Click to jump to signature section
Source: KLWsv.dll | ReversingLabs: Detection: 66% |
Source: KLWsv.dll | Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL |
Source: KLWsv.dll | Static PE information: DYNAMIC_BASE, NX_COMPAT |
Source: KLWsv.dll | Static PE information: section name: .nv+ |
Source: KLWsv.dll | Static PE information: section name: .[sg |
Source: KLWsv.dll | Static PE information: section name: .8E* |
Source: KLWsv.dll | Static PE information: section name: .A~F |
Source: KLWsv.dll | Static PE information: section name: .{oQ |
Source: KLWsv.dll | Static PE information: section name: .%". |
Source: KLWsv.dll | Static PE information: Number of sections : 16 > 10 |
Source: KLWsv.dll | Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL |
Source: classification engine | Classification label: mal72.evad.winDLL@12/0@0/0 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6420:120:WilError_03 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6420:304:WilStaging_02 |
Source: C:\Windows\System32\loaddll32.exe | Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\KLWsv.dll,QStringClose |
Source: KLWsv.dll | ReversingLabs: Detection: 66% |
Source: unknown | Process created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\KLWsv.dll" | |
Source: C:\Windows\System32\loaddll32.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\loaddll32.exe | Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\KLWsv.dll",#1 | |
Source: C:\Windows\System32\loaddll32.exe | Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\KLWsv.dll,QStringClose | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\KLWsv.dll",#1 | |
Source: C:\Windows\System32\loaddll32.exe | Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\KLWsv.dll,QStringCmp | |
Source: C:\Windows\System32\loaddll32.exe | Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\KLWsv.dll,QStringCreate | |
Source: C:\Windows\System32\loaddll32.exe | Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\KLWsv.dll",#1 | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\KLWsv.dll,QStringClose | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\KLWsv.dll,QStringCmp | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\KLWsv.dll,QStringCreate | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\KLWsv.dll",#1 | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Section loaded: netapi32.dll | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Section loaded: shfolder.dll | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Section loaded: wsock32.dll | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Section loaded: magnification.dll | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Section loaded: wtsapi32.dll | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Section loaded: d3d9.dll | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Section loaded: dwmapi.dll | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Section loaded: edgegdi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: KLWsv.dll | Static PE information: Virtual size of .text is bigger than: 0x100000 |
Source: KLWsv.dll | Static file information: File size 32656384 > 1048576 |
Source: KLWsv.dll | Static PE information: Raw size of .%". is bigger than: 0x100000 < 0x1f08600 |
Source: KLWsv.dll | Static PE information: DYNAMIC_BASE, NX_COMPAT |
Source: initial sample | Static PE information: section where entry point is pointing to: .%". |
Source: KLWsv.dll | Static PE information: section name: .didata |
Source: KLWsv.dll | Static PE information: section name: .nv+ |
Source: KLWsv.dll | Static PE information: section name: .[sg |
Source: KLWsv.dll | Static PE information: section name: .8E* |
Source: KLWsv.dll | Static PE information: section name: .A~F |
Source: KLWsv.dll | Static PE information: section name: .{oQ |
Source: KLWsv.dll | Static PE information: section name: .%". |
Source: C:\Windows\System32\loaddll32.exe | Memory written: PID: 5568 base: 3F0005 value: E9 AB 2E D3 76 | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Memory written: PID: 5568 base: 77122EB0 value: E9 5A D1 2C 89 | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Memory written: PID: 5568 base: 9A0007 value: E9 6B DC 7B 76 | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Memory written: PID: 5568 base: 7715DC70 value: E9 9E 23 84 89 | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Memory written: PID: 4228 base: 2CA0005 value: E9 AB 2E 48 74 | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Memory written: PID: 4228 base: 77122EB0 value: E9 5A D1 B7 8B | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Memory written: PID: 4228 base: 2CB0007 value: E9 6B DC 4A 74 | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Memory written: PID: 4228 base: 7715DC70 value: E9 9E 23 B5 8B | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Memory written: PID: 7384 base: 25C0005 value: E9 AB 2E B6 74 | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Memory written: PID: 7384 base: 77122EB0 value: E9 5A D1 49 8B | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Memory written: PID: 7384 base: 4010007 value: E9 6B DC 14 73 | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Memory written: PID: 7384 base: 7715DC70 value: E9 9E 23 EB 8C | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Memory written: PID: 5968 base: 2D60005 value: E9 AB 2E 3C 74 | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Memory written: PID: 5968 base: 77122EB0 value: E9 5A D1 C3 8B | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Memory written: PID: 5968 base: 2D70007 value: E9 6B DC 3E 74 | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Memory written: PID: 5968 base: 7715DC70 value: E9 9E 23 C1 8B | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Memory written: PID: 2752 base: 2880005 value: E9 AB 2E 8A 74 | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Memory written: PID: 2752 base: 77122EB0 value: E9 5A D1 75 8B | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Memory written: PID: 2752 base: 43B0007 value: E9 6B DC DA 72 | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Memory written: PID: 2752 base: 7715DC70 value: E9 9E 23 25 8D | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | System information queried: FirmwareTableInformation | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | System information queried: FirmwareTableInformation | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | API/Special instruction interceptor: Address: 6D04A216 |
Source: C:\Windows\System32\loaddll32.exe | API/Special instruction interceptor: Address: 6D040402 |
Source: C:\Windows\System32\loaddll32.exe | API/Special instruction interceptor: Address: 6CFAA321 |
Source: C:\Windows\System32\loaddll32.exe | API/Special instruction interceptor: Address: 6CDD35F6 |
Source: C:\Windows\System32\loaddll32.exe | API/Special instruction interceptor: Address: 6CDE591B |
Source: C:\Windows\System32\loaddll32.exe | API/Special instruction interceptor: Address: 6D202049 |
Source: C:\Windows\System32\loaddll32.exe | API/Special instruction interceptor: Address: 6CFDBB6E |
Source: C:\Windows\System32\loaddll32.exe | API/Special instruction interceptor: Address: 6B375D6B |
Source: C:\Windows\System32\loaddll32.exe | API/Special instruction interceptor: Address: 6CED523E |
Source: C:\Windows\System32\loaddll32.exe | API/Special instruction interceptor: Address: 6D0860DF |
Source: C:\Windows\System32\loaddll32.exe | API/Special instruction interceptor: Address: 6CDF1A06 |
Source: C:\Windows\System32\loaddll32.exe | API/Special instruction interceptor: Address: 6CE142BC |
Source: C:\Windows\System32\loaddll32.exe | API/Special instruction interceptor: Address: 6CE2D6A5 |
Source: C:\Windows\System32\loaddll32.exe | API/Special instruction interceptor: Address: 6D0A816B |
Source: C:\Windows\System32\loaddll32.exe | API/Special instruction interceptor: Address: 6B8CD551 |
Source: C:\Windows\System32\loaddll32.exe | API/Special instruction interceptor: Address: 6D1E938B |
Source: C:\Windows\System32\loaddll32.exe | API/Special instruction interceptor: Address: 6CF8809B |
Source: C:\Windows\System32\loaddll32.exe | API/Special instruction interceptor: Address: 6D004EBA |
Source: C:\Windows\System32\loaddll32.exe | API/Special instruction interceptor: Address: 6CE0F2C8 |
Source: C:\Windows\System32\loaddll32.exe | API/Special instruction interceptor: Address: 6D06EDA4 |
Source: C:\Windows\System32\loaddll32.exe | API/Special instruction interceptor: Address: 6B8DD7C1 |
Source: C:\Windows\System32\loaddll32.exe | API/Special instruction interceptor: Address: 6AC8BF01 |
Source: C:\Windows\System32\loaddll32.exe | API/Special instruction interceptor: Address: 6AD1EC80 |
Source: C:\Windows\System32\loaddll32.exe | API/Special instruction interceptor: Address: 6A818F63 |
Source: C:\Windows\System32\loaddll32.exe | API/Special instruction interceptor: Address: 6A845437 |
Source: C:\Windows\System32\loaddll32.exe | API/Special instruction interceptor: Address: 6AC95790 |
Source: C:\Windows\System32\loaddll32.exe | API/Special instruction interceptor: Address: 698A5E3A |
Source: C:\Windows\System32\loaddll32.exe | API/Special instruction interceptor: Address: 6A887F4C |
Source: C:\Windows\System32\loaddll32.exe | API/Special instruction interceptor: Address: 6AB49DB8 |
Source: rundll32.exe, 00000006.00000002.223236076022.0000000002B5A000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: SBIEDLL.DLL |
Source: all processes | Thread injection, dropped files, key value created, disk infection and DNS query: no activity detected |
Source: C:\Windows\System32\conhost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\loaddll32.exe | Process information queried: ProcessInformation | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Thread information set: HideFromDebugger | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Thread information set: HideFromDebugger | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Thread information set: HideFromDebugger | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Thread information set: HideFromDebugger | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Thread information set: HideFromDebugger | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Thread information set: HideFromDebugger | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Thread information set: HideFromDebugger | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Thread information set: HideFromDebugger | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Thread information set: HideFromDebugger | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Thread information set: HideFromDebugger | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Thread information set: HideFromDebugger | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Thread information set: HideFromDebugger | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Thread information set: HideFromDebugger | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Thread information set: HideFromDebugger | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Thread information set: HideFromDebugger | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Process queried: DebugPort | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Process queried: DebugObjectHandle | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Process queried: DebugObjectHandle | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Process queried: DebugObjectHandle | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Process queried: DebugPort | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Process queried: DebugPort | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Process queried: DebugObjectHandle | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Process queried: DebugObjectHandle | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process queried: DebugPort | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process queried: DebugObjectHandle | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process queried: DebugObjectHandle | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process queried: DebugObjectHandle | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process queried: DebugPort | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process queried: DebugPort | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process queried: DebugObjectHandle | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process queried: DebugObjectHandle | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process queried: DebugPort | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process queried: DebugObjectHandle | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process queried: DebugObjectHandle | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process queried: DebugObjectHandle | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process queried: DebugPort | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process queried: DebugPort | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process queried: DebugObjectHandle | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process queried: DebugObjectHandle | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process queried: DebugPort | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process queried: DebugObjectHandle | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process queried: DebugObjectHandle | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process queried: DebugObjectHandle | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process queried: DebugPort | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process queried: DebugPort | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process queried: DebugObjectHandle | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process queried: DebugObjectHandle | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process queried: DebugPort | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process queried: DebugObjectHandle | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process queried: DebugObjectHandle | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process queried: DebugObjectHandle | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process queried: DebugPort | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process queried: DebugPort | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process queried: DebugObjectHandle | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process queried: DebugObjectHandle | Jump to behavior |
Source: all processes | Thread injection, dropped files, key value created, disk infection and DNS query: no activity detected |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\KLWsv.dll",#1 | Jump to behavior |