Play interactive tourEdit tour

Analysis Report mscorlib.ni.dll

Overview

General Information

Sample Name:mscorlib.ni.dll
Analysis ID:320665
MD5:a46731975f5c2e065aeba4f7d7e48d8c
SHA1:34fe6ec7cab4423b0a69f9250aad0154e5ef88cd
SHA256:8455e55a56e47651de23c7585ff322d3fb69482cb66b23801bb97e1d427a5abe

Most interesting Screenshot:

Detection

Score:2
Range:0 - 100
Whitelisted:false
Confidence:80%

Signatures

May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
PE file does not import any functions
Program does not show much activity (idle)
Sample file is different than original file name gathered from version info

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • loaddll64.exe (PID: 1000 cmdline: loaddll64.exe 'C:\Users\user\Desktop\mscorlib.ni.dll' MD5: 193EF06F7D386B10DDE3E33599AAE9C9)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

No Sigma rule has matched

Signature Overview

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: mscorlib.ni.dllString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/authentication
Source: mscorlib.ni.dllString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/authorizationdecisionzhttp://schemas.xmlsoap.o
Source: mscorlib.ni.dllString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dateofbirthrhttp://schemas.xmlsoap.org/ws/2005
Source: mscorlib.ni.dllString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/denyonlysid
Source: mscorlib.ni.dllString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddressxhttp://schemas.xmlsoap.org/ws/200
Source: mscorlib.ni.dllString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/locality
Source: mscorlib.ni.dllString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/mobilephone
Source: mscorlib.ni.dllString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: mscorlib.ni.dllString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameidentifier
Source: mscorlib.ni.dllString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/otherphone
Source: mscorlib.ni.dllString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/postalcoderhttp://schemas.xmlsoap.org/ws/2005/
Source: mscorlib.ni.dllString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/stateorprovince
Source: mscorlib.ni.dllString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/streetaddresszhttp://schemas.xmlsoap.org/ws/20
Source: mscorlib.ni.dllString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/thumbprintrhttp://schemas.xmlsoap.org/ws/2005/
Source: mscorlib.ni.dllString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/x500distinguishednamejhttp://schemas.xmlsoap.o
Source: mscorlib.ni.dllStatic PE information: No import functions for PE file found
Source: mscorlib.ni.dllBinary or memory string: OriginalFilenamemscorlib.dllT vs mscorlib.ni.dll
Source: mscorlib.ni.dllBinary or memory string: .slnm
Source: classification engineClassification label: clean2.winDLL@1/0@0/0
Source: mscorlib.ni.dllStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: C:\Windows\System32\loaddll64.exeSection loaded: C:\Users\user\Desktop\mscorlib.ni.dllJump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: C:\Users\user\Desktop\mscorlib.ni.dllJump to behavior
Source: C:\Windows\System32\loaddll64.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: mscorlib.ni.dllStatic PE information: certificate valid
Source: initial sampleStatic PE information: Valid certificate with Microsoft Issuer
Source: mscorlib.ni.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: mscorlib.ni.dllStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: mscorlib.ni.dllStatic PE information: Image base 0x64478000000 > 0x60000000
Source: mscorlib.ni.dllStatic file information: File size 23077120 > 1048576
Source: mscorlib.ni.dllStatic PE information: Raw size of .data is bigger than: 0x100000 < 0x538c00
Source: mscorlib.ni.dllStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x103c800
Source: mscorlib.ni.dllStatic PE information: TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
Source: mscorlib.ni.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: mscorlib.ni.pdbRSDS"E source: mscorlib.ni.dll
Source: Binary string: mscorlib.pdb source: mscorlib.ni.dll
Source: Binary string: mscorlib.ni.pdb source: mscorlib.ni.dll
Source: mscorlib.ni.dllStatic PE information: real checksum: 0x1611ad4 should be:
Source: C:\Windows\System32\loaddll64.exe TID: 6020Thread sleep time: -120000s >= -30000sJump to behavior
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management InstrumentationPath InterceptionPath InterceptionVirtualization/Sandbox Evasion1OS Credential DumpingVirtualization/Sandbox Evasion1Remote ServicesData from Local SystemExfiltration Over Other Network MediumData ObfuscationEavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemorySystem Information Discovery1Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 320665 Sample: mscorlib.ni.dll Startdate: 19/11/2020 Architecture: WINDOWS Score: 2 4 loaddll64.exe 1 2->4         started       

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand
SourceDetectionScannerLabelLink
mscorlib.ni.dll0%MetadefenderBrowse
mscorlib.ni.dll0%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dateofbirthrhttp://schemas.xmlsoap.org/ws/2005mscorlib.ni.dllfalse
    high
    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameidentifiermscorlib.ni.dllfalse
      high
      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/x500distinguishednamejhttp://schemas.xmlsoap.omscorlib.ni.dllfalse
        high
        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/denyonlysidmscorlib.ni.dllfalse
          high
          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddressxhttp://schemas.xmlsoap.org/ws/200mscorlib.ni.dllfalse
            high
            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/authorizationdecisionzhttp://schemas.xmlsoap.omscorlib.ni.dllfalse
              high
              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/otherphonemscorlib.ni.dllfalse
                high
                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/mobilephonemscorlib.ni.dllfalse
                  high
                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/stateorprovincemscorlib.ni.dllfalse
                    high
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/thumbprintrhttp://schemas.xmlsoap.org/ws/2005/mscorlib.ni.dllfalse
                      high
                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namemscorlib.ni.dllfalse
                        high
                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/streetaddresszhttp://schemas.xmlsoap.org/ws/20mscorlib.ni.dllfalse
                          high
                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/postalcoderhttp://schemas.xmlsoap.org/ws/2005/mscorlib.ni.dllfalse
                            high
                            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/authenticationmscorlib.ni.dllfalse
                              high
                              No contacted IP infos

                              General Information

                              Joe Sandbox Version:31.0.0 Red Diamond
                              Analysis ID:320665
                              Start date:19.11.2020
                              Start time:17:03:45
                              Joe Sandbox Product:CloudBasic
                              Overall analysis duration:0h 1m 56s
                              Hypervisor based Inspection enabled:false
                              Report type:full
                              Sample file name:mscorlib.ni.dll
                              Cookbook file name:default.jbs
                              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                              Number of analysed new started processes analysed:1
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • HDC enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Detection:CLEAN
                              Classification:clean2.winDLL@1/0@0/0
                              EGA Information:Failed
                              HDC Information:Failed
                              HCA Information:
                              • Successful, ratio: 100%
                              • Number of executed functions: 0
                              • Number of non-executed functions: 0
                              Cookbook Comments:
                              • Adjust boot time
                              • Enable AMSI
                              • Found application associated with file extension: .dll
                              • Stop behavior analysis, all processes terminated
                              Warnings:
                              • VT rate limit hit for: /opt/package/joesandbox/database/analysis/320665/sample/mscorlib.ni.dll
                              TimeTypeDescription
                              17:04:33API Interceptor1x Sleep call for process: loaddll64.exe modified
                              No context
                              No context
                              No context
                              No context
                              No context
                              No created / dropped files found

                              Static File Info

                              General

                              File type:PE32+ executable (DLL) (console) x86-64 Mono/.Net assembly, for MS Windows
                              Entropy (8bit):6.345015733448765
                              TrID:
                              • Win64 Dynamic Link Library (generic) (102004/3) 84.96%
                              • Win64 Executable (generic) (12005/4) 10.00%
                              • DOS Executable Borland Pascal 7.0x (2037/25) 1.70%
                              • Generic Win/DOS Executable (2004/3) 1.67%
                              • DOS Executable Generic (2002/1) 1.67%
                              File name:mscorlib.ni.dll
                              File size:23077120
                              MD5:a46731975f5c2e065aeba4f7d7e48d8c
                              SHA1:34fe6ec7cab4423b0a69f9250aad0154e5ef88cd
                              SHA256:8455e55a56e47651de23c7585ff322d3fb69482cb66b23801bb97e1d427a5abe
                              SHA512:3546286267212ddfe5ca2a0c9c681d3d67d52c27d9b0aa32994cdf23d0b6a399d62b80f0d8886dcede717dc9b335f10635b3e4436b580bff0eed80b4fb94986b
                              SSDEEP:196608:M2fBYOo/npmhOxgKuG3P6JxENZovaMTIwfPHtrXwJMSxhAMu:MY6OCpngY6JxENBMTIEPH5XS8Mu
                              File Content Preview:MZ......................@.......................................................................................................PE..d...c.O_.........." ...........................xD.............................`.......a...`................................

                              File Icon

                              Icon Hash:74f0e4ecccdce0e4

                              General

                              Entrypoint:0x64478000000
                              Entrypoint Section:
                              Digitally signed:true
                              Imagebase:0x64478000000
                              Subsystem:windows cui
                              Image File Characteristics:EXECUTABLE_IMAGE, DLL, LARGE_ADDRESS_AWARE
                              DLL Characteristics:TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
                              Time Stamp:0x5F4FF363 [Wed Sep 2 19:32:51 2020 UTC]
                              TLS Callbacks:
                              CLR (.Net) Version:v4.0.30319
                              OS Version Major:5
                              OS Version Minor:2
                              File Version Major:5
                              File Version Minor:2
                              Subsystem Version Major:5
                              Subsystem Version Minor:2
                              Import Hash:
                              Signature Valid:true
                              Signature Issuer:CN=Microsoft Code Signing PCA 2010, O=Microsoft Corporation, L=Redmond, S=Washington, C=US
                              Signature Validation Error:The operation completed successfully
                              Error Number:0
                              Not Before, Not After
                              • 3/4/2020 10:29:29 AM 3/3/2021 10:29:29 AM
                              Subject Chain
                              • CN=Microsoft Corporation, O=Microsoft Corporation, L=Redmond, S=Washington, C=US
                              Version:3
                              Thumbprint MD5:24D1E89B73500959D9996B5990E2A944
                              Thumbprint SHA-1:644004FCA8E36FA9198CF061CC085B0A2E61CFC4
                              Thumbprint SHA-256:82343FD97F607024D4AB3E86E84DCF894A6CE7C865978DA31A34DB5CA494BC16
                              Serial:330000032548B29D0E7FC5F41F000000000325
                              Instruction
                              dec ebp
                              pop edx
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              inc eax
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax+00000000h], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax+45h], dl
                              add byte ptr [eax], al
                              xchg byte ptr fs:[ebx], al
                              add byte ptr [ebx-0Dh], ah
                              dec edi
                              pop edi
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              lock add byte ptr [edx], ah
                              and byte ptr [ebx], cl
                              add cl, byte ptr [ebx]
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              js 00007FA708BEB4C6h
                              push es
                              add byte ptr [eax], al
                              add byte ptr [eax], dl
                              add byte ptr [eax], al
                              add byte ptr [edx], al
                              add byte ptr [eax], al
                              add eax, 00000200h
                              add byte ptr [eax], al
                              NameVirtual AddressVirtual Size Is in Section
                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x53a0000x470.text
                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x6897dc0xa254c.text
                              IMAGE_DIRECTORY_ENTRY_SECURITY0x15fdc000x4500
                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x15770000x88580.reloc
                              IMAGE_DIRECTORY_ENTRY_DEBUG0x15765300x38.text
                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x53a4700x48.text
                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                              .data0x10000x538a680x538c00unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                              .text0x53a0000x103c6a90x103c800unknownunknownunknownunknownIMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                              .reloc0x15770000x885800x88600False0.20640109418data5.46558017794IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                              NameRVASizeTypeLanguageCountry
                              RT_VERSION0x53a0580x418data
                              DescriptionData
                              LegalCopyright Microsoft Corporation. All rights reserved.
                              InternalNamemscorlib.dll
                              FileVersion4.8.4261.0 built by: NET48REL1LAST_B
                              CompanyNameMicrosoft Corporation
                              PrivateBuildDDBLD343C
                              CommentsFlavor=Retail
                              ProductNameMicrosoft .NET Framework
                              ProductVersion4.8.4261.0
                              FileDescriptionMicrosoft Common Language Runtime Class Library
                              OriginalFilenamemscorlib.dll
                              Translation0x0409 0x04b0

                              Network Behavior

                              No network behavior found

                              Code Manipulations

                              Statistics

                              CPU Usage

                              0246810s020406080100

                              Click to jump to process

                              Memory Usage

                              0246810sMB

                              Click to jump to process

                              System Behavior

                              Start time:17:04:33
                              Start date:19/11/2020
                              Path:C:\Windows\System32\loaddll64.exe
                              Wow64 process (32bit):false
                              Commandline:loaddll64.exe 'C:\Users\user\Desktop\mscorlib.ni.dll'
                              Imagebase:0x7ff7a1650000
                              File size:144384 bytes
                              MD5 hash:193EF06F7D386B10DDE3E33599AAE9C9
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:.Net C# or VB.NET
                              Reputation:moderate

                              Disassembly

                              Code Analysis