file
  • 0x0:$sx2: BEGINDATA
  • 0x1af:$sx3: GET %s HTTP/1.0
  • 0x1ca:$s5: User-Agent:
  • 0x11b:$s8: ALLUSERSPROFILE
00000003.00000002.764685317.0000000010005000.00000004.00000001.01000000.00000003.sdmpEXT_MAL_SystemBC_Mar22_1Detects unpacked SystemBC module as used by Emotet in March 2022Thomas Barabosch, Deutsche Telekom Security
  • 0x173:$sx1: -WindowStyle Hidden -ep bypass -file
  • 0x0:$sx2: BEGINDATA
  • 0x1af:$sx3: GET %s HTTP/1.0
  • 0x1ca:$s5: User-Agent:
  • 0x11b:$s8: ALLUSERSPROFILE
00000004.00000002.764666285.0000000010005000.00000004.00000001.01000000.00000003.sdmpEXT_MAL_SystemBC_Mar22_1Detects unpacked SystemBC module as used by Emotet in March 2022Thomas Barabosch, Deutsche Telekom Security
  • 0x173:$sx1: -WindowStyle Hidden -ep bypass -file
  • 0x0:$sx2: BEGINDATA
  • 0x1af:$sx3: GET %s HTTP/1.0
  • 0x1ca:$s5: User-Agent:
  • 0x11b:$s8: ALLUSERSPROFILE
Process Memory Space: rundll32.exe PID: 5448EXT_MAL_SystemBC_Mar22_1Detects unpacked SystemBC module as used by Emotet in March 2022Thomas Barabosch, Deutsche Telekom Security
  • 0x5869:$sx1: -WindowStyle Hidden -ep bypass -file
  • 0x5984:$sx1: -WindowStyle Hidden -ep bypass -file
  • 0x578f:$sx2: BEGINDATA
  • 0x57cc:$sx2: BEGINDATA
  • 0x58a5:$sx3: GET %s HTTP/1.0
  • 0x59bd:$sx3: GET %s HTTP/1.0
  • 0x58c0:$s5: User-Agent:
  • 0x662:$s8: ALLUSERSPROFILE
  • 0x5811:$s8: ALLUSERSPROFILE
  • 0x5933:$s8: ALLUSERSPROFILE
  • 0x629f:$s8: ALLUSERSPROFILE
  • 0x6b6e:$s8: ALLUSERSPROFILE
  • 0x7121:$s8: ALLUSERSPROFILE
  • 0x7790:$s8: ALLUSERSPROFILE
Process Memory Space: rundll32.exe PID: 5448JoeSecurity_SystemBCYara detected SystemBCJoe Security
    Click to see the 4 entries
    SourceRuleDescriptionAuthorStrings
    4.2.rundll32.exe.10000000.0.unpackEXT_MAL_SystemBC_Mar22_1Detects unpacked SystemBC module as used by Emotet in March 2022Thomas Barabosch, Deutsche Telekom Security
    • 0x2f54:$sx1: -WindowStyle Hidden -ep bypass -file
    • 0x2de1:$sx2: BEGINDATA
    • 0x2f90:$sx3: GET %s HTTP/1.0
    • 0x2fab:$s5: User-Agent:
    • 0x2efc:$s8: ALLUSERSPROFILE
    4.2.rundll32.exe.10000000.0.unpackJoeSecurity_SystemBCYara detected SystemBCJoe Security
      4.2.rundll32.exe.10000000.0.unpackMALWARE_Win_EXEPWSH_DLAgentDetects SystemBCditekSHen
      • 0x2f49:$pwsh: powershell
      • 0x2f90:$s1: GET %s HTTP/1
      • 0x2fab:$s2: User-Agent:
      • 0x2f54:$s3: -WindowStyle Hidden -ep bypass -file "
      • 0x2f85:$s4: LdrLoadDll
      • 0x2de1:$v1: BEGINDATA
      • 0x2deb:$v2: HOST1:
      • 0x2e1e:$v2: HOST2:
      • 0x2e51:$v3: PORT1:
      • 0x2e5d:$v4: TOR:
      • 0x2ef6:$v6: start
      5.2.rundll32.exe.10000000.0.unpackEXT_MAL_SystemBC_Mar22_1Detects unpacked SystemBC module as used by Emotet in March 2022Thomas Barabosch, Deutsche Telekom Security
      • 0x2f54:$sx1: -WindowStyle Hidden -ep bypass -file
      • 0x2de1:$sx2: BEGINDATA
      • 0x2f90:$sx3: GET %s HTTP/1.0
      • 0x2fab:$s5: User-Agent:
      • 0x2efc:$s8: ALLUSERSPROFILE
      5.2.rundll32.exe.10000000.0.unpackJoeSecurity_SystemBCYara detected SystemBCJoe Security
        Click to see the 4 entries
        No Sigma rule has matched
        No Snort rule has matched

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: 6k00SOeMjU.dllReversingLabs: Detection: 23%
        Source: 6k00SOeMjU.dllVirustotal: Detection: 17%Perma Link
        Source: 6k00SOeMjU.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL

        Networking

        barindex
        Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 89.22.236.225 4193Jump to behavior
        Source: global trafficTCP traffic: 192.168.2.3:49698 -> 89.22.236.225:4193
        Source: Joe Sandbox ViewASN Name: INETLTDTR INETLTDTR
        Source: Joe Sandbox ViewIP Address: 89.22.236.225 89.22.236.225
        Source: unknownTCP traffic detected without corresponding DNS query: 89.22.236.225
        Source: unknownTCP traffic detected without corresponding DNS query: 89.22.236.225
        Source: unknownTCP traffic detected without corresponding DNS query: 89.22.236.225
        Source: unknownTCP traffic detected without corresponding DNS query: 89.22.236.225
        Source: unknownTCP traffic detected without corresponding DNS query: 89.22.236.225
        Source: unknownTCP traffic detected without corresponding DNS query: 89.22.236.225
        Source: unknownTCP traffic detected without corresponding DNS query: 89.22.236.225
        Source: unknownTCP traffic detected without corresponding DNS query: 89.22.236.225
        Source: unknownTCP traffic detected without corresponding DNS query: 89.22.236.225
        Source: unknownTCP traffic detected without corresponding DNS query: 89.22.236.225
        Source: unknownTCP traffic detected without corresponding DNS query: 89.22.236.225
        Source: unknownTCP traffic detected without corresponding DNS query: 89.22.236.225
        Source: unknownTCP traffic detected without corresponding DNS query: 89.22.236.225
        Source: unknownTCP traffic detected without corresponding DNS query: 89.22.236.225
        Source: unknownTCP traffic detected without corresponding DNS query: 89.22.236.225
        Source: unknownTCP traffic detected without corresponding DNS query: 89.22.236.225
        Source: unknownTCP traffic detected without corresponding DNS query: 89.22.236.225
        Source: unknownTCP traffic detected without corresponding DNS query: 89.22.236.225
        Source: unknownTCP traffic detected without corresponding DNS query: 89.22.236.225
        Source: unknownTCP traffic detected without corresponding DNS query: 89.22.236.225
        Source: 6k00SOeMjU.dllString found in binary or memory: http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
        Source: 6k00SOeMjU.dllString found in binary or memory: http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
        Source: 6k00SOeMjU.dllString found in binary or memory: http://ocsp.sectigo.com0
        Source: rundll32.exe, 00000003.00000002.769805471.0000000010B69000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.769805642.0000000010B69000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000005.00000002.769803694.0000000010B69000.00000002.00000001.01000000.00000003.sdmp, 6k00SOeMjU.dllString found in binary or memory: http://www.innosetup.com
        Source: 6k00SOeMjU.dllString found in binary or memory: https://sectigo.com/CPS0
        Source: loaddll32.exe, 00000000.00000002.250603818.00000000012DB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

        System Summary

        barindex
        Source: 4.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: Detects SystemBC Author: ditekSHen
        Source: 5.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: Detects SystemBC Author: ditekSHen
        Source: 3.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: Detects SystemBC Author: ditekSHen
        Source: 6k00SOeMjU.dllStatic PE information: section name: *;>%1sXO
        Source: 6k00SOeMjU.dllStatic PE information: section name: 7rP!Ni:j
        Source: 6k00SOeMjU.dllStatic PE information: section name: bkE<E2?8
        Source: 6k00SOeMjU.dllStatic PE information: section name: 8*7`Joyq
        Source: 6k00SOeMjU.dllStatic PE information: section name: 0Ys'"rSd
        Source: 6k00SOeMjU.dllStatic PE information: section name: $u!6XeN&
        Source: 6k00SOeMjU.dllStatic PE information: section name: K)'tLNvc
        Source: 6k00SOeMjU.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
        Source: 4.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: EXT_MAL_SystemBC_Mar22_1 date = 2022-03-11, hash1 = c926338972be5bdfdd89574f3dc2fe4d4f70fd4e24c1c6ac5d2439c7fcc50db5, author = Thomas Barabosch, Deutsche Telekom Security, description = Detects unpacked SystemBC module as used by Emotet in March 2022, score = https://malpedia.caad.fkie.fraunhofer.de/details/win.systembc, reference2 = https://medium.com/walmartglobaltech/inside-the-systembc-malware-as-a-service-9aa03afd09c6, reference = https://twitter.com/Cryptolaemus1/status/1502069552246575105
        Source: 4.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_EXEPWSH_DLAgent author = ditekSHen, description = Detects SystemBC
        Source: 5.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: EXT_MAL_SystemBC_Mar22_1 date = 2022-03-11, hash1 = c926338972be5bdfdd89574f3dc2fe4d4f70fd4e24c1c6ac5d2439c7fcc50db5, author = Thomas Barabosch, Deutsche Telekom Security, description = Detects unpacked SystemBC module as used by Emotet in March 2022, score = https://malpedia.caad.fkie.fraunhofer.de/details/win.systembc, reference2 = https://medium.com/walmartglobaltech/inside-the-systembc-malware-as-a-service-9aa03afd09c6, reference = https://twitter.com/Cryptolaemus1/status/1502069552246575105
        Source: 5.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_EXEPWSH_DLAgent author = ditekSHen, description = Detects SystemBC
        Source: 3.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: EXT_MAL_SystemBC_Mar22_1 date = 2022-03-11, hash1 = c926338972be5bdfdd89574f3dc2fe4d4f70fd4e24c1c6ac5d2439c7fcc50db5, author = Thomas Barabosch, Deutsche Telekom Security, description = Detects unpacked SystemBC module as used by Emotet in March 2022, score = https://malpedia.caad.fkie.fraunhofer.de/details/win.systembc, reference2 = https://medium.com/walmartglobaltech/inside-the-systembc-malware-as-a-service-9aa03afd09c6, reference = https://twitter.com/Cryptolaemus1/status/1502069552246575105
        Source: 3.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_EXEPWSH_DLAgent author = ditekSHen, description = Detects SystemBC
        Source: 00000005.00000002.764703413.0000000010005000.00000004.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: EXT_MAL_SystemBC_Mar22_1 date = 2022-03-11, hash1 = c926338972be5bdfdd89574f3dc2fe4d4f70fd4e24c1c6ac5d2439c7fcc50db5, author = Thomas Barabosch, Deutsche Telekom Security, description = Detects unpacked SystemBC module as used by Emotet in March 2022, score = https://malpedia.caad.fkie.fraunhofer.de/details/win.systembc, reference2 = https://medium.com/walmartglobaltech/inside-the-systembc-malware-as-a-service-9aa03afd09c6, reference = https://twitter.com/Cryptolaemus1/status/1502069552246575105
        Source: 00000003.00000002.764685317.0000000010005000.00000004.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: EXT_MAL_SystemBC_Mar22_1 date = 2022-03-11, hash1 = c926338972be5bdfdd89574f3dc2fe4d4f70fd4e24c1c6ac5d2439c7fcc50db5, author = Thomas Barabosch, Deutsche Telekom Security, description = Detects unpacked SystemBC module as used by Emotet in March 2022, score = https://malpedia.caad.fkie.fraunhofer.de/details/win.systembc, reference2 = https://medium.com/walmartglobaltech/inside-the-systembc-malware-as-a-service-9aa03afd09c6, reference = https://twitter.com/Cryptolaemus1/status/1502069552246575105
        Source: 00000004.00000002.764666285.0000000010005000.00000004.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: EXT_MAL_SystemBC_Mar22_1 date = 2022-03-11, hash1 = c926338972be5bdfdd89574f3dc2fe4d4f70fd4e24c1c6ac5d2439c7fcc50db5, author = Thomas Barabosch, Deutsche Telekom Security, description = Detects unpacked SystemBC module as used by Emotet in March 2022, score = https://malpedia.caad.fkie.fraunhofer.de/details/win.systembc, reference2 = https://medium.com/walmartglobaltech/inside-the-systembc-malware-as-a-service-9aa03afd09c6, reference = https://twitter.com/Cryptolaemus1/status/1502069552246575105
        Source: Process Memory Space: rundll32.exe PID: 5448, type: MEMORYSTRMatched rule: EXT_MAL_SystemBC_Mar22_1 date = 2022-03-11, hash1 = c926338972be5bdfdd89574f3dc2fe4d4f70fd4e24c1c6ac5d2439c7fcc50db5, author = Thomas Barabosch, Deutsche Telekom Security, description = Detects unpacked SystemBC module as used by Emotet in March 2022, score = https://malpedia.caad.fkie.fraunhofer.de/details/win.systembc, reference2 = https://medium.com/walmartglobaltech/inside-the-systembc-malware-as-a-service-9aa03afd09c6, reference = https://twitter.com/Cryptolaemus1/status/1502069552246575105
        Source: Process Memory Space: rundll32.exe PID: 5476, type: MEMORYSTRMatched rule: EXT_MAL_SystemBC_Mar22_1 date = 2022-03-11, hash1 = c926338972be5bdfdd89574f3dc2fe4d4f70fd4e24c1c6ac5d2439c7fcc50db5, author = Thomas Barabosch, Deutsche Telekom Security, description = Detects unpacked SystemBC module as used by Emotet in March 2022, score = https://malpedia.caad.fkie.fraunhofer.de/details/win.systembc, reference2 = https://medium.com/walmartglobaltech/inside-the-systembc-malware-as-a-service-9aa03afd09c6, reference = https://twitter.com/Cryptolaemus1/status/1502069552246575105
        Source: Process Memory Space: rundll32.exe PID: 3920, type: MEMORYSTRMatched rule: EXT_MAL_SystemBC_Mar22_1 date = 2022-03-11, hash1 = c926338972be5bdfdd89574f3dc2fe4d4f70fd4e24c1c6ac5d2439c7fcc50db5, author = Thomas Barabosch, Deutsche Telekom Security, description = Detects unpacked SystemBC module as used by Emotet in March 2022, score = https://malpedia.caad.fkie.fraunhofer.de/details/win.systembc, reference2 = https://medium.com/walmartglobaltech/inside-the-systembc-malware-as-a-service-9aa03afd09c6, reference = https://twitter.com/Cryptolaemus1/status/1502069552246575105
        Source: 6k00SOeMjU.dllBinary or memory string: OriginalFilename6 vs 6k00SOeMjU.dll
        Source: 6k00SOeMjU.dllStatic PE information: invalid certificate
        Source: 6k00SOeMjU.dllReversingLabs: Detection: 23%
        Source: 6k00SOeMjU.dllVirustotal: Detection: 17%
        Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\6k00SOeMjU.dll,rundll
        Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\6k00SOeMjU.dll"
        Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\6k00SOeMjU.dll",#1
        Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\6k00SOeMjU.dll,rundll
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\6k00SOeMjU.dll",#1
        Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\6k00SOeMjU.dll",rundll
        Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\6k00SOeMjU.dll",#1Jump to behavior
        Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\6k00SOeMjU.dll,rundllJump to behavior
        Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\6k00SOeMjU.dll",rundllJump to behavior
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\6k00SOeMjU.dll",#1Jump to behavior
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5260:120:WilError_01
        Source: classification engineClassification label: mal96.troj.evad.winDLL@10/0@0/1
        Source: 6k00SOeMjU.dllStatic file information: File size 7566544 > 1048576
        Source: 6k00SOeMjU.dllStatic PE information: Raw size of nUPwRZiK is bigger than: 0x100000 < 0x734600
        Source: 6k00SOeMjU.dllStatic PE information: section name: *;>%1sXO
        Source: 6k00SOeMjU.dllStatic PE information: section name: 7rP!Ni:j
        Source: 6k00SOeMjU.dllStatic PE information: section name: bkE<E2?8
        Source: 6k00SOeMjU.dllStatic PE information: section name: 8*7`Joyq
        Source: 6k00SOeMjU.dllStatic PE information: section name: 0Ys'"rSd
        Source: 6k00SOeMjU.dllStatic PE information: section name: nUPwRZiK
        Source: 6k00SOeMjU.dllStatic PE information: section name: $u!6XeN&
        Source: 6k00SOeMjU.dllStatic PE information: section name: K)'tLNvc
        Source: initial sampleStatic PE information: section where entry point is pointing to: nUPwRZiK

        Hooking and other Techniques for Hiding and Protection

        barindex
        Source: C:\Windows\System32\loaddll32.exeMemory written: PID: 5288 base: DF0005 value: E9 FB 99 AF 76 Jump to behavior
        Source: C:\Windows\System32\loaddll32.exeMemory written: PID: 5288 base: 778E9A00 value: E9 0A 66 50 89 Jump to behavior
        Source: C:\Windows\System32\loaddll32.exeMemory written: PID: 5288 base: 10D0007 value: E9 7B 4C 85 76 Jump to behavior
        Source: C:\Windows\System32\loaddll32.exeMemory written: PID: 5288 base: 77924C80 value: E9 8E B3 7A 89 Jump to behavior
        Source: C:\Windows\System32\loaddll32.exeMemory written: PID: 5288 base: 10E0005 value: E9 FB BF 7D 76 Jump to behavior
        Source: C:\Windows\System32\loaddll32.exeMemory written: PID: 5288 base: 778BC000 value: E9 0A 40 82 89 Jump to behavior
        Source: C:\Windows\System32\loaddll32.exeMemory written: PID: 5288 base: 1290008 value: E9 AB E0 66 76 Jump to behavior
        Source: C:\Windows\System32\loaddll32.exeMemory written: PID: 5288 base: 778FE0B0 value: E9 60 1F 99 89 Jump to behavior
        Source: C:\Windows\System32\loaddll32.exeMemory written: PID: 5288 base: 12A0005 value: E9 CB 5A 66 73 Jump to behavior
        Source: C:\Windows\System32\loaddll32.exeMemory written: PID: 5288 base: 74905AD0 value: E9 3A A5 99 8C Jump to behavior
        Source: C:\Windows\System32\loaddll32.exeMemory written: PID: 5288 base: 12B0005 value: E9 5B B0 67 73 Jump to behavior
        Source: C:\Windows\System32\loaddll32.exeMemory written: PID: 5288 base: 7492B060 value: E9 AA 4F 98 8C Jump to behavior
        Source: C:\Windows\System32\loaddll32.exeMemory written: PID: 5288 base: 12C0005 value: E9 DB F8 9E 75 Jump to behavior
        Source: C:\Windows\System32\loaddll32.exeMemory written: PID: 5288 base: 76CAF8E0 value: E9 2A 07 61 8A Jump to behavior
        Source: C:\Windows\System32\loaddll32.exeMemory written: PID: 5288 base: 2D70005 value: E9 FB 42 F6 73 Jump to behavior
        Source: C:\Windows\System32\loaddll32.exeMemory written: PID: 5288 base: 76CD4300 value: E9 0A BD 09 8C Jump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 5448 base: 860005 value: E9 FB 99 08 77 Jump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 5448 base: 778E9A00 value: E9 0A 66 F7 88 Jump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 5448 base: 870007 value: E9 7B 4C 0B 77 Jump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 5448 base: 77924C80 value: E9 8E B3 F4 88 Jump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 5448 base: 890005 value: E9 FB BF 02 77 Jump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 5448 base: 778BC000 value: E9 0A 40 FD 88 Jump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 5448 base: 8B0008 value: E9 AB E0 04 77 Jump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 5448 base: 778FE0B0 value: E9 60 1F FB 88 Jump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 5448 base: AD0005 value: E9 CB 5A E3 73 Jump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 5448 base: 74905AD0 value: E9 3A A5 1C 8C Jump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 5448 base: AE0005 value: E9 5B B0 E4 73 Jump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 5448 base: 7492B060 value: E9 AA 4F 1B 8C Jump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 5448 base: 1050005 value: E9 DB F8 C5 75 Jump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 5448 base: 76CAF8E0 value: E9 2A 07 3A 8A Jump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 5448 base: 4490005 value: E9 FB 42 84 72 Jump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 5448 base: 76CD4300 value: E9 0A BD 7B 8D Jump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 5476 base: 9E0005 value: E9 FB 99 F0 76 Jump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 5476 base: 778E9A00 value: E9 0A 66 0F 89 Jump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 5476 base: 9F0007 value: E9 7B 4C F3 76 Jump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 5476 base: 77924C80 value: E9 8E B3 0C 89 Jump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 5476 base: D10005 value: E9 FB BF BA 76 Jump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 5476 base: 778BC000 value: E9 0A 40 45 89 Jump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 5476 base: ED0008 value: E9 AB E0 A2 76 Jump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 5476 base: 778FE0B0 value: E9 60 1F 5D 89 Jump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 5476 base: EF0005 value: E9 CB 5A A1 73 Jump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 5476 base: 74905AD0 value: E9 3A A5 5E 8C Jump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 5476 base: 1040005 value: E9 5B B0 8E 73 Jump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 5476 base: 7492B060 value: E9 AA 4F 71 8C Jump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 5476 base: 1050005 value: E9 DB F8 C5 75 Jump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 5476 base: 76CAF8E0 value: E9 2A 07 3A 8A Jump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 5476 base: 4810005 value: E9 FB 42 4C 72 Jump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 5476 base: 76CD4300 value: E9 0A BD B3 8D Jump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 3920 base: 3150005 value: E9 FB 99 79 74 Jump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 3920 base: 778E9A00 value: E9 0A 66 86 8B Jump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 3920 base: 3400007 value: E9 7B 4C 52 74 Jump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 3920 base: 77924C80 value: E9 8E B3 AD 8B Jump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 3920 base: 3410005 value: E9 FB BF 4A 74 Jump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 3920 base: 778BC000 value: E9 0A 40 B5 8B Jump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 3920 base: 3430008 value: E9 AB E0 4C 74 Jump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 3920 base: 778FE0B0 value: E9 60 1F B3 8B Jump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 3920 base: 3440005 value: E9 CB 5A 4C 71 Jump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 3920 base: 74905AD0 value: E9 3A A5 B3 8E Jump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 3920 base: 3450005 value: E9 5B B0 4D 71 Jump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 3920 base: 7492B060 value: E9 AA 4F B2 8E Jump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 3920 base: 3460005 value: E9 DB F8 84 73 Jump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 3920 base: 76CAF8E0 value: E9 2A 07 7B 8C Jump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 3920 base: 3470005 value: E9 FB 42 86 73 Jump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 3920 base: 76CD4300 value: E9 0A BD 79 8C Jump to behavior
        Source: C:\Windows\System32\loaddll32.exeMemory written: PID: 5288 base: 778BC000 value: 8B FF 55 8B EC Jump to behavior
        Source: C:\Windows\System32\loaddll32.exeMemory written: PID: 5288 base: 74905AD0 value: 8B FF 55 8B EC Jump to behavior
        Source: C:\Windows\System32\loaddll32.exeMemory written: PID: 5288 base: 7492B060 value: 8B FF 55 8B EC Jump to behavior
        Source: C:\Windows\System32\loaddll32.exeMemory written: PID: 5288 base: 76CAF8E0 value: 8B FF 55 8B EC Jump to behavior
        Source: C:\Windows\System32\loaddll32.exeMemory written: PID: 5288 base: 76CD4300 value: 8B FF 55 8B EC Jump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

        Malware Analysis System Evasion

        barindex
        Source: C:\Windows\System32\loaddll32.exeSpecial instruction interceptor: First address: 0000000010B09AA6 instructions rdtsc caused by: RDTSC with Trap Flag (TF)
        Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 00000000106587EA second address: 0000000010658809 instructions: 0x00000000 rdtsc 0x00000002 ror cl, 1 0x00000004 ror edx, FFFFFF86h 0x00000007 xor ax, si 0x0000000a not cl 0x0000000c clc 0x0000000d xor bl, cl 0x0000000f push esi 0x00000010 push edi 0x00000011 rol dh, FFFFFF9Dh 0x00000014 rcl eax, cl 0x00000016 test bx, bx 0x00000019 push ebx 0x0000001a mov ebx, ecx 0x0000001c movsx eax, di 0x0000001f rdtsc
        Source: C:\Windows\System32\loaddll32.exeRDTSC instruction interceptor: First address: 00000000106587EA second address: 0000000010658809 instructions: 0x00000000 rdtsc 0x00000002 ror cl, 1 0x00000004 ror edx, FFFFFF86h 0x00000007 xor ax, si 0x0000000a not cl 0x0000000c clc 0x0000000d xor bl, cl 0x0000000f push esi 0x00000010 push edi 0x00000011 rol dh, FFFFFF9Dh 0x00000014 rcl eax, cl 0x00000016 test bx, bx 0x00000019 push ebx 0x0000001a mov ebx, ecx 0x0000001c movsx eax, di 0x0000001f rdtsc
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
        Source: C:\Windows\System32\loaddll32.exeProcess information queried: ProcessInformationJump to behavior
        Source: C:\Windows\System32\loaddll32.exeSystem information queried: ModuleInformationJump to behavior
        Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 120000Jump to behavior
        Source: rundll32.exe, 00000004.00000002.764386156.0000000000F0A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll

        Anti Debugging

        barindex
        Source: C:\Windows\System32\loaddll32.exeThread information set: HideFromDebuggerJump to behavior
        Source: C:\Windows\System32\loaddll32.exeThread information set: HideFromDebuggerJump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeThread information set: HideFromDebuggerJump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeThread information set: HideFromDebuggerJump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeThread information set: HideFromDebuggerJump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeThread information set: HideFromDebuggerJump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeThread information set: HideFromDebuggerJump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeThread information set: HideFromDebuggerJump to behavior
        Source: C:\Windows\System32\loaddll32.exeSystem information queried: KernelDebuggerInformationJump to behavior
        Source: C:\Windows\System32\loaddll32.exeProcess queried: DebugPortJump to behavior
        Source: C:\Windows\System32\loaddll32.exeProcess queried: DebugObjectHandleJump to behavior
        Source: C:\Windows\System32\loaddll32.exeProcess queried: DebugObjectHandleJump to behavior
        Source: C:\Windows\System32\loaddll32.exeProcess queried: DebugObjectHandleJump to behavior
        Source: C:\Windows\System32\loaddll32.exeProcess queried: DebugPortJump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugObjectHandleJump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugObjectHandleJump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugObjectHandleJump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugObjectHandleJump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugObjectHandleJump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugObjectHandleJump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugObjectHandleJump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugObjectHandleJump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugObjectHandleJump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
        Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected

        HIPS / PFW / Operating System Protection Evasion

        barindex
        Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 89.22.236.225 4193Jump to behavior
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\6k00SOeMjU.dll",#1Jump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\ VolumeInformationJump to behavior

        Stealing of Sensitive Information

        barindex
        Source: Yara matchFile source: 4.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 5448, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 5476, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 3920, type: MEMORYSTR

        Remote Access Functionality

        barindex
        Source: Yara matchFile source: 4.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 5448, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 5476, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 3920, type: MEMORYSTR
        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
        Valid AccountsWindows Management InstrumentationPath Interception111
        Process Injection
        1
        Rundll32
        1
        Credential API Hooking
        321
        Security Software Discovery
        Remote Services1
        Credential API Hooking
        Exfiltration Over Other Network Medium1
        Non-Standard Port
        Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
        Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts121
        Virtualization/Sandbox Evasion
        1
        Input Capture
        1
        Process Discovery
        Remote Desktop Protocol1
        Input Capture
        Exfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
        Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)111
        Process Injection
        Security Account Manager121
        Virtualization/Sandbox Evasion
        SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
        Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Binary PaddingNTDS212
        System Information Discovery
        Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet
        behaviorgraph top1 signatures2 2 Behavior Graph ID: 764036 Sample: 6k00SOeMjU.dll Startdate: 09/12/2022 Architecture: WINDOWS Score: 96 25 Malicious sample detected (through community Yara rule) 2->25 27 Multi AV Scanner detection for submitted file 2->27 29 Yara detected SystemBC 2->29 31 PE file contains section with special chars 2->31 7 loaddll32.exe 1 2->7         started        process3 signatures4 37 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 7->37 39 Overwrites code with function prologues 7->39 41 Tries to evade analysis by execution special instruction (VM detection) 7->41 43 2 other signatures 7->43 10 rundll32.exe 7->10         started        14 rundll32.exe 7->14         started        16 cmd.exe 1 7->16         started        18 conhost.exe 7->18         started        process5 dnsIp6 23 89.22.236.225, 4193, 49698, 49699 INETLTDTR Russian Federation 10->23 45 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 10->45 47 Tries to detect virtualization through RDTSC time measurements 10->47 49 Hides threads from debuggers 10->49 51 System process connects to network (likely due to code injection or exploit) 14->51 20 rundll32.exe 16->20         started        signatures7 process8 signatures9 33 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 20->33 35 Hides threads from debuggers 20->35

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        6k00SOeMjU.dll23%ReversingLabsWin32.Trojan.Generic
        6k00SOeMjU.dll17%VirustotalBrowse
        No Antivirus matches
        No Antivirus matches
        No Antivirus matches
        SourceDetectionScannerLabelLink
        http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t0%URL Reputationsafe
        https://sectigo.com/CPS00%URL Reputationsafe
        http://ocsp.sectigo.com00%URL Reputationsafe
        http://www.innosetup.com0%URL Reputationsafe
        http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#0%URL Reputationsafe
        No contacted domains info
        NameSourceMaliciousAntivirus DetectionReputation
        http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t6k00SOeMjU.dllfalse
        • URL Reputation: safe
        unknown
        https://sectigo.com/CPS06k00SOeMjU.dllfalse
        • URL Reputation: safe
        unknown
        http://ocsp.sectigo.com06k00SOeMjU.dllfalse
        • URL Reputation: safe
        unknown
        http://www.innosetup.comrundll32.exe, 00000003.00000002.769805471.0000000010B69000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.769805642.0000000010B69000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000005.00000002.769803694.0000000010B69000.00000002.00000001.01000000.00000003.sdmp, 6k00SOeMjU.dllfalse
        • URL Reputation: safe
        unknown
        http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#6k00SOeMjU.dllfalse
        • URL Reputation: safe
        unknown
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        89.22.236.225
        unknownRussian Federation
        197328INETLTDTRtrue
        Joe Sandbox Version:36.0.0 Rainbow Opal
        Analysis ID:764036
        Start date and time:2022-12-09 10:51:12 +01:00
        Joe Sandbox Product:CloudBasic
        Overall analysis duration:0h 7m 21s
        Hypervisor based Inspection enabled:false
        Report type:full
        Sample file name:6k00SOeMjU.dll
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
        Number of analysed new started processes analysed:20
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • HDC enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Detection:MAL
        Classification:mal96.troj.evad.winDLL@10/0@0/1
        EGA Information:Failed
        HDC Information:Failed
        HCA Information:
        • Successful, ratio: 100%
        • Number of executed functions: 0
        • Number of non-executed functions: 0
        Cookbook Comments:
        • Found application associated with file extension: .dll
        • Override analysis time to 240s for rundll32
        • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, WMIADAP.exe, SgrmBroker.exe, conhost.exe, backgroundTaskHost.exe, svchost.exe
        • Excluded domains from analysis (whitelisted): fs.microsoft.com
        • Not all processes where analyzed, report is missing behavior information
        TimeTypeDescription
        10:52:05API Interceptor3x Sleep call for process: rundll32.exe modified
        10:52:07API Interceptor1x Sleep call for process: loaddll32.exe modified
        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
        89.22.236.225DQxttu2Qrr.exeGet hashmaliciousBrowse
          file.exeGet hashmaliciousBrowse
            NhqwPW3V4T.exeGet hashmaliciousBrowse
              file.exeGet hashmaliciousBrowse
                vmU23zVMv6.exeGet hashmaliciousBrowse
                  SecuriteInfo.com.Win32.CrypterX-gen.556.4787.exeGet hashmaliciousBrowse
                    No context
                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                    INETLTDTRDQxttu2Qrr.exeGet hashmaliciousBrowse
                    • 89.22.236.225
                    file.exeGet hashmaliciousBrowse
                    • 89.22.236.225
                    NhqwPW3V4T.exeGet hashmaliciousBrowse
                    • 89.22.236.225
                    file.exeGet hashmaliciousBrowse
                    • 89.22.236.225
                    vmU23zVMv6.exeGet hashmaliciousBrowse
                    • 89.22.236.225
                    SecuriteInfo.com.Win32.CrypterX-gen.556.4787.exeGet hashmaliciousBrowse
                    • 89.22.236.225
                    uIVuK5dl4B.elfGet hashmaliciousBrowse
                    • 176.53.21.237
                    6zU82RR4Tl.exeGet hashmaliciousBrowse
                    • 91.92.120.179
                    gzEQevBvkb.exeGet hashmaliciousBrowse
                    • 89.22.225.242
                    m8XHlumLdZ.exeGet hashmaliciousBrowse
                    • 89.22.225.242
                    lVMxof38tX.exeGet hashmaliciousBrowse
                    • 89.22.225.242
                    lickA3zqBP.exeGet hashmaliciousBrowse
                    • 89.22.228.150
                    https://ch.booking.com/c?st=Q0FS%3c=VklFV19BTEw%3D&rid=2d0863d0-d3a2-11ec-b1f3-0bef02a63294&si=ChZiLXBhbmRhLXRvcC1rLXNlbGVjdG9yEAEaQEnfeaMLgOJ7q1bGNiKGh6frtIQeqovVfhnGtISu2VUG%20WKqMO%2FCxtqVmQ29R%2FbvPaSLNe9nMcqrYwE06nm0%2FAo%3D&target=aHR0cHM6Ly90cmFuZG8ub25lLz9lPVluSnZaMlZ5YzBCdmRYUnNiMjlyTG1OdmJRPT0=&d=1&mmconf=cars&linklabel=ebo-banner-ctaGet hashmaliciousBrowse
                    • 84.252.95.22
                    33GgkQ3QsG.exeGet hashmaliciousBrowse
                    • 89.22.239.151
                    44SlugKnOG.exeGet hashmaliciousBrowse
                    • 89.22.230.175
                    ZtkzgCQYWC.exeGet hashmaliciousBrowse
                    • 89.22.225.242
                    ZtkzgCQYWC.exeGet hashmaliciousBrowse
                    • 89.22.225.242
                    4B5C98o17Z.exeGet hashmaliciousBrowse
                    • 89.22.225.242
                    4B5C98o17Z.exeGet hashmaliciousBrowse
                    • 89.22.225.242
                    iNpjfvtMIU.exeGet hashmaliciousBrowse
                    • 89.22.225.242
                    No context
                    No context
                    No created / dropped files found
                    File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                    Entropy (8bit):7.976819466268135
                    TrID:
                    • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
                    • Generic Win/DOS Executable (2004/3) 0.20%
                    • DOS Executable Generic (2002/1) 0.20%
                    • VXD Driver (31/22) 0.00%
                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                    File name:6k00SOeMjU.dll
                    File size:7566544
                    MD5:0d079a931e42f554016db36476e55ba7
                    SHA1:d5f1ab52221019c746f1cc59a45ce18d0b817496
                    SHA256:ead2c5aaf92fe07db45b99587f586c7a45f92c67220cd8113a5d2e7bcb320798
                    SHA512:1496f1296df89e1da8780f175631e2551300a99e6c7ea43d2750653fdf6e7ed096fdedd9f0d23b94190ecf418da09cf9c9b6caee5821ba1c457f0294063bbc9e
                    SSDEEP:196608:l3ksPqmzcl+LG314Hujb7KgkYCbGNBmHTER:lUON+2HBb8
                    TLSH:5776332F16980415E4EECC3A85EBBE9132F5073A9E8278BCA5DA5DC13A354F5B702163
                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...8.ob...........!....."...@......=XT......@.......................................Ft............................../..E..
                    Icon Hash:b99988fcd4f66e0f
                    Entrypoint:0x1054583d
                    Entrypoint Section:nUPwRZiK
                    Digitally signed:true
                    Imagebase:0x10000000
                    Subsystem:windows gui
                    Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
                    DLL Characteristics:
                    Time Stamp:0x626FE238 [Mon May 2 13:52:56 2022 UTC]
                    TLS Callbacks:
                    CLR (.Net) Version:
                    OS Version Major:5
                    OS Version Minor:0
                    File Version Major:5
                    File Version Minor:0
                    Subsystem Version Major:5
                    Subsystem Version Minor:0
                    Import Hash:d3a98daa37dbe78969711cc1194ce51b
                    Signature Valid:false
                    Signature Issuer:CN=fumbling corp.
                    Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
                    Error Number:-2146762487
                    Not Before, Not After
                    • 12/8/2022 9:12:34 AM 12/8/2023 9:32:34 AM
                    Subject Chain
                    • CN=fumbling corp.
                    Version:3
                    Thumbprint MD5:BFCF38BCEDDC6D492EE1D807C07B0E02
                    Thumbprint SHA-1:92A18235585F157E75D33B92CC8E394210AEAD16
                    Thumbprint SHA-256:E3FCBA8CB056D8C4B5F3C974DD82C3CD9C96AF2621722C26119E478F35637E99
                    Serial:78919934276F458544703D1C7FC21303
                    Instruction
                    push edx
                    mov edx, 3F442022h
                    pushfd
                    xor edx, 7B9D646Dh
                    xor dl, dl
                    mov edx, dword ptr [esp+edx-44D943FCh]
                    mov dword ptr [esp+04h], 8EECC51Ah
                    push dword ptr [esp+00h]
                    popfd
                    lea esp, dword ptr [esp+04h]
                    call 00007F36F8B8AD93h
                    xchg al, al
                    pushfd
                    lahf
                    shr al, FFFFFF8Fh
                    shl ah, FFFFFF86h
                    pop dword ptr [edi]
                    bt eax, ecx
                    and ax, 00007B5Bh
                    xchg al, ah
                    mov eax, dword ptr [esi]
                    cmp si, bp
                    lea esi, dword ptr [esi+00000004h]
                    xor eax, ebx
                    jmp 00007F36F8C42417h
                    stosb
                    retf A814h
                    jmp far 0F97h : 3CD32403h
                    stosd
                    enter B68Dh, 01h
                    add byte ptr [eax], al
                    add cl, al
                    loopne 00007F36F8BAE893h
                    xor cl, bl
                    btr ax, dx
                    or ax, bp
                    not cl
                    add al, ah
                    bts eax, ebp
                    sar al, cl
                    add cl, 0000007Eh
                    shld ax, si, 00000065h
                    bts ax, sp
                    not ah
                    xor cl, 0000006Bh
                    cmovno ax, dx
                    movsx eax, si
                    rol ax, 0000h
                    rol cl, 1
                    cmovno ax, bx
                    xor bl, cl
                    movzx eax, dx
                    lahf
                    lea edi, dword ptr [edi-00000002h]
                    btr ax, 0046h
                    sal al, FFFFFF9Dh
                    mov word ptr [edi], cx
                    mov eax, dword ptr [esi]
                    add esi, 00000004h
                    jmp 00007F36F8AD6A41h
                    push ebp
                    ret
                    rol eax, 1
                    sub eax, 000066B4h
                    NameVirtual AddressVirtual Size Is in Section
                    IMAGE_DIRECTORY_ENTRY_EXPORT0xaf2fa40x45nUPwRZiK
                    IMAGE_DIRECTORY_ENTRY_IMPORT0x660b3c0x104nUPwRZiK
                    IMAGE_DIRECTORY_ENTRY_RESOURCE0xb6a0000x800K)'tLNvc
                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                    IMAGE_DIRECTORY_ENTRY_SECURITY0x735e000x16d0nUPwRZiK
                    IMAGE_DIRECTORY_ENTRY_BASERELOC0xb690000x5d4$u!6XeN&
                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IAT0x4330000x780Ys'"rSd
                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                    *;>%1sXO0x10000x219c0x0False0empty0.0IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    7rP!Ni:j0x40000x8450x0False0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    bkE<E2?80x50000x2500x0False0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    8*7`Joyq0x60000x42c2640x0unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    0Ys'"rSd0x4330000x4a40x600False0.06575520833333333OpenPGP Public Key0.4141326418166997IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    nUPwRZiK0x4340000x7345900x734600unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    $u!6XeN&0xb690000x5d40x600False0.53515625data4.2912698570834IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    K)'tLNvc0xb6a0000x8000x800False0.44287109375data3.8514204088109953IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    NameRVASizeTypeLanguageCountry
                    RT_ICON0xb6a0fc0x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512DutchNetherlands
                    RT_GROUP_ICON0xb6a3e40x14dataDutchNetherlands
                    RT_VERSION0xb6a3f80x408dataEnglishUnited States
                    DLLImport
                    user32.dllSendMessageA
                    kernel32.dllLocalFree
                    advapi32.dllGetSidSubAuthority
                    wsock32.dllWSAStartup
                    shell32.dllCommandLineToArgvW
                    ws2_32.dllfreeaddrinfo
                    ole32.dllCoUninitialize
                    secur32.dllGetUserNameExA
                    psapi.dllGetModuleFileNameExA
                    kernel32.dllGetSystemTimeAsFileTime
                    user32.dllCharUpperBuffW
                    kernel32.dllLocalAlloc, LocalFree, GetModuleFileNameW, ExitProcess, LoadLibraryA, GetModuleHandleA, GetProcAddress
                    NameOrdinalAddress
                    rundll10x1000100c
                    Language of compilation systemCountry where language is spokenMap
                    DutchNetherlands
                    EnglishUnited States
                    TimestampSource PortDest PortSource IPDest IP
                    Dec 9, 2022 10:52:05.048599958 CET496984193192.168.2.389.22.236.225
                    Dec 9, 2022 10:52:05.074860096 CET41934969889.22.236.225192.168.2.3
                    Dec 9, 2022 10:52:05.075001955 CET496984193192.168.2.389.22.236.225
                    Dec 9, 2022 10:52:05.076816082 CET496984193192.168.2.389.22.236.225
                    Dec 9, 2022 10:52:05.102937937 CET41934969889.22.236.225192.168.2.3
                    Dec 9, 2022 10:52:05.162826061 CET496994193192.168.2.389.22.236.225
                    Dec 9, 2022 10:52:05.188915968 CET41934969989.22.236.225192.168.2.3
                    Dec 9, 2022 10:52:05.189066887 CET496994193192.168.2.389.22.236.225
                    Dec 9, 2022 10:52:05.190913916 CET496994193192.168.2.389.22.236.225
                    Dec 9, 2022 10:52:05.216546059 CET41934969989.22.236.225192.168.2.3
                    Dec 9, 2022 10:52:09.218707085 CET497004193192.168.2.389.22.236.225
                    Dec 9, 2022 10:52:09.245634079 CET41934970089.22.236.225192.168.2.3
                    Dec 9, 2022 10:52:09.245754957 CET497004193192.168.2.389.22.236.225
                    Dec 9, 2022 10:52:09.262767076 CET497004193192.168.2.389.22.236.225
                    Dec 9, 2022 10:52:09.288966894 CET41934970089.22.236.225192.168.2.3
                    Dec 9, 2022 10:53:07.081410885 CET41934969989.22.236.225192.168.2.3
                    Dec 9, 2022 10:53:07.081504107 CET496994193192.168.2.389.22.236.225
                    Dec 9, 2022 10:53:07.081511974 CET41934969889.22.236.225192.168.2.3
                    Dec 9, 2022 10:53:07.081585884 CET496984193192.168.2.389.22.236.225
                    Dec 9, 2022 10:53:11.177726030 CET41934970089.22.236.225192.168.2.3
                    Dec 9, 2022 10:53:11.177835941 CET497004193192.168.2.389.22.236.225
                    Dec 9, 2022 10:54:08.521687984 CET41934969989.22.236.225192.168.2.3
                    Dec 9, 2022 10:54:08.522161961 CET496994193192.168.2.389.22.236.225
                    Dec 9, 2022 10:54:08.522314072 CET41934969889.22.236.225192.168.2.3
                    Dec 9, 2022 10:54:08.522413969 CET496984193192.168.2.389.22.236.225
                    Dec 9, 2022 10:54:12.618275881 CET41934970089.22.236.225192.168.2.3
                    Dec 9, 2022 10:54:12.618397951 CET497004193192.168.2.389.22.236.225
                    Dec 9, 2022 10:55:09.961476088 CET41934969989.22.236.225192.168.2.3
                    Dec 9, 2022 10:55:09.961595058 CET496994193192.168.2.389.22.236.225
                    Dec 9, 2022 10:55:09.961711884 CET41934969889.22.236.225192.168.2.3
                    Dec 9, 2022 10:55:09.961854935 CET496984193192.168.2.389.22.236.225
                    Dec 9, 2022 10:55:14.058015108 CET41934970089.22.236.225192.168.2.3
                    Dec 9, 2022 10:55:14.058202982 CET497004193192.168.2.389.22.236.225
                    Dec 9, 2022 10:56:11.402008057 CET41934969989.22.236.225192.168.2.3
                    Dec 9, 2022 10:56:11.402087927 CET496994193192.168.2.389.22.236.225
                    Dec 9, 2022 10:56:11.402550936 CET41934969889.22.236.225192.168.2.3
                    Dec 9, 2022 10:56:11.402653933 CET496984193192.168.2.389.22.236.225

                    Click to jump to process

                    Click to jump to process

                    Click to dive into process behavior distribution

                    Click to jump to process

                    Target ID:0
                    Start time:10:52:02
                    Start date:09/12/2022
                    Path:C:\Windows\System32\loaddll32.exe
                    Wow64 process (32bit):true
                    Commandline:loaddll32.exe "C:\Users\user\Desktop\6k00SOeMjU.dll"
                    Imagebase:0xdc0000
                    File size:116736 bytes
                    MD5 hash:1F562FBF37040EC6C43C8D5EF619EA39
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:moderate

                    Target ID:1
                    Start time:10:52:02
                    Start date:09/12/2022
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff745070000
                    File size:625664 bytes
                    MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high

                    Target ID:2
                    Start time:10:52:02
                    Start date:09/12/2022
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\6k00SOeMjU.dll",#1
                    Imagebase:0xb0000
                    File size:232960 bytes
                    MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high

                    Target ID:3
                    Start time:10:52:02
                    Start date:09/12/2022
                    Path:C:\Windows\SysWOW64\rundll32.exe
                    Wow64 process (32bit):true
                    Commandline:rundll32.exe C:\Users\user\Desktop\6k00SOeMjU.dll,rundll
                    Imagebase:0x1060000
                    File size:61952 bytes
                    MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: EXT_MAL_SystemBC_Mar22_1, Description: Detects unpacked SystemBC module as used by Emotet in March 2022, Source: 00000003.00000002.764685317.0000000010005000.00000004.00000001.01000000.00000003.sdmp, Author: Thomas Barabosch, Deutsche Telekom Security
                    Reputation:high

                    Target ID:4
                    Start time:10:52:02
                    Start date:09/12/2022
                    Path:C:\Windows\SysWOW64\rundll32.exe
                    Wow64 process (32bit):true
                    Commandline:rundll32.exe "C:\Users\user\Desktop\6k00SOeMjU.dll",#1
                    Imagebase:0x1060000
                    File size:61952 bytes
                    MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: EXT_MAL_SystemBC_Mar22_1, Description: Detects unpacked SystemBC module as used by Emotet in March 2022, Source: 00000004.00000002.764666285.0000000010005000.00000004.00000001.01000000.00000003.sdmp, Author: Thomas Barabosch, Deutsche Telekom Security
                    Reputation:high

                    Target ID:5
                    Start time:10:52:07
                    Start date:09/12/2022
                    Path:C:\Windows\SysWOW64\rundll32.exe
                    Wow64 process (32bit):true
                    Commandline:rundll32.exe "C:\Users\user\Desktop\6k00SOeMjU.dll",rundll
                    Imagebase:0x1060000
                    File size:61952 bytes
                    MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: EXT_MAL_SystemBC_Mar22_1, Description: Detects unpacked SystemBC module as used by Emotet in March 2022, Source: 00000005.00000002.764703413.0000000010005000.00000004.00000001.01000000.00000003.sdmp, Author: Thomas Barabosch, Deutsche Telekom Security
                    Reputation:high

                    No disassembly