Windows
Analysis Report
SecuriteInfo.com.W32.ABTrojan.PKDG-1049.25060.18443.dll
Overview
General Information
Detection
Score: | 72 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
loaddll32.exe (PID: 4956 cmdline:
loaddll32. exe "C:\Us ers\user\D esktop\Sec uriteInfo. com.W32.AB Trojan.PKD G-1049.250 60.18443.d ll" MD5: 51E6071F9CBA48E79F10C84515AAE618) conhost.exe (PID: 5764 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) cmd.exe (PID: 1516 cmdline:
cmd.exe /C rundll32. exe "C:\Us ers\user\D esktop\Sec uriteInfo. com.W32.AB Trojan.PKD G-1049.250 60.18443.d ll",#1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) rundll32.exe (PID: 6600 cmdline:
rundll32.e xe "C:\Use rs\user\De sktop\Secu riteInfo.c om.W32.ABT rojan.PKDG -1049.2506 0.18443.dl l",#1 MD5: 889B99C52A60DD49227C5E485A016679)
- cleanup
Click to jump to signature section
AV Detection |
---|
Source: | ReversingLabs: | |||
Source: | Virustotal: | Perma Link |
Source: | Joe Sandbox ML: |
Source: | Static PE information: |
Source: | Static PE information: |
System Summary |
---|
Source: | Static PE information: |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Static PE information: |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | Mutant created: |
Source: | Key opened: | Jump to behavior |
Source: | Process created: |
Source: | ReversingLabs: | ||
Source: | Virustotal: |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Static file information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: | ||
Source: | Static PE information: |
Hooking and other Techniques for Hiding and Protection |
---|
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior |
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | Function Chain: | ||
Source: | Function Chain: | ||
Source: | Function Chain: | ||
Source: | Function Chain: |
Source: | Binary or memory string: |
Source: | RDTSC instruction interceptor: | ||
Source: | RDTSC instruction interceptor: |
Source: | Code function: | 0_2_6CC9FC69 |
Source: | Thread injection, dropped files, key value created, disk infection and DNS query: |
Source: | Last function: |
Source: | Thread delayed: | Jump to behavior |
Source: | Process information queried: | Jump to behavior |
Source: | Process queried: | Jump to behavior |
Source: | Code function: | 0_2_6CC9FC69 |
Source: | Thread injection, dropped files, key value created, disk infection and DNS query: |
Source: | Process created: | Jump to behavior |
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Network Effects | Remote Service Effects | Impact | Resource Development | Reconnaissance |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Valid Accounts | 1 Native API | 1 DLL Side-Loading | 11 Process Injection | 1 Masquerading | 1 Credential API Hooking | 22 Security Software Discovery | Remote Services | 1 Credential API Hooking | Exfiltration Over Other Network Medium | Data Obfuscation | Exploit SS7 to Redirect Phone Calls/SMS | Remotely Wipe Data Without Authorization | Abuse Accessibility Features | Acquire Infrastructure | Gather Victim Identity Information |
Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 1 Disable or Modify Tools | LSASS Memory | 1 Process Discovery | Remote Desktop Protocol | Data from Removable Media | Exfiltration Over Bluetooth | Junk Data | SIM Card Swap | Obtain Device Cloud Backups | Network Denial of Service | Domains | Credentials |
Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 1 Rundll32 | Security Account Manager | 11 Virtualization/Sandbox Evasion | SMB/Windows Admin Shares | Data from Network Shared Drive | Automated Exfiltration | Steganography | Data Encrypted for Impact | DNS Server | Email Addresses | ||
Local Accounts | Cron | Login Hook | Login Hook | 11 Virtualization/Sandbox Evasion | NTDS | 11 System Information Discovery | Distributed Component Object Model | Input Capture | Traffic Duplication | Protocol Impersonation | Data Destruction | Virtual Private Server | Employee Names | ||
Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 11 Process Injection | LSA Secrets | Internet Connection Discovery | SSH | Keylogging | Scheduled Transfer | Fallback Channels | Data Encrypted for Impact | Server | Gather Victim Network Information | ||
Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 1 DLL Side-Loading | Cached Domain Credentials | Wi-Fi Discovery | VNC | GUI Input Capture | Data Transfer Size Limits | Multiband Communication | Service Stop | Botnet | Domain Properties |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
43% | ReversingLabs | Win32.Trojan.Generic | ||
44% | Virustotal | Browse | ||
100% | Joe Sandbox ML |
Joe Sandbox version: | 38.0.0 Ammolite |
Analysis ID: | 1376630 |
Start date and time: | 2024-01-18 10:42:25 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 3m 0s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 5 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | SecuriteInfo.com.W32.ABTrojan.PKDG-1049.25060.18443.dll |
Detection: | MAL |
Classification: | mal72.evad.winDLL@6/0@0/0 |
EGA Information: | Failed |
HCA Information: | Failed |
Cookbook Comments: |
|
- Exclude process from analysis
(whitelisted): dllhost.exe - Excluded domains from analysis
(whitelisted): client.wns.win dows.com, login.live.com - Execution Graph export aborted
for target loaddll32.exe, PID 4956 because there are no exe cuted function - Not all processes where analyz
ed, report is missing behavior information
Time | Type | Description |
---|---|---|
10:43:29 | API Interceptor |
File type: | |
Entropy (8bit): | 7.958956902431946 |
TrID: |
|
File name: | SecuriteInfo.com.W32.ABTrojan.PKDG-1049.25060.18443.dll |
File size: | 5'900'288 bytes |
MD5: | f2e1d02808084a9201ac4547da5658d9 |
SHA1: | 54e2e512358a1f29f8af9607c7dc6dd7e34cb86f |
SHA256: | 731cbae14430bb27da84cda0e6c581170164a1dc38507e7c4d75eb56d4b4e0d6 |
SHA512: | 1af971ca8d0e9be14591f09fd4fd9d09bc2506f28e647c334409984f11b1c5426b3401ae7fd01910d7b1b1fd538ba5f83811c9b8bcfd56ba84013b75b0c5bf9f |
SSDEEP: | 98304:VBdRN4Crhg3z/SDhU+eSVMlKXfur2EZ8N1gbSTKqjvGO90xEAxudOA+4dbyLpla3:ZsCS3z/wUTZwXfeigbSTeOmxfk9+0uj |
TLSH: | 9B56233322741299E0D9CC3D8A37BEB571F503678A91ACB945BE5EC13A265B4D703E83 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...C.N^...........!......................................................................@................................ |
Icon Hash: | 7ae282899bbab082 |
Entrypoint: | 0x108f8cf4 |
Entrypoint Section: | .vmp1 |
Digitally signed: | false |
Imagebase: | 0x10000000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT |
Time Stamp: | 0x5E4E9043 [Thu Feb 20 13:57:23 2020 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 6 |
OS Version Minor: | 0 |
File Version Major: | 6 |
File Version Minor: | 0 |
Subsystem Version Major: | 6 |
Subsystem Version Minor: | 0 |
Import Hash: | 2527f56937cbf0271eda7e6e96c093f7 |
Instruction |
---|
push C94CCAD2h |
call 00007F33152609F0h |
add edx, 5E5044F9h |
ror edx, 1 |
clc |
cmp cl, FFFFFFF5h |
add edx, 6CB0661Bh |
cmc |
rol edx, 03h |
xor ebx, edx |
cmc |
test ax, bp |
add edi, edx |
jmp 00007F3315376D8Fh |
test di, bx |
add eax, 3FEE2572h |
cmp bp, 7EFDh |
cmp bp, dx |
jmp 00007F33152C2AE8h |
shr ax, cl |
jmp 00007F33152116A4h |
mov edx, dword ptr [esi] |
clc |
and al, cl |
mov ax, word ptr [esi+04h] |
stc |
cmp esp, ebx |
test ebx, ebp |
lea esi, dword ptr [esi+00000006h] |
stc |
cmc |
mov word ptr [edx], ax |
sbb ax, sp |
xor ax, bp |
lea edi, dword ptr [edi-00000004h] |
sar eax, cl |
sub ah, FFFFFF8Eh |
mov eax, dword ptr [edi] |
xor eax, ebx |
cmp edx, esi |
add eax, 079A5222h |
stc |
not eax |
cmc |
clc |
ror eax, 1 |
bswap eax |
jmp 00007F331525B1F3h |
inc eax |
bswap eax |
cmp bh, 00000036h |
stc |
neg eax |
inc eax |
stc |
xor eax, 32DF1050h |
xor ebx, eax |
cmp bx, sp |
add esi, eax |
jmp 00007F331535C58Dh |
mov eax, dword ptr [ebp+00h] |
cmp edi, 443C7606h |
bsf cx, ax |
mov ecx, dword ptr [eax] |
sub edx, edx |
not dl |
mov dword ptr [ebp+00h], ecx |
btc dx, 0009h |
adc edx, 00000000h |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x94df80 | 0x1cc | .vmp1 |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x988000 | 0x1d5 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x987000 | 0x630 | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x904ac8 | 0x20 | .vmp1 |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x986830 | 0x40 | .vmp1 |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x6f7000 | 0xe0 | .vmp1 |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x68d14 | 0x0 | False | 0 | empty | 0.0 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x6a000 | 0x10ff4 | 0x0 | False | 0 | empty | 0.0 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0x7b000 | 0x273cc | 0x0 | False | 0 | empty | 0.0 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.vmp0 | 0xa3000 | 0x3439f0 | 0x0 | unknown | unknown | unknown | unknown | IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.vmp1 | 0x3e7000 | 0x59f8e0 | 0x59fa00 | unknown | unknown | unknown | unknown | IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.reloc | 0x987000 | 0x630 | 0x800 | False | 0.41015625 | data | 3.566860686810334 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.rsrc | 0x988000 | 0x1d5 | 0x200 | False | 0.52734375 | data | 4.719348272345726 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_MANIFEST | 0x988058 | 0x17d | XML 1.0 document, ASCII text, with CRLF line terminators | English | United States | 0.5931758530183727 |
DLL | Import |
---|---|
KERNEL32.dll | lstrlenA |
USER32.dll | GetForegroundWindow |
SHELL32.dll | ShellExecuteA |
MSVCP140.dll | ?_Syserror_map@std@@YAPBDH@Z |
OPENGL32.dll | glDepthFunc |
IMM32.dll | ImmSetCompositionWindow |
VCRUNTIME140.dll | __current_exception |
api-ms-win-crt-runtime-l1-1-0.dll | _initterm |
api-ms-win-crt-heap-l1-1-0.dll | _callnewh |
api-ms-win-crt-utility-l1-1-0.dll | rand |
api-ms-win-crt-convert-l1-1-0.dll | atoi |
api-ms-win-crt-stdio-l1-1-0.dll | fputc |
api-ms-win-crt-math-l1-1-0.dll | _CIatan2 |
api-ms-win-crt-filesystem-l1-1-0.dll | _access |
api-ms-win-crt-time-l1-1-0.dll | _localtime64 |
api-ms-win-crt-string-l1-1-0.dll | strncpy |
api-ms-win-crt-environment-l1-1-0.dll | getenv |
WTSAPI32.dll | WTSSendMessageW |
KERNEL32.dll | VirtualQuery |
USER32.dll | GetProcessWindowStation |
KERNEL32.dll | LocalAlloc, LocalFree, GetModuleFileNameW, GetProcessAffinityMask, SetProcessAffinityMask, SetThreadAffinityMask, Sleep, ExitProcess, FreeLibrary, LoadLibraryA, GetModuleHandleA, GetProcAddress |
USER32.dll | GetProcessWindowStation, GetUserObjectInformationW |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Click to jump to process
Click to jump to process
Click to jump to process
Target ID: | 0 |
Start time: | 10:43:27 |
Start date: | 18/01/2024 |
Path: | C:\Windows\System32\loaddll32.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xf50000 |
File size: | 126'464 bytes |
MD5 hash: | 51E6071F9CBA48E79F10C84515AAE618 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 1 |
Start time: | 10:43:27 |
Start date: | 18/01/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6d64d0000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 2 |
Start time: | 10:43:27 |
Start date: | 18/01/2024 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x790000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 3 |
Start time: | 10:43:27 |
Start date: | 18/01/2024 |
Path: | C:\Windows\SysWOW64\rundll32.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x200000 |
File size: | 61'440 bytes |
MD5 hash: | 889B99C52A60DD49227C5E485A016679 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |