Source: KLWsv.dll |
ReversingLabs: Detection: 66% |
Source: KLWsv.dll |
Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL |
Source: KLWsv.dll |
Static PE information: DYNAMIC_BASE, NX_COMPAT |
Source: KLWsv.dll |
Static PE information: section name: .nv+ |
Source: KLWsv.dll |
Static PE information: section name: .[sg |
Source: KLWsv.dll |
Static PE information: section name: .8E* |
Source: KLWsv.dll |
Static PE information: section name: .A~F |
Source: KLWsv.dll |
Static PE information: section name: .{oQ |
Source: KLWsv.dll |
Static PE information: section name: .%". |
Source: KLWsv.dll |
Static PE information: Number of sections : 16 > 10 |
Source: KLWsv.dll |
Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL |
Source: classification engine |
Classification label: mal72.evad.winDLL@12/0@0/0 |
Source: C:\Windows\System32\conhost.exe |
Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6420:120:WilError_03 |
Source: C:\Windows\System32\conhost.exe |
Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6420:304:WilStaging_02 |
Source: C:\Windows\System32\loaddll32.exe |
Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers |
Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe |
Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\KLWsv.dll,QStringClose |
Source: KLWsv.dll |
ReversingLabs: Detection: 66% |
Source: unknown |
Process created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\KLWsv.dll" |
|
Source: C:\Windows\System32\loaddll32.exe |
Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
|
Source: C:\Windows\System32\loaddll32.exe |
Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\KLWsv.dll",#1 |
|
Source: C:\Windows\System32\loaddll32.exe |
Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\KLWsv.dll,QStringClose |
|
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\KLWsv.dll",#1 |
|
Source: C:\Windows\System32\loaddll32.exe |
Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\KLWsv.dll,QStringCmp |
|
Source: C:\Windows\System32\loaddll32.exe |
Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\KLWsv.dll,QStringCreate |
|
Source: C:\Windows\System32\loaddll32.exe |
Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\KLWsv.dll",#1 |
Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe |
Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\KLWsv.dll,QStringClose |
Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe |
Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\KLWsv.dll,QStringCmp |
Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe |
Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\KLWsv.dll,QStringCreate |
Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\KLWsv.dll",#1 |
Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe |
Section loaded: apphelp.dll |
Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe |
Section loaded: winmm.dll |
Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe |
Section loaded: wininet.dll |
Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe |
Section loaded: version.dll |
Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe |
Section loaded: urlmon.dll |
Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe |
Section loaded: netapi32.dll |
Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe |
Section loaded: winhttp.dll |
Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe |
Section loaded: shfolder.dll |
Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe |
Section loaded: wsock32.dll |
Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe |
Section loaded: iertutil.dll |
Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe |
Section loaded: srvcli.dll |
Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe |
Section loaded: netutils.dll |
Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe |
Section loaded: magnification.dll |
Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe |
Section loaded: wtsapi32.dll |
Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe |
Section loaded: d3d9.dll |
Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe |
Section loaded: dwmapi.dll |
Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe |
Section loaded: wldp.dll |
Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe |
Section loaded: edgegdi.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe |
Section loaded: apphelp.dll |
Jump to behavior |
Source: KLWsv.dll |
Static PE information: Virtual size of .text is bigger than: 0x100000 |
Source: KLWsv.dll |
Static file information: File size 32656384 > 1048576 |
Source: KLWsv.dll |
Static PE information: Raw size of .%". is bigger than: 0x100000 < 0x1f08600 |
Source: KLWsv.dll |
Static PE information: DYNAMIC_BASE, NX_COMPAT |
Source: initial sample |
Static PE information: section where entry point is pointing to: .%". |
Source: KLWsv.dll |
Static PE information: section name: .didata |
Source: KLWsv.dll |
Static PE information: section name: .nv+ |
Source: KLWsv.dll |
Static PE information: section name: .[sg |
Source: KLWsv.dll |
Static PE information: section name: .8E* |
Source: KLWsv.dll |
Static PE information: section name: .A~F |
Source: KLWsv.dll |
Static PE information: section name: .{oQ |
Source: KLWsv.dll |
Static PE information: section name: .%". |
Source: C:\Windows\System32\loaddll32.exe |
Memory written: PID: 5568 base: 3F0005 value: E9 AB 2E D3 76 |
Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe |
Memory written: PID: 5568 base: 77122EB0 value: E9 5A D1 2C 89 |
Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe |
Memory written: PID: 5568 base: 9A0007 value: E9 6B DC 7B 76 |
Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe |
Memory written: PID: 5568 base: 7715DC70 value: E9 9E 23 84 89 |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Memory written: PID: 4228 base: 2CA0005 value: E9 AB 2E 48 74 |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Memory written: PID: 4228 base: 77122EB0 value: E9 5A D1 B7 8B |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Memory written: PID: 4228 base: 2CB0007 value: E9 6B DC 4A 74 |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Memory written: PID: 4228 base: 7715DC70 value: E9 9E 23 B5 8B |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Memory written: PID: 7384 base: 25C0005 value: E9 AB 2E B6 74 |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Memory written: PID: 7384 base: 77122EB0 value: E9 5A D1 49 8B |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Memory written: PID: 7384 base: 4010007 value: E9 6B DC 14 73 |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Memory written: PID: 7384 base: 7715DC70 value: E9 9E 23 EB 8C |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Memory written: PID: 5968 base: 2D60005 value: E9 AB 2E 3C 74 |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Memory written: PID: 5968 base: 77122EB0 value: E9 5A D1 C3 8B |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Memory written: PID: 5968 base: 2D70007 value: E9 6B DC 3E 74 |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Memory written: PID: 5968 base: 7715DC70 value: E9 9E 23 C1 8B |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Memory written: PID: 2752 base: 2880005 value: E9 AB 2E 8A 74 |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Memory written: PID: 2752 base: 77122EB0 value: E9 5A D1 75 8B |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Memory written: PID: 2752 base: 43B0007 value: E9 6B DC DA 72 |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Memory written: PID: 2752 base: 7715DC70 value: E9 9E 23 25 8D |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe |
System information queried: FirmwareTableInformation |
Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe |
System information queried: FirmwareTableInformation |
Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe |
API/Special instruction interceptor: Address: 6D04A216 |
Source: C:\Windows\System32\loaddll32.exe |
API/Special instruction interceptor: Address: 6D040402 |
Source: C:\Windows\System32\loaddll32.exe |
API/Special instruction interceptor: Address: 6CFAA321 |
Source: C:\Windows\System32\loaddll32.exe |
API/Special instruction interceptor: Address: 6CDD35F6 |
Source: C:\Windows\System32\loaddll32.exe |
API/Special instruction interceptor: Address: 6CDE591B |
Source: C:\Windows\System32\loaddll32.exe |
API/Special instruction interceptor: Address: 6D202049 |
Source: C:\Windows\System32\loaddll32.exe |
API/Special instruction interceptor: Address: 6CFDBB6E |
Source: C:\Windows\System32\loaddll32.exe |
API/Special instruction interceptor: Address: 6B375D6B |
Source: C:\Windows\System32\loaddll32.exe |
API/Special instruction interceptor: Address: 6CED523E |
Source: C:\Windows\System32\loaddll32.exe |
API/Special instruction interceptor: Address: 6D0860DF |
Source: C:\Windows\System32\loaddll32.exe |
API/Special instruction interceptor: Address: 6CDF1A06 |
Source: C:\Windows\System32\loaddll32.exe |
API/Special instruction interceptor: Address: 6CE142BC |
Source: C:\Windows\System32\loaddll32.exe |
API/Special instruction interceptor: Address: 6CE2D6A5 |
Source: C:\Windows\System32\loaddll32.exe |
API/Special instruction interceptor: Address: 6D0A816B |
Source: C:\Windows\System32\loaddll32.exe |
API/Special instruction interceptor: Address: 6B8CD551 |
Source: C:\Windows\System32\loaddll32.exe |
API/Special instruction interceptor: Address: 6D1E938B |
Source: C:\Windows\System32\loaddll32.exe |
API/Special instruction interceptor: Address: 6CF8809B |
Source: C:\Windows\System32\loaddll32.exe |
API/Special instruction interceptor: Address: 6D004EBA |
Source: C:\Windows\System32\loaddll32.exe |
API/Special instruction interceptor: Address: 6CE0F2C8 |
Source: C:\Windows\System32\loaddll32.exe |
API/Special instruction interceptor: Address: 6D06EDA4 |
Source: C:\Windows\System32\loaddll32.exe |
API/Special instruction interceptor: Address: 6B8DD7C1 |
Source: C:\Windows\System32\loaddll32.exe |
API/Special instruction interceptor: Address: 6AC8BF01 |
Source: C:\Windows\System32\loaddll32.exe |
API/Special instruction interceptor: Address: 6AD1EC80 |
Source: C:\Windows\System32\loaddll32.exe |
API/Special instruction interceptor: Address: 6A818F63 |
Source: C:\Windows\System32\loaddll32.exe |
API/Special instruction interceptor: Address: 6A845437 |
Source: C:\Windows\System32\loaddll32.exe |
API/Special instruction interceptor: Address: 6AC95790 |
Source: C:\Windows\System32\loaddll32.exe |
API/Special instruction interceptor: Address: 698A5E3A |
Source: C:\Windows\System32\loaddll32.exe |
API/Special instruction interceptor: Address: 6A887F4C |
Source: C:\Windows\System32\loaddll32.exe |
API/Special instruction interceptor: Address: 6AB49DB8 |
Source: rundll32.exe, 00000006.00000002.223236076022.0000000002B5A000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: SBIEDLL.DLL |
Source: all processes |
Thread injection, dropped files, key value created, disk infection and DNS query: no activity detected |
Source: C:\Windows\System32\conhost.exe |
Last function: Thread delayed |
Source: C:\Windows\System32\loaddll32.exe |
Process information queried: ProcessInformation |
Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe |
Thread information set: HideFromDebugger |
Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe |
Thread information set: HideFromDebugger |
Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe |
Thread information set: HideFromDebugger |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Thread information set: HideFromDebugger |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Thread information set: HideFromDebugger |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Thread information set: HideFromDebugger |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Thread information set: HideFromDebugger |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Thread information set: HideFromDebugger |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Thread information set: HideFromDebugger |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Thread information set: HideFromDebugger |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Thread information set: HideFromDebugger |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Thread information set: HideFromDebugger |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Thread information set: HideFromDebugger |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Thread information set: HideFromDebugger |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Thread information set: HideFromDebugger |
Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe |
Process queried: DebugPort |
Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe |
Process queried: DebugObjectHandle |
Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe |
Process queried: DebugObjectHandle |
Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe |
Process queried: DebugObjectHandle |
Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe |
Process queried: DebugPort |
Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe |
Process queried: DebugPort |
Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe |
Process queried: DebugObjectHandle |
Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe |
Process queried: DebugObjectHandle |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Process queried: DebugPort |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Process queried: DebugObjectHandle |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Process queried: DebugObjectHandle |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Process queried: DebugObjectHandle |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Process queried: DebugPort |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Process queried: DebugPort |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Process queried: DebugObjectHandle |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Process queried: DebugObjectHandle |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Process queried: DebugPort |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Process queried: DebugObjectHandle |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Process queried: DebugObjectHandle |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Process queried: DebugObjectHandle |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Process queried: DebugPort |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Process queried: DebugPort |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Process queried: DebugObjectHandle |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Process queried: DebugObjectHandle |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Process queried: DebugPort |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Process queried: DebugObjectHandle |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Process queried: DebugObjectHandle |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Process queried: DebugObjectHandle |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Process queried: DebugPort |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Process queried: DebugPort |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Process queried: DebugObjectHandle |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Process queried: DebugObjectHandle |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Process queried: DebugPort |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Process queried: DebugObjectHandle |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Process queried: DebugObjectHandle |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Process queried: DebugObjectHandle |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Process queried: DebugPort |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Process queried: DebugPort |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Process queried: DebugObjectHandle |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Process queried: DebugObjectHandle |
Jump to behavior |
Source: all processes |
Thread injection, dropped files, key value created, disk infection and DNS query: no activity detected |
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\KLWsv.dll",#1 |
Jump to behavior |