Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
6k00SOeMjU.dll

Overview

General Information

Sample Name:6k00SOeMjU.dll
Analysis ID:764036
MD5:0d079a931e42f554016db36476e55ba7
SHA1:d5f1ab52221019c746f1cc59a45ce18d0b817496
SHA256:ead2c5aaf92fe07db45b99587f586c7a45f92c67220cd8113a5d2e7bcb320798
Tags:32dllexe
Infos:

Detection

SystemBC
Score:96
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

System process connects to network (likely due to code injection or exploit)
Yara detected SystemBC
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Hides threads from debuggers
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Overwrites code with function prologues
Tries to evade analysis by execution special instruction (VM detection)
Tries to detect virtualization through RDTSC time measurements
PE file contains section with special chars
Creates a DirectInput object (often for capturing keystrokes)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Sample file is different than original file name gathered from version info
Checks for kernel debuggers (NtQuerySystemInformation(SystemKernelDebuggerInformation))
Detected TCP or UDP traffic on non-standard ports
Checks if the current process is being debugged
PE file contains sections with non-standard names
Internet Provider seen in connection with other malware
Sample execution stops while process was sleeping (likely an evasion)
PE / OLE file has an invalid certificate
Program does not show much activity (idle)
Creates a process in suspended mode (likely to inject code)
IP address seen in connection with other malware
Entry point lies outside standard sections

Classification

  • System is w10x64
  • loaddll32.exe (PID: 5288 cmdline: loaddll32.exe "C:\Users\user\Desktop\6k00SOeMjU.dll" MD5: 1F562FBF37040EC6C43C8D5EF619EA39)
    • conhost.exe (PID: 5260 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • cmd.exe (PID: 5316 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\6k00SOeMjU.dll",#1 MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • rundll32.exe (PID: 5476 cmdline: rundll32.exe "C:\Users\user\Desktop\6k00SOeMjU.dll",#1 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 5448 cmdline: rundll32.exe C:\Users\user\Desktop\6k00SOeMjU.dll,rundll MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 3920 cmdline: rundll32.exe "C:\Users\user\Desktop\6k00SOeMjU.dll",rundll MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000005.00000002.764703413.0000000010005000.00000004.00000001.01000000.00000003.sdmpEXT_MAL_SystemBC_Mar22_1Detects unpacked SystemBC module as used by Emotet in March 2022Thomas Barabosch, Deutsche Telekom Security
  • 0x173:$sx1: -WindowStyle Hidden -ep bypass -file
  • 0x0:$sx2: BEGINDATA
  • 0x1af:$sx3: GET %s HTTP/1.0
  • 0x1ca:$s5: User-Agent:
  • 0x11b:$s8: ALLUSERSPROFILE
00000003.00000002.764685317.0000000010005000.00000004.00000001.01000000.00000003.sdmpEXT_MAL_SystemBC_Mar22_1Detects unpacked SystemBC module as used by Emotet in March 2022Thomas Barabosch, Deutsche Telekom Security
  • 0x173:$sx1: -WindowStyle Hidden -ep bypass -file
  • 0x0:$sx2: BEGINDATA
  • 0x1af:$sx3: GET %s HTTP/1.0
  • 0x1ca:$s5: User-Agent:
  • 0x11b:$s8: ALLUSERSPROFILE
00000004.00000002.764666285.0000000010005000.00000004.00000001.01000000.00000003.sdmpEXT_MAL_SystemBC_Mar22_1Detects unpacked SystemBC module as used by Emotet in March 2022Thomas Barabosch, Deutsche Telekom Security
  • 0x173:$sx1: -WindowStyle Hidden -ep bypass -file
  • 0x0:$sx2: BEGINDATA
  • 0x1af:$sx3: GET %s HTTP/1.0
  • 0x1ca:$s5: User-Agent:
  • 0x11b:$s8: ALLUSERSPROFILE
Process Memory Space: rundll32.exe PID: 5448EXT_MAL_SystemBC_Mar22_1Detects unpacked SystemBC module as used by Emotet in March 2022Thomas Barabosch, Deutsche Telekom Security
  • 0x5869:$sx1: -WindowStyle Hidden -ep bypass -file
  • 0x5984:$sx1: -WindowStyle Hidden -ep bypass -file
  • 0x578f:$sx2: BEGINDATA
  • 0x57cc:$sx2: BEGINDATA
  • 0x58a5:$sx3: GET %s HTTP/1.0
  • 0x59bd:$sx3: GET %s HTTP/1.0
  • 0x58c0:$s5: User-Agent:
  • 0x662:$s8: ALLUSERSPROFILE
  • 0x5811:$s8: ALLUSERSPROFILE
  • 0x5933:$s8: ALLUSERSPROFILE
  • 0x629f:$s8: ALLUSERSPROFILE
  • 0x6b6e:$s8: ALLUSERSPROFILE
  • 0x7121:$s8: ALLUSERSPROFILE
  • 0x7790:$s8: ALLUSERSPROFILE
Process Memory Space: rundll32.exe PID: 5448JoeSecurity_SystemBCYara detected SystemBCJoe Security
    Click to see the 4 entries
    SourceRuleDescriptionAuthorStrings
    4.2.rundll32.exe.10000000.0.unpackEXT_MAL_SystemBC_Mar22_1Detects unpacked SystemBC module as used by Emotet in March 2022Thomas Barabosch, Deutsche Telekom Security
    • 0x2f54:$sx1: -WindowStyle Hidden -ep bypass -file
    • 0x2de1:$sx2: BEGINDATA
    • 0x2f90:$sx3: GET %s HTTP/1.0
    • 0x2fab:$s5: User-Agent:
    • 0x2efc:$s8: ALLUSERSPROFILE
    4.2.rundll32.exe.10000000.0.unpackJoeSecurity_SystemBCYara detected SystemBCJoe Security
      4.2.rundll32.exe.10000000.0.unpackMALWARE_Win_EXEPWSH_DLAgentDetects SystemBCditekSHen
      • 0x2f49:$pwsh: powershell
      • 0x2f90:$s1: GET %s HTTP/1
      • 0x2fab:$s2: User-Agent:
      • 0x2f54:$s3: -WindowStyle Hidden -ep bypass -file "
      • 0x2f85:$s4: LdrLoadDll
      • 0x2de1:$v1: BEGINDATA
      • 0x2deb:$v2: HOST1:
      • 0x2e1e:$v2: HOST2:
      • 0x2e51:$v3: PORT1:
      • 0x2e5d:$v4: TOR:
      • 0x2ef6:$v6: start
      5.2.rundll32.exe.10000000.0.unpackEXT_MAL_SystemBC_Mar22_1Detects unpacked SystemBC module as used by Emotet in March 2022Thomas Barabosch, Deutsche Telekom Security
      • 0x2f54:$sx1: -WindowStyle Hidden -ep bypass -file
      • 0x2de1:$sx2: BEGINDATA
      • 0x2f90:$sx3: GET %s HTTP/1.0
      • 0x2fab:$s5: User-Agent:
      • 0x2efc:$s8: ALLUSERSPROFILE
      5.2.rundll32.exe.10000000.0.unpackJoeSecurity_SystemBCYara detected SystemBCJoe Security
        Click to see the 4 entries
        No Sigma rule has matched
        No Snort rule has matched

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: 6k00SOeMjU.dllReversingLabs: Detection: 23%
        Source: 6k00SOeMjU.dllVirustotal: Detection: 17%Perma Link
        Source: 6k00SOeMjU.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL

        Networking

        barindex
        Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 89.22.236.225 4193
        Source: global trafficTCP traffic: 192.168.2.3:49698 -> 89.22.236.225:4193
        Source: Joe Sandbox ViewASN Name: INETLTDTR INETLTDTR
        Source: Joe Sandbox ViewIP Address: 89.22.236.225 89.22.236.225
        Source: unknownTCP traffic detected without corresponding DNS query: 89.22.236.225
        Source: unknownTCP traffic detected without corresponding DNS query: 89.22.236.225
        Source: unknownTCP traffic detected without corresponding DNS query: 89.22.236.225
        Source: unknownTCP traffic detected without corresponding DNS query: 89.22.236.225
        Source: unknownTCP traffic detected without corresponding DNS query: 89.22.236.225
        Source: unknownTCP traffic detected without corresponding DNS query: 89.22.236.225
        Source: unknownTCP traffic detected without corresponding DNS query: 89.22.236.225
        Source: unknownTCP traffic detected without corresponding DNS query: 89.22.236.225
        Source: unknownTCP traffic detected without corresponding DNS query: 89.22.236.225
        Source: unknownTCP traffic detected without corresponding DNS query: 89.22.236.225
        Source: unknownTCP traffic detected without corresponding DNS query: 89.22.236.225
        Source: unknownTCP traffic detected without corresponding DNS query: 89.22.236.225
        Source: unknownTCP traffic detected without corresponding DNS query: 89.22.236.225
        Source: unknownTCP traffic detected without corresponding DNS query: 89.22.236.225
        Source: unknownTCP traffic detected without corresponding DNS query: 89.22.236.225
        Source: unknownTCP traffic detected without corresponding DNS query: 89.22.236.225
        Source: unknownTCP traffic detected without corresponding DNS query: 89.22.236.225
        Source: unknownTCP traffic detected without corresponding DNS query: 89.22.236.225
        Source: unknownTCP traffic detected without corresponding DNS query: 89.22.236.225
        Source: unknownTCP traffic detected without corresponding DNS query: 89.22.236.225
        Source: 6k00SOeMjU.dllString found in binary or memory: http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
        Source: 6k00SOeMjU.dllString found in binary or memory: http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
        Source: 6k00SOeMjU.dllString found in binary or memory: http://ocsp.sectigo.com0
        Source: rundll32.exe, 00000003.00000002.769805471.0000000010B69000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.769805642.0000000010B69000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000005.00000002.769803694.0000000010B69000.00000002.00000001.01000000.00000003.sdmp, 6k00SOeMjU.dllString found in binary or memory: http://www.innosetup.com
        Source: 6k00SOeMjU.dllString found in binary or memory: https://sectigo.com/CPS0
        Source: loaddll32.exe, 00000000.00000002.250603818.00000000012DB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

        System Summary

        barindex
        Source: 4.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: Detects SystemBC Author: ditekSHen
        Source: 5.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: Detects SystemBC Author: ditekSHen
        Source: 3.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: Detects SystemBC Author: ditekSHen
        Source: 6k00SOeMjU.dllStatic PE information: section name: *;>%1sXO
        Source: 6k00SOeMjU.dllStatic PE information: section name: 7rP!Ni:j
        Source: 6k00SOeMjU.dllStatic PE information: section name: bkE<E2?8
        Source: 6k00SOeMjU.dllStatic PE information: section name: 8*7`Joyq
        Source: 6k00SOeMjU.dllStatic PE information: section name: 0Ys'"rSd
        Source: 6k00SOeMjU.dllStatic PE information: section name: $u!6XeN&
        Source: 6k00SOeMjU.dllStatic PE information: section name: K)'tLNvc
        Source: 6k00SOeMjU.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
        Source: 4.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: EXT_MAL_SystemBC_Mar22_1 date = 2022-03-11, hash1 = c926338972be5bdfdd89574f3dc2fe4d4f70fd4e24c1c6ac5d2439c7fcc50db5, author = Thomas Barabosch, Deutsche Telekom Security, description = Detects unpacked SystemBC module as used by Emotet in March 2022, score = https://malpedia.caad.fkie.fraunhofer.de/details/win.systembc, reference2 = https://medium.com/walmartglobaltech/inside-the-systembc-malware-as-a-service-9aa03afd09c6, reference = https://twitter.com/Cryptolaemus1/status/1502069552246575105
        Source: 4.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_EXEPWSH_DLAgent author = ditekSHen, description = Detects SystemBC
        Source: 5.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: EXT_MAL_SystemBC_Mar22_1 date = 2022-03-11, hash1 = c926338972be5bdfdd89574f3dc2fe4d4f70fd4e24c1c6ac5d2439c7fcc50db5, author = Thomas Barabosch, Deutsche Telekom Security, description = Detects unpacked SystemBC module as used by Emotet in March 2022, score = https://malpedia.caad.fkie.fraunhofer.de/details/win.systembc, reference2 = https://medium.com/walmartglobaltech/inside-the-systembc-malware-as-a-service-9aa03afd09c6, reference = https://twitter.com/Cryptolaemus1/status/1502069552246575105
        Source: 5.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_EXEPWSH_DLAgent author = ditekSHen, description = Detects SystemBC
        Source: 3.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: EXT_MAL_SystemBC_Mar22_1 date = 2022-03-11, hash1 = c926338972be5bdfdd89574f3dc2fe4d4f70fd4e24c1c6ac5d2439c7fcc50db5, author = Thomas Barabosch, Deutsche Telekom Security, description = Detects unpacked SystemBC module as used by Emotet in March 2022, score = https://malpedia.caad.fkie.fraunhofer.de/details/win.systembc, reference2 = https://medium.com/walmartglobaltech/inside-the-systembc-malware-as-a-service-9aa03afd09c6, reference = https://twitter.com/Cryptolaemus1/status/1502069552246575105
        Source: 3.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_EXEPWSH_DLAgent author = ditekSHen, description = Detects SystemBC
        Source: 00000005.00000002.764703413.0000000010005000.00000004.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: EXT_MAL_SystemBC_Mar22_1 date = 2022-03-11, hash1 = c926338972be5bdfdd89574f3dc2fe4d4f70fd4e24c1c6ac5d2439c7fcc50db5, author = Thomas Barabosch, Deutsche Telekom Security, description = Detects unpacked SystemBC module as used by Emotet in March 2022, score = https://malpedia.caad.fkie.fraunhofer.de/details/win.systembc, reference2 = https://medium.com/walmartglobaltech/inside-the-systembc-malware-as-a-service-9aa03afd09c6, reference = https://twitter.com/Cryptolaemus1/status/1502069552246575105
        Source: 00000003.00000002.764685317.0000000010005000.00000004.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: EXT_MAL_SystemBC_Mar22_1 date = 2022-03-11, hash1 = c926338972be5bdfdd89574f3dc2fe4d4f70fd4e24c1c6ac5d2439c7fcc50db5, author = Thomas Barabosch, Deutsche Telekom Security, description = Detects unpacked SystemBC module as used by Emotet in March 2022, score = https://malpedia.caad.fkie.fraunhofer.de/details/win.systembc, reference2 = https://medium.com/walmartglobaltech/inside-the-systembc-malware-as-a-service-9aa03afd09c6, reference = https://twitter.com/Cryptolaemus1/status/1502069552246575105
        Source: 00000004.00000002.764666285.0000000010005000.00000004.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: EXT_MAL_SystemBC_Mar22_1 date = 2022-03-11, hash1 = c926338972be5bdfdd89574f3dc2fe4d4f70fd4e24c1c6ac5d2439c7fcc50db5, author = Thomas Barabosch, Deutsche Telekom Security, description = Detects unpacked SystemBC module as used by Emotet in March 2022, score = https://malpedia.caad.fkie.fraunhofer.de/details/win.systembc, reference2 = https://medium.com/walmartglobaltech/inside-the-systembc-malware-as-a-service-9aa03afd09c6, reference = https://twitter.com/Cryptolaemus1/status/1502069552246575105
        Source: Process Memory Space: rundll32.exe PID: 5448, type: MEMORYSTRMatched rule: EXT_MAL_SystemBC_Mar22_1 date = 2022-03-11, hash1 = c926338972be5bdfdd89574f3dc2fe4d4f70fd4e24c1c6ac5d2439c7fcc50db5, author = Thomas Barabosch, Deutsche Telekom Security, description = Detects unpacked SystemBC module as used by Emotet in March 2022, score = https://malpedia.caad.fkie.fraunhofer.de/details/win.systembc, reference2 = https://medium.com/walmartglobaltech/inside-the-systembc-malware-as-a-service-9aa03afd09c6, reference = https://twitter.com/Cryptolaemus1/status/1502069552246575105
        Source: Process Memory Space: rundll32.exe PID: 5476, type: MEMORYSTRMatched rule: EXT_MAL_SystemBC_Mar22_1 date = 2022-03-11, hash1 = c926338972be5bdfdd89574f3dc2fe4d4f70fd4e24c1c6ac5d2439c7fcc50db5, author = Thomas Barabosch, Deutsche Telekom Security, description = Detects unpacked SystemBC module as used by Emotet in March 2022, score = https://malpedia.caad.fkie.fraunhofer.de/details/win.systembc, reference2 = https://medium.com/walmartglobaltech/inside-the-systembc-malware-as-a-service-9aa03afd09c6, reference = https://twitter.com/Cryptolaemus1/status/1502069552246575105
        Source: Process Memory Space: rundll32.exe PID: 3920, type: MEMORYSTRMatched rule: EXT_MAL_SystemBC_Mar22_1 date = 2022-03-11, hash1 = c926338972be5bdfdd89574f3dc2fe4d4f70fd4e24c1c6ac5d2439c7fcc50db5, author = Thomas Barabosch, Deutsche Telekom Security, description = Detects unpacked SystemBC module as used by Emotet in March 2022, score = https://malpedia.caad.fkie.fraunhofer.de/details/win.systembc, reference2 = https://medium.com/walmartglobaltech/inside-the-systembc-malware-as-a-service-9aa03afd09c6, reference = https://twitter.com/Cryptolaemus1/status/1502069552246575105
        Source: 6k00SOeMjU.dllBinary or memory string: OriginalFilename6 vs 6k00SOeMjU.dll
        Source: 6k00SOeMjU.dllStatic PE information: invalid certificate
        Source: 6k00SOeMjU.dllReversingLabs: Detection: 23%
        Source: 6k00SOeMjU.dllVirustotal: Detection: 17%
        Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
        Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\6k00SOeMjU.dll,rundll
        Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\6k00SOeMjU.dll"
        Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\6k00SOeMjU.dll",#1
        Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\6k00SOeMjU.dll,rundll
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\6k00SOeMjU.dll",#1
        Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\6k00SOeMjU.dll",rundll
        Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\6k00SOeMjU.dll",#1
        Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\6k00SOeMjU.dll,rundll
        Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\6k00SOeMjU.dll",rundll
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\6k00SOeMjU.dll",#1
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5260:120:WilError_01
        Source: classification engineClassification label: mal96.troj.evad.winDLL@10/0@0/1
        Source: 6k00SOeMjU.dllStatic file information: File size 7566544 > 1048576
        Source: 6k00SOeMjU.dllStatic PE information: Raw size of nUPwRZiK is bigger than: 0x100000 < 0x734600
        Source: 6k00SOeMjU.dllStatic PE information: section name: *;>%1sXO
        Source: 6k00SOeMjU.dllStatic PE information: section name: 7rP!Ni:j
        Source: 6k00SOeMjU.dllStatic PE information: section name: bkE<E2?8
        Source: 6k00SOeMjU.dllStatic PE information: section name: 8*7`Joyq
        Source: 6k00SOeMjU.dllStatic PE information: section name: 0Ys'"rSd
        Source: 6k00SOeMjU.dllStatic PE information: section name: nUPwRZiK
        Source: 6k00SOeMjU.dllStatic PE information: section name: $u!6XeN&
        Source: 6k00SOeMjU.dllStatic PE information: section name: K)'tLNvc
        Source: initial sampleStatic PE information: section where entry point is pointing to: nUPwRZiK

        Hooking and other Techniques for Hiding and Protection

        barindex
        Source: C:\Windows\System32\loaddll32.exeMemory written: PID: 5288 base: DF0005 value: E9 FB 99 AF 76
        Source: C:\Windows\System32\loaddll32.exeMemory written: PID: 5288 base: 778E9A00 value: E9 0A 66 50 89
        Source: C:\Windows\System32\loaddll32.exeMemory written: PID: 5288 base: 10D0007 value: E9 7B 4C 85 76
        Source: C:\Windows\System32\loaddll32.exeMemory written: PID: 5288 base: 77924C80 value: E9 8E B3 7A 89
        Source: C:\Windows\System32\loaddll32.exeMemory written: PID: 5288 base: 10E0005 value: E9 FB BF 7D 76
        Source: C:\Windows\System32\loaddll32.exeMemory written: PID: 5288 base: 778BC000 value: E9 0A 40 82 89
        Source: C:\Windows\System32\loaddll32.exeMemory written: PID: 5288 base: 1290008 value: E9 AB E0 66 76
        Source: C:\Windows\System32\loaddll32.exeMemory written: PID: 5288 base: 778FE0B0 value: E9 60 1F 99 89
        Source: C:\Windows\System32\loaddll32.exeMemory written: PID: 5288 base: 12A0005 value: E9 CB 5A 66 73
        Source: C:\Windows\System32\loaddll32.exeMemory written: PID: 5288 base: 74905AD0 value: E9 3A A5 99 8C
        Source: C:\Windows\System32\loaddll32.exeMemory written: PID: 5288 base: 12B0005 value: E9 5B B0 67 73
        Source: C:\Windows\System32\loaddll32.exeMemory written: PID: 5288 base: 7492B060 value: E9 AA 4F 98 8C
        Source: C:\Windows\System32\loaddll32.exeMemory written: PID: 5288 base: 12C0005 value: E9 DB F8 9E 75
        Source: C:\Windows\System32\loaddll32.exeMemory written: PID: 5288 base: 76CAF8E0 value: E9 2A 07 61 8A
        Source: C:\Windows\System32\loaddll32.exeMemory written: PID: 5288 base: 2D70005 value: E9 FB 42 F6 73
        Source: C:\Windows\System32\loaddll32.exeMemory written: PID: 5288 base: 76CD4300 value: E9 0A BD 09 8C
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 5448 base: 860005 value: E9 FB 99 08 77
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 5448 base: 778E9A00 value: E9 0A 66 F7 88
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 5448 base: 870007 value: E9 7B 4C 0B 77
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 5448 base: 77924C80 value: E9 8E B3 F4 88
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 5448 base: 890005 value: E9 FB BF 02 77
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 5448 base: 778BC000 value: E9 0A 40 FD 88
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 5448 base: 8B0008 value: E9 AB E0 04 77
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 5448 base: 778FE0B0 value: E9 60 1F FB 88
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 5448 base: AD0005 value: E9 CB 5A E3 73
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 5448 base: 74905AD0 value: E9 3A A5 1C 8C
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 5448 base: AE0005 value: E9 5B B0 E4 73
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 5448 base: 7492B060 value: E9 AA 4F 1B 8C
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 5448 base: 1050005 value: E9 DB F8 C5 75
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 5448 base: 76CAF8E0 value: E9 2A 07 3A 8A
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 5448 base: 4490005 value: E9 FB 42 84 72
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 5448 base: 76CD4300 value: E9 0A BD 7B 8D
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 5476 base: 9E0005 value: E9 FB 99 F0 76
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 5476 base: 778E9A00 value: E9 0A 66 0F 89
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 5476 base: 9F0007 value: E9 7B 4C F3 76
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 5476 base: 77924C80 value: E9 8E B3 0C 89
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 5476 base: D10005 value: E9 FB BF BA 76
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 5476 base: 778BC000 value: E9 0A 40 45 89
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 5476 base: ED0008 value: E9 AB E0 A2 76
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 5476 base: 778FE0B0 value: E9 60 1F 5D 89
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 5476 base: EF0005 value: E9 CB 5A A1 73
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 5476 base: 74905AD0 value: E9 3A A5 5E 8C
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 5476 base: 1040005 value: E9 5B B0 8E 73
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 5476 base: 7492B060 value: E9 AA 4F 71 8C
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 5476 base: 1050005 value: E9 DB F8 C5 75
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 5476 base: 76CAF8E0 value: E9 2A 07 3A 8A
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 5476 base: 4810005 value: E9 FB 42 4C 72
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 5476 base: 76CD4300 value: E9 0A BD B3 8D
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 3920 base: 3150005 value: E9 FB 99 79 74
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 3920 base: 778E9A00 value: E9 0A 66 86 8B
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 3920 base: 3400007 value: E9 7B 4C 52 74
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 3920 base: 77924C80 value: E9 8E B3 AD 8B
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 3920 base: 3410005 value: E9 FB BF 4A 74
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 3920 base: 778BC000 value: E9 0A 40 B5 8B
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 3920 base: 3430008 value: E9 AB E0 4C 74
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 3920 base: 778FE0B0 value: E9 60 1F B3 8B
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 3920 base: 3440005 value: E9 CB 5A 4C 71
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 3920 base: 74905AD0 value: E9 3A A5 B3 8E
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 3920 base: 3450005 value: E9 5B B0 4D 71
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 3920 base: 7492B060 value: E9 AA 4F B2 8E
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 3920 base: 3460005 value: E9 DB F8 84 73
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 3920 base: 76CAF8E0 value: E9 2A 07 7B 8C
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 3920 base: 3470005 value: E9 FB 42 86 73
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 3920 base: 76CD4300 value: E9 0A BD 79 8C
        Source: C:\Windows\System32\loaddll32.exeMemory written: PID: 5288 base: 778BC000 value: 8B FF 55 8B EC
        Source: C:\Windows\System32\loaddll32.exeMemory written: PID: 5288 base: 74905AD0 value: 8B FF 55 8B EC
        Source: C:\Windows\System32\loaddll32.exeMemory written: PID: 5288 base: 7492B060 value: 8B FF 55 8B EC
        Source: C:\Windows\System32\loaddll32.exeMemory written: PID: 5288 base: 76CAF8E0 value: 8B FF 55 8B EC
        Source: C:\Windows\System32\loaddll32.exeMemory written: PID: 5288 base: 76CD4300 value: 8B FF 55 8B EC
        Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX

        Malware Analysis System Evasion

        barindex
        Source: C:\Windows\System32\loaddll32.exeSpecial instruction interceptor: First address: 0000000010B09AA6 instructions rdtsc caused by: RDTSC with Trap Flag (TF)
        Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 00000000106587EA second address: 0000000010658809 instructions: 0x00000000 rdtsc 0x00000002 ror cl, 1 0x00000004 ror edx, FFFFFF86h 0x00000007 xor ax, si 0x0000000a not cl 0x0000000c clc 0x0000000d xor bl, cl 0x0000000f push esi 0x00000010 push edi 0x00000011 rol dh, FFFFFF9Dh 0x00000014 rcl eax, cl 0x00000016 test bx, bx 0x00000019 push ebx 0x0000001a mov ebx, ecx 0x0000001c movsx eax, di 0x0000001f rdtsc
        Source: C:\Windows\System32\loaddll32.exeRDTSC instruction interceptor: First address: 00000000106587EA second address: 0000000010658809 instructions: 0x00000000 rdtsc 0x00000002 ror cl, 1 0x00000004 ror edx, FFFFFF86h 0x00000007 xor ax, si 0x0000000a not cl 0x0000000c clc 0x0000000d xor bl, cl 0x0000000f push esi 0x00000010 push edi 0x00000011 rol dh, FFFFFF9Dh 0x00000014 rcl eax, cl 0x00000016 test bx, bx 0x00000019 push ebx 0x0000001a mov ebx, ecx 0x0000001c movsx eax, di 0x0000001f rdtsc
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
        Source: C:\Windows\System32\loaddll32.exeProcess information queried: ProcessInformation
        Source: C:\Windows\System32\loaddll32.exeSystem information queried: ModuleInformation
        Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 120000
        Source: rundll32.exe, 00000004.00000002.764386156.0000000000F0A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll

        Anti Debugging

        barindex
        Source: C:\Windows\System32\loaddll32.exeThread information set: HideFromDebugger
        Source: C:\Windows\System32\loaddll32.exeThread information set: HideFromDebugger
        Source: C:\Windows\SysWOW64\rundll32.exeThread information set: HideFromDebugger
        Source: C:\Windows\SysWOW64\rundll32.exeThread information set: HideFromDebugger
        Source: C:\Windows\SysWOW64\rundll32.exeThread information set: HideFromDebugger
        Source: C:\Windows\SysWOW64\rundll32.exeThread information set: HideFromDebugger
        Source: C:\Windows\SysWOW64\rundll32.exeThread information set: HideFromDebugger
        Source: C:\Windows\SysWOW64\rundll32.exeThread information set: HideFromDebugger
        Source: C:\Windows\System32\loaddll32.exeSystem information queried: KernelDebuggerInformation
        Source: C:\Windows\System32\loaddll32.exeProcess queried: DebugPort
        Source: C:\Windows\System32\loaddll32.exeProcess queried: DebugObjectHandle
        Source: C:\Windows\System32\loaddll32.exeProcess queried: DebugObjectHandle
        Source: C:\Windows\System32\loaddll32.exeProcess queried: DebugObjectHandle
        Source: C:\Windows\System32\loaddll32.exeProcess queried: DebugPort
        Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPort
        Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugObjectHandle
        Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugObjectHandle
        Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugObjectHandle
        Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPort
        Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPort
        Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugObjectHandle
        Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugObjectHandle
        Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugObjectHandle
        Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPort
        Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPort
        Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugObjectHandle
        Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugObjectHandle
        Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugObjectHandle
        Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPort
        Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected

        HIPS / PFW / Operating System Protection Evasion

        barindex
        Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 89.22.236.225 4193
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\6k00SOeMjU.dll",#1
        Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\ VolumeInformation

        Stealing of Sensitive Information

        barindex
        Source: Yara matchFile source: 4.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 5448, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 5476, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 3920, type: MEMORYSTR

        Remote Access Functionality

        barindex
        Source: Yara matchFile source: 4.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 5448, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 5476, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 3920, type: MEMORYSTR
        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
        Valid AccountsWindows Management InstrumentationPath Interception111
        Process Injection
        1
        Rundll32
        1
        Credential API Hooking
        321
        Security Software Discovery
        Remote Services1
        Credential API Hooking
        Exfiltration Over Other Network Medium1
        Non-Standard Port
        Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
        Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts121
        Virtualization/Sandbox Evasion
        1
        Input Capture
        1
        Process Discovery
        Remote Desktop Protocol1
        Input Capture
        Exfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
        Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)111
        Process Injection
        Security Account Manager121
        Virtualization/Sandbox Evasion
        SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
        Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Binary PaddingNTDS212
        System Information Discovery
        Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet
        behaviorgraph top1 signatures2 2 Behavior Graph ID: 764036 Sample: 6k00SOeMjU.dll Startdate: 09/12/2022 Architecture: WINDOWS Score: 96 25 Malicious sample detected (through community Yara rule) 2->25 27 Multi AV Scanner detection for submitted file 2->27 29 Yara detected SystemBC 2->29 31 PE file contains section with special chars 2->31 7 loaddll32.exe 1 2->7         started        process3 signatures4 37 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 7->37 39 Overwrites code with function prologues 7->39 41 Tries to evade analysis by execution special instruction (VM detection) 7->41 43 2 other signatures 7->43 10 rundll32.exe 7->10         started        14 rundll32.exe 7->14         started        16 cmd.exe 1 7->16         started        18 conhost.exe 7->18         started        process5 dnsIp6 23 89.22.236.225, 4193, 49698, 49699 INETLTDTR Russian Federation 10->23 45 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 10->45 47 Tries to detect virtualization through RDTSC time measurements 10->47 49 Hides threads from debuggers 10->49 51 System process connects to network (likely due to code injection or exploit) 14->51 20 rundll32.exe 16->20         started        signatures7 process8 signatures9 33 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 20->33 35 Hides threads from debuggers 20->35

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        6k00SOeMjU.dll23%ReversingLabsWin32.Trojan.Generic
        6k00SOeMjU.dll17%VirustotalBrowse
        No Antivirus matches
        No Antivirus matches
        No Antivirus matches
        SourceDetectionScannerLabelLink
        http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t0%URL Reputationsafe
        https://sectigo.com/CPS00%URL Reputationsafe
        http://ocsp.sectigo.com00%URL Reputationsafe
        http://www.innosetup.com0%URL Reputationsafe
        http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#0%URL Reputationsafe
        No contacted domains info
        NameSourceMaliciousAntivirus DetectionReputation
        http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t6k00SOeMjU.dllfalse
        • URL Reputation: safe
        unknown
        https://sectigo.com/CPS06k00SOeMjU.dllfalse
        • URL Reputation: safe
        unknown
        http://ocsp.sectigo.com06k00SOeMjU.dllfalse
        • URL Reputation: safe
        unknown
        http://www.innosetup.comrundll32.exe, 00000003.00000002.769805471.0000000010B69000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.769805642.0000000010B69000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000005.00000002.769803694.0000000010B69000.00000002.00000001.01000000.00000003.sdmp, 6k00SOeMjU.dllfalse
        • URL Reputation: safe
        unknown
        http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#6k00SOeMjU.dllfalse
        • URL Reputation: safe
        unknown
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        89.22.236.225
        unknownRussian Federation
        197328INETLTDTRtrue
        Joe Sandbox Version:36.0.0 Rainbow Opal
        Analysis ID:764036
        Start date and time:2022-12-09 10:51:12 +01:00
        Joe Sandbox Product:CloudBasic
        Overall analysis duration:0h 7m 21s
        Hypervisor based Inspection enabled:false
        Report type:light
        Sample file name:6k00SOeMjU.dll
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
        Number of analysed new started processes analysed:20
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • HDC enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Detection:MAL
        Classification:mal96.troj.evad.winDLL@10/0@0/1
        EGA Information:Failed
        HDC Information:Failed
        HCA Information:
        • Successful, ratio: 100%
        • Number of executed functions: 0
        • Number of non-executed functions: 0
        Cookbook Comments:
        • Found application associated with file extension: .dll
        • Override analysis time to 240s for rundll32
        • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, WMIADAP.exe, SgrmBroker.exe, conhost.exe, backgroundTaskHost.exe, svchost.exe
        • Excluded domains from analysis (whitelisted): fs.microsoft.com
        • Not all processes where analyzed, report is missing behavior information
        TimeTypeDescription
        10:52:05API Interceptor3x Sleep call for process: rundll32.exe modified
        10:52:07API Interceptor1x Sleep call for process: loaddll32.exe modified
        No context
        No context
        No context
        No context
        No context
        No created / dropped files found
        File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
        Entropy (8bit):7.976819466268135
        TrID:
        • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
        • Generic Win/DOS Executable (2004/3) 0.20%
        • DOS Executable Generic (2002/1) 0.20%
        • VXD Driver (31/22) 0.00%
        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
        File name:6k00SOeMjU.dll
        File size:7566544
        MD5:0d079a931e42f554016db36476e55ba7
        SHA1:d5f1ab52221019c746f1cc59a45ce18d0b817496
        SHA256:ead2c5aaf92fe07db45b99587f586c7a45f92c67220cd8113a5d2e7bcb320798
        SHA512:1496f1296df89e1da8780f175631e2551300a99e6c7ea43d2750653fdf6e7ed096fdedd9f0d23b94190ecf418da09cf9c9b6caee5821ba1c457f0294063bbc9e
        SSDEEP:196608:l3ksPqmzcl+LG314Hujb7KgkYCbGNBmHTER:lUON+2HBb8
        TLSH:5776332F16980415E4EECC3A85EBBE9132F5073A9E8278BCA5DA5DC13A354F5B702163
        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...8.ob...........!....."...@......=XT......@.......................................Ft............................../..E..
        Icon Hash:b99988fcd4f66e0f
        Entrypoint:0x1054583d
        Entrypoint Section:nUPwRZiK
        Digitally signed:true
        Imagebase:0x10000000
        Subsystem:windows gui
        Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
        DLL Characteristics:
        Time Stamp:0x626FE238 [Mon May 2 13:52:56 2022 UTC]
        TLS Callbacks:
        CLR (.Net) Version:
        OS Version Major:5
        OS Version Minor:0
        File Version Major:5
        File Version Minor:0
        Subsystem Version Major:5
        Subsystem Version Minor:0
        Import Hash:d3a98daa37dbe78969711cc1194ce51b
        Signature Valid:false
        Signature Issuer:CN=fumbling corp.
        Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
        Error Number:-2146762487
        Not Before, Not After
        • 12/8/2022 9:12:34 AM 12/8/2023 9:32:34 AM
        Subject Chain
        • CN=fumbling corp.
        Version:3
        Thumbprint MD5:BFCF38BCEDDC6D492EE1D807C07B0E02
        Thumbprint SHA-1:92A18235585F157E75D33B92CC8E394210AEAD16
        Thumbprint SHA-256:E3FCBA8CB056D8C4B5F3C974DD82C3CD9C96AF2621722C26119E478F35637E99
        Serial:78919934276F458544703D1C7FC21303
        Instruction
        push edx
        mov edx, 3F442022h
        pushfd
        xor edx, 7B9D646Dh
        xor dl, dl
        mov edx, dword ptr [esp+edx-44D943FCh]
        mov dword ptr [esp+04h], 8EECC51Ah
        push dword ptr [esp+00h]
        popfd
        lea esp, dword ptr [esp+04h]
        call 00007F36F8B8AD93h
        xchg al, al
        pushfd
        lahf
        shr al, FFFFFF8Fh
        shl ah, FFFFFF86h
        pop dword ptr [edi]
        bt eax, ecx
        and ax, 00007B5Bh
        xchg al, ah
        mov eax, dword ptr [esi]
        cmp si, bp
        lea esi, dword ptr [esi+00000004h]
        xor eax, ebx
        jmp 00007F36F8C42417h
        stosb
        retf A814h
        jmp far 0F97h : 3CD32403h
        stosd
        enter B68Dh, 01h
        add byte ptr [eax], al
        add cl, al
        loopne 00007F36F8BAE893h
        xor cl, bl
        btr ax, dx
        or ax, bp
        not cl
        add al, ah
        bts eax, ebp
        sar al, cl
        add cl, 0000007Eh
        shld ax, si, 00000065h
        bts ax, sp
        not ah
        xor cl, 0000006Bh
        cmovno ax, dx
        movsx eax, si
        rol ax, 0000h
        rol cl, 1
        cmovno ax, bx
        xor bl, cl
        movzx eax, dx
        lahf
        lea edi, dword ptr [edi-00000002h]
        btr ax, 0046h
        sal al, FFFFFF9Dh
        mov word ptr [edi], cx
        mov eax, dword ptr [esi]
        add esi, 00000004h
        jmp 00007F36F8AD6A41h
        push ebp
        ret
        rol eax, 1
        sub eax, 000066B4h
        NameVirtual AddressVirtual Size Is in Section
        IMAGE_DIRECTORY_ENTRY_EXPORT0xaf2fa40x45nUPwRZiK
        IMAGE_DIRECTORY_ENTRY_IMPORT0x660b3c0x104nUPwRZiK
        IMAGE_DIRECTORY_ENTRY_RESOURCE0xb6a0000x800K)'tLNvc
        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
        IMAGE_DIRECTORY_ENTRY_SECURITY0x735e000x16d0nUPwRZiK
        IMAGE_DIRECTORY_ENTRY_BASERELOC0xb690000x5d4$u!6XeN&
        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IAT0x4330000x780Ys'"rSd
        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
        NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
        *;>%1sXO0x10000x219c0x0False0empty0.0IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        7rP!Ni:j0x40000x8450x0False0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        bkE<E2?80x50000x2500x0False0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        8*7`Joyq0x60000x42c2640x0unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        0Ys'"rSd0x4330000x4a40x600False0.06575520833333333OpenPGP Public Key0.4141326418166997IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        nUPwRZiK0x4340000x7345900x734600unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        $u!6XeN&0xb690000x5d40x600False0.53515625data4.2912698570834IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        K)'tLNvc0xb6a0000x8000x800False0.44287109375data3.8514204088109953IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        NameRVASizeTypeLanguageCountry
        RT_ICON0xb6a0fc0x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512DutchNetherlands
        RT_GROUP_ICON0xb6a3e40x14dataDutchNetherlands
        RT_VERSION0xb6a3f80x408dataEnglishUnited States
        DLLImport
        user32.dllSendMessageA
        kernel32.dllLocalFree
        advapi32.dllGetSidSubAuthority
        wsock32.dllWSAStartup
        shell32.dllCommandLineToArgvW
        ws2_32.dllfreeaddrinfo
        ole32.dllCoUninitialize
        secur32.dllGetUserNameExA
        psapi.dllGetModuleFileNameExA
        kernel32.dllGetSystemTimeAsFileTime
        user32.dllCharUpperBuffW
        kernel32.dllLocalAlloc, LocalFree, GetModuleFileNameW, ExitProcess, LoadLibraryA, GetModuleHandleA, GetProcAddress
        NameOrdinalAddress
        rundll10x1000100c
        Language of compilation systemCountry where language is spokenMap
        DutchNetherlands
        EnglishUnited States
        TimestampSource PortDest PortSource IPDest IP
        Dec 9, 2022 10:52:05.048599958 CET496984193192.168.2.389.22.236.225
        Dec 9, 2022 10:52:05.074860096 CET41934969889.22.236.225192.168.2.3
        Dec 9, 2022 10:52:05.075001955 CET496984193192.168.2.389.22.236.225
        Dec 9, 2022 10:52:05.076816082 CET496984193192.168.2.389.22.236.225
        Dec 9, 2022 10:52:05.102937937 CET41934969889.22.236.225192.168.2.3
        Dec 9, 2022 10:52:05.162826061 CET496994193192.168.2.389.22.236.225
        Dec 9, 2022 10:52:05.188915968 CET41934969989.22.236.225192.168.2.3
        Dec 9, 2022 10:52:05.189066887 CET496994193192.168.2.389.22.236.225
        Dec 9, 2022 10:52:05.190913916 CET496994193192.168.2.389.22.236.225
        Dec 9, 2022 10:52:05.216546059 CET41934969989.22.236.225192.168.2.3
        Dec 9, 2022 10:52:09.218707085 CET497004193192.168.2.389.22.236.225
        Dec 9, 2022 10:52:09.245634079 CET41934970089.22.236.225192.168.2.3
        Dec 9, 2022 10:52:09.245754957 CET497004193192.168.2.389.22.236.225
        Dec 9, 2022 10:52:09.262767076 CET497004193192.168.2.389.22.236.225
        Dec 9, 2022 10:52:09.288966894 CET41934970089.22.236.225192.168.2.3
        Dec 9, 2022 10:53:07.081410885 CET41934969989.22.236.225192.168.2.3
        Dec 9, 2022 10:53:07.081504107 CET496994193192.168.2.389.22.236.225
        Dec 9, 2022 10:53:07.081511974 CET41934969889.22.236.225192.168.2.3
        Dec 9, 2022 10:53:07.081585884 CET496984193192.168.2.389.22.236.225
        Dec 9, 2022 10:53:11.177726030 CET41934970089.22.236.225192.168.2.3
        Dec 9, 2022 10:53:11.177835941 CET497004193192.168.2.389.22.236.225
        Dec 9, 2022 10:54:08.521687984 CET41934969989.22.236.225192.168.2.3
        Dec 9, 2022 10:54:08.522161961 CET496994193192.168.2.389.22.236.225
        Dec 9, 2022 10:54:08.522314072 CET41934969889.22.236.225192.168.2.3
        Dec 9, 2022 10:54:08.522413969 CET496984193192.168.2.389.22.236.225
        Dec 9, 2022 10:54:12.618275881 CET41934970089.22.236.225192.168.2.3
        Dec 9, 2022 10:54:12.618397951 CET497004193192.168.2.389.22.236.225
        Dec 9, 2022 10:55:09.961476088 CET41934969989.22.236.225192.168.2.3
        Dec 9, 2022 10:55:09.961595058 CET496994193192.168.2.389.22.236.225
        Dec 9, 2022 10:55:09.961711884 CET41934969889.22.236.225192.168.2.3
        Dec 9, 2022 10:55:09.961854935 CET496984193192.168.2.389.22.236.225
        Dec 9, 2022 10:55:14.058015108 CET41934970089.22.236.225192.168.2.3
        Dec 9, 2022 10:55:14.058202982 CET497004193192.168.2.389.22.236.225
        Dec 9, 2022 10:56:11.402008057 CET41934969989.22.236.225192.168.2.3
        Dec 9, 2022 10:56:11.402087927 CET496994193192.168.2.389.22.236.225
        Dec 9, 2022 10:56:11.402550936 CET41934969889.22.236.225192.168.2.3
        Dec 9, 2022 10:56:11.402653933 CET496984193192.168.2.389.22.236.225

        Click to jump to process

        Target ID:0
        Start time:10:52:02
        Start date:09/12/2022
        Path:C:\Windows\System32\loaddll32.exe
        Wow64 process (32bit):true
        Commandline:loaddll32.exe "C:\Users\user\Desktop\6k00SOeMjU.dll"
        Imagebase:0xdc0000
        File size:116736 bytes
        MD5 hash:1F562FBF37040EC6C43C8D5EF619EA39
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:moderate

        Target ID:1
        Start time:10:52:02
        Start date:09/12/2022
        Path:C:\Windows\System32\conhost.exe
        Wow64 process (32bit):false
        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Imagebase:0x7ff745070000
        File size:625664 bytes
        MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high

        Target ID:2
        Start time:10:52:02
        Start date:09/12/2022
        Path:C:\Windows\SysWOW64\cmd.exe
        Wow64 process (32bit):true
        Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\6k00SOeMjU.dll",#1
        Imagebase:0xb0000
        File size:232960 bytes
        MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high

        Target ID:3
        Start time:10:52:02
        Start date:09/12/2022
        Path:C:\Windows\SysWOW64\rundll32.exe
        Wow64 process (32bit):true
        Commandline:rundll32.exe C:\Users\user\Desktop\6k00SOeMjU.dll,rundll
        Imagebase:0x1060000
        File size:61952 bytes
        MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Yara matches:
        • Rule: EXT_MAL_SystemBC_Mar22_1, Description: Detects unpacked SystemBC module as used by Emotet in March 2022, Source: 00000003.00000002.764685317.0000000010005000.00000004.00000001.01000000.00000003.sdmp, Author: Thomas Barabosch, Deutsche Telekom Security
        Reputation:high

        Target ID:4
        Start time:10:52:02
        Start date:09/12/2022
        Path:C:\Windows\SysWOW64\rundll32.exe
        Wow64 process (32bit):true
        Commandline:rundll32.exe "C:\Users\user\Desktop\6k00SOeMjU.dll",#1
        Imagebase:0x1060000
        File size:61952 bytes
        MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Yara matches:
        • Rule: EXT_MAL_SystemBC_Mar22_1, Description: Detects unpacked SystemBC module as used by Emotet in March 2022, Source: 00000004.00000002.764666285.0000000010005000.00000004.00000001.01000000.00000003.sdmp, Author: Thomas Barabosch, Deutsche Telekom Security
        Reputation:high

        Target ID:5
        Start time:10:52:07
        Start date:09/12/2022
        Path:C:\Windows\SysWOW64\rundll32.exe
        Wow64 process (32bit):true
        Commandline:rundll32.exe "C:\Users\user\Desktop\6k00SOeMjU.dll",rundll
        Imagebase:0x1060000
        File size:61952 bytes
        MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Yara matches:
        • Rule: EXT_MAL_SystemBC_Mar22_1, Description: Detects unpacked SystemBC module as used by Emotet in March 2022, Source: 00000005.00000002.764703413.0000000010005000.00000004.00000001.01000000.00000003.sdmp, Author: Thomas Barabosch, Deutsche Telekom Security
        Reputation:high

        No disassembly