Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Win32.MalwareX-gen.16263.14680.dll

Overview

General Information

Sample name:SecuriteInfo.com.Win32.MalwareX-gen.16263.14680.dll
Analysis ID:1521529
MD5:b81f570f1838104fd1065617c59ebf48
SHA1:25d64e34c0f05107cd538a929c58660dac0ce0b1
SHA256:0ba5cf206550afd14978ff0fa783bd567b8fda75ffcec65dcf0b1ea71f3d13c6
Tags:dll
Infos:

Detection

Score:64
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Machine Learning detection for sample
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Enables debug privileges
May sleep (evasive loops) to hinder dynamic analysis
Sample execution stops while process was sleeping (likely an evasion)
Uses 32bit PE files

Classification

  • System is w10x64
  • loaddll32.exe (PID: 4696 cmdline: loaddll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.16263.14680.dll" MD5: 51E6071F9CBA48E79F10C84515AAE618)
    • conhost.exe (PID: 6388 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 7056 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.16263.14680.dll",#1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • rundll32.exe (PID: 3604 cmdline: rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.16263.14680.dll",#1 MD5: 889B99C52A60DD49227C5E485A016679)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: SecuriteInfo.com.Win32.MalwareX-gen.16263.14680.dllAvira: detected
Source: SecuriteInfo.com.Win32.MalwareX-gen.16263.14680.dllReversingLabs: Detection: 50%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
Source: SecuriteInfo.com.Win32.MalwareX-gen.16263.14680.dllJoe Sandbox ML: detected
Source: SecuriteInfo.com.Win32.MalwareX-gen.16263.14680.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, DLL, BYTES_REVERSED_HI
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: time.windows.com
Source: global trafficDNS traffic detected: DNS query: ds1.mentality-us.com
Source: SecuriteInfo.com.Win32.MalwareX-gen.16263.14680.dllString found in binary or memory: http://ds1.mentality-us.com/ld/HiQueen/v1/down.bmp
Source: SecuriteInfo.com.Win32.MalwareX-gen.16263.14680.dllString found in binary or memory: http://ds1.mentality-us.com/ld/HiQueen/v1/getnews.php?s=
Source: rundll32.exe, 00000006.00000003.1406864693.0000000002E50000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://ds1.mentality-us.com/ld/HiQueen/v1/index.
Source: rundll32.exe, 00000006.00000003.1406864693.0000000002E50000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1406952150.0000000002DA3000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000002.1407328351.0000000002DA3000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.16263.14680.dllString found in binary or memory: http://ds1.mentality-us.com/ld/HiQueen/v1/index.jpg
Source: rundll32.exe, 00000006.00000002.1407328351.0000000002DD0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1406952150.0000000002DD0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ds1.mentality-us.com/ld/HiQueen/v1/index.jpgficmanager.nety
Source: rundll32.exe, 00000006.00000003.1406952150.0000000002DA3000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000002.1407328351.0000000002DA3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ds1.mentality-us.com/ld/HiQueen/v1/index.jpgrX
Source: SecuriteInfo.com.Win32.MalwareX-gen.16263.14680.dllString found in binary or memory: http://ds1.mentality-us.com/ld/HiQueen/v1/news.jpg
Source: rundll32.exe, 00000006.00000003.1406864693.0000000002E50000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.rsac.org/ratingsv01.html
Source: C:\Windows\System32\loaddll32.exeFile created: C:\Windows\Prairie Wind.bmp.bakJump to behavior
Source: SecuriteInfo.com.Win32.MalwareX-gen.16263.14680.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, DLL, BYTES_REVERSED_HI
Source: classification engineClassification label: mal64.winDLL@6/1@2/0
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6388:120:WilError_03
Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.16263.14680.dll",#1
Source: SecuriteInfo.com.Win32.MalwareX-gen.16263.14680.dllReversingLabs: Detection: 50%
Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.16263.14680.dll"
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.16263.14680.dll",#1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.16263.14680.dll",#1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.16263.14680.dll",#1Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.16263.14680.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: wsock32.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: wininet.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: avicap32.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: msvfw32.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: winmm.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: winmm.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe TID: 7176Thread sleep time: -60000s >= -30000sJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe TID: 7176Thread sleep time: -60000s >= -30000sJump to behavior
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 120000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeThread delayed: delay time: 60000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeThread delayed: delay time: 60000Jump to behavior
Source: rundll32.exe, 00000006.00000002.1407328351.0000000002DD0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1406952150.0000000002DD0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000002.1407271724.0000000002D5A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: C:\Windows\System32\loaddll32.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.16263.14680.dll",#1Jump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
11
Process Injection
1
Masquerading
OS Credential Dumping1
Security Software Discovery
Remote ServicesData from Local System1
Non-Application Layer Protocol
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Rundll32
LSASS Memory11
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable Media1
Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
Virtualization/Sandbox Evasion
Security Account Manager1
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
Process Injection
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
DLL Side-Loading
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1521529 Sample: SecuriteInfo.com.Win32.Malw... Startdate: 28/09/2024 Architecture: WINDOWS Score: 64 16 time.windows.com 2->16 18 ds1.mentality-us.com 2->18 20 Antivirus / Scanner detection for submitted sample 2->20 22 Multi AV Scanner detection for submitted file 2->22 24 Machine Learning detection for sample 2->24 26 AI detected suspicious sample 2->26 8 loaddll32.exe 2 2->8         started        signatures3 process4 process5 10 cmd.exe 1 8->10         started        12 conhost.exe 8->12         started        process6 14 rundll32.exe 6 10->14         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.Win32.MalwareX-gen.16263.14680.dll50%ReversingLabsWin32.Trojan.Doina
SecuriteInfo.com.Win32.MalwareX-gen.16263.14680.dll100%AviraBDS/Backdoor.Gen
SecuriteInfo.com.Win32.MalwareX-gen.16263.14680.dll100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
ds1.mentality-us.com
unknown
unknownfalse
    unknown
    time.windows.com
    unknown
    unknownfalse
      unknown
      NameSourceMaliciousAntivirus DetectionReputation
      http://ds1.mentality-us.com/ld/HiQueen/v1/down.bmpSecuriteInfo.com.Win32.MalwareX-gen.16263.14680.dllfalse
        unknown
        http://ds1.mentality-us.com/ld/HiQueen/v1/index.rundll32.exe, 00000006.00000003.1406864693.0000000002E50000.00000004.00001000.00020000.00000000.sdmpfalse
          unknown
          http://ds1.mentality-us.com/ld/HiQueen/v1/index.jpgrundll32.exe, 00000006.00000003.1406864693.0000000002E50000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1406952150.0000000002DA3000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000002.1407328351.0000000002DA3000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.16263.14680.dllfalse
            unknown
            http://ds1.mentality-us.com/ld/HiQueen/v1/getnews.php?s=SecuriteInfo.com.Win32.MalwareX-gen.16263.14680.dllfalse
              unknown
              http://ds1.mentality-us.com/ld/HiQueen/v1/index.jpgficmanager.netyrundll32.exe, 00000006.00000002.1407328351.0000000002DD0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1406952150.0000000002DD0000.00000004.00000020.00020000.00000000.sdmpfalse
                unknown
                http://ds1.mentality-us.com/ld/HiQueen/v1/index.jpgrXrundll32.exe, 00000006.00000003.1406952150.0000000002DA3000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000002.1407328351.0000000002DA3000.00000004.00000020.00020000.00000000.sdmpfalse
                  unknown
                  http://ds1.mentality-us.com/ld/HiQueen/v1/news.jpgSecuriteInfo.com.Win32.MalwareX-gen.16263.14680.dllfalse
                    unknown
                    http://www.rsac.org/ratingsv01.htmlrundll32.exe, 00000006.00000003.1406864693.0000000002E50000.00000004.00001000.00020000.00000000.sdmpfalse
                      unknown
                      No contacted IP infos
                      Joe Sandbox version:41.0.0 Charoite
                      Analysis ID:1521529
                      Start date and time:2024-09-28 22:24:13 +02:00
                      Joe Sandbox product:CloudBasic
                      Overall analysis duration:0h 4m 9s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                      Number of analysed new started processes analysed:13
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Sample name:SecuriteInfo.com.Win32.MalwareX-gen.16263.14680.dll
                      Detection:MAL
                      Classification:mal64.winDLL@6/1@2/0
                      EGA Information:Failed
                      HCA Information:
                      • Successful, ratio: 100%
                      • Number of executed functions: 0
                      • Number of non-executed functions: 0
                      Cookbook Comments:
                      • Found application associated with file extension: .dll
                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                      • Excluded IPs from analysis (whitelisted): 13.95.65.251, 20.109.209.108, 52.152.180.154, 40.78.107.251
                      • Excluded domains from analysis (whitelisted): redir.update.msft.com.trafficmanager.net, fe2.update.microsoft.com, fe2.update.msft.com.trafficmanager.net, slscr.update.microsoft.com, update.microsoft.com, www.update.microsoft.com, twc.trafficmanager.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                      • Not all processes where analyzed, report is missing behavior information
                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                      • Report size getting too big, too many NtQueryValueKey calls found.
                      • VT rate limit hit for: SecuriteInfo.com.Win32.MalwareX-gen.16263.14680.dll
                      TimeTypeDescription
                      16:25:21API Interceptor1x Sleep call for process: loaddll32.exe modified
                      16:25:25API Interceptor6x Sleep call for process: rundll32.exe modified
                      No context
                      No context
                      No context
                      No context
                      No context
                      Process:C:\Windows\System32\loaddll32.exe
                      File Type:ASCII text, with no line terminators
                      Category:dropped
                      Size (bytes):33
                      Entropy (8bit):3.6381404237049173
                      Encrypted:false
                      SSDEEP:3:KmjRJxsfCXyG:KURTsfUyG
                      MD5:AEFA525D3307FEE943F75BF4498C7F70
                      SHA1:A4FA7B1AA93A2E9B16316CAA30E202D721B28A8D
                      SHA-256:B7FE78BCB3277EAE25B092EDDBBA7DA27CBC1FB1EC19C6BF1BB95D00A58A9764
                      SHA-512:DC113C5AFCE6AD8BA86E1BA87ED6EBB948648F25B2E63D14B27F0EBA768BA804760B6181D43414FD1BDE81C88CF0EF19C7149160FAECDB59F5528C83251ACB83
                      Malicious:false
                      Reputation:low
                      Preview:#@#ECF4BB82F7E2024928162521152#@#
                      File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                      Entropy (8bit):6.569920995733564
                      TrID:
                      • Win32 Dynamic Link Library (generic) (1002004/3) 99.40%
                      • Win16/32 Executable Delphi generic (2074/23) 0.21%
                      • Generic Win/DOS Executable (2004/3) 0.20%
                      • DOS Executable Generic (2002/1) 0.20%
                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                      File name:SecuriteInfo.com.Win32.MalwareX-gen.16263.14680.dll
                      File size:137'728 bytes
                      MD5:b81f570f1838104fd1065617c59ebf48
                      SHA1:25d64e34c0f05107cd538a929c58660dac0ce0b1
                      SHA256:0ba5cf206550afd14978ff0fa783bd567b8fda75ffcec65dcf0b1ea71f3d13c6
                      SHA512:2464f0d3cdb3fafb854e26ae41b054ef61b35df3309a650c18f8140e7d50254729636c0742f933c30aaf2f5aceae34776563d141ca71168c66d358af2c8f1899
                      SSDEEP:3072:iiS/DJksL7vkm5IuckdMZO/IdMOnbuE1TBfu8eA99l72eOA:4tplIqM9KGTBG8eA9f72e
                      TLSH:CED37F23A5804873D0B10BB89CDEE2A5F53A7E302F29551F71D50E4AAC7B3C56A692C7
                      File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
                      Icon Hash:7ae282899bbab082
                      Entrypoint:0x41a9a4
                      Entrypoint Section:CODE
                      Digitally signed:false
                      Imagebase:0x400000
                      Subsystem:windows gui
                      Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, DLL, BYTES_REVERSED_HI
                      DLL Characteristics:
                      Time Stamp:0x2A425E19 [Fri Jun 19 22:22:17 1992 UTC]
                      TLS Callbacks:
                      CLR (.Net) Version:
                      OS Version Major:4
                      OS Version Minor:0
                      File Version Major:4
                      File Version Minor:0
                      Subsystem Version Major:4
                      Subsystem Version Minor:0
                      Import Hash:20f5680bdd8b86750877c4d74d2be0a1
                      Instruction
                      push ebp
                      mov ebp, esp
                      add esp, FFFFFFB8h
                      xor eax, eax
                      mov dword ptr [ebp-44h], eax
                      mov dword ptr [ebp-48h], eax
                      mov dword ptr [ebp-40h], eax
                      mov eax, 0041A8F4h
                      call 00007FEE353838B6h
                      xor eax, eax
                      push ebp
                      push 0041AA59h
                      push dword ptr fs:[eax]
                      mov dword ptr fs:[eax], esp
                      call 00007FEE353920A7h
                      lea edx, dword ptr [ebp-40h]
                      mov eax, 0041AA70h
                      call 00007FEE35399012h
                      mov edx, dword ptr [ebp-40h]
                      mov eax, 00420A74h
                      call 00007FEE353821F5h
                      mov eax, dword ptr [00420A74h]
                      call 00007FEE35382633h
                      mov dword ptr [0041EFBCh], eax
                      lea eax, dword ptr [ebp-48h]
                      mov edx, dword ptr [0041EFBCh]
                      call 00007FEE3538237Ch
                      mov eax, dword ptr [ebp-48h]
                      lea edx, dword ptr [ebp-44h]
                      call 00007FEE35390F31h
                      mov eax, dword ptr [ebp-44h]
                      call 00007FEE3538260Dh
                      mov dword ptr [0041EFC0h], eax
                      push 00420A98h
                      push 00000004h
                      push 00000000h
                      push 0041A458h
                      push 00000000h
                      push 00000000h
                      call 00007FEE3538399Dh
                      push eax
                      call 00007FEE35383B1Fh
                      xor eax, eax
                      pop edx
                      pop ecx
                      pop ecx
                      mov dword ptr fs:[eax], edx
                      push 0041AA60h
                      lea eax, dword ptr [ebp-48h]
                      mov edx, 00000003h
                      call 00007FEE35382159h
                      ret
                      jmp 00007FEE35381A53h
                      jmp 00007FEE3539935Dh
                      call 00007FEE35381FBCh
                      add byte ptr [eax], al
                      add bh, bh
                      NameVirtual AddressVirtual Size Is in Section
                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IMPORT0x210000x11fa.idata
                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x250000xe00.rsrc
                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x230000x1668.reloc
                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                      CODE0x10000x19a880x19c001082a1948ba1e10546513ee3b01ba14aFalse0.5070160800970874data6.42134474225694IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      DATA0x1b0000x413c0x42000e6df0bbe328740c1f469e1307785856False0.6950757575757576Matlab v4 mat-file (little endian) , numeric, rows 0, columns 42304026.709456936931936IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      BSS0x200000xa9d0x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .idata0x210000x11fa0x12006d9b3b4096dfa09c52e863c425e79230False0.3934461805555556data4.8859426270594115IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .reloc0x230000x16680x1800c2e7009590126d67a7fc27949618eaa2False0.7373046875data6.441180866006826IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                      .rsrc0x250000xe000xe00660c04b7078a3a4c9e1891ac3204999bFalse0.37109375data3.6568226422436867IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                      NameRVASizeTypeLanguageCountryZLIB Complexity
                      RT_STRING0x251e80x40data0.546875
                      RT_STRING0x252280xf4data0.47540983606557374
                      RT_STRING0x2531c0xc4data0.5663265306122449
                      RT_STRING0x253e00x2c8data0.44241573033707865
                      RT_STRING0x256a80x37cdata0.4080717488789238
                      RT_STRING0x25a240x2a0data0.4017857142857143
                      RT_RCDATA0x25cc40x10data1.5
                      RT_RCDATA0x25cd40x110data0.8125
                      DLLImport
                      kernel32.dllDeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, InitializeCriticalSection, VirtualFree, VirtualAlloc, LocalFree, LocalAlloc, GetVersion, GetCurrentThreadId, WideCharToMultiByte, MultiByteToWideChar, lstrlenA, lstrcpynA, LoadLibraryExA, GetThreadLocale, GetStartupInfoA, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetCommandLineA, FreeLibrary, FindFirstFileA, FindClose, ExitProcess, CreateThread, WriteFile, UnhandledExceptionFilter, RtlUnwind, RaiseException, GetStdHandle
                      user32.dllGetKeyboardType, LoadStringA, MessageBoxA, CharNextA
                      advapi32.dllRegQueryValueExA, RegOpenKeyExA, RegCloseKey
                      oleaut32.dllSysFreeString, SysReAllocStringLen, SysAllocStringLen
                      kernel32.dllTlsSetValue, TlsGetValue, TlsFree, TlsAlloc, LocalFree, LocalAlloc
                      advapi32.dllRegSetValueExA, RegQueryValueExA, RegQueryInfoKeyA, RegOpenKeyExA, RegFlushKey, RegEnumValueA, RegEnumKeyExA, RegDeleteValueA, RegDeleteKeyA, RegCreateKeyExA, RegCloseKey, OpenProcessToken, LookupPrivilegeValueA, GetUserNameA, AdjustTokenPrivileges
                      kernel32.dlllstrcmpiA, WriteProcessMemory, WriteFile, WinExec, VirtualQuery, TerminateProcess, SetThreadPriority, SetPriorityClass, SetLastError, SetFilePointer, ResumeThread, ReadProcessMemory, ReadFile, PeekNamedPipe, OpenProcess, MoveFileA, LoadLibraryA, LeaveCriticalSection, InitializeCriticalSection, GlobalUnlock, GlobalReAlloc, GlobalMemoryStatus, GlobalHandle, GlobalLock, GlobalFree, GlobalAlloc, GetWindowsDirectoryA, GetVersionExA, GetThreadPriority, GetThreadLocale, GetStringTypeExA, GetStdHandle, GetStartupInfoA, GetProcAddress, GetPriorityClass, GetModuleHandleA, GetModuleFileNameA, GetLogicalDriveStringsA, GetLocaleInfoA, GetLocalTime, GetLastError, GetExitCodeThread, GetEnvironmentVariableA, GetDriveTypeA, GetDiskFreeSpaceA, GetCurrentThread, GetCurrentProcess, GetComputerNameA, GetCPInfo, GetACP, FormatMessageA, FindNextFileA, FindFirstFileA, FindClose, ExitThread, EnumCalendarInfoA, EnterCriticalSection, DeleteFileA, DeleteCriticalSection, CreateThread, CreateProcessA, CreatePipe, CreateFileA, CreateDirectoryA, CompareStringA, CloseHandle
                      gdi32.dllGetObjectA, GetDIBits, DeleteObject
                      user32.dllSendMessageA, ReleaseDC, OpenClipboard, MessageBoxA, LoadStringA, IsWindowVisible, GetWindowThreadProcessId, GetWindowTextA, GetWindowRect, GetSystemMetrics, GetDesktopWindow, GetDC, GetClipboardData, GetClassNameA, EnumWindows, EnumChildWindows, CloseClipboard, CharNextA, CharToOemA
                      wsock32.dllWSACleanup, WSAStartup, WSAGetLastError, gethostbyname, socket, send, recv, ntohs, ioctlsocket, inet_ntoa, inet_addr, htons, getsockname, getpeername, connect, closesocket
                      WS2_32.DLLinet_addr, ioctlsocket
                      wininet.dllInternetSetOptionA, InternetReadFile, InternetQueryOptionA, InternetOpenUrlA, InternetOpenA, InternetConnectA, InternetCloseHandle, HttpSendRequestA, HttpOpenRequestA, HttpAddRequestHeadersA
                      advapi32.dllStartServiceA, OpenServiceA, OpenSCManagerA, EnumServicesStatusA, DeleteService, CreateServiceA, ControlService, CloseServiceHandle
                      kernel32.dllSleep
                      iphlpapi.dllGetAdaptersInfo
                      avicap32.dllcapCreateCaptureWindowA
                      TimestampSource PortDest PortSource IPDest IP
                      Sep 28, 2024 22:25:17.317604065 CEST5487953192.168.2.71.1.1.1
                      Sep 28, 2024 22:25:25.784996033 CEST5038153192.168.2.71.1.1.1
                      Sep 28, 2024 22:25:25.944509029 CEST53503811.1.1.1192.168.2.7
                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                      Sep 28, 2024 22:25:17.317604065 CEST192.168.2.71.1.1.10xe688Standard query (0)time.windows.comA (IP address)IN (0x0001)false
                      Sep 28, 2024 22:25:25.784996033 CEST192.168.2.71.1.1.10xdf4bStandard query (0)ds1.mentality-us.comA (IP address)IN (0x0001)false
                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                      Sep 28, 2024 22:25:17.324793100 CEST1.1.1.1192.168.2.70xe688No error (0)time.windows.comtwc.trafficmanager.netCNAME (Canonical name)IN (0x0001)false
                      Sep 28, 2024 22:25:25.944509029 CEST1.1.1.1192.168.2.70xdf4bName error (3)ds1.mentality-us.comnonenoneA (IP address)IN (0x0001)false

                      Click to jump to process

                      Click to jump to process

                      Click to dive into process behavior distribution

                      Click to jump to process

                      Target ID:2
                      Start time:16:25:20
                      Start date:28/09/2024
                      Path:C:\Windows\System32\loaddll32.exe
                      Wow64 process (32bit):true
                      Commandline:loaddll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.16263.14680.dll"
                      Imagebase:0xc0000
                      File size:126'464 bytes
                      MD5 hash:51E6071F9CBA48E79F10C84515AAE618
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:Borland Delphi
                      Reputation:high
                      Has exited:true

                      Target ID:3
                      Start time:16:25:21
                      Start date:28/09/2024
                      Path:C:\Windows\System32\conhost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Imagebase:0x7ff75da10000
                      File size:862'208 bytes
                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:5
                      Start time:16:25:21
                      Start date:28/09/2024
                      Path:C:\Windows\SysWOW64\cmd.exe
                      Wow64 process (32bit):true
                      Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.16263.14680.dll",#1
                      Imagebase:0x410000
                      File size:236'544 bytes
                      MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:6
                      Start time:16:25:21
                      Start date:28/09/2024
                      Path:C:\Windows\SysWOW64\rundll32.exe
                      Wow64 process (32bit):true
                      Commandline:rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.16263.14680.dll",#1
                      Imagebase:0xa20000
                      File size:61'440 bytes
                      MD5 hash:889B99C52A60DD49227C5E485A016679
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:Borland Delphi
                      Reputation:high
                      Has exited:true

                      No disassembly