Edit tour
Windows
Analysis Report
ZJGkxGuyIT.dll
Overview
General Information
Sample name: | ZJGkxGuyIT.dll (renamed file extension from exe to dll, renamed because original name is a hash value) |
Original sample name: | 2ebf32f4a6b63b8dad4dac4bddf1cbee.exe |
Analysis ID: | 1542665 |
MD5: | 2ebf32f4a6b63b8dad4dac4bddf1cbee |
SHA1: | 8b9f7739a9a64168b50d3bde17c8e8ee1127671c |
SHA256: | fde4f048bb013ec3caabbe5862dcb8df0f701659bc9ac04e5bb1c5a3eee58b61 |
Tags: | 64exe |
Infos: | |
Detection
Score: | 60 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Found direct / indirect Syscall (likely to bypass EDR)
Hijacks the control flow in another process
AV process strings found (often used to terminate AV products)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to dynamically determine API calls
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found large amount of non-executed APIs
One or more processes crash
PE file contains more sections than normal
PE file contains sections with non-standard names
Registers a DLL
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Conhost Spawned By Uncommon Parent Process
Classification
- System is w10x64
- loaddll64.exe (PID: 6556 cmdline:
loaddll64. exe "C:\Us ers\user\D esktop\ZJG kxGuyIT.dl l" MD5: 763455F9DCB24DFEECC2B9D9F8D46D52) - conhost.exe (PID: 6576 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - cmd.exe (PID: 6696 cmdline:
cmd.exe /C rundll32. exe "C:\Us ers\user\D esktop\ZJG kxGuyIT.dl l",#1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - rundll32.exe (PID: 6772 cmdline:
rundll32.e xe "C:\Use rs\user\De sktop\ZJGk xGuyIT.dll ",#1 MD5: EF3179D498793BF4234F708D3BE28633) - WerFault.exe (PID: 3004 cmdline:
C:\Windows \system32\ WerFault.e xe -u -p 6 772 -s 400 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0) - regsvr32.exe (PID: 6720 cmdline:
regsvr32.e xe /i /s C :\Users\us er\Desktop \ZJGkxGuyI T.dll MD5: B0C2FA35D14A9FAD919E99D9D75E1B9E) - WerFault.exe (PID: 8 cmdline:
C:\Windows \system32\ WerFault.e xe -u -p 6 720 -s 452 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0) - rundll32.exe (PID: 6796 cmdline:
rundll32.e xe C:\User s\user\Des ktop\ZJGkx GuyIT.dll, DllInstall MD5: EF3179D498793BF4234F708D3BE28633) - rundll32.exe (PID: 6976 cmdline:
C:\Windows \system32\ rundll32.e xe C:\User s\user\Des ktop\C:\Us ers\user\D esktop\ZJG kxGuyIT.dl l,DllInsta ll 2580 MD5: EF3179D498793BF4234F708D3BE28633) - conhost.exe (PID: 5804 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - rundll32.exe (PID: 3912 cmdline:
rundll32.e xe C:\User s\user\Des ktop\ZJGkx GuyIT.dll, DllRegiste rServer MD5: EF3179D498793BF4234F708D3BE28633) - rundll32.exe (PID: 6220 cmdline:
C:\Windows \system32\ rundll32.e xe C:\User s\user\Des ktop\C:\Us ers\user\D esktop\ZJG kxGuyIT.dl l,DllRegis terServer 6976 MD5: EF3179D498793BF4234F708D3BE28633) - rundll32.exe (PID: 4412 cmdline:
rundll32.e xe C:\User s\user\Des ktop\ZJGkx GuyIT.dll, DllUnregis terServer MD5: EF3179D498793BF4234F708D3BE28633) - rundll32.exe (PID: 6296 cmdline:
C:\Windows \system32\ rundll32.e xe C:\User s\user\Des ktop\C:\Us ers\user\D esktop\ZJG kxGuyIT.dl l,DllUnreg isterServe r 6220 MD5: EF3179D498793BF4234F708D3BE28633) - loaddll64.exe (PID: 5804 cmdline:
C:\Windows \system32\ loaddll64. exe C:\Use rs\user\De sktop\C:\U sers\user\ Desktop\ZJ GkxGuyIT.d ll 6296 MD5: 763455F9DCB24DFEECC2B9D9F8D46D52)
- cleanup
⊘No configs have been found
⊘No yara matches
Source: | Author: Tim Rauch: |
⊘No Suricata rule has matched
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Virustotal: | Perma Link |
Source: | Integrated Neural Analysis Model: |
Source: | Static PE information: |
Source: | Binary string: |