Windows Analysis Report
SecuriteInfo.com.Win32.MalwareX-gen.16263.14680.dll

Overview

General Information

Sample name: SecuriteInfo.com.Win32.MalwareX-gen.16263.14680.dll
Analysis ID: 1521529
MD5: b81f570f1838104fd1065617c59ebf48
SHA1: 25d64e34c0f05107cd538a929c58660dac0ce0b1
SHA256: 0ba5cf206550afd14978ff0fa783bd567b8fda75ffcec65dcf0b1ea71f3d13c6
Tags: dll
Infos:

Detection

Score: 64
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Machine Learning detection for sample
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Enables debug privileges
May sleep (evasive loops) to hinder dynamic analysis
Sample execution stops while process was sleeping (likely an evasion)
Uses 32bit PE files

Classification

AV Detection

barindex
Source: SecuriteInfo.com.Win32.MalwareX-gen.16263.14680.dll Avira: detected
Source: SecuriteInfo.com.Win32.MalwareX-gen.16263.14680.dll ReversingLabs: Detection: 50%
Source: Submited Sample Integrated Neural Analysis Model: Matched 100.0% probability
Source: SecuriteInfo.com.Win32.MalwareX-gen.16263.14680.dll Joe Sandbox ML: detected
Source: SecuriteInfo.com.Win32.MalwareX-gen.16263.14680.dll Static PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, DLL, BYTES_REVERSED_HI
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global traffic DNS traffic detected: DNS query: time.windows.com
Source: global traffic DNS traffic detected: DNS query: ds1.mentality-us.com
Source: SecuriteInfo.com.Win32.MalwareX-gen.16263.14680.dll String found in binary or memory: http://ds1.mentality-us.com/ld/HiQueen/v1/down.bmp
Source: SecuriteInfo.com.Win32.MalwareX-gen.16263.14680.dll String found in binary or memory: http://ds1.mentality-us.com/ld/HiQueen/v1/getnews.php?s=
Source: rundll32.exe, 00000006.00000003.1406864693.0000000002E50000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://ds1.mentality-us.com/ld/HiQueen/v1/index.
Source: rundll32.exe, 00000006.00000003.1406864693.0000000002E50000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1406952150.0000000002DA3000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000002.1407328351.0000000002DA3000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.16263.14680.dll String found in binary or memory: http://ds1.mentality-us.com/ld/HiQueen/v1/index.jpg
Source: rundll32.exe, 00000006.00000002.1407328351.0000000002DD0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1406952150.0000000002DD0000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://ds1.mentality-us.com/ld/HiQueen/v1/index.jpgficmanager.nety
Source: rundll32.exe, 00000006.00000003.1406952150.0000000002DA3000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000002.1407328351.0000000002DA3000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://ds1.mentality-us.com/ld/HiQueen/v1/index.jpgrX
Source: SecuriteInfo.com.Win32.MalwareX-gen.16263.14680.dll String found in binary or memory: http://ds1.mentality-us.com/ld/HiQueen/v1/news.jpg
Source: rundll32.exe, 00000006.00000003.1406864693.0000000002E50000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://www.rsac.org/ratingsv01.html
Source: C:\Windows\System32\loaddll32.exe File created: C:\Windows\Prairie Wind.bmp.bak Jump to behavior
Source: SecuriteInfo.com.Win32.MalwareX-gen.16263.14680.dll Static PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, DLL, BYTES_REVERSED_HI
Source: classification engine Classification label: mal64.winDLL@6/1@2/0
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6388:120:WilError_03
Source: C:\Windows\System32\loaddll32.exe Key opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Key opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales Jump to behavior
Source: C:\Windows\System32\loaddll32.exe Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.16263.14680.dll",#1
Source: SecuriteInfo.com.Win32.MalwareX-gen.16263.14680.dll ReversingLabs: Detection: 50%
Source: unknown Process created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.16263.14680.dll"
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.16263.14680.dll",#1
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.16263.14680.dll",#1
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.16263.14680.dll",#1 Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.16263.14680.dll",#1 Jump to behavior
Source: C:\Windows\System32\loaddll32.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Windows\System32\loaddll32.exe Section loaded: wsock32.dll Jump to behavior
Source: C:\Windows\System32\loaddll32.exe Section loaded: wininet.dll Jump to behavior
Source: C:\Windows\System32\loaddll32.exe Section loaded: iphlpapi.dll Jump to behavior
Source: C:\Windows\System32\loaddll32.exe Section loaded: avicap32.dll Jump to behavior
Source: C:\Windows\System32\loaddll32.exe Section loaded: msvfw32.dll Jump to behavior
Source: C:\Windows\System32\loaddll32.exe Section loaded: winmm.dll Jump to behavior
Source: C:\Windows\System32\loaddll32.exe Section loaded: winmm.dll Jump to behavior
Source: C:\Windows\System32\loaddll32.exe Section loaded: dhcpcsvc.dll Jump to behavior
Source: C:\Windows\System32\loaddll32.exe Section loaded: iertutil.dll Jump to behavior
Source: C:\Windows\System32\loaddll32.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Windows\System32\loaddll32.exe Section loaded: windows.storage.dll Jump to behavior
Source: C:\Windows\System32\loaddll32.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Windows\System32\loaddll32.exe Section loaded: profapi.dll Jump to behavior
Source: C:\Windows\System32\loaddll32.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Windows\System32\loaddll32.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32 Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe TID: 7176 Thread sleep time: -60000s >= -30000s Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe TID: 7176 Thread sleep time: -60000s >= -30000s Jump to behavior
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: C:\Windows\System32\loaddll32.exe Thread delayed: delay time: 120000 Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Thread delayed: delay time: 60000 Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Thread delayed: delay time: 60000 Jump to behavior
Source: rundll32.exe, 00000006.00000002.1407328351.0000000002DD0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1406952150.0000000002DD0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000002.1407271724.0000000002D5A000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW
Source: C:\Windows\System32\loaddll32.exe Process token adjusted: Debug Jump to behavior
Source: C:\Windows\System32\loaddll32.exe Process token adjusted: Debug Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.16263.14680.dll",#1 Jump to behavior
No contacted IP infos