Edit tour

Windows Analysis Report
SecuriteInfo.com.Win64.MalwareX-gen.28090.23429.dll

Overview

General Information

Sample name:SecuriteInfo.com.Win64.MalwareX-gen.28090.23429.dll
(renamed file extension from exe to dll)
Original sample name:SecuriteInfo.com.Win64.MalwareX-gen.28090.23429.exe
Analysis ID:1664307
MD5:47c482555a48c81220dd30f51f0a4fc6
SHA1:fa0854e5754e61cd53856457bb0133f37da1612e
SHA256:3dd5a5597dde3b29b376d741f6d1e7e67d91dc849afff416e17f809d13bdf2df
Tags:exeuser-SecuriteInfoCom
Infos:

Detection

Score:52
Range:0 - 100
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Detected VMProtect packer
Checks if the current process is being debugged
Creates a process in suspended mode (likely to inject code)
Entry point lies outside standard sections
PE file contains sections with non-standard names
Program does not show much activity (idle)
Sample execution stops while process was sleeping (likely an evasion)

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • loaddll64.exe (PID: 6940 cmdline: loaddll64.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.28090.23429.dll" MD5: 763455F9DCB24DFEECC2B9D9F8D46D52)
    • conhost.exe (PID: 6972 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 7108 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.28090.23429.dll",#1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • rundll32.exe (PID: 7084 cmdline: rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.28090.23429.dll",#1 MD5: EF3179D498793BF4234F708D3BE28633)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: SecuriteInfo.com.Win64.MalwareX-gen.28090.23429.dllReversingLabs: Detection: 47%
Source: SecuriteInfo.com.Win64.MalwareX-gen.28090.23429.dllVirustotal: Detection: 58%Perma Link
Source: SecuriteInfo.com.Win64.MalwareX-gen.28090.23429.dllStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT

System Summary

barindex
Source: SecuriteInfo.com.Win64.MalwareX-gen.28090.23429.dllStatic PE information: .vmp0 and .vmp1 section names
Source: classification engineClassification label: mal52.winDLL@6/0@0/0
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6972:120:WilError_03
Source: C:\Windows\System32\loaddll64.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.28090.23429.dll",#1
Source: SecuriteInfo.com.Win64.MalwareX-gen.28090.23429.dllReversingLabs: Detection: 47%
Source: SecuriteInfo.com.Win64.MalwareX-gen.28090.23429.dllVirustotal: Detection: 58%
Source: unknownProcess created: C:\Windows\System32\loaddll64.exe loaddll64.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.28090.23429.dll"
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.28090.23429.dll",#1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.28090.23429.dll",#1
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.28090.23429.dll",#1Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.28090.23429.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: glew32.dllJump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: opengl32.dllJump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: msvcp140.dllJump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: wininet.dllJump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: wtsapi32.dllJump to behavior
Source: SecuriteInfo.com.Win64.MalwareX-gen.28090.23429.dllStatic PE information: Image base 0x180000000 > 0x60000000
Source: SecuriteInfo.com.Win64.MalwareX-gen.28090.23429.dllStatic file information: File size 5840384 > 1048576
Source: SecuriteInfo.com.Win64.MalwareX-gen.28090.23429.dllStatic PE information: Raw size of .vmp1 is bigger than: 0x100000 < 0x591600
Source: SecuriteInfo.com.Win64.MalwareX-gen.28090.23429.dllStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
Source: initial sampleStatic PE information: section where entry point is pointing to: .vmp1
Source: SecuriteInfo.com.Win64.MalwareX-gen.28090.23429.dllStatic PE information: section name: .vmp0
Source: SecuriteInfo.com.Win64.MalwareX-gen.28090.23429.dllStatic PE information: section name: .vmp1
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\loaddll64.exeProcess queried: DebugPortJump to behavior
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.28090.23429.dll",#1Jump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
11
Process Injection
1
Virtualization/Sandbox Evasion
OS Credential Dumping1
Security Software Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Rundll32
LSASS Memory1
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
Process Injection
Security Account Manager1
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1664307 Sample: SecuriteInfo.com.Win64.Malw... Startdate: 14/04/2025 Architecture: WINDOWS Score: 52 15 Multi AV Scanner detection for submitted file 2->15 17 Detected VMProtect packer 2->17 7 loaddll64.exe 1 2->7         started        process3 process4 9 cmd.exe 1 7->9         started        11 conhost.exe 7->11         started        process5 13 rundll32.exe 9->13         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.Win64.MalwareX-gen.28090.23429.dll47%ReversingLabsWin64.Malware.Heuristic
SecuriteInfo.com.Win64.MalwareX-gen.28090.23429.dll58%VirustotalBrowse
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos
Joe Sandbox version:42.0.0 Malachite
Analysis ID:1664307
Start date and time:2025-04-14 03:43:16 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 9s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 134, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:15
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:SecuriteInfo.com.Win64.MalwareX-gen.28090.23429.dll
(renamed file extension from exe to dll)
Original Sample Name:SecuriteInfo.com.Win64.MalwareX-gen.28090.23429.exe
Detection:MAL
Classification:mal52.winDLL@6/0@0/0
EGA Information:Failed
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 0
  • Number of non-executed functions: 0
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, sppsvc.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
  • Excluded IPs from analysis (whitelisted): 184.28.213.193, 20.109.210.53
  • Excluded domains from analysis (whitelisted): fs.microsoft.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, c.pki.goog, fe3cr.delivery.mp.microsoft.com
  • Not all processes where analyzed, report is missing behavior information
No simulations
No context
No context
No context
No context
No context
No created / dropped files found
File type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
Entropy (8bit):7.910479970727949
TrID:
  • Win64 Dynamic Link Library (generic) (102004/3) 86.43%
  • Win64 Executable (generic) (12005/4) 10.17%
  • Generic Win/DOS Executable (2004/3) 1.70%
  • DOS Executable Generic (2002/1) 1.70%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.01%
File name:SecuriteInfo.com.Win64.MalwareX-gen.28090.23429.dll
File size:5'840'384 bytes
MD5:47c482555a48c81220dd30f51f0a4fc6
SHA1:fa0854e5754e61cd53856457bb0133f37da1612e
SHA256:3dd5a5597dde3b29b376d741f6d1e7e67d91dc849afff416e17f809d13bdf2df
SHA512:a6db6d7b885af565fb4220c4d94f47f4c1e84726271c8bf70fd64d5e928937396f9afabf44305208b258d2f8b0847ffe04af4045008efd5646efc80ea4331aef
SSDEEP:98304:OwAqNUn1pkW8nb/bHXCXhZutV7o4LWAzz0Zrk8fyfmPtN4m5w2ZitdupFhEY:OR1aW8nrb2h4doCuhffP74qritkFh
TLSH:E04612FE72543758C01FCC749433FD48B1B6152E0AE995BE79CB7AD03BAE8119A02B46
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d...j..g.........." ...*.|...L........G...................................................`................................
Icon Hash:7ae282899bbab082
Entrypoint:0x18047f6f7
Entrypoint Section:.vmp1
Digitally signed:false
Imagebase:0x180000000
Subsystem:windows gui
Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, DLL
DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
Time Stamp:0x67B3EF6A [Tue Feb 18 02:24:42 2025 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:6
OS Version Minor:0
File Version Major:6
File Version Minor:0
Subsystem Version Major:6
Subsystem Version Minor:0
Import Hash:1c6f30a3a774debb32eb71cdee7655cb
Instruction
push FDC20C1Bh
call 00007FA2492ED9F1h
cmpsb
into
in eax, dx
retf F2D9h
mov dl, 91h
mov al, byte ptr [04E05B2Fh]
and edi, ecx
jc 00007FA248DFFD7Fh
mov edx, esi
adc al, FCh
arpl word ptr [ecx+404A40A2h], bp
add byte ptr [esp+edx*4], bh
into
insb
push E631934Fh
int1
les eax, esi
xor al, 8Fh
jle 00007FA248DFFDF7h
nop
les ebp, fword ptr [eax+42h]
inc ebx
sbb byte ptr [12CE92E7h], bl
inc eax
lea esi, dword ptr [edi+25h]
hlt
cmp al, C7h
jnbe 00007FA248DFFE31h
cwde
int 95h
loop 00007FA248DFFDB0h
sub ah, dl
fsubr dword ptr [ebp+29h]
adc edi, dword ptr [edx+16h]
dec edi
pop ebp
xchg eax, esi
fdiv qword ptr [E871C3E6h]
sbb dword ptr [esi-6C98FA50h], ecx
pop ss
cmp esi, dword ptr [ebx-2567053Eh]
mov esi, 1FF2B6F5h
cmp dword ptr [edx+53h], ecx
xor esp, eax
inc ebp
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x47eb480x1f4.vmp1
IMAGE_DIRECTORY_ENTRY_RESOURCE0x9a70000x1d5.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x99c5600x8fd0.vmp1
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x9a60000xec.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x419d400x30.vmp1
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x99c4200x140.vmp1
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x5070000x1e0.vmp1
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x77b500x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rdata0x790000x2c1980x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0xa60000x14b80x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.pdata0xa80000x627c0x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.vmp00xaf0000x36432c0x0d41d8cd98f00b204e9800998ecf8427eunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_NOT_PAGED, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.vmp10x4140000x5915300x5916009bfdc33deacd6cbfe5dd0631e5583988unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_NOT_PAGED, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.reloc0x9a60000xec0x200e40339fe65b22702e44e2faa261bd919False0.359375GLS_BINARY_LSB_FIRST2.2371254215230554IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.rsrc0x9a70000x1d50x20012f3324169846d5acbf9798abfaa1317False0.52734375data4.724728911998389IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_MANIFEST0x9a70580x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
DLLImport
KERNEL32.dllGetLastError
USER32.dllGetAsyncKeyState
ADVAPI32.dllConvertSidToStringSidA
glew32.dllglewInit
OPENGL32.dllglGetFloatv
MSVCP140.dll_Query_perf_frequency
WININET.dllInternetOpenA
urlmon.dllURLDownloadToFileA
USERENV.dllUnloadUserProfile
VCRUNTIME140_1.dll__CxxFrameHandler4
VCRUNTIME140.dll_CxxThrowException
api-ms-win-crt-stdio-l1-1-0.dll__acrt_iob_func
api-ms-win-crt-utility-l1-1-0.dllqsort
api-ms-win-crt-string-l1-1-0.dllstrncmp
api-ms-win-crt-heap-l1-1-0.dll_callnewh
api-ms-win-crt-runtime-l1-1-0.dll_initterm_e
api-ms-win-crt-convert-l1-1-0.dllstrtol
api-ms-win-crt-multibyte-l1-1-0.dll_mbsicmp
api-ms-win-crt-math-l1-1-0.dllceilf
WTSAPI32.dllWTSSendMessageW
KERNEL32.dllFlsSetValue
USER32.dllGetProcessWindowStation
KERNEL32.dllLocalAlloc, LocalFree, GetModuleFileNameW, GetProcessAffinityMask, SetProcessAffinityMask, SetThreadAffinityMask, Sleep, ExitProcess, FreeLibrary, LoadLibraryA, GetModuleHandleA, GetProcAddress
USER32.dllGetProcessWindowStation, GetUserObjectInformationW
Language of compilation systemCountry where language is spokenMap
EnglishUnited States
No network behavior found

Click to jump to process

Click to jump to process

Target ID:0
Start time:21:44:16
Start date:13/04/2025
Path:C:\Windows\System32\loaddll64.exe
Wow64 process (32bit):false
Commandline:loaddll64.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.28090.23429.dll"
Imagebase:0x7ff71e070000
File size:165'888 bytes
MD5 hash:763455F9DCB24DFEECC2B9D9F8D46D52
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:1
Start time:21:44:16
Start date:13/04/2025
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff68dae0000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:2
Start time:21:44:16
Start date:13/04/2025
Path:C:\Windows\System32\cmd.exe
Wow64 process (32bit):false
Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.28090.23429.dll",#1
Imagebase:0x7ff736880000
File size:289'792 bytes
MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:3
Start time:21:44:16
Start date:13/04/2025
Path:C:\Windows\System32\rundll32.exe
Wow64 process (32bit):false
Commandline:rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.28090.23429.dll",#1
Imagebase:0x7ff689f30000
File size:71'680 bytes
MD5 hash:EF3179D498793BF4234F708D3BE28633
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

No disassembly