Edit tour

Windows Analysis Report
3498_ED6E000.dll

Overview

General Information

Sample Name:3498_ED6E000.dll
(renamed file extension from exe to dll, renamed because original name is a hash value)
Original Sample Name:3498_ED6E000.exe
Analysis ID:1311214
MD5:7ad3c652b3d9c376438348ca19a3b1bc
SHA1:3854e9f15364345236d48d5337d98a965147cda7
SHA256:9afba1d0820dfeb450239652b8c88f8ae88887b81e0209a996b7af0cc520fbad
Infos:

Detection

Mimikatz
Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected Hacktool Mimikatz
May use bcdedit to modify the Windows boot settings
PE file does not import any functions
Sample file is different than original file name gathered from version info
PE file contains an invalid checksum
Tries to load missing DLLs
PE file contains sections with non-standard names
Binary contains a suspicious time stamp
Sample execution stops while process was sleeping (likely an evasion)
Program does not show much activity (idle)
Creates a process in suspended mode (likely to inject code)

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • loaddll64.exe (PID: 6240 cmdline: loaddll64.exe "C:\Users\user\Desktop\3498_ED6E000.dll" MD5: 763455F9DCB24DFEECC2B9D9F8D46D52)
    • conhost.exe (PID: 6248 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • cmd.exe (PID: 6276 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\3498_ED6E000.dll",#1 MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
      • rundll32.exe (PID: 6288 cmdline: rundll32.exe "C:\Users\user\Desktop\3498_ED6E000.dll",#1 MD5: 73C519F050C20580F8A62C849D49215A)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
MimiKatzVaronis summarizes Mimikatz as an open-source application that allows users to view and save authentication credentials like Kerberos tickets. Benjamin Delpy continues to lead Mimikatz developments, so the toolset works with the current release of Windows and includes the most up-to-date attacks.Attackers commonly use Mimikatz to steal credentials and escalate privileges: in most cases, endpoint protection software and anti-virus systems will detect and delete it. Conversely, pentesters use Mimikatz to detect and exploit vulnerabilities in your networks so you can fix them.
  • APT32
  • Anunak
  • GALLIUM
https://malpedia.caad.fkie.fraunhofer.de/details/win.mimikatz
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

Privilege Escalation

barindex
Source: 3498_ED6E000.dllString found in binary or memory: mimikatzpowershell_reflective_mimikatzpowerkatz.dllblog.gentilkiwi.com/mimikatzm
Source: 3498_ED6E000.dllString found in binary or memory: qlog mimikatz input/output to filelog mimikatz input/output to file/mimikatz/mimikatzgentilkiwigentilkiwikiwi_msv1_0_credentialsmimikatzpowershell_reflective_mimikatzpowerkatz.dllblog.gentilkiwi.com/mimikatzmimikatz(commandline) # %smimikatz #mimikatz
Source: 3498_ED6E000.dllStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF
Source: Binary string: pd.pdb source: 3498_ED6E000.dll
Source: Binary string: mddo.pdb source: 3498_ED6E000.dll
Source: Binary string: WindowsPerformanceRecorderControl.pdbGCTL source: 3498_ED6E000.dll
Source: Binary string: night41 pd.pdbuner-th-hoodod.pdbodd.pdbmddo.pdb nidaght Nacht Bruder Schwester big-o-biddib-0-gibbid+8+dibver^x^revper#v#rep arbei arbeimacht freiHimmel fallennicht langespielen Spiegelund Haarenden Hundder Weltden Kriegder Feuerwehrmann mitw source: 3498_ED6E000.dll
Source: Binary string: od.pdb source: 3498_ED6E000.dll
Source: Binary string: \kevlar-api\kevlarsigs64\x64\release\hiphandlers64.pdbDetector.UnitTests.DetectionBenchmarkUtilities.CaseDetectorObservationsnslocollectorservice.pdb\microsoft.cyber.observationdetectors.pdb!#HSTR:Crossrider_AppName source: 3498_ED6E000.dll
Source: Binary string: WindowsPerformanceRecorderControl.pdb source: 3498_ED6E000.dll
Source: Binary string: chter Noch deutlicherBlockade derdie Regierungnicht mehrDer Wehretatzwischen NeueTage langBanken undnicht genugamerikanischer Traumrbindungen Nun setzenReise mitund derIm DezemberSonntag habenschon heutewar derund weiterewerden fastsorgt ohnehinscheint beendetund solltesollen dienennt dieStummfilm untereinen Kurswechseldann nur,italienische Stadtdbg0sym3.p2d3b4d8b6g1sym.b0d3p1wnnhgvzr.6rey9v52d2.ozegz4lnb1.rlvdsuchte AusfluchtTsunamis EisbergedecraapifierAof overaillhu9krtt7ntu.trku2y57j70zycvp5b.4grencuva.pdbqsylemyg.hips5660yrvq.4xizvrwvuglt.ppj19CwfSrCcEU.npfmasnter.pdb source: 3498_ED6E000.dll
Source: Binary string: d:\svn\cheat engine\bin\dbk64.pdbh source: 3498_ED6E000.dll
Source: Binary string: \device\asrdrv\dosdevices\asrdrv\device\asusgio\dosdevices\asusgio\device\asupdateio\dosdevices\asupdateio\device\glckio\dosdevices\glckio\device\gio\dosdevices\gio\device\gvcidrv\dosdevices\gvcidrv\device\msio\dosdevices\msio\device\ntiolib\dosdevices\ntiolib\device\semav6msr\dosdevices\semav6msr\device\{f0e8ccf6-5232-4b6f-a159-3b612b77a43f}\dosdevices\{f0e8ccf6-5232-4b6f-a159-3b612b77a43f}\device\atikia\dosdevices\atikia\device\atillk\dosdevices\atillk\device\bs_hwmio\dosdevices\bs_hwmio\device\bs_i2cio\dosdevices\bs_i2cio\device\bsmem\dosdevices\bsmem\device\bsmi\??\bsmi\device\wnbios\dosdevices\wnbios\device\hwos2ecdev\dosdevices\hwos2ec\device\mtc0303\dosdevices\mtc0303\device\nchgbios\dosdevices\nchgbios\device\genericdrv\??\genericdrv\device\bs_flash\dosdevices\bs_flash\device\nvflash\dosdevices\nvflash\device\winphlash\dosdevices\winphlash\device\phymem\dosdevices\phymem\device\piddrv\dosdevices\piddrv\device\pmxdrv\dosdevices\pmxdrv\device\ucorew\??\ucorew\device\winflash\dosdevices\winflash\device\rtkio\dosdevices\rtkio\device\superbmc0\dosdevices\superbmc\device\winring0\dosdevices\winring0d:\svn\cheat engine\bin\dbk64.pdbh source: 3498_ED6E000.dll
Source: Binary string: odd.pdb source: 3498_ED6E000.dll
Source: 3498_ED6E000.dllString found in binary or memory: http://www.slg.cl/upload043.zip{ENTER}Blheam.A Brasil by mlkart .. VX BrasilAutomessage : download the new MSN update here!c:\windows\system32\winktsisx.exeI just got back from holiday - http://www.projectpony.net/girls.scr~{ESC}Get 300 buddy icons compatible with AIM, Yahoo IM and MSN IM!http://www.ffasite.com/x.exe!#HSTR:CrumCrypterHstrlogic equals www.yahoo.com (Yahoo)
Source: 3498_ED6E000.dllString found in binary or memory: http://auth.alipay.com/http://auth.alipay.com/login/index.htm/http://buyer.trade.taobao.com/trade/pa
Source: 3498_ED6E000.dllString found in binary or memory: http://www.ffasite.com/x.exe
Source: 3498_ED6E000.dllString found in binary or memory: http://www.projectpony.net/girls.scr~
Source: 3498_ED6E000.dllString found in binary or memory: http://www.slg.cl/upload043.zip
Source: 3498_ED6E000.dllString found in binary or memory: https://usea1-areteadvisors.sentinelone.net
Source: 3498_ED6E000.dllStatic PE information: No import functions for PE file found
Source: 3498_ED6E000.dllBinary or memory string: OriginalFilenamePCPKsp.dllj% vs 3498_ED6E000.dll
Source: C:\Windows\System32\loaddll64.exeSection loaded: 3498_ed6e000.dllJump to behavior
Source: 3498_ED6E000.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Windows\System32\loaddll64.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\3498_ED6E000.dll",#1
Source: unknownProcess created: C:\Windows\System32\loaddll64.exe loaddll64.exe "C:\Users\user\Desktop\3498_ED6E000.dll"
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\3498_ED6E000.dll",#1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\3498_ED6E000.dll",#1
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\3498_ED6E000.dll",#1Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\3498_ED6E000.dll",#1Jump to behavior
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6248:120:WilError_01
Source: 3498_ED6E000.dllBinary string: \Device\HarddiskVolume3\Windows\SysWOW64\ws2_32.dlll
Source: 3498_ED6E000.dllBinary string: \Device\HarddiskVolume3\Program Files\WindowsApps\Microsoft.VCLibs.140.00.UWPDesktop_14.0.30704.0_x64__8wekyb3d8bbwe\MSVCP140_1.dll
Source: 3498_ED6E000.dllBinary string: \Device\HarddiskVolume3\Windows\WinSxS\x86_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.9635_none_508ff82ebcbafee0\msvcp90.dll
Source: 3498_ED6E000.dllBinary string: \Device\HarddiskVolume3\Windows\System32\UXInit.dlldllp
Source: 3498_ED6E000.dllBinary string: 4\Device\HarddiskVolume3\Windows\System32\perfTMP.dat
Source: 3498_ED6E000.dllBinary string: +3\Device\HarddiskVolume3\Windows\SysWOW64\oledlg.dll
Source: 3498_ED6E000.dllBinary string: \Device\HarddiskVolume3\Windows\WinSxS\x86_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.9635_none_508ff82ebcbafee0\msvcm90.dll
Source: 3498_ED6E000.dllBinary string: \Device\HarddiskVolume3\Empower\Oracle\Oracle18c\apex\images\libraries\oraclejet\4.2.0\js\libs\oj\v4.2.0\resources\internal-deps\dvt\thematicMap\basemaps\resourceBundles\UsaCountiesBundle_pl.js
Source: 3498_ED6E000.dllBinary string: :\Device\HarddiskVolume3\Empower\Instr$
Source: 3498_ED6E000.dllBinary string: \Device\HarddiskVolume3\Program Files\WindowsApps\Microsoft.WindowsTerminal_1.12.10983.0_x64__8wekyb3d8bbwe\Microsoft.Terminal.Control.dll
Source: 3498_ED6E000.dllBinary string: 7\Device\HarddiskVolume3\Windows\System32\TaskSchdPS.dll
Source: 3498_ED6E000.dllBinary string: \Device\HarddiskVolume3\Empower\Instr$
Source: 3498_ED6E000.dllBinary string: D\Device\HarddiskVolume3\Windows\System32\CapabilityAccessManager.dll
Source: 3498_ED6E000.dllBinary string: \Device\HarddiskVolume3\Empower\Oracle\Oracle18c\apex\images\flashchart\anychart_6\swf\maps\usa\regions\states\northeast.amap
Source: 3498_ED6E000.dllBinary string: \Device\HarddiskVolume3\Empower\Oracle\Oracle18c\apex\images\libraries\oraclejet\4.2.0\js\libs\oj\v4.2.0\resources\internal-deps\dvt\thematicMap\basemaps\resourceBundles\UsaCountiesBundle_pt.js
Source: 3498_ED6E000.dllBinary string: \Device\HarddiskVolume3\Empower\Oracle\Oracle18c\apex\images\libraries\oraclejet\4.2.0\js\libs\oj\v4.2.0\resources\internal-deps\dvt\thematicMap\basemaps\resourceBundles\UsaCountiesBundle_ro.js
Source: 3498_ED6E000.dllBinary string: J\Device\HarddiskVolume3\Windows\System32\Windows.StateRepositoryClient.dll
Source: 3498_ED6E000.dllBinary string: +R\Device\HarddiskVolume3\Windows\assembly\GAC_MSIL\Waters.WFMA.ConsoleFMA.resources
Source: 3498_ED6E000.dllBinary string: \Device\HarddiskVolume3\Empower\Oracle\Oracle18c\apex\images\libraries\oraclejet\4.2.0\js\libs\oj\v4.2.0\resources\internal-deps\dvt\thematicMap\basemaps\resourceBundles\UsaCountiesBundle_sk.js
Source: 3498_ED6E000.dllBinary string: +R\Device\HarddiskVolume3\Windows\assembly\GAC_MSIL\Waters.WFMA.EmpowerFMA.resources
Source: 3498_ED6E000.dllBinary string: \Device\HarddiskVolume3\Program Files\WindowsApps\Microsoft.WindowsTerminal_1.12.10983.0_x64__8wekyb3d8bbwe\Microsoft.Terminal.Settings.Editor.dll
Source: 3498_ED6E000.dllBinary string: p\Device\HarddiskVolume3\Windows\System32\tasks\Microsoft\Windows\Work Folders\Work Folders Logon Synchronization
Source: 3498_ED6E000.dllBinary string: \Device\HarddiskVolume3\ProgramData\Microsoft\Diagnosis\DownloadedSettings\utc.app.json
Source: 3498_ED6E000.dllBinary string: \Device\HarddiskVolume3\Windows\System32\UXInit.dll
Source: 3498_ED6E000.dllBinary string: 5\Device\HarddiskVolume3\Windows\System32\rundll32.exe
Source: 3498_ED6E000.dllBinary string: .:\Device\Ha8
Source: 3498_ED6E000.dllBinary string: \Device\HarddiskVolume3\Empower\Oracle\Oracle18c\apex\images\libraries\oraclejet\4.2.0\js\libs\oj\v4.2.0\resources\internal-deps\dvt\thematicMap\basemaps\resourceBundles\UsaCountiesBundle_nl.js
Source: 3498_ED6E000.dllBinary string: \Device\HarddiskVolume3\Program Files (x86)\Waters\ICSp
Source: 3498_ED6E000.dllBinary string: +D\Device\HarddiskVolume3\Empower\Instruments\Bin\AcquityISMCommon.dll
Source: 3498_ED6E000.dllBinary string: \device\asrdrv\dosdevices\asrdrv\device\asusgio\dosdevices\asusgio\device\asupdateio\dosdevices\asupdateio\device\glckio\dosdevices\glckio\device\gio\dosdevices\gio\device\gvcidrv\dosdevices\gvcidrv\device\msio\dosdevices\msio\device\ntiolib\dosdevices\ntiolib\device\semav6msr\dosdevices\semav6msr\device\{f0e8ccf6-5232-4b6f-a159-3b612b77a43f}\dosdevices\{f0e8ccf6-5232-4b6f-a159-3b612b77a43f}\device\atikia\dosdevices\atikia\device\atillk\dosdevices\atillk\device\bs_hwmio\dosdevices\bs_hwmio\device\bs_i2cio\dosdevices\bs_i2cio\device\bsmem\dosdevices\bsmem\device\bsmi\??\bsmi\device\wnbios\dosdevices\wnbios\device\hwos2ecdev\dosdevices\hwos2ec\device\mtc0303\dosdevices\mtc0303\device\nchgbios\dosdevices\nchgbios\device\genericdrv\??\genericdrv\device\bs_flash\dosdevices\bs_flash\device\nvflash\dosdevices\nvflash\device\winphlash\dosdevices\winphlash\device\phymem\dosdevices\phymem\device\piddrv\dosdevices\piddrv\device\pmxdrv\dosdevices\pmxdrv\device\ucorew\??\ucorew\device\winflash\dosdevices\winflash\device\rtkio\dosdevices\rtkio\device\superbmc0\dosdevices\superbmc\device\winring0\dosdevices\winring0d:\svn\cheat engine\bin\dbk64.pdbh
Source: 3498_ED6E000.dllBinary string: \Device\HarddiskVolume3\Program Files (xomtmall.comlist.tmall.comtmall.comneiyi.tmall.comtmall.comshouji.tmall.comtmall.comwww.tmall.com!#EsrpVulDrv
Source: 3498_ED6E000.dllBinary string: \Device\HarddiskVolume3\Windows\System32\dusmsvc.dll
Source: 3498_ED6E000.dllBinary string: +s\Device\HarddiskVolume3\Windows\WinSxS\x86_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.9635_none_508ff82ebcbafee0
Source: 3498_ED6E000.dllBinary string: \Device\HarddiskVolume3\Empower\Oracle\Oracle18c\apex\
Source: 3498_ED6E000.dllBinary string: \Device\HarddiskVolume3\Program Files\WindowsApps\Microsoft.UI.Xaml.2.7_7.2203.17001.0_x64__8wekyb3d8bbwe\Microsoft.UI.Xaml.dll
Source: 3498_ED6E000.dllBinary string: \Device\HarddiskVolume3\Empower\Oracle\Oracle18c\oracore\zoneinfo\timezone_16.dat
Source: 3498_ED6E000.dllBinary string: \Device\HarddiskVolume3\ProgramData\Microsoft\Diagnosis\TenantStorage\P-ARIA\EventStore.db-shm
Source: 3498_ED6E000.dllBinary string: \Device\HarddiskVolume3\Empower\Oracle\Oracle18c\apex\images\librarRCRD(
Source: 3498_ED6E000.dllBinary string: \Device\HarddiskVolume3\ProgramData\Microsoft\Diagnosis\DownloadedSettings\telemetry.P-ARIA-5476d0c4a7a347909c4b8a13078d4390-f8bdcecf-243f-40f8-b7c3-b9c44a57dead-7230.json
Source: 3498_ED6E000.dllBinary string: 4\Device\HarddiskVolume3\Windows\System32\svchost.exe
Source: 3498_ED6E000.dllBinary string: \device\tmcomm\dosdevices\tmcomm!#HSTR:DelfCPLException
Source: 3498_ED6E000.dllBinary string: \Device\HarddiskVolume3\Windows\WinSxS\amd64_microsoft-windows-a..ence-mitigations-c8_31bf3856ad36
Source: 3498_ED6E000.dllBinary string: ;\Device\HarddiskVolume3\Empower\Instr$
Source: 3498_ED6E000.dllBinary string: \Device\HarddiskVolume3\Empower\Oracle\Oracle18c\apex\images\libraries\oraclejet\4.2.0\js\libs\oj\v4.2.0\resources\nls\kok\localeElements.js
Source: 3498_ED6E000.dllBinary string: \Device\HarddiskVolume3\Windows\WinSxS\x86_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.9635_none_508ff82ebcbafee0\msvcr90.dll
Source: 3498_ED6E000.dllBinary string: +E\Device\HarddiskVolume3\Empower\Instruments\Bin\AcquityISMEditMgr.ocx
Source: 3498_ED6E000.dllBinary string: \Device\HarddiskVolume3\Windows\security\EDP\Logsdll
Source: 3498_ED6E000.dllBinary string: \Device\HarddiskVolume3\Windows\WinSxS\amd64_microsoft-windows-a..ence-mitigations-c8_31bf3856ad364e35_10.0.22621.457_none_6e3a8cbbbb69623c
Source: 3498_ED6E000.dllBinary string: \Device\HarddiskVolume3\Empower\Oracle\Oracle18c\apex\images\libraries\oraclejet\4.2.0\js\libs\oj\v4.2.0\resources\internal-deps\dvt\thematicMap\basemaps\resourceBundles\UsaCountiesBundle_ru.js
Source: 3498_ED6E000.dllBinary string: \Device\HarddiskVolume3\Program FilFILE0
Source: 3498_ED6E000.dllBinary string: M\Device\HarddiskVolume3\Windows\System32\tasks\Microsoft\Windows\Work Folders
Source: 3498_ED6E000.dllBinary string: \Device\HarddiskVolume3\Empower\Oracle\Oracle18c\apex\images\libraries\oraclejet\4.2.0\js\libs\oj\v4.2.0\resources\nls\kok\timezoneData.js
Source: 3498_ED6E000.dllBinary string: \Device\HarddiskVolume3\Program Files\WindowsApps\Microsoft.VCLibs.140.00.UWPDesktop_14.0.30704.0_x64__8wekyb3d8bbwe\msvcp140_1.dll
Source: 3498_ED6E000.dllBinary string: \Device\HarddiskVolume3\ProgramData\Microsoft\Diagnosis\TenantStorage\P-ARIA\EventStore.db-wal
Source: 3498_ED6E000.dllBinary string: \Device\HarddiskVolume3\Empower\Oracle\Oracle18c\apex\images\libraries\oraclejet\4.2.0\js\libs\oj\v4.2.0\resources\nls\ks\localeElements.js
Source: 3498_ED6E000.dllBinary string: \Device\HarddiskVolume3\Empower\Oracle\Oracle18c\apex\images\flashchart\anychart_6\swf\maps\south_america\french_guiana.amap
Source: 3498_ED6E000.dllBinary string: \Device\HarddiskVolume3\Empower\Oracle\Oracle18c\apex\images\libraries\oraclejet\4.2.0\js\libs\oj\v4.2.0\resources\nls\ko-KR\timezoneData.js
Source: 3498_ED6E000.dllBinary string: \Device\HarddiskVolume3\ProgramData\Microsoft\Diagnosis\TenantStorage\P-ARIA\EventStore.db
Source: 3498_ED6E000.dllBinary string: \Device\HarddiskVolume3\Windows\SysWOW64\twinapi.appcore.dlldll4te
Source: 3498_ED6E000.dllBinary string: \Device\HarddiskVolume3\Empower\Oracle\Oracle18c\apex\images\libraries\oraclejet\4.2.0\js\libs\oj\v4.2.0\resources\internal-deps\dvt\thematicMap\basemaps\resourceBundles\UsaCountiesBundle_pt_BR.js
Source: 3498_ED6E000.dllBinary string: =\Device\HarddiskVolume3\Windows\System32\WorkFoldersShell.dll
Source: 3498_ED6E000.dllBinary string: /\Device\HarddiskVolume3\Windows\System32\sc.exe
Source: 3498_ED6E000.dllBinary string: \Device\HarddiskVolume3\Empower\Oracle\Oracle18c\apex\images\librarRCRD(
Source: 3498_ED6E000.dllBinary string: \Device\HarddiskVolume3\Program Files\WindowsApps\Microsoft.WindowsTerminal_1.12.10983.0_x64__8wekyb3d8bbwe\Microsoft.Terminal.Control.dll$
Source: classification engineClassification label: mal48.expl.winDLL@6/0@0/0
Source: C:\Windows\System32\rundll32.exeAutomated click: OK
Source: C:\Windows\System32\rundll32.exeAutomated click: OK
Source: C:\Windows\System32\rundll32.exeAutomated click: OK
Source: C:\Windows\System32\rundll32.exeAutomated click: OK
Source: C:\Windows\System32\rundll32.exeAutomated click: OK
Source: C:\Windows\System32\rundll32.exeAutomated click: OK
Source: C:\Windows\System32\rundll32.exeAutomated click: OK
Source: C:\Windows\System32\rundll32.exeAutomated click: OK
Source: C:\Windows\System32\rundll32.exeAutomated click: OK
Source: C:\Windows\System32\rundll32.exeAutomated click: OK
Source: C:\Windows\System32\rundll32.exeAutomated click: OK
Source: C:\Windows\System32\rundll32.exeAutomated click: OK
Source: C:\Windows\System32\rundll32.exeAutomated click: OK
Source: C:\Windows\System32\rundll32.exeAutomated click: OK
Source: C:\Windows\System32\rundll32.exeAutomated click: OK
Source: C:\Windows\System32\rundll32.exeAutomated click: OK
Source: C:\Windows\System32\rundll32.exeAutomated click: OK
Source: C:\Windows\System32\rundll32.exeAutomated click: OK
Source: C:\Windows\System32\rundll32.exeAutomated click: OK
Source: C:\Windows\System32\rundll32.exeAutomated click: OK
Source: C:\Windows\System32\rundll32.exeAutomated click: OK
Source: C:\Windows\System32\rundll32.exeAutomated click: OK
Source: C:\Windows\System32\rundll32.exeAutomated click: OK
Source: C:\Windows\System32\rundll32.exeAutomated click: OK
Source: C:\Windows\System32\rundll32.exeAutomated click: OK
Source: C:\Windows\System32\rundll32.exeAutomated click: OK
Source: C:\Windows\System32\rundll32.exeAutomated click: OK
Source: C:\Windows\System32\rundll32.exeAutomated click: OK
Source: C:\Windows\System32\rundll32.exeAutomated click: OK
Source: C:\Windows\System32\rundll32.exeAutomated click: OK
Source: C:\Windows\System32\rundll32.exeAutomated click: OK
Source: C:\Windows\System32\rundll32.exeAutomated click: OK
Source: C:\Windows\System32\rundll32.exeAutomated click: OK
Source: C:\Windows\System32\rundll32.exeAutomated click: OK
Source: C:\Windows\System32\rundll32.exeAutomated click: OK
Source: C:\Windows\System32\rundll32.exeAutomated click: OK
Source: C:\Windows\System32\rundll32.exeAutomated click: OK
Source: C:\Windows\System32\rundll32.exeAutomated click: OK
Source: C:\Windows\System32\rundll32.exeAutomated click: OK
Source: C:\Windows\System32\rundll32.exeAutomated click: OK
Source: C:\Windows\System32\rundll32.exeAutomated click: OK
Source: C:\Windows\System32\rundll32.exeAutomated click: OK
Source: C:\Windows\System32\rundll32.exeAutomated click: OK
Source: C:\Windows\System32\rundll32.exeAutomated click: OK
Source: C:\Windows\System32\rundll32.exeAutomated click: OK
Source: C:\Windows\System32\rundll32.exeAutomated click: OK
Source: C:\Windows\System32\rundll32.exeAutomated click: OK
Source: C:\Windows\System32\rundll32.exeAutomated click: OK
Source: C:\Windows\System32\rundll32.exeAutomated click: OK
Source: C:\Windows\System32\rundll32.exeAutomated click: OK
Source: C:\Windows\System32\rundll32.exeAutomated click: OK
Source: 3498_ED6E000.dllStatic file information: File size 1241088 > 1048576
Source: 3498_ED6E000.dllStatic PE information: Image base 0x7ffd34410000 > 0x60000000
Source: 3498_ED6E000.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: 3498_ED6E000.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: 3498_ED6E000.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: 3498_ED6E000.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: 3498_ED6E000.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: 3498_ED6E000.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: 3498_ED6E000.dllStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF
Source: 3498_ED6E000.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: pd.pdb source: 3498_ED6E000.dll
Source: Binary string: mddo.pdb source: 3498_ED6E000.dll
Source: Binary string: WindowsPerformanceRecorderControl.pdbGCTL source: 3498_ED6E000.dll
Source: Binary string: night41 pd.pdbuner-th-hoodod.pdbodd.pdbmddo.pdb nidaght Nacht Bruder Schwester big-o-biddib-0-gibbid+8+dibver^x^revper#v#rep arbei arbeimacht freiHimmel fallennicht langespielen Spiegelund Haarenden Hundder Weltden Kriegder Feuerwehrmann mitw source: 3498_ED6E000.dll
Source: Binary string: od.pdb source: 3498_ED6E000.dll
Source: Binary string: \kevlar-api\kevlarsigs64\x64\release\hiphandlers64.pdbDetector.UnitTests.DetectionBenchmarkUtilities.CaseDetectorObservationsnslocollectorservice.pdb\microsoft.cyber.observationdetectors.pdb!#HSTR:Crossrider_AppName source: 3498_ED6E000.dll
Source: Binary string: WindowsPerformanceRecorderControl.pdb source: 3498_ED6E000.dll
Source: Binary string: chter Noch deutlicherBlockade derdie Regierungnicht mehrDer Wehretatzwischen NeueTage langBanken undnicht genugamerikanischer Traumrbindungen Nun setzenReise mitund derIm DezemberSonntag habenschon heutewar derund weiterewerden fastsorgt ohnehinscheint beendetund solltesollen dienennt dieStummfilm untereinen Kurswechseldann nur,italienische Stadtdbg0sym3.p2d3b4d8b6g1sym.b0d3p1wnnhgvzr.6rey9v52d2.ozegz4lnb1.rlvdsuchte AusfluchtTsunamis EisbergedecraapifierAof overaillhu9krtt7ntu.trku2y57j70zycvp5b.4grencuva.pdbqsylemyg.hips5660yrvq.4xizvrwvuglt.ppj19CwfSrCcEU.npfmasnter.pdb source: 3498_ED6E000.dll
Source: Binary string: d:\svn\cheat engine\bin\dbk64.pdbh source: 3498_ED6E000.dll
Source: Binary string: \device\asrdrv\dosdevices\asrdrv\device\asusgio\dosdevices\asusgio\device\asupdateio\dosdevices\asupdateio\device\glckio\dosdevices\glckio\device\gio\dosdevices\gio\device\gvcidrv\dosdevices\gvcidrv\device\msio\dosdevices\msio\device\ntiolib\dosdevices\ntiolib\device\semav6msr\dosdevices\semav6msr\device\{f0e8ccf6-5232-4b6f-a159-3b612b77a43f}\dosdevices\{f0e8ccf6-5232-4b6f-a159-3b612b77a43f}\device\atikia\dosdevices\atikia\device\atillk\dosdevices\atillk\device\bs_hwmio\dosdevices\bs_hwmio\device\bs_i2cio\dosdevices\bs_i2cio\device\bsmem\dosdevices\bsmem\device\bsmi\??\bsmi\device\wnbios\dosdevices\wnbios\device\hwos2ecdev\dosdevices\hwos2ec\device\mtc0303\dosdevices\mtc0303\device\nchgbios\dosdevices\nchgbios\device\genericdrv\??\genericdrv\device\bs_flash\dosdevices\bs_flash\device\nvflash\dosdevices\nvflash\device\winphlash\dosdevices\winphlash\device\phymem\dosdevices\phymem\device\piddrv\dosdevices\piddrv\device\pmxdrv\dosdevices\pmxdrv\device\ucorew\??\ucorew\device\winflash\dosdevices\winflash\device\rtkio\dosdevices\rtkio\device\superbmc0\dosdevices\superbmc\device\winring0\dosdevices\winring0d:\svn\cheat engine\bin\dbk64.pdbh source: 3498_ED6E000.dll
Source: Binary string: odd.pdb source: 3498_ED6E000.dll
Source: 3498_ED6E000.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: 3498_ED6E000.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: 3498_ED6E000.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: 3498_ED6E000.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: 3498_ED6E000.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: 3498_ED6E000.dllStatic PE information: real checksum: 0x141d4e should be: 0x1384fe
Source: 3498_ED6E000.dllStatic PE information: section name: .didat
Source: 3498_ED6E000.dllStatic PE information: 0x6F85A196 [Mon Apr 16 10:10:30 2029 UTC]
Source: 3498_ED6E000.dllBinary or memory string: c:\windows\system32\bcdedit.exe
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\3498_ED6E000.dll",#1Jump to behavior
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management Instrumentation1
Bootkit
11
Process Injection
1
Bootkit
1
OS Credential Dumping
1
System Information Discovery
Remote ServicesData from Local SystemExfiltration Over Other Network MediumData ObfuscationEavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/Job1
DLL Side-Loading
1
DLL Side-Loading
1
Rundll32
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)11
Process Injection
Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
Timestomp
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
DLL Side-Loading
LSA SecretsRemote System DiscoverySSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1311214 Sample: 3498_ED6E000.exe Startdate: 20/09/2023 Architecture: WINDOWS Score: 48 15 Detected Hacktool Mimikatz 2->15 7 loaddll64.exe 1 2->7         started        process3 process4 9 cmd.exe 1 7->9         started        11 conhost.exe 7->11         started        process5 13 rundll32.exe 9->13         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version

windows-stand
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://www.slg.cl/upload043.zip0%Avira URL Cloudsafe
http://www.ffasite.com/x.exe0%Avira URL Cloudsafe
http://www.projectpony.net/girls.scr~0%Avira URL Cloudsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://www.projectpony.net/girls.scr~3498_ED6E000.dllfalse
  • Avira URL Cloud: safe
unknown
http://auth.alipay.com/http://auth.alipay.com/login/index.htm/http://buyer.trade.taobao.com/trade/pa3498_ED6E000.dllfalse
    high
    http://www.slg.cl/upload043.zip3498_ED6E000.dllfalse
    • Avira URL Cloud: safe
    unknown
    http://www.ffasite.com/x.exe3498_ED6E000.dllfalse
    • Avira URL Cloud: safe
    unknown
    https://usea1-areteadvisors.sentinelone.net3498_ED6E000.dllfalse
      high
      No contacted IP infos
      Joe Sandbox Version:38.0.0 Beryl
      Analysis ID:1311214
      Start date and time:2023-09-20 01:32:31 +02:00
      Joe Sandbox Product:CloudBasic
      Overall analysis duration:0h 5m 52s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
      Number of analysed new started processes analysed:29
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample file name:3498_ED6E000.dll
      (renamed file extension from exe to dll, renamed because original name is a hash value)
      Original Sample Name:3498_ED6E000.exe
      Detection:MAL
      Classification:mal48.expl.winDLL@6/0@0/0
      EGA Information:Failed
      HCA Information:
      • Successful, ratio: 100%
      • Number of executed functions: 0
      • Number of non-executed functions: 0
      Cookbook Comments:
      • Override analysis time to 240s for rundll32
      • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe
      • Excluded IPs from analysis (whitelisted): 8.252.70.126, 8.253.132.121, 8.252.64.126, 8.253.131.121, 8.253.45.248, 8.252.81.126, 8.248.153.254, 67.26.243.254, 8.253.139.120
      • Excluded domains from analysis (whitelisted): kv601.prod.do.dsp.mp.microsoft.com, www.bing.com, geover.prod.do.dsp.mp.microsoft.com, client.wns.windows.com, fg.download.windowsupdate.com.c.footprint.net, fs.microsoft.com, geo.prod.do.dsp.mp.microsoft.com, tse1.mm.bing.net, ctldl.windowsupdate.com, arc.msn.com, wu-bg-shim.trafficmanager.net
      • Not all processes where analyzed, report is missing behavior information
      • VT rate limit hit for: 3498_ED6E000.dll
      No simulations
      No context
      No context
      No context
      No context
      No context
      No created / dropped files found
      File type:PE32+ executable (DLL) (console) x86-64, for MS Windows
      Entropy (8bit):5.215171386188204
      TrID:
      • Win64 Dynamic Link Library (generic) (102004/3) 86.43%
      • Win64 Executable (generic) (12005/4) 10.17%
      • Generic Win/DOS Executable (2004/3) 1.70%
      • DOS Executable Generic (2002/1) 1.70%
      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.01%
      File name:3498_ED6E000.dll
      File size:1'241'088 bytes
      MD5:7ad3c652b3d9c376438348ca19a3b1bc
      SHA1:3854e9f15364345236d48d5337d98a965147cda7
      SHA256:9afba1d0820dfeb450239652b8c88f8ae88887b81e0209a996b7af0cc520fbad
      SHA512:9bfb6602a50813dffb8f4e82d7fafeff1a44150a8ef6270e0de21cda86b666ce42a02e55c698b7ded2591a47018040b643c1bc45d217206ad68221ef22d1f2b5
      SSDEEP:12288:7coxlTHS3FPRikbxJSFfLeRZSDkcVw5YUhNNfYqUIjMQBwABU9Ub+MAa:ooxFS3FP8krIeRwzVYNfrUIoQVaC3
      TLSH:F145070667E45378D175897084F60772ABB2F8984B788BDB0255F2381D33BD85EF2B29
      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......g.".#.LH#.LH#.LH..OI .LH*..H..LHh.HI*.LHh.OI'.LHh.II:.LH#.MH..LHh.MI&.LHh.LI".LHh.AI..LHh..H".LHh..H".LHh.NI".LHRich#.LH.......
      Icon Hash:7ae282899bbab082
      Entrypoint:0x7ffd3444c7e0
      Entrypoint Section:.text
      Digitally signed:true
      Imagebase:0x7ffd34410000
      Subsystem:windows cui
      Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, DLL
      DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF
      Time Stamp:0x6F85A196 [Mon Apr 16 10:10:30 2029 UTC]
      TLS Callbacks:
      CLR (.Net) Version:
      OS Version Major:10
      OS Version Minor:0
      File Version Major:10
      File Version Minor:0
      Subsystem Version Major:10
      Subsystem Version Minor:0
      Import Hash:
      Signature Valid:
      Signature Issuer:
      Signature Validation Error:
      Error Number:
      Not Before, Not After
        Subject Chain
          Version:
          Thumbprint MD5:
          Thumbprint SHA-1:
          Thumbprint SHA-256:
          Serial:
          Instruction
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          adc byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          mov eax, dword ptr [FD451CB1h]
          jnle 00007F823CED1202h
          add byte ptr [eax-0D418371h], dl
          add dword ptr [eax], eax
          add byte ptr [eax-47h], bl
          iretd
          ret
          mov word ptr [eax], es
          add byte ptr [eax], al
          rcr byte ptr [ecx+008CC3CEh], 00000000h
          add byte ptr [eax-733C3105h], bh
          add byte ptr [eax], al
          add byte ptr [eax-733C3166h], ch
          add byte ptr [eax], al
          add byte ptr [edx+00h], ah
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          xor byte ptr [edx+008CC3CEh], bl
          add byte ptr [eax], al
          pushad
          add dword ptr [ecx+007FFD1Dh], ebx
          add byte ptr [eax], al
          add byte ptr [edi+0001F2C2h], bl
          add bh, bh
          Programming Language:
          • [IMP] VS2008 SP1 build 30729
          NameVirtual AddressVirtual Size Is in Section
          IMAGE_DIRECTORY_ENTRY_EXPORT0x11d8f00x9c.rdata
          IMAGE_DIRECTORY_ENTRY_IMPORT0x11d98c0x26c.rdata
          IMAGE_DIRECTORY_ENTRY_RESOURCE0x12b0000x570.rsrc
          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x1220000x7074.pdata
          IMAGE_DIRECTORY_ENTRY_SECURITY0x12e0000x5048
          IMAGE_DIRECTORY_ENTRY_BASERELOC0x12c0000x22a0.reloc
          IMAGE_DIRECTORY_ENTRY_DEBUG0xfae780x70.rdata
          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xeb9800x140.rdata
          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IAT0xf02200x598.rdata
          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x11cd5c0x1a0.rdata
          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
          NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
          .text0x10000xe4c490xe5000False0.33191077886189957data5.327071453663947IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          .rdata0xe60000x391c00x3a000False0.33744864628232757data4.947042803685217IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          .data0x1200000x10140x1000False0.054443359375data0.5874520761962675IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
          .pdata0x1220000x70740x8000False0.293304443359375data3.9520595629415687IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          .didat0x12a0000x2480x1000False0.250732421875data2.8018893257938258IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
          .rsrc0x12b0000x5700x1000False0.18359375data4.822421311835653IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          .reloc0x12c0000x22a00x3000False0.3423665364583333data5.258717794502767IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
          No network behavior found
          050100150200s020406080100

          Click to jump to process

          050100150200s0.00510MB

          Click to jump to process

          Target ID:0
          Start time:01:33:20
          Start date:20/09/2023
          Path:C:\Windows\System32\loaddll64.exe
          Wow64 process (32bit):false
          Commandline:loaddll64.exe "C:\Users\user\Desktop\3498_ED6E000.dll"
          Imagebase:0x7ff63fa50000
          File size:165'888 bytes
          MD5 hash:763455F9DCB24DFEECC2B9D9F8D46D52
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:false

          Target ID:1
          Start time:01:33:20
          Start date:20/09/2023
          Path:C:\Windows\System32\conhost.exe
          Wow64 process (32bit):false
          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Imagebase:0x7ff6bab10000
          File size:625'664 bytes
          MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high
          Has exited:false

          Target ID:2
          Start time:01:33:20
          Start date:20/09/2023
          Path:C:\Windows\System32\cmd.exe
          Wow64 process (32bit):false
          Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\3498_ED6E000.dll",#1
          Imagebase:0x7ff7a8120000
          File size:273'920 bytes
          MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high
          Has exited:false

          Target ID:3
          Start time:01:33:20
          Start date:20/09/2023
          Path:C:\Windows\System32\rundll32.exe
          Wow64 process (32bit):false
          Commandline:rundll32.exe "C:\Users\user\Desktop\3498_ED6E000.dll",#1
          Imagebase:0x7ff6f8370000
          File size:69'632 bytes
          MD5 hash:73C519F050C20580F8A62C849D49215A
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high
          Has exited:false
          There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
          There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
          There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
          There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
          There is hidden Windows Behavior. Click on Show Windows Behavior to show it.

          No disassembly