Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
6k00SOeMjU.dll

Overview

General Information

Sample Name:6k00SOeMjU.dll
Analysis ID:764036
MD5:0d079a931e42f554016db36476e55ba7
SHA1:d5f1ab52221019c746f1cc59a45ce18d0b817496
SHA256:ead2c5aaf92fe07db45b99587f586c7a45f92c67220cd8113a5d2e7bcb320798
Tags:32dllexe
Infos:

Detection

SystemBC
Score:96
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

System process connects to network (likely due to code injection or exploit)
Yara detected SystemBC
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Hides threads from debuggers
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Overwrites code with function prologues
Tries to evade analysis by execution special instruction (VM detection)
Tries to detect virtualization through RDTSC time measurements
PE file contains section with special chars
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Sample file is different than original file name gathered from version info
Checks for kernel debuggers (NtQuerySystemInformation(SystemKernelDebuggerInformation))
Detected TCP or UDP traffic on non-standard ports
Checks if the current process is being debugged
PE file contains sections with non-standard names
Internet Provider seen in connection with other malware
Sample execution stops while process was sleeping (likely an evasion)
PE / OLE file has an invalid certificate
Program does not show much activity (idle)
Creates a process in suspended mode (likely to inject code)
IP address seen in connection with other malware
Entry point lies outside standard sections

Classification

  • System is w10x64
  • loaddll32.exe (PID: 5308 cmdline: loaddll32.exe "C:\Users\user\Desktop\6k00SOeMjU.dll" MD5: 1F562FBF37040EC6C43C8D5EF619EA39)
    • conhost.exe (PID: 5264 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • cmd.exe (PID: 4080 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\6k00SOeMjU.dll",#1 MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • rundll32.exe (PID: 2064 cmdline: rundll32.exe "C:\Users\user\Desktop\6k00SOeMjU.dll",#1 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 5160 cmdline: rundll32.exe C:\Users\user\Desktop\6k00SOeMjU.dll,rundll MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 5336 cmdline: rundll32.exe "C:\Users\user\Desktop\6k00SOeMjU.dll",rundll MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000004.00000002.646021570.0000000010005000.00000004.00000001.01000000.00000003.sdmpEXT_MAL_SystemBC_Mar22_1Detects unpacked SystemBC module as used by Emotet in March 2022Thomas Barabosch, Deutsche Telekom Security
  • 0x173:$sx1: -WindowStyle Hidden -ep bypass -file
  • 0x0:$sx2: BEGINDATA
  • 0x1af:$sx3: GET %s HTTP/1.0
  • 0x1ca:$s5: User-Agent:
  • 0x11b:$s8: ALLUSERSPROFILE
00000003.00000002.645972498.0000000010005000.00000004.00000001.01000000.00000003.sdmpEXT_MAL_SystemBC_Mar22_1Detects unpacked SystemBC module as used by Emotet in March 2022Thomas Barabosch, Deutsche Telekom Security
  • 0x173:$sx1: -WindowStyle Hidden -ep bypass -file
  • 0x0:$sx2: BEGINDATA
  • 0x1af:$sx3: GET %s HTTP/1.0
  • 0x1ca:$s5: User-Agent:
  • 0x11b:$s8: ALLUSERSPROFILE
00000005.00000002.646001533.0000000010005000.00000004.00000001.01000000.00000003.sdmpEXT_MAL_SystemBC_Mar22_1Detects unpacked SystemBC module as used by Emotet in March 2022Thomas Barabosch, Deutsche Telekom Security
  • 0x173:$sx1: -WindowStyle Hidden -ep bypass -file
  • 0x0:$sx2: BEGINDATA
  • 0x1af:$sx3: GET %s HTTP/1.0
  • 0x1ca:$s5: User-Agent:
  • 0x11b:$s8: ALLUSERSPROFILE
Process Memory Space: rundll32.exe PID: 5160EXT_MAL_SystemBC_Mar22_1Detects unpacked SystemBC module as used by Emotet in March 2022Thomas Barabosch, Deutsche Telekom Security
  • 0x33c2:$sx1: -WindowStyle Hidden -ep bypass -file
  • 0x34dd:$sx1: -WindowStyle Hidden -ep bypass -file
  • 0x32e8:$sx2: BEGINDATA
  • 0x3325:$sx2: BEGINDATA
  • 0x33fe:$sx3: GET %s HTTP/1.0
  • 0x3516:$sx3: GET %s HTTP/1.0
  • 0x3419:$s5: User-Agent:
  • 0x2b21:$s8: ALLUSERSPROFILE
  • 0x336a:$s8: ALLUSERSPROFILE
  • 0x348c:$s8: ALLUSERSPROFILE
  • 0x62de:$s8: ALLUSERSPROFILE
  • 0x6300:$s8: ALLUSERSPROFILE
Process Memory Space: rundll32.exe PID: 5160JoeSecurity_SystemBCYara detected SystemBCJoe Security
    Click to see the 4 entries
    SourceRuleDescriptionAuthorStrings
    4.2.rundll32.exe.10000000.0.unpackEXT_MAL_SystemBC_Mar22_1Detects unpacked SystemBC module as used by Emotet in March 2022Thomas Barabosch, Deutsche Telekom Security
    • 0x2f54:$sx1: -WindowStyle Hidden -ep bypass -file
    • 0x2de1:$sx2: BEGINDATA
    • 0x2f90:$sx3: GET %s HTTP/1.0
    • 0x2fab:$s5: User-Agent:
    • 0x2efc:$s8: ALLUSERSPROFILE
    4.2.rundll32.exe.10000000.0.unpackJoeSecurity_SystemBCYara detected SystemBCJoe Security
      4.2.rundll32.exe.10000000.0.unpackMALWARE_Win_EXEPWSH_DLAgentDetects SystemBCditekSHen
      • 0x2f49:$pwsh: powershell
      • 0x2f90:$s1: GET %s HTTP/1
      • 0x2fab:$s2: User-Agent:
      • 0x2f54:$s3: -WindowStyle Hidden -ep bypass -file "
      • 0x2f85:$s4: LdrLoadDll
      • 0x2de1:$v1: BEGINDATA
      • 0x2deb:$v2: HOST1:
      • 0x2e1e:$v2: HOST2:
      • 0x2e51:$v3: PORT1:
      • 0x2e5d:$v4: TOR:
      • 0x2ef6:$v6: start
      3.2.rundll32.exe.10000000.0.unpackEXT_MAL_SystemBC_Mar22_1Detects unpacked SystemBC module as used by Emotet in March 2022Thomas Barabosch, Deutsche Telekom Security
      • 0x2f54:$sx1: -WindowStyle Hidden -ep bypass -file
      • 0x2de1:$sx2: BEGINDATA
      • 0x2f90:$sx3: GET %s HTTP/1.0
      • 0x2fab:$s5: User-Agent:
      • 0x2efc:$s8: ALLUSERSPROFILE
      3.2.rundll32.exe.10000000.0.unpackJoeSecurity_SystemBCYara detected SystemBCJoe Security
        Click to see the 4 entries
        No Sigma rule has matched
        No Snort rule has matched

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: 6k00SOeMjU.dllVirustotal: Detection: 17%Perma Link
        Source: 6k00SOeMjU.dllReversingLabs: Detection: 23%
        Source: 6k00SOeMjU.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL

        Networking

        barindex
        Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 89.22.236.225 4193Jump to behavior
        Source: global trafficTCP traffic: 192.168.2.3:49700 -> 89.22.236.225:4193
        Source: Joe Sandbox ViewASN Name: INETLTDTR INETLTDTR
        Source: Joe Sandbox ViewIP Address: 89.22.236.225 89.22.236.225
        Source: unknownTCP traffic detected without corresponding DNS query: 89.22.236.225
        Source: unknownTCP traffic detected without corresponding DNS query: 89.22.236.225
        Source: unknownTCP traffic detected without corresponding DNS query: 89.22.236.225
        Source: unknownTCP traffic detected without corresponding DNS query: 89.22.236.225
        Source: unknownTCP traffic detected without corresponding DNS query: 89.22.236.225
        Source: unknownTCP traffic detected without corresponding DNS query: 89.22.236.225
        Source: unknownTCP traffic detected without corresponding DNS query: 89.22.236.225
        Source: unknownTCP traffic detected without corresponding DNS query: 89.22.236.225
        Source: unknownTCP traffic detected without corresponding DNS query: 89.22.236.225
        Source: unknownTCP traffic detected without corresponding DNS query: 89.22.236.225
        Source: unknownTCP traffic detected without corresponding DNS query: 89.22.236.225
        Source: unknownTCP traffic detected without corresponding DNS query: 89.22.236.225
        Source: unknownTCP traffic detected without corresponding DNS query: 89.22.236.225
        Source: unknownTCP traffic detected without corresponding DNS query: 89.22.236.225
        Source: unknownTCP traffic detected without corresponding DNS query: 89.22.236.225
        Source: 6k00SOeMjU.dllString found in binary or memory: http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
        Source: 6k00SOeMjU.dllString found in binary or memory: http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
        Source: 6k00SOeMjU.dllString found in binary or memory: http://ocsp.sectigo.com0
        Source: rundll32.exe, 00000003.00000002.651819076.0000000010B69000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.651817589.0000000010B69000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000005.00000002.651818549.0000000010B69000.00000002.00000001.01000000.00000003.sdmp, 6k00SOeMjU.dllString found in binary or memory: http://www.innosetup.com
        Source: 6k00SOeMjU.dllString found in binary or memory: https://sectigo.com/CPS0

        System Summary

        barindex
        Source: 4.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: Detects SystemBC Author: ditekSHen
        Source: 3.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: Detects SystemBC Author: ditekSHen
        Source: 5.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: Detects SystemBC Author: ditekSHen
        Source: 6k00SOeMjU.dllStatic PE information: section name: *;>%1sXO
        Source: 6k00SOeMjU.dllStatic PE information: section name: 7rP!Ni:j
        Source: 6k00SOeMjU.dllStatic PE information: section name: bkE<E2?8
        Source: 6k00SOeMjU.dllStatic PE information: section name: 8*7`Joyq
        Source: 6k00SOeMjU.dllStatic PE information: section name: 0Ys'"rSd
        Source: 6k00SOeMjU.dllStatic PE information: section name: $u!6XeN&
        Source: 6k00SOeMjU.dllStatic PE information: section name: K)'tLNvc
        Source: 6k00SOeMjU.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
        Source: 4.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: EXT_MAL_SystemBC_Mar22_1 date = 2022-03-11, hash1 = c926338972be5bdfdd89574f3dc2fe4d4f70fd4e24c1c6ac5d2439c7fcc50db5, author = Thomas Barabosch, Deutsche Telekom Security, description = Detects unpacked SystemBC module as used by Emotet in March 2022, score = https://malpedia.caad.fkie.fraunhofer.de/details/win.systembc, reference2 = https://medium.com/walmartglobaltech/inside-the-systembc-malware-as-a-service-9aa03afd09c6, reference = https://twitter.com/Cryptolaemus1/status/1502069552246575105
        Source: 4.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_EXEPWSH_DLAgent author = ditekSHen, description = Detects SystemBC
        Source: 3.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: EXT_MAL_SystemBC_Mar22_1 date = 2022-03-11, hash1 = c926338972be5bdfdd89574f3dc2fe4d4f70fd4e24c1c6ac5d2439c7fcc50db5, author = Thomas Barabosch, Deutsche Telekom Security, description = Detects unpacked SystemBC module as used by Emotet in March 2022, score = https://malpedia.caad.fkie.fraunhofer.de/details/win.systembc, reference2 = https://medium.com/walmartglobaltech/inside-the-systembc-malware-as-a-service-9aa03afd09c6, reference = https://twitter.com/Cryptolaemus1/status/1502069552246575105
        Source: 3.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_EXEPWSH_DLAgent author = ditekSHen, description = Detects SystemBC
        Source: 5.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: EXT_MAL_SystemBC_Mar22_1 date = 2022-03-11, hash1 = c926338972be5bdfdd89574f3dc2fe4d4f70fd4e24c1c6ac5d2439c7fcc50db5, author = Thomas Barabosch, Deutsche Telekom Security, description = Detects unpacked SystemBC module as used by Emotet in March 2022, score = https://malpedia.caad.fkie.fraunhofer.de/details/win.systembc, reference2 = https://medium.com/walmartglobaltech/inside-the-systembc-malware-as-a-service-9aa03afd09c6, reference = https://twitter.com/Cryptolaemus1/status/1502069552246575105
        Source: 5.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_EXEPWSH_DLAgent author = ditekSHen, description = Detects SystemBC
        Source: 00000004.00000002.646021570.0000000010005000.00000004.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: EXT_MAL_SystemBC_Mar22_1 date = 2022-03-11, hash1 = c926338972be5bdfdd89574f3dc2fe4d4f70fd4e24c1c6ac5d2439c7fcc50db5, author = Thomas Barabosch, Deutsche Telekom Security, description = Detects unpacked SystemBC module as used by Emotet in March 2022, score = https://malpedia.caad.fkie.fraunhofer.de/details/win.systembc, reference2 = https://medium.com/walmartglobaltech/inside-the-systembc-malware-as-a-service-9aa03afd09c6, reference = https://twitter.com/Cryptolaemus1/status/1502069552246575105
        Source: 00000003.00000002.645972498.0000000010005000.00000004.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: EXT_MAL_SystemBC_Mar22_1 date = 2022-03-11, hash1 = c926338972be5bdfdd89574f3dc2fe4d4f70fd4e24c1c6ac5d2439c7fcc50db5, author = Thomas Barabosch, Deutsche Telekom Security, description = Detects unpacked SystemBC module as used by Emotet in March 2022, score = https://malpedia.caad.fkie.fraunhofer.de/details/win.systembc, reference2 = https://medium.com/walmartglobaltech/inside-the-systembc-malware-as-a-service-9aa03afd09c6, reference = https://twitter.com/Cryptolaemus1/status/1502069552246575105
        Source: 00000005.00000002.646001533.0000000010005000.00000004.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: EXT_MAL_SystemBC_Mar22_1 date = 2022-03-11, hash1 = c926338972be5bdfdd89574f3dc2fe4d4f70fd4e24c1c6ac5d2439c7fcc50db5, author = Thomas Barabosch, Deutsche Telekom Security, description = Detects unpacked SystemBC module as used by Emotet in March 2022, score = https://malpedia.caad.fkie.fraunhofer.de/details/win.systembc, reference2 = https://medium.com/walmartglobaltech/inside-the-systembc-malware-as-a-service-9aa03afd09c6, reference = https://twitter.com/Cryptolaemus1/status/1502069552246575105
        Source: Process Memory Space: rundll32.exe PID: 5160, type: MEMORYSTRMatched rule: EXT_MAL_SystemBC_Mar22_1 date = 2022-03-11, hash1 = c926338972be5bdfdd89574f3dc2fe4d4f70fd4e24c1c6ac5d2439c7fcc50db5, author = Thomas Barabosch, Deutsche Telekom Security, description = Detects unpacked SystemBC module as used by Emotet in March 2022, score = https://malpedia.caad.fkie.fraunhofer.de/details/win.systembc, reference2 = https://medium.com/walmartglobaltech/inside-the-systembc-malware-as-a-service-9aa03afd09c6, reference = https://twitter.com/Cryptolaemus1/status/1502069552246575105
        Source: Process Memory Space: rundll32.exe PID: 2064, type: MEMORYSTRMatched rule: EXT_MAL_SystemBC_Mar22_1 date = 2022-03-11, hash1 = c926338972be5bdfdd89574f3dc2fe4d4f70fd4e24c1c6ac5d2439c7fcc50db5, author = Thomas Barabosch, Deutsche Telekom Security, description = Detects unpacked SystemBC module as used by Emotet in March 2022, score = https://malpedia.caad.fkie.fraunhofer.de/details/win.systembc, reference2 = https://medium.com/walmartglobaltech/inside-the-systembc-malware-as-a-service-9aa03afd09c6, reference = https://twitter.com/Cryptolaemus1/status/1502069552246575105
        Source: Process Memory Space: rundll32.exe PID: 5336, type: MEMORYSTRMatched rule: EXT_MAL_SystemBC_Mar22_1 date = 2022-03-11, hash1 = c926338972be5bdfdd89574f3dc2fe4d4f70fd4e24c1c6ac5d2439c7fcc50db5, author = Thomas Barabosch, Deutsche Telekom Security, description = Detects unpacked SystemBC module as used by Emotet in March 2022, score = https://malpedia.caad.fkie.fraunhofer.de/details/win.systembc, reference2 = https://medium.com/walmartglobaltech/inside-the-systembc-malware-as-a-service-9aa03afd09c6, reference = https://twitter.com/Cryptolaemus1/status/1502069552246575105
        Source: 6k00SOeMjU.dllBinary or memory string: OriginalFilename6 vs 6k00SOeMjU.dll
        Source: 6k00SOeMjU.dllStatic PE information: invalid certificate
        Source: 6k00SOeMjU.dllVirustotal: Detection: 17%
        Source: 6k00SOeMjU.dllReversingLabs: Detection: 23%
        Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\6k00SOeMjU.dll,rundll
        Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\6k00SOeMjU.dll"
        Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\6k00SOeMjU.dll",#1
        Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\6k00SOeMjU.dll,rundll
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\6k00SOeMjU.dll",#1
        Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\6k00SOeMjU.dll",rundll
        Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\6k00SOeMjU.dll",#1Jump to behavior
        Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\6k00SOeMjU.dll,rundllJump to behavior
        Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\6k00SOeMjU.dll",rundllJump to behavior
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\6k00SOeMjU.dll",#1Jump to behavior
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5264:120:WilError_01
        Source: classification engineClassification label: mal96.troj.evad.winDLL@10/0@0/1
        Source: 6k00SOeMjU.dllStatic file information: File size 7566544 > 1048576
        Source: 6k00SOeMjU.dllStatic PE information: Raw size of nUPwRZiK is bigger than: 0x100000 < 0x734600
        Source: 6k00SOeMjU.dllStatic PE information: section name: *;>%1sXO
        Source: 6k00SOeMjU.dllStatic PE information: section name: 7rP!Ni:j
        Source: 6k00SOeMjU.dllStatic PE information: section name: bkE<E2?8
        Source: 6k00SOeMjU.dllStatic PE information: section name: 8*7`Joyq
        Source: 6k00SOeMjU.dllStatic PE information: section name: 0Ys'"rSd
        Source: 6k00SOeMjU.dllStatic PE information: section name: nUPwRZiK
        Source: 6k00SOeMjU.dllStatic PE information: section name: $u!6XeN&
        Source: 6k00SOeMjU.dllStatic PE information: section name: K)'tLNvc
        Source: initial sampleStatic PE information: section where entry point is pointing to: nUPwRZiK

        Hooking and other Techniques for Hiding and Protection

        barindex
        Source: C:\Windows\System32\loaddll32.exeMemory written: PID: 5308 base: DC0005 value: E9 FB 99 B2 76 Jump to behavior
        Source: C:\Windows\System32\loaddll32.exeMemory written: PID: 5308 base: 778E9A00 value: E9 0A 66 4D 89 Jump to behavior
        Source: C:\Windows\System32\loaddll32.exeMemory written: PID: 5308 base: DE0007 value: E9 7B 4C B4 76 Jump to behavior
        Source: C:\Windows\System32\loaddll32.exeMemory written: PID: 5308 base: 77924C80 value: E9 8E B3 4B 89 Jump to behavior
        Source: C:\Windows\System32\loaddll32.exeMemory written: PID: 5308 base: DF0005 value: E9 FB BF AC 76 Jump to behavior
        Source: C:\Windows\System32\loaddll32.exeMemory written: PID: 5308 base: 778BC000 value: E9 0A 40 53 89 Jump to behavior
        Source: C:\Windows\System32\loaddll32.exeMemory written: PID: 5308 base: E60008 value: E9 AB E0 A9 76 Jump to behavior
        Source: C:\Windows\System32\loaddll32.exeMemory written: PID: 5308 base: 778FE0B0 value: E9 60 1F 56 89 Jump to behavior
        Source: C:\Windows\System32\loaddll32.exeMemory written: PID: 5308 base: E70005 value: E9 CB 5A A9 73 Jump to behavior
        Source: C:\Windows\System32\loaddll32.exeMemory written: PID: 5308 base: 74905AD0 value: E9 3A A5 56 8C Jump to behavior
        Source: C:\Windows\System32\loaddll32.exeMemory written: PID: 5308 base: E80005 value: E9 5B B0 AA 73 Jump to behavior
        Source: C:\Windows\System32\loaddll32.exeMemory written: PID: 5308 base: 7492B060 value: E9 AA 4F 55 8C Jump to behavior
        Source: C:\Windows\System32\loaddll32.exeMemory written: PID: 5308 base: E90005 value: E9 DB F8 E1 75 Jump to behavior
        Source: C:\Windows\System32\loaddll32.exeMemory written: PID: 5308 base: 76CAF8E0 value: E9 2A 07 1E 8A Jump to behavior
        Source: C:\Windows\System32\loaddll32.exeMemory written: PID: 5308 base: EA0005 value: E9 FB 42 E3 75 Jump to behavior
        Source: C:\Windows\System32\loaddll32.exeMemory written: PID: 5308 base: 76CD4300 value: E9 0A BD 1C 8A Jump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 5160 base: 2F60005 value: E9 FB 99 98 74 Jump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 5160 base: 778E9A00 value: E9 0A 66 67 8B Jump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 5160 base: 3000007 value: E9 7B 4C 92 74 Jump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 5160 base: 77924C80 value: E9 8E B3 6D 8B Jump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 5160 base: 3010005 value: E9 FB BF 8A 74 Jump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 5160 base: 778BC000 value: E9 0A 40 75 8B Jump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 5160 base: 3080008 value: E9 AB E0 87 74 Jump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 5160 base: 778FE0B0 value: E9 60 1F 78 8B Jump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 5160 base: 3090005 value: E9 CB 5A 87 71 Jump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 5160 base: 74905AD0 value: E9 3A A5 78 8E Jump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 5160 base: 30A0005 value: E9 5B B0 88 71 Jump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 5160 base: 7492B060 value: E9 AA 4F 77 8E Jump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 5160 base: 30B0005 value: E9 DB F8 BF 73 Jump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 5160 base: 76CAF8E0 value: E9 2A 07 40 8C Jump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 5160 base: 30C0005 value: E9 FB 42 C1 73 Jump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 5160 base: 76CD4300 value: E9 0A BD 3E 8C Jump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 2064 base: 810005 value: E9 FB 99 0D 77 Jump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 2064 base: 778E9A00 value: E9 0A 66 F2 88 Jump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 2064 base: 820007 value: E9 7B 4C 10 77 Jump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 2064 base: 77924C80 value: E9 8E B3 EF 88 Jump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 2064 base: 830005 value: E9 FB BF 08 77 Jump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 2064 base: 778BC000 value: E9 0A 40 F7 88 Jump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 2064 base: 850008 value: E9 AB E0 0A 77 Jump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 2064 base: 778FE0B0 value: E9 60 1F F5 88 Jump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 2064 base: 860005 value: E9 CB 5A 0A 74 Jump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 2064 base: 74905AD0 value: E9 3A A5 F5 8B Jump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 2064 base: 870005 value: E9 5B B0 0B 74 Jump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 2064 base: 7492B060 value: E9 AA 4F F4 8B Jump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 2064 base: 880005 value: E9 DB F8 42 76 Jump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 2064 base: 76CAF8E0 value: E9 2A 07 BD 89 Jump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 2064 base: 8A0005 value: E9 FB 42 43 76 Jump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 2064 base: 76CD4300 value: E9 0A BD BC 89 Jump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 5336 base: 3F0005 value: E9 FB 99 4F 77 Jump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 5336 base: 778E9A00 value: E9 0A 66 B0 88 Jump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 5336 base: 790007 value: E9 7B 4C 19 77 Jump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 5336 base: 77924C80 value: E9 8E B3 E6 88 Jump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 5336 base: 7A0005 value: E9 FB BF 11 77 Jump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 5336 base: 778BC000 value: E9 0A 40 EE 88 Jump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 5336 base: 810008 value: E9 AB E0 0E 77 Jump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 5336 base: 778FE0B0 value: E9 60 1F F1 88 Jump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 5336 base: 820005 value: E9 CB 5A 0E 74 Jump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 5336 base: 74905AD0 value: E9 3A A5 F1 8B Jump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 5336 base: 830005 value: E9 5B B0 0F 74 Jump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 5336 base: 7492B060 value: E9 AA 4F F0 8B Jump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 5336 base: 840005 value: E9 DB F8 46 76 Jump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 5336 base: 76CAF8E0 value: E9 2A 07 B9 89 Jump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 5336 base: 850005 value: E9 FB 42 48 76 Jump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 5336 base: 76CD4300 value: E9 0A BD B7 89 Jump to behavior
        Source: C:\Windows\System32\loaddll32.exeMemory written: PID: 5308 base: 778BC000 value: 8B FF 55 8B EC Jump to behavior
        Source: C:\Windows\System32\loaddll32.exeMemory written: PID: 5308 base: 74905AD0 value: 8B FF 55 8B EC Jump to behavior
        Source: C:\Windows\System32\loaddll32.exeMemory written: PID: 5308 base: 7492B060 value: 8B FF 55 8B EC Jump to behavior
        Source: C:\Windows\System32\loaddll32.exeMemory written: PID: 5308 base: 76CAF8E0 value: 8B FF 55 8B EC Jump to behavior
        Source: C:\Windows\System32\loaddll32.exeMemory written: PID: 5308 base: 76CD4300 value: 8B FF 55 8B EC Jump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

        Malware Analysis System Evasion

        barindex
        Source: C:\Windows\System32\loaddll32.exeSpecial instruction interceptor: First address: 0000000010B09AA6 instructions rdtsc caused by: RDTSC with Trap Flag (TF)
        Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 00000000106587EA second address: 0000000010658809 instructions: 0x00000000 rdtsc 0x00000002 ror cl, 1 0x00000004 ror edx, FFFFFF86h 0x00000007 xor ax, si 0x0000000a not cl 0x0000000c clc 0x0000000d xor bl, cl 0x0000000f push esi 0x00000010 push edi 0x00000011 rol dh, FFFFFF9Dh 0x00000014 rcl eax, cl 0x00000016 test bx, bx 0x00000019 push ebx 0x0000001a mov ebx, ecx 0x0000001c movsx eax, di 0x0000001f rdtsc
        Source: C:\Windows\System32\loaddll32.exeRDTSC instruction interceptor: First address: 00000000106587EA second address: 0000000010658809 instructions: 0x00000000 rdtsc 0x00000002 ror cl, 1 0x00000004 ror edx, FFFFFF86h 0x00000007 xor ax, si 0x0000000a not cl 0x0000000c clc 0x0000000d xor bl, cl 0x0000000f push esi 0x00000010 push edi 0x00000011 rol dh, FFFFFF9Dh 0x00000014 rcl eax, cl 0x00000016 test bx, bx 0x00000019 push ebx 0x0000001a mov ebx, ecx 0x0000001c movsx eax, di 0x0000001f rdtsc
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
        Source: C:\Windows\System32\loaddll32.exeProcess information queried: ProcessInformationJump to behavior
        Source: C:\Windows\System32\loaddll32.exeSystem information queried: ModuleInformationJump to behavior
        Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 120000Jump to behavior
        Source: rundll32.exe, 00000004.00000002.645741458.00000000008EA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.645707605.000000000090A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll

        Anti Debugging

        barindex
        Source: C:\Windows\System32\loaddll32.exeThread information set: HideFromDebuggerJump to behavior
        Source: C:\Windows\System32\loaddll32.exeThread information set: HideFromDebuggerJump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeThread information set: HideFromDebuggerJump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeThread information set: HideFromDebuggerJump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeThread information set: HideFromDebuggerJump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeThread information set: HideFromDebuggerJump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeThread information set: HideFromDebuggerJump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeThread information set: HideFromDebuggerJump to behavior
        Source: C:\Windows\System32\loaddll32.exeSystem information queried: KernelDebuggerInformationJump to behavior
        Source: C:\Windows\System32\loaddll32.exeProcess queried: DebugPortJump to behavior
        Source: C:\Windows\System32\loaddll32.exeProcess queried: DebugObjectHandleJump to behavior
        Source: C:\Windows\System32\loaddll32.exeProcess queried: DebugObjectHandleJump to behavior
        Source: C:\Windows\System32\loaddll32.exeProcess queried: DebugObjectHandleJump to behavior
        Source: C:\Windows\System32\loaddll32.exeProcess queried: DebugPortJump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugObjectHandleJump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugObjectHandleJump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugObjectHandleJump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugObjectHandleJump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugObjectHandleJump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugObjectHandleJump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugObjectHandleJump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugObjectHandleJump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugObjectHandleJump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
        Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected

        HIPS / PFW / Operating System Protection Evasion

        barindex
        Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 89.22.236.225 4193Jump to behavior
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\6k00SOeMjU.dll",#1Jump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\ VolumeInformationJump to behavior

        Stealing of Sensitive Information

        barindex
        Source: Yara matchFile source: 4.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 5160, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 2064, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 5336, type: MEMORYSTR

        Remote Access Functionality

        barindex
        Source: Yara matchFile source: 4.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 5160, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 2064, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 5336, type: MEMORYSTR
        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
        Valid AccountsWindows Management InstrumentationPath Interception111
        Process Injection
        1
        Rundll32
        1
        Credential API Hooking
        321
        Security Software Discovery
        Remote Services1
        Credential API Hooking
        Exfiltration Over Other Network Medium1
        Non-Standard Port
        Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
        Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts121
        Virtualization/Sandbox Evasion
        LSASS Memory1
        Process Discovery
        Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
        Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)111
        Process Injection
        Security Account Manager121
        Virtualization/Sandbox Evasion
        SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
        Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Binary PaddingNTDS212
        System Information Discovery
        Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet
        behaviorgraph top1 signatures2 2 Behavior Graph ID: 764036 Sample: 6k00SOeMjU.dll Startdate: 09/12/2022 Architecture: WINDOWS Score: 96 25 Malicious sample detected (through community Yara rule) 2->25 27 Multi AV Scanner detection for submitted file 2->27 29 Yara detected SystemBC 2->29 31 PE file contains section with special chars 2->31 7 loaddll32.exe 1 2->7         started        process3 signatures4 37 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 7->37 39 Overwrites code with function prologues 7->39 41 Tries to evade analysis by execution special instruction (VM detection) 7->41 43 2 other signatures 7->43 10 rundll32.exe 7->10         started        14 rundll32.exe 7->14         started        16 cmd.exe 1 7->16         started        18 conhost.exe 7->18         started        process5 dnsIp6 23 89.22.236.225, 4193, 49700, 49701 INETLTDTR Russian Federation 10->23 45 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 10->45 47 Tries to detect virtualization through RDTSC time measurements 10->47 49 Hides threads from debuggers 10->49 51 System process connects to network (likely due to code injection or exploit) 14->51 20 rundll32.exe 16->20         started        signatures7 process8 signatures9 33 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 20->33 35 Hides threads from debuggers 20->35

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        6k00SOeMjU.dll17%VirustotalBrowse
        6k00SOeMjU.dll23%ReversingLabsWin32.Trojan.Generic
        No Antivirus matches
        No Antivirus matches
        No Antivirus matches
        SourceDetectionScannerLabelLink
        http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t0%URL Reputationsafe
        http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t0%URL Reputationsafe
        https://sectigo.com/CPS00%URL Reputationsafe
        http://ocsp.sectigo.com00%URL Reputationsafe
        http://www.innosetup.com0%URL Reputationsafe
        http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#0%URL Reputationsafe
        No contacted domains info
        NameSourceMaliciousAntivirus DetectionReputation
        http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t6k00SOeMjU.dllfalse
        • URL Reputation: safe
        • URL Reputation: safe
        unknown
        https://sectigo.com/CPS06k00SOeMjU.dllfalse
        • URL Reputation: safe
        unknown
        http://ocsp.sectigo.com06k00SOeMjU.dllfalse
        • URL Reputation: safe
        unknown
        http://www.innosetup.comrundll32.exe, 00000003.00000002.651819076.0000000010B69000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.651817589.0000000010B69000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000005.00000002.651818549.0000000010B69000.00000002.00000001.01000000.00000003.sdmp, 6k00SOeMjU.dllfalse
        • URL Reputation: safe
        unknown
        http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#6k00SOeMjU.dllfalse
        • URL Reputation: safe
        unknown
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        89.22.236.225
        unknownRussian Federation
        197328INETLTDTRtrue
        Joe Sandbox Version:36.0.0 Rainbow Opal
        Analysis ID:764036
        Start date and time:2022-12-09 10:59:19 +01:00
        Joe Sandbox Product:CloudBasic
        Overall analysis duration:0h 6m 5s
        Hypervisor based Inspection enabled:false
        Report type:full
        Sample file name:6k00SOeMjU.dll
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
        Run name:Run with higher sleep bypass
        Number of analysed new started processes analysed:20
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • HDC enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Detection:MAL
        Classification:mal96.troj.evad.winDLL@10/0@0/1
        EGA Information:Failed
        HDC Information:Failed
        HCA Information:
        • Successful, ratio: 100%
        • Number of executed functions: 0
        • Number of non-executed functions: 0
        Cookbook Comments:
        • Found application associated with file extension: .dll
        • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
        • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, WMIADAP.exe, SgrmBroker.exe, conhost.exe, backgroundTaskHost.exe, svchost.exe
        • Excluded domains from analysis (whitelisted): fs.microsoft.com
        • Not all processes where analyzed, report is missing behavior information
        No simulations
        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
        89.22.236.225DQxttu2Qrr.exeGet hashmaliciousBrowse
          file.exeGet hashmaliciousBrowse
            NhqwPW3V4T.exeGet hashmaliciousBrowse
              file.exeGet hashmaliciousBrowse
                vmU23zVMv6.exeGet hashmaliciousBrowse
                  SecuriteInfo.com.Win32.CrypterX-gen.556.4787.exeGet hashmaliciousBrowse
                    No context
                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                    INETLTDTRDQxttu2Qrr.exeGet hashmaliciousBrowse
                    • 89.22.236.225
                    file.exeGet hashmaliciousBrowse
                    • 89.22.236.225
                    NhqwPW3V4T.exeGet hashmaliciousBrowse
                    • 89.22.236.225
                    file.exeGet hashmaliciousBrowse
                    • 89.22.236.225
                    vmU23zVMv6.exeGet hashmaliciousBrowse
                    • 89.22.236.225
                    SecuriteInfo.com.Win32.CrypterX-gen.556.4787.exeGet hashmaliciousBrowse
                    • 89.22.236.225
                    uIVuK5dl4B.elfGet hashmaliciousBrowse
                    • 176.53.21.237
                    6zU82RR4Tl.exeGet hashmaliciousBrowse
                    • 91.92.120.179
                    gzEQevBvkb.exeGet hashmaliciousBrowse
                    • 89.22.225.242
                    m8XHlumLdZ.exeGet hashmaliciousBrowse
                    • 89.22.225.242
                    lVMxof38tX.exeGet hashmaliciousBrowse
                    • 89.22.225.242
                    lickA3zqBP.exeGet hashmaliciousBrowse
                    • 89.22.228.150
                    https://ch.booking.com/c?st=Q0FS%3c=VklFV19BTEw%3D&rid=2d0863d0-d3a2-11ec-b1f3-0bef02a63294&si=ChZiLXBhbmRhLXRvcC1rLXNlbGVjdG9yEAEaQEnfeaMLgOJ7q1bGNiKGh6frtIQeqovVfhnGtISu2VUG%20WKqMO%2FCxtqVmQ29R%2FbvPaSLNe9nMcqrYwE06nm0%2FAo%3D&target=aHR0cHM6Ly90cmFuZG8ub25lLz9lPVluSnZaMlZ5YzBCdmRYUnNiMjlyTG1OdmJRPT0=&d=1&mmconf=cars&linklabel=ebo-banner-ctaGet hashmaliciousBrowse
                    • 84.252.95.22
                    33GgkQ3QsG.exeGet hashmaliciousBrowse
                    • 89.22.239.151
                    44SlugKnOG.exeGet hashmaliciousBrowse
                    • 89.22.230.175
                    ZtkzgCQYWC.exeGet hashmaliciousBrowse
                    • 89.22.225.242
                    ZtkzgCQYWC.exeGet hashmaliciousBrowse
                    • 89.22.225.242
                    4B5C98o17Z.exeGet hashmaliciousBrowse
                    • 89.22.225.242
                    4B5C98o17Z.exeGet hashmaliciousBrowse
                    • 89.22.225.242
                    No context
                    No context
                    No created / dropped files found
                    File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                    Entropy (8bit):7.976819466268135
                    TrID:
                    • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
                    • Generic Win/DOS Executable (2004/3) 0.20%
                    • DOS Executable Generic (2002/1) 0.20%
                    • VXD Driver (31/22) 0.00%
                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                    File name:6k00SOeMjU.dll
                    File size:7566544
                    MD5:0d079a931e42f554016db36476e55ba7
                    SHA1:d5f1ab52221019c746f1cc59a45ce18d0b817496
                    SHA256:ead2c5aaf92fe07db45b99587f586c7a45f92c67220cd8113a5d2e7bcb320798
                    SHA512:1496f1296df89e1da8780f175631e2551300a99e6c7ea43d2750653fdf6e7ed096fdedd9f0d23b94190ecf418da09cf9c9b6caee5821ba1c457f0294063bbc9e
                    SSDEEP:196608:l3ksPqmzcl+LG314Hujb7KgkYCbGNBmHTER:lUON+2HBb8
                    TLSH:5776332F16980415E4EECC3A85EBBE9132F5073A9E8278BCA5DA5DC13A354F5B702163
                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...8.ob...........!....."...@......=XT......@.......................................Ft............................../..E..
                    Icon Hash:b99988fcd4f66e0f
                    Entrypoint:0x1054583d
                    Entrypoint Section:nUPwRZiK
                    Digitally signed:true
                    Imagebase:0x10000000
                    Subsystem:windows gui
                    Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
                    DLL Characteristics:
                    Time Stamp:0x626FE238 [Mon May 2 13:52:56 2022 UTC]
                    TLS Callbacks:
                    CLR (.Net) Version:
                    OS Version Major:5
                    OS Version Minor:0
                    File Version Major:5
                    File Version Minor:0
                    Subsystem Version Major:5
                    Subsystem Version Minor:0
                    Import Hash:d3a98daa37dbe78969711cc1194ce51b
                    Signature Valid:false
                    Signature Issuer:CN=fumbling corp.
                    Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
                    Error Number:-2146762487
                    Not Before, Not After
                    • 12/8/2022 9:12:34 AM 12/8/2023 9:32:34 AM
                    Subject Chain
                    • CN=fumbling corp.
                    Version:3
                    Thumbprint MD5:BFCF38BCEDDC6D492EE1D807C07B0E02
                    Thumbprint SHA-1:92A18235585F157E75D33B92CC8E394210AEAD16
                    Thumbprint SHA-256:E3FCBA8CB056D8C4B5F3C974DD82C3CD9C96AF2621722C26119E478F35637E99
                    Serial:78919934276F458544703D1C7FC21303
                    Instruction
                    push edx
                    mov edx, 3F442022h
                    pushfd
                    xor edx, 7B9D646Dh
                    xor dl, dl
                    mov edx, dword ptr [esp+edx-44D943FCh]
                    mov dword ptr [esp+04h], 8EECC51Ah
                    push dword ptr [esp+00h]
                    popfd
                    lea esp, dword ptr [esp+04h]
                    call 00007F741533A873h
                    xchg al, al
                    pushfd
                    lahf
                    shr al, FFFFFF8Fh
                    shl ah, FFFFFF86h
                    pop dword ptr [edi]
                    bt eax, ecx
                    and ax, 00007B5Bh
                    xchg al, ah
                    mov eax, dword ptr [esi]
                    cmp si, bp
                    lea esi, dword ptr [esi+00000004h]
                    xor eax, ebx
                    jmp 00007F74153F1EF7h
                    stosb
                    retf A814h
                    jmp far 0F97h : 3CD32403h
                    stosd
                    enter B68Dh, 01h
                    add byte ptr [eax], al
                    add cl, al
                    loopne 00007F741535E373h
                    xor cl, bl
                    btr ax, dx
                    or ax, bp
                    not cl
                    add al, ah
                    bts eax, ebp
                    sar al, cl
                    add cl, 0000007Eh
                    shld ax, si, 00000065h
                    bts ax, sp
                    not ah
                    xor cl, 0000006Bh
                    cmovno ax, dx
                    movsx eax, si
                    rol ax, 0000h
                    rol cl, 1
                    cmovno ax, bx
                    xor bl, cl
                    movzx eax, dx
                    lahf
                    lea edi, dword ptr [edi-00000002h]
                    btr ax, 0046h
                    sal al, FFFFFF9Dh
                    mov word ptr [edi], cx
                    mov eax, dword ptr [esi]
                    add esi, 00000004h
                    jmp 00007F7415286521h
                    push ebp
                    ret
                    rol eax, 1
                    sub eax, 000066B4h
                    NameVirtual AddressVirtual Size Is in Section
                    IMAGE_DIRECTORY_ENTRY_EXPORT0xaf2fa40x45nUPwRZiK
                    IMAGE_DIRECTORY_ENTRY_IMPORT0x660b3c0x104nUPwRZiK
                    IMAGE_DIRECTORY_ENTRY_RESOURCE0xb6a0000x800K)'tLNvc
                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                    IMAGE_DIRECTORY_ENTRY_SECURITY0x735e000x16d0nUPwRZiK
                    IMAGE_DIRECTORY_ENTRY_BASERELOC0xb690000x5d4$u!6XeN&
                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IAT0x4330000x780Ys'"rSd
                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                    *;>%1sXO0x10000x219c0x0False0empty0.0IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    7rP!Ni:j0x40000x8450x0False0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    bkE<E2?80x50000x2500x0False0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    8*7`Joyq0x60000x42c2640x0unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    0Ys'"rSd0x4330000x4a40x600False0.06575520833333333OpenPGP Public Key0.4141326418166997IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    nUPwRZiK0x4340000x7345900x734600unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    $u!6XeN&0xb690000x5d40x600False0.53515625data4.2912698570834IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    K)'tLNvc0xb6a0000x8000x800False0.44287109375data3.8514204088109953IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    NameRVASizeTypeLanguageCountry
                    RT_ICON0xb6a0fc0x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512DutchNetherlands
                    RT_GROUP_ICON0xb6a3e40x14dataDutchNetherlands
                    RT_VERSION0xb6a3f80x408dataEnglishUnited States
                    DLLImport
                    user32.dllSendMessageA
                    kernel32.dllLocalFree
                    advapi32.dllGetSidSubAuthority
                    wsock32.dllWSAStartup
                    shell32.dllCommandLineToArgvW
                    ws2_32.dllfreeaddrinfo
                    ole32.dllCoUninitialize
                    secur32.dllGetUserNameExA
                    psapi.dllGetModuleFileNameExA
                    kernel32.dllGetSystemTimeAsFileTime
                    user32.dllCharUpperBuffW
                    kernel32.dllLocalAlloc, LocalFree, GetModuleFileNameW, ExitProcess, LoadLibraryA, GetModuleHandleA, GetProcAddress
                    NameOrdinalAddress
                    rundll10x1000100c
                    Language of compilation systemCountry where language is spokenMap
                    DutchNetherlands
                    EnglishUnited States
                    TimestampSource PortDest PortSource IPDest IP
                    Dec 9, 2022 11:00:32.281683922 CET497004193192.168.2.389.22.236.225
                    Dec 9, 2022 11:00:32.307775021 CET41934970089.22.236.225192.168.2.3
                    Dec 9, 2022 11:00:32.307951927 CET497004193192.168.2.389.22.236.225
                    Dec 9, 2022 11:00:32.396655083 CET497004193192.168.2.389.22.236.225
                    Dec 9, 2022 11:00:32.437968969 CET41934970089.22.236.225192.168.2.3
                    Dec 9, 2022 11:00:33.257164001 CET497014193192.168.2.389.22.236.225
                    Dec 9, 2022 11:00:33.283178091 CET41934970189.22.236.225192.168.2.3
                    Dec 9, 2022 11:00:33.283364058 CET497014193192.168.2.389.22.236.225
                    Dec 9, 2022 11:00:33.337862015 CET497014193192.168.2.389.22.236.225
                    Dec 9, 2022 11:00:33.364196062 CET41934970189.22.236.225192.168.2.3
                    Dec 9, 2022 11:00:33.970604897 CET497024193192.168.2.389.22.236.225
                    Dec 9, 2022 11:00:33.996262074 CET41934970289.22.236.225192.168.2.3
                    Dec 9, 2022 11:00:33.996412992 CET497024193192.168.2.389.22.236.225
                    Dec 9, 2022 11:00:34.061677933 CET497024193192.168.2.389.22.236.225
                    Dec 9, 2022 11:00:34.087173939 CET41934970289.22.236.225192.168.2.3
                    Dec 9, 2022 11:01:32.937953949 CET41934970089.22.236.225192.168.2.3
                    Dec 9, 2022 11:01:32.938110113 CET497004193192.168.2.389.22.236.225
                    Dec 9, 2022 11:01:34.985507011 CET41934970289.22.236.225192.168.2.3
                    Dec 9, 2022 11:01:34.985593081 CET497024193192.168.2.389.22.236.225
                    Dec 9, 2022 11:01:34.985784054 CET41934970189.22.236.225192.168.2.3
                    Dec 9, 2022 11:01:34.985846043 CET497014193192.168.2.389.22.236.225
                    Dec 9, 2022 11:02:34.379544020 CET41934970089.22.236.225192.168.2.3
                    Dec 9, 2022 11:02:34.379733086 CET497004193192.168.2.389.22.236.225
                    Dec 9, 2022 11:02:36.426181078 CET41934970189.22.236.225192.168.2.3
                    Dec 9, 2022 11:02:36.426312923 CET497014193192.168.2.389.22.236.225
                    Dec 9, 2022 11:02:36.427087069 CET41934970289.22.236.225192.168.2.3
                    Dec 9, 2022 11:02:36.427201033 CET497024193192.168.2.389.22.236.225

                    Click to jump to process

                    Click to jump to process

                    Click to dive into process behavior distribution

                    Click to jump to process

                    Target ID:0
                    Start time:11:00:15
                    Start date:09/12/2022
                    Path:C:\Windows\System32\loaddll32.exe
                    Wow64 process (32bit):true
                    Commandline:loaddll32.exe "C:\Users\user\Desktop\6k00SOeMjU.dll"
                    Imagebase:0xa0000
                    File size:116736 bytes
                    MD5 hash:1F562FBF37040EC6C43C8D5EF619EA39
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:moderate

                    Target ID:1
                    Start time:11:00:16
                    Start date:09/12/2022
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff745070000
                    File size:625664 bytes
                    MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high

                    Target ID:2
                    Start time:11:00:16
                    Start date:09/12/2022
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\6k00SOeMjU.dll",#1
                    Imagebase:0xb0000
                    File size:232960 bytes
                    MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high

                    Target ID:3
                    Start time:11:00:16
                    Start date:09/12/2022
                    Path:C:\Windows\SysWOW64\rundll32.exe
                    Wow64 process (32bit):true
                    Commandline:rundll32.exe C:\Users\user\Desktop\6k00SOeMjU.dll,rundll
                    Imagebase:0xad0000
                    File size:61952 bytes
                    MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: EXT_MAL_SystemBC_Mar22_1, Description: Detects unpacked SystemBC module as used by Emotet in March 2022, Source: 00000003.00000002.645972498.0000000010005000.00000004.00000001.01000000.00000003.sdmp, Author: Thomas Barabosch, Deutsche Telekom Security
                    Reputation:high

                    Target ID:4
                    Start time:11:00:16
                    Start date:09/12/2022
                    Path:C:\Windows\SysWOW64\rundll32.exe
                    Wow64 process (32bit):true
                    Commandline:rundll32.exe "C:\Users\user\Desktop\6k00SOeMjU.dll",#1
                    Imagebase:0xad0000
                    File size:61952 bytes
                    MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: EXT_MAL_SystemBC_Mar22_1, Description: Detects unpacked SystemBC module as used by Emotet in March 2022, Source: 00000004.00000002.646021570.0000000010005000.00000004.00000001.01000000.00000003.sdmp, Author: Thomas Barabosch, Deutsche Telekom Security
                    Reputation:high

                    Target ID:5
                    Start time:11:00:21
                    Start date:09/12/2022
                    Path:C:\Windows\SysWOW64\rundll32.exe
                    Wow64 process (32bit):true
                    Commandline:rundll32.exe "C:\Users\user\Desktop\6k00SOeMjU.dll",rundll
                    Imagebase:0xad0000
                    File size:61952 bytes
                    MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: EXT_MAL_SystemBC_Mar22_1, Description: Detects unpacked SystemBC module as used by Emotet in March 2022, Source: 00000005.00000002.646001533.0000000010005000.00000004.00000001.01000000.00000003.sdmp, Author: Thomas Barabosch, Deutsche Telekom Security
                    Reputation:high

                    No disassembly