Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
ZlucX8xpYB.dll

Overview

General Information

Sample name:ZlucX8xpYB.dll
renamed because original name is a hash value
Original sample name:f33f55bc2eeb3926459be0ee9dcb024f27e31b752a5dbb753c546ce46684503c.dll
Analysis ID:1447643
MD5:36ae45161a9e2b60025b91fae42f1352
SHA1:8e0faf735dfbed33027803db4fbb99321b3a25fb
SHA256:f33f55bc2eeb3926459be0ee9dcb024f27e31b752a5dbb753c546ce46684503c
Tags:dllvenomrat
Infos:

Detection

AsyncRAT, DarkTortilla
Score:80
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected AsyncRAT
Yara detected DarkTortilla Crypter
Machine Learning detection for sample
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Binary contains a suspicious time stamp
Creates a process in suspended mode (likely to inject code)
Program does not show much activity (idle)
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Yara signature match

Classification

  • System is w10x64
  • loaddll32.exe (PID: 6808 cmdline: loaddll32.exe "C:\Users\user\Desktop\ZlucX8xpYB.dll" MD5: 51E6071F9CBA48E79F10C84515AAE618)
    • conhost.exe (PID: 3328 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 4588 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\ZlucX8xpYB.dll",#1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • rundll32.exe (PID: 4416 cmdline: rundll32.exe "C:\Users\user\Desktop\ZlucX8xpYB.dll",#1 MD5: 889B99C52A60DD49227C5E485A016679)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
AsyncRATAsyncRAT is a Remote Access Tool (RAT) designed to remotely monitor and control other computers through a secure encrypted connection. It is an open source remote administration tool, however, it could also be used maliciously because it provides functionality such as keylogger, remote desktop control, and many other functions that may cause harm to the victims computer. In addition, AsyncRAT can be delivered via various methods such as spear-phishing, malvertising, exploit kit and other techniques.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.asyncrat
NameDescriptionAttributionBlogpost URLsLink
DarkTortillaDarkTortilla is a complex and highly configurable .NET-based crypter that has possibly been active since at least August 2015. It typically delivers popular information stealers and remote access trojans (RATs) such as AgentTesla, AsyncRat, NanoCore, and RedLine. While it appears to primarily deliver commodity malware, Secureworks Counter Threat Unit (CTU) researchers identified DarkTortilla samples delivering targeted payloads such as Cobalt Strike and Metasploit. It can also deliver "addon packages" such as additional malicious payloads, benign decoy documents, and executables. It features robust anti-analysis and anti-tamper controls that can make detection, analysis, and eradication challenging.From January 2021 through May 2022, an average of 93 unique DarkTortilla samples per week were uploaded to the VirusTotal analysis service. Code similarities suggest possible links between DarkTortilla and other malware: a crypter operated by the RATs Crew threat group, which was active between 2008 and 2012, and the Gameloader malware that emerged in 2021.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.darktortilla
No configs have been found
SourceRuleDescriptionAuthorStrings
ZlucX8xpYB.dllJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
    ZlucX8xpYB.dllJoeSecurity_DarkTortillaYara detected DarkTortilla CrypterJoe Security
      ZlucX8xpYB.dllINDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDeviceDetects executables attemping to enumerate video devices using WMIditekSHen
      • 0x1df861:$q1: Select * from Win32_CacheMemory
      • 0x1f2361:$q1: Select * from Win32_CacheMemory
      • 0x204e99:$q1: Select * from Win32_CacheMemory
      • 0x217caf:$q1: Select * from Win32_CacheMemory
      • 0x1df8a1:$d1: {860BB310-5D01-11d0-BD3B-00A0C911CE86}
      • 0x1f23a1:$d1: {860BB310-5D01-11d0-BD3B-00A0C911CE86}
      • 0x204ed9:$d1: {860BB310-5D01-11d0-BD3B-00A0C911CE86}
      • 0x217cef:$d1: {860BB310-5D01-11d0-BD3B-00A0C911CE86}
      • 0x1df8ef:$d2: {62BE5D10-60EB-11d0-BD3B-00A0C911CE86}
      • 0x1f23ef:$d2: {62BE5D10-60EB-11d0-BD3B-00A0C911CE86}
      • 0x204f27:$d2: {62BE5D10-60EB-11d0-BD3B-00A0C911CE86}
      • 0x217d3d:$d2: {62BE5D10-60EB-11d0-BD3B-00A0C911CE86}
      • 0x1df93d:$d3: {55272A00-42CB-11CE-8135-00AA004BB851}
      • 0x1f243d:$d3: {55272A00-42CB-11CE-8135-00AA004BB851}
      • 0x204f75:$d3: {55272A00-42CB-11CE-8135-00AA004BB851}
      • 0x217d8b:$d3: {55272A00-42CB-11CE-8135-00AA004BB851}
      No Sigma rule has matched
      No Snort rule has matched

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: ZlucX8xpYB.dllVirustotal: Detection: 21%Perma Link
      Source: ZlucX8xpYB.dllJoe Sandbox ML: detected
      Source: ZlucX8xpYB.dllStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL
      Source: ZlucX8xpYB.dllStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

      Key, Mouse, Clipboard, Microphone and Screen Capturing

      barindex
      Source: Yara matchFile source: ZlucX8xpYB.dll, type: SAMPLE

      System Summary

      barindex
      Source: ZlucX8xpYB.dll, type: SAMPLEMatched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen
      Source: ZlucX8xpYB.dllBinary or memory string: OriginalFilenameClientx64.exe" vs ZlucX8xpYB.dll
      Source: ZlucX8xpYB.dllStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL
      Source: ZlucX8xpYB.dll, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI
      Source: classification engineClassification label: mal80.troj.evad.winDLL@6/0@0/0
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3328:120:WilError_03
      Source: ZlucX8xpYB.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: ZlucX8xpYB.dllStatic file information: TRID: Win32 Dynamic Link Library (generic) Net Framework (1011504/3) 49.81%
      Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\ZlucX8xpYB.dll",#1
      Source: ZlucX8xpYB.dllVirustotal: Detection: 21%
      Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\ZlucX8xpYB.dll"
      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\ZlucX8xpYB.dll",#1
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\ZlucX8xpYB.dll",#1
      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\ZlucX8xpYB.dll",#1Jump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\ZlucX8xpYB.dll",#1Jump to behavior
      Source: C:\Windows\System32\loaddll32.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Windows\System32\loaddll32.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
      Source: ZlucX8xpYB.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
      Source: ZlucX8xpYB.dllStatic file information: File size 2513743 > 1048576
      Source: ZlucX8xpYB.dllStatic PE information: Raw size of .reloc is bigger than: 0x100000 < 0x223b4f
      Source: ZlucX8xpYB.dllStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

      Data Obfuscation

      barindex
      Source: Yara matchFile source: ZlucX8xpYB.dll, type: SAMPLE
      Source: ZlucX8xpYB.dllStatic PE information: 0xD3B90B0C [Fri Jul 24 11:52:44 2082 UTC]

      Boot Survival

      barindex
      Source: Yara matchFile source: ZlucX8xpYB.dll, type: SAMPLE
      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

      Malware Analysis System Evasion

      barindex
      Source: Yara matchFile source: ZlucX8xpYB.dll, type: SAMPLE
      Source: ZlucX8xpYB.dllBinary or memory string: TASKMGR.EXE#PROCESSHACKER.EXE
      Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 120000Jump to behavior
      Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\ZlucX8xpYB.dll",#1Jump to behavior

      Lowering of HIPS / PFW / Operating System Security Settings

      barindex
      Source: Yara matchFile source: ZlucX8xpYB.dll, type: SAMPLE
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
      Scheduled Task/Job
      1
      Scheduled Task/Job
      11
      Process Injection
      1
      Rundll32
      OS Credential Dumping1
      Security Software Discovery
      Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault AccountsScheduled Task/Job1
      DLL Side-Loading
      1
      Scheduled Task/Job
      1
      Virtualization/Sandbox Evasion
      LSASS Memory1
      Virtualization/Sandbox Evasion
      Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
      DLL Side-Loading
      11
      Process Injection
      Security Account Manager1
      System Information Discovery
      SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
      Timestomp
      NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
      DLL Side-Loading
      LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
      Obfuscated Files or Information
      Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet
      behaviorgraph top1 signatures2 2 Behavior Graph ID: 1447643 Sample: ZlucX8xpYB.dll Startdate: 26/05/2024 Architecture: WINDOWS Score: 80 15 Malicious sample detected (through community Yara rule) 2->15 17 Multi AV Scanner detection for submitted file 2->17 19 Yara detected DarkTortilla Crypter 2->19 21 3 other signatures 2->21 7 loaddll32.exe 1 2->7         started        process3 process4 9 cmd.exe 1 7->9         started        11 conhost.exe 7->11         started        process5 13 rundll32.exe 9->13         started       

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      ZlucX8xpYB.dll22%VirustotalBrowse
      ZlucX8xpYB.dll100%Joe Sandbox ML
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      No contacted domains info
      No contacted IP infos
      Joe Sandbox version:40.0.0 Tourmaline
      Analysis ID:1447643
      Start date and time:2024-05-26 09:53:06 +02:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 1m 58s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Number of analysed new started processes analysed:4
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:ZlucX8xpYB.dll
      renamed because original name is a hash value
      Original Sample Name:f33f55bc2eeb3926459be0ee9dcb024f27e31b752a5dbb753c546ce46684503c.dll
      Detection:MAL
      Classification:mal80.troj.evad.winDLL@6/0@0/0
      EGA Information:Failed
      HCA Information:
      • Successful, ratio: 100%
      • Number of executed functions: 0
      • Number of non-executed functions: 0
      Cookbook Comments:
      • Found application associated with file extension: .dll
      • Stop behavior analysis, all processes terminated
      • Not all processes where analyzed, report is missing behavior information
      TimeTypeDescription
      03:53:54API Interceptor1x Sleep call for process: loaddll32.exe modified
      No context
      No context
      No context
      No context
      No context
      No created / dropped files found
      File type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
      Entropy (8bit):5.118282097496742
      TrID:
      • Win32 Dynamic Link Library (generic) Net Framework (1011504/3) 49.81%
      • Win32 Dynamic Link Library (generic) (1002004/3) 49.34%
      • Windows Screen Saver (13104/52) 0.65%
      • Generic Win/DOS Executable (2004/3) 0.10%
      • DOS Executable Generic (2002/1) 0.10%
      File name:ZlucX8xpYB.dll
      File size:2'513'743 bytes
      MD5:36ae45161a9e2b60025b91fae42f1352
      SHA1:8e0faf735dfbed33027803db4fbb99321b3a25fb
      SHA256:f33f55bc2eeb3926459be0ee9dcb024f27e31b752a5dbb753c546ce46684503c
      SHA512:b69b55d8e0b9e5ec85dee62c5a146362c7f735e3d1b85b13841357b9d9fd22c7aeff21b118965d12b906cde642b12c3cc339b7931672ee508774ea4988dff1ce
      SSDEEP:24576:BLYWtE02Ew7cnLt3t7tPEI2qasfsFQwusvB+jW8eydsvTj+pZBuZBDZBqZBp:B3dpsQwL8eK3A7I
      TLSH:B3C56B0CEE69851CED3D43F0CCF506719773A689A9258B0F1BE411992BA224EBF935F1
      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..................!..P.................. ........... ... ..................O[&...........`................................
      Icon Hash:7ae282899bbab082
      Entrypoint:0x1003f8be
      Entrypoint Section:.text
      Digitally signed:false
      Imagebase:0x10000000
      Subsystem:windows cui
      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL
      DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Time Stamp:0xD3B90B0C [Fri Jul 24 11:52:44 2082 UTC]
      TLS Callbacks:
      CLR (.Net) Version:
      OS Version Major:4
      OS Version Minor:0
      File Version Major:4
      File Version Minor:0
      Subsystem Version Major:4
      Subsystem Version Minor:0
      Import Hash:82d7ac56626e8ad4c66fc376101214b1
      Instruction
      add byte ptr [eax], al
      sub ah, byte ptr [ecx]
      pop es
      add byte ptr [eax], al
      add byte ptr [eax], al
      sub byte ptr [ebx], 00000021h
      pop es
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      jo 00007F9A24DAB23Fh
      cdq
      and dword ptr [eax], eax
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add ah, ah
      push esp
      retf
      cmp eax, 01D81D7Bh
      add eax, dword ptr [eax+eax]
      add byte ptr [eax], al
      add byte ptr [eax], al
      jo 00007F9A24DAB1F1h
      fstp tbyte ptr [ebp+00007FF8h]
      cld
      add al, 00h
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax+ecx], dh
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      or dword ptr [eax], eax
      add byte ptr [eax], al
      or byte ptr [eax], al
      add byte ptr [eax], al
      xor eax, 05000000h
      add byte ptr [eax], al
      add byte ptr [edi], cl
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add al, bl
      mov cl, 9Ah
      and dword ptr [eax], eax
      add byte ptr [eax], al
      add byte ptr [eax-11h], dh
      fstp tbyte ptr [ebp+00007FF8h]
      xor al, 08h
      add byte ptr [eax], al
      cld
      add al, 00h
      add byte ptr [eax], cl
      add byte ptr [eax], al
      add byte ptr [ecx], cl
      add byte ptr [eax], al
      add byte ptr [08000000h], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax+3Dh], dh
      cdq
      and dword ptr [eax], eax
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [ecx-7Ch], cl
      aam 3Dh
      jnp 00007F9A24DAB21Fh
      NameVirtual AddressVirtual Size Is in Section
      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IMPORT0x25eed80x4d40.reloc
      IMAGE_DIRECTORY_ENTRY_RESOURCE0x400000x388.rsrc
      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
      IMAGE_DIRECTORY_ENTRY_BASERELOC0x420000xc.reloc
      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
      .text0x20000x3e0000x3e00015dabdb963da0d2216045d664b96cc35False0.22340836063508066data3.548432326683568IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      .rsrc0x400000x20000x200011389f87ddb3f5620d6c6b5aa0726c77False0.2283935546875Matlab v4 mat-file (little endian) \370\177, numeric, rows 0, columns 5637862002.819623851037314IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .reloc0x420000x223b4f0x223b4f5f672960c322e148227b3c6f32a6d442unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
      DLLImport
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllTermsrvSetValueKey
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      gdi32.dllCreateHatchBrush
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllCreateHardLinkTransactedA
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllTermsrvSetValueKey
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllBasep8BitStringToDynamicUnicodeString
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllRegEnumValueW
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      mscoree.dllStrongNameErrorInfo
      mscoree.dllStrongNameErrorInfo
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllBeginUpdateResourceA
      kernel32.dllCreateHardLinkTransactedA
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllTermsrvSetValueKey
      kernel32.dllTermsrvSetValueKey
      kernel32.dllTermsrvSetValueKey
      kernel32.dllTermsrvSetValueKey
      kernel32.dllTermsrvSetValueKey
      kernel32.dllIsValidLocale
      kernel32.dllIsValidLocale, TermsrvSetValueKey
      kernel32.dllTermsrvSetValueKey
      kernel32.dllTermsrvSetValueKey
      kernel32.dllTermsrvSetValueKey
      kernel32.dllTermsrvSetValueKey
      kernel32.dllTermsrvSetValueKey
      kernel32.dllTermsrvSetValueKey
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllTermsrvSetValueKey
      kernel32.dllTermsrvSetValueKey
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllConvertFiberToThread
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllGetMemoryErrorHandlingCapabilities
      kernel32.dllBasepCopyEncryption
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllBuildCommDCBW
      kernel32.dllCreateHardLinkTransactedA
      kernel32.dllSetTimerQueueTimer
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllBeginUpdateResourceA
      kernel32.dllSystemTimeToTzSpecificLocalTime
      KERNELBASE.dllDeleteTimerQueueEx
      KERNELBASE.dllDeleteTimerQueueEx
      kernel32.dllSystemTimeToTzSpecificLocalTime
      mscoree.dllND_WI8
      mscoree.dllND_WI8
      kernel32.dllSetLocaleInfoW
      gdi32.dllGdiTrackHDelete
      gdi32.dllGdiTrackHDelete
      gdi32.dllGdiTrackHDelete
      gdi32.dllGdiTrackHDelete
      kernel32.dllGetMemoryErrorHandlingCapabilities
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllGetFullPathNameA
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllCreateWaitableTimerExW
      kernel32.dllCreateWaitableTimerExW
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      advapi32.dllAuditLookupCategoryIdFromCategoryGuid
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllBaseVerifyUnicodeString
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      mscoree.dllGetHashFromAssemblyFileW
      mscoree.dllGetHashFromAssemblyFileW
      mscoree.dllGetHashFromBlob
      mscoree.dllGetHashFromFile
      mscoree.dllGetHashFromFile
      mscoree.dllGetHashFromFile
      mscoree.dllGetHashFromFile
      mscoree.dllGetHashFromFile
      mscoree.dllGetHashFromFile
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      mscoree.dllGetHashFromFileW
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      mscoree.dllStrongNameGetBlob
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      mscoree.dllStrongNameKeyDelete
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllTermsrvSetValueKey
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      gdi32.dllCreateHatchBrush
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllCreateHardLinkTransactedA
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllTermsrvSetValueKey
      mscoree.dllStrongNameSignatureVerificationEx
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllBasep8BitStringToDynamicUnicodeString
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllRegEnumValueW
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllBeginUpdateResourceA
      kernel32.dllCreateHardLinkTransactedA
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllTermsrvSetValueKey
      kernel32.dllTermsrvSetValueKey
      kernel32.dllTermsrvSetValueKey
      kernel32.dllTermsrvSetValueKey
      kernel32.dllTermsrvSetValueKey
      kernel32.dllIsValidLocale
      kernel32.dllIsValidLocale, TermsrvSetValueKey
      kernel32.dllTermsrvSetValueKey
      kernel32.dllTermsrvSetValueKey
      kernel32.dllTermsrvSetValueKey
      kernel32.dllTermsrvSetValueKey
      kernel32.dllTermsrvSetValueKey
      kernel32.dllTermsrvSetValueKey
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllTermsrvSetValueKey
      kernel32.dllTermsrvSetValueKey
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllConvertFiberToThread
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllGetMemoryErrorHandlingCapabilities
      kernel32.dllBasepCopyEncryption
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllBuildCommDCBW
      kernel32.dllCreateHardLinkTransactedA
      kernel32.dllSetTimerQueueTimer
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllBeginUpdateResourceA
      kernel32.dllSystemTimeToTzSpecificLocalTime
      KERNELBASE.dllDeleteTimerQueueEx
      KERNELBASE.dllDeleteTimerQueueEx
      kernel32.dllSystemTimeToTzSpecificLocalTime
      mscoree.dllND_WI8
      mscoree.dllND_WI8
      kernel32.dllSetLocaleInfoW
      gdi32.dllGdiTrackHDelete
      gdi32.dllGdiTrackHDelete
      gdi32.dllGdiTrackHDelete
      gdi32.dllGdiTrackHDelete
      kernel32.dllGetMemoryErrorHandlingCapabilities
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllGetFullPathNameA
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllCreateWaitableTimerExW
      kernel32.dllCreateWaitableTimerExW
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllSystemTimeToTzSpecificLocalTime
      advapi32.dllAuditLookupCategoryIdFromCategoryGuid
      kernel32.dllSystemTimeToTzSpecificLocalTime
      kernel32.dllBaseVerifyUnicodeString
      kernel32.dllSystemTimeToTzSpecificLocalTime
      mscoree.dllStrongNameTokenFromAssembly
      mscoree.dllStrongNameTokenFromAssembly
      mscoree.dllStrongNameTokenFromAssembly
      No network behavior found

      Click to jump to process

      Click to jump to process

      Click to jump to process

      Target ID:0
      Start time:03:53:54
      Start date:26/05/2024
      Path:C:\Windows\System32\loaddll32.exe
      Wow64 process (32bit):true
      Commandline:loaddll32.exe "C:\Users\user\Desktop\ZlucX8xpYB.dll"
      Imagebase:0x460000
      File size:126'464 bytes
      MD5 hash:51E6071F9CBA48E79F10C84515AAE618
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:1
      Start time:03:53:54
      Start date:26/05/2024
      Path:C:\Windows\System32\conhost.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Imagebase:0x7ff7699e0000
      File size:862'208 bytes
      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:2
      Start time:03:53:54
      Start date:26/05/2024
      Path:C:\Windows\SysWOW64\cmd.exe
      Wow64 process (32bit):true
      Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\ZlucX8xpYB.dll",#1
      Imagebase:0x240000
      File size:236'544 bytes
      MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:3
      Start time:03:53:54
      Start date:26/05/2024
      Path:C:\Windows\SysWOW64\rundll32.exe
      Wow64 process (32bit):true
      Commandline:rundll32.exe "C:\Users\user\Desktop\ZlucX8xpYB.dll",#1
      Imagebase:0x560000
      File size:61'440 bytes
      MD5 hash:889B99C52A60DD49227C5E485A016679
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      No disassembly