Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
eNtYgxj1lX.dll

Overview

General Information

Sample name:eNtYgxj1lX.dll
(renamed file extension from exe to dll, renamed because original name is a hash value)
Original sample name:f5cc2afb777c4ecc05f78b5e3556a2b3e508bdb9ce4ff570da68c10a1c6785b5.exe
Analysis ID:1522598
MD5:149ebe286468f64c8ca0fb329d1aa5f3
SHA1:7b300b5956ada21b150926851bc297434fb1e59b
SHA256:f5cc2afb777c4ecc05f78b5e3556a2b3e508bdb9ce4ff570da68c10a1c6785b5
Tags:exeRavinAcademyuser-JAMESWT_MHT
Infos:

Detection

Score:64
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Found direct / indirect Syscall (likely to bypass EDR)
Found potential dummy code loops (likely to delay analysis)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
May sleep (evasive loops) to hinder dynamic analysis
Program does not show much activity (idle)
Sample execution stops while process was sleeping (likely an evasion)
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • loaddll64.exe (PID: 4892 cmdline: loaddll64.exe "C:\Users\user\Desktop\eNtYgxj1lX.dll" MD5: 763455F9DCB24DFEECC2B9D9F8D46D52)
    • conhost.exe (PID: 5996 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 4656 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\eNtYgxj1lX.dll",#1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • rundll32.exe (PID: 4684 cmdline: rundll32.exe "C:\Users\user\Desktop\eNtYgxj1lX.dll",#1 MD5: EF3179D498793BF4234F708D3BE28633)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
eNtYgxj1lX.dllWindows_Trojan_Donutloader_f40e3759unknownunknown
  • 0x2d3b:$x64: 06 B8 03 40 00 80 C3 4C 8B 49 10 49
eNtYgxj1lX.dllWindows_Trojan_Donutloader_5c38878dunknownunknown
  • 0x3492:$a: 24 48 03 C2 48 89 44 24 28 41 8A 00 84 C0 74 14 33 D2 FF C1
SourceRuleDescriptionAuthorStrings
00000000.00000002.3719303951.0000020FFA250000.00000004.10000000.00040000.00000000.sdmpWindows_Trojan_Donutloader_f40e3759unknownunknown
  • 0x293b:$x64: 06 B8 03 40 00 80 C3 4C 8B 49 10 49
00000000.00000002.3719303951.0000020FFA250000.00000004.10000000.00040000.00000000.sdmpWindows_Trojan_Donutloader_5c38878dunknownunknown
  • 0x3092:$a: 24 48 03 C2 48 89 44 24 28 41 8A 00 84 C0 74 14 33 D2 FF C1
00000004.00000002.3719759282.00007FFB226C1000.00000020.00000001.01000000.00000003.sdmpWindows_Trojan_Donutloader_f40e3759unknownunknown
  • 0x293b:$x64: 06 B8 03 40 00 80 C3 4C 8B 49 10 49
00000004.00000002.3719759282.00007FFB226C1000.00000020.00000001.01000000.00000003.sdmpWindows_Trojan_Donutloader_5c38878dunknownunknown
  • 0x3092:$a: 24 48 03 C2 48 89 44 24 28 41 8A 00 84 C0 74 14 33 D2 FF C1
00000000.00000002.3719632649.00007FFB226C1000.00000020.00000001.01000000.00000003.sdmpWindows_Trojan_Donutloader_f40e3759unknownunknown
  • 0x293b:$x64: 06 B8 03 40 00 80 C3 4C 8B 49 10 49
Click to see the 3 entries
SourceRuleDescriptionAuthorStrings
0.2.loaddll64.exe.7ffb226c0000.0.unpackWindows_Trojan_Donutloader_f40e3759unknownunknown
  • 0x2d3b:$x64: 06 B8 03 40 00 80 C3 4C 8B 49 10 49
0.2.loaddll64.exe.7ffb226c0000.0.unpackWindows_Trojan_Donutloader_5c38878dunknownunknown
  • 0x3492:$a: 24 48 03 C2 48 89 44 24 28 41 8A 00 84 C0 74 14 33 D2 FF C1
4.2.rundll32.exe.7ffb226c0000.0.unpackWindows_Trojan_Donutloader_f40e3759unknownunknown
  • 0x2d3b:$x64: 06 B8 03 40 00 80 C3 4C 8B 49 10 49
4.2.rundll32.exe.7ffb226c0000.0.unpackWindows_Trojan_Donutloader_5c38878dunknownunknown
  • 0x3492:$a: 24 48 03 C2 48 89 44 24 28 41 8A 00 84 C0 74 14 33 D2 FF C1
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: eNtYgxj1lX.dllReversingLabs: Detection: 28%
Source: eNtYgxj1lX.dllVirustotal: Detection: 45%Perma Link
Source: eNtYgxj1lX.dllStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
Source: Binary string: C:\Users\NEO\Desktop\RavinAcademy\RedTeam-01\08\03-ACG\x64\Release\EnableACG.pdb source: loaddll64.exe, 00000000.00000002.3719697980.00007FFB226C8000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.3719799949.00007FFB226C8000.00000002.00000001.01000000.00000003.sdmp, eNtYgxj1lX.dll

System Summary

barindex
Source: eNtYgxj1lX.dll, type: SAMPLEMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
Source: eNtYgxj1lX.dll, type: SAMPLEMatched rule: Windows_Trojan_Donutloader_5c38878d Author: unknown
Source: 0.2.loaddll64.exe.7ffb226c0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
Source: 0.2.loaddll64.exe.7ffb226c0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Donutloader_5c38878d Author: unknown
Source: 4.2.rundll32.exe.7ffb226c0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
Source: 4.2.rundll32.exe.7ffb226c0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Donutloader_5c38878d Author: unknown
Source: 00000000.00000002.3719303951.0000020FFA250000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
Source: 00000000.00000002.3719303951.0000020FFA250000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_5c38878d Author: unknown
Source: 00000004.00000002.3719759282.00007FFB226C1000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
Source: 00000004.00000002.3719759282.00007FFB226C1000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_5c38878d Author: unknown
Source: 00000000.00000002.3719632649.00007FFB226C1000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
Source: 00000000.00000002.3719632649.00007FFB226C1000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_5c38878d Author: unknown
Source: 00000004.00000002.3719520350.0000026F84150000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
Source: 00000004.00000002.3719520350.0000026F84150000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_5c38878d Author: unknown
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFB226C6860 NtCreateThreadEx,0_2_00007FFB226C6860
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFB226C6820 NtMapViewOfSection,0_2_00007FFB226C6820
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFB226C498F0_2_00007FFB226C498F
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFB226C3D670_2_00007FFB226C3D67
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFB226C51E70_2_00007FFB226C51E7
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFB226C4DAF0_2_00007FFB226C4DAF
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFB226C566F0_2_00007FFB226C566F
Source: eNtYgxj1lX.dll, type: SAMPLEMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
Source: eNtYgxj1lX.dll, type: SAMPLEMatched rule: Windows_Trojan_Donutloader_5c38878d os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 3b55ec6c37891880b53633b936d10f94d2b806db1723875e4ac95f8a34d97150, id = 5c38878d-ca94-4fd9-a36e-1ae5fe713ca2, last_modified = 2021-01-13
Source: 0.2.loaddll64.exe.7ffb226c0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
Source: 0.2.loaddll64.exe.7ffb226c0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Donutloader_5c38878d os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 3b55ec6c37891880b53633b936d10f94d2b806db1723875e4ac95f8a34d97150, id = 5c38878d-ca94-4fd9-a36e-1ae5fe713ca2, last_modified = 2021-01-13
Source: 4.2.rundll32.exe.7ffb226c0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
Source: 4.2.rundll32.exe.7ffb226c0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Donutloader_5c38878d os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 3b55ec6c37891880b53633b936d10f94d2b806db1723875e4ac95f8a34d97150, id = 5c38878d-ca94-4fd9-a36e-1ae5fe713ca2, last_modified = 2021-01-13
Source: 00000000.00000002.3719303951.0000020FFA250000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
Source: 00000000.00000002.3719303951.0000020FFA250000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_5c38878d os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 3b55ec6c37891880b53633b936d10f94d2b806db1723875e4ac95f8a34d97150, id = 5c38878d-ca94-4fd9-a36e-1ae5fe713ca2, last_modified = 2021-01-13
Source: 00000004.00000002.3719759282.00007FFB226C1000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
Source: 00000004.00000002.3719759282.00007FFB226C1000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_5c38878d os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 3b55ec6c37891880b53633b936d10f94d2b806db1723875e4ac95f8a34d97150, id = 5c38878d-ca94-4fd9-a36e-1ae5fe713ca2, last_modified = 2021-01-13
Source: 00000000.00000002.3719632649.00007FFB226C1000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
Source: 00000000.00000002.3719632649.00007FFB226C1000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_5c38878d os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 3b55ec6c37891880b53633b936d10f94d2b806db1723875e4ac95f8a34d97150, id = 5c38878d-ca94-4fd9-a36e-1ae5fe713ca2, last_modified = 2021-01-13
Source: 00000004.00000002.3719520350.0000026F84150000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
Source: 00000004.00000002.3719520350.0000026F84150000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_5c38878d os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 3b55ec6c37891880b53633b936d10f94d2b806db1723875e4ac95f8a34d97150, id = 5c38878d-ca94-4fd9-a36e-1ae5fe713ca2, last_modified = 2021-01-13
Source: eNtYgxj1lX.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: classification engineClassification label: mal64.evad.winDLL@6/0@0/0
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFB226C6250 CreateToolhelp32Snapshot,Process32First,tolower,tolower,tolower,tolower,tolower,tolower,Process32Next,CloseHandle,printf,GetCurrentProcess,printf,OpenProcess,printf,memset,memcpy,printf,GetCurrentProcess,GetProcessMitigationPolicy,printf,printf,SetProcessMitigationPolicy,GetProcessMitigationPolicy,printf,SetProcessMitigationPolicy,SleepEx,0_2_00007FFB226C6250
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5996:120:WilError_03
Source: eNtYgxj1lX.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Windows\System32\loaddll64.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\eNtYgxj1lX.dll",#1
Source: eNtYgxj1lX.dllReversingLabs: Detection: 28%
Source: eNtYgxj1lX.dllVirustotal: Detection: 45%
Source: unknownProcess created: C:\Windows\System32\loaddll64.exe loaddll64.exe "C:\Users\user\Desktop\eNtYgxj1lX.dll"
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\eNtYgxj1lX.dll",#1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\eNtYgxj1lX.dll",#1
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\eNtYgxj1lX.dll",#1Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\eNtYgxj1lX.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: vcruntime140.dllJump to behavior
Source: eNtYgxj1lX.dllStatic PE information: Image base 0x180000000 > 0x60000000
Source: eNtYgxj1lX.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: eNtYgxj1lX.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: eNtYgxj1lX.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: eNtYgxj1lX.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: eNtYgxj1lX.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: eNtYgxj1lX.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: eNtYgxj1lX.dllStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
Source: eNtYgxj1lX.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: C:\Users\NEO\Desktop\RavinAcademy\RedTeam-01\08\03-ACG\x64\Release\EnableACG.pdb source: loaddll64.exe, 00000000.00000002.3719697980.00007FFB226C8000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.3719799949.00007FFB226C8000.00000002.00000001.01000000.00000003.sdmp, eNtYgxj1lX.dll
Source: eNtYgxj1lX.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: eNtYgxj1lX.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: eNtYgxj1lX.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: eNtYgxj1lX.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: eNtYgxj1lX.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFB226C16B5 push FFFFFFB0h; retf 0_2_00007FFB226C16CD
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFB226C257A push rdx; iretd 0_2_00007FFB226C2585
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFB226C1925 push rsp; ret 0_2_00007FFB226C192C
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFB226C266C push rax; retf 0_2_00007FFB226C266D
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFB226C3639 push rbx; ret 0_2_00007FFB226C3643
Source: eNtYgxj1lX.dllStatic PE information: section name: .text entropy: 7.170792866984555
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\loaddll64.exeWindow / User API: threadDelayed 5946Jump to behavior
Source: C:\Windows\System32\loaddll64.exeWindow / User API: threadDelayed 4053Jump to behavior
Source: C:\Windows\System32\rundll32.exeWindow / User API: threadDelayed 6468Jump to behavior
Source: C:\Windows\System32\rundll32.exeWindow / User API: threadDelayed 3531Jump to behavior
Source: C:\Windows\System32\loaddll64.exe TID: 6732Thread sleep time: -11892000s >= -30000sJump to behavior
Source: C:\Windows\System32\loaddll64.exe TID: 6732Thread sleep time: -8106000s >= -30000sJump to behavior
Source: C:\Windows\System32\rundll32.exe TID: 2412Thread sleep count: 6468 > 30Jump to behavior
Source: C:\Windows\System32\rundll32.exe TID: 2412Thread sleep time: -12936000s >= -30000sJump to behavior
Source: C:\Windows\System32\rundll32.exe TID: 2412Thread sleep count: 3531 > 30Jump to behavior
Source: C:\Windows\System32\rundll32.exe TID: 2412Thread sleep time: -7062000s >= -30000sJump to behavior
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Windows\System32\loaddll64.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\rundll32.exeLast function: Thread delayed
Source: C:\Windows\System32\rundll32.exeLast function: Thread delayed
Source: C:\Windows\System32\loaddll64.exeProcess information queried: ProcessInformationJump to behavior

Anti Debugging

barindex
Source: C:\Windows\System32\rundll32.exeProcess Stats: CPU usage > 42% for more than 60s
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFB226C71D8 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FFB226C71D8
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFB226C71D8 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FFB226C71D8
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFB226C6C34 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FFB226C6C34

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Windows\System32\loaddll64.exeNtMapViewOfSection: Direct from: 0x7FFB226C685FJump to behavior
Source: C:\Windows\System32\loaddll64.exeNtCreateThreadEx: Direct from: 0x7FFB226C689FJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\eNtYgxj1lX.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFB226C6DB0 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FFB226C6DB0
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
11
Process Injection
111
Virtualization/Sandbox Evasion
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
Abuse Elevation Control Mechanism
11
Process Injection
LSASS Memory11
Security Software Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
DLL Side-Loading
1
Abuse Elevation Control Mechanism
Security Account Manager111
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook2
Obfuscated Files or Information
NTDS2
Process Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Rundll32
LSA Secrets1
Application Window Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
Software Packing
Cached Domain Credentials2
System Information Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
DLL Side-Loading
DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1522598 Sample: eNtYgxj1lX.exe Startdate: 30/09/2024 Architecture: WINDOWS Score: 64 17 Malicious sample detected (through community Yara rule) 2->17 19 Multi AV Scanner detection for submitted file 2->19 7 loaddll64.exe 1 2->7         started        process3 signatures4 21 Found direct / indirect Syscall (likely to bypass EDR) 7->21 10 cmd.exe 1 7->10         started        12 conhost.exe 7->12         started        process5 process6 14 rundll32.exe 10->14         started        signatures7 23 Found potential dummy code loops (likely to delay analysis) 14->23

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
eNtYgxj1lX.dll29%ReversingLabsWin64.Exploit.DonutMarte
eNtYgxj1lX.dll45%VirustotalBrowse
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos
Joe Sandbox version:41.0.0 Charoite
Analysis ID:1522598
Start date and time:2024-09-30 12:31:11 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 6m 8s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:18
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:eNtYgxj1lX.dll
(renamed file extension from exe to dll, renamed because original name is a hash value)
Original Sample Name:f5cc2afb777c4ecc05f78b5e3556a2b3e508bdb9ce4ff570da68c10a1c6785b5.exe
Detection:MAL
Classification:mal64.evad.winDLL@6/0@0/0
EGA Information:
  • Successful, ratio: 100%
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 2
  • Number of non-executed functions: 8
Cookbook Comments:
  • Override analysis time to 240s for rundll32
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, backgroundTaskHost.exe, svchost.exe
  • Excluded domains from analysis (whitelisted): d.8.0.a.e.e.f.b.0.0.0.0.0.0.0.0.5.0.0.0.0.0.8.0.0.3.0.1.3.0.6.2.ip6.arpa, slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
  • Not all processes where analyzed, report is missing behavior information
TimeTypeDescription
08:21:08API Interceptor7558376x Sleep call for process: rundll32.exe modified
08:21:08API Interceptor7414067x Sleep call for process: loaddll64.exe modified
No context
No context
No context
No context
No context
No created / dropped files found
File type:PE32+ executable (DLL) (console) x86-64, for MS Windows
Entropy (8bit):6.669210553287073
TrID:
  • Win64 Dynamic Link Library (generic) (102004/3) 86.43%
  • Win64 Executable (generic) (12005/4) 10.17%
  • Generic Win/DOS Executable (2004/3) 1.70%
  • DOS Executable Generic (2002/1) 1.70%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.01%
File name:eNtYgxj1lX.dll
File size:34'304 bytes
MD5:149ebe286468f64c8ca0fb329d1aa5f3
SHA1:7b300b5956ada21b150926851bc297434fb1e59b
SHA256:f5cc2afb777c4ecc05f78b5e3556a2b3e508bdb9ce4ff570da68c10a1c6785b5
SHA512:309471cc4d04c69a1fbecd117d75fabad1300a576f85328309b6164f08ad3c002b93eb088cc9cacc479212ffadca0a0ea3837eeed7618c5392cc396202d9b982
SSDEEP:768:ydukbMrQL+esduIKICvwphx546/ntfaCl:ydukbMrfes845f/tfaCl
TLSH:64F2AE94BBB500E8D675D038CCA6AD2EDEB178561325528F23C8C93A6F73372752D342
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........V..............C.....................................................I.......I.......I./.....I.......Rich...................
Icon Hash:7ae282899bbab082
Entrypoint:0x180006bf4
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x180000000
Subsystem:windows cui
Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, DLL
DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
Time Stamp:0x612F9A66 [Wed Sep 1 15:21:10 2021 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:6
OS Version Minor:0
File Version Major:6
File Version Minor:0
Subsystem Version Major:6
Subsystem Version Minor:0
Import Hash:dc1eb8d2f52438dfb434054154517c2b
Instruction
dec eax
mov dword ptr [esp+08h], ebx
dec eax
mov dword ptr [esp+10h], esi
push edi
dec eax
sub esp, 20h
dec ecx
mov edi, eax
mov ebx, edx
dec eax
mov esi, ecx
cmp edx, 01h
jne 00007F25F52DD7B7h
call 00007F25F52DD950h
dec esp
mov eax, edi
mov edx, ebx
dec eax
mov ecx, esi
dec eax
mov ebx, dword ptr [esp+30h]
dec eax
mov esi, dword ptr [esp+38h]
dec eax
add esp, 20h
pop edi
jmp 00007F25F52DD644h
int3
int3
int3
inc eax
push ebx
dec eax
sub esp, 20h
dec eax
mov ebx, ecx
xor ecx, ecx
call dword ptr [0000141Bh]
dec eax
mov ecx, ebx
call dword ptr [0000140Ah]
call dword ptr [000013B4h]
dec eax
mov ecx, eax
mov edx, C0000409h
dec eax
add esp, 20h
pop ebx
dec eax
jmp dword ptr [00001400h]
dec eax
mov dword ptr [esp+08h], ecx
dec eax
sub esp, 38h
mov ecx, 00000017h
call dword ptr [000013F4h]
test eax, eax
je 00007F25F52DD7B9h
mov ecx, 00000002h
int 29h
dec eax
lea ecx, dword ptr [00002462h]
call 00007F25F52DD85Eh
dec eax
mov eax, dword ptr [esp+38h]
dec eax
mov dword ptr [00002549h], eax
dec eax
lea eax, dword ptr [esp+38h]
dec eax
add eax, 08h
dec eax
mov dword ptr [000024D9h], eax
dec eax
mov eax, dword ptr [00002532h]
dec eax
mov dword ptr [000023A3h], eax
Programming Language:
  • [IMP] VS2008 SP1 build 30729
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x8a0c0x78.rdata
IMAGE_DIRECTORY_ENTRY_RESOURCE0xc0000x1e0.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0xb0000x228.pdata
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0xd0000x24.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x82fc0x70.rdata
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x83700x138.rdata
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x80000x150.rdata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x66f80x6800c3fe6cb2ce63446f2c7d892760f68322False0.7744140625data7.170792866984555IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rdata0x80000xf6c0x1000f28f34ecd64b88e727e1839ece563628False0.411376953125data4.30655316201165IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0x90000x16040x2004e3cf939c6b9143de49c819a775b7f91False0.09375data0.44978594583004794IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.pdata0xb0000x2280x40050118875908a21573d9c25f46190e763False0.29296875SysEx File -2.360418956658928IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.rsrc0xc0000x1e00x200033f07f58c3c8ea3a98fbea3867bbc54False0.53125data4.708553337303423IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0xd0000x240x2001be3401f59cd59511ba11f3863198b2eFalse0.099609375data0.5421503280870934IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_MANIFEST0xc0600x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
DLLImport
KERNEL32.dllProcess32First, GetCurrentProcess, GetProcessMitigationPolicy, OpenProcess, SetProcessMitigationPolicy, CreateToolhelp32Snapshot, Sleep, Process32Next, CloseHandle, RtlLookupFunctionEntry, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TerminateProcess, IsProcessorFeaturePresent, IsDebuggerPresent, InitializeSListHead, GetSystemTimeAsFileTime, GetCurrentThreadId, GetCurrentProcessId, QueryPerformanceCounter, RtlCaptureContext
VCRUNTIME140.dll__std_type_info_destroy_list, __C_specific_handler, memcpy, memset
api-ms-win-crt-stdio-l1-1-0.dll__acrt_iob_func, __stdio_common_vfprintf
api-ms-win-crt-string-l1-1-0.dlltolower
api-ms-win-crt-runtime-l1-1-0.dll_initialize_narrow_environment, _initterm, _cexit, _execute_onexit_table, _initialize_onexit_table, _configure_narrow_argv, _seh_filter_dll, _initterm_e
Language of compilation systemCountry where language is spokenMap
EnglishUnited States
TimestampSource PortDest PortSource IPDest IP
Sep 30, 2024 12:32:53.752001047 CEST5354874162.159.36.2192.168.2.7
Sep 30, 2024 12:32:54.233249903 CEST53607051.1.1.1192.168.2.7

Click to jump to process

Click to jump to process

Click to jump to process

Target ID:0
Start time:06:32:08
Start date:30/09/2024
Path:C:\Windows\System32\loaddll64.exe
Wow64 process (32bit):false
Commandline:loaddll64.exe "C:\Users\user\Desktop\eNtYgxj1lX.dll"
Imagebase:0x7ff662f80000
File size:165'888 bytes
MD5 hash:763455F9DCB24DFEECC2B9D9F8D46D52
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Yara matches:
  • Rule: Windows_Trojan_Donutloader_f40e3759, Description: unknown, Source: 00000000.00000002.3719303951.0000020FFA250000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
  • Rule: Windows_Trojan_Donutloader_5c38878d, Description: unknown, Source: 00000000.00000002.3719303951.0000020FFA250000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
  • Rule: Windows_Trojan_Donutloader_f40e3759, Description: unknown, Source: 00000000.00000002.3719632649.00007FFB226C1000.00000020.00000001.01000000.00000003.sdmp, Author: unknown
  • Rule: Windows_Trojan_Donutloader_5c38878d, Description: unknown, Source: 00000000.00000002.3719632649.00007FFB226C1000.00000020.00000001.01000000.00000003.sdmp, Author: unknown
Reputation:high
Has exited:false

Target ID:1
Start time:06:32:08
Start date:30/09/2024
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff75da10000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:false

Target ID:2
Start time:06:32:08
Start date:30/09/2024
Path:C:\Windows\System32\cmd.exe
Wow64 process (32bit):false
Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\eNtYgxj1lX.dll",#1
Imagebase:0x7ff671580000
File size:289'792 bytes
MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:false

Target ID:4
Start time:06:32:08
Start date:30/09/2024
Path:C:\Windows\System32\rundll32.exe
Wow64 process (32bit):false
Commandline:rundll32.exe "C:\Users\user\Desktop\eNtYgxj1lX.dll",#1
Imagebase:0x7ff6cc020000
File size:71'680 bytes
MD5 hash:EF3179D498793BF4234F708D3BE28633
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Yara matches:
  • Rule: Windows_Trojan_Donutloader_f40e3759, Description: unknown, Source: 00000004.00000002.3719759282.00007FFB226C1000.00000020.00000001.01000000.00000003.sdmp, Author: unknown
  • Rule: Windows_Trojan_Donutloader_5c38878d, Description: unknown, Source: 00000004.00000002.3719759282.00007FFB226C1000.00000020.00000001.01000000.00000003.sdmp, Author: unknown
  • Rule: Windows_Trojan_Donutloader_f40e3759, Description: unknown, Source: 00000004.00000002.3719520350.0000026F84150000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
  • Rule: Windows_Trojan_Donutloader_5c38878d, Description: unknown, Source: 00000004.00000002.3719520350.0000026F84150000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
Reputation:high
Has exited:false

Reset < >

    Execution Graph

    Execution Coverage:8.9%
    Dynamic/Decrypted Code Coverage:0%
    Signature Coverage:20%
    Total number of Nodes:20
    Total number of Limit Nodes:0

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3719632649.00007FFB226C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFB226C0000, based on PE: true
    • Associated: 00000000.00000002.3719573004.00007FFB226C0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3719697980.00007FFB226C8000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3719751591.00007FFB226C9000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3719798575.00007FFB226CB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ffb226c0000_loaddll64.jbxd
    Yara matches
    Similarity
    • API ID: Processprintf$tolower$MitigationPolicy$CurrentProcess32$CloseCreateFirstHandleNextOpenSleepSnapshotToolhelp32memcpymemset
    • String ID: $ MicrosoftSignedOnly %u$ ProcessDynamicCodePolicy %u$@$Page Size: %d$ProcessSignaturePolicy:$Section BaseAddress: %p$Section handle: %p$Section remoteSectionAddress: %p$notepad.exe
    • API String ID: 2413901919-2661307382
    • Opcode ID: a1427bacd2e75b4a5ab0a2b542d0cfb5fbe96a4d2cc8b06358878668546abbb9
    • Instruction ID: 78a09616cc7833d34eb5537c129a4baa079fa35d9e25e6d61f6f741a8ded40a0
    • Opcode Fuzzy Hash: a1427bacd2e75b4a5ab0a2b542d0cfb5fbe96a4d2cc8b06358878668546abbb9
    • Instruction Fuzzy Hash: 039141B3A08BC286F723AB25EC5866977A1FB84784F500235DA8D83B69DF7CD505CB44

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 32 7ffb226c68d4-7ffb226c68da 33 7ffb226c6915-7ffb226c691f 32->33 34 7ffb226c68dc-7ffb226c68df 32->34 35 7ffb226c6a3c-7ffb226c6a51 33->35 36 7ffb226c6909-7ffb226c6948 call 7ffb226c7008 34->36 37 7ffb226c68e1-7ffb226c68e4 34->37 40 7ffb226c6a53 35->40 41 7ffb226c6a60-7ffb226c6a7a call 7ffb226c6e9c 35->41 55 7ffb226c6a16 36->55 56 7ffb226c694e-7ffb226c6963 call 7ffb226c6e9c 36->56 38 7ffb226c68e6-7ffb226c68e9 37->38 39 7ffb226c68fc __scrt_dllmain_crt_thread_attach 37->39 43 7ffb226c68f5-7ffb226c68fa call 7ffb226c6f4c 38->43 44 7ffb226c68eb-7ffb226c68f4 38->44 47 7ffb226c6901-7ffb226c6908 39->47 45 7ffb226c6a55-7ffb226c6a5f 40->45 53 7ffb226c6ab3-7ffb226c6ae4 call 7ffb226c71d8 41->53 54 7ffb226c6a7c-7ffb226c6ab1 call 7ffb226c6fc4 call 7ffb226c6e6c call 7ffb226c7360 call 7ffb226c7178 call 7ffb226c719c call 7ffb226c6ff4 41->54 43->47 64 7ffb226c6ae6-7ffb226c6aec 53->64 65 7ffb226c6af5-7ffb226c6afb 53->65 54->45 59 7ffb226c6a18-7ffb226c6a2d 55->59 67 7ffb226c6969-7ffb226c697a call 7ffb226c6f0c 56->67 68 7ffb226c6a2e-7ffb226c6a3b call 7ffb226c71d8 56->68 64->65 70 7ffb226c6aee-7ffb226c6af0 64->70 71 7ffb226c6afd-7ffb226c6b07 65->71 72 7ffb226c6b42-7ffb226c6b4a call 7ffb226c6580 65->72 82 7ffb226c697c-7ffb226c69a0 call 7ffb226c7324 call 7ffb226c6e5c call 7ffb226c6e80 call 7ffb226c7578 67->82 83 7ffb226c69cb-7ffb226c69d5 call 7ffb226c7178 67->83 68->35 77 7ffb226c6be3-7ffb226c6bf0 70->77 78 7ffb226c6b13-7ffb226c6b21 71->78 79 7ffb226c6b09-7ffb226c6b11 71->79 84 7ffb226c6b4f-7ffb226c6b58 72->84 85 7ffb226c6b27-7ffb226c6b3c call 7ffb226c68d4 78->85 100 7ffb226c6bd9-7ffb226c6be1 78->100 79->85 82->83 132 7ffb226c69a2-7ffb226c69a9 __scrt_dllmain_after_initialize_c 82->132 83->55 102 7ffb226c69d7-7ffb226c69e3 call 7ffb226c71c8 83->102 89 7ffb226c6b5a-7ffb226c6b5c 84->89 90 7ffb226c6b90-7ffb226c6b92 84->90 85->72 85->100 89->90 97 7ffb226c6b5e-7ffb226c6b80 call 7ffb226c6580 call 7ffb226c6a3c 89->97 98 7ffb226c6b94-7ffb226c6b97 90->98 99 7ffb226c6b99-7ffb226c6bae call 7ffb226c68d4 90->99 97->90 127 7ffb226c6b82-7ffb226c6b87 97->127 98->99 98->100 99->100 113 7ffb226c6bb0-7ffb226c6bba 99->113 100->77 121 7ffb226c69e5-7ffb226c69ef call 7ffb226c70e0 102->121 122 7ffb226c6a09-7ffb226c6a14 102->122 118 7ffb226c6bc5-7ffb226c6bd5 113->118 119 7ffb226c6bbc-7ffb226c6bc3 113->119 118->100 119->100 121->122 131 7ffb226c69f1-7ffb226c69ff 121->131 122->59 127->90 131->122 132->83 133 7ffb226c69ab-7ffb226c69c8 call 7ffb226c7572 132->133 133->83
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3719632649.00007FFB226C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFB226C0000, based on PE: true
    • Associated: 00000000.00000002.3719573004.00007FFB226C0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3719697980.00007FFB226C8000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3719751591.00007FFB226C9000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3719798575.00007FFB226CB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ffb226c0000_loaddll64.jbxd
    Yara matches
    Similarity
    • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_initialize_crt__scrt_release_startup_lock
    • String ID:
    • API String ID: 349153199-0
    • Opcode ID: 3f0377c1b6772ca93373f4fc55d5f73cee9eca35e1cff226d8d414463cefc4b6
    • Instruction ID: 9b976b18128970f80f9c4d18e96a66ca3e33203b36a3de73f74aee752add53cf
    • Opcode Fuzzy Hash: 3f0377c1b6772ca93373f4fc55d5f73cee9eca35e1cff226d8d414463cefc4b6
    • Instruction Fuzzy Hash: 7A817BE3E0C2C786F667BB76DC492B92290BF95780F548235DA0DC7796DEBCE4418604

    Control-flow Graph

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3719632649.00007FFB226C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFB226C0000, based on PE: true
    • Associated: 00000000.00000002.3719573004.00007FFB226C0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3719697980.00007FFB226C8000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3719751591.00007FFB226C9000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3719798575.00007FFB226CB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ffb226c0000_loaddll64.jbxd
    Yara matches
    Similarity
    • API ID: ExceptionFilterPresentUnhandledmemset$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
    • String ID:
    • API String ID: 313767242-0
    • Opcode ID: 208d6a7377ca40564036e0ae44a9f97d5b442366e7acda886a6482cdfd1bfd3b
    • Instruction ID: 72b9ada424f3a233fc66c7b3b34d9bd47556024cd258573df100a7b32102bbbd
    • Opcode Fuzzy Hash: 208d6a7377ca40564036e0ae44a9f97d5b442366e7acda886a6482cdfd1bfd3b
    • Instruction Fuzzy Hash: 7E314CB3608AC18AEB629F60EC443E93364FB84744F44453ADA4E87B88DF78D548C714

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 251 7ffb226c51e7-7ffb226c5247 253 7ffb226c5658-7ffb226c566b 251->253 254 7ffb226c524d-7ffb226c526d 251->254 254->253 256 7ffb226c5273-7ffb226c5291 call 7ffb226c6163 254->256 259 7ffb226c5293-7ffb226c52be call 7ffb226c6163 256->259 260 7ffb226c52c0-7ffb226c52c8 256->260 259->260 262 7ffb226c52ca-7ffb226c52d8 260->262 263 7ffb226c5340-7ffb226c5348 260->263 262->263 267 7ffb226c52da 262->267 264 7ffb226c53e6-7ffb226c53ee 263->264 265 7ffb226c534e-7ffb226c5357 263->265 269 7ffb226c5462-7ffb226c546a 264->269 270 7ffb226c53f0-7ffb226c53fc 264->270 265->264 268 7ffb226c535d-7ffb226c5376 265->268 271 7ffb226c52df-7ffb226c52e3 267->271 282 7ffb226c53c4-7ffb226c53ca 268->282 272 7ffb226c546c-7ffb226c5474 269->272 273 7ffb226c5490-7ffb226c549a 269->273 270->269 274 7ffb226c53fe-7ffb226c540c 270->274 275 7ffb226c532c-7ffb226c5336 271->275 272->273 281 7ffb226c5476 272->281 276 7ffb226c55b6-7ffb226c55c0 273->276 277 7ffb226c54a0-7ffb226c54c3 273->277 295 7ffb226c540e-7ffb226c541c 274->295 296 7ffb226c544c-7ffb226c5458 274->296 278 7ffb226c52e5-7ffb226c52fd 275->278 279 7ffb226c5338-7ffb226c533e 275->279 285 7ffb226c55ec-7ffb226c560c call 7ffb226c6183 * 2 276->285 286 7ffb226c55c2-7ffb226c55e7 call 7ffb226c596b 276->286 290 7ffb226c564a-7ffb226c5652 277->290 299 7ffb226c54c9-7ffb226c54d1 277->299 287 7ffb226c531e-7ffb226c5322 278->287 288 7ffb226c52ff-7ffb226c531c 278->288 279->263 279->271 283 7ffb226c5488-7ffb226c548e 281->283 293 7ffb226c5378 282->293 294 7ffb226c53cc-7ffb226c53d5 282->294 283->273 297 7ffb226c5478-7ffb226c5484 283->297 323 7ffb226c560e-7ffb226c562b 285->323 324 7ffb226c563b-7ffb226c5644 285->324 286->285 289 7ffb226c5328 287->289 287->290 288->289 289->275 290->253 303 7ffb226c5385-7ffb226c538e 293->303 304 7ffb226c537a-7ffb226c5383 293->304 294->268 302 7ffb226c53d7-7ffb226c53df 294->302 305 7ffb226c5444-7ffb226c544a 295->305 296->274 301 7ffb226c545a 296->301 297->283 299->290 307 7ffb226c54d7-7ffb226c54df 299->307 301->269 302->264 311 7ffb226c53aa-7ffb226c53af 303->311 312 7ffb226c5390-7ffb226c539f call 7ffb226c4667 303->312 325 7ffb226c53b8-7ffb226c53c0 304->325 305->296 309 7ffb226c541e-7ffb226c5425 305->309 307->290 315 7ffb226c54e5-7ffb226c54f7 307->315 313 7ffb226c5427-7ffb226c542a 309->313 314 7ffb226c542c-7ffb226c5430 309->314 321 7ffb226c53b5 311->321 312->311 326 7ffb226c53a1-7ffb226c53a8 312->326 320 7ffb226c5433-7ffb226c5440 313->320 314->320 322 7ffb226c54fa-7ffb226c550a call 7ffb226c619f 315->322 320->305 321->325 331 7ffb226c551a-7ffb226c5526 322->331 332 7ffb226c550c-7ffb226c550e 322->332 323->290 333 7ffb226c562d-7ffb226c5639 323->333 324->290 325->282 326->321 336 7ffb226c5530-7ffb226c5551 call 7ffb226c6183 * 2 331->336 334 7ffb226c5528 332->334 335 7ffb226c5510-7ffb226c5518 332->335 333->290 334->336 335->322 336->290 342 7ffb226c5557-7ffb226c5569 336->342 343 7ffb226c55ae-7ffb226c55b1 342->343 344 7ffb226c556b-7ffb226c5573 342->344 343->290 345 7ffb226c5575-7ffb226c5595 344->345 346 7ffb226c559b-7ffb226c55a9 344->346 345->346 346->290
    Memory Dump Source
    • Source File: 00000000.00000002.3719632649.00007FFB226C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFB226C0000, based on PE: true
    • Associated: 00000000.00000002.3719573004.00007FFB226C0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3719697980.00007FFB226C8000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3719751591.00007FFB226C9000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3719798575.00007FFB226CB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ffb226c0000_loaddll64.jbxd
    Yara matches
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 5189c314a4e6d48e372af50d2debe7323d6985c6403791f7a613b94f55208030
    • Instruction ID: b007cd0f2ac5bde3a26e24c883ce8408c93bff22940a79313fa479215cc2641a
    • Opcode Fuzzy Hash: 5189c314a4e6d48e372af50d2debe7323d6985c6403791f7a613b94f55208030
    • Instruction Fuzzy Hash: 6ED19FB3B0868186E766EF26DC4867E77A5FB45B84F448235DA4E97784EFB8E410C700
    Memory Dump Source
    • Source File: 00000000.00000002.3719632649.00007FFB226C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFB226C0000, based on PE: true
    • Associated: 00000000.00000002.3719573004.00007FFB226C0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3719697980.00007FFB226C8000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3719751591.00007FFB226C9000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3719798575.00007FFB226CB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ffb226c0000_loaddll64.jbxd
    Yara matches
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 35391dcde2d7bf35b312952e006a2da998ee2784c2d79dc709a298daf52de4e0
    • Instruction ID: e03b5166ab22afbf895cc4e2623c218ddbcf69ba6edba03f43a140316974c221
    • Opcode Fuzzy Hash: 35391dcde2d7bf35b312952e006a2da998ee2784c2d79dc709a298daf52de4e0
    • Instruction Fuzzy Hash: E3B171B7A085C282FA67FA32DC587BE6391FB44B84F444236DA4D87B85DE7CE8458700
    Memory Dump Source
    • Source File: 00000000.00000002.3719632649.00007FFB226C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFB226C0000, based on PE: true
    • Associated: 00000000.00000002.3719573004.00007FFB226C0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3719697980.00007FFB226C8000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3719751591.00007FFB226C9000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3719798575.00007FFB226CB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ffb226c0000_loaddll64.jbxd
    Yara matches
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 7e9fd2fb88d1716d08f008b0402716a762c67916f2753a03cfe5ae87c672b0fa
    • Instruction ID: 8eb9b75e33e6246926ee1bd35c0f4ccc7883ea4b7edfbdbb837b8521f6fe6d6b
    • Opcode Fuzzy Hash: 7e9fd2fb88d1716d08f008b0402716a762c67916f2753a03cfe5ae87c672b0fa
    • Instruction Fuzzy Hash: 1FC16873608B8186EB51DF35D8486AE77A5FB88B88F148226DF4E57B68DF38D148C700
    Memory Dump Source
    • Source File: 00000000.00000002.3719632649.00007FFB226C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFB226C0000, based on PE: true
    • Associated: 00000000.00000002.3719573004.00007FFB226C0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3719697980.00007FFB226C8000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3719751591.00007FFB226C9000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3719798575.00007FFB226CB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ffb226c0000_loaddll64.jbxd
    Yara matches
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: f9e7542a1abf976cfc3f943a9496b4d4481246b339cbd567b20b096c46861fce
    • Instruction ID: 47aecd1318244e2f0c943056e7f5691be36036d46696e84330aa252285a3c6e2
    • Opcode Fuzzy Hash: f9e7542a1abf976cfc3f943a9496b4d4481246b339cbd567b20b096c46861fce
    • Instruction Fuzzy Hash: 2C912873605B819AEB269F35EC882DE73A4FB88B48F444236DA4D47B24EF78D215C740
    Memory Dump Source
    • Source File: 00000000.00000002.3719632649.00007FFB226C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFB226C0000, based on PE: true
    • Associated: 00000000.00000002.3719573004.00007FFB226C0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3719697980.00007FFB226C8000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3719751591.00007FFB226C9000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3719798575.00007FFB226CB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ffb226c0000_loaddll64.jbxd
    Yara matches
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: d9c367cc6b53aed9e5eb0b94ca82ee1465e11a55bb00d8bd740ce15e3406d859
    • Instruction ID: 03db0ad3f3e3d7e0a214e644ceccf95f786bbdd289baba7a017334143f897953
    • Opcode Fuzzy Hash: d9c367cc6b53aed9e5eb0b94ca82ee1465e11a55bb00d8bd740ce15e3406d859
    • Instruction Fuzzy Hash: 27616672704BC29AEB6ADF31E8487EAA3A0FB48744F444125DF5947B44DF78E668C700
    Memory Dump Source
    • Source File: 00000000.00000002.3719632649.00007FFB226C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFB226C0000, based on PE: true
    • Associated: 00000000.00000002.3719573004.00007FFB226C0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3719697980.00007FFB226C8000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3719751591.00007FFB226C9000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3719798575.00007FFB226CB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ffb226c0000_loaddll64.jbxd
    Yara matches
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 53b72c3e7f4910a6fc663150632a6f001d31258ff078946a7bc01824c46181dc
    • Instruction ID: 4c0f434a8e1908c8f2eba6f95f840d79c8335c7b99da31db3ac5887db67286c2
    • Opcode Fuzzy Hash: 53b72c3e7f4910a6fc663150632a6f001d31258ff078946a7bc01824c46181dc
    • Instruction Fuzzy Hash: DDE0B6B6A08B80819614EF52F48406EBB64F7E97C8B105919FAC853B1ACF38C1608B90
    Memory Dump Source
    • Source File: 00000000.00000002.3719632649.00007FFB226C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFB226C0000, based on PE: true
    • Associated: 00000000.00000002.3719573004.00007FFB226C0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3719697980.00007FFB226C8000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3719751591.00007FFB226C9000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3719798575.00007FFB226CB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ffb226c0000_loaddll64.jbxd
    Yara matches
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 30cd483f2d09812022f6bd87fc6b757ef84a4f5b82025e1bf55ca1fb2e93fa40
    • Instruction ID: 64fb55ec651fef5932bdb6f883ad40203faafb7d1dffc4b93ab9ae6d8856d3f4
    • Opcode Fuzzy Hash: 30cd483f2d09812022f6bd87fc6b757ef84a4f5b82025e1bf55ca1fb2e93fa40
    • Instruction Fuzzy Hash: A8E0B6B6A08B80819614EF52F49005EBB64F7E97D4F105919FAC853B1ACF38C1608B90