Windows Analysis Report
Jr2YluqEVG.dll

Overview

General Information

Sample name: Jr2YluqEVG.dll
renamed because original name is a hash value
Original sample name: 700a8957c6864ffbd6b093d57f31271beb5815a5a8eaccc446d4f6f9f575ad3d.dll
Analysis ID: 1544799
MD5: 9fcb34e9e4f331403ccb98f6ead542bc
SHA1: e9544c70795cd7807f2d7f6fc32cf716448b8b2b
SHA256: 700a8957c6864ffbd6b093d57f31271beb5815a5a8eaccc446d4f6f9f575ad3d
Tags: 2024bankerdllgolangloadermekotiouser-johnk3r
Infos:

Detection

Score: 2
Range: 0 - 100
Whitelisted: false
Confidence: 80%

Signatures

Checks if the current process is being debugged
Creates a process in suspended mode (likely to inject code)
Program does not show much activity (idle)
Uses 32bit PE files

Classification

Source: Jr2YluqEVG.dll Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL
Source: Jr2YluqEVG.dll Static PE information: DYNAMIC_BASE, NX_COMPAT
Source: Jr2YluqEVG.dll Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL
Source: classification engine Classification label: clean2.winDLL@12/0@0/0
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7192:120:WilError_03
Source: Jr2YluqEVG.dll Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Windows\System32\loaddll32.exe Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\Jr2YluqEVG.dll,?gb_FB2CImage@@YAHPAXHHAAVCImage@ATL@@_N@Z
Source: unknown Process created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\Jr2YluqEVG.dll"
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\Jr2YluqEVG.dll",#1
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\Jr2YluqEVG.dll,?gb_FB2CImage@@YAHPAXHHAAVCImage@ATL@@_N@Z
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\Jr2YluqEVG.dll",#1
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\Jr2YluqEVG.dll,?gb_get_widget_image_with_alpha@@YAHPAXAAVCImage@ATL@@_N@Z
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\Jr2YluqEVG.dll,UG_ArcCreate
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\Jr2YluqEVG.dll",#1 Jump to behavior
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\Jr2YluqEVG.dll,?gb_FB2CImage@@YAHPAXHHAAVCImage@ATL@@_N@Z Jump to behavior
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\Jr2YluqEVG.dll,?gb_get_widget_image_with_alpha@@YAHPAXAAVCImage@ATL@@_N@Z Jump to behavior
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\Jr2YluqEVG.dll,UG_ArcCreate Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\Jr2YluqEVG.dll",#1 Jump to behavior
Source: C:\Windows\System32\loaddll32.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Windows\System32\loaddll32.exe Section loaded: lvgl.dll Jump to behavior
Source: C:\Windows\System32\loaddll32.exe Section loaded: msimg32.dll Jump to behavior
Source: C:\Windows\System32\loaddll32.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Windows\System32\loaddll32.exe Section loaded: oleacc.dll Jump to behavior
Source: C:\Windows\System32\loaddll32.exe Section loaded: winmm.dll Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Automated click: OK
Source: C:\Windows\SysWOW64\rundll32.exe Automated click: OK
Source: C:\Windows\SysWOW64\rundll32.exe Automated click: OK
Source: C:\Windows\SysWOW64\rundll32.exe Automated click: OK
Source: C:\Windows\SysWOW64\rundll32.exe Automated click: OK
Source: Window Recorder Window detected: More than 3 window changes detected
Source: Jr2YluqEVG.dll Static PE information: More than 466 > 100 exports found
Source: Jr2YluqEVG.dll Static PE information: Virtual size of .text is bigger than: 0x100000
Source: Jr2YluqEVG.dll Static file information: File size 3079680 > 1048576
Source: Jr2YluqEVG.dll Static PE information: Raw size of .text is bigger than: 0x100000 < 0x245200
Source: Jr2YluqEVG.dll Static PE information: More than 200 imports for USER32.dll
Source: Jr2YluqEVG.dll Static PE information: More than 200 imports for lvgl.dll
Source: Jr2YluqEVG.dll Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: Jr2YluqEVG.dll Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: Jr2YluqEVG.dll Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: Jr2YluqEVG.dll Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Jr2YluqEVG.dll Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: Jr2YluqEVG.dll Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: Jr2YluqEVG.dll Static PE information: DYNAMIC_BASE, NX_COMPAT
Source: Jr2YluqEVG.dll Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Jr2YluqEVG.dll Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: Jr2YluqEVG.dll Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: Jr2YluqEVG.dll Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: Jr2YluqEVG.dll Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: Jr2YluqEVG.dll Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: all processes Thread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Windows\System32\loaddll32.exe Process queried: DebugPort Jump to behavior
Source: all processes Thread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\Jr2YluqEVG.dll",#1 Jump to behavior
No contacted IP infos