Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
dz6dQWx0DD.dll

Overview

General Information

Sample name:dz6dQWx0DD.dll
renamed because original name is a hash value
Original sample name:599eddbe139894f6ce91721f373eff38f3248bb0.dll
Analysis ID:1578329
MD5:5c3eec19cb70cb4e1d7b91e451c9cc85
SHA1:599eddbe139894f6ce91721f373eff38f3248bb0
SHA256:e626dce8b1786976e361f8f60d9c7b829f113004625f26fdf09b126e81e22a36
Tags:dlluser-NDA0E
Infos:

Detection

Nitol
Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Nitol
Machine Learning detection for sample
Creates a process in suspended mode (likely to inject code)
Program does not show much activity (idle)
Sample execution stops while process was sleeping (likely an evasion)
Uses 32bit PE files
Yara signature match

Classification

  • System is w10x64
  • loaddll32.exe (PID: 7704 cmdline: loaddll32.exe "C:\Users\user\Desktop\dz6dQWx0DD.dll" MD5: 51E6071F9CBA48E79F10C84515AAE618)
    • conhost.exe (PID: 7712 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 7752 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\dz6dQWx0DD.dll",#1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • rundll32.exe (PID: 7776 cmdline: rundll32.exe "C:\Users\user\Desktop\dz6dQWx0DD.dll",#1 MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7760 cmdline: rundll32.exe C:\Users\user\Desktop\dz6dQWx0DD.dll,ServiceMain MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7904 cmdline: rundll32.exe "C:\Users\user\Desktop\dz6dQWx0DD.dll",ServiceMain MD5: 889B99C52A60DD49227C5E485A016679)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
dz6dQWx0DD.dllJoeSecurity_NitolYara detected NitolJoe Security
    dz6dQWx0DD.dllGhostDragon_Gh0stRATDetects Gh0st RAT mentioned in Cylance\' Ghost Dragon ReportFlorian Roth
    • 0x16f48:$x4: Http/1.1 403 Forbidden
    • 0x16b1c:$s4: Mozilla/4.0 (compatible)
    • 0x16f48:$s5: Http/1.1 403 Forbidden
    dz6dQWx0DD.dllINDICATOR_SUSPICIOUS_EXE_RegKeyComb_RDPDetects executables embedding registry key / value combination manipulating RDP / Terminal ServicesditekSHen
    • 0x17e7c:$r1: SOFTWARE\Policies\Microsoft\Windows\Installer
    • 0x17ed8:$k1: EnableAdminTSRemote
    • 0x17aec:$r2: SYSTEM\CurrentControlSet\Control\Terminal Server
    • 0x17b74:$r2: SYSTEM\CurrentControlSet\Control\Terminal Server
    • 0x17c00:$r2: SYSTEM\CurrentControlSet\Control\Terminal Server
    • 0x17d6c:$r2: SYSTEM\CurrentControlSet\Control\Terminal Server
    • 0x17dd0:$k2: TSEnabled
    • 0x17d0c:$r3: SYSTEM\CurrentControlSet\Services\TermDD
    • 0x17cb0:$r4: SYSTEM\CurrentControlSet\Services\TermService
    • 0x17d60:$k3: Start
    • 0x17aec:$r5: SYSTEM\CurrentControlSet\Control\Terminal Server
    • 0x17b74:$r5: SYSTEM\CurrentControlSet\Control\Terminal Server
    • 0x17c00:$r5: SYSTEM\CurrentControlSet\Control\Terminal Server
    • 0x17d6c:$r5: SYSTEM\CurrentControlSet\Control\Terminal Server
    • 0x17c88:$k4: fDenyTSConnections
    • 0x17c00:$r6: SYSTEM\CurrentControlSet\Control\Terminal Server\RDPTcp
    • 0x17aec:$r7: SYSTEM\CurrentControlSet\Control\Terminal Server\Wds\rdpwd\Tds\tcp
    • 0x17b74:$r8: SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp
    • 0x17c70:$k5: PortNumber
    No Sigma rule has matched
    No Suricata rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: dz6dQWx0DD.dllAvira: detected
    Source: dz6dQWx0DD.dllReversingLabs: Detection: 81%
    Source: dz6dQWx0DD.dllJoe Sandbox ML: detected
    Source: dz6dQWx0DD.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL

    System Summary

    barindex
    Source: dz6dQWx0DD.dll, type: SAMPLEMatched rule: Detects Gh0st RAT mentioned in Cylance\' Ghost Dragon Report Author: Florian Roth
    Source: dz6dQWx0DD.dll, type: SAMPLEMatched rule: Detects executables embedding registry key / value combination manipulating RDP / Terminal Services Author: ditekSHen
    Source: dz6dQWx0DD.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
    Source: dz6dQWx0DD.dll, type: SAMPLEMatched rule: GhostDragon_Gh0stRAT date = 2016-04-23, hash4 = b803381535ac24ce7c8fdcf6155566d208dfca63fd66ec71bbc6754233e251f5, hash3 = 6c7f8ba75889e0021c4616fcbee86ac06cd7f5e1e355e0cbfbbb5110c08bb6df, hash2 = 99ee5b764a5db1cb6b8a4f62605b5536487d9c35a28a23de8f9174659f65bcb2, hash1 = f9a669d22866cd041e2d520c5eb093188962bea8864fdfd0c0abb2b254e9f197, author = Florian Roth, description = Detects Gh0st RAT mentioned in Cylance\' Ghost Dragon Report, reference = https://blog.cylance.com/the-ghost-dragon, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: dz6dQWx0DD.dll, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_EXE_RegKeyComb_RDP author = ditekSHen, description = Detects executables embedding registry key / value combination manipulating RDP / Terminal Services
    Source: classification engineClassification label: mal76.troj.winDLL@10/0@0/0
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7712:120:WilError_03
    Source: dz6dQWx0DD.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\dz6dQWx0DD.dll,ServiceMain
    Source: dz6dQWx0DD.dllReversingLabs: Detection: 81%
    Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\dz6dQWx0DD.dll"
    Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\dz6dQWx0DD.dll",#1
    Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\dz6dQWx0DD.dll,ServiceMain
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\dz6dQWx0DD.dll",#1
    Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\dz6dQWx0DD.dll",ServiceMain
    Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\dz6dQWx0DD.dll",#1Jump to behavior
    Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\dz6dQWx0DD.dll,ServiceMainJump to behavior
    Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\dz6dQWx0DD.dll",ServiceMainJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\dz6dQWx0DD.dll",#1Jump to behavior
    Source: C:\Windows\System32\loaddll32.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Windows\System32\loaddll32.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Windows\System32\loaddll32.exeSection loaded: msvfw32.dllJump to behavior
    Source: C:\Windows\System32\loaddll32.exeSection loaded: msvcp60.dllJump to behavior
    Source: C:\Windows\System32\loaddll32.exeSection loaded: winmm.dllJump to behavior
    Source: C:\Windows\System32\loaddll32.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Windows\System32\loaddll32.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Windows\System32\loaddll32.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 120000Jump to behavior
    Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\dz6dQWx0DD.dll",#1Jump to behavior

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: dz6dQWx0DD.dll, type: SAMPLE

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: dz6dQWx0DD.dll, type: SAMPLE
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
    DLL Side-Loading
    11
    Process Injection
    1
    Rundll32
    OS Credential Dumping1
    Virtualization/Sandbox Evasion
    Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
    DLL Side-Loading
    1
    Virtualization/Sandbox Evasion
    LSASS Memory1
    System Information Discovery
    Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
    Process Injection
    Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
    DLL Side-Loading
    NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet
    behaviorgraph top1 signatures2 2 Behavior Graph ID: 1578329 Sample: dz6dQWx0DD.dll Startdate: 19/12/2024 Architecture: WINDOWS Score: 76 19 Malicious sample detected (through community Yara rule) 2->19 21 Antivirus / Scanner detection for submitted sample 2->21 23 Multi AV Scanner detection for submitted file 2->23 25 2 other signatures 2->25 7 loaddll32.exe 1 2->7         started        process3 process4 9 cmd.exe 1 7->9         started        11 conhost.exe 7->11         started        13 rundll32.exe 7->13         started        15 rundll32.exe 7->15         started        process5 17 rundll32.exe 9->17         started       

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    dz6dQWx0DD.dll82%ReversingLabsWin32.Backdoor.Zegost
    dz6dQWx0DD.dll100%AviraBDS/Zegost.Gen
    dz6dQWx0DD.dll100%Joe Sandbox ML
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    NameIPActiveMaliciousAntivirus DetectionReputation
    s-part-0035.t-0009.t-msedge.net
    13.107.246.63
    truefalse
      high
      No contacted IP infos
      Joe Sandbox version:41.0.0 Charoite
      Analysis ID:1578329
      Start date and time:2024-12-19 15:34:59 +01:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 2m 1s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Number of analysed new started processes analysed:7
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:dz6dQWx0DD.dll
      renamed because original name is a hash value
      Original Sample Name:599eddbe139894f6ce91721f373eff38f3248bb0.dll
      Detection:MAL
      Classification:mal76.troj.winDLL@10/0@0/0
      EGA Information:Failed
      HCA Information:
      • Successful, ratio: 100%
      • Number of executed functions: 0
      • Number of non-executed functions: 0
      Cookbook Comments:
      • Found application associated with file extension: .dll
      • Stop behavior analysis, all processes terminated
      • Exclude process from analysis (whitelisted): dllhost.exe
      • Excluded IPs from analysis (whitelisted): 13.107.246.63
      • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, otelrules.afd.azureedge.net, azureedge-t-prod.trafficmanager.net
      • Not all processes where analyzed, report is missing behavior information
      • VT rate limit hit for: dz6dQWx0DD.dll
      TimeTypeDescription
      09:35:57API Interceptor1x Sleep call for process: loaddll32.exe modified
      No context
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      s-part-0035.t-0009.t-msedge.netEallentoff_401k_1484013830.htmlGet hashmaliciousHTMLPhisherBrowse
      • 13.107.246.63
      INVOICE-0098.pdf ... .lnk.lnk.d.lnkGet hashmaliciousUnknownBrowse
      • 13.107.246.63
      hnghksdjfhs19De.batGet hashmaliciousAbobus Obfuscator, BraodoBrowse
      • 13.107.246.63
      CNUXJvLcgw.lnkGet hashmaliciousRHADAMANTHYSBrowse
      • 13.107.246.63
      LbtytfWpvx.vbsGet hashmaliciousRemcosBrowse
      • 13.107.246.63
      H2PspQWoHE.ps1Get hashmaliciousUnknownBrowse
      • 13.107.246.63
      https://nicholaspackaging.businesslawcloud.com/mTlFMGet hashmaliciousHTMLPhisherBrowse
      • 13.107.246.63
      https:/u8138501.ct.sendgrid.net/ls/click?upn=u001.I6qT8Dz69MhteW3705K6IU1LQ3g963Y3zRTsxDX4fVXYJ9RlDTttUZ-2F4W6jkAN-2BWeLmhXvVM33dZ8zdyDBxMHQ-3D-3D9QvK_A3EA-2BxZf4c3dsLaDejTByFLk41BCxE4Uo2OrX4mgE2MxlzcgK-2B0xybGuUTGyYJ5YjbiPC-2BiCJh5GAJwBubqkrvcCxWB69FtxO-2BVNGA0rN43JH8wByhnP3sbd4cxwRxIrAIlntQArpxTPdsHXXK7UbcIv5pqpXW-2FKGrctJVKLD8TvnmRv0E5Rim-2FIGs5oxbnurWR3Goko7UqMeLf2edTdmQ-3D-3DGet hashmaliciousUnknownBrowse
      • 13.107.246.63
      BJtvb5Vdhh.exeGet hashmaliciousQuasarBrowse
      • 13.107.246.63
      https://e.trustifi.com/#/fff2a1/305619/6dc30e/bb62bb/581844/11c063/a3c1ce/c0ba4d/e8666a/ef542d/85972d/627493/9a11d6/1f4096/1d247f/838c7e/cd63d6/82c9fe/baf706/264690/9188a6/a54400/a45112/68deb9/a1d612/148c70/62dcf5/9cb4f7/9713c0/de2350/884a31/c8623a/2f5546/ab6255/63291e/390e78/6b371c/add804/d4bbed/01f0b4/6023ca/9b7c0b/b0881b/bd8fbb/380790/942e2d/c30675/2c79c4/594b5b/fa5dac/c17e29/ec9861/3d4f90/8d1dd9/15a5f1/e3d291/035383/58ff7f/dcf654/c36a6d/ac2219/0a7478/f49f04/50db6b/1c0640/509cd9/d5eb23/7e01e4/b5bcef/2cfb1e/1cd263/f68c45/7325e0/8e5d9b/dacf2c/074706/a0f040/11bf65/f8b4f7/b49b4f/da74f6/285aa9/b249dd/d9b9c7/1a738e/07e7fa/7ea43f/a69f97/422641/436e51/504e86Get hashmaliciousHTMLPhisherBrowse
      • 13.107.246.63
      No context
      No context
      No context
      No created / dropped files found
      File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
      Entropy (8bit):6.354649266485146
      TrID:
      • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
      • Generic Win/DOS Executable (2004/3) 0.20%
      • DOS Executable Generic (2002/1) 0.20%
      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
      File name:dz6dQWx0DD.dll
      File size:112'128 bytes
      MD5:5c3eec19cb70cb4e1d7b91e451c9cc85
      SHA1:599eddbe139894f6ce91721f373eff38f3248bb0
      SHA256:e626dce8b1786976e361f8f60d9c7b829f113004625f26fdf09b126e81e22a36
      SHA512:a7a657b428c6ef9eb2c7039618d0e1482385c065e3dbf42e32d6fb9d776f51deedd83869c3a8cced5859854c95e53a81f74cc06482dbd1b9bb46f0be021452d5
      SSDEEP:1536:4jX5sTDQ1Z67irqR8L46STwCcQczfCkU1jClAiyA1LHth:yXb1ZHC8ENTwCvcTCkUjpA1LHb
      TLSH:2AB36D11F68941F9FE64357C58BA7777EB3B79648A0C9EC37314E96804332A2A712347
      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...............................U...............U...............................>.......>.......n.......>.......Rich............PE..L..
      Icon Hash:7ae282899bbab082
      Entrypoint:0x10012a1a
      Entrypoint Section:.text
      Digitally signed:false
      Imagebase:0x10000000
      Subsystem:windows gui
      Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
      DLL Characteristics:
      Time Stamp:0x4BBEBEFC [Fri Apr 9 05:45:32 2010 UTC]
      TLS Callbacks:
      CLR (.Net) Version:
      OS Version Major:4
      OS Version Minor:0
      File Version Major:4
      File Version Minor:0
      Subsystem Version Major:4
      Subsystem Version Minor:0
      Import Hash:5b41cb7ad1283508bf8e68cd0b7faf3d
      Instruction
      push ebp
      mov ebp, esp
      push ebx
      mov ebx, dword ptr [ebp+08h]
      push esi
      mov esi, dword ptr [ebp+0Ch]
      push edi
      mov edi, dword ptr [ebp+10h]
      test esi, esi
      jne 00007F3BD8F91DABh
      cmp dword ptr [1001DB38h], 00000000h
      jmp 00007F3BD8F91DC8h
      cmp esi, 01h
      je 00007F3BD8F91DA7h
      cmp esi, 02h
      jne 00007F3BD8F91DC4h
      mov eax, dword ptr [1001DB78h]
      test eax, eax
      je 00007F3BD8F91DABh
      push edi
      push esi
      push ebx
      call eax
      test eax, eax
      je 00007F3BD8F91DAEh
      push edi
      push esi
      push ebx
      call 00007F3BD8F91CBAh
      test eax, eax
      jne 00007F3BD8F91DA6h
      xor eax, eax
      jmp 00007F3BD8F91DF0h
      push edi
      push esi
      push ebx
      call 00007F3BD8F82E09h
      cmp esi, 01h
      mov dword ptr [ebp+0Ch], eax
      jne 00007F3BD8F91DAEh
      test eax, eax
      jne 00007F3BD8F91DD9h
      push edi
      push eax
      push ebx
      call 00007F3BD8F91C96h
      test esi, esi
      je 00007F3BD8F91DA7h
      cmp esi, 03h
      jne 00007F3BD8F91DC8h
      push edi
      push esi
      push ebx
      call 00007F3BD8F91C85h
      test eax, eax
      jne 00007F3BD8F91DA5h
      and dword ptr [ebp+0Ch], eax
      cmp dword ptr [ebp+0Ch], 00000000h
      je 00007F3BD8F91DB3h
      mov eax, dword ptr [1001DB78h]
      and eax, eax
      je 00007F3BD8F91DAAh
      push edi
      push esi
      push ebx
      call eax
      mov dword ptr [ebp+0Ch], eax
      mov eax, dword ptr [ebp+0Ch]
      pop edi
      pop esi
      pop ebx
      pop ebp
      retn 000Ch
      int3
      jmp dword ptr [10014204h]
      jmp dword ptr [10014208h]
      jmp dword ptr [1001420Ch]
      jmp dword ptr [100140FCh]
      jmp dword ptr [10014104h]
      jmp dword ptr [10014108h]
      push ecx
      push edx
      push 0001AD74h
      Programming Language:
      • [ C ] VS98 (6.0) build 8168
      • [C++] VS98 (6.0) build 8168
      • [RES] VS98 (6.0) cvtres build 1720
      • [LNK] VS98 (6.0) imp/exp build 8168
      NameVirtual AddressVirtual Size Is in Section
      IMAGE_DIRECTORY_ENTRY_EXPORT0x176f00x46.rdata
      IMAGE_DIRECTORY_ENTRY_IMPORT0x1691c0x78.rdata
      IMAGE_DIRECTORY_ENTRY_RESOURCE0x1e0000x10.rsrc
      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
      IMAGE_DIRECTORY_ENTRY_BASERELOC0x1f0110x15bc.reloc
      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IAT0x140000x248.rdata
      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x159000x160.rdata
      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
      .text0x10000x12cb50x12e006d78ea6e10cd4b3ce837d9af43291b8aFalse0.535207988410596data6.471990535846463IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      .rdata0x140000x37360x38008a03bdc0bd7eef1bccc0298c3c81c3eaFalse0.38267299107142855SysEx File -5.281227829582665IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .data0x180000x5b7c0x30001dcf88cf652f63f1ec56ff14f71d75a8False0.347412109375data4.119835939033733IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      .rsrc0x1e0000x100x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .reloc0x1f0000x19c80x1a002af5407f43ff2c7ebcb06a8bf55a1779False0.6564002403846154data6.096096549388274IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
      DLLImport
      MSVCRT.dll_wcsnicmp, _snprintf, _errno, sprintf, strncpy, strncmp, wcslen, wcsrchr, _except_handler3, free, fopen, fseek, fread, fwrite, fputc, fclose, wcscat, _wcsupr, mbstowcs, wcscpy, wcsstr, wcstombs, strchr, atoi, malloc, realloc, _CxxThrowException, strstr, _ftol, ceil, memmove, ??3@YAXPAX@Z, __CxxFrameHandler, _strnicmp, wcschr, wcsncat, _beginthreadex, calloc, ??1type_info@@UAE@XZ, _initterm, _adjust_fdiv, ??2@YAPAXI@Z
      KERNEL32.dllCreateMutexA, RaiseException, FreeLibrary, GetCurrentThreadId, GetProcAddress, OpenProcess, TerminateProcess, LocalSize, GlobalSize, GlobalAlloc, GlobalLock, GlobalUnlock, GlobalFree, GetLocalTime, MoveFileW, WriteFile, SetFilePointer, ReadFile, CreateFileW, GetFileSize, RemoveDirectoryW, LocalAlloc, FindFirstFileW, LocalReAlloc, lstrcmpW, FindNextFileW, LocalFree, FindClose, GetLogicalDriveStringsA, GetVolumeInformationA, GetDiskFreeSpaceExA, GetDriveTypeA, CreateProcessW, GetFileAttributesW, CreateDirectoryW, DeleteFileW, WideCharToMultiByte, GetProcessHeap, HeapAlloc, HeapFree, GetModuleFileNameW, GetLastError, GetSystemDirectoryW, CreateEventW, CloseHandle, TerminateThread, WaitForSingleObject, SetEvent, ResumeThread, CreateThread, InitializeCriticalSection, DeleteCriticalSection, VirtualFree, LeaveCriticalSection, EnterCriticalSection, VirtualAlloc, ResetEvent, InterlockedExchange, GetTempPathW, CancelIo, Sleep, lstrlenW, MultiByteToWideChar, Process32NextW, lstrcmpiW, Process32FirstW, CreateToolhelp32Snapshot, lstrcpyW, GetVersionExW, lstrcatW, GetCurrentProcess, GetWindowsDirectoryW, ReleaseMutex, OpenEventW, SetErrorMode, LoadLibraryA, GetTickCount, SetUnhandledExceptionFilter, FreeConsole, CopyFileW
      iphlpapi.dllAddIPAddress, GetInterfaceInfo
      MSVFW32.dllICSeqCompressFrameEnd, ICCompressorFree, ICClose, ICOpen, ICSendMessage, ICSeqCompressFrameStart, ICSeqCompressFrame
      MSVCP60.dll?_C@?1??_Nullstr@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@CAPBGXZ@4GB, ??1?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAE@XZ, ?assign@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAEAAV12@PBGI@Z, ?_Grow@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAE_NI_N@Z, ?_Refcnt@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAEAAEPBG@Z, ?_Eos@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAEXI@Z, ?_Split@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAEXXZ, ?_Xran@std@@YAXXZ, ?npos@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@2IB, ?_Tidy@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAEX_N@Z
      NameOrdinalAddress
      ServiceMain10x100039b0
      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
      Dec 19, 2024 15:35:53.374322891 CET1.1.1.1192.168.2.100x7319No error (0)shed.dual-low.s-part-0035.t-0009.t-msedge.nets-part-0035.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
      Dec 19, 2024 15:35:53.374322891 CET1.1.1.1192.168.2.100x7319No error (0)s-part-0035.t-0009.t-msedge.net13.107.246.63A (IP address)IN (0x0001)false

      Click to jump to process

      Click to jump to process

      Click to jump to process

      Target ID:0
      Start time:09:35:54
      Start date:19/12/2024
      Path:C:\Windows\System32\loaddll32.exe
      Wow64 process (32bit):true
      Commandline:loaddll32.exe "C:\Users\user\Desktop\dz6dQWx0DD.dll"
      Imagebase:0x7d0000
      File size:126'464 bytes
      MD5 hash:51E6071F9CBA48E79F10C84515AAE618
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:1
      Start time:09:35:54
      Start date:19/12/2024
      Path:C:\Windows\System32\conhost.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Imagebase:0x7ff620390000
      File size:862'208 bytes
      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:2
      Start time:09:35:54
      Start date:19/12/2024
      Path:C:\Windows\SysWOW64\cmd.exe
      Wow64 process (32bit):true
      Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\dz6dQWx0DD.dll",#1
      Imagebase:0xd70000
      File size:236'544 bytes
      MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:3
      Start time:09:35:54
      Start date:19/12/2024
      Path:C:\Windows\SysWOW64\rundll32.exe
      Wow64 process (32bit):true
      Commandline:rundll32.exe C:\Users\user\Desktop\dz6dQWx0DD.dll,ServiceMain
      Imagebase:0x2c0000
      File size:61'440 bytes
      MD5 hash:889B99C52A60DD49227C5E485A016679
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:4
      Start time:09:35:54
      Start date:19/12/2024
      Path:C:\Windows\SysWOW64\rundll32.exe
      Wow64 process (32bit):true
      Commandline:rundll32.exe "C:\Users\user\Desktop\dz6dQWx0DD.dll",#1
      Imagebase:0x2c0000
      File size:61'440 bytes
      MD5 hash:889B99C52A60DD49227C5E485A016679
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:6
      Start time:09:35:57
      Start date:19/12/2024
      Path:C:\Windows\SysWOW64\rundll32.exe
      Wow64 process (32bit):true
      Commandline:rundll32.exe "C:\Users\user\Desktop\dz6dQWx0DD.dll",ServiceMain
      Imagebase:0x2c0000
      File size:61'440 bytes
      MD5 hash:889B99C52A60DD49227C5E485A016679
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      No disassembly