Create Interactive Tour

Windows Analysis Report
IKEEXT.DLL.dll

Overview

General Information

Sample Name:IKEEXT.DLL.dll
(renamed file extension from exe to dll)
Analysis ID:793487
MD5:fef66efb3a08608ce0b215b1f5441eb6
SHA1:93e6d882ea3cf90159f7b7a1f36b6fb8b1b0912e
SHA256:24e0c790fe25464d2ef6b4018b907ff9ba97cafddd1da305ab71ea0b4b2a13f2
Tags:dllexeHitmanProIKEEXTDLLservicewindows10WRP
Infos:

Detection

Score:23
Range:0 - 100
Whitelisted:false
Confidence:80%

Signatures

NDIS Filter Driver detected (likely used to intercept and sniff network traffic)
Sample file is different than original file name gathered from version info
Tries to load missing DLLs
Checks if the current process is being debugged
PE file contains sections with non-standard names
Sample execution stops while process was sleeping (likely an evasion)
Program does not show much activity (idle)
Creates a process in suspended mode (likely to inject code)

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • loaddll64.exe (PID: 6104 cmdline: loaddll64.exe "C:\Users\user\Desktop\IKEEXT.DLL.dll" MD5: C676FC0263EDD17D4CE7D644B8F3FCD6)
    • conhost.exe (PID: 6112 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • cmd.exe (PID: 6140 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\IKEEXT.DLL.dll",#1 MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
      • rundll32.exe (PID: 5300 cmdline: rundll32.exe "C:\Users\user\Desktop\IKEEXT.DLL.dll",#1 MD5: 73C519F050C20580F8A62C849D49215A)
    • rundll32.exe (PID: 5232 cmdline: rundll32.exe C:\Users\user\Desktop\IKEEXT.DLL.dll,IkeServiceMain MD5: 73C519F050C20580F8A62C849D49215A)
    • rundll32.exe (PID: 2904 cmdline: rundll32.exe C:\Users\user\Desktop\IKEEXT.DLL.dll,SvchostPushServiceGlobals MD5: 73C519F050C20580F8A62C849D49215A)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results
Source: IKEEXT.DLL.dllStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF
Source: Binary string: ikeext.pdb source: IKEEXT.DLL.dll
Source: Binary string: ikeext.pdbUGP source: IKEEXT.DLL.dll

Networking

barindex
Source: IKEEXT.DLL.dllStatic PE information: Found NDIS imports: FwpmEventProviderDestroy0, FwpmProviderContextUnsubscribeChanges0, FwpmFilterUnsubscribeChanges0, FwpsOpenToken0, IkeextGetConfigParameters0, IPsecKeyModuleAdd0, IPsecSaContextGetSpi1, FwpsQueryIPsecDosFWUsed0, FwpsQueryIPsecOffloadDone0, IPsecKeyModuleUpdateAcquire0, FwpmProviderContextSubscribeChanges0, FwpmFilterSubscribeChanges0, FwpmEventProviderCreate0, IPsecSaContextAddInboundAndTrackConnection, IPsecSaContextExpire0, FwppConnectionGetByIPsecInfo, FwpsLayerCreateInProcReplica0, FwpsLayerReleaseInProcReplica0, FwpsClassifyUser0, IPsecKeyNotification0, FwpmFilterGetById0, FwpmEngineClose0, IPsecSaContextAddOutboundAndTrackConnection, IPsecSaContextUpdate0, FwpmFilterCreateEnumHandle0, FwpmFilterEnum0, FwpmFilterDestroyEnumHandle0, FwppIPsecSaContextCreate, FwpmProviderContextGetByKey3, FwpmEngineOpen0, FwpmFilterAdd0, IPsecKeyModuleDelete0, IPsecGetKeyFromDictator0, FwpsAleExplicitCredentialsQuery0, FwpmEventProviderIsNetEventTypeEnabled0, IPsecKeyDictationCheck0, FwpmEventProviderFireNetEvent0, FwpmFreeMemory0
Source: IKEEXT.DLL.dllBinary or memory string: OriginalFilenameIKEEXT.DLLj% vs IKEEXT.DLL.dll
Source: C:\Windows\System32\loaddll64.exeSection loaded: umpdc.dllJump to behavior
Source: IKEEXT.DLL.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Windows\System32\loaddll64.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\IKEEXT.DLL.dll,IkeServiceMain
Source: unknownProcess created: C:\Windows\System32\loaddll64.exe loaddll64.exe "C:\Users\user\Desktop\IKEEXT.DLL.dll"
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\IKEEXT.DLL.dll",#1
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\IKEEXT.DLL.dll,IkeServiceMain
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\IKEEXT.DLL.dll",#1
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\IKEEXT.DLL.dll,SvchostPushServiceGlobals
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\IKEEXT.DLL.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\IKEEXT.DLL.dll,IkeServiceMainJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\IKEEXT.DLL.dll,SvchostPushServiceGlobalsJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\IKEEXT.DLL.dll",#1Jump to behavior
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6112:120:WilError_01
Source: classification engineClassification label: sus23.troj.winDLL@10/0@0/0
Source: C:\Windows\System32\rundll32.exeAutomated click: OK
Source: C:\Windows\System32\rundll32.exeAutomated click: OK
Source: C:\Windows\System32\rundll32.exeAutomated click: OK
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: IKEEXT.DLL.dllStatic file information: File size 1055232 > 1048576
Source: IKEEXT.DLL.dllStatic PE information: Image base 0x180000000 > 0x60000000
Source: IKEEXT.DLL.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: IKEEXT.DLL.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: IKEEXT.DLL.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: IKEEXT.DLL.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: IKEEXT.DLL.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: IKEEXT.DLL.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: IKEEXT.DLL.dllStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF
Source: IKEEXT.DLL.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: ikeext.pdb source: IKEEXT.DLL.dll
Source: Binary string: ikeext.pdbUGP source: IKEEXT.DLL.dll
Source: IKEEXT.DLL.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: IKEEXT.DLL.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: IKEEXT.DLL.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: IKEEXT.DLL.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: IKEEXT.DLL.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: IKEEXT.DLL.dllStatic PE information: section name: .didat
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Windows\System32\loaddll64.exeProcess queried: DebugPortJump to behavior
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\IKEEXT.DLL.dll",#1Jump to behavior
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management Instrumentation1
DLL Side-Loading
11
Process Injection
1
Virtualization/Sandbox Evasion
1
Network Sniffing
1
Security Software Discovery
Remote ServicesData from Local SystemExfiltration Over Other Network MediumData ObfuscationEavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Rundll32
LSASS Memory1
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)11
Process Injection
Security Account Manager1
Network Sniffing
SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
DLL Side-Loading
NTDS1
System Information Discovery
Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 793487 Sample: IKEEXT.DLL.exe Startdate: 28/01/2023 Architecture: WINDOWS Score: 23 19 NDIS Filter Driver detected (likely used to intercept and sniff network traffic) 2->19 7 loaddll64.exe 1 2->7         started        process3 process4 9 cmd.exe 1 7->9         started        11 rundll32.exe 7->11         started        13 rundll32.exe 7->13         started        15 conhost.exe 7->15         started        process5 17 rundll32.exe 9->17         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
IKEEXT.DLL.dll0%ReversingLabs
IKEEXT.DLL.dll0%VirustotalBrowse
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos
Joe Sandbox Version:36.0.0 Rainbow Opal
Analysis ID:793487
Start date and time:2023-01-28 11:26:06 +01:00
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 2m 51s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
Number of analysed new started processes analysed:6
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • HDC enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample file name:IKEEXT.DLL.dll
(renamed file extension from exe to dll)
Detection:SUS
Classification:sus23.troj.winDLL@10/0@0/0
EGA Information:Failed
HDC Information:Failed
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 0
  • Number of non-executed functions: 0
Cookbook Comments:
  • Stop behavior analysis, all processes terminated
  • Not all processes where analyzed, report is missing behavior information
No simulations
No context
No context
No context
No context
No context
No created / dropped files found
File type:PE32+ executable (DLL) (console) x86-64, for MS Windows
Entropy (8bit):6.260282436931228
TrID:
  • Win64 Dynamic Link Library (generic) (102004/3) 86.43%
  • Win64 Executable (generic) (12005/4) 10.17%
  • Generic Win/DOS Executable (2004/3) 1.70%
  • DOS Executable Generic (2002/1) 1.70%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.01%
File name:IKEEXT.DLL.dll
File size:1055232
MD5:fef66efb3a08608ce0b215b1f5441eb6
SHA1:93e6d882ea3cf90159f7b7a1f36b6fb8b1b0912e
SHA256:24e0c790fe25464d2ef6b4018b907ff9ba97cafddd1da305ab71ea0b4b2a13f2
SHA512:cf62333768f8967046233eb9909766132d9c58c5639eb18e6d7ceba586ca77e4e2a014badcd21aaa702abd5859b44f6ccda19b69585419710f35aa590f43c90f
SSDEEP:24576:ZVKkHwZOqWfJtvhKrQb+9T9p3AobuPCkngnranPC8D2hNcNvfGqAp:vKkHwZNWfJtvhKrQb+9T9p3AobuP3ngp
TLSH:24254AAD62F001A9E87AD178CA915707D6F2B828277096DF42B081782F53FD36A3DF54
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........._..._..._...V.......K.{.P...K.|.\..._.~.....K.~.R...K...^...K.r.5...K...^...K.}.^...Rich_...........PE..d.....c..........."
Icon Hash:74f0e4ecccdce0e4
Entrypoint:0x18002c150
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x180000000
Subsystem:windows cui
Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, DLL
DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF
Time Stamp:0xC630EDB [Mon Aug 2 07:20:59 1976 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:10
OS Version Minor:0
File Version Major:10
File Version Minor:0
Subsystem Version Major:10
Subsystem Version Minor:0
Import Hash:58c366547f57d097b2105719ecab56e4
Instruction
dec eax
mov dword ptr [esp+08h], ebx
dec eax
mov dword ptr [esp+10h], esi
push edi
dec eax
sub esp, 20h
dec ecx
mov edi, eax
mov ebx, edx
dec eax
mov esi, ecx
cmp edx, 01h
jne 00007F61E8ECAB37h
call 00007F61E8ECAED8h
dec esp
mov eax, edi
mov edx, ebx
dec eax
mov ecx, esi
dec eax
mov ebx, dword ptr [esp+30h]
dec eax
mov esi, dword ptr [esp+38h]
dec eax
add esp, 20h
pop edi
jmp 00007F61E8ECAB3Ch
int3
int3
int3
int3
int3
int3
int3
dec eax
mov eax, esp
dec eax
mov dword ptr [eax+20h], ebx
dec esp
mov dword ptr [eax+18h], eax
mov dword ptr [eax+10h], edx
dec eax
mov dword ptr [eax+08h], ecx
push esi
push edi
inc ecx
push esi
dec eax
sub esp, 00000150h
mov edi, edx
dec esp
mov esi, ecx
mov esi, 00000001h
mov ebx, esi
mov dword ptr [esp+20h], ebx
cmp edx, esi
jnbe 00007F61E8ECAB38h
mov dword ptr [000CE135h], edx
test edx, edx
jne 00007F61E8ECAB45h
cmp dword ptr [000CF86Bh], edx
jne 00007F61E8ECAB3Dh
xor ebx, ebx
mov dword ptr [esp+20h], ebx
jmp 00007F61E8ECAD0Fh
lea eax, dword ptr [edx-01h]
cmp eax, esi
ja 00007F61E8ECABC6h
dec esp
mov ecx, dword ptr [000CFE6Ch]
dec ebp
test ecx, ecx
je 00007F61E8ECAB74h
mov eax, dword ptr [000CF845h]
cmp edx, esi
cmove eax, esi
mov dword ptr [000CF83Ah], eax
dec esp
mov eax, dword ptr [esp+00000180h]
dec ecx
mov eax, ecx
call dword ptr [000000DDh]
Programming Language:
  • [IMP] VS2008 SP1 build 30729
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0xf6ca00x70.rdata
IMAGE_DIRECTORY_ENTRY_IMPORT0xf6d100x35c.rdata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x1080000x500.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x1000000x6498.pdata
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x1090000x964.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0xd81700x70.rdata
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xce0e00x118.rdata
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0xd3bc80xb28.rdata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0xf59000x1e0.rdata
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000xcc2b40xcc400False0.4850252447980416data6.355294718024251IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rdata0xce0000x2bb800x2bc00False0.31106026785714286data4.658524030034863IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0xfa0000x56b80x1c00False0.1025390625data2.001065105219351IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.pdata0x1000000x64980x6600False0.5329350490196079data5.94628144844369IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.didat0x1070000x3b80x400False0.2890625data3.147110205494948IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.rsrc0x1080000x5000x600False0.3828125data2.9287747898985685IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0x1090000x9640xa00False0.558203125data5.324624916894234IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountry
MUI0x1084380xc8dataEnglishUnited States
RT_VERSION0x1080b00x388dataEnglishUnited States
DLLImport
msvcrt.dllmemcpy, memcmp, _vsnprintf, _vsnwprintf, wcstok_s, memset, bsearch, time, memcpy_s, sprintf_s, _ultow_s, strcmp, __C_specific_handler, _initterm, malloc, free, _amsg_exit, _XcptFilter, wcscmp
api-ms-win-core-libraryloader-l1-2-0.dllGetProcAddress, GetModuleHandleW, DisableThreadLibraryCalls, GetModuleHandleExW, GetModuleFileNameW, FreeLibrary, LoadLibraryExW
api-ms-win-core-synch-l1-2-0.dllSleep
api-ms-win-core-profile-l1-1-0.dllQueryPerformanceCounter
api-ms-win-core-processthreads-l1-1-0.dllGetCurrentThread, TlsSetValue, TlsAlloc, GetCurrentThreadId, SetThreadPriority, GetCurrentProcessId, GetThreadPriority, OpenProcessToken, TlsGetValue, TerminateProcess, GetCurrentProcess, OpenThreadToken, TlsFree
api-ms-win-core-sysinfo-l1-1-0.dllGetSystemTimeAsFileTime, GetTickCount, GetSystemInfo, GetComputerNameExW, GetSystemTime
api-ms-win-core-rtlsupport-l1-1-0.dllRtlLookupFunctionEntry, RtlCompareMemory, RtlCaptureContext, RtlVirtualUnwind
api-ms-win-core-errorhandling-l1-1-0.dllGetLastError, UnhandledExceptionFilter, SetLastError, SetUnhandledExceptionFilter
ntdll.dllRtlAllocateHeap, RtlValidRelativeSecurityDescriptor, RtlIpv6AddressToStringW, RtlIpv4AddressToStringW, RtlInitString, WinSqmEndSession, WinSqmStartSession, WinSqmSetDWORD, RtlLengthSecurityDescriptor, RtlIpv4AddressToStringA, RtlIpv6StringToAddressW, RtlApplicationVerifierStop, EtwEventEnabled, EtwEventWriteTransfer, EtwEventWrite, EtwEventActivityIdControl, EtwEventUnregister, EtwEventRegister, RtlNtStatusToDosError, EtwTraceMessage, RtlIpv4StringToAddressW, EtwUnregisterTraceGuids, RtlCreateHashTable, RtlDeleteHashTable, RtlInsertEntryHashTable, RtlRemoveEntryHashTable, RtlLookupEntryHashTable, RtlGetNextEntryHashTable, RtlInitEnumerationHashTable, RtlEnumerateEntryHashTable, RtlEndEnumerationHashTable, RtlExpandHashTable, RtlContractHashTable, RtlTimeToTimeFields, RtlIntegerToUnicodeString, RtlConvertSidToUnicodeString, RtlFreeUnicodeString, RtlAdjustPrivilege, RtlInitializeSListHead, RtlInterlockedPushEntrySList, RtlInterlockedPopEntrySList, EtwRegisterTraceGuidsW, EtwGetTraceEnableFlags, EtwGetTraceEnableLevel, EtwGetTraceLoggerHandle, RtlIpv6AddressToStringA
AUTHZ.dllAuthzFreeAuditEvent, AuthzAccessCheck, AuthziInitializeAuditParamsFromArray, AuthziFreeAuditEventType, AuthziInitializeAuditEvent, AuthziLogAuditEvent, AuthzInitializeResourceManager, AuthziInitializeAuditEventType, AuthzFreeResourceManager
fwpuclnt.dllFwpmEventProviderDestroy0, FwpmProviderContextUnsubscribeChanges0, FwpmFilterUnsubscribeChanges0, FwpsOpenToken0, IkeextGetConfigParameters0, IPsecKeyModuleAdd0, IPsecSaContextGetSpi1, FwpsQueryIPsecDosFWUsed0, FwpsQueryIPsecOffloadDone0, IPsecKeyModuleUpdateAcquire0, FwpmProviderContextSubscribeChanges0, FwpmFilterSubscribeChanges0, FwpmEventProviderCreate0, IPsecSaContextAddInboundAndTrackConnection, IPsecSaContextExpire0, FwppConnectionGetByIPsecInfo, FwpsLayerCreateInProcReplica0, FwpsLayerReleaseInProcReplica0, FwpsClassifyUser0, IPsecKeyNotification0, FwpmFilterGetById0, FwpmEngineClose0, IPsecSaContextAddOutboundAndTrackConnection, IPsecSaContextUpdate0, FwpmFilterCreateEnumHandle0, FwpmFilterEnum0, FwpmFilterDestroyEnumHandle0, FwppIPsecSaContextCreate, FwpmProviderContextGetByKey3, FwpmEngineOpen0, FwpmFilterAdd0, IPsecKeyModuleDelete0, IPsecGetKeyFromDictator0, FwpsAleExplicitCredentialsQuery0, FwpmEventProviderIsNetEventTypeEnabled0, IPsecKeyDictationCheck0, FwpmEventProviderFireNetEvent0, FwpmFreeMemory0
MSASN1.dllASN1_Decode, ASN1_CreateDecoder, ASN1_CloseDecoder, ASN1BERDecPeekTag, ASN1BERDecExplicitTag, ASN1DecSetError, ASN1_CreateModule, ASN1_FreeDecoded, ASN1Free, ASN1BERDecOpenType2, ASN1DecRealloc, ASN1BERDecEndOfContents, ASN1BERDecNotEndOfContents, ASN1_CloseModule
api-ms-win-core-synch-l1-1-0.dllInitializeCriticalSectionAndSpinCount, AcquireSRWLockExclusive, WaitForSingleObject, CreateEventA, ReleaseSemaphore, SetEvent, CreateSemaphoreExW, CreateEventW, ReleaseSRWLockExclusive, InitializeCriticalSection, TryEnterCriticalSection, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, TryAcquireSRWLockExclusive, InitializeSRWLock
api-ms-win-core-handle-l1-1-0.dllDuplicateHandle, CloseHandle
api-ms-win-core-util-l1-1-0.dllEncodePointer, DecodePointer
api-ms-win-core-string-l1-1-0.dllCompareStringEx, CompareStringW, WideCharToMultiByte
api-ms-win-core-heap-l1-1-0.dllGetProcessHeap, HeapReAlloc, HeapAlloc, HeapSize, HeapFree, HeapDestroy, HeapCreate
api-ms-win-eventing-controller-l1-1-0.dllControlTraceW, StartTraceW
api-ms-win-core-registry-l1-1-0.dllRegEnumValueW, RegSetValueExW, RegCloseKey, RegQueryValueExW, RegOpenKeyExW, RegQueryInfoKeyW, RegCreateKeyExW, RegNotifyChangeKeyValue
api-ms-win-core-threadpool-l1-2-0.dllCreateThreadpoolWait, CloseThreadpoolTimer, CreateThreadpool, SetThreadpoolTimer, CreateThreadpoolTimer, SetThreadpoolThreadMinimum, WaitForThreadpoolTimerCallbacks, CloseThreadpoolWait, CloseThreadpool, TrySubmitThreadpoolCallback, WaitForThreadpoolWaitCallbacks, SetThreadpoolWait, SetThreadpoolThreadMaximum
api-ms-win-power-setting-l1-1-0.dllPowerSettingRegisterNotification, PowerSettingUnregisterNotification
api-ms-win-security-base-l1-1-0.dllMapGenericMask, CreatePrivateObjectSecurityEx, ImpersonateLoggedOnUser, DuplicateToken, RevertToSelf, ImpersonateAnonymousToken, DestroyPrivateObjectSecurity, CopySid, GetLengthSid, EqualSid, GetPrivateObjectSecurity, GetTokenInformation, SetPrivateObjectSecurityEx
api-ms-win-eventing-provider-l1-1-0.dllEventSetInformation, EventRegister, EventWriteTransfer, EventUnregister
api-ms-win-core-debug-l1-1-0.dllDebugBreak, OutputDebugStringA
WS2_32.dllGetAddrInfoW, htonl, ntohl, ntohs, htons, FreeAddrInfoW, WSCEnumProtocols, WSASocketW, setsockopt, bind, closesocket, WSAIoctl, WSAEventSelect, WSAStartup, WSACleanup, WSASocketA, WSAGetLastError
RPCRT4.dllRpcServerInqBindings, RpcEpRegisterW, RpcEpUnregister, RpcImpersonateClient, MesEncodeDynBufferHandleCreate, MesHandleFree, I_RpcExceptionFilter, MesDecodeBufferHandleCreate, RpcServerUseProtseqW, RpcAsyncCompleteCall, NdrServerCall2, NdrMesTypeEncode3, NdrMesTypeDecode3, NdrMesTypeFree3, RpcBindingVectorFree, RpcServerUnregisterIfEx, RpcServerInqCallAttributesW, RpcRaiseException, RpcGetAuthorizationContextForClient, NdrAsyncServerCall, RpcFreeAuthorizationContext, NdrServerCallAll, Ndr64AsyncServerCallAll, RpcStringFreeW, UuidCreate, RpcRevertToSelf, RpcServerRegisterIfEx, UuidToStringW
api-ms-win-core-heap-l2-1-0.dllLocalFree, LocalAlloc
api-ms-win-core-file-l1-1-0.dllCompareFileTime
api-ms-win-core-localization-l1-2-0.dllFormatMessageW
api-ms-win-core-timezone-l1-1-0.dllSystemTimeToFileTime
api-ms-win-core-threadpool-legacy-l1-1-0.dllUnregisterWaitEx
api-ms-win-core-threadpool-private-l1-1-0.dllRegisterWaitForSingleObjectEx
NSI.dllNsiGetParameter, NsiSetParameter
api-ms-win-core-perfcounters-l1-1-0.dllPerfCreateInstance, PerfStartProvider, PerfSetCounterRefValue, PerfSetULongCounterValue, PerfSetCounterSetInfo, PerfStopProvider
api-ms-win-security-activedirectoryclient-l1-1-0.dllDsBindWithSpnExW, DsFreeNameResultW, DsCrackNamesW, DsUnBindW
CRYPTSP.dllCryptCreateHash, CryptGetHashParam, CryptDestroyHash, CryptReleaseContext, CryptHashData, CryptAcquireContextA
UMPDC.dllPdcv2ActivationClientDeactivate, Pdcv2ActivationClientActivate, Pdcv2ActivationClientRenewActivation, Pdcv2ActivationClientUnregister, Pdcv2ActivationClientRegister
api-ms-win-stateseparation-helpers-l1-1-0.dllGetPersistedRegistryLocationW
api-ms-win-core-apiquery-l1-1-0.dllApiSetQueryApiSetPresence
api-ms-win-core-processthreads-l1-1-1.dllGetProcessMitigationPolicy
api-ms-win-core-delayload-l1-1-1.dllResolveDelayLoadedAPI
api-ms-win-core-delayload-l1-1-0.dllDelayLoadFailureHook
NameOrdinalAddress
IkeServiceMain10x18001bb60
SvchostPushServiceGlobals20x18002b530
Language of compilation systemCountry where language is spokenMap
EnglishUnited States
Report size exceeds maximum size, please checkout the PCAP download to see all network behavior
Target ID:0
Start time:11:27:00
Start date:28/01/2023
Path:C:\Windows\System32\loaddll64.exe
Wow64 process (32bit):false
Commandline:loaddll64.exe "C:\Users\user\Desktop\IKEEXT.DLL.dll"
Imagebase:0x7ff6ff000000
File size:139776 bytes
MD5 hash:C676FC0263EDD17D4CE7D644B8F3FCD6
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high

Target ID:1
Start time:11:27:00
Start date:28/01/2023
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7fcd70000
File size:625664 bytes
MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high

Target ID:2
Start time:11:27:00
Start date:28/01/2023
Path:C:\Windows\System32\cmd.exe
Wow64 process (32bit):false
Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\IKEEXT.DLL.dll",#1
Imagebase:0x7ff627730000
File size:273920 bytes
MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high

Target ID:3
Start time:11:27:00
Start date:28/01/2023
Path:C:\Windows\System32\rundll32.exe
Wow64 process (32bit):false
Commandline:rundll32.exe C:\Users\user\Desktop\IKEEXT.DLL.dll,IkeServiceMain
Imagebase:0x7ff6f45c0000
File size:69632 bytes
MD5 hash:73C519F050C20580F8A62C849D49215A
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high

Target ID:4
Start time:11:27:00
Start date:28/01/2023
Path:C:\Windows\System32\rundll32.exe
Wow64 process (32bit):false
Commandline:rundll32.exe "C:\Users\user\Desktop\IKEEXT.DLL.dll",#1
Imagebase:0x7ff6f45c0000
File size:69632 bytes
MD5 hash:73C519F050C20580F8A62C849D49215A
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high

Target ID:5
Start time:11:27:03
Start date:28/01/2023
Path:C:\Windows\System32\rundll32.exe
Wow64 process (32bit):false
Commandline:rundll32.exe C:\Users\user\Desktop\IKEEXT.DLL.dll,SvchostPushServiceGlobals
Imagebase:0x7ff6f45c0000
File size:69632 bytes
MD5 hash:73C519F050C20580F8A62C849D49215A
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high

No disassembly