Windows
Analysis Report
SecuriteInfo.com.Win64.MalwareX-gen.28090.23429.dll
Overview
General Information
Sample name: | SecuriteInfo.com.Win64.MalwareX-gen.28090.23429.dll (renamed file extension from exe to dll) |
Original sample name: | SecuriteInfo.com.Win64.MalwareX-gen.28090.23429.exe |
Analysis ID: | 1664307 |
MD5: | 47c482555a48c81220dd30f51f0a4fc6 |
SHA1: | fa0854e5754e61cd53856457bb0133f37da1612e |
SHA256: | 3dd5a5597dde3b29b376d741f6d1e7e67d91dc849afff416e17f809d13bdf2df |
Tags: | exeuser-SecuriteInfoCom |
Infos: | |
Detection
Score: | 52 |
Range: | 0 - 100 |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
loaddll64.exe (PID: 6940 cmdline:
loaddll64. exe "C:\Us ers\user\D esktop\Sec uriteInfo. com.Win64. MalwareX-g en.28090.2 3429.dll" MD5: 763455F9DCB24DFEECC2B9D9F8D46D52) conhost.exe (PID: 6972 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) cmd.exe (PID: 7108 cmdline:
cmd.exe /C rundll32. exe "C:\Us ers\user\D esktop\Sec uriteInfo. com.Win64. MalwareX-g en.28090.2 3429.dll", #1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) rundll32.exe (PID: 7084 cmdline:
rundll32.e xe "C:\Use rs\user\De sktop\Secu riteInfo.c om.Win64.M alwareX-ge n.28090.23 429.dll",# 1 MD5: EF3179D498793BF4234F708D3BE28633)
- cleanup
- • AV Detection
- • Compliance
- • System Summary
- • Data Obfuscation
- • Hooking and other Techniques for Hiding and Protection
- • Malware Analysis System Evasion
- • Anti Debugging
- • HIPS / PFW / Operating System Protection Evasion
Click to jump to signature section
AV Detection |
---|
Source: | ReversingLabs: | |||
Source: | Virustotal: | Perma Link |
Source: | Static PE information: |
System Summary |
---|
Source: | Static PE information: |
Source: | Classification label: |
Source: | Mutant created: |
Source: | Key opened: | Jump to behavior |
Source: | Process created: |
Source: | ReversingLabs: | ||
Source: | Virustotal: |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Static PE information: |
Source: | Static file information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Process information set: | Jump to behavior |
Source: | Thread injection, dropped files, key value created, disk infection and DNS query: |
Source: | Last function: |
Source: | Process queried: | Jump to behavior |
Source: | Thread injection, dropped files, key value created, disk infection and DNS query: |
Source: | Process created: | Jump to behavior |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | 1 DLL Side-Loading | 11 Process Injection | 1 Virtualization/Sandbox Evasion | OS Credential Dumping | 1 Security Software Discovery | Remote Services | Data from Local System | Data Obfuscation | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 1 Rundll32 | LSASS Memory | 1 Virtualization/Sandbox Evasion | Remote Desktop Protocol | Data from Removable Media | Junk Data | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 11 Process Injection | Security Account Manager | 1 System Information Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | Steganography | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 1 DLL Side-Loading | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | Protocol Impersonation | Traffic Duplication | Data Destruction |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
47% | ReversingLabs | Win64.Malware.Heuristic | ||
58% | Virustotal | Browse |
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1664307 |
Start date and time: | 2025-04-14 03:43:16 +02:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 4m 9s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 134, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 15 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | SecuriteInfo.com.Win64.MalwareX-gen.28090.23429.dll (renamed file extension from exe to dll) |
Original Sample Name: | SecuriteInfo.com.Win64.MalwareX-gen.28090.23429.exe |
Detection: | MAL |
Classification: | mal52.winDLL@6/0@0/0 |
EGA Information: | Failed |
HCA Information: |
|
- Exclude process from analysis
(whitelisted): MpCmdRun.exe, d llhost.exe, sppsvc.exe, WMIADA P.exe, SIHClient.exe, SgrmBrok er.exe, conhost.exe, svchost.e xe - Excluded IPs from analysis (wh
itelisted): 184.28.213.193, 20 .109.210.53 - Excluded domains from analysis
(whitelisted): fs.microsoft.c om, slscr.update.microsoft.com , ctldl.windowsupdate.com, c.p ki.goog, fe3cr.delivery.mp.mic rosoft.com - Not all processes where analyz
ed, report is missing behavior information
File type: | |
Entropy (8bit): | 7.910479970727949 |
TrID: |
|
File name: | SecuriteInfo.com.Win64.MalwareX-gen.28090.23429.dll |
File size: | 5'840'384 bytes |
MD5: | 47c482555a48c81220dd30f51f0a4fc6 |
SHA1: | fa0854e5754e61cd53856457bb0133f37da1612e |
SHA256: | 3dd5a5597dde3b29b376d741f6d1e7e67d91dc849afff416e17f809d13bdf2df |
SHA512: | a6db6d7b885af565fb4220c4d94f47f4c1e84726271c8bf70fd64d5e928937396f9afabf44305208b258d2f8b0847ffe04af4045008efd5646efc80ea4331aef |
SSDEEP: | 98304:OwAqNUn1pkW8nb/bHXCXhZutV7o4LWAzz0Zrk8fyfmPtN4m5w2ZitdupFhEY:OR1aW8nrb2h4doCuhffP74qritkFh |
TLSH: | E04612FE72543758C01FCC749433FD48B1B6152E0AE995BE79CB7AD03BAE8119A02B46 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d...j..g.........." ...*.|...L........G...................................................`................................ |
Icon Hash: | 7ae282899bbab082 |
Entrypoint: | 0x18047f6f7 |
Entrypoint Section: | .vmp1 |
Digitally signed: | false |
Imagebase: | 0x180000000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, DLL |
DLL Characteristics: | HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT |
Time Stamp: | 0x67B3EF6A [Tue Feb 18 02:24:42 2025 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 6 |
OS Version Minor: | 0 |
File Version Major: | 6 |
File Version Minor: | 0 |
Subsystem Version Major: | 6 |
Subsystem Version Minor: | 0 |
Import Hash: | 1c6f30a3a774debb32eb71cdee7655cb |
Instruction |
---|
push FDC20C1Bh |
call 00007FA2492ED9F1h |
cmpsb |
into |
in eax, dx |
retf F2D9h |
mov dl, 91h |
mov al, byte ptr [04E05B2Fh] |
and edi, ecx |
jc 00007FA248DFFD7Fh |
mov edx, esi |
adc al, FCh |
arpl word ptr [ecx+404A40A2h], bp |
add byte ptr [esp+edx*4], bh |
into |
insb |
push E631934Fh |
int1 |
les eax, esi |
xor al, 8Fh |
jle 00007FA248DFFDF7h |
nop |
les ebp, fword ptr [eax+42h] |
inc ebx |
sbb byte ptr [12CE92E7h], bl |
inc eax |
lea esi, dword ptr [edi+25h] |
hlt |
cmp al, C7h |
jnbe 00007FA248DFFE31h |
cwde |
int 95h |
loop 00007FA248DFFDB0h |
sub ah, dl |
fsubr dword ptr [ebp+29h] |
adc edi, dword ptr [edx+16h] |
dec edi |
pop ebp |
xchg eax, esi |
fdiv qword ptr [E871C3E6h] |
sbb dword ptr [esi-6C98FA50h], ecx |
pop ss |
cmp esi, dword ptr [ebx-2567053Eh] |
mov esi, 1FF2B6F5h |
cmp dword ptr [edx+53h], ecx |
xor esp, eax |
inc ebp |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x47eb48 | 0x1f4 | .vmp1 |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x9a7000 | 0x1d5 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x99c560 | 0x8fd0 | .vmp1 |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x9a6000 | 0xec | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x419d40 | 0x30 | .vmp1 |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x99c420 | 0x140 | .vmp1 |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x507000 | 0x1e0 | .vmp1 |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x77b50 | 0x0 | d41d8cd98f00b204e9800998ecf8427e | False | 0 | empty | 0.0 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x79000 | 0x2c198 | 0x0 | d41d8cd98f00b204e9800998ecf8427e | False | 0 | empty | 0.0 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0xa6000 | 0x14b8 | 0x0 | d41d8cd98f00b204e9800998ecf8427e | False | 0 | empty | 0.0 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.pdata | 0xa8000 | 0x627c | 0x0 | d41d8cd98f00b204e9800998ecf8427e | False | 0 | empty | 0.0 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.vmp0 | 0xaf000 | 0x36432c | 0x0 | d41d8cd98f00b204e9800998ecf8427e | unknown | unknown | unknown | unknown | IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_NOT_PAGED, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.vmp1 | 0x414000 | 0x591530 | 0x591600 | 9bfdc33deacd6cbfe5dd0631e5583988 | unknown | unknown | unknown | unknown | IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_NOT_PAGED, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.reloc | 0x9a6000 | 0xec | 0x200 | e40339fe65b22702e44e2faa261bd919 | False | 0.359375 | GLS_BINARY_LSB_FIRST | 2.2371254215230554 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.rsrc | 0x9a7000 | 0x1d5 | 0x200 | 12f3324169846d5acbf9798abfaa1317 | False | 0.52734375 | data | 4.724728911998389 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_MANIFEST | 0x9a7058 | 0x17d | XML 1.0 document, ASCII text, with CRLF line terminators | English | United States | 0.5931758530183727 |
DLL | Import |
---|---|
KERNEL32.dll | GetLastError |
USER32.dll | GetAsyncKeyState |
ADVAPI32.dll | ConvertSidToStringSidA |
glew32.dll | glewInit |
OPENGL32.dll | glGetFloatv |
MSVCP140.dll | _Query_perf_frequency |
WININET.dll | InternetOpenA |
urlmon.dll | URLDownloadToFileA |
USERENV.dll | UnloadUserProfile |
VCRUNTIME140_1.dll | __CxxFrameHandler4 |
VCRUNTIME140.dll | _CxxThrowException |
api-ms-win-crt-stdio-l1-1-0.dll | __acrt_iob_func |
api-ms-win-crt-utility-l1-1-0.dll | qsort |
api-ms-win-crt-string-l1-1-0.dll | strncmp |
api-ms-win-crt-heap-l1-1-0.dll | _callnewh |
api-ms-win-crt-runtime-l1-1-0.dll | _initterm_e |
api-ms-win-crt-convert-l1-1-0.dll | strtol |
api-ms-win-crt-multibyte-l1-1-0.dll | _mbsicmp |
api-ms-win-crt-math-l1-1-0.dll | ceilf |
WTSAPI32.dll | WTSSendMessageW |
KERNEL32.dll | FlsSetValue |
USER32.dll | GetProcessWindowStation |
KERNEL32.dll | LocalAlloc, LocalFree, GetModuleFileNameW, GetProcessAffinityMask, SetProcessAffinityMask, SetThreadAffinityMask, Sleep, ExitProcess, FreeLibrary, LoadLibraryA, GetModuleHandleA, GetProcAddress |
USER32.dll | GetProcessWindowStation, GetUserObjectInformationW |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Click to jump to process
Click to jump to process
Click to jump to process
Target ID: | 0 |
Start time: | 21:44:16 |
Start date: | 13/04/2025 |
Path: | C:\Windows\System32\loaddll64.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff71e070000 |
File size: | 165'888 bytes |
MD5 hash: | 763455F9DCB24DFEECC2B9D9F8D46D52 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 1 |
Start time: | 21:44:16 |
Start date: | 13/04/2025 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff68dae0000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 2 |
Start time: | 21:44:16 |
Start date: | 13/04/2025 |
Path: | C:\Windows\System32\cmd.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff736880000 |
File size: | 289'792 bytes |
MD5 hash: | 8A2122E8162DBEF04694B9C3E0B6CDEE |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 3 |
Start time: | 21:44:16 |
Start date: | 13/04/2025 |
Path: | C:\Windows\System32\rundll32.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff689f30000 |
File size: | 71'680 bytes |
MD5 hash: | EF3179D498793BF4234F708D3BE28633 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |