Edit tour

Windows Analysis Report
winmm.dll.dll

Overview

General Information

Sample name:winmm.dll.dll
(renamed file extension from exe to dll)
Original sample name:winmm.dll.exe
Analysis ID:1541761
MD5:25fef25074dd0749c978bf01a36965f4
SHA1:67910025c3b84a8324d3ea5e1afd93fd1cd00b41
SHA256:31ceb9014f0e7ba8529c6dfa625abf48a0c39120bf976094b6c33363cdfb0a01
Tags:exeuser-JayBass
Infos:

Detection

Score:72
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
AI detected suspicious sample
Found direct / indirect Syscall (likely to bypass EDR)
Hides threads from debuggers
PE file contains section with special chars
Query firmware table information (likely to detect VMs)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Creates a process in suspended mode (likely to inject code)
Entry point lies outside standard sections
PE file contains more sections than normal
PE file contains sections with non-standard names
Sample execution stops while process was sleeping (likely an evasion)

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • loaddll64.exe (PID: 7344 cmdline: loaddll64.exe "C:\Users\user\Desktop\winmm.dll.dll" MD5: 763455F9DCB24DFEECC2B9D9F8D46D52)
    • conhost.exe (PID: 7352 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 7396 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\winmm.dll.dll",#1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • rundll32.exe (PID: 7420 cmdline: rundll32.exe "C:\Users\user\Desktop\winmm.dll.dll",#1 MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7404 cmdline: rundll32.exe C:\Users\user\Desktop\winmm.dll.dll,CloseDriver MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7484 cmdline: rundll32.exe C:\Users\user\Desktop\winmm.dll.dll,DefDriverProc MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7512 cmdline: rundll32.exe C:\Users\user\Desktop\winmm.dll.dll,DriverCallback MD5: EF3179D498793BF4234F708D3BE28633)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: winmm.dll.dllReversingLabs: Detection: 45%
Source: winmm.dll.dllVirustotal: Detection: 43%Perma Link
Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
Source: Binary string: c:\miniprojects\x86il\il86\x64\release\IL86.pdb! source: loaddll64.exe, 00000000.00000002.1833928465.00007FFDFB4BE000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000003.00000002.1781676239.00007FFDFB29E000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.1746984857.00007FFDFB29E000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000005.00000002.1773298345.00007FFDFB29E000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000006.00000002.1806702558.00007FFDFB4BE000.00000040.00000001.01000000.00000003.sdmp
Source: Binary string: c:\miniprojects\x86il\il86\x64\release\IL86.pdb source: rundll32.exe, rundll32.exe, 00000004.00000002.1746984857.00007FFDFB29E000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000005.00000002.1773298345.00007FFDFB29E000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000006.00000002.1806702558.00007FFDFB4BE000.00000040.00000001.01000000.00000003.sdmp

System Summary

barindex
Source: winmm.dll.dllStatic PE information: section name:
Source: winmm.dll.dllStatic PE information: section name:
Source: winmm.dll.dllStatic PE information: section name:
Source: winmm.dll.dllStatic PE information: section name:
Source: winmm.dll.dllStatic PE information: section name:
Source: winmm.dll.dllStatic PE information: section name:
Source: winmm.dll.dllStatic PE information: section name:
Source: winmm.dll.dllStatic PE information: Number of sections : 12 > 10
Source: winmm.dll.dllStatic PE information: Section: ZLIB complexity 1.0000853825136613
Source: classification engineClassification label: mal72.evad.winDLL@12/1@0/0
Source: C:\Windows\System32\rundll32.exeFile created: C:\Users\Public\Documents\Techsmith_Camtasia_2024_Jasi2169.licJump to behavior
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7352:120:WilError_03
Source: C:\Windows\System32\loaddll64.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\winmm.dll.dll,CloseDriver
Source: winmm.dll.dllReversingLabs: Detection: 45%
Source: winmm.dll.dllVirustotal: Detection: 43%
Source: unknownProcess created: C:\Windows\System32\loaddll64.exe loaddll64.exe "C:\Users\user\Desktop\winmm.dll.dll"
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\winmm.dll.dll",#1
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\winmm.dll.dll,CloseDriver
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\winmm.dll.dll",#1
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\winmm.dll.dll,DefDriverProc
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\winmm.dll.dll,DriverCallback
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\winmm.dll.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\winmm.dll.dll,CloseDriverJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\winmm.dll.dll,DefDriverProcJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\winmm.dll.dll,DriverCallbackJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\winmm.dll.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: winmm.dll.dllJump to behavior
Source: winmm.dll.dllStatic PE information: More than 196 > 100 exports found
Source: winmm.dll.dllStatic PE information: Image base 0x180000000 > 0x60000000
Source: winmm.dll.dllStatic file information: File size 3716608 > 1048576
Source: winmm.dll.dllStatic PE information: Raw size of .boot is bigger than: 0x100000 < 0x368200
Source: Binary string: c:\miniprojects\x86il\il86\x64\release\IL86.pdb! source: loaddll64.exe, 00000000.00000002.1833928465.00007FFDFB4BE000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000003.00000002.1781676239.00007FFDFB29E000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.1746984857.00007FFDFB29E000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000005.00000002.1773298345.00007FFDFB29E000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000006.00000002.1806702558.00007FFDFB4BE000.00000040.00000001.01000000.00000003.sdmp
Source: Binary string: c:\miniprojects\x86il\il86\x64\release\IL86.pdb source: rundll32.exe, rundll32.exe, 00000004.00000002.1746984857.00007FFDFB29E000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000005.00000002.1773298345.00007FFDFB29E000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000006.00000002.1806702558.00007FFDFB4BE000.00000040.00000001.01000000.00000003.sdmp
Source: initial sampleStatic PE information: section where entry point is pointing to: .boot
Source: winmm.dll.dllStatic PE information: section name:
Source: winmm.dll.dllStatic PE information: section name:
Source: winmm.dll.dllStatic PE information: section name:
Source: winmm.dll.dllStatic PE information: section name:
Source: winmm.dll.dllStatic PE information: section name:
Source: winmm.dll.dllStatic PE information: section name:
Source: winmm.dll.dllStatic PE information: section name:
Source: winmm.dll.dllStatic PE information: section name: .themida
Source: winmm.dll.dllStatic PE information: section name: .boot
Source: winmm.dll.dllStatic PE information: section name: entropy: 7.981634718449392
Source: winmm.dll.dllStatic PE information: section name: entropy: 7.712416177556449
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Windows\System32\loaddll64.exeSystem information queried: FirmwareTableInformationJump to behavior
Source: C:\Windows\System32\loaddll64.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
Source: C:\Windows\System32\rundll32.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
Source: C:\Windows\System32\rundll32.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
Source: C:\Windows\System32\rundll32.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
Source: C:\Windows\System32\rundll32.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
Source: C:\Windows\System32\rundll32.exeRegistry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}\0000 name: DriverDescJump to behavior
Source: C:\Windows\System32\rundll32.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: SystemBiosVersionJump to behavior
Source: C:\Windows\System32\rundll32.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: VideoBiosVersionJump to behavior
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: loaddll64.exe, 00000000.00000002.1833695800.000002A97F8BD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: HARDWARE\ACPI\DSDT\VBOX__{

Anti Debugging

barindex
Source: C:\Windows\System32\loaddll64.exeThread information set: HideFromDebuggerJump to behavior
Source: C:\Windows\System32\rundll32.exeThread information set: HideFromDebuggerJump to behavior
Source: C:\Windows\System32\rundll32.exeThread information set: HideFromDebuggerJump to behavior
Source: C:\Windows\System32\rundll32.exeThread information set: HideFromDebuggerJump to behavior
Source: C:\Windows\System32\rundll32.exeThread information set: HideFromDebuggerJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess queried: DebugObjectHandleJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugObjectHandleJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugObjectHandleJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugObjectHandleJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugObjectHandleJump to behavior

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Windows\System32\loaddll64.exeNtQueryInformationProcess: Indirect: 0xEFJump to behavior
Source: C:\Windows\System32\loaddll64.exeNtQueryInformationProcess: Indirect: 0x7FFDFB6AD0A1Jump to behavior
Source: C:\Windows\System32\loaddll64.exeNtSetInformationThread: Indirect: 0x70Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\winmm.dll.dll",#1Jump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
11
Process Injection
1
Masquerading
OS Credential Dumping321
Security Software Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
Abuse Elevation Control Mechanism
22
Virtualization/Sandbox Evasion
LSASS Memory22
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
DLL Side-Loading
1
Rundll32
Security Account Manager1
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook2
Software Packing
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script11
Process Injection
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
Abuse Elevation Control Mechanism
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
DLL Side-Loading
DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
Obfuscated Files or Information
Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1541761 Sample: winmm.dll.exe Startdate: 25/10/2024 Architecture: WINDOWS Score: 72 22 Multi AV Scanner detection for submitted file 2->22 24 PE file contains section with special chars 2->24 26 AI detected suspicious sample 2->26 7 loaddll64.exe 1 2->7         started        process3 signatures4 32 Query firmware table information (likely to detect VMs) 7->32 34 Hides threads from debuggers 7->34 36 Found direct / indirect Syscall (likely to bypass EDR) 7->36 38 Tries to detect sandboxes / dynamic malware analysis system (registry check) 7->38 10 cmd.exe 1 7->10         started        12 rundll32.exe 1 7->12         started        15 rundll32.exe 7->15         started        17 2 other processes 7->17 process5 signatures6 19 rundll32.exe 10->19         started        40 Hides threads from debuggers 12->40 42 Tries to detect sandboxes / dynamic malware analysis system (registry check) 12->42 process7 signatures8 28 Hides threads from debuggers 19->28 30 Tries to detect sandboxes / dynamic malware analysis system (registry check) 19->30

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
winmm.dll.dll46%ReversingLabsWin64.PUA.Vigua
winmm.dll.dll44%VirustotalBrowse
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos
Joe Sandbox version:41.0.0 Charoite
Analysis ID:1541761
Start date and time:2024-10-25 05:41:07 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 5m 26s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:7
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:winmm.dll.dll
(renamed file extension from exe to dll)
Original Sample Name:winmm.dll.exe
Detection:MAL
Classification:mal72.evad.winDLL@12/1@0/0
EGA Information:Failed
HCA Information:Failed
Cookbook Comments:
  • Stop behavior analysis, all processes terminated
  • Execution Graph export aborted for target loaddll64.exe, PID 7344 because there are no executed function
  • Execution Graph export aborted for target rundll32.exe, PID 7404 because there are no executed function
  • Execution Graph export aborted for target rundll32.exe, PID 7420 because there are no executed function
  • Not all processes where analyzed, report is missing behavior information
  • Report creation exceeded maximum time and may have missing disassembly code information.
No simulations
No context
No context
No context
No context
No context
Process:C:\Windows\System32\rundll32.exe
File Type:RAGE Package Format (RPF),
Category:dropped
Size (bytes):117
Entropy (8bit):5.166807135163305
Encrypted:false
SSDEEP:3:p0xexgOF8GWnzBgS36RZ0pnSdu9:pKgFYcKz
MD5:C295FEBB81A9D6DF33C3C884B7162A9F
SHA1:1FF0C4CC98881A1360ED84162413EDC836860F78
SHA-256:27CCCC26780CB481031FB2D31166E0F1B19A9526081D71C478CC9CD1CF7709A8
SHA-512:FA50EDA4345FE66D2A13DAD6B6914A2F937852445D4CED374611883691DD698ACD9D6CBBC872478B638466EE3E66E1392C9CDEA37F55FC4F7D5A02807337D4D0
Malicious:false
Reputation:low
Preview:PROGRAM: TECHSMITH CAMTASIA..KEY: JASI-2169-JASI-2169..LICENSE: VERIFIED..RESPONSE: aR5qdt66JHN8e3cpLBoM27pocwzDnTc..
File type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
Entropy (8bit):7.964111045243251
TrID:
  • Win64 Dynamic Link Library (generic) (102004/3) 86.43%
  • Win64 Executable (generic) (12005/4) 10.17%
  • Generic Win/DOS Executable (2004/3) 1.70%
  • DOS Executable Generic (2002/1) 1.70%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.01%
File name:winmm.dll.dll
File size:3'716'608 bytes
MD5:25fef25074dd0749c978bf01a36965f4
SHA1:67910025c3b84a8324d3ea5e1afd93fd1cd00b41
SHA256:31ceb9014f0e7ba8529c6dfa625abf48a0c39120bf976094b6c33363cdfb0a01
SHA512:29ea7d313597324fc32d9a0beea28f0fc7a1b0befdf8e5493637b411b6062f07b61568733ea2b1adf028b6eba830ab7de6aae0df89df05639f4bd5eb63a1305a
SSDEEP:98304:VkdcixpTI1NMpnARKIJPKKz0m/uwPsMq943J5sCpP:Z2+1NMpARKuPVzpY943J5n
TLSH:B80633F244F6AD7AD51023B0FDE88FC8324E629A9D7EB75889991B1F1D113086B186D3
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......................N.......N.......N........K.......K...............K......N.......N................J.......J.......J_......J.....
Icon Hash:7ae282899bbab082
Entrypoint:0x18062c058
Entrypoint Section:.boot
Digitally signed:false
Imagebase:0x180000000
Subsystem:windows gui
Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, DLL
DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE
Time Stamp:0x670A312A [Sat Oct 12 08:19:54 2024 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:6
OS Version Minor:0
File Version Major:6
File Version Minor:0
Subsystem Version Major:6
Subsystem Version Minor:0
Import Hash:59b55678fa1594b54b3939b607a2dcb0
Instruction
call 00007F89B47393C7h
inc ecx
push edx
dec ecx
mov edx, esp
inc ecx
push edx
dec ecx
mov esi, dword ptr [edx+10h]
dec ecx
mov edi, dword ptr [edx+20h]
cld
mov dl, 80h
mov al, byte ptr [esi]
dec eax
inc esi
mov byte ptr [edi], al
dec eax
inc edi
mov ebx, 00000002h
add dl, dl
jne 00007F89B4739249h
mov dl, byte ptr [esi]
dec eax
inc esi
adc dl, dl
jnc 00007F89B4739226h
add dl, dl
jne 00007F89B4739249h
mov dl, byte ptr [esi]
dec eax
inc esi
adc dl, dl
jnc 00007F89B47392A0h
xor eax, eax
add dl, dl
jne 00007F89B4739249h
mov dl, byte ptr [esi]
dec eax
inc esi
adc dl, dl
jnc 00007F89B4739348h
add dl, dl
jne 00007F89B4739249h
mov dl, byte ptr [esi]
dec eax
inc esi
adc dl, dl
adc eax, eax
add dl, dl
jne 00007F89B4739249h
mov dl, byte ptr [esi]
dec eax
inc esi
adc dl, dl
adc eax, eax
add dl, dl
jne 00007F89B4739249h
mov dl, byte ptr [esi]
dec eax
inc esi
adc dl, dl
adc eax, eax
add dl, dl
jne 00007F89B4739249h
mov dl, byte ptr [esi]
dec eax
inc esi
adc dl, dl
adc eax, eax
je 00007F89B473924Bh
push edi
mov eax, eax
dec eax
sub edi, eax
mov al, byte ptr [edi]
pop edi
mov byte ptr [edi], al
dec eax
inc edi
mov ebx, 00000002h
jmp 00007F89B47391CAh
mov eax, 00000001h
add dl, dl
jne 00007F89B4739249h
mov dl, byte ptr [esi]
dec eax
inc esi
adc dl, dl
adc eax, eax
add dl, dl
jne 00007F89B4739249h
mov dl, byte ptr [esi]
dec eax
inc esi
adc dl, dl
jc 00007F89B4739228h
sub eax, ebx
mov ebx, 00000001h
jne 00007F89B4739270h
mov ecx, 00000001h
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x4c0000x1455.edata
IMAGE_DIRECTORY_ENTRY_IMPORT0x4e05c0x88.idata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x4f0000x1d8.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x61f9700x255c.themida
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x00x0
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
0x10000x2c2400x16e004007b8f47711eddb95246050e997f033False1.0000853825136613data7.981634718449392IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
0x2e0000x2f170x100005a9ecec25a43055f58a9dc8c48f3dabFalse0.947509765625data7.712416177556449IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
0x310000x128ba0x760066f4b7d127f4a61389e0e7a675711a05False0.985103283898305data7.928906236261539IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
0x440000x2ab80x400f44c495988cf7cdafd481de11068281fFalse0.91015625data7.049437736197027IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
0x470000x25440x160013e2cf3fcadb3bde4865b6642ac4da52False0.9517045454545454data7.630760993826833IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
0x4a0000x1e00x20040667d94ca6f4a87260b802a1115fc65False0.798828125data6.044669778551108IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
0x4b0000x9600x6005ffb6031326062539d9957cd71952780False0.8268229166666666data7.413929876408778IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
.edata0x4c0000x16000x1600a4c527d8e319d2f6a51e61c5b117d68bFalse0.3781960227272727data5.196842561195773IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.idata0x4e0000x10000x200feea374249c57b6405e49847cf35c492False0.232421875data1.7412450910417339IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.rsrc0x4f0000x10000x20079b17b9dc2f482ebe4af8945ddf02bddFalse0.52734375data4.720822661998389IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.themida0x500000x5dc0000x0d41d8cd98f00b204e9800998ecf8427eunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.boot0x62c0000x3682000x3682006cc4148a2db5ea917d16e0f23c914a42unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_MANIFEST0x4f0580x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
DLLImport
kernel32.dllGetModuleHandleA
USER32.dllMessageBoxW
SHELL32.dllSHGetKnownFolderPath
NameOrdinalAddress
CloseDriver10x180003ef0
DefDriverProc20x180003f10
DriverCallback30x180003f30
DrvGetModuleHandle40x180003f50
GetDriverModuleHandle50x180003f70
GetFileVersionInfoA60x180003cc0
GetFileVersionInfoByHandle70x180003cd0
GetFileVersionInfoExW80x180003cf0
GetFileVersionInfoSizeA90x180003d10
GetFileVersionInfoSizeExW100x180003d30
GetFileVersionInfoSizeW110x180003d50
GetFileVersionInfoW120x180003d70
OpenDriver130x180003f90
PlaySound140x180003fb0
PlaySoundA150x180003fd0
PlaySoundW160x180003ff0
SendDriverMessage170x180004010
VerFindFileA180x180003d90
VerFindFileW190x180003db0
VerInstallFileA200x180003dd0
VerInstallFileW210x180003df0
VerLanguageNameA220x180003e10
VerLanguageNameW230x180003e30
VerQueryValueA240x180003e50
VerQueryValueIndexA250x180003e90
VerQueryValueIndexW260x180003eb0
VerQueryValueW270x180003e70
WOWAppExit280x180004030
auxGetDevCapsA290x180004050
auxGetDevCapsW300x180004070
auxGetNumDevs310x180004090
auxGetVolume320x1800040b0
auxOutMessage330x1800040d0
auxSetVolume340x1800040f0
joyConfigChanged350x180004110
joyGetDevCapsA360x180004130
joyGetDevCapsW370x180004150
joyGetNumDevs380x180004170
joyGetPos390x180004190
joyGetPosEx400x1800041b0
joyGetThreshold410x1800041d0
joyReleaseCapture420x1800041f0
joySetCapture430x180004210
joySetThreshold440x180004230
mciDriverNotify450x180004250
mciDriverYield460x180004270
mciExecute470x180003ed0
mciFreeCommandResource480x180004290
mciGetCreatorTask490x1800042b0
mciGetDeviceIDA500x1800042d0
mciGetDeviceIDFromElementIDA510x1800042f0
mciGetDeviceIDFromElementIDW520x180004310
mciGetDeviceIDW530x180004330
mciGetDriverData540x180004350
mciGetErrorStringA550x180004370
mciGetErrorStringW560x180004390
mciGetYieldProc570x1800043b0
mciLoadCommandResource580x1800043d0
mciSendCommandA590x1800043f0
mciSendCommandW600x180004410
mciSendStringA610x180004430
mciSendStringW620x180004450
mciSetDriverData630x180004470
mciSetYieldProc640x180004490
midiConnect650x1800044b0
midiDisconnect660x1800044d0
midiInAddBuffer670x1800044f0
midiInClose680x180004510
midiInGetDevCapsA690x180004530
midiInGetDevCapsW700x180004550
midiInGetErrorTextA710x180004570
midiInGetErrorTextW720x180004590
midiInGetID730x1800045b0
midiInGetNumDevs740x1800045d0
midiInMessage750x1800045f0
midiInOpen760x180004610
midiInPrepareHeader770x180004630
midiInReset780x180004650
midiInStart790x180004670
midiInStop800x180004690
midiInUnprepareHeader810x1800046b0
midiOutCacheDrumPatches820x1800046d0
midiOutCachePatches830x1800046f0
midiOutClose840x180004710
midiOutGetDevCapsA850x180004730
midiOutGetDevCapsW860x180004750
midiOutGetErrorTextA870x180004770
midiOutGetErrorTextW880x180004790
midiOutGetID890x1800047b0
midiOutGetNumDevs900x1800047d0
midiOutGetVolume910x1800047f0
midiOutLongMsg920x180004810
midiOutMessage930x180004830
midiOutOpen940x180004850
midiOutPrepareHeader950x180004870
midiOutReset960x180004890
midiOutSetVolume970x1800048b0
midiOutShortMsg980x1800048d0
midiOutUnprepareHeader990x1800048f0
midiStreamClose1000x180004910
midiStreamOpen1010x180004930
midiStreamOut1020x180004950
midiStreamPause1030x180004970
midiStreamPosition1040x180004990
midiStreamProperty1050x1800049b0
midiStreamRestart1060x1800049d0
midiStreamStop1070x1800049f0
mixerClose1080x180004a10
mixerGetControlDetailsA1090x180004a30
mixerGetControlDetailsW1100x180004a50
mixerGetDevCapsA1110x180004a70
mixerGetDevCapsW1120x180004a90
mixerGetID1130x180004ab0
mixerGetLineControlsA1140x180004ad0
mixerGetLineControlsW1150x180004af0
mixerGetLineInfoA1160x180004b10
mixerGetLineInfoW1170x180004b30
mixerGetNumDevs1180x180004b50
mixerMessage1190x180004b70
mixerOpen1200x180004b90
mixerSetControlDetails1210x180004bb0
mmDrvInstall1220x180004bd0
mmGetCurrentTask1230x180004bf0
mmTaskBlock1240x180004c10
mmTaskCreate1250x180004c30
mmTaskSignal1260x180004c50
mmTaskYield1270x180004c70
mmioAdvance1280x180004c90
mmioAscend1290x180004cb0
mmioClose1300x180004cd0
mmioCreateChunk1310x180004cf0
mmioDescend1320x180004d10
mmioFlush1330x180004d30
mmioGetInfo1340x180004d50
mmioInstallIOProcA1350x180004d70
mmioInstallIOProcW1360x180004d90
mmioOpenA1370x180004db0
mmioOpenW1380x180004dd0
mmioRead1390x180004df0
mmioRenameA1400x180004e10
mmioRenameW1410x180004e30
mmioSeek1420x180004e50
mmioSendMessage1430x180004e70
mmioSetBuffer1440x180004e90
mmioSetInfo1450x180004eb0
mmioStringToFOURCCA1460x180004ed0
mmioStringToFOURCCW1470x180004ef0
mmioWrite1480x180004f10
mmsystemGetVersion1490x180004f30
sndPlaySoundA1500x180004f50
sndPlaySoundW1510x180004f70
timeBeginPeriod1520x180004f90
timeEndPeriod1530x180004fb0
timeGetDevCaps1540x180004fd0
timeGetSystemTime1550x180004ff0
timeGetTime1560x180005010
timeKillEvent1570x180005030
timeSetEvent1580x180005050
waveInAddBuffer1590x180005070
waveInClose1600x180005090
waveInGetDevCapsA1610x1800050b0
waveInGetDevCapsW1620x1800050d0
waveInGetErrorTextA1630x1800050f0
waveInGetErrorTextW1640x180005110
waveInGetID1650x180005130
waveInGetNumDevs1660x180005150
waveInGetPosition1670x180005170
waveInMessage1680x180005190
waveInOpen1690x1800051b0
waveInPrepareHeader1700x1800051d0
waveInReset1710x1800051f0
waveInStart1720x180005210
waveInStop1730x180005230
waveInUnprepareHeader1740x180005250
waveOutBreakLoop1750x180005270
waveOutClose1760x180005290
waveOutGetDevCapsA1770x1800052b0
waveOutGetDevCapsW1780x1800052d0
waveOutGetErrorTextA1790x1800052f0
waveOutGetErrorTextW1800x180005310
waveOutGetID1810x180005330
waveOutGetNumDevs1820x180005350
waveOutGetPitch1830x180005370
waveOutGetPlaybackRate1840x180005390
waveOutGetPosition1850x1800053b0
waveOutGetVolume1860x1800053d0
waveOutMessage1870x1800053f0
waveOutOpen1880x180005410
waveOutPause1890x180005430
waveOutPrepareHeader1900x180005450
waveOutReset1910x180005470
waveOutRestart1920x180005490
waveOutSetPitch1930x1800054b0
waveOutSetPlaybackRate1940x1800054d0
waveOutSetVolume1950x1800054f0
waveOutUnprepareHeader1960x180005510
waveOutWrite1970x180005530
Language of compilation systemCountry where language is spokenMap
EnglishUnited States
No network behavior found

Click to jump to process

Click to jump to process

  • File
  • Registry

Click to dive into process behavior distribution

Target ID:0
Start time:23:42:04
Start date:24/10/2024
Path:C:\Windows\System32\loaddll64.exe
Wow64 process (32bit):false
Commandline:loaddll64.exe "C:\Users\user\Desktop\winmm.dll.dll"
Imagebase:0x7ff6df120000
File size:165'888 bytes
MD5 hash:763455F9DCB24DFEECC2B9D9F8D46D52
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:1
Start time:23:42:04
Start date:24/10/2024
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7699e0000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:2
Start time:23:42:04
Start date:24/10/2024
Path:C:\Windows\System32\cmd.exe
Wow64 process (32bit):false
Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\winmm.dll.dll",#1
Imagebase:0x7ff6b8330000
File size:289'792 bytes
MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:3
Start time:23:42:04
Start date:24/10/2024
Path:C:\Windows\System32\rundll32.exe
Wow64 process (32bit):false
Commandline:rundll32.exe C:\Users\user\Desktop\winmm.dll.dll,CloseDriver
Imagebase:0x7ff7f1fd0000
File size:71'680 bytes
MD5 hash:EF3179D498793BF4234F708D3BE28633
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

No disassembly