Windows Analysis Report
SecuriteInfo.com.W32.GenCBL.BUN.tr.26826.17558.dll

Overview

General Information

Sample name: SecuriteInfo.com.W32.GenCBL.BUN.tr.26826.17558.dll
(renamed file extension from exe to dll)
Original sample name: SecuriteInfo.com.W32.GenCBL.BUN.tr.26826.17558.exe
Analysis ID: 1532735
MD5: 3fe8eb38f23d00e1045c26084724785e
SHA1: 94e0d3db024a69c57914f10a00303ec2b4a40b2e
SHA256: 313565edbc274cf11332be23cb1c6af341281a969acd9c5f4b4e951c059739c0
Tags: exe
Infos:

Detection

Score: 22
Range: 0 - 100
Whitelisted: false
Confidence: 80%

Signatures

AI detected suspicious sample
Creates a process in suspended mode (likely to inject code)
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
Program does not show much activity (idle)
Sample execution stops while process was sleeping (likely an evasion)

Classification

AV Detection

barindex
Source: Submited Sample Integrated Neural Analysis Model: Matched 93.5% probability
Source: SecuriteInfo.com.W32.GenCBL.BUN.tr.26826.17558.dll Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
Source: Binary string: C:\Users\Chase Tyler\Desktop\NL Hybrid Prem w PE Hooks\x64\Release\Carbonium.pdb source: SecuriteInfo.com.W32.GenCBL.BUN.tr.26826.17558.dll
Source: Binary string: ~LLD PDB.MC:\Users\Chase Tyler\Desktop\NL Hybrid Prem w PE Hooks\x64\Release\Carbonium.pdb33&GCTL source: SecuriteInfo.com.W32.GenCBL.BUN.tr.26826.17558.dll
Source: SecuriteInfo.com.W32.GenCBL.BUN.tr.26826.17558.dll String found in binary or memory: http://sf.symcb.com/sf.crl0f
Source: SecuriteInfo.com.W32.GenCBL.BUN.tr.26826.17558.dll String found in binary or memory: http://sf.symcb.com/sf.crt0
Source: SecuriteInfo.com.W32.GenCBL.BUN.tr.26826.17558.dll String found in binary or memory: http://sf.symcd.com0&
Source: SecuriteInfo.com.W32.GenCBL.BUN.tr.26826.17558.dll String found in binary or memory: https://d.symcb.com/cps0%
Source: SecuriteInfo.com.W32.GenCBL.BUN.tr.26826.17558.dll String found in binary or memory: https://d.symcb.com/rpa0
Source: SecuriteInfo.com.W32.GenCBL.BUN.tr.26826.17558.dll Static PE information: invalid certificate
Source: classification engine Classification label: sus22.winDLL@6/0@0/0
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5608:120:WilError_03
Source: SecuriteInfo.com.W32.GenCBL.BUN.tr.26826.17558.dll Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Windows\System32\loaddll64.exe Key opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.W32.GenCBL.BUN.tr.26826.17558.dll",#1
Source: unknown Process created: C:\Windows\System32\loaddll64.exe loaddll64.exe "C:\Users\user\Desktop\SecuriteInfo.com.W32.GenCBL.BUN.tr.26826.17558.dll"
Source: C:\Windows\System32\loaddll64.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\loaddll64.exe Process created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.W32.GenCBL.BUN.tr.26826.17558.dll",#1
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.W32.GenCBL.BUN.tr.26826.17558.dll",#1
Source: C:\Windows\System32\loaddll64.exe Process created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.W32.GenCBL.BUN.tr.26826.17558.dll",#1 Jump to behavior
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.W32.GenCBL.BUN.tr.26826.17558.dll",#1 Jump to behavior
Source: C:\Windows\System32\loaddll64.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Windows\System32\loaddll64.exe Section loaded: msvcp140.dll Jump to behavior
Source: C:\Windows\System32\loaddll64.exe Section loaded: d3dcompiler_47.dll Jump to behavior
Source: C:\Windows\System32\loaddll64.exe Section loaded: xinput1_4.dll Jump to behavior
Source: C:\Windows\System32\loaddll64.exe Section loaded: vcruntime140_1.dll Jump to behavior
Source: C:\Windows\System32\loaddll64.exe Section loaded: vcruntime140.dll Jump to behavior
Source: C:\Windows\System32\loaddll64.exe Section loaded: vcruntime140.dll Jump to behavior
Source: C:\Windows\System32\loaddll64.exe Section loaded: vcruntime140_1.dll Jump to behavior
Source: C:\Windows\System32\loaddll64.exe Section loaded: cryptsp.dll Jump to behavior
Source: C:\Windows\System32\loaddll64.exe Section loaded: vcruntime140.dll Jump to behavior
Source: C:\Windows\System32\loaddll64.exe Section loaded: devobj.dll Jump to behavior
Source: C:\Windows\System32\loaddll64.exe Section loaded: inputhost.dll Jump to behavior
Source: C:\Windows\System32\loaddll64.exe Section loaded: coremessaging.dll Jump to behavior
Source: C:\Windows\System32\loaddll64.exe Section loaded: propsys.dll Jump to behavior
Source: C:\Windows\System32\loaddll64.exe Section loaded: wintypes.dll Jump to behavior
Source: C:\Windows\System32\loaddll64.exe Section loaded: coreuicomponents.dll Jump to behavior
Source: C:\Windows\System32\loaddll64.exe Section loaded: ntmarta.dll Jump to behavior
Source: C:\Windows\System32\loaddll64.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Windows\System32\loaddll64.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: SecuriteInfo.com.W32.GenCBL.BUN.tr.26826.17558.dll Static PE information: Image base 0x180000000 > 0x60000000
Source: SecuriteInfo.com.W32.GenCBL.BUN.tr.26826.17558.dll Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: SecuriteInfo.com.W32.GenCBL.BUN.tr.26826.17558.dll Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: SecuriteInfo.com.W32.GenCBL.BUN.tr.26826.17558.dll Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: SecuriteInfo.com.W32.GenCBL.BUN.tr.26826.17558.dll Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: SecuriteInfo.com.W32.GenCBL.BUN.tr.26826.17558.dll Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: SecuriteInfo.com.W32.GenCBL.BUN.tr.26826.17558.dll Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: SecuriteInfo.com.W32.GenCBL.BUN.tr.26826.17558.dll Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
Source: SecuriteInfo.com.W32.GenCBL.BUN.tr.26826.17558.dll Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: C:\Users\Chase Tyler\Desktop\NL Hybrid Prem w PE Hooks\x64\Release\Carbonium.pdb source: SecuriteInfo.com.W32.GenCBL.BUN.tr.26826.17558.dll
Source: Binary string: ~LLD PDB.MC:\Users\Chase Tyler\Desktop\NL Hybrid Prem w PE Hooks\x64\Release\Carbonium.pdb33&GCTL source: SecuriteInfo.com.W32.GenCBL.BUN.tr.26826.17558.dll
Source: SecuriteInfo.com.W32.GenCBL.BUN.tr.26826.17558.dll Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: SecuriteInfo.com.W32.GenCBL.BUN.tr.26826.17558.dll Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: SecuriteInfo.com.W32.GenCBL.BUN.tr.26826.17558.dll Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: SecuriteInfo.com.W32.GenCBL.BUN.tr.26826.17558.dll Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: SecuriteInfo.com.W32.GenCBL.BUN.tr.26826.17558.dll Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Windows\System32\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\loaddll64.exe TID: 1012 Thread sleep time: -120000s >= -30000s Jump to behavior
Source: all processes Thread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: C:\Windows\System32\loaddll64.exe Thread delayed: delay time: 120000 Jump to behavior
Source: loaddll64.exe, 00000000.00000003.2187146891.00000200B55AD000.00000004.00000020.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000003.2186910609.00000200B55AB000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll1
Source: rundll32.exe, 00000003.00000003.2234108080.0000025266ED0000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: all processes Thread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.W32.GenCBL.BUN.tr.26826.17558.dll",#1 Jump to behavior
No contacted IP infos