Windows
Analysis Report
94.159.113.82.dll.dll
Overview
General Information
Sample name: | 94.159.113.82.dll.dll (renamed file extension from exe to dll) |
Original sample name: | 94.159.113.82.dll.exe |
Analysis ID: | 1545965 |
MD5: | e32d64da480b63435d9b559e718354d2 |
SHA1: | aff97210b69e95313c6b28d4bd87346f97b6c637 |
SHA256: | 65bcd99f78a0ef84ada6e7ae4b349a915d08e150e38d76c15ed657cff2d8948c |
Tags: | 94-159-113-82--8888dllexeuser-JAMESWT_MHT |
Infos: | |
Detection
Score: | 56 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- loaddll64.exe (PID: 2808 cmdline:
loaddll64. exe "C:\Us ers\user\D esktop\94. 159.113.82 .dll.dll" MD5: 763455F9DCB24DFEECC2B9D9F8D46D52) - conhost.exe (PID: 2136 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - cmd.exe (PID: 3132 cmdline:
cmd.exe /C rundll32. exe "C:\Us ers\user\D esktop\94. 159.113.82 .dll.dll", #1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - rundll32.exe (PID: 4476 cmdline:
rundll32.e xe "C:\Use rs\user\De sktop\94.1 59.113.82. dll.dll",# 1 MD5: EF3179D498793BF4234F708D3BE28633) - rundll32.exe (PID: 5952 cmdline:
rundll32.e xe C:\User s\user\Des ktop\94.15 9.113.82.d ll.dll,Ent ry MD5: EF3179D498793BF4234F708D3BE28633) - rundll32.exe (PID: 3336 cmdline:
rundll32.e xe "C:\Use rs\user\De sktop\94.1 59.113.82. dll.dll",E ntry MD5: EF3179D498793BF4234F708D3BE28633)
- cleanup
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_StrelaStealer | Yara detected Strela Stealer | Joe Security | ||
JoeSecurity_StrelaStealer | Yara detected Strela Stealer | Joe Security | ||
JoeSecurity_StrelaStealer | Yara detected Strela Stealer | Joe Security | ||
JoeSecurity_StrelaStealer | Yara detected Strela Stealer | Joe Security | ||
JoeSecurity_StrelaStealer | Yara detected Strela Stealer | Joe Security | ||
Click to see the 4 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_StrelaStealer | Yara detected Strela Stealer | Joe Security | ||
JoeSecurity_StrelaStealer | Yara detected Strela Stealer | Joe Security | ||
JoeSecurity_StrelaStealer | Yara detected Strela Stealer | Joe Security | ||
JoeSecurity_StrelaStealer | Yara detected Strela Stealer | Joe Security | ||
JoeSecurity_StrelaStealer | Yara detected Strela Stealer | Joe Security | ||
Click to see the 4 entries |
Click to jump to signature section
AV Detection |
---|
Source: | ReversingLabs: |
Source: | Static PE information: |
Source: | Code function: | 3_2_00007FF8E84A3330 | |
Source: | Code function: | 3_2_00007FF8E84A2D30 | |
Source: | Code function: | 3_2_00007FF8E84CE220 | |
Source: | Code function: | 3_2_00007FF8E84C96B0 | |
Source: | Code function: | 3_2_00007FF8E84CF000 | |
Source: | Code function: | 3_2_00007FF8E84E1420 | |
Source: | Code function: | 3_2_00007FF8E84E9890 | |
Source: | Code function: | 3_2_00007FF8E84E145B | |
Source: | Code function: | 3_2_00000143A8441540 | |
Source: | Code function: | 3_2_00000143A84471AC | |
Source: | Code function: | 3_2_00000143A8441A30 | |
Source: | Code function: | 3_2_00000143A844F3D8 | |
Source: | Code function: | 4_2_000002DFACABF3D8 | |
Source: | Code function: | 4_2_000002DFACAB71AC | |
Source: | Code function: | 4_2_000002DFACAB1540 | |
Source: | Code function: | 4_2_000002DFACAB1A30 | |
Source: | Code function: | 6_2_00000230D343F3D8 | |
Source: | Code function: | 6_2_00000230D3431A30 | |
Source: | Code function: | 6_2_00000230D34371AC | |
Source: | Code function: | 6_2_00000230D3431540 |
Source: | Static PE information: |
Source: | Classification label: |
Source: | Mutant created: |
Source: | Static PE information: |
Source: | Key opened: | Jump to behavior |
Source: | Process created: |
Source: | ReversingLabs: |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Automated click: | ||
Source: | Automated click: | ||
Source: | Automated click: |
Source: | Window detected: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Code function: | 3_2_00000143A844BA95 | |
Source: | Code function: | 3_2_00000143A844CB95 | |
Source: | Code function: | 4_2_000002DFACABCB95 | |
Source: | Code function: | 4_2_000002DFACAC762E | |
Source: | Code function: | 4_2_000002DFACABBA95 | |
Source: | Code function: | 6_2_00000230D343CB95 | |
Source: | Code function: | 6_2_00000230D343BA95 |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior |
Source: | Thread injection, dropped files, key value created, disk infection and DNS query: |
Source: | Last function: |
Source: | Thread delayed: | Jump to behavior |
Source: | Thread injection, dropped files, key value created, disk infection and DNS query: |
Source: | Process created: | Jump to behavior |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | 1 DLL Side-Loading | 11 Process Injection | 1 Rundll32 | OS Credential Dumping | 11 Virtualization/Sandbox Evasion | Remote Services | 1 Archive Collected Data | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 11 Virtualization/Sandbox Evasion | LSASS Memory | 1 System Information Discovery | Remote Desktop Protocol | Data from Removable Media | Junk Data | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 11 Process Injection | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | Steganography | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 1 DLL Side-Loading | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | Protocol Impersonation | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 Obfuscated Files or Information | LSA Secrets | Internet Connection Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
34% | ReversingLabs |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
s-part-0044.t-0009.fb-t-msedge.net | 13.107.253.72 | true | false | unknown | |
fp2e7a.wpc.phicdn.net | 192.229.221.95 | true | false | unknown |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1545965 |
Start date and time: | 2024-10-31 11:03:32 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 2m 46s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 7 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | 94.159.113.82.dll.dll (renamed file extension from exe to dll) |
Original Sample Name: | 94.159.113.82.dll.exe |
Detection: | MAL |
Classification: | mal56.troj.winDLL@10/0@0/0 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): dllhost.exe
- Excluded IPs from analysis (whitelisted): 52.149.20.212
- Excluded domains from analysis (whitelisted): azurefd-t-fb-prod.trafficmanager.net, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, otelrules.afd.azureedge.net, ocsp.edge.digicert.com, sls.update.microsoft.com, azureedge-t-prod.trafficmanager.net, glb.sls.prod.dcat.dsp.trafficmanager.net
- Not all processes where analyzed, report is missing behavior information
- VT rate limit hit for: 94.159.113.82.dll.dll
Time | Type | Description |
---|---|---|
06:04:30 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
fp2e7a.wpc.phicdn.net | Get hash | malicious | Strela Downloader | Browse |
| |
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Strela Downloader | Browse |
| ||
Get hash | malicious | Strela Downloader | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
s-part-0044.t-0009.fb-t-msedge.net | Get hash | malicious | Mamba2FA | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher, Microsoft Phishing | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Credential Flusher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
File type: | |
Entropy (8bit): | 7.3275976376954555 |
TrID: |
|
File name: | 94.159.113.82.dll.dll |
File size: | 425'984 bytes |
MD5: | e32d64da480b63435d9b559e718354d2 |
SHA1: | aff97210b69e95313c6b28d4bd87346f97b6c637 |
SHA256: | 65bcd99f78a0ef84ada6e7ae4b349a915d08e150e38d76c15ed657cff2d8948c |
SHA512: | 8e1d0ae4d1537ce18de577674255350dd4bb73f5b2dfb185c9b8b9695c0f081f7e5501da123622528daf13a73943dffc7031d9187a2e00759c13168e5c38e685 |
SSDEEP: | 6144:0zAcM4oqgAcjMPkvfJs3CeTqehGtXLEqNhNuLsYWkqitvqP7UOsX2IX27pxAl6Fo:0AcM5pjFH+CelQtXLEeKLZMPsm7Al0p |
TLSH: | 6794CF24FC7AD059ECE38072BF29D221D1662E7BDF1D2266A1EC4D404054DEFB52A1BB |
File Content Preview: | MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..d...l1"g.........." ................0-....................................................`........................................ |
Icon Hash: | 7ae282899bbab082 |
Entrypoint: | 0x180002d30 |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x180000000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, DLL |
DLL Characteristics: | HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT |
Time Stamp: | 0x6722316C [Wed Oct 30 13:15:24 2024 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 6 |
OS Version Minor: | 0 |
File Version Major: | 6 |
File Version Minor: | 0 |
Subsystem Version Major: | 6 |
Subsystem Version Minor: | 0 |
Import Hash: |
Instruction |
---|
inc ecx |
push edi |
inc ecx |
push esi |
inc ecx |
push esp |
push esi |
push edi |
push ebp |
push ebx |
push eax |
mov eax, dword ptr [0006670Fh] |
inc esp |
mov eax, dword ptr [0006670Ch] |
inc esp |
lea ebx, dword ptr [eax-01h] |
inc esp |
imul ebx, eax |
inc ebp |
mov edx, ebx |
inc ecx |
not edx |
inc ebp |
mov ecx, edx |
inc ecx |
and ecx, D2AA348Dh |
inc esp |
mov edi, edx |
inc esp |
and edi, ebx |
inc esp |
mov ebx, ebx |
inc ebp |
mov edi, ebx |
inc ecx |
xor edi, 0F184C9Ah |
inc ebp |
and edi, ebx |
inc ecx |
and ebx, 2D55CB72h |
inc ebp |
or ebx, ecx |
inc esp |
mov eax, ebx |
xor eax, 29414802h |
inc ecx |
xor ebx, D2AA348Dh |
mov ecx, edi |
not ecx |
inc esp |
mov ebp, ebx |
and ebp, 161C9371h |
and eax, E9E36C8Eh |
or eax, ebp |
inc ecx |
or ebx, ecx |
and ecx, 161C9371h |
and edi, E9E36C8Eh |
or edi, ecx |
xor edi, eax |
inc ecx |
not ebx |
inc ecx |
or ebx, edi |
inc esp |
mov eax, ebx |
not eax |
and eax, 42B35279h |
inc ecx |
and ebx, BD4CAD86h |
inc ecx |
or ebx, eax |
inc esp |
mov eax, ebx |
and eax, 01h |
inc ecx |
xor ebx, BD4CAD87h |
inc ecx |
or ebx, eax |
inc esp |
mov eax, ebx |
not eax |
inc esp |
mov ecx, edx |
and ecx, BB0EB11Ah |
and ebx, 44F14EE5h |
or ebx, ecx |
mov edx, ebx |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x4b000 | 0x47 | .rdata |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x6b000 | 0x1a8 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x6a000 | 0x60 | .pdata |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x49fa7 | 0x4a000 | fdb8918e6430ea5398fae9c2144872af | False | 0.6443266997466216 | data | 6.792587224644498 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x4b000 | 0x108 | 0x200 | 308a0ae10b14504162d1d14cd1c21df1 | False | 0.298828125 | data | 3.0907339362177764 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0x4c000 | 0x1d498 | 0x1d600 | 0c51fb4af0fddb6e9b0ca1ca23212a38 | False | 0.8658909574468086 | data | 7.729026462495868 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.pdata | 0x6a000 | 0x60 | 0x200 | 4991a695e7c4be8f5933ff807bbdd21c | False | 0.177734375 | PEX Binary Archive | 1.1106520083640667 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.rsrc | 0x6b000 | 0x1a8 | 0x200 | a3e915e0923731bd5fc6ef6d5ff6d820 | False | 0.486328125 | data | 4.190620030451981 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_MANIFEST | 0x6b060 | 0x143 | XML 1.0 document, ASCII text | English | United States | 0.628482972136223 |
Name | Ordinal | Address |
---|---|---|
Entry | 1 | 0x180001010 |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Oct 31, 2024 11:04:23.324624062 CET | 1.1.1.1 | 192.168.2.9 | 0x4159 | No error (0) | azurefd-t-fb-prod.trafficmanager.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Oct 31, 2024 11:04:23.324624062 CET | 1.1.1.1 | 192.168.2.9 | 0x4159 | No error (0) | s-part-0044.t-0009.fb-t-msedge.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Oct 31, 2024 11:04:23.324624062 CET | 1.1.1.1 | 192.168.2.9 | 0x4159 | No error (0) | 13.107.253.72 | A (IP address) | IN (0x0001) | false | ||
Oct 31, 2024 11:04:44.942229033 CET | 1.1.1.1 | 192.168.2.9 | 0xca78 | No error (0) | fp2e7a.wpc.phicdn.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Oct 31, 2024 11:04:44.942229033 CET | 1.1.1.1 | 192.168.2.9 | 0xca78 | No error (0) | 192.229.221.95 | A (IP address) | IN (0x0001) | false |
Click to jump to process
Click to jump to process
Click to jump to process
Target ID: | 0 |
Start time: | 06:04:27 |
Start date: | 31/10/2024 |
Path: | C:\Windows\System32\loaddll64.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6b65f0000 |
File size: | 165'888 bytes |
MD5 hash: | 763455F9DCB24DFEECC2B9D9F8D46D52 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 1 |
Start time: | 06:04:27 |
Start date: | 31/10/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff70f010000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 2 |
Start time: | 06:04:27 |
Start date: | 31/10/2024 |
Path: | C:\Windows\System32\cmd.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7edca0000 |
File size: | 289'792 bytes |
MD5 hash: | 8A2122E8162DBEF04694B9C3E0B6CDEE |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 3 |
Start time: | 06:04:27 |
Start date: | 31/10/2024 |
Path: | C:\Windows\System32\rundll32.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7dd3b0000 |
File size: | 71'680 bytes |
MD5 hash: | EF3179D498793BF4234F708D3BE28633 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | high |
Has exited: | true |
Target ID: | 4 |
Start time: | 06:04:27 |
Start date: | 31/10/2024 |
Path: | C:\Windows\System32\rundll32.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7dd3b0000 |
File size: | 71'680 bytes |
MD5 hash: | EF3179D498793BF4234F708D3BE28633 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | high |
Has exited: | true |
Target ID: | 6 |
Start time: | 06:04:30 |
Start date: | 31/10/2024 |
Path: | C:\Windows\System32\rundll32.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7dd3b0000 |
File size: | 71'680 bytes |
MD5 hash: | EF3179D498793BF4234F708D3BE28633 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | high |
Has exited: | true |
Execution Graph
Execution Coverage: | 22.3% |
Dynamic/Decrypted Code Coverage: | 84% |
Signature Coverage: | 16% |
Total number of Nodes: | 25 |
Total number of Limit Nodes: | 3 |
Graph
Function 00007FF8E84A3330 Relevance: 62.0, APIs: 1, Strings: 27, Instructions: 20001COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00000143A8442080 Relevance: 3.6, APIs: 1, Strings: 1, Instructions: 80threadCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Control-flow Graph
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Control-flow Graph
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00000143A844F3D8 Relevance: 1.8, APIs: 1, Instructions: 321COMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00007FF8E84E145B Relevance: .5, Instructions: 479COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00007FF8E84A2D30 Relevance: .4, Instructions: 450COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00000143A8441540 Relevance: .4, Instructions: 408COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00000143A8441A30 Relevance: .3, Instructions: 330COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00000143A84471AC Relevance: .2, Instructions: 219COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00000143A8443FA0 Relevance: 12.7, APIs: 4, Strings: 3, Instructions: 463COMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00000143A8444820 Relevance: 7.2, APIs: 2, Strings: 2, Instructions: 201COMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00000143A8442BE0 Relevance: 5.5, APIs: 2, Strings: 1, Instructions: 233COMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00000143A8444470 Relevance: 5.5, APIs: 1, Strings: 2, Instructions: 233COMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Execution Graph
Execution Coverage: | 1.6% |
Dynamic/Decrypted Code Coverage: | 100% |
Signature Coverage: | 0% |
Total number of Nodes: | 28 |
Total number of Limit Nodes: | 4 |
Graph
Function 000002DFACAB2080 Relevance: 3.6, APIs: 1, Strings: 1, Instructions: 80threadCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000002DFACAB3FA0 Relevance: 12.7, APIs: 4, Strings: 3, Instructions: 463COMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000002DFACAB4820 Relevance: 7.2, APIs: 2, Strings: 2, Instructions: 201COMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000002DFACAB2BE0 Relevance: 5.5, APIs: 2, Strings: 1, Instructions: 233COMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 000002DFACAB4470 Relevance: 5.5, APIs: 1, Strings: 2, Instructions: 233COMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Execution Graph
Execution Coverage: | 1.3% |
Dynamic/Decrypted Code Coverage: | 100% |
Signature Coverage: | 0% |
Total number of Nodes: | 21 |
Total number of Limit Nodes: | 2 |
Graph
Function 00000230D3432080 Relevance: 3.6, APIs: 1, Strings: 1, Instructions: 80threadCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00000230D3433FA0 Relevance: 12.7, APIs: 4, Strings: 3, Instructions: 463COMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00000230D3434820 Relevance: 7.2, APIs: 2, Strings: 2, Instructions: 201COMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00000230D3432BE0 Relevance: 5.5, APIs: 2, Strings: 1, Instructions: 233COMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00000230D3434470 Relevance: 5.5, APIs: 1, Strings: 2, Instructions: 233COMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|