Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll

Overview

General Information

Sample Name:B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll
Analysis ID:803495
MD5:4979beaa139791aa9d265ddc00fff0c6
SHA1:22301285c8a3e4fc0d8086f23265a2b5e7552544
SHA256:b94872e1a7599af25caa25013fc0054e5affda6cfaef65338aa344ca2b21b4db
Tags:dllRecordBreakersigned
Infos:

Detection

Raccoon Stealer v2
Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

System process connects to network (likely due to code injection or exploit)
Yara detected Raccoon Stealer v2
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
C2 URLs / IPs found in malware configuration
Creates a DirectInput object (often for capturing keystrokes)
Uses 32bit PE files
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Sample file is different than original file name gathered from version info
Tries to load missing DLLs
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Checks if the current process is being debugged
Checks for debuggers (devices)
PE file contains sections with non-standard names
Sleep loop found (likely to delay execution)
Internet Provider seen in connection with other malware
Contains capabilities to detect virtual machines
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
PE / OLE file has an invalid certificate
Program does not show much activity (idle)
Creates a process in suspended mode (likely to inject code)
Entry point lies outside standard sections

Classification

  • System is w10x64
  • loaddll32.exe (PID: 4544 cmdline: loaddll32.exe "C:\Users\user\Desktop\B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll" MD5: 1F562FBF37040EC6C43C8D5EF619EA39)
    • conhost.exe (PID: 2868 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • cmd.exe (PID: 1412 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll",#1 MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • rundll32.exe (PID: 1092 cmdline: rundll32.exe "C:\Users\user\Desktop\B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll",#1 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 5928 cmdline: rundll32.exe C:\Users\user\Desktop\B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll,_Start@16 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 1876 cmdline: rundll32.exe "C:\Users\user\Desktop\B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll",_Start@16 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
  • cleanup
{"C2 url": ["http://85.192.63.204/", "http://185.229.65.197/"], "Bot ID": "e501fdc78ff3edbb9f720e1766e14ded", "RC4_key1": "e501fdc78ff3edbb9f720e1766e14ded"}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_RaccoonV2Yara detected Raccoon Stealer v2Joe Security
    SourceRuleDescriptionAuthorStrings
    00000003.00000003.327728754.0000000000CEF000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RaccoonV2Yara detected Raccoon Stealer v2Joe Security
      00000005.00000003.357649094.0000000000A8D000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RaccoonV2Yara detected Raccoon Stealer v2Joe Security
        00000004.00000003.330132238.0000000000E0C000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RaccoonV2Yara detected Raccoon Stealer v2Joe Security
          00000003.00000003.327774570.0000000000CEF000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RaccoonV2Yara detected Raccoon Stealer v2Joe Security
            00000005.00000002.357921992.0000000000A8D000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RaccoonV2Yara detected Raccoon Stealer v2Joe Security
              Click to see the 2 entries
              No Sigma rule has matched
              Timestamp:192.168.2.7185.229.65.19749716802036934 02/10/23-01:56:48.125019
              SID:2036934
              Source Port:49716
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.7185.229.65.19749721802043003 02/10/23-01:57:02.089245
              SID:2043003
              Source Port:49721
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.7185.229.65.19749717802043003 02/10/23-01:56:49.043678
              SID:2043003
              Source Port:49717
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.7185.229.65.19749717802036934 02/10/23-01:56:49.043678
              SID:2036934
              Source Port:49717
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.7185.229.65.19749716802043003 02/10/23-01:56:48.125019
              SID:2043003
              Source Port:49716
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.7185.229.65.19749721802036934 02/10/23-01:57:02.089245
              SID:2036934
              Source Port:49721
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dllReversingLabs: Detection: 43%
              Source: B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dllVirustotal: Detection: 71%Perma Link
              Source: 4.2.rundll32.exe.10000000.0.unpackMalware Configuration Extractor: Raccoon {"C2 url": ["http://85.192.63.204/", "http://185.229.65.197/"], "Bot ID": "e501fdc78ff3edbb9f720e1766e14ded", "RC4_key1": "e501fdc78ff3edbb9f720e1766e14ded"}
              Source: B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dllStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL
              Source: B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT

              Networking

              barindex
              Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 185.229.65.197 80Jump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 85.192.63.204 80Jump to behavior
              Source: TrafficSnort IDS: 2043003 ET TROJAN Win32/RecordBreaker - Observed UA M5 (23591) 192.168.2.7:49716 -> 185.229.65.197:80
              Source: TrafficSnort IDS: 2036934 ET TROJAN Win32/RecordBreaker CnC Checkin M1 192.168.2.7:49716 -> 185.229.65.197:80
              Source: TrafficSnort IDS: 2043003 ET TROJAN Win32/RecordBreaker - Observed UA M5 (23591) 192.168.2.7:49717 -> 185.229.65.197:80
              Source: TrafficSnort IDS: 2036934 ET TROJAN Win32/RecordBreaker CnC Checkin M1 192.168.2.7:49717 -> 185.229.65.197:80
              Source: TrafficSnort IDS: 2043003 ET TROJAN Win32/RecordBreaker - Observed UA M5 (23591) 192.168.2.7:49721 -> 185.229.65.197:80
              Source: TrafficSnort IDS: 2036934 ET TROJAN Win32/RecordBreaker CnC Checkin M1 192.168.2.7:49721 -> 185.229.65.197:80
              Source: Malware configuration extractorURLs: http://85.192.63.204/
              Source: Malware configuration extractorURLs: http://185.229.65.197/
              Source: Joe Sandbox ViewASN Name: LINK-ASRU LINK-ASRU
              Source: unknownTCP traffic detected without corresponding DNS query: 85.192.63.204
              Source: unknownTCP traffic detected without corresponding DNS query: 85.192.63.204
              Source: unknownTCP traffic detected without corresponding DNS query: 85.192.63.204
              Source: unknownTCP traffic detected without corresponding DNS query: 85.192.63.204
              Source: unknownTCP traffic detected without corresponding DNS query: 185.229.65.197
              Source: unknownTCP traffic detected without corresponding DNS query: 185.229.65.197
              Source: unknownTCP traffic detected without corresponding DNS query: 185.229.65.197
              Source: unknownTCP traffic detected without corresponding DNS query: 85.192.63.204
              Source: unknownTCP traffic detected without corresponding DNS query: 85.192.63.204
              Source: unknownTCP traffic detected without corresponding DNS query: 185.229.65.197
              Source: unknownTCP traffic detected without corresponding DNS query: 185.229.65.197
              Source: unknownTCP traffic detected without corresponding DNS query: 185.229.65.197
              Source: unknownTCP traffic detected without corresponding DNS query: 85.192.63.204
              Source: unknownTCP traffic detected without corresponding DNS query: 85.192.63.204
              Source: unknownTCP traffic detected without corresponding DNS query: 85.192.63.204
              Source: unknownTCP traffic detected without corresponding DNS query: 185.229.65.197
              Source: unknownTCP traffic detected without corresponding DNS query: 185.229.65.197
              Source: unknownTCP traffic detected without corresponding DNS query: 185.229.65.197
              Source: rundll32.exe, 00000004.00000003.330132238.0000000000E0C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.229.65.197/
              Source: rundll32.exe, 00000004.00000002.330899425.0000000000E0C000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.330132238.0000000000E0C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.229.65.197/:Dfw
              Source: rundll32.exe, 00000004.00000002.330899425.0000000000E0C000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.330132238.0000000000E0C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.229.65.197/KF
              Source: rundll32.exe, 00000004.00000002.330899425.0000000000DDA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.229.65.197/L
              Source: rundll32.exe, 00000004.00000002.330899425.0000000000E0C000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.330132238.0000000000E0C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.229.65.197/YF
              Source: rundll32.exe, 00000004.00000002.330899425.0000000000E0C000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.330132238.0000000000E0C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.229.65.197/ws
              Source: rundll32.exe, 00000004.00000003.323164236.0000000000E2F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.323164236.0000000000E0C000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.330899425.0000000000DDA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.330132238.0000000000E0C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://85.192.63.204/
              Source: rundll32.exe, 00000004.00000002.330899425.0000000000E0C000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.323164236.0000000000E0C000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.330132238.0000000000E0C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://85.192.63.204/=
              Source: rundll32.exe, 00000004.00000002.330899425.0000000000DDA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://85.192.63.204/w
              Source: B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dllString found in binary or memory: http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
              Source: B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dllString found in binary or memory: http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
              Source: B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dllString found in binary or memory: http://ocsp.sectigo.com0
              Source: B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dllString found in binary or memory: https://sectigo.com/CPS0
              Source: unknownHTTP traffic detected: POST / HTTP/1.1Accept: */*Content-Type: application/x-www-form-urlencoded; charset=utf-8User-Agent: 23591Host: 185.229.65.197Content-Length: 95Connection: Keep-AliveCache-Control: no-cacheData Raw: 6d 61 63 68 69 6e 65 49 64 3d 64 30 36 65 64 36 33 35 2d 36 38 66 36 2d 34 65 39 61 2d 39 35 35 63 2d 34 38 39 39 66 35 66 35 37 62 39 61 7c 61 6c 66 6f 6e 73 26 63 6f 6e 66 69 67 49 64 3d 65 35 30 31 66 64 63 37 38 66 66 33 65 64 62 62 39 66 37 32 30 65 31 37 36 36 65 31 34 64 65 64 Data Ascii: machineId=d06ed635-68f6-4e9a-955c-4899f5f57b9a|user&configId=e501fdc78ff3edbb9f720e1766e14ded
              Source: loaddll32.exe, 00000000.00000002.582549578.000000000125B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
              Source: B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dllStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL
              Source: B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dllBinary or memory string: OriginalFilenameScanner.dll@ vs B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll
              Source: C:\Windows\System32\loaddll32.exeSection loaded: vboxhook.dllJump to behavior
              Source: C:\Windows\System32\loaddll32.exeSection loaded: vboxogl.dllJump to behavior
              Source: C:\Windows\System32\loaddll32.exeCode function: String function: 02E50413 appears 70 times
              Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 00C40413 appears 169 times
              Source: B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dllStatic PE information: invalid certificate
              Source: B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dllReversingLabs: Detection: 43%
              Source: B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dllVirustotal: Detection: 71%
              Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll,_Start@16
              Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll"
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll",#1
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll,_Start@16
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll",#1
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll",_Start@16
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll",#1Jump to behavior
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll,_Start@16Jump to behavior
              Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll",_Start@16Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll",#1Jump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeMutant created: \Sessions\1\BaseNamedObjects\VMwareGuestDnDDataMutex
              Source: C:\Windows\SysWOW64\rundll32.exeMutant created: \Sessions\1\BaseNamedObjects\Local\VMToolsHookQueueLock
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2868:120:WilError_01
              Source: classification engineClassification label: mal76.troj.evad.winDLL@10/0@0/3
              Source: B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dllStatic file information: File size 2103000 > 1048576
              Source: B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dllStatic PE information: Raw size of DSEG is bigger than: 0x100000 < 0x119a00
              Source: B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT
              Source: C:\Windows\System32\loaddll32.exeCode function: 0_3_02E606AC push cs; iretd 0_3_02E606AD
              Source: C:\Windows\System32\loaddll32.exeCode function: 0_3_02E606AC push cs; iretd 0_3_02E606AD
              Source: C:\Windows\System32\loaddll32.exeCode function: 0_3_02E606AC push cs; iretd 0_3_02E606AD
              Source: C:\Windows\System32\loaddll32.exeCode function: 0_3_02E606AC push cs; iretd 0_3_02E606AD
              Source: C:\Windows\System32\loaddll32.exeCode function: 0_3_02E5046A push es; iretd 0_3_02E5046B
              Source: C:\Windows\System32\loaddll32.exeCode function: 0_3_02E5046A push es; iretd 0_3_02E5046B
              Source: C:\Windows\System32\loaddll32.exeCode function: 0_3_02E5046A push es; iretd 0_3_02E5046B
              Source: C:\Windows\System32\loaddll32.exeCode function: 0_3_02E5046A push es; iretd 0_3_02E5046B
              Source: C:\Windows\System32\loaddll32.exeCode function: 0_3_02E5046A push es; iretd 0_3_02E5046B
              Source: C:\Windows\System32\loaddll32.exeCode function: 0_3_02E5046A push es; iretd 0_3_02E5046B
              Source: C:\Windows\System32\loaddll32.exeCode function: 0_3_02E5046A push es; iretd 0_3_02E5046B
              Source: C:\Windows\System32\loaddll32.exeCode function: 0_3_02E5046A push es; iretd 0_3_02E5046B
              Source: C:\Windows\System32\loaddll32.exeCode function: 0_3_02E5046A push es; iretd 0_3_02E5046B
              Source: C:\Windows\System32\loaddll32.exeCode function: 0_3_02E5046A push es; iretd 0_3_02E5046B
              Source: C:\Windows\System32\loaddll32.exeCode function: 0_3_02E606AC push cs; iretd 0_3_02E606AD
              Source: C:\Windows\System32\loaddll32.exeCode function: 0_3_02E606AC push cs; iretd 0_3_02E606AD
              Source: C:\Windows\System32\loaddll32.exeCode function: 0_3_02E606AC push cs; iretd 0_3_02E606AD
              Source: C:\Windows\System32\loaddll32.exeCode function: 0_3_02E606AC push cs; iretd 0_3_02E606AD
              Source: C:\Windows\System32\loaddll32.exeCode function: 0_3_02DF06BC push cs; iretd 0_3_02DF06BD
              Source: C:\Windows\System32\loaddll32.exeCode function: 0_3_02DF06BC push cs; iretd 0_3_02DF06BD
              Source: C:\Windows\System32\loaddll32.exeCode function: 0_3_02DF06BC push cs; iretd 0_3_02DF06BD
              Source: C:\Windows\System32\loaddll32.exeCode function: 0_3_02DF06BC push cs; iretd 0_3_02DF06BD
              Source: C:\Windows\System32\loaddll32.exeCode function: 0_3_02DF06BC push cs; iretd 0_3_02DF06BD
              Source: C:\Windows\System32\loaddll32.exeCode function: 0_3_02DF06BC push cs; iretd 0_3_02DF06BD
              Source: C:\Windows\System32\loaddll32.exeCode function: 0_3_02DF06BC push cs; iretd 0_3_02DF06BD
              Source: C:\Windows\System32\loaddll32.exeCode function: 0_3_02DF06BC push cs; iretd 0_3_02DF06BD
              Source: C:\Windows\System32\loaddll32.exeCode function: 0_3_02DF06BC push cs; iretd 0_3_02DF06BD
              Source: C:\Windows\System32\loaddll32.exeCode function: 0_3_02DF06BC push cs; iretd 0_3_02DF06BD
              Source: C:\Windows\System32\loaddll32.exeCode function: 0_3_02DF06BC push cs; iretd 0_3_02DF06BD
              Source: C:\Windows\System32\loaddll32.exeCode function: 0_3_02DF06BC push cs; iretd 0_3_02DF06BD
              Source: C:\Windows\System32\loaddll32.exeCode function: 0_3_02DF06BC push cs; iretd 0_3_02DF06BD
              Source: B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dllStatic PE information: section name: DSEG
              Source: B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dllStatic PE information: section name: DSEG
              Source: B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dllStatic PE information: section name: DSEG
              Source: initial sampleStatic PE information: section where entry point is pointing to: DSEG
              Source: initial sampleStatic PE information: section name: DSEG entropy: 7.980689708362385
              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\loaddll32.exeWindow / User API: threadDelayed 2873Jump to behavior
              Source: C:\Windows\System32\loaddll32.exeWindow / User API: threadDelayed 489Jump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exe TID: 4968Thread sleep count: 46 > 30Jump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exe TID: 4968Thread sleep count: 56 > 30Jump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exe TID: 6044Thread sleep count: 81 > 30Jump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exe TID: 6044Thread sleep count: 38 > 30Jump to behavior
              Source: C:\Windows\System32\loaddll32.exeThread sleep count: Count: 2873 delay: -5Jump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeFile opened / queried: C:\Users\user\AppData\Local\Microsoft\WindowsApps\VBoxHook.dllJump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeFile opened / queried: C:\Program Files (x86)\Common Files\Oracle\Java\javapath\VBoxHook.dllJump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeFile opened / queried: C:\Windows\SysWOW64\Wbem\VBoxHook.dllJump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeFile opened / queried: C:\Users\user\Desktop\VBoxHook.dllJump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeFile opened / queried: C:\Windows\system\VBoxHook.dllJump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeFile opened / queried: C:\Windows\VBoxHook.dllJump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeFile opened / queried: C:\Windows\SysWOW64\OpenSSH\VBoxHook.dllJump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeFile opened / queried: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\VBoxHook.dllJump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeFile opened / queried: C:\Windows\SysWOW64\VBoxHook.dllJump to behavior
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
              Source: C:\Windows\System32\loaddll32.exeProcess information queried: ProcessInformationJump to behavior
              Source: C:\Windows\System32\loaddll32.exeSystem information queried: ModuleInformationJump to behavior
              Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 120000Jump to behavior
              Source: loaddll32.exe, 00000000.00000002.582549578.000000000125B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: C:\Windows\system32\VBoxHook.dll
              Source: rundll32.exe, 00000004.00000002.330899425.0000000000E0C000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.323164236.0000000000E0C000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.330132238.0000000000E0C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWP2
              Source: rundll32.exe, 00000005.00000002.358181684.00000000010C0000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: VMwareGuestDnDDataMutex
              Source: rundll32.exe, 00000005.00000002.358181684.00000000010C0000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: KERNEL32.dllUSER32.dllGDI32.dllole32.dllOLE32.dllPELockKERNEL32.dllUSER32.dllADVAPI32.dllCOMCTL32.dllSHELL32.dllUXTHEME.dllVMwareDnDManagerEventVMwareGuestDnDDataMutexLocal\VMToolsHookQueueLockVBoxHook.dllVBoxOGL.dllCannot load "%s" library (missing file).
              Source: rundll32.exe, 00000005.00000002.358181684.00000000010C0000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: Local\VMToolsHookQueueLock
              Source: loaddll32.exe, 00000000.00000002.582549578.000000000125B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: C:\Windows\system32\VBoxHook.dllll
              Source: rundll32.exe, 00000004.00000002.330899425.0000000000DDA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VBoxHook.dllT
              Source: loaddll32.exe, 00000000.00000002.582549578.000000000125B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: C:\Windows\VBoxHook.dll
              Source: rundll32.exe, 00000004.00000002.330899425.0000000000E40000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.330132238.0000000000E40000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.323164236.0000000000E40000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
              Source: loaddll32.exe, 00000000.00000002.582589061.0000000002C30000.00000040.00001000.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.328138419.0000000004750000.00000040.00001000.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.331283389.0000000004750000.00000040.00001000.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.358181684.00000000010C0000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: VBoxHook.dll
              Source: rundll32.exe, 00000005.00000002.358181684.00000000010C0000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: VMwareDnDManagerEvent
              Source: loaddll32.exe, 00000000.00000002.582549578.000000000125B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VBoxHook.dll86)-s
              Source: C:\Windows\System32\loaddll32.exeProcess queried: DebugPortJump to behavior
              Source: C:\Windows\System32\loaddll32.exeProcess queried: DebugPortJump to behavior
              Source: C:\Windows\System32\loaddll32.exeProcess queried: DebugPortJump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeFile opened: SIWDEBUG
              Source: C:\Windows\SysWOW64\rundll32.exeFile opened: SIWVIDSTART
              Source: C:\Windows\SysWOW64\rundll32.exeFile opened: NTICE
              Source: C:\Windows\SysWOW64\rundll32.exeFile opened: SICE
              Source: C:\Windows\SysWOW64\rundll32.exeFile opened: SIWVID
              Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 185.229.65.197 80Jump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 85.192.63.204 80Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll",#1Jump to behavior
              Source: C:\Windows\SysWOW64\rundll32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: dump.pcap, type: PCAP
              Source: Yara matchFile source: 00000003.00000003.327728754.0000000000CEF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000003.357649094.0000000000A8D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000003.330132238.0000000000E0C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000003.00000003.327774570.0000000000CEF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.357921992.0000000000A8D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000003.357557134.0000000000A8D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 1092, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: dump.pcap, type: PCAP
              Source: Yara matchFile source: 00000003.00000003.327728754.0000000000CEF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000003.357649094.0000000000A8D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000003.330132238.0000000000E0C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000003.00000003.327774570.0000000000CEF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.357921992.0000000000A8D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000003.357557134.0000000000A8D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 1092, type: MEMORYSTR
              Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
              Valid AccountsWindows Management Instrumentation1
              DLL Side-Loading
              111
              Process Injection
              51
              Virtualization/Sandbox Evasion
              1
              Input Capture
              31
              Security Software Discovery
              Remote Services1
              Input Capture
              Exfiltration Over Other Network Medium1
              Non-Application Layer Protocol
              Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
              Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
              DLL Side-Loading
              111
              Process Injection
              LSASS Memory1
              Process Discovery
              Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth11
              Application Layer Protocol
              Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
              Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
              Deobfuscate/Decode Files or Information
              Security Account Manager51
              Virtualization/Sandbox Evasion
              SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
              Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)3
              Obfuscated Files or Information
              NTDS1
              Application Window Discovery
              Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
              Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
              Rundll32
              LSA Secrets3
              System Information Discovery
              SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
              Replication Through Removable MediaLaunchdRc.commonRc.common1
              Software Packing
              Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
              External Remote ServicesScheduled TaskStartup ItemsStartup Items1
              DLL Side-Loading
              DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 signatures2 2 Behavior Graph ID: 803495 Sample: B94872E1A7599AF25CAA25013FC... Startdate: 10/02/2023 Architecture: WINDOWS Score: 76 28 Snort IDS alert for network traffic 2->28 30 Multi AV Scanner detection for submitted file 2->30 32 Yara detected Raccoon Stealer v2 2->32 34 C2 URLs / IPs found in malware configuration 2->34 7 loaddll32.exe 1 2->7         started        process3 process4 9 rundll32.exe 12 7->9         started        12 rundll32.exe 12 7->12         started        15 cmd.exe 1 7->15         started        17 conhost.exe 7->17         started        dnsIp5 36 System process connects to network (likely due to code injection or exploit) 9->36 24 185.229.65.197, 49706, 49707, 49709 LINK-ASRU Russian Federation 12->24 26 85.192.63.204, 49704, 49705, 49708 LINEGROUP-ASRU Russian Federation 12->26 19 rundll32.exe 12 15->19         started        signatures6 process7 dnsIp8 22 192.168.2.1 unknown unknown 19->22

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll44%ReversingLabsWin32.Trojan.Tiggre
              B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll71%VirustotalBrowse
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t0%URL Reputationsafe
              http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t0%URL Reputationsafe
              https://sectigo.com/CPS00%URL Reputationsafe
              http://ocsp.sectigo.com00%URL Reputationsafe
              http://ocsp.sectigo.com00%URL Reputationsafe
              http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#0%URL Reputationsafe
              http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#0%URL Reputationsafe
              http://185.229.65.197/YF0%Avira URL Cloudsafe
              http://85.192.63.204/0%Avira URL Cloudsafe
              http://85.192.63.204/w0%Avira URL Cloudsafe
              http://185.229.65.197/L0%Avira URL Cloudsafe
              http://185.229.65.197/4%VirustotalBrowse
              http://85.192.63.204/=0%Avira URL Cloudsafe
              http://185.229.65.197/ws0%Avira URL Cloudsafe
              http://185.229.65.197/0%Avira URL Cloudsafe
              http://185.229.65.197/:Dfw0%Avira URL Cloudsafe
              http://185.229.65.197/KF0%Avira URL Cloudsafe
              No contacted domains info
              NameMaliciousAntivirus DetectionReputation
              http://185.229.65.197/true
              • 4%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              http://85.192.63.204/true
              • Avira URL Cloud: safe
              unknown
              NameSourceMaliciousAntivirus DetectionReputation
              http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0tB94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dllfalse
              • URL Reputation: safe
              • URL Reputation: safe
              unknown
              https://sectigo.com/CPS0B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dllfalse
              • URL Reputation: safe
              unknown
              http://ocsp.sectigo.com0B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dllfalse
              • URL Reputation: safe
              • URL Reputation: safe
              unknown
              http://185.229.65.197/YFrundll32.exe, 00000004.00000002.330899425.0000000000E0C000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.330132238.0000000000E0C000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dllfalse
              • URL Reputation: safe
              • URL Reputation: safe
              unknown
              http://185.229.65.197/Lrundll32.exe, 00000004.00000002.330899425.0000000000DDA000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://85.192.63.204/wrundll32.exe, 00000004.00000002.330899425.0000000000DDA000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://85.192.63.204/=rundll32.exe, 00000004.00000002.330899425.0000000000E0C000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.323164236.0000000000E0C000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.330132238.0000000000E0C000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://185.229.65.197/wsrundll32.exe, 00000004.00000002.330899425.0000000000E0C000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.330132238.0000000000E0C000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://185.229.65.197/:Dfwrundll32.exe, 00000004.00000002.330899425.0000000000E0C000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.330132238.0000000000E0C000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://185.229.65.197/KFrundll32.exe, 00000004.00000002.330899425.0000000000E0C000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.330132238.0000000000E0C000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              185.229.65.197
              unknownRussian Federation
              48940LINK-ASRUtrue
              85.192.63.204
              unknownRussian Federation
              47711LINEGROUP-ASRUtrue
              IP
              192.168.2.1
              Joe Sandbox Version:36.0.0 Rainbow Opal
              Analysis ID:803495
              Start date and time:2023-02-10 02:10:15 +01:00
              Joe Sandbox Product:CloudBasic
              Overall analysis duration:0h 8m 50s
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
              Run name:Run with higher sleep bypass
              Number of analysed new started processes analysed:9
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • HDC enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample file name:B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll
              Detection:MAL
              Classification:mal76.troj.evad.winDLL@10/0@0/3
              EGA Information:Failed
              HDC Information:Failed
              HCA Information:
              • Successful, ratio: 88%
              • Number of executed functions: 3
              • Number of non-executed functions: 0
              Cookbook Comments:
              • Found application associated with file extension: .dll
              • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
              • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, conhost.exe
              • Excluded domains from analysis (whitelisted): client.wns.windows.com, ctldl.windowsupdate.com
              • Execution Graph export aborted for target loaddll32.exe, PID 4544 because there are no executed function
              • Execution Graph export aborted for target rundll32.exe, PID 5928 because there are no executed function
              • Not all processes where analyzed, report is missing behavior information
              • Report creation exceeded maximum time and may have missing disassembly code information.
              • Report size getting too big, too many NtAllocateVirtualMemory calls found.
              • Report size getting too big, too many NtProtectVirtualMemory calls found.
              • Report size getting too big, too many NtQueryValueKey calls found.
              • Report size getting too big, too many NtReadVirtualMemory calls found.
              No simulations
              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
              85.192.63.204oOb5C7arAh.dllGet hashmaliciousBrowse
                No context
                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                LINK-ASRUV6lkvGNGV0.elfGet hashmaliciousBrowse
                • 5.158.233.251
                lLicxyp3Ad.elfGet hashmaliciousBrowse
                • 31.134.158.141
                vvCPWuzCU3.elfGet hashmaliciousBrowse
                • 31.134.158.143
                OW9rFQwN9r.elfGet hashmaliciousBrowse
                • 31.134.158.146
                AUIoXxgku9.elfGet hashmaliciousBrowse
                • 31.134.158.115
                YUI3lBwC8a.elfGet hashmaliciousBrowse
                • 37.8.157.76
                VlBtqs8BxH.elfGet hashmaliciousBrowse
                • 146.66.202.124
                file.exeGet hashmaliciousBrowse
                • 185.229.65.140
                file.exeGet hashmaliciousBrowse
                • 185.229.65.140
                file.exeGet hashmaliciousBrowse
                • 185.229.65.140
                file.exeGet hashmaliciousBrowse
                • 185.229.65.140
                file.exeGet hashmaliciousBrowse
                • 185.229.65.140
                file.exeGet hashmaliciousBrowse
                • 185.229.65.140
                file.exeGet hashmaliciousBrowse
                • 185.229.65.140
                file.exeGet hashmaliciousBrowse
                • 185.229.65.140
                file.exeGet hashmaliciousBrowse
                • 185.229.65.140
                file.exeGet hashmaliciousBrowse
                • 185.229.65.140
                X186ICpD6Z.elfGet hashmaliciousBrowse
                • 109.126.35.52
                6sBmn1CQ1O.elfGet hashmaliciousBrowse
                • 31.134.158.114
                No context
                No context
                No created / dropped files found
                File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                Entropy (8bit):7.98944036665942
                TrID:
                • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
                • Generic Win/DOS Executable (2004/3) 0.20%
                • DOS Executable Generic (2002/1) 0.20%
                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                File name:B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll
                File size:2103000
                MD5:4979beaa139791aa9d265ddc00fff0c6
                SHA1:22301285c8a3e4fc0d8086f23265a2b5e7552544
                SHA256:b94872e1a7599af25caa25013fc0054e5affda6cfaef65338aa344ca2b21b4db
                SHA512:43267b709819f47d225013475450b879770f7e8b636be602e54bc83f57189218348027d75e0695cbb0027447ef3cacd7fb2efcc82a2f036f871e3b44c84d3341
                SSDEEP:24576:Or+mhOVsJou/n4JX293Q9vGvvrIs91cYZfT4xvIwDC4k+:BmhOsouP439v6Pc+fTYO4/
                TLSH:68A5C0F491D6BC1FA31F9074C83757A39637AC20AA29EAB45752B102244C36CD1BFFA5
                File Content Preview:MZ......................@...p...............................`...........!..L.!Windows Program..$PE..L...,..c...........!.....t..........(A...............................................A ...@.............................J....@..(........-............ ....
                Icon Hash:f0ccbecbabbab6b0
                Entrypoint:0x10024128
                Entrypoint Section:DSEG
                Digitally signed:true
                Imagebase:0x10000000
                Subsystem:windows gui
                Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL
                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT
                Time Stamp:0x639A1A2C [Wed Dec 14 18:47:08 2022 UTC]
                TLS Callbacks:
                CLR (.Net) Version:
                OS Version Major:6
                OS Version Minor:0
                File Version Major:6
                File Version Minor:0
                Subsystem Version Major:6
                Subsystem Version Minor:0
                Import Hash:59d147a4d0fec921763249db448e8d8b
                Signature Valid:false
                Signature Issuer:CN=www.trapezium.com
                Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
                Error Number:-2146762487
                Not Before, Not After
                • 12/29/2022 3:32:57 PM 12/29/2023 3:52:57 PM
                Subject Chain
                • CN=www.trapezium.com
                Version:3
                Thumbprint MD5:A98084DE4B2F52AD14B731DD63D1E262
                Thumbprint SHA-1:764BA94760F13EE39575F9D6D322C596CCFE25E7
                Thumbprint SHA-256:7C0C31688CB0E9B2C134F2F0EEE10561171E24D63740C402A1BCEAF1EA8EBD2F
                Serial:6533EE2F946F17814DE29207352E24D5
                Instruction
                jmp 00007FCDA8C90837h
                inc ebx
                cmp bl, byte ptr [ecx+edx*4+0005E9F3h]
                add byte ptr [eax], al
                cmp eax, D2BAD1E8h
                shrd esi, esi, 00000000h
                jmp 00007FCDA8C90835h
                push 0000002Bh
                jmp 00007FCDA8C90838h
                rol ebx, cl
                shld esi, esi, 00000000h
                pushad
                call 00007FCDA8C90835h
                sbb esi, eax
                pop ebp
                add ebp, 000010CFh
                neg ecx
                jmp 00007FCDA8C90EDFh
                nop
                jmp 00007FCDA8C90834h
                NameVirtual AddressVirtual Size Is in Section
                IMAGE_DIRECTORY_ENTRY_EXPORT0x13d8c80x4aDSEG
                IMAGE_DIRECTORY_ENTRY_IMPORT0x240000x128DSEG
                IMAGE_DIRECTORY_ENTRY_RESOURCE0x210000x2dfd.rsrc
                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                IMAGE_DIRECTORY_ENTRY_SECURITY0x2000000x16d8
                IMAGE_DIRECTORY_ENTRY_BASERELOC0x13d9140x0DSEG
                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                DSEG0x10000x180000x0False0empty0.0IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                DSEG0x190000x80000x0False0empty0.0IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                .rsrc0x210000x30000x2e00False0.3140285326086957data4.3526116480969606IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                DSEG0x240000x11a0000x119a00False0.9798350463271194data7.980689708362385IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                NameRVASizeTypeLanguageCountry
                RT_ICON0x212c40x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096EnglishUnited States
                RT_STRING0x2236c0x198data
                RT_STRING0x225040x34cdata
                RT_STRING0x228500x390data
                RT_STRING0x22be00x2f4AmigaOS bitmap font "n", fc_YSize 25856, 21760 elements, 2nd " ", 3rd "e"
                RT_STRING0x22ed40x1f8data
                RT_STRING0x230cc0x2bcdata
                RT_MESSAGETABLE0x233880x70dataEnglishUnited States
                RT_GROUP_ICON0x233f80x14dataEnglishUnited States
                RT_VERSION0x2340c0x344dataEnglishUnited States
                RT_MANIFEST0x237500x6adXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States
                DLLImport
                KERNEL32.dllGetProcAddress, LoadLibraryA, VirtualAlloc, VirtualFree
                USER32.dllDestroyWindow
                GDI32.dllGetObjectW
                OLE32.dllCoDecodeProxy
                NameOrdinalAddress
                _Start@1610x10008c70
                Language of compilation systemCountry where language is spokenMap
                EnglishUnited States
                TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                192.168.2.7185.229.65.19749716802036934 02/10/23-01:56:48.125019TCP2036934ET TROJAN Win32/RecordBreaker CnC Checkin M14971680192.168.2.7185.229.65.197
                192.168.2.7185.229.65.19749721802043003 02/10/23-01:57:02.089245TCP2043003ET TROJAN Win32/RecordBreaker - Observed UA M5 (23591)4972180192.168.2.7185.229.65.197
                192.168.2.7185.229.65.19749717802043003 02/10/23-01:56:49.043678TCP2043003ET TROJAN Win32/RecordBreaker - Observed UA M5 (23591)4971780192.168.2.7185.229.65.197
                192.168.2.7185.229.65.19749717802036934 02/10/23-01:56:49.043678TCP2036934ET TROJAN Win32/RecordBreaker CnC Checkin M14971780192.168.2.7185.229.65.197
                192.168.2.7185.229.65.19749716802043003 02/10/23-01:56:48.125019TCP2043003ET TROJAN Win32/RecordBreaker - Observed UA M5 (23591)4971680192.168.2.7185.229.65.197
                192.168.2.7185.229.65.19749721802036934 02/10/23-01:57:02.089245TCP2036934ET TROJAN Win32/RecordBreaker CnC Checkin M14972180192.168.2.7185.229.65.197
                TimestampSource PortDest PortSource IPDest IP
                Feb 10, 2023 02:11:20.789648056 CET4970480192.168.2.585.192.63.204
                Feb 10, 2023 02:11:20.813061953 CET804970485.192.63.204192.168.2.5
                Feb 10, 2023 02:11:21.347690105 CET4970480192.168.2.585.192.63.204
                Feb 10, 2023 02:11:21.371324062 CET804970485.192.63.204192.168.2.5
                Feb 10, 2023 02:11:21.976397038 CET4970580192.168.2.585.192.63.204
                Feb 10, 2023 02:11:22.000289917 CET804970585.192.63.204192.168.2.5
                Feb 10, 2023 02:11:22.050780058 CET4970480192.168.2.585.192.63.204
                Feb 10, 2023 02:11:22.075217962 CET804970485.192.63.204192.168.2.5
                Feb 10, 2023 02:11:22.172552109 CET4970680192.168.2.5185.229.65.197
                Feb 10, 2023 02:11:22.202075005 CET8049706185.229.65.197192.168.2.5
                Feb 10, 2023 02:11:22.202258110 CET4970680192.168.2.5185.229.65.197
                Feb 10, 2023 02:11:22.212801933 CET4970680192.168.2.5185.229.65.197
                Feb 10, 2023 02:11:22.242327929 CET8049706185.229.65.197192.168.2.5
                Feb 10, 2023 02:11:22.550822973 CET4970580192.168.2.585.192.63.204
                Feb 10, 2023 02:11:22.574723959 CET804970585.192.63.204192.168.2.5
                Feb 10, 2023 02:11:23.144695044 CET4970580192.168.2.585.192.63.204
                Feb 10, 2023 02:11:23.171282053 CET804970585.192.63.204192.168.2.5
                Feb 10, 2023 02:11:23.300271988 CET4970780192.168.2.5185.229.65.197
                Feb 10, 2023 02:11:23.329993010 CET8049707185.229.65.197192.168.2.5
                Feb 10, 2023 02:11:23.330183029 CET4970780192.168.2.5185.229.65.197
                Feb 10, 2023 02:11:23.339158058 CET4970780192.168.2.5185.229.65.197
                Feb 10, 2023 02:11:23.368835926 CET8049707185.229.65.197192.168.2.5
                Feb 10, 2023 02:11:25.260215044 CET8049706185.229.65.197192.168.2.5
                Feb 10, 2023 02:11:26.408291101 CET8049707185.229.65.197192.168.2.5
                Feb 10, 2023 02:11:34.774116039 CET4970880192.168.2.585.192.63.204
                Feb 10, 2023 02:11:34.797740936 CET804970885.192.63.204192.168.2.5
                Feb 10, 2023 02:11:35.317712069 CET4970880192.168.2.585.192.63.204
                Feb 10, 2023 02:11:35.341638088 CET804970885.192.63.204192.168.2.5
                Feb 10, 2023 02:11:36.020828962 CET4970880192.168.2.585.192.63.204
                Feb 10, 2023 02:11:36.045205116 CET804970885.192.63.204192.168.2.5
                Feb 10, 2023 02:11:36.125471115 CET4970980192.168.2.5185.229.65.197
                Feb 10, 2023 02:11:36.155198097 CET8049709185.229.65.197192.168.2.5
                Feb 10, 2023 02:11:36.155390024 CET4970980192.168.2.5185.229.65.197
                Feb 10, 2023 02:11:36.156999111 CET4970980192.168.2.5185.229.65.197
                Feb 10, 2023 02:11:36.186553001 CET8049709185.229.65.197192.168.2.5
                Feb 10, 2023 02:11:39.208144903 CET8049709185.229.65.197192.168.2.5
                • 185.229.65.197
                Session IDSource IPSource PortDestination IPDestination PortProcess
                0192.168.2.549706185.229.65.19780C:\Windows\SysWOW64\rundll32.exe
                TimestampkBytes transferredDirectionData
                Feb 10, 2023 02:11:22.212801933 CET93OUTPOST / HTTP/1.1
                Accept: */*
                Content-Type: application/x-www-form-urlencoded; charset=utf-8
                User-Agent: 23591
                Host: 185.229.65.197
                Content-Length: 95
                Connection: Keep-Alive
                Cache-Control: no-cache
                Data Raw: 6d 61 63 68 69 6e 65 49 64 3d 64 30 36 65 64 36 33 35 2d 36 38 66 36 2d 34 65 39 61 2d 39 35 35 63 2d 34 38 39 39 66 35 66 35 37 62 39 61 7c 61 6c 66 6f 6e 73 26 63 6f 6e 66 69 67 49 64 3d 65 35 30 31 66 64 63 37 38 66 66 33 65 64 62 62 39 66 37 32 30 65 31 37 36 36 65 31 34 64 65 64
                Data Ascii: machineId=d06ed635-68f6-4e9a-955c-4899f5f57b9a|user&configId=e501fdc78ff3edbb9f720e1766e14ded


                Session IDSource IPSource PortDestination IPDestination PortProcess
                1192.168.2.549707185.229.65.19780C:\Windows\SysWOW64\rundll32.exe
                TimestampkBytes transferredDirectionData
                Feb 10, 2023 02:11:23.339158058 CET94OUTPOST / HTTP/1.1
                Accept: */*
                Content-Type: application/x-www-form-urlencoded; charset=utf-8
                User-Agent: 23591
                Host: 185.229.65.197
                Content-Length: 95
                Connection: Keep-Alive
                Cache-Control: no-cache
                Data Raw: 6d 61 63 68 69 6e 65 49 64 3d 64 30 36 65 64 36 33 35 2d 36 38 66 36 2d 34 65 39 61 2d 39 35 35 63 2d 34 38 39 39 66 35 66 35 37 62 39 61 7c 61 6c 66 6f 6e 73 26 63 6f 6e 66 69 67 49 64 3d 65 35 30 31 66 64 63 37 38 66 66 33 65 64 62 62 39 66 37 32 30 65 31 37 36 36 65 31 34 64 65 64
                Data Ascii: machineId=d06ed635-68f6-4e9a-955c-4899f5f57b9a|user&configId=e501fdc78ff3edbb9f720e1766e14ded


                Session IDSource IPSource PortDestination IPDestination PortProcess
                2192.168.2.549709185.229.65.19780C:\Windows\SysWOW64\rundll32.exe
                TimestampkBytes transferredDirectionData
                Feb 10, 2023 02:11:36.156999111 CET95OUTPOST / HTTP/1.1
                Accept: */*
                Content-Type: application/x-www-form-urlencoded; charset=utf-8
                User-Agent: 23591
                Host: 185.229.65.197
                Content-Length: 95
                Connection: Keep-Alive
                Cache-Control: no-cache
                Data Raw: 6d 61 63 68 69 6e 65 49 64 3d 64 30 36 65 64 36 33 35 2d 36 38 66 36 2d 34 65 39 61 2d 39 35 35 63 2d 34 38 39 39 66 35 66 35 37 62 39 61 7c 61 6c 66 6f 6e 73 26 63 6f 6e 66 69 67 49 64 3d 65 35 30 31 66 64 63 37 38 66 66 33 65 64 62 62 39 66 37 32 30 65 31 37 36 36 65 31 34 64 65 64
                Data Ascii: machineId=d06ed635-68f6-4e9a-955c-4899f5f57b9a|user&configId=e501fdc78ff3edbb9f720e1766e14ded


                Click to jump to process

                Click to jump to process

                Click to dive into process behavior distribution

                Click to jump to process

                Target ID:0
                Start time:02:11:29
                Start date:10/02/2023
                Path:C:\Windows\System32\loaddll32.exe
                Wow64 process (32bit):true
                Commandline:loaddll32.exe "C:\Users\user\Desktop\B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll"
                Imagebase:0x9c0000
                File size:116736 bytes
                MD5 hash:1F562FBF37040EC6C43C8D5EF619EA39
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                Target ID:1
                Start time:02:11:29
                Start date:10/02/2023
                Path:C:\Windows\System32\conhost.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Imagebase:0x7ff7fcd70000
                File size:625664 bytes
                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                Target ID:2
                Start time:02:11:29
                Start date:10/02/2023
                Path:C:\Windows\SysWOW64\cmd.exe
                Wow64 process (32bit):true
                Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll",#1
                Imagebase:0x11d0000
                File size:232960 bytes
                MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                Target ID:3
                Start time:02:11:29
                Start date:10/02/2023
                Path:C:\Windows\SysWOW64\rundll32.exe
                Wow64 process (32bit):true
                Commandline:rundll32.exe C:\Users\user\Desktop\B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll,_Start@16
                Imagebase:0x1320000
                File size:61952 bytes
                MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: JoeSecurity_RaccoonV2, Description: Yara detected Raccoon Stealer v2, Source: 00000003.00000003.327728754.0000000000CEF000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_RaccoonV2, Description: Yara detected Raccoon Stealer v2, Source: 00000003.00000003.327774570.0000000000CEF000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                Reputation:high

                Target ID:4
                Start time:02:11:29
                Start date:10/02/2023
                Path:C:\Windows\SysWOW64\rundll32.exe
                Wow64 process (32bit):true
                Commandline:rundll32.exe "C:\Users\user\Desktop\B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll",#1
                Imagebase:0x1320000
                File size:61952 bytes
                MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: JoeSecurity_RaccoonV2, Description: Yara detected Raccoon Stealer v2, Source: 00000004.00000003.330132238.0000000000E0C000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                Reputation:high

                Target ID:5
                Start time:02:11:39
                Start date:10/02/2023
                Path:C:\Windows\SysWOW64\rundll32.exe
                Wow64 process (32bit):true
                Commandline:rundll32.exe "C:\Users\user\Desktop\B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll",_Start@16
                Imagebase:0x1320000
                File size:61952 bytes
                MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: JoeSecurity_RaccoonV2, Description: Yara detected Raccoon Stealer v2, Source: 00000005.00000003.357649094.0000000000A8D000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_RaccoonV2, Description: Yara detected Raccoon Stealer v2, Source: 00000005.00000002.357921992.0000000000A8D000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_RaccoonV2, Description: Yara detected Raccoon Stealer v2, Source: 00000005.00000003.357557134.0000000000A8D000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                Reputation:high

                Reset < >
                  Memory Dump Source
                  • Source File: 00000003.00000003.306405934.0000000000EA0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00EA0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_3_ea0000_rundll32.4.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 2a82e4aac051ac6dab528b1b517456124b6d7f4abfab23a8fb5d2ec8b1ce39dc
                  • Instruction ID: f456e554e07533e9bfa4dc74e00b3bfee4267ca4c02d8d00a2c7ece64ad07d84
                  • Opcode Fuzzy Hash: 2a82e4aac051ac6dab528b1b517456124b6d7f4abfab23a8fb5d2ec8b1ce39dc
                  • Instruction Fuzzy Hash: 10D0129D38C306CFC60C1A9880A03FAD430A74F362E30B2EF97077C0489570B081768B
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000003.00000003.306405934.0000000000EA0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00EA0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_3_ea0000_rundll32.4.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: f0989d09ed0d40600147958f378423f711c4ef03e0f64d80e2d8041fbbfb60bd
                  • Instruction ID: f6e162a2b504a77907e7d4682db1edcd14aa6c796f5236edd50abf5f50881f9d
                  • Opcode Fuzzy Hash: f0989d09ed0d40600147958f378423f711c4ef03e0f64d80e2d8041fbbfb60bd
                  • Instruction Fuzzy Hash: 37C04C5D38C312CFD64D155981243FED470974F311E7076BE8B477C4094575B451769A
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000003.00000003.308897211.0000000001290000.00000040.00001000.00020000.00000000.sdmp, Offset: 01290000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_3_1290000_rundll32.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: cc32c87d8adde49304d2b8832e8dd11d53f574596cd68480948eb2cc8b9a2dda
                  • Instruction ID: 81cc3b7c6cba4608708dfd8278637efd5309fc6bd0647d727a3275c9fbc8a828
                  • Opcode Fuzzy Hash: cc32c87d8adde49304d2b8832e8dd11d53f574596cd68480948eb2cc8b9a2dda
                  • Instruction Fuzzy Hash:
                  Uniqueness

                  Uniqueness Score: -1.00%