Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dll

Overview

General Information

Sample name:SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dll
Analysis ID:1427301
MD5:bca3b499bf4edf8590ad273592fc411b
SHA1:c18679cda189f68f8d7022055a7e5d6aff8d1e58
SHA256:6fb6dc7049299c3172ee60c3f0a0319bd33d0c6b2c9836bf0051e59084e6fce0
Tags:dll
Infos:

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Drops PE files
Found evasive API chain (may stop execution after checking a module file name)
Found large amount of non-executed APIs
PE file contains executable resources (Code or Archives)
Sample execution stops while process was sleeping (likely an evasion)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • loaddll32.exe (PID: 1264 cmdline: loaddll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dll" MD5: 51E6071F9CBA48E79F10C84515AAE618)
    • conhost.exe (PID: 7108 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 1440 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dll",#1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • rundll32.exe (PID: 6388 cmdline: rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dll",#1 MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 6500 cmdline: rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dll,LoginPro MD5: 889B99C52A60DD49227C5E485A016679)
      • clink410.exe (PID: 1852 cmdline: clink410.exe MD5: F91DD2C9AB406FCA3F15680779305DCC)
    • rundll32.exe (PID: 2132 cmdline: rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dll,LoginTYFw MD5: 889B99C52A60DD49227C5E485A016679)
      • clink410.exe (PID: 2136 cmdline: clink410.exe MD5: F91DD2C9AB406FCA3F15680779305DCC)
    • rundll32.exe (PID: 2108 cmdline: rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dll,getXuhaoVal MD5: 889B99C52A60DD49227C5E485A016679)
      • clink410.exe (PID: 6308 cmdline: clink410.exe MD5: F91DD2C9AB406FCA3F15680779305DCC)
    • rundll32.exe (PID: 2508 cmdline: rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dll",LoginPro MD5: 889B99C52A60DD49227C5E485A016679)
    • clink410.exe (PID: 2260 cmdline: clink410.exe MD5: F91DD2C9AB406FCA3F15680779305DCC)
    • rundll32.exe (PID: 3656 cmdline: rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dll",LoginTYFw MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 3372 cmdline: rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dll",getXuhaoVal MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 3040 cmdline: rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dll",xtLoginTYFw MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 5896 cmdline: rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dll",getXuhaoVal2 MD5: 889B99C52A60DD49227C5E485A016679)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dllReversingLabs: Detection: 42%
Source: SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dllVirustotal: Detection: 57%Perma Link
Source: SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dllStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL
Source: SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT
Source: global trafficTCP traffic: 192.168.2.5:49705 -> 103.192.208.126:511
Source: global trafficTCP traffic: 192.168.2.5:49707 -> 101.71.135.228:300
Source: global trafficTCP traffic: 192.168.2.5:49706 -> 101.71.135.229:300
Source: global trafficTCP traffic: 192.168.2.5:49708 -> 103.192.208.9:300
Source: global trafficTCP traffic: 192.168.2.5:49709 -> 103.192.208.76:300
Source: global trafficTCP traffic: 192.168.2.5:49711 -> 115.236.153.233:300
Source: global trafficTCP traffic: 192.168.2.5:49710 -> 115.236.153.228:300
Source: global trafficTCP traffic: 192.168.2.5:49712 -> 45.124.76.252:300
Source: global trafficTCP traffic: 192.168.2.5:49713 -> 103.192.208.113:300
Source: unknownTCP traffic detected without corresponding DNS query: 101.71.135.228
Source: unknownTCP traffic detected without corresponding DNS query: 101.71.135.229
Source: unknownTCP traffic detected without corresponding DNS query: 103.192.208.9
Source: unknownTCP traffic detected without corresponding DNS query: 103.192.208.76
Source: unknownTCP traffic detected without corresponding DNS query: 115.236.153.233
Source: unknownTCP traffic detected without corresponding DNS query: 115.236.153.228
Source: unknownTCP traffic detected without corresponding DNS query: 45.124.76.252
Source: unknownTCP traffic detected without corresponding DNS query: 103.192.208.113
Source: unknownTCP traffic detected without corresponding DNS query: 103.192.208.76
Source: unknownTCP traffic detected without corresponding DNS query: 103.192.208.113
Source: unknownTCP traffic detected without corresponding DNS query: 103.192.208.9
Source: unknownTCP traffic detected without corresponding DNS query: 45.124.76.252
Source: unknownTCP traffic detected without corresponding DNS query: 115.236.153.233
Source: unknownTCP traffic detected without corresponding DNS query: 103.192.208.113
Source: unknownTCP traffic detected without corresponding DNS query: 103.192.208.76
Source: unknownTCP traffic detected without corresponding DNS query: 45.124.76.252
Source: unknownTCP traffic detected without corresponding DNS query: 103.192.208.9
Source: unknownTCP traffic detected without corresponding DNS query: 115.236.153.233
Source: unknownTCP traffic detected without corresponding DNS query: 103.192.208.113
Source: unknownTCP traffic detected without corresponding DNS query: 103.192.208.113
Source: unknownTCP traffic detected without corresponding DNS query: 103.192.208.76
Source: unknownTCP traffic detected without corresponding DNS query: 101.71.135.229
Source: unknownTCP traffic detected without corresponding DNS query: 101.71.135.228
Source: unknownTCP traffic detected without corresponding DNS query: 45.124.76.252
Source: unknownTCP traffic detected without corresponding DNS query: 115.236.153.228
Source: unknownTCP traffic detected without corresponding DNS query: 103.192.208.9
Source: unknownTCP traffic detected without corresponding DNS query: 115.236.153.233
Source: unknownTCP traffic detected without corresponding DNS query: 103.192.208.76
Source: unknownTCP traffic detected without corresponding DNS query: 45.124.76.252
Source: unknownTCP traffic detected without corresponding DNS query: 103.192.208.9
Source: unknownTCP traffic detected without corresponding DNS query: 115.236.153.233
Source: unknownTCP traffic detected without corresponding DNS query: 115.236.153.228
Source: unknownTCP traffic detected without corresponding DNS query: 115.236.153.228
Source: unknownTCP traffic detected without corresponding DNS query: 115.236.153.228
Source: unknownTCP traffic detected without corresponding DNS query: 115.236.153.228
Source: unknownTCP traffic detected without corresponding DNS query: 101.71.135.229
Source: unknownTCP traffic detected without corresponding DNS query: 101.71.135.229
Source: unknownTCP traffic detected without corresponding DNS query: 101.71.135.229
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownDNS traffic detected: queries for: res3.csasnet.net
Source: loaddll32.exe, 00000000.00000003.2161044251.0000000002A7E000.00000004.00000020.00020000.00000000.sdmp, loaddll32.exe, 00000000.00000003.2161332627.0000000002602000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2074042252.00000000044E5000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2073269346.0000000004358000.00000004.00000020.00020000.00000000.sdmp, clink410.exe, 00000006.00000002.2077003310.0000000000CAE000.00000002.00000001.01000000.00000005.sdmp, rundll32.exe, 00000007.00000003.2101300407.0000000003F56000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000003.2101015065.00000000043C1000.00000004.00000020.00020000.00000000.sdmp, clink410.exe, 00000008.00000000.2102134892.0000000000CAE000.00000002.00000001.01000000.00000005.sdmp, rundll32.exe, 00000009.00000003.2131275389.0000000005175000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000009.00000003.2131536097.0000000004CFA000.00000004.00000020.00020000.00000000.sdmp, clink410.exe, 0000000A.00000000.2132309835.0000000000CAE000.00000002.00000001.01000000.00000005.sdmp, rundll32.exe, 0000000B.00000003.2163928361.0000000004367000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000B.00000003.2163353058.00000000047D7000.00000004.00000020.00020000.00000000.sdmp, clink410.exe, 0000000C.00000000.2162428498.0000000000CAE000.00000002.00000001.01000000.00000005.sdmp, rundll32.exe, 0000000D.00000003.2162958770.00000000046AF000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000D.00000003.2167904419.0000000004230000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.2163428078.00000000049AB000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.2168011079.000000000452C000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000003.2168365522.000000000404D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000003.2164459369.00000000044CF000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2165688153.0000000004B5F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.anweishi.com
Source: clink410.exe.4.drStatic PE information: Resource name: MYDATA type: DOS executable (COM)
Source: SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dllStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL
Source: classification engineClassification label: mal48.winDLL@31/3@2/9
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\Desktop\clink410.exeJump to behavior
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7108:120:WilError_03
Source: SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dll,LoginPro
Source: SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dllReversingLabs: Detection: 42%
Source: SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dllVirustotal: Detection: 57%
Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dll"
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dll",#1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dll,LoginPro
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dll",#1
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Users\user\Desktop\clink410.exe clink410.exe
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dll,LoginTYFw
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Users\user\Desktop\clink410.exe clink410.exe
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dll,getXuhaoVal
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Users\user\Desktop\clink410.exe clink410.exe
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dll",LoginPro
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Users\user\Desktop\clink410.exe clink410.exe
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dll",LoginTYFw
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dll",getXuhaoVal
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dll",xtLoginTYFw
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dll",getXuhaoVal2
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dll,LoginProJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dll,LoginTYFwJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dll,getXuhaoValJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dll",LoginProJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Users\user\Desktop\clink410.exe clink410.exeJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dll",LoginTYFwJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dll",getXuhaoValJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dll",xtLoginTYFwJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dll",getXuhaoVal2Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dll",#1Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Users\user\Desktop\clink410.exe clink410.exeJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Users\user\Desktop\clink410.exe clink410.exeJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Users\user\Desktop\clink410.exe clink410.exeJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\clink410.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\clink410.exeSection loaded: msimg32.dllJump to behavior
Source: C:\Users\user\Desktop\clink410.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\clink410.exeSection loaded: oledlg.dllJump to behavior
Source: C:\Users\user\Desktop\clink410.exeSection loaded: oleacc.dllJump to behavior
Source: C:\Users\user\Desktop\clink410.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Desktop\clink410.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\clink410.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\clink410.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\clink410.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\clink410.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\clink410.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\clink410.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\clink410.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\clink410.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\clink410.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\clink410.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\clink410.exeSection loaded: napinsp.dllJump to behavior
Source: C:\Users\user\Desktop\clink410.exeSection loaded: pnrpnsp.dllJump to behavior
Source: C:\Users\user\Desktop\clink410.exeSection loaded: wshbth.dllJump to behavior
Source: C:\Users\user\Desktop\clink410.exeSection loaded: nlaapi.dllJump to behavior
Source: C:\Users\user\Desktop\clink410.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\clink410.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\clink410.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\clink410.exeSection loaded: winrnr.dllJump to behavior
Source: C:\Users\user\Desktop\clink410.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\clink410.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\clink410.exeAutomated click: OK
Source: C:\Users\user\Desktop\clink410.exeAutomated click: OK
Source: C:\Users\user\Desktop\clink410.exeAutomated click: OK
Source: C:\Users\user\Desktop\clink410.exeAutomated click: OK
Source: C:\Users\user\Desktop\clink410.exeAutomated click: OK
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dllStatic file information: File size 4792832 > 1048576
Source: SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dllStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x466e00
Source: SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT
Source: SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Desktop\clink410.exeCode function: 12_2_00BEC155 push ecx; ret 12_2_00BEC168
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\Desktop\clink410.exeJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\clink410.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\clink410.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\clink410.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\clink410.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcessgraph_12-865
Source: C:\Users\user\Desktop\clink410.exeAPI coverage: 9.1 %
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 120000Jump to behavior
Source: clink410.exe, 0000000C.00000002.3317846298.00000000006CF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll0gW
Source: C:\Users\user\Desktop\clink410.exeAPI call chain: ExitProcess graph end nodegraph_12-866
Source: C:\Windows\System32\loaddll32.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\Desktop\clink410.exeCode function: 12_2_00BF2187 _memset,IsDebuggerPresent,12_2_00BF2187
Source: C:\Users\user\Desktop\clink410.exeCode function: 12_2_00BFE6F5 EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,12_2_00BFE6F5
Source: C:\Users\user\Desktop\clink410.exeCode function: 12_2_00BF1AE2 SetUnhandledExceptionFilter,UnhandledExceptionFilter,12_2_00BF1AE2
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Users\user\Desktop\clink410.exe clink410.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dll",#1Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Users\user\Desktop\clink410.exe clink410.exeJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Users\user\Desktop\clink410.exe clink410.exeJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Users\user\Desktop\clink410.exe clink410.exeJump to behavior
Source: loaddll32.exe, 00000000.00000003.2161044251.0000000002A7E000.00000004.00000020.00020000.00000000.sdmp, loaddll32.exe, 00000000.00000003.2161332627.0000000002602000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2074042252.00000000044E5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: resNu=ProgmanSHELLDLL_DefViewSysListView32\pro.nlp.lnk\.lnk.lnk\.lnk\\pro.nlp ierr=FindResource err
Source: SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dllBinary or memory string: USER32.DLLMessageBoxWGetActiveWindowGetLastActivePopupGetUserObjectInformationWGetProcessWindowStationCreateFile2CONOUT$1#SNAN1#IND1#INF1#QNANgenericunknown erroriostreamiostream stream errorsystem%dMYDATA.execlinkclinkMsgProgmanSHELLDLL_DefViewSysListView32string too longinvalid string positionbad locale name: ios_base::badbit setios_base::failbit setios_base::eofbit set><vector<T> too longbad cast
Source: C:\Users\user\Desktop\clink410.exeCode function: 6_2_00BF144D GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,6_2_00BF144D
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Native API
1
DLL Side-Loading
12
Process Injection
1
Masquerading
OS Credential Dumping1
System Time Discovery
Remote ServicesData from Local System1
Non-Standard Port
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Virtualization/Sandbox Evasion
LSASS Memory21
Security Software Discovery
Remote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)12
Process Injection
Security Account Manager2
Process Discovery
SMB/Windows Admin SharesData from Network Shared Drive1
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Obfuscated Files or Information
NTDS1
Virtualization/Sandbox Evasion
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Rundll32
LSA Secrets2
System Information Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
DLL Side-Loading
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1427301 Sample: SecuriteInfo.com.Win32.Drop... Startdate: 17/04/2024 Architecture: WINDOWS Score: 48 30 res3.csasnet.net 2->30 32 res1.csasnet.com 2->32 40 Multi AV Scanner detection for submitted file 2->40 8 loaddll32.exe 1 2->8         started        signatures3 process4 process5 10 cmd.exe 1 8->10         started        12 clink410.exe 3 8->12         started        15 rundll32.exe 1 8->15         started        17 8 other processes 8->17 dnsIp6 19 rundll32.exe 10->19         started        34 103.192.208.113, 300, 49713 NUSKOPENuSkopePtyLtdAU China 12->34 36 103.192.208.126, 49705, 511 NUSKOPENuSkopePtyLtdAU China 12->36 38 7 other IPs or domains 12->38 22 clink410.exe 15->22         started        24 clink410.exe 17->24         started        26 clink410.exe 17->26         started        process7 file8 28 C:\Users\user\Desktop\clink410.exe, PE32 19->28 dropped

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dll42%ReversingLabsWin32.Trojan.Znyonm
SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dll57%VirustotalBrowse
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
res1.csasnet.com0%VirustotalBrowse
res3.csasnet.net0%VirustotalBrowse
SourceDetectionScannerLabelLink
https://www.anweishi.com1%VirustotalBrowse
NameIPActiveMaliciousAntivirus DetectionReputation
res1.csasnet.com
115.236.153.253
truefalseunknown
res3.csasnet.net
115.236.153.254
truefalseunknown
NameSourceMaliciousAntivirus DetectionReputation
https://www.anweishi.comloaddll32.exe, 00000000.00000003.2161044251.0000000002A7E000.00000004.00000020.00020000.00000000.sdmp, loaddll32.exe, 00000000.00000003.2161332627.0000000002602000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2074042252.00000000044E5000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2073269346.0000000004358000.00000004.00000020.00020000.00000000.sdmp, clink410.exe, 00000006.00000002.2077003310.0000000000CAE000.00000002.00000001.01000000.00000005.sdmp, rundll32.exe, 00000007.00000003.2101300407.0000000003F56000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000003.2101015065.00000000043C1000.00000004.00000020.00020000.00000000.sdmp, clink410.exe, 00000008.00000000.2102134892.0000000000CAE000.00000002.00000001.01000000.00000005.sdmp, rundll32.exe, 00000009.00000003.2131275389.0000000005175000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000009.00000003.2131536097.0000000004CFA000.00000004.00000020.00020000.00000000.sdmp, clink410.exe, 0000000A.00000000.2132309835.0000000000CAE000.00000002.00000001.01000000.00000005.sdmp, rundll32.exe, 0000000B.00000003.2163928361.0000000004367000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000B.00000003.2163353058.00000000047D7000.00000004.00000020.00020000.00000000.sdmp, clink410.exe, 0000000C.00000000.2162428498.0000000000CAE000.00000002.00000001.01000000.00000005.sdmp, rundll32.exe, 0000000D.00000003.2162958770.00000000046AF000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000D.00000003.2167904419.0000000004230000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.2163428078.00000000049AB000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.2168011079.000000000452C000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000003.2168365522.000000000404D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000003.2164459369.00000000044CF000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2165688153.0000000004B5F000.00000004.00000020.00020000.00000000.sdmpfalseunknown
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPDomainCountryFlagASNASN NameMalicious
115.236.153.228
unknownChina
58461CT-HANGZHOU-IDCNo288Fu-chunRoadCNfalse
45.124.76.252
unknownChina
55720GIGABIT-MYGigabitHostingSdnBhdMYfalse
115.236.153.233
unknownChina
58461CT-HANGZHOU-IDCNo288Fu-chunRoadCNfalse
103.192.208.76
unknownChina
17907NUSKOPENuSkopePtyLtdAUfalse
101.71.135.228
unknownChina
4837CHINA169-BACKBONECHINAUNICOMChina169BackboneCNfalse
103.192.208.9
unknownChina
17907NUSKOPENuSkopePtyLtdAUfalse
103.192.208.126
unknownChina
17907NUSKOPENuSkopePtyLtdAUfalse
101.71.135.229
unknownChina
4837CHINA169-BACKBONECHINAUNICOMChina169BackboneCNfalse
103.192.208.113
unknownChina
17907NUSKOPENuSkopePtyLtdAUfalse
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1427301
Start date and time:2024-04-17 12:48:10 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 6m 48s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:19
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dll
Detection:MAL
Classification:mal48.winDLL@31/3@2/9
EGA Information:
  • Successful, ratio: 50%
HCA Information:Failed
Cookbook Comments:
  • Found application associated with file extension: .dll
  • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
  • Execution Graph export aborted for target clink410.exe, PID 1852 because there are no executed function
  • Not all processes where analyzed, report is missing behavior information
TimeTypeDescription
12:49:12API Interceptor1x Sleep call for process: loaddll32.exe modified
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
115.236.153.2331zDbKSIQpy.exeGet hashmaliciousUnknownBrowse
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    res1.csasnet.com1zDbKSIQpy.exeGet hashmaliciousUnknownBrowse
    • 45.124.76.254
    res3.csasnet.net1zDbKSIQpy.exeGet hashmaliciousUnknownBrowse
    • 115.236.153.254
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    GIGABIT-MYGigabitHostingSdnBhdMYP5uKPY120j.elfGet hashmaliciousMiraiBrowse
    • 103.21.89.48
    x86Get hashmaliciousUnknownBrowse
    • 103.229.227.51
    http://18255.comGet hashmaliciousUnknownBrowse
    • 103.232.84.252
    11068-1106811068-11068.lnkGet hashmaliciousNetSupport RAT, NetSupport Downloader, MalLnkBrowse
    • 45.121.147.137
    5kh7DYQuRs.elfGet hashmaliciousUnknownBrowse
    • 103.85.108.56
    r8S55MyrFG.elfGet hashmaliciousMiraiBrowse
    • 103.71.179.248
    vyl0vd4LaO.elfGet hashmaliciousMiraiBrowse
    • 103.21.90.35
    9AMYQBwspv.elfGet hashmaliciousMiraiBrowse
    • 103.21.90.32
    Invoice_for_Return_of_Excess_Amount_(Temmuz)_.exeGet hashmaliciousGuLoader, RemcosBrowse
    • 103.212.71.108
    CT-HANGZHOU-IDCNo288Fu-chunRoadCNOuJmSE9GcF.elfGet hashmaliciousGafgyt, MiraiBrowse
    • 115.239.80.230
    DqbYZ8Ns4k.elfGet hashmaliciousMiraiBrowse
    • 60.190.221.181
    sEzW1OZkw1.elfGet hashmaliciousGafgyt, MiraiBrowse
    • 115.220.100.229
    SPe0uXr3N3.elfGet hashmaliciousGafgyt, MiraiBrowse
    • 115.220.65.231
    SO8J3K15us.elfGet hashmaliciousGafgytBrowse
    • 115.220.147.232
    dVbrHqaCf1.elfGet hashmaliciousGafgytBrowse
    • 115.220.147.211
    21whXUKd06.elfGet hashmaliciousGafgyt, MiraiBrowse
    • 115.220.147.243
    eiHXI8khyb.elfGet hashmaliciousMiraiBrowse
    • 183.131.107.149
    SecuriteInfo.com.Trojan.Siggen13.11902.1474.19881.exeGet hashmaliciousUnknownBrowse
    • 202.91.251.58
    3RIodZx5Hr.elfGet hashmaliciousMirai, OkiruBrowse
    • 115.222.23.254
    CT-HANGZHOU-IDCNo288Fu-chunRoadCNOuJmSE9GcF.elfGet hashmaliciousGafgyt, MiraiBrowse
    • 115.239.80.230
    DqbYZ8Ns4k.elfGet hashmaliciousMiraiBrowse
    • 60.190.221.181
    sEzW1OZkw1.elfGet hashmaliciousGafgyt, MiraiBrowse
    • 115.220.100.229
    SPe0uXr3N3.elfGet hashmaliciousGafgyt, MiraiBrowse
    • 115.220.65.231
    SO8J3K15us.elfGet hashmaliciousGafgytBrowse
    • 115.220.147.232
    dVbrHqaCf1.elfGet hashmaliciousGafgytBrowse
    • 115.220.147.211
    21whXUKd06.elfGet hashmaliciousGafgyt, MiraiBrowse
    • 115.220.147.243
    eiHXI8khyb.elfGet hashmaliciousMiraiBrowse
    • 183.131.107.149
    SecuriteInfo.com.Trojan.Siggen13.11902.1474.19881.exeGet hashmaliciousUnknownBrowse
    • 202.91.251.58
    3RIodZx5Hr.elfGet hashmaliciousMirai, OkiruBrowse
    • 115.222.23.254
    No context
    No context
    Process:C:\Users\user\Desktop\clink410.exe
    File Type:data
    Category:dropped
    Size (bytes):852
    Entropy (8bit):7.7767617232232285
    Encrypted:false
    SSDEEP:24:X2M71RpVqtCe5YTjLADkmQHqvDCKuRkSP9:ma1RLqcTXXmQK0RVP9
    MD5:018AB155EB16AED6DDFD346099F8A565
    SHA1:5DF872AA1C17ECB2215D20A7752AD921CDD9D034
    SHA-256:E97EBA2D034713B61C3985DF444118E71F1CB1C28FC92ABB93DCD5703FEC4688
    SHA-512:E1E9CA0AD5AEF365BE1C089761BE0A9E4453A9384E42AF1BC9F2DCBAD9955B47A35EA321CF22B4EE5A583534B8F0B38F8924D468AB12E0FAFE408DB53C850E6B
    Malicious:false
    Preview:P........u.5.U&3.W\;2.l.R.p.\-.*....?EsM.....5.}.sf2n...F....u..=."... ...q......`i........!....bY5[...z.R'."..M.2.=..G..O.....0IDII-.._.%.. ..YK...x*s.|.&ct..]..l.Nk.*/Ee(r..$......j..V.:.......,Q..|..w.^....iy.{.t(M........x...4cb>G.Q...D{.A.\f.r....(g.K..7...<@Z.F....&75+.h..s.Jb...B...(...-3.[).~..2..r..f6...........Eh.%.uC...s.UrfS.N..-d......cK.............p....X.[.9XC.....E...I..:.a@..k....\.....;..q..a....C.&.o.W3.:.`A...J.2W.....'....a.adL.ev..P.....r..f.?........H.YD..y.eGe.@.v,9......t.^...u.U..w.=...Ks.s....H.=.7....L].KI.F.C.'.f.'...[|vp..V[.m.S......sX.Z.V.'.4.W-.Z....s...."C.x..........:..J.B...H..F..&..)x.,+.wW......s\....^.5..q......e.._..z...L..h.d..~o...l.uY..8gb.[..F.s...&v...a$-.y.!.LJ........V.....}..s]..o.]EF....'...x+g. ...v.*(.....tn*~..!b..$...+...0..$.%6>.Cm.O.Z.tG.Y.2p..
    Process:C:\Users\user\Desktop\clink410.exe
    File Type:data
    Category:dropped
    Size (bytes):4096
    Entropy (8bit):0.10528770123697763
    Encrypted:false
    SSDEEP:3:VWAQWAsEiLlruX0v:RDzEilik
    MD5:ED9C5866CACB2C209F1B4A0198B85794
    SHA1:7C074383B09A85D712892FEFE2052FD1C3FFF177
    SHA-256:8CEC3950A9BF76E446E01B80E8231B34E37A7C8D480918B1B357A4263D89985C
    SHA-512:AC8945F15D326A96A2E129D6A4D720F5D6AFE1398BD576FEAD8D940B217C32884E0D6207C7D1D6A4ABDE486838F987EFE053C4B428911A38F41BE44B6321DD1B
    Malicious:false
    Preview:.S..a3e53e0cbf9d4a17918c875492cbce47....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    Process:C:\Windows\SysWOW64\rundll32.exe
    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
    Category:dropped
    Size (bytes):4613632
    Entropy (8bit):7.043550339564266
    Encrypted:false
    SSDEEP:98304:tRdbR/SYR9T+fuJ4bB8qXmsNAGWN7Bo1xXXyIuBoPMFLOAkGkzdnEVomFHKnPc:tnhSfXrXio1xXXyBoPMFLOyomFHKnP
    MD5:F91DD2C9AB406FCA3F15680779305DCC
    SHA1:8EA7C1AA10A68211715E4363E11E915670DB33CF
    SHA-256:C2A193BC5741545E27EBBF7A728EA5629D48E0B73BD4112083497458F39E71FC
    SHA-512:F0413FB35AE79D81428BDB8B6CA96A1A9DE6A9601A49BABCF56DD94AC098C0DE4B04D06EDF816F633E32CD8CA7C59AA3A38A4A648937D959E33220604A1BF41C
    Malicious:false
    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........NL^./"../"../"..W.../"..W.../"..W.../"../#..,"..~.../"..~...."..~..Z."..}.../"..}.../"../.../"..}.../".Rich./".........PE..L....{.e.................b....*......q............@..........................@G...........@..................................k".......#.x*!...................E..(...................................9 .@............................................text....`.......b.................. ..`.rdata..(%.......&...f..............@..@.data....(....".......".............@....rsrc...x*!...#..,!...#.............@..@.reloc...(....E..*...<D.............@..B................................................................................................................................................................................................................................................................................................................
    File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
    Entropy (8bit):7.089134093158391
    TrID:
    • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
    • Generic Win/DOS Executable (2004/3) 0.20%
    • DOS Executable Generic (2002/1) 0.20%
    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
    File name:SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dll
    File size:4'792'832 bytes
    MD5:bca3b499bf4edf8590ad273592fc411b
    SHA1:c18679cda189f68f8d7022055a7e5d6aff8d1e58
    SHA256:6fb6dc7049299c3172ee60c3f0a0319bd33d0c6b2c9836bf0051e59084e6fce0
    SHA512:3935e1936d1b909a9719dcd5f3ee0526c8e840d04e6617ad1fa1b7f876046f5fa0f1e48a9a56d68d7a2ca87572030ea3df666af3e1a804a211375596ba1256ae
    SSDEEP:49152:pAkKo7fIMLsI7eAJceXxl5h7+JF3HYgijO6WDZwdKYQgf3RjFkhDa+nRk2H8d:pP37fIceAJLkvCO6WDZwdKggh2
    TLSH:2926BF6E97E45E4DAB1B4BE59C3BA7E81942CF01656F86CF15C1CA44E3E8FCA104B390
    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........_.S.>i..>i..>i..o...>i..o...>i..o..p>i..F...>i..>h..>i..l...>i..l...>i..l...>i..>...>i..l...>i.Rich.>i.........PE..L....{.e...
    Icon Hash:7ae282899bbab082
    Entrypoint:0x1000981f
    Entrypoint Section:.text
    Digitally signed:false
    Imagebase:0x10000000
    Subsystem:windows gui
    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL
    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT
    Time Stamp:0x650E7BCA [Sat Sep 23 05:46:50 2023 UTC]
    TLS Callbacks:
    CLR (.Net) Version:
    OS Version Major:5
    OS Version Minor:1
    File Version Major:5
    File Version Minor:1
    Subsystem Version Major:5
    Subsystem Version Minor:1
    Import Hash:702466d805e925a74c5b750dae64fa7a
    Instruction
    push ebp
    mov ebp, esp
    cmp dword ptr [ebp+0Ch], 01h
    jne 00007FC800EADA97h
    call 00007FC800EB7BF1h
    push dword ptr [ebp+10h]
    push dword ptr [ebp+0Ch]
    push dword ptr [ebp+08h]
    call 00007FC800EADA9Ch
    add esp, 0Ch
    pop ebp
    retn 000Ch
    push 0000000Ch
    push 10027FB8h
    call 00007FC800EB3997h
    xor eax, eax
    inc eax
    mov esi, dword ptr [ebp+0Ch]
    test esi, esi
    jne 00007FC800EADA9Eh
    cmp dword ptr [1002B0C8h], esi
    je 00007FC800EADB7Ah
    and dword ptr [ebp-04h], 00000000h
    cmp esi, 01h
    je 00007FC800EADA97h
    cmp esi, 02h
    jne 00007FC800EADAC7h
    mov ecx, dword ptr [100213A0h]
    test ecx, ecx
    je 00007FC800EADA9Eh
    push dword ptr [ebp+10h]
    push esi
    push dword ptr [ebp+08h]
    call ecx
    mov dword ptr [ebp-1Ch], eax
    test eax, eax
    je 00007FC800EADB47h
    push dword ptr [ebp+10h]
    push esi
    push dword ptr [ebp+08h]
    call 00007FC800EAD8A6h
    mov dword ptr [ebp-1Ch], eax
    test eax, eax
    je 00007FC800EADB30h
    mov ebx, dword ptr [ebp+10h]
    push ebx
    push esi
    push dword ptr [ebp+08h]
    call 00007FC800EA88A1h
    mov edi, eax
    mov dword ptr [ebp-1Ch], edi
    cmp esi, 01h
    jne 00007FC800EADABAh
    test edi, edi
    jne 00007FC800EADAB6h
    push ebx
    push eax
    push dword ptr [ebp+08h]
    call 00007FC800EA8889h
    push ebx
    push edi
    push dword ptr [ebp+08h]
    call 00007FC800EAD86Ch
    mov eax, dword ptr [100213A0h]
    test eax, eax
    je 00007FC800EADA99h
    push ebx
    push edi
    push dword ptr [ebp+08h]
    call eax
    Programming Language:
    • [IMP] VS2008 SP1 build 30729
    • [EXP] VS2013 build 21005
    • [RES] VS2013 build 21005
    • [LNK] VS2013 build 21005
    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x286100x9f.rdata
    IMAGE_DIRECTORY_ENTRY_IMPORT0x286b00x50.rdata
    IMAGE_DIRECTORY_ENTRY_RESOURCE0x2d0000x466d78.rsrc
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0x4940000x1d58.reloc
    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x269d00x40.rdata
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0x200000x164.rdata
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
    .text0x10000x1e51a0x1e600fdfd327103d4c6b5f1ae2c9f8e5277d7False0.5533773791152263data6.6333240223790195IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    .rdata0x200000x8eae0x900082b586034e377c629f0798945d0aac6cFalse0.3738606770833333data4.70691480244013IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .data0x290000x3d680x1c00784047e184693078d96818b5ef4ac95fFalse0.30398995535714285DOS executable (block device driver ght (c)3.868903672114225IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .rsrc0x2d0000x466d780x466e00ce26efbc85e994f9786410279fc316eeunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .reloc0x4940000x1d580x1e0032ba9d88e438f1d15233c557d3e4f0edFalse0.7600260416666667data6.546482667203409IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
    NameRVASizeTypeLanguageCountryZLIB Complexity
    MYDATA0x2d1000x466a14dataChineseChina0.5479860305786133
    RT_VERSION0x493b180xdcdataChineseChina0.6636363636363637
    RT_MANIFEST0x493bf80x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
    DLLImport
    KERNEL32.dllFindResourceW, GetLastError, SizeofResource, LoadResource, LockResource, CreatePipe, MultiByteToWideChar, CreateProcessW, WaitForSingleObject, CloseHandle, Sleep, CreateThread, WideCharToMultiByte, GetCurrentProcessId, GetModuleFileNameW, OpenProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, TerminateProcess, InitializeCriticalSection, EnterCriticalSection, LeaveCriticalSection, SetEndOfFile, CreateFileW, OutputDebugStringW, WriteConsoleW, SetStdHandle, ReadConsoleW, LoadLibraryExW, HeapReAlloc, FreeEnvironmentStringsW, DeleteCriticalSection, EncodePointer, DecodePointer, GetStringTypeW, HeapFree, IsDebuggerPresent, IsProcessorFeaturePresent, GetSystemTimeAsFileTime, GetCommandLineA, GetCurrentThreadId, RaiseException, RtlUnwind, HeapAlloc, GetCPInfo, UnhandledExceptionFilter, SetUnhandledExceptionFilter, SetLastError, InitializeCriticalSectionAndSpinCount, GetCurrentProcess, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetStartupInfoW, GetModuleHandleW, GetProcAddress, LCMapStringW, GetLocaleInfoW, IsValidLocale, GetUserDefaultLCID, EnumSystemLocalesW, ExitProcess, GetModuleHandleExW, AreFileApisANSI, HeapSize, GetProcessHeap, IsValidCodePage, GetACP, GetOEMCP, GetStdHandle, GetFileType, WriteFile, GetConsoleCP, GetConsoleMode, ReadFile, SetFilePointerEx, FlushFileBuffers, GetModuleFileNameA, QueryPerformanceCounter, GetEnvironmentStringsW
    USER32.dllFindWindowW, PostMessageW, FindWindowExW
    SHELL32.dllSHChangeNotify
    NameOrdinalAddress
    LoginPro10x10003060
    LoginTYFw20x10003060
    getXuhaoVal30x10003040
    getXuhaoVal240x10003050
    xtLoginTYFw50x10003070
    Language of compilation systemCountry where language is spokenMap
    ChineseChina
    EnglishUnited States
    TimestampSource PortDest PortSource IPDest IP
    Apr 17, 2024 12:49:14.485100985 CEST49705511192.168.2.5103.192.208.126
    Apr 17, 2024 12:49:14.807378054 CEST51149705103.192.208.126192.168.2.5
    Apr 17, 2024 12:49:14.807477951 CEST49705511192.168.2.5103.192.208.126
    Apr 17, 2024 12:49:14.916455030 CEST49705511192.168.2.5103.192.208.126
    Apr 17, 2024 12:49:15.239042997 CEST51149705103.192.208.126192.168.2.5
    Apr 17, 2024 12:49:15.239115000 CEST51149705103.192.208.126192.168.2.5
    Apr 17, 2024 12:49:15.239577055 CEST49705511192.168.2.5103.192.208.126
    Apr 17, 2024 12:49:15.562057018 CEST51149705103.192.208.126192.168.2.5
    Apr 17, 2024 12:49:15.562139988 CEST49705511192.168.2.5103.192.208.126
    Apr 17, 2024 12:49:15.634104967 CEST49707300192.168.2.5101.71.135.228
    Apr 17, 2024 12:49:15.634119034 CEST49706300192.168.2.5101.71.135.229
    Apr 17, 2024 12:49:15.634169102 CEST49708300192.168.2.5103.192.208.9
    Apr 17, 2024 12:49:15.637569904 CEST49709300192.168.2.5103.192.208.76
    Apr 17, 2024 12:49:15.649703026 CEST49711300192.168.2.5115.236.153.233
    Apr 17, 2024 12:49:15.649703026 CEST49710300192.168.2.5115.236.153.228
    Apr 17, 2024 12:49:15.649785042 CEST49712300192.168.2.545.124.76.252
    Apr 17, 2024 12:49:15.649858952 CEST49713300192.168.2.5103.192.208.113
    Apr 17, 2024 12:49:15.958609104 CEST30049709103.192.208.76192.168.2.5
    Apr 17, 2024 12:49:15.958743095 CEST49709300192.168.2.5103.192.208.76
    Apr 17, 2024 12:49:15.960041046 CEST30049713103.192.208.113192.168.2.5
    Apr 17, 2024 12:49:15.960112095 CEST49713300192.168.2.5103.192.208.113
    Apr 17, 2024 12:49:15.974937916 CEST30049708103.192.208.9192.168.2.5
    Apr 17, 2024 12:49:15.975014925 CEST49708300192.168.2.5103.192.208.9
    Apr 17, 2024 12:49:15.977905989 CEST3004971245.124.76.252192.168.2.5
    Apr 17, 2024 12:49:15.977982998 CEST49712300192.168.2.545.124.76.252
    Apr 17, 2024 12:49:15.994761944 CEST30049711115.236.153.233192.168.2.5
    Apr 17, 2024 12:49:15.994944096 CEST49711300192.168.2.5115.236.153.233
    Apr 17, 2024 12:49:16.273011923 CEST30049713103.192.208.113192.168.2.5
    Apr 17, 2024 12:49:16.273801088 CEST49713300192.168.2.5103.192.208.113
    Apr 17, 2024 12:49:16.283936977 CEST30049709103.192.208.76192.168.2.5
    Apr 17, 2024 12:49:16.287995100 CEST49709300192.168.2.5103.192.208.76
    Apr 17, 2024 12:49:16.309159994 CEST3004971245.124.76.252192.168.2.5
    Apr 17, 2024 12:49:16.309751987 CEST49712300192.168.2.545.124.76.252
    Apr 17, 2024 12:49:16.324863911 CEST30049708103.192.208.9192.168.2.5
    Apr 17, 2024 12:49:16.325393915 CEST49708300192.168.2.5103.192.208.9
    Apr 17, 2024 12:49:16.340698004 CEST30049711115.236.153.233192.168.2.5
    Apr 17, 2024 12:49:16.341082096 CEST49711300192.168.2.5115.236.153.233
    Apr 17, 2024 12:49:16.584072113 CEST30049713103.192.208.113192.168.2.5
    Apr 17, 2024 12:49:16.584135056 CEST30049713103.192.208.113192.168.2.5
    Apr 17, 2024 12:49:16.584193945 CEST30049713103.192.208.113192.168.2.5
    Apr 17, 2024 12:49:16.584315062 CEST49713300192.168.2.5103.192.208.113
    Apr 17, 2024 12:49:16.600861073 CEST49713300192.168.2.5103.192.208.113
    Apr 17, 2024 12:49:16.609379053 CEST30049709103.192.208.76192.168.2.5
    Apr 17, 2024 12:49:16.609409094 CEST30049709103.192.208.76192.168.2.5
    Apr 17, 2024 12:49:16.609427929 CEST30049709103.192.208.76192.168.2.5
    Apr 17, 2024 12:49:16.609512091 CEST49709300192.168.2.5103.192.208.76
    Apr 17, 2024 12:49:16.633439064 CEST49706300192.168.2.5101.71.135.229
    Apr 17, 2024 12:49:16.633451939 CEST49707300192.168.2.5101.71.135.228
    Apr 17, 2024 12:49:16.637931108 CEST3004971245.124.76.252192.168.2.5
    Apr 17, 2024 12:49:16.637968063 CEST3004971245.124.76.252192.168.2.5
    Apr 17, 2024 12:49:16.637998104 CEST3004971245.124.76.252192.168.2.5
    Apr 17, 2024 12:49:16.638061047 CEST49712300192.168.2.545.124.76.252
    Apr 17, 2024 12:49:16.649025917 CEST49710300192.168.2.5115.236.153.228
    Apr 17, 2024 12:49:16.676723957 CEST30049708103.192.208.9192.168.2.5
    Apr 17, 2024 12:49:16.676781893 CEST30049708103.192.208.9192.168.2.5
    Apr 17, 2024 12:49:16.676822901 CEST30049708103.192.208.9192.168.2.5
    Apr 17, 2024 12:49:16.676893950 CEST49708300192.168.2.5103.192.208.9
    Apr 17, 2024 12:49:16.686609030 CEST30049711115.236.153.233192.168.2.5
    Apr 17, 2024 12:49:16.686631918 CEST30049711115.236.153.233192.168.2.5
    Apr 17, 2024 12:49:16.686646938 CEST30049711115.236.153.233192.168.2.5
    Apr 17, 2024 12:49:16.686733007 CEST49711300192.168.2.5115.236.153.233
    Apr 17, 2024 12:49:16.696866989 CEST49709300192.168.2.5103.192.208.76
    Apr 17, 2024 12:49:16.701165915 CEST49712300192.168.2.545.124.76.252
    Apr 17, 2024 12:49:16.705121040 CEST49708300192.168.2.5103.192.208.9
    Apr 17, 2024 12:49:16.708399057 CEST49711300192.168.2.5115.236.153.233
    Apr 17, 2024 12:49:16.911205053 CEST30049713103.192.208.113192.168.2.5
    Apr 17, 2024 12:49:17.019501925 CEST30049709103.192.208.76192.168.2.5
    Apr 17, 2024 12:49:17.029577017 CEST3004971245.124.76.252192.168.2.5
    Apr 17, 2024 12:49:17.037714005 CEST30049710115.236.153.228192.168.2.5
    Apr 17, 2024 12:49:17.037857056 CEST49710300192.168.2.5115.236.153.228
    Apr 17, 2024 12:49:17.053211927 CEST30049708103.192.208.9192.168.2.5
    Apr 17, 2024 12:49:17.053338051 CEST30049711115.236.153.233192.168.2.5
    Apr 17, 2024 12:49:17.431066036 CEST30049710115.236.153.228192.168.2.5
    Apr 17, 2024 12:49:17.432008982 CEST49710300192.168.2.5115.236.153.228
    Apr 17, 2024 12:49:17.831254959 CEST30049710115.236.153.228192.168.2.5
    Apr 17, 2024 12:49:17.831276894 CEST30049710115.236.153.228192.168.2.5
    Apr 17, 2024 12:49:17.831290007 CEST30049710115.236.153.228192.168.2.5
    Apr 17, 2024 12:49:17.831531048 CEST49710300192.168.2.5115.236.153.228
    Apr 17, 2024 12:49:17.836721897 CEST49710300192.168.2.5115.236.153.228
    Apr 17, 2024 12:49:18.241391897 CEST30049710115.236.153.228192.168.2.5
    Apr 17, 2024 12:49:18.649153948 CEST49706300192.168.2.5101.71.135.229
    Apr 17, 2024 12:49:22.649034023 CEST49706300192.168.2.5101.71.135.229
    Apr 17, 2024 12:49:30.649039030 CEST49706300192.168.2.5101.71.135.229
    TimestampSource PortDest PortSource IPDest IP
    Apr 17, 2024 12:49:14.378323078 CEST6434253192.168.2.51.1.1.1
    Apr 17, 2024 12:49:14.589095116 CEST6495453192.168.2.51.1.1.1
    Apr 17, 2024 12:49:15.036900997 CEST53643421.1.1.1192.168.2.5
    Apr 17, 2024 12:49:15.472599030 CEST53649541.1.1.1192.168.2.5
    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
    Apr 17, 2024 12:49:14.378323078 CEST192.168.2.51.1.1.10xaa9fStandard query (0)res3.csasnet.netA (IP address)IN (0x0001)false
    Apr 17, 2024 12:49:14.589095116 CEST192.168.2.51.1.1.10xe466Standard query (0)res1.csasnet.comA (IP address)IN (0x0001)false
    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
    Apr 17, 2024 12:49:15.036900997 CEST1.1.1.1192.168.2.50xaa9fNo error (0)res3.csasnet.net115.236.153.254A (IP address)IN (0x0001)false
    Apr 17, 2024 12:49:15.036900997 CEST1.1.1.1192.168.2.50xaa9fNo error (0)res3.csasnet.net124.221.138.85A (IP address)IN (0x0001)false
    Apr 17, 2024 12:49:15.036900997 CEST1.1.1.1192.168.2.50xaa9fNo error (0)res3.csasnet.net103.192.208.126A (IP address)IN (0x0001)false
    Apr 17, 2024 12:49:15.472599030 CEST1.1.1.1192.168.2.50xe466No error (0)res1.csasnet.com115.236.153.253A (IP address)IN (0x0001)false
    Apr 17, 2024 12:49:15.472599030 CEST1.1.1.1192.168.2.50xe466No error (0)res1.csasnet.com124.221.138.85A (IP address)IN (0x0001)false
    Apr 17, 2024 12:49:15.472599030 CEST1.1.1.1192.168.2.50xe466No error (0)res1.csasnet.com45.124.76.254A (IP address)IN (0x0001)false

    Click to jump to process

    Click to jump to process

    Click to dive into process behavior distribution

    Click to jump to process

    Target ID:0
    Start time:12:49:03
    Start date:17/04/2024
    Path:C:\Windows\System32\loaddll32.exe
    Wow64 process (32bit):true
    Commandline:loaddll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dll"
    Imagebase:0x270000
    File size:126'464 bytes
    MD5 hash:51E6071F9CBA48E79F10C84515AAE618
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:1
    Start time:12:49:03
    Start date:17/04/2024
    Path:C:\Windows\System32\conhost.exe
    Wow64 process (32bit):false
    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Imagebase:0x7ff6d64d0000
    File size:862'208 bytes
    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:2
    Start time:12:49:03
    Start date:17/04/2024
    Path:C:\Windows\SysWOW64\cmd.exe
    Wow64 process (32bit):true
    Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dll",#1
    Imagebase:0x790000
    File size:236'544 bytes
    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:3
    Start time:12:49:03
    Start date:17/04/2024
    Path:C:\Windows\SysWOW64\rundll32.exe
    Wow64 process (32bit):true
    Commandline:rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dll,LoginPro
    Imagebase:0x230000
    File size:61'440 bytes
    MD5 hash:889B99C52A60DD49227C5E485A016679
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:4
    Start time:12:49:03
    Start date:17/04/2024
    Path:C:\Windows\SysWOW64\rundll32.exe
    Wow64 process (32bit):true
    Commandline:rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dll",#1
    Imagebase:0x230000
    File size:61'440 bytes
    MD5 hash:889B99C52A60DD49227C5E485A016679
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:6
    Start time:12:49:04
    Start date:17/04/2024
    Path:C:\Users\user\Desktop\clink410.exe
    Wow64 process (32bit):false
    Commandline:clink410.exe
    Imagebase:0xa70000
    File size:4'613'632 bytes
    MD5 hash:F91DD2C9AB406FCA3F15680779305DCC
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:low
    Has exited:true

    Target ID:7
    Start time:12:49:06
    Start date:17/04/2024
    Path:C:\Windows\SysWOW64\rundll32.exe
    Wow64 process (32bit):true
    Commandline:rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dll,LoginTYFw
    Imagebase:0x230000
    File size:61'440 bytes
    MD5 hash:889B99C52A60DD49227C5E485A016679
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:8
    Start time:12:49:06
    Start date:17/04/2024
    Path:C:\Users\user\Desktop\clink410.exe
    Wow64 process (32bit):false
    Commandline:clink410.exe
    Imagebase:0xa70000
    File size:4'613'632 bytes
    MD5 hash:F91DD2C9AB406FCA3F15680779305DCC
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:low
    Has exited:true

    Target ID:9
    Start time:12:49:09
    Start date:17/04/2024
    Path:C:\Windows\SysWOW64\rundll32.exe
    Wow64 process (32bit):true
    Commandline:rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dll,getXuhaoVal
    Imagebase:0x230000
    File size:61'440 bytes
    MD5 hash:889B99C52A60DD49227C5E485A016679
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:10
    Start time:12:49:09
    Start date:17/04/2024
    Path:C:\Users\user\Desktop\clink410.exe
    Wow64 process (32bit):false
    Commandline:clink410.exe
    Imagebase:0xa70000
    File size:4'613'632 bytes
    MD5 hash:F91DD2C9AB406FCA3F15680779305DCC
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:low
    Has exited:true

    Target ID:11
    Start time:12:49:12
    Start date:17/04/2024
    Path:C:\Windows\SysWOW64\rundll32.exe
    Wow64 process (32bit):true
    Commandline:rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dll",LoginPro
    Imagebase:0x230000
    File size:61'440 bytes
    MD5 hash:889B99C52A60DD49227C5E485A016679
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:12
    Start time:12:49:12
    Start date:17/04/2024
    Path:C:\Users\user\Desktop\clink410.exe
    Wow64 process (32bit):true
    Commandline:clink410.exe
    Imagebase:0xa70000
    File size:4'613'632 bytes
    MD5 hash:F91DD2C9AB406FCA3F15680779305DCC
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:low
    Has exited:false

    Target ID:13
    Start time:12:49:12
    Start date:17/04/2024
    Path:C:\Windows\SysWOW64\rundll32.exe
    Wow64 process (32bit):true
    Commandline:rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dll",LoginTYFw
    Imagebase:0x230000
    File size:61'440 bytes
    MD5 hash:889B99C52A60DD49227C5E485A016679
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:14
    Start time:12:49:12
    Start date:17/04/2024
    Path:C:\Windows\SysWOW64\rundll32.exe
    Wow64 process (32bit):true
    Commandline:rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dll",getXuhaoVal
    Imagebase:0x230000
    File size:61'440 bytes
    MD5 hash:889B99C52A60DD49227C5E485A016679
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:15
    Start time:12:49:12
    Start date:17/04/2024
    Path:C:\Windows\SysWOW64\rundll32.exe
    Wow64 process (32bit):true
    Commandline:rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dll",xtLoginTYFw
    Imagebase:0x230000
    File size:61'440 bytes
    MD5 hash:889B99C52A60DD49227C5E485A016679
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:16
    Start time:12:49:12
    Start date:17/04/2024
    Path:C:\Windows\SysWOW64\rundll32.exe
    Wow64 process (32bit):true
    Commandline:rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dll",getXuhaoVal2
    Imagebase:0x230000
    File size:61'440 bytes
    MD5 hash:889B99C52A60DD49227C5E485A016679
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Reset < >

      Execution Graph

      Execution Coverage:11.2%
      Dynamic/Decrypted Code Coverage:0%
      Signature Coverage:13.5%
      Total number of Nodes:222
      Total number of Limit Nodes:3
      execution_graph 879 be710b 882 bf144d 879->882 881 be7110 881->881 883 bf147d GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 882->883 884 bf1470 882->884 885 bf1474 883->885 884->883 884->885 885->881 606 bedd97 607 bedda0 __threadstartex@4 606->607 619 bf16a8 607->619 609 bedda6 __threadstartex@4 611 beddd9 ___crtIsPackagedApp 609->611 636 bf16c7 609->636 615 bede08 611->615 622 bedd3f 611->622 612 beddbc 613 beddcf GetCurrentThreadId 612->613 614 beddc2 GetLastError ExitThread 612->614 613->611 628 bedcd0 615->628 620 bf16bf TlsGetValue 619->620 621 bf16bb 619->621 620->609 621->609 623 bedd48 LoadLibraryExW GetProcAddress 622->623 624 bedd81 DecodePointer 622->624 625 bedd6a 623->625 626 bedd6b EncodePointer 623->626 627 bedd91 624->627 625->615 626->624 627->615 629 bedcdc _doexit 628->629 639 bf0a31 629->639 633 bedcf1 634 bf0765 __XcptFilter 9 API calls 633->634 635 bedd02 634->635 637 bf16dd 636->637 638 bf16e1 TlsSetValue 636->638 637->612 638->612 653 bf0a49 GetLastError 639->653 641 bf0a37 642 bedce1 641->642 667 be8299 641->667 644 bedd11 642->644 645 bf0a49 __getptd_noexit 9 API calls 644->645 647 bedd1a 645->647 646 bedd35 ExitThread 647->646 648 bedd2e 647->648 649 bedd29 647->649 873 bf09fb 648->873 868 bede14 649->868 652 bedd34 652->646 654 bf16a8 __getptd_noexit TlsGetValue 653->654 655 bf0a5e 654->655 656 bf0aac SetLastError 655->656 676 bf26ad 655->676 656->641 659 bf16c7 __getptd_noexit TlsSetValue 660 bf0a85 659->660 661 bf0a8b 660->661 662 bf0aa3 660->662 687 bf0ab8 661->687 681 be7954 662->681 665 bf0a93 GetCurrentThreadId 665->656 666 bf0aa9 666->656 705 bf11e6 667->705 671 be82a9 744 be8357 671->744 675 be82c0 675->642 678 bf26b4 676->678 677 bf0a71 677->656 677->659 678->677 680 bf26d2 678->680 680->677 680->678 693 bf1abf Sleep 680->693 682 be795d RtlFreeHeap 681->682 683 be7986 _free 681->683 682->683 684 be7972 682->684 683->666 694 beadb3 684->694 688 bf0ac4 _doexit 687->688 697 bf0b59 688->697 690 bf0b1b ___addlocaleref 700 bf0b62 690->700 692 bf0b4d _doexit 692->665 693->680 695 bf0a49 __getptd_noexit 9 API calls 694->695 696 be7978 GetLastError 695->696 696->683 703 bf44a3 LeaveCriticalSection 697->703 699 bf0b60 699->690 704 bf44a3 LeaveCriticalSection 700->704 702 bf0b69 702->692 703->699 704->702 765 bf140d 705->765 707 bf11ed 708 bf11fa 707->708 710 bf140d __FF_MSGBANNER 18 API calls 707->710 709 bf1243 __NMSG_WRITE 43 API calls 708->709 712 be82a1 708->712 711 bf1212 709->711 710->708 713 bf1243 __NMSG_WRITE 43 API calls 711->713 714 bf1243 712->714 713->712 715 bf1261 __NMSG_WRITE 714->715 716 bf1388 715->716 718 bf140d __FF_MSGBANNER 18 API calls 715->718 717 be7115 ___crtMessageBoxW 6 API calls 716->717 719 bf13f1 717->719 720 bf1274 718->720 719->671 721 bf138d GetStdHandle 720->721 722 bf140d __FF_MSGBANNER 18 API calls 720->722 721->716 725 bf139b _strlen 721->725 723 bf1285 722->723 723->721 724 bf1297 723->724 724->716 803 bede64 724->803 725->716 727 bf13d4 WriteFile 725->727 727->716 729 bf13f5 732 bf22f4 __invoke_watson 8 API calls 729->732 730 bf12c4 GetModuleFileNameW 731 bf12e4 730->731 736 bf12f4 __NMSG_WRITE 730->736 733 bede64 __NMSG_WRITE 18 API calls 731->733 734 bf13ff 732->734 733->736 734->671 735 bf133a 735->729 821 beaa48 735->821 736->729 736->735 812 bedec0 736->812 740 beaa48 __NMSG_WRITE 18 API calls 741 bf1371 740->741 741->729 742 bf1378 741->742 830 bfe6f5 EncodePointer 742->830 745 be840d _doexit 11 API calls 744->745 746 be82b4 745->746 747 be840d 746->747 748 be8419 _doexit 747->748 749 be844e DecodePointer 748->749 751 be84d9 __initterm 748->751 749->751 752 be8465 DecodePointer 749->752 855 be8527 751->855 764 be8475 752->764 755 be8536 _doexit 755->675 756 be8482 EncodePointer 756->764 757 be851e 758 be8527 757->758 860 be8283 757->860 760 be8534 758->760 863 bf44a3 LeaveCriticalSection 758->863 760->675 761 be8492 DecodePointer EncodePointer 763 be84a4 DecodePointer DecodePointer 761->763 763->764 764->751 764->756 764->761 766 bf1417 765->766 767 bf1421 766->767 768 beadb3 _free 9 API calls 766->768 767->707 769 bf143d 768->769 772 bf22e4 769->772 775 bf22b9 DecodePointer 772->775 776 bf22cc 775->776 781 bf22f4 IsProcessorFeaturePresent 776->781 779 bf22b9 __NMSG_WRITE 8 API calls 780 bf1448 779->780 780->707 782 bf22ff 781->782 787 bf2187 782->787 786 bf22e3 786->779 788 bf21a1 _memset __call_reportfault 787->788 789 bf21c1 IsDebuggerPresent 788->789 795 bf1ae2 SetUnhandledExceptionFilter UnhandledExceptionFilter 789->795 791 bf2285 __call_reportfault 796 be7115 791->796 793 bf22a8 794 bf1acd GetCurrentProcess TerminateProcess 793->794 794->786 795->791 797 be711f IsProcessorFeaturePresent 796->797 798 be711d 796->798 800 be85d2 797->800 798->793 801 be8581 ___raise_securityfailure 5 API calls 800->801 802 be86b5 801->802 802->793 804 bede6f 803->804 805 bede7d 803->805 804->805 810 bede96 804->810 806 beadb3 _free 9 API calls 805->806 807 bede87 806->807 808 bf22e4 __NMSG_WRITE 9 API calls 807->808 809 bede91 808->809 809->729 809->730 810->809 811 beadb3 _free 9 API calls 810->811 811->807 814 bedece 812->814 813 beded2 815 beadb3 _free 9 API calls 813->815 816 beded7 813->816 814->813 814->816 819 bedf11 814->819 817 bedf02 815->817 816->735 818 bf22e4 __NMSG_WRITE 9 API calls 817->818 818->816 819->816 820 beadb3 _free 9 API calls 819->820 820->817 822 beaa62 821->822 825 beaa54 821->825 823 beadb3 _free 9 API calls 822->823 824 beaa6c 823->824 826 bf22e4 __NMSG_WRITE 9 API calls 824->826 825->822 828 beaa8e 825->828 827 beaa76 826->827 827->729 827->740 828->827 829 beadb3 _free 9 API calls 828->829 829->824 831 bfe729 ___crtIsPackagedApp 830->831 832 bfe7e8 IsDebuggerPresent 831->832 833 bfe738 LoadLibraryExW 831->833 836 bfe80d 832->836 837 bfe7f2 832->837 834 bfe74f GetLastError 833->834 835 bfe775 GetProcAddress 833->835 840 bfe75e LoadLibraryExW 834->840 845 bfe805 834->845 841 bfe789 7 API calls 835->841 835->845 838 bfe800 836->838 839 bfe812 DecodePointer 836->839 837->838 842 bfe7f9 OutputDebugStringW 837->842 838->845 849 bfe839 DecodePointer DecodePointer 838->849 854 bfe851 838->854 839->845 840->835 840->845 843 bfe7e5 841->843 844 bfe7d1 GetProcAddress EncodePointer 841->844 842->838 843->832 844->843 848 be7115 ___crtMessageBoxW 6 API calls 845->848 846 bfe875 DecodePointer 846->845 847 bfe889 DecodePointer 847->846 850 bfe890 847->850 851 bfe8d7 848->851 849->854 850->846 853 bfe8a1 DecodePointer 850->853 851->716 853->846 854->846 854->847 856 be852d 855->856 857 be8507 855->857 864 bf44a3 LeaveCriticalSection 856->864 857->755 859 bf44a3 LeaveCriticalSection 857->859 859->757 865 be824f GetModuleHandleExW 860->865 863->760 864->857 866 be827a ExitProcess 865->866 867 be8268 GetProcAddress 865->867 867->866 869 bede1d LoadLibraryExW GetProcAddress 868->869 870 bede55 DecodePointer 868->870 871 bede3f EncodePointer 869->871 872 bede63 869->872 870->872 871->870 872->648 874 bf0a08 873->874 878 bf0a26 873->878 875 bf0a16 874->875 876 bf16a8 __getptd_noexit TlsGetValue 874->876 877 bf16c7 __getptd_noexit TlsSetValue 875->877 876->875 877->878 878->652

      Callgraph

      • Executed
      • Not Executed
      • Opacity -> Relevance
      • Disassembly available
      callgraph 0 Function_00BF1ABF 1 Function_00BEDD3F 2 Function_00BF22B9 2->2 31 Function_00BF22F4 2->31 3 Function_00BF0AB8 7 Function_00BF1E2D 3->7 18 Function_00BEC110 3->18 38 Function_00BF0B62 3->38 39 Function_00BF0B59 3->39 42 Function_00BEC155 3->42 4 Function_00BEAAB4 5 Function_00BEADB3 47 Function_00BF0A49 5->47 6 Function_00BF0A31 14 Function_00BE8299 6->14 6->47 8 Function_00BF26AD 8->0 9 Function_00BF16A8 10 Function_00BE8527 11 Function_00BF44A3 10->11 12 Function_00BE83A3 13 Function_00BF121F 22 Function_00BE840D 14->22 33 Function_00BF11E6 14->33 40 Function_00BE8357 14->40 51 Function_00BF1243 14->51 15 Function_00BEDD97 15->1 15->9 20 Function_00BF178E 15->20 43 Function_00BEDCD0 15->43 50 Function_00BF16C7 15->50 53 Function_00BF08C0 15->53 16 Function_00BEDE14 17 Function_00BE7115 28 Function_00BE8581 17->28 19 Function_00BEDD11 19->16 29 Function_00BF09FB 19->29 19->47 21 Function_00BF140D 21->5 36 Function_00BF22E4 21->36 22->10 22->11 22->12 22->18 25 Function_00BE8283 22->25 22->42 23 Function_00BE710B 46 Function_00BF144D 23->46 24 Function_00BF2187 24->17 27 Function_00BEB300 24->27 32 Function_00BF4F6E 24->32 37 Function_00BF1AE2 24->37 44 Function_00BE824F 25->44 26 Function_00BEDF80 28->32 28->37 45 Function_00BF1ACD 28->45 29->9 29->50 30 Function_00BFE6F5 30->17 30->20 31->24 31->45 33->21 33->51 34 Function_00BEDE64 34->5 34->36 35 Function_00BF0765 35->47 36->2 38->11 39->11 40->22 41 Function_00BE7954 41->5 49 Function_00BEADC6 41->49 43->6 43->18 43->19 43->35 47->3 47->8 47->9 47->41 47->50 48 Function_00BEAA48 48->5 48->36 51->4 51->13 51->17 51->21 51->26 51->30 51->31 51->34 51->48 52 Function_00BEDEC0 51->52 52->5 52->36

      Control-flow Graph

      APIs
      • __getptd_noexit.LIBCMT ref: 00BEDD15
        • Part of subcall function 00BF0A49: GetLastError.KERNEL32(?,00000000,00BF0A37,00000000,00BEDCE1,00C94EE8,0000000C,00BEDE13,?), ref: 00BF0A4B
        • Part of subcall function 00BF0A49: __calloc_crt.LIBCMT ref: 00BF0A6C
        • Part of subcall function 00BF0A49: __initptd.LIBCMT ref: 00BF0A8E
        • Part of subcall function 00BF0A49: GetCurrentThreadId.KERNEL32 ref: 00BF0A95
        • Part of subcall function 00BF0A49: SetLastError.KERNEL32(00000000,00000000,00BF0A37,00000000,00BEDCE1,00C94EE8,0000000C,00BEDE13,?), ref: 00BF0AAD
      • __freeptd.LIBCMT ref: 00BEDD2F
        • Part of subcall function 00BEDE14: LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,00BEDD2E), ref: 00BEDE2E
        • Part of subcall function 00BEDE14: GetProcAddress.KERNEL32(00000000), ref: 00BEDE35
        • Part of subcall function 00BEDE14: EncodePointer.KERNEL32(00000000), ref: 00BEDE40
        • Part of subcall function 00BEDE14: DecodePointer.KERNEL32(00BEDD2E), ref: 00BEDE5B
      • ExitThread.KERNEL32 ref: 00BEDD38
      Memory Dump Source
      • Source File: 0000000C.00000002.3318444437.0000000000A71000.00000020.00000001.01000000.00000005.sdmp, Offset: 00A70000, based on PE: true
      • Associated: 0000000C.00000002.3318422139.0000000000A70000.00000002.00000001.01000000.00000005.sdmpDownload File
      • Associated: 0000000C.00000002.3318655352.0000000000C38000.00000002.00000001.01000000.00000005.sdmpDownload File
      • Associated: 0000000C.00000002.3318739313.0000000000C9B000.00000004.00000001.01000000.00000005.sdmpDownload File
      • Associated: 0000000C.00000002.3318761261.0000000000C9E000.00000008.00000001.01000000.00000005.sdmpDownload File
      • Associated: 0000000C.00000002.3318781669.0000000000CA3000.00000004.00000001.01000000.00000005.sdmpDownload File
      • Associated: 0000000C.00000002.3318781669.0000000000CAB000.00000004.00000001.01000000.00000005.sdmpDownload File
      • Associated: 0000000C.00000002.3318824471.0000000000CAE000.00000002.00000001.01000000.00000005.sdmpDownload File
      • Associated: 0000000C.00000002.3318824471.0000000000EA1000.00000002.00000001.01000000.00000005.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_12_2_a70000_clink410.jbxd
      Similarity
      • API ID: ErrorLastPointerThread$AddressCurrentDecodeEncodeExitLibraryLoadProc__calloc_crt__freeptd__getptd_noexit__initptd
      • String ID:
      • API String ID: 21986956-0
      • Opcode ID: c6aeffb269254a3e8bf32e6740889ca3bbcfb6c01fdda354c2ba0d9f4becb35b
      • Instruction ID: 493a80b441b7b0d70e9434f6fc281a99a4e63d9b683fcd13f0d8406858ae7c0d
      • Opcode Fuzzy Hash: c6aeffb269254a3e8bf32e6740889ca3bbcfb6c01fdda354c2ba0d9f4becb35b
      • Instruction Fuzzy Hash: 74D0A935402B28BBC6223BABCC0A7AE76DCCF00B01F0041A8F9000A1339FB89D8581E6
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 10 bedcd0-bedd04 call bec110 call bf0a31 call bedd11 call bf0765
      APIs
        • Part of subcall function 00BF0A31: __getptd_noexit.LIBCMT ref: 00BF0A32
        • Part of subcall function 00BEDD11: __getptd_noexit.LIBCMT ref: 00BEDD15
        • Part of subcall function 00BEDD11: __freeptd.LIBCMT ref: 00BEDD2F
        • Part of subcall function 00BEDD11: ExitThread.KERNEL32 ref: 00BEDD38
      • __XcptFilter.LIBCMT ref: 00BEDCFD
        • Part of subcall function 00BF0765: __getptd_noexit.LIBCMT ref: 00BF0769
      Memory Dump Source
      • Source File: 0000000C.00000002.3318444437.0000000000A71000.00000020.00000001.01000000.00000005.sdmp, Offset: 00A70000, based on PE: true
      • Associated: 0000000C.00000002.3318422139.0000000000A70000.00000002.00000001.01000000.00000005.sdmpDownload File
      • Associated: 0000000C.00000002.3318655352.0000000000C38000.00000002.00000001.01000000.00000005.sdmpDownload File
      • Associated: 0000000C.00000002.3318739313.0000000000C9B000.00000004.00000001.01000000.00000005.sdmpDownload File
      • Associated: 0000000C.00000002.3318761261.0000000000C9E000.00000008.00000001.01000000.00000005.sdmpDownload File
      • Associated: 0000000C.00000002.3318781669.0000000000CA3000.00000004.00000001.01000000.00000005.sdmpDownload File
      • Associated: 0000000C.00000002.3318781669.0000000000CAB000.00000004.00000001.01000000.00000005.sdmpDownload File
      • Associated: 0000000C.00000002.3318824471.0000000000CAE000.00000002.00000001.01000000.00000005.sdmpDownload File
      • Associated: 0000000C.00000002.3318824471.0000000000EA1000.00000002.00000001.01000000.00000005.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_12_2_a70000_clink410.jbxd
      Similarity
      • API ID: __getptd_noexit$ExitFilterThreadXcpt__freeptd
      • String ID:
      • API String ID: 1337255599-0
      • Opcode ID: 9923ad6dba1e531fbd98db9a2ac90609db9e64aba67aadddf79c3fbb8fcbfd4d
      • Instruction ID: d50ee27179a53dc195b019f9bfae0a2f7c074682fca74d314c838e953db6d7d7
      • Opcode Fuzzy Hash: 9923ad6dba1e531fbd98db9a2ac90609db9e64aba67aadddf79c3fbb8fcbfd4d
      • Instruction Fuzzy Hash: 04E0ECB59506049FDB08FBA1C94AE2E77B4EF44701F2004D8F101AB2B2DB75AD459B21
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      APIs
      • SetUnhandledExceptionFilter.KERNEL32(00000000,?,00BF2285,?), ref: 00BF1AE7
      • UnhandledExceptionFilter.KERNEL32(?), ref: 00BF1AF0
      Memory Dump Source
      • Source File: 0000000C.00000002.3318444437.0000000000A71000.00000020.00000001.01000000.00000005.sdmp, Offset: 00A70000, based on PE: true
      • Associated: 0000000C.00000002.3318422139.0000000000A70000.00000002.00000001.01000000.00000005.sdmpDownload File
      • Associated: 0000000C.00000002.3318655352.0000000000C38000.00000002.00000001.01000000.00000005.sdmpDownload File
      • Associated: 0000000C.00000002.3318739313.0000000000C9B000.00000004.00000001.01000000.00000005.sdmpDownload File
      • Associated: 0000000C.00000002.3318761261.0000000000C9E000.00000008.00000001.01000000.00000005.sdmpDownload File
      • Associated: 0000000C.00000002.3318781669.0000000000CA3000.00000004.00000001.01000000.00000005.sdmpDownload File
      • Associated: 0000000C.00000002.3318781669.0000000000CAB000.00000004.00000001.01000000.00000005.sdmpDownload File
      • Associated: 0000000C.00000002.3318824471.0000000000CAE000.00000002.00000001.01000000.00000005.sdmpDownload File
      • Associated: 0000000C.00000002.3318824471.0000000000EA1000.00000002.00000001.01000000.00000005.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_12_2_a70000_clink410.jbxd
      Similarity
      • API ID: ExceptionFilterUnhandled
      • String ID:
      • API String ID: 3192549508-0
      • Opcode ID: a1f604e1448dea1be8d6f67223db6aa6fbc90373ac6ace4c1790f37565a07464
      • Instruction ID: 1020487e6aeab5eab54bbf7866f71f46e04c9b835c8cd8770e0ba2b7ae124376
      • Opcode Fuzzy Hash: a1f604e1448dea1be8d6f67223db6aa6fbc90373ac6ace4c1790f37565a07464
      • Instruction Fuzzy Hash: 03B09231064308ABCB002B91EC09B5C7F2CEB05656F004010F60D440618F7265168AA9
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 62 bedd3f-bedd46 63 bedd48-bedd68 LoadLibraryExW GetProcAddress 62->63 64 bedd81-bedd96 DecodePointer 62->64 65 bedd6a 63->65 66 bedd6b-bedd77 EncodePointer 63->66 66->64
      APIs
      • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoInitialize,00BEDE08,?), ref: 00BEDD59
      • GetProcAddress.KERNEL32(00000000), ref: 00BEDD60
      • EncodePointer.KERNEL32(00000000), ref: 00BEDD6C
      • DecodePointer.KERNEL32(00000001,00BEDE08,?), ref: 00BEDD89
      Strings
      Memory Dump Source
      • Source File: 0000000C.00000002.3318444437.0000000000A71000.00000020.00000001.01000000.00000005.sdmp, Offset: 00A70000, based on PE: true
      • Associated: 0000000C.00000002.3318422139.0000000000A70000.00000002.00000001.01000000.00000005.sdmpDownload File
      • Associated: 0000000C.00000002.3318655352.0000000000C38000.00000002.00000001.01000000.00000005.sdmpDownload File
      • Associated: 0000000C.00000002.3318739313.0000000000C9B000.00000004.00000001.01000000.00000005.sdmpDownload File
      • Associated: 0000000C.00000002.3318761261.0000000000C9E000.00000008.00000001.01000000.00000005.sdmpDownload File
      • Associated: 0000000C.00000002.3318781669.0000000000CA3000.00000004.00000001.01000000.00000005.sdmpDownload File
      • Associated: 0000000C.00000002.3318781669.0000000000CAB000.00000004.00000001.01000000.00000005.sdmpDownload File
      • Associated: 0000000C.00000002.3318824471.0000000000CAE000.00000002.00000001.01000000.00000005.sdmpDownload File
      • Associated: 0000000C.00000002.3318824471.0000000000EA1000.00000002.00000001.01000000.00000005.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_12_2_a70000_clink410.jbxd
      Similarity
      • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
      • String ID: RoInitialize$combase.dll
      • API String ID: 3489934621-340411864
      • Opcode ID: dbbaf26ea593f64ffc3047dbff210f9105c4384baa390aa7d1e2d7be3eece6b8
      • Instruction ID: a8335ace4879039d6229740cdbc1d62324333eeea845670ae799d81b50325582
      • Opcode Fuzzy Hash: dbbaf26ea593f64ffc3047dbff210f9105c4384baa390aa7d1e2d7be3eece6b8
      • Instruction Fuzzy Hash: 21E0E5746A1341ABDA781B65AC4DB1936A8E745B1AF008034B111D21B0CFB4418D8F10
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 68 bede14-bede1b 69 bede1d-bede3d LoadLibraryExW GetProcAddress 68->69 70 bede55-bede5b DecodePointer 68->70 71 bede3f-bede4b EncodePointer 69->71 72 bede63 69->72 70->72 71->70
      APIs
      • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,00BEDD2E), ref: 00BEDE2E
      • GetProcAddress.KERNEL32(00000000), ref: 00BEDE35
      • EncodePointer.KERNEL32(00000000), ref: 00BEDE40
      • DecodePointer.KERNEL32(00BEDD2E), ref: 00BEDE5B
      Strings
      Memory Dump Source
      • Source File: 0000000C.00000002.3318444437.0000000000A71000.00000020.00000001.01000000.00000005.sdmp, Offset: 00A70000, based on PE: true
      • Associated: 0000000C.00000002.3318422139.0000000000A70000.00000002.00000001.01000000.00000005.sdmpDownload File
      • Associated: 0000000C.00000002.3318655352.0000000000C38000.00000002.00000001.01000000.00000005.sdmpDownload File
      • Associated: 0000000C.00000002.3318739313.0000000000C9B000.00000004.00000001.01000000.00000005.sdmpDownload File
      • Associated: 0000000C.00000002.3318761261.0000000000C9E000.00000008.00000001.01000000.00000005.sdmpDownload File
      • Associated: 0000000C.00000002.3318781669.0000000000CA3000.00000004.00000001.01000000.00000005.sdmpDownload File
      • Associated: 0000000C.00000002.3318781669.0000000000CAB000.00000004.00000001.01000000.00000005.sdmpDownload File
      • Associated: 0000000C.00000002.3318824471.0000000000CAE000.00000002.00000001.01000000.00000005.sdmpDownload File
      • Associated: 0000000C.00000002.3318824471.0000000000EA1000.00000002.00000001.01000000.00000005.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_12_2_a70000_clink410.jbxd
      Similarity
      • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
      • String ID: RoUninitialize$combase.dll
      • API String ID: 3489934621-2819208100
      • Opcode ID: 50044b065c11ff19c4f48cec3603ecc4faf1163c174cd567b9d93e3bb8fd160b
      • Instruction ID: 9f82dabc9134882f61d704b7b08ec50de5da33e8c95232fe5cab6d6212dd69fc
      • Opcode Fuzzy Hash: 50044b065c11ff19c4f48cec3603ecc4faf1163c174cd567b9d93e3bb8fd160b
      • Instruction Fuzzy Hash: 1CE092B0A92341ABDFA95F60ED4DB0A7BA8B705B19F100864B101D62F0CFB4850C8F20
      Uniqueness

      Uniqueness Score: -1.00%