Windows Analysis Report
SecuriteInfo.com.Trojan.Win64.Krypt.28688.30024.dll

Overview

General Information

Sample name: SecuriteInfo.com.Trojan.Win64.Krypt.28688.30024.dll
(renamed file extension from exe to dll)
Original sample name: SecuriteInfo.com.Trojan.Win64.Krypt.28688.30024.exe
Analysis ID: 1521677
MD5: dc5709ae9abe79e00d356e69850d5a3a
SHA1: 1ce2d789ef15bbe20ede994924705bdfd19bb9c9
SHA256: 06ec5696ffbdc17ef86c2aabd3773e170bf56838c3094adbf880d36567a64915
Tags: exe
Infos:

Detection

Score: 52
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Multi AV Scanner detection for submitted file
AI detected suspicious sample
Checks if the current process is being debugged
Creates a process in suspended mode (likely to inject code)
PE file contains sections with non-standard names
Program does not show much activity (idle)
Sample execution stops while process was sleeping (likely an evasion)

Classification

AV Detection

barindex
Source: SecuriteInfo.com.Trojan.Win64.Krypt.28688.30024.dll ReversingLabs: Detection: 21%
Source: SecuriteInfo.com.Trojan.Win64.Krypt.28688.30024.dll Virustotal: Detection: 41% Perma Link
Source: Submited Sample Integrated Neural Analysis Model: Matched 84.7% probability
Source: SecuriteInfo.com.Trojan.Win64.Krypt.28688.30024.dll Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
Source: Binary string: C:\Users\furkola\Downloads\jar load\jar load\x64\Debug\undergroundjl.pdb)) source: SecuriteInfo.com.Trojan.Win64.Krypt.28688.30024.dll
Source: Binary string: C:\Users\furkola\Downloads\jar load\jar load\x64\Debug\undergroundjl.pdb source: SecuriteInfo.com.Trojan.Win64.Krypt.28688.30024.dll
Source: classification engine Classification label: mal52.winDLL@6/0@0/0
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3428:120:WilError_03
Source: C:\Windows\System32\loaddll64.exe Key opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win64.Krypt.28688.30024.dll",#1
Source: SecuriteInfo.com.Trojan.Win64.Krypt.28688.30024.dll ReversingLabs: Detection: 21%
Source: SecuriteInfo.com.Trojan.Win64.Krypt.28688.30024.dll Virustotal: Detection: 41%
Source: unknown Process created: C:\Windows\System32\loaddll64.exe loaddll64.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win64.Krypt.28688.30024.dll"
Source: C:\Windows\System32\loaddll64.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\loaddll64.exe Process created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win64.Krypt.28688.30024.dll",#1
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win64.Krypt.28688.30024.dll",#1
Source: C:\Windows\System32\loaddll64.exe Process created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win64.Krypt.28688.30024.dll",#1 Jump to behavior
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win64.Krypt.28688.30024.dll",#1 Jump to behavior
Source: C:\Windows\System32\loaddll64.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Windows\System32\loaddll64.exe Section loaded: msvcp140d.dll Jump to behavior
Source: C:\Windows\System32\loaddll64.exe Section loaded: dbghelp.dll Jump to behavior
Source: C:\Windows\System32\loaddll64.exe Section loaded: vcruntime140d.dll Jump to behavior
Source: C:\Windows\System32\loaddll64.exe Section loaded: vcruntime140_1d.dll Jump to behavior
Source: C:\Windows\System32\loaddll64.exe Section loaded: ucrtbased.dll Jump to behavior
Source: SecuriteInfo.com.Trojan.Win64.Krypt.28688.30024.dll Static PE information: Image base 0x180000000 > 0x60000000
Source: SecuriteInfo.com.Trojan.Win64.Krypt.28688.30024.dll Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: SecuriteInfo.com.Trojan.Win64.Krypt.28688.30024.dll Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: SecuriteInfo.com.Trojan.Win64.Krypt.28688.30024.dll Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: SecuriteInfo.com.Trojan.Win64.Krypt.28688.30024.dll Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: SecuriteInfo.com.Trojan.Win64.Krypt.28688.30024.dll Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: SecuriteInfo.com.Trojan.Win64.Krypt.28688.30024.dll Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: SecuriteInfo.com.Trojan.Win64.Krypt.28688.30024.dll Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
Source: SecuriteInfo.com.Trojan.Win64.Krypt.28688.30024.dll Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: C:\Users\furkola\Downloads\jar load\jar load\x64\Debug\undergroundjl.pdb)) source: SecuriteInfo.com.Trojan.Win64.Krypt.28688.30024.dll
Source: Binary string: C:\Users\furkola\Downloads\jar load\jar load\x64\Debug\undergroundjl.pdb source: SecuriteInfo.com.Trojan.Win64.Krypt.28688.30024.dll
Source: SecuriteInfo.com.Trojan.Win64.Krypt.28688.30024.dll Static PE information: section name: .textbss
Source: SecuriteInfo.com.Trojan.Win64.Krypt.28688.30024.dll Static PE information: section name: .msvcjmc
Source: SecuriteInfo.com.Trojan.Win64.Krypt.28688.30024.dll Static PE information: section name: .00cfg
Source: C:\Windows\System32\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: all processes Thread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: C:\Windows\System32\loaddll64.exe Process queried: DebugPort Jump to behavior
Source: all processes Thread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win64.Krypt.28688.30024.dll",#1 Jump to behavior
No contacted IP infos