Windows
Analysis Report
useMyDll.exe
Overview
General Information
Detection
Score: | 52 |
Range: | 0 - 100 |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
useMyDll.exe (PID: 6768 cmdline:
"C:\Users\ user\Deskt op\useMyDl l.exe" MD5: 212F0EFC91A56FE8F71F24D1A26D0B33) conhost.exe (PID: 6788 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
- cleanup
- • AV Detection
- • Compliance
- • System Summary
- • Data Obfuscation
- • Malware Analysis System Evasion
- • Anti Debugging
- • HIPS / PFW / Operating System Protection Evasion
- • Language, Device and Operating System Detection
Click to jump to signature section
AV Detection |
---|
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Code function: | 0_2_00007FF7C1F99850 | |
Source: | Code function: | 0_2_00007FF7C1F98EE0 |
Source: | Classification label: |
Source: | Mutant created: |
Source: | Key opened: | Jump to behavior |
Source: | Virustotal: | ||
Source: | ReversingLabs: |
Source: | Process created: | ||
Source: | Process created: |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Static PE information: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Thread injection, dropped files, key value created, disk infection and DNS query: |
Source: | Last function: |
Source: | Code function: | 0_2_00007FF7C1F96C90 |
Source: | Code function: | 0_2_00007FF7C1F99390 |
Source: | Thread injection, dropped files, key value created, disk infection and DNS query: |
Source: | Code function: | 0_2_00007FF7C1F97230 | |
Source: | Code function: | 0_2_00007FF7C1F9140B | |
Source: | Code function: | 0_2_00007FF7C1F982E0 |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Code function: | 0_2_00007FF7C1F91460 |
Source: | Code function: | 0_2_00007FF7C1F97FA0 |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | 1 DLL Side-Loading | 11 Process Injection | 11 Process Injection | OS Credential Dumping | 1 System Time Discovery | Remote Services | 1 Archive Collected Data | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 1 DLL Side-Loading | LSASS Memory | 2 Security Software Discovery | Remote Desktop Protocol | Data from Removable Media | Junk Data | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | Obfuscated Files or Information | Security Account Manager | 2 System Information Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | Steganography | Automated Exfiltration | Data Encrypted for Impact |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
24% | Virustotal | Browse | ||
19% | ReversingLabs | Win64.Trojan.Barys |
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1670381 |
Start date and time: | 2025-04-21 17:20:16 +02:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 3m 44s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 134, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 12 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | useMyDll.exe |
Detection: | MAL |
Classification: | mal52.evad.winEXE@2/0@0/0 |
EGA Information: | Failed |
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis
(whitelisted): MpCmdRun.exe, d llhost.exe, SIHClient.exe, Sgr mBroker.exe, conhost.exe, svch ost.exe - Excluded IPs from analysis (wh
itelisted): 184.29.183.29, 20. 12.23.50 - Excluded domains from analysis
(whitelisted): fs.microsoft.c om, slscr.update.microsoft.com , ctldl.windowsupdate.com, c.p ki.goog, fe3cr.delivery.mp.mic rosoft.com - Execution Graph export aborted
for target useMyDll.exe, PID 6768 because there are no exec uted function - Not all processes where analyz
ed, report is missing behavior information
File type: | |
Entropy (8bit): | 4.06755516296969 |
TrID: |
|
File name: | useMyDll.exe |
File size: | 94'208 bytes |
MD5: | 212f0efc91a56fe8f71f24d1a26d0b33 |
SHA1: | 3055dd5f872864b8cd0dacbe32c32ba19ec11309 |
SHA256: | a5f0e7d43a141152c7b28d2d62abfd9a73e1def764c05e0b3d6228e4e44ab77a |
SHA512: | 07462ba5365ce6d583e2922518721e7745c7ba299ae61400b3b5e4cce308cda0aebc9efcfa102a8375febf034e43fc742a03d9f91aa20a50101ba64e818e95f7 |
SSDEEP: | 768:3DlEDcCHRRmD71fUyU9/RofGrFBXlrROYT8VAH9:CDTRRQ1fYRRkGRBX5PT8V |
TLSH: | 6E93C61A37A510B3D0B6C039A9864326FEB17055133916EF9141CAFDAF207ECBE3DA55 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........H.bl..bl..bl...o..bl...h..bl...i..bl...m..bl...m..bl..bm..bl...i..bl......bl...n..bl.Rich.bl.................PE..d......g... |
Icon Hash: | 90cececece8e8eb0 |
Entrypoint: | 0x14001146a |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x140000000 |
Subsystem: | windows cui |
Image File Characteristics: | EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE |
DLL Characteristics: | HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x67CDBCB1 [Sun Mar 9 16:07:13 2025 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 6 |
OS Version Minor: | 0 |
File Version Major: | 6 |
File Version Minor: | 0 |
Subsystem Version Major: | 6 |
Subsystem Version Minor: | 0 |
Import Hash: | 484170e12eeb66f9a9b2955dfd39b967 |
Instruction |
---|
jmp 00007FD92C8DD2B6h |
jmp 00007FD92C8DF1A1h |
jmp 00007FD92C8DF68Ch |
jmp 00007FD92C8E0CD7h |
jmp 00007FD92C8DECA2h |
jmp 00007FD92C8DC70Bh |
jmp 00007FD92C8DF778h |
jmp 00007FD92C8DC68Fh |
jmp 00007FD92C8D9A3Eh |
jmp 00007FD92C8E0C79h |
jmp 00007FD92C8E0BFAh |
jmp 00007FD92C8DEE8Fh |
jmp 00007FD92C8DED9Ah |
jmp 00007FD92C8DDF75h |
jmp 00007FD92C8DAB30h |
jmp 00007FD92C8DF8EBh |
jmp 00007FD92C8DFF66h |
jmp 00007FD92C8E0AE7h |
jmp 00007FD92C8DE71Ch |
jmp 00007FD92C8E0B5Bh |
jmp 00007FD92C8E0BCEh |
jmp 00007FD92C8DE5EDh |
jmp 00007FD92C8E0B22h |
jmp 00007FD92C8DB2D3h |
jmp 00007FD92C8DEE5Eh |
jmp 00007FD92C8D9FA9h |
jmp 00007FD92C8E0C24h |
jmp 00007FD92C8DB1FFh |
jmp 00007FD92C8E0B28h |
jmp 00007FD92C8DB745h |
jmp 00007FD92C8DEDA0h |
jmp 00007FD92C8DB11Bh |
jmp 00007FD92C8DBB76h |
jmp 00007FD92C8DC5E3h |
jmp 00007FD92C8DEE3Ch |
jmp 00007FD92C8E0B89h |
jmp 00007FD92C8DF612h |
jmp 00007FD92C8DF43Dh |
jmp 00007FD92C8DE528h |
jmp 00007FD92C8DB573h |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x275e0 | 0x78 | .idata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x2b000 | 0x43c | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x24000 | 0x2274 | .pdata |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x2c000 | 0xbc | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x201e0 | 0x38 | .rdata |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x20060 | 0x140 | .rdata |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x27000 | 0x5e0 | .idata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.textbss | 0x1000 | 0x10000 | 0x0 | d41d8cd98f00b204e9800998ecf8427e | False | 0 | empty | 0.0 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.text | 0x11000 | 0xc976 | 0xca00 | 125dd4ddd2a965242b6a40ac6ce5a6ee | False | 0.2558400371287129 | data | 4.109668123987941 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x1e000 | 0x46e1 | 0x4800 | 2531f8b3048e86fb373ee4e23ec64264 | False | 0.1882595486111111 | data | 2.69378051477315 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0x23000 | 0xc58 | 0x600 | a9c019a1d7ab14bc3fd6866206a43191 | False | 0.08658854166666667 | data | 0.8868125986240956 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.pdata | 0x24000 | 0x270c | 0x2800 | 3fdf853a37464114a7d02e70a4e14bfb | False | 0.1435546875 | data | 1.875979271598377 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.idata | 0x27000 | 0x1a90 | 0x1c00 | b9a41175462e915d46e9b26c7ada719c | False | 0.25069754464285715 | data | 3.930200548644312 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.msvcjmc | 0x29000 | 0x22c | 0x400 | 67e715e67f01845815a650b2c7c22a4a | False | 0.017578125 | Targa image data - Map (257-257) 257 x 257 x 1 +257 +257 - 1-bit alpha "\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001" | 0.8018584546667038 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.00cfg | 0x2a000 | 0x175 | 0x200 | 11afae137f4cc0ec99f62127aded9257 | False | 0.06640625 | data | 0.46864890609345855 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.rsrc | 0x2b000 | 0x43c | 0x600 | 2d04ecc71bfa8f9bda3db6654f8bb1d7 | False | 0.18229166666666666 | data | 2.1429708819311997 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x2c000 | 0x304 | 0x400 | 4ab3b71d181c2a31c5d2c9e32f00b6ab | False | 0.1806640625 | data | 1.340683595052557 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_MANIFEST | 0x2b170 | 0x17d | XML 1.0 document, ASCII text, with CRLF line terminators | English | United States | 0.5931758530183727 |
DLL | Import |
---|---|
KERNEL32.dll | GetFullPathNameA, CloseHandle, GetLastError, WaitForSingleObject, CreateRemoteThread, OpenProcess, VirtualAllocEx, WriteProcessMemory, GetModuleHandleA, GetProcAddress, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, VirtualQuery, GetProcessHeap, HeapFree, HeapAlloc, GetModuleHandleW, GetStartupInfoW, InitializeSListHead, GetSystemTimeAsFileTime, GetCurrentProcessId, QueryPerformanceCounter, IsProcessorFeaturePresent, TerminateProcess, GetCurrentProcess, SetUnhandledExceptionFilter, UnhandledExceptionFilter, RtlVirtualUnwind, RtlLookupFunctionEntry, RtlCaptureContext, WideCharToMultiByte, MultiByteToWideChar, RaiseException, IsDebuggerPresent, GetCurrentThreadId, FreeLibrary |
MSVCP140D.dll | ?cerr@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A, ?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A, ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ, ??1_Lockit@std@@QEAA@XZ, ?put@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@D@Z, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@K@Z, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z, ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ, ?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBADD@Z, ?fill@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBADXZ, ?rdbuf@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBAPEAV?$basic_streambuf@DU?$char_traits@D@std@@@2@XZ, ?tie@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBAPEAV?$basic_ostream@DU?$char_traits@D@std@@@2@XZ, ?_Xlength_error@std@@YAXPEBD@Z, ?uncaught_exception@std@@YA_NXZ, ?good@ios_base@std@@QEBA_NXZ, ?flags@ios_base@std@@QEBAHXZ, ?width@ios_base@std@@QEBA_JXZ, ?width@ios_base@std@@QEAA_J_J@Z, ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z, ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z, ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z, ??0_Lockit@std@@QEAA@H@Z |
VCRUNTIME140D.dll | __vcrt_GetModuleHandleW, __vcrt_GetModuleFileNameW, __current_exception_context, __current_exception, __vcrt_LoadLibraryExW, __C_specific_handler_noexcept, __C_specific_handler, _CxxThrowException, __std_exception_destroy, __std_exception_copy, __std_type_info_destroy_list, memcpy |
VCRUNTIME140_1D.dll | __CxxFrameHandler4 |
ucrtbased.dll | _cexit, __p__commode, _free_dbg, strcpy_s, strcat_s, __stdio_common_vsprintf_s, _seh_filter_dll, _initialize_onexit_table, _register_onexit_function, _execute_onexit_table, _crt_atexit, _crt_at_quick_exit, terminate, _wmakepath_s, _wsplitpath_s, wcscpy_s, __p___argv, _register_thread_local_exe_atexit_callback, _set_fmode, _exit, exit, _initterm_e, _initterm, _get_initial_narrow_environment, _initialize_narrow_environment, _configure_narrow_argv, __setusermatherr, _set_app_type, _seh_filter_exe, malloc, _callnewh, strlen, wcslen, _CrtDbgReport, _invalid_parameter, _configthreadlocale, __p___argc, _c_exit, _set_new_mode, _CrtDbgReportW |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Click to jump to process
Click to jump to process
Click to jump to process
Target ID: | 0 |
Start time: | 11:21:06 |
Start date: | 21/04/2025 |
Path: | C:\Users\user\Desktop\useMyDll.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7c1f80000 |
File size: | 94'208 bytes |
MD5 hash: | 212F0EFC91A56FE8F71F24D1A26D0B33 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | false |
Target ID: | 1 |
Start time: | 11:21:06 |
Start date: | 21/04/2025 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff68dae0000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | false |
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|