Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
KLWsv.dll

Overview

General Information

Sample name:KLWsv.dll
Analysis ID:1544175
MD5:102bcd38e265b5ab30ea24a798b76d27
SHA1:2fb9002e810ddf895610f5d46716d9ac76a9660e
SHA256:2059cd1e58c75266c997315777dbe2bad3e65e9811b101ae74d9fdf2321a3be6
Infos:

Detection

Score:72
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Hides threads from debuggers
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
PE file contains section with special chars
Query firmware table information (likely to detect VMs)
Switches to a custom stack to bypass stack traces
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Checks if the current process is being debugged
Creates a process in suspended mode (likely to inject code)
Entry point lies outside standard sections
PE file contains more sections than normal
PE file contains sections with non-standard names
Program does not show much activity (idle)
Sample execution stops while process was sleeping (likely an evasion)
Uses 32bit PE files

Classification

  • System is w10x64native
  • loaddll32.exe (PID: 5568 cmdline: loaddll32.exe "C:\Users\user\Desktop\KLWsv.dll" MD5: 51E6071F9CBA48E79F10C84515AAE618)
    • conhost.exe (PID: 6420 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 836 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\KLWsv.dll",#1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • rundll32.exe (PID: 7384 cmdline: rundll32.exe "C:\Users\user\Desktop\KLWsv.dll",#1 MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 4228 cmdline: rundll32.exe C:\Users\user\Desktop\KLWsv.dll,QStringClose MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 5968 cmdline: rundll32.exe C:\Users\user\Desktop\KLWsv.dll,QStringCmp MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 2752 cmdline: rundll32.exe C:\Users\user\Desktop\KLWsv.dll,QStringCreate MD5: 889B99C52A60DD49227C5E485A016679)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: KLWsv.dllReversingLabs: Detection: 66%
Source: KLWsv.dllStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL
Source: KLWsv.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT

System Summary

barindex
Source: KLWsv.dllStatic PE information: section name: .nv+
Source: KLWsv.dllStatic PE information: section name: .[sg
Source: KLWsv.dllStatic PE information: section name: .8E*
Source: KLWsv.dllStatic PE information: section name: .A~F
Source: KLWsv.dllStatic PE information: section name: .{oQ
Source: KLWsv.dllStatic PE information: section name: .%".
Source: KLWsv.dllStatic PE information: Number of sections : 16 > 10
Source: KLWsv.dllStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL
Source: classification engineClassification label: mal72.evad.winDLL@12/0@0/0
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6420:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6420:304:WilStaging_02
Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\KLWsv.dll,QStringClose
Source: KLWsv.dllReversingLabs: Detection: 66%
Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\KLWsv.dll"
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\KLWsv.dll",#1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\KLWsv.dll,QStringClose
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\KLWsv.dll",#1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\KLWsv.dll,QStringCmp
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\KLWsv.dll,QStringCreate
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\KLWsv.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\KLWsv.dll,QStringCloseJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\KLWsv.dll,QStringCmpJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\KLWsv.dll,QStringCreateJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\KLWsv.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: winmm.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: wininet.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: shfolder.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: wsock32.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: magnification.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: wtsapi32.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: d3d9.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: edgegdi.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
Source: KLWsv.dllStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: KLWsv.dllStatic file information: File size 32656384 > 1048576
Source: KLWsv.dllStatic PE information: Raw size of .%". is bigger than: 0x100000 < 0x1f08600
Source: KLWsv.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT
Source: initial sampleStatic PE information: section where entry point is pointing to: .%".
Source: KLWsv.dllStatic PE information: section name: .didata
Source: KLWsv.dllStatic PE information: section name: .nv+
Source: KLWsv.dllStatic PE information: section name: .[sg
Source: KLWsv.dllStatic PE information: section name: .8E*
Source: KLWsv.dllStatic PE information: section name: .A~F
Source: KLWsv.dllStatic PE information: section name: .{oQ
Source: KLWsv.dllStatic PE information: section name: .%".

Hooking and other Techniques for Hiding and Protection

barindex
Source: C:\Windows\System32\loaddll32.exeMemory written: PID: 5568 base: 3F0005 value: E9 AB 2E D3 76 Jump to behavior
Source: C:\Windows\System32\loaddll32.exeMemory written: PID: 5568 base: 77122EB0 value: E9 5A D1 2C 89 Jump to behavior
Source: C:\Windows\System32\loaddll32.exeMemory written: PID: 5568 base: 9A0007 value: E9 6B DC 7B 76 Jump to behavior
Source: C:\Windows\System32\loaddll32.exeMemory written: PID: 5568 base: 7715DC70 value: E9 9E 23 84 89 Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 4228 base: 2CA0005 value: E9 AB 2E 48 74 Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 4228 base: 77122EB0 value: E9 5A D1 B7 8B Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 4228 base: 2CB0007 value: E9 6B DC 4A 74 Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 4228 base: 7715DC70 value: E9 9E 23 B5 8B Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 7384 base: 25C0005 value: E9 AB 2E B6 74 Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 7384 base: 77122EB0 value: E9 5A D1 49 8B Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 7384 base: 4010007 value: E9 6B DC 14 73 Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 7384 base: 7715DC70 value: E9 9E 23 EB 8C Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 5968 base: 2D60005 value: E9 AB 2E 3C 74 Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 5968 base: 77122EB0 value: E9 5A D1 C3 8B Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 5968 base: 2D70007 value: E9 6B DC 3E 74 Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 5968 base: 7715DC70 value: E9 9E 23 C1 8B Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 2752 base: 2880005 value: E9 AB 2E 8A 74 Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 2752 base: 77122EB0 value: E9 5A D1 75 8B Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 2752 base: 43B0007 value: E9 6B DC DA 72 Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 2752 base: 7715DC70 value: E9 9E 23 25 8D Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Windows\System32\loaddll32.exeSystem information queried: FirmwareTableInformationJump to behavior
Source: C:\Windows\System32\loaddll32.exeSystem information queried: FirmwareTableInformationJump to behavior
Source: C:\Windows\System32\loaddll32.exeAPI/Special instruction interceptor: Address: 6D04A216
Source: C:\Windows\System32\loaddll32.exeAPI/Special instruction interceptor: Address: 6D040402
Source: C:\Windows\System32\loaddll32.exeAPI/Special instruction interceptor: Address: 6CFAA321
Source: C:\Windows\System32\loaddll32.exeAPI/Special instruction interceptor: Address: 6CDD35F6
Source: C:\Windows\System32\loaddll32.exeAPI/Special instruction interceptor: Address: 6CDE591B
Source: C:\Windows\System32\loaddll32.exeAPI/Special instruction interceptor: Address: 6D202049
Source: C:\Windows\System32\loaddll32.exeAPI/Special instruction interceptor: Address: 6CFDBB6E
Source: C:\Windows\System32\loaddll32.exeAPI/Special instruction interceptor: Address: 6B375D6B
Source: C:\Windows\System32\loaddll32.exeAPI/Special instruction interceptor: Address: 6CED523E
Source: C:\Windows\System32\loaddll32.exeAPI/Special instruction interceptor: Address: 6D0860DF
Source: C:\Windows\System32\loaddll32.exeAPI/Special instruction interceptor: Address: 6CDF1A06
Source: C:\Windows\System32\loaddll32.exeAPI/Special instruction interceptor: Address: 6CE142BC
Source: C:\Windows\System32\loaddll32.exeAPI/Special instruction interceptor: Address: 6CE2D6A5
Source: C:\Windows\System32\loaddll32.exeAPI/Special instruction interceptor: Address: 6D0A816B
Source: C:\Windows\System32\loaddll32.exeAPI/Special instruction interceptor: Address: 6B8CD551
Source: C:\Windows\System32\loaddll32.exeAPI/Special instruction interceptor: Address: 6D1E938B
Source: C:\Windows\System32\loaddll32.exeAPI/Special instruction interceptor: Address: 6CF8809B
Source: C:\Windows\System32\loaddll32.exeAPI/Special instruction interceptor: Address: 6D004EBA
Source: C:\Windows\System32\loaddll32.exeAPI/Special instruction interceptor: Address: 6CE0F2C8
Source: C:\Windows\System32\loaddll32.exeAPI/Special instruction interceptor: Address: 6D06EDA4
Source: C:\Windows\System32\loaddll32.exeAPI/Special instruction interceptor: Address: 6B8DD7C1
Source: C:\Windows\System32\loaddll32.exeAPI/Special instruction interceptor: Address: 6AC8BF01
Source: C:\Windows\System32\loaddll32.exeAPI/Special instruction interceptor: Address: 6AD1EC80
Source: C:\Windows\System32\loaddll32.exeAPI/Special instruction interceptor: Address: 6A818F63
Source: C:\Windows\System32\loaddll32.exeAPI/Special instruction interceptor: Address: 6A845437
Source: C:\Windows\System32\loaddll32.exeAPI/Special instruction interceptor: Address: 6AC95790
Source: C:\Windows\System32\loaddll32.exeAPI/Special instruction interceptor: Address: 698A5E3A
Source: C:\Windows\System32\loaddll32.exeAPI/Special instruction interceptor: Address: 6A887F4C
Source: C:\Windows\System32\loaddll32.exeAPI/Special instruction interceptor: Address: 6AB49DB8
Source: rundll32.exe, 00000006.00000002.223236076022.0000000002B5A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\loaddll32.exeProcess information queried: ProcessInformationJump to behavior

Anti Debugging

barindex
Source: C:\Windows\System32\loaddll32.exeThread information set: HideFromDebuggerJump to behavior
Source: C:\Windows\System32\loaddll32.exeThread information set: HideFromDebuggerJump to behavior
Source: C:\Windows\System32\loaddll32.exeThread information set: HideFromDebuggerJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeThread information set: HideFromDebuggerJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeThread information set: HideFromDebuggerJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeThread information set: HideFromDebuggerJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeThread information set: HideFromDebuggerJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeThread information set: HideFromDebuggerJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeThread information set: HideFromDebuggerJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeThread information set: HideFromDebuggerJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeThread information set: HideFromDebuggerJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeThread information set: HideFromDebuggerJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeThread information set: HideFromDebuggerJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeThread information set: HideFromDebuggerJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeThread information set: HideFromDebuggerJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess queried: DebugObjectHandleJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess queried: DebugObjectHandleJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess queried: DebugObjectHandleJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess queried: DebugObjectHandleJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess queried: DebugObjectHandleJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugObjectHandleJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugObjectHandleJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugObjectHandleJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugObjectHandleJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugObjectHandleJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugObjectHandleJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugObjectHandleJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugObjectHandleJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugObjectHandleJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugObjectHandleJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugObjectHandleJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugObjectHandleJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugObjectHandleJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugObjectHandleJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugObjectHandleJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugObjectHandleJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugObjectHandleJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugObjectHandleJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugObjectHandleJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugObjectHandleJump to behavior
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\KLWsv.dll",#1Jump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
11
Process Injection
21
Virtualization/Sandbox Evasion
1
Credential API Hooking
41
Security Software Discovery
Remote Services1
Credential API Hooking
Data ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Rundll32
LSASS Memory21
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
Process Injection
Security Account Manager1
Process Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDS11
System Information Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
KLWsv.dll67%ReversingLabsWin32.Spyware.Casbaneiro
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos
Joe Sandbox version:41.0.0 Charoite
Analysis ID:1544175
Start date and time:2024-10-29 00:03:51 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 8m 16s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 64 bit 20H2 Native physical Machine for testing VM-aware malware (Office 2019, Chrome 128, Firefox 91, Adobe Reader DC 21, Java 8 Update 301
Number of analysed new started processes analysed:8
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:KLWsv.dll
Detection:MAL
Classification:mal72.evad.winDLL@12/0@0/0
EGA Information:Failed
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 0
  • Number of non-executed functions: 0
Cookbook Comments:
  • Found application associated with file extension: .dll
  • Override analysis time to 240s for rundll32
  • Exclude process from analysis (whitelisted): dllhost.exe
  • Excluded domains from analysis (whitelisted): ctldl.windowsupdate.com
  • Not all processes where analyzed, report is missing behavior information
  • VT rate limit hit for: KLWsv.dll
No simulations
No context
No context
No context
No context
No context
No created / dropped files found
File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
Entropy (8bit):7.991605624820092
TrID:
  • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
  • Generic Win/DOS Executable (2004/3) 0.20%
  • DOS Executable Generic (2002/1) 0.20%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:KLWsv.dll
File size:32'656'384 bytes
MD5:102bcd38e265b5ab30ea24a798b76d27
SHA1:2fb9002e810ddf895610f5d46716d9ac76a9660e
SHA256:2059cd1e58c75266c997315777dbe2bad3e65e9811b101ae74d9fdf2321a3be6
SHA512:30534b00b98124f753160c2c2acb0bff157b613ecac0254642a114f3969913a4c3e83c10e0d05ac8163f6f2d7d20db18e55b37f46b56e94fc6b3ecc5cbc1a73d
SSDEEP:786432:t2C19fa2lX2GK9/NKQmVtsrGjhbgDQ6jn:BlX2TAG6NsDQ6b
TLSH:5967339F3ECB01E9ED821CB0DB2777F633F26F6149D648396681B845A4B2FB5112A443
File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........PE..L......f...........!.....Lr.........T}.......`r...@.......................................@................................
Icon Hash:1f7949c9c9693907
Entrypoint:0x5db7d54
Entrypoint Section:.%".
Digitally signed:false
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL
DLL Characteristics:DYNAMIC_BASE, NX_COMPAT
Time Stamp:0x66FCC8E7 [Wed Oct 2 04:15:35 2024 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:6
OS Version Minor:0
File Version Major:6
File Version Minor:0
Subsystem Version Major:6
Subsystem Version Minor:0
Import Hash:5679d8e241bca605be7b4e83bd6d01eb
Instruction
push ebx
mov ebx, BBBC9AAAh
not bx
pushfd
shl bl, 00000002h
call 00007F9F9F8BF3A0h
neg ecx
lea edx, dword ptr [eax-07DA665Eh]
sub eax, 68A9083Dh
jne 00007F9FA11E578Bh
push E83D9F07h
dec ecx
mov esp, ecx
inc ecx
mov edx, 068509B5h
dec edx
lea edi, dword ptr [081E6B8Bh+edx*4]
inc ecx
pop edi
inc ecx
pop ecx
dec edx
lea edx, dword ptr [edi+edx-28630B6Ah]
movzx eax, di
inc ecx
pop ebp
movzx ecx, dx
jmp 00007F9F9F33A18Dh
popad
lodsd
sub cl, ah
jp 00007F9FA105671Ch
mov al, D8h
jl 00007F9FA1056718h
dec ebx
arpl cx, bp
aas
jl 00007F9FA1056718h
dec ebx
add ecx, dword ptr [ecx]
scasd
sub al, D6h
dec ebx
jc 00007F9FA10567AAh
or dword ptr [esi+edx*8], ecx
dec ebx
stosb
mov eax, 99AF5F03h
lodsb
js 00007F9FA10566D2h
shl esi, 3Fh
jmp 00007FA0010692A0h
scasb
sbb al, 2Ch
imul ecx, edi, EAh
in al, 14h
add dword ptr [eax-2Eh], 1149C602h
jmp 00007F9FA1056796h
inc eax
les esi, fword ptr [eax+7Ch]
pop es
in al, F2h
fld dword ptr [ecx+edx*2-6Bh]
cld
retf 0F64h
xor byte ptr [ebx-48h], FFFFFF9Ah
idiv byte ptr [esi-36B08630h]
insd
and dl, dh
in al, FBh
aaa
shr dword ptr [edi-6Fh], cl
call 00007FA0203711A5h
fstp dword ptr [ebx+18D7B5AAh]
std
mov byte ptr [000000DAh], al
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x3c8a4b80x2e7.%".
IMAGE_DIRECTORY_ENTRY_IMPORT0x58579b40x190.%".
IMAGE_DIRECTORY_ENTRY_RESOURCE0x5b820000x1b7ec.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x5b9e0000x744.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x3c780000x9c.{oQ
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x5b6777c0x200.%".
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x71ce5c0x0d41d8cd98f00b204e9800998ecf8427eunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.itext0x71e0000x7a0c0x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.data0x7260000x2b4e00x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.bss0x7520000x8be00x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.idata0x75b0000x452c0x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.didata0x7600000xf6a0x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.edata0x7610000x2e70x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.rdata0x7620000x450x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.nv+0x7630000x1a0e60f0x0d41d8cd98f00b204e9800998ecf8427eunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.[sg0x21720000xb40x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.8E*0x21730000x15438200x0d41d8cd98f00b204e9800998ecf8427eunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.A~F0x36b70000x5c0fe20x0d41d8cd98f00b204e9800998ecf8427eunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.{oQ0x3c780000xb40x200856c746239d71f2bf15230b482b5740eFalse0.216796875data1.429248955326029IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.%".0x3c790000x1f086000x1f0860048007b3da1b522042c7f4bc6e647ac72unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rsrc0x5b820000x1b7ec0x1b80037b32af04b63479c9a2e1febb5b59612False0.76513671875data7.210721657588311IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0x5b9e0000x7440x8001741c37f44f50dd72c8653918281f306False0.4658203125data4.327041928488368IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_ICON0x5b823240x1628Device independent bitmap graphic, 64 x 128 x 8, image size 4096, 256 important colorsEnglishUnited States0.5627644569816643
RT_ICON0x5b8394c0xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsEnglishUnited States0.6388592750533049
RT_ICON0x5b847f40x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsEnglishUnited States0.7536101083032491
RT_ICON0x5b8509c0x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsEnglishUnited States0.6474654377880185
RT_ICON0x5b857640x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsEnglishUnited States0.5223988439306358
RT_ICON0x5b85ccc0xead1PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States1.000249530051736
RT_ICON0x5b947a00x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896EnglishUnited States0.40139348134152103
RT_ICON0x5b989c80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.46856846473029046
RT_ICON0x5b9af700x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.5349437148217636
RT_ICON0x5b9c0180x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.6221311475409836
RT_ICON0x5b9c9a00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.724290780141844
RT_GROUP_ICON0x5b9ce080xa0dataEnglishUnited States0.65625
RT_VERSION0x5b9cea80x234dataEnglishUnited States0.5053191489361702
RT_MANIFEST0x5b9d0dc0x710XML 1.0 document, ASCII text, with CRLF, LF line terminatorsEnglishUnited States0.4032079646017699
DLLImport
winmm.dlltimeGetTime
wininet.dllInternetGetConnectedState
comctl32.dllFlatSB_SetScrollInfo
shell32.dllSHGetMalloc
user32.dllCopyImage
version.dllGetFileVersionInfoSizeW
URLMON.DLLHlinkNavigateString
oleaut32.dllSafeArrayPutElement
netapi32.dllNetWkstaGetInfo
msvcrt.dllmemcpy
advapi32.dllRegSetValueExW
winhttp.dllWinHttpGetIEProxyConfigForCurrentUser
kernel32.dllGetVersion, GetVersionExW
SHFolder.dllSHGetFolderPathW
wsock32.dllgethostbyaddr
gdiplus.dllGdiplusShutdown
ole32.dllIsAccelerator
gdi32.dllAddFontMemResourceEx
Magnification.dllMagSetWindowSource
NameOrdinalAddress
QStringClose260xb0a554
QStringCmp250xb0a558
QStringCreate240xb0a55c
QStringGet230xb0a560
QStringSet220xb0a564
WebUIClose80xb0a59c
WebUICreate70xb0a5a0
WebUIResourceData60xb0a5a4
WebUIResourceEnum50xb0a5a8
WebUIResourceRegister40xb0a5ac
WebUIResourceUnregister30xb0a5b0
WebkitClose210xb0a568
WebkitCreate200xb0a56c
WebkitExecuteJavaScript190xb0a570
WebkitGetWindow180xb0a574
WebkitJavaScriptCallback170xb0a578
WebkitLoadFinished160xb0a57c
WebkitNavigate150xb0a580
WebkitRepaint140xb0a584
WebkitSetALTignore130xb0a588
WebkitSetDrop120xb0a58c
WebkitSetGeometry110xb0a590
WebkitSetTransparent100xb0a594
WebkitSetVisible90xb0a598
__dbk_fcall_wrapper20x411838
dbkFCallWrapperAddr10xb55648
Language of compilation systemCountry where language is spokenMap
EnglishUnited States
No network behavior found

Click to jump to process

Click to jump to process

Click to jump to process

Target ID:0
Start time:19:05:57
Start date:28/10/2024
Path:C:\Windows\System32\loaddll32.exe
Wow64 process (32bit):true
Commandline:loaddll32.exe "C:\Users\user\Desktop\KLWsv.dll"
Imagebase:0xba0000
File size:126'464 bytes
MD5 hash:51E6071F9CBA48E79F10C84515AAE618
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:false

Target ID:1
Start time:19:05:57
Start date:28/10/2024
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7ff610000
File size:875'008 bytes
MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:false

Target ID:2
Start time:19:05:57
Start date:28/10/2024
Path:C:\Windows\SysWOW64\cmd.exe
Wow64 process (32bit):true
Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\KLWsv.dll",#1
Imagebase:0x290000
File size:236'544 bytes
MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:false

Target ID:3
Start time:19:05:57
Start date:28/10/2024
Path:C:\Windows\SysWOW64\rundll32.exe
Wow64 process (32bit):true
Commandline:rundll32.exe C:\Users\user\Desktop\KLWsv.dll,QStringClose
Imagebase:0x10000
File size:61'440 bytes
MD5 hash:889B99C52A60DD49227C5E485A016679
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:false

Target ID:4
Start time:19:05:57
Start date:28/10/2024
Path:C:\Windows\SysWOW64\rundll32.exe
Wow64 process (32bit):true
Commandline:rundll32.exe "C:\Users\user\Desktop\KLWsv.dll",#1
Imagebase:0x10000
File size:61'440 bytes
MD5 hash:889B99C52A60DD49227C5E485A016679
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:false

Target ID:6
Start time:19:06:00
Start date:28/10/2024
Path:C:\Windows\SysWOW64\rundll32.exe
Wow64 process (32bit):true
Commandline:rundll32.exe C:\Users\user\Desktop\KLWsv.dll,QStringCmp
Imagebase:0x10000
File size:61'440 bytes
MD5 hash:889B99C52A60DD49227C5E485A016679
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:false

Target ID:7
Start time:19:06:03
Start date:28/10/2024
Path:C:\Windows\SysWOW64\rundll32.exe
Wow64 process (32bit):true
Commandline:rundll32.exe C:\Users\user\Desktop\KLWsv.dll,QStringCreate
Imagebase:0x10000
File size:61'440 bytes
MD5 hash:889B99C52A60DD49227C5E485A016679
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:false

No disassembly