Source: YmAxTGvrQk.dll |
ReversingLabs: Detection: 52% |
Source: Submited Sample |
Integrated Neural Analysis Model: Matched 95.5% probability |
Source: YmAxTGvrQk.dll |
Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_00007FFE13241160 |
0_2_00007FFE13241160 |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_000001F3AEBA1A90 |
0_2_000001F3AEBA1A90 |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_000001F3AEBA15A0 |
0_2_000001F3AEBA15A0 |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_000001F3AEBA72BC |
0_2_000001F3AEBA72BC |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_000001F3AEBA1090 |
0_2_000001F3AEBA1090 |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_000001F3AEBAF4E8 |
0_2_000001F3AEBAF4E8 |
Source: C:\Windows\System32\regsvr32.exe |
Code function: 3_2_026C72BC |
3_2_026C72BC |
Source: C:\Windows\System32\regsvr32.exe |
Code function: 3_2_026C1A90 |
3_2_026C1A90 |
Source: C:\Windows\System32\regsvr32.exe |
Code function: 3_2_026CF4E8 |
3_2_026CF4E8 |
Source: C:\Windows\System32\regsvr32.exe |
Code function: 3_2_026C1090 |
3_2_026C1090 |
Source: C:\Windows\System32\regsvr32.exe |
Code function: 3_2_026C15A0 |
3_2_026C15A0 |
Source: C:\Windows\System32\rundll32.exe |
Code function: 4_2_0000021509031090 |
4_2_0000021509031090 |
Source: C:\Windows\System32\rundll32.exe |
Code function: 4_2_000002150903F4E8 |
4_2_000002150903F4E8 |
Source: C:\Windows\System32\rundll32.exe |
Code function: 4_2_0000021509031A90 |
4_2_0000021509031A90 |
Source: C:\Windows\System32\rundll32.exe |
Code function: 4_2_00000215090372BC |
4_2_00000215090372BC |
Source: C:\Windows\System32\rundll32.exe |
Code function: 4_2_00000215090315A0 |
4_2_00000215090315A0 |
Source: C:\Windows\System32\rundll32.exe |
Code function: 5_2_000001A3CA651090 |
5_2_000001A3CA651090 |
Source: C:\Windows\System32\rundll32.exe |
Code function: 5_2_000001A3CA65F4E8 |
5_2_000001A3CA65F4E8 |
Source: C:\Windows\System32\rundll32.exe |
Code function: 5_2_000001A3CA6515A0 |
5_2_000001A3CA6515A0 |
Source: C:\Windows\System32\rundll32.exe |
Code function: 5_2_000001A3CA6572BC |
5_2_000001A3CA6572BC |
Source: C:\Windows\System32\rundll32.exe |
Code function: 5_2_000001A3CA651A90 |
5_2_000001A3CA651A90 |
Source: YmAxTGvrQk.dll |
Static PE information: No import functions for PE file found |
Source: classification engine |
Classification label: mal64.troj.winDLL@10/0@0/0 |
Source: C:\Windows\System32\conhost.exe |
Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7336:120:WilError_03 |
Source: YmAxTGvrQk.dll |
Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
Source: C:\Windows\System32\loaddll64.exe |
Key opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\YmAxTGvrQk.dll",#1 |
Source: YmAxTGvrQk.dll |
ReversingLabs: Detection: 52% |
Source: unknown |
Process created: C:\Windows\System32\loaddll64.exe loaddll64.exe "C:\Users\user\Desktop\YmAxTGvrQk.dll" |
|
Source: C:\Windows\System32\loaddll64.exe |
Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
|
Source: C:\Windows\System32\loaddll64.exe |
Process created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\YmAxTGvrQk.dll",#1 |
|
Source: C:\Windows\System32\loaddll64.exe |
Process created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\YmAxTGvrQk.dll |
|
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\YmAxTGvrQk.dll",#1 |
|
Source: C:\Windows\System32\loaddll64.exe |
Process created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\YmAxTGvrQk.dll,DllRegisterServer |
|
Source: C:\Windows\System32\loaddll64.exe |
Process created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\YmAxTGvrQk.dll",#1 |
Jump to behavior |
Source: C:\Windows\System32\loaddll64.exe |
Process created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\YmAxTGvrQk.dll |
Jump to behavior |
Source: C:\Windows\System32\loaddll64.exe |
Process created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\YmAxTGvrQk.dll,DllRegisterServer |
Jump to behavior |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\YmAxTGvrQk.dll",#1 |
Jump to behavior |
Source: C:\Windows\System32\loaddll64.exe |
Section loaded: apphelp.dll |
Jump to behavior |
Source: C:\Windows\System32\loaddll64.exe |
Section loaded: wininet.dll |
Jump to behavior |
Source: C:\Windows\System32\loaddll64.exe |
Section loaded: textshaping.dll |
Jump to behavior |
Source: C:\Windows\System32\loaddll64.exe |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Windows\System32\loaddll64.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Windows\System32\loaddll64.exe |
Section loaded: textinputframework.dll |
Jump to behavior |
Source: C:\Windows\System32\loaddll64.exe |
Section loaded: coreuicomponents.dll |
Jump to behavior |
Source: C:\Windows\System32\loaddll64.exe |
Section loaded: coremessaging.dll |
Jump to behavior |
Source: C:\Windows\System32\loaddll64.exe |
Section loaded: ntmarta.dll |
Jump to behavior |
Source: C:\Windows\System32\loaddll64.exe |
Section loaded: coremessaging.dll |
Jump to behavior |
Source: C:\Windows\System32\loaddll64.exe |
Section loaded: wintypes.dll |
Jump to behavior |
Source: C:\Windows\System32\loaddll64.exe |
Section loaded: wintypes.dll |
Jump to behavior |
Source: C:\Windows\System32\loaddll64.exe |
Section loaded: wintypes.dll |
Jump to behavior |
Source: C:\Windows\System32\regsvr32.exe |
Section loaded: apphelp.dll |
Jump to behavior |
Source: C:\Windows\System32\regsvr32.exe |
Section loaded: aclayers.dll |
Jump to behavior |
Source: C:\Windows\System32\regsvr32.exe |
Section loaded: sfc.dll |
Jump to behavior |
Source: C:\Windows\System32\regsvr32.exe |
Section loaded: sfc_os.dll |
Jump to behavior |
Source: C:\Windows\System32\regsvr32.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Windows\System32\regsvr32.exe |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Windows\System32\regsvr32.exe |
Section loaded: wininet.dll |
Jump to behavior |
Source: C:\Windows\System32\regsvr32.exe |
Section loaded: textshaping.dll |
Jump to behavior |
Source: C:\Windows\System32\regsvr32.exe |
Section loaded: textinputframework.dll |
Jump to behavior |
Source: C:\Windows\System32\regsvr32.exe |
Section loaded: coreuicomponents.dll |
Jump to behavior |
Source: C:\Windows\System32\regsvr32.exe |
Section loaded: coremessaging.dll |
Jump to behavior |
Source: C:\Windows\System32\regsvr32.exe |
Section loaded: ntmarta.dll |
Jump to behavior |
Source: C:\Windows\System32\regsvr32.exe |
Section loaded: wintypes.dll |
Jump to behavior |
Source: C:\Windows\System32\regsvr32.exe |
Section loaded: wintypes.dll |
Jump to behavior |
Source: C:\Windows\System32\regsvr32.exe |
Section loaded: wintypes.dll |
Jump to behavior |
Source: C:\Windows\System32\loaddll64.exe |
Automated click: OK |
Source: C:\Windows\System32\regsvr32.exe |
Automated click: OK |
Source: Window Recorder |
Window detected: More than 3 window changes detected |
Source: YmAxTGvrQk.dll |
Static PE information: Image base 0x180000000 > 0x60000000 |
Source: YmAxTGvrQk.dll |
Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT |
Source: C:\Windows\System32\loaddll64.exe |
Process created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\YmAxTGvrQk.dll |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_000001F3AEBACC35 push cs; retf 0000h |
0_2_000001F3AEBACC59 |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_000001F3AEBACC6C push esi; retf 0000h |
0_2_000001F3AEBACC6D |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_000001F3AEBABBA2 push esp; ret |
0_2_000001F3AEBABBA5 |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_000001F3AEBACCA8 push 6F0000CBh; retf |
0_2_000001F3AEBACCAD |
Source: C:\Windows\System32\loaddll64.exe |
Code function: 0_2_000001F3AEBACC9C push ebx; retf |
0_2_000001F3AEBACC9D |
Source: C:\Windows\System32\regsvr32.exe |
Code function: 3_2_026CBBA2 push esp; ret |
3_2_026CBBA5 |
Source: C:\Windows\System32\regsvr32.exe |
Code function: 3_2_026CCC6C push esi; retf 0000h |
3_2_026CCC6D |
Source: C:\Windows\System32\regsvr32.exe |
Code function: 3_2_026CCC35 push cs; retf 0000h |
3_2_026CCC59 |
Source: C:\Windows\System32\regsvr32.exe |
Code function: 3_2_026CCCA8 push 6F0000CBh; retf |
3_2_026CCCAD |
Source: C:\Windows\System32\regsvr32.exe |
Code function: 3_2_026CCC9C push ebx; retf |
3_2_026CCC9D |
Source: C:\Windows\System32\regsvr32.exe |
Code function: 3_2_026D75DE push ecx; retf 003Fh |
3_2_026D763E |
Source: C:\Windows\System32\rundll32.exe |
Code function: 4_2_000002150903CC9C push ebx; retf |
4_2_000002150903CC9D |
Source: C:\Windows\System32\rundll32.exe |
Code function: 4_2_000002150903CCA8 push 6F0000CBh; retf |
4_2_000002150903CCAD |
Source: C:\Windows\System32\rundll32.exe |
Code function: 4_2_000002150903BBA2 push esp; ret |
4_2_000002150903BBA5 |
Source: C:\Windows\System32\rundll32.exe |
Code function: 4_2_000002150903CC35 push cs; retf 0000h |
4_2_000002150903CC59 |
Source: C:\Windows\System32\rundll32.exe |
Code function: 4_2_000002150903CC6C push esi; retf 0000h |
4_2_000002150903CC6D |
Source: C:\Windows\System32\rundll32.exe |
Code function: 5_2_000001A3CA65BBA2 push esp; ret |
5_2_000001A3CA65BBA5 |
Source: C:\Windows\System32\rundll32.exe |
Code function: 5_2_000001A3CA65CC35 push cs; retf 0000h |
5_2_000001A3CA65CC59 |
Source: C:\Windows\System32\rundll32.exe |
Code function: 5_2_000001A3CA65CCA8 push 6F0000CBh; retf |
5_2_000001A3CA65CCAD |
Source: C:\Windows\System32\rundll32.exe |
Code function: 5_2_000001A3CA65CC9C push ebx; retf |
5_2_000001A3CA65CC9D |
Source: C:\Windows\System32\rundll32.exe |
Code function: 5_2_000001A3CA65CC6C push esi; retf 0000h |
5_2_000001A3CA65CC6D |
Source: YmAxTGvrQk.dll |
Static PE information: section name: .text entropy: 6.80425120895919 |
Source: C:\Windows\System32\rundll32.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\rundll32.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: all processes |
Thread injection, dropped files, key value created, disk infection and DNS query: no activity detected |
Source: C:\Windows\System32\conhost.exe |
Last function: Thread delayed |
Source: all processes |
Thread injection, dropped files, key value created, disk infection and DNS query: no activity detected |
Source: C:\Windows\System32\cmd.exe |
Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\YmAxTGvrQk.dll",#1 |
Jump to behavior |
Source: C:\Windows\System32\loaddll64.exe |
Code function: GetConsoleWindow,CreateThread,GetLocaleInfoA, |
0_2_000001F3AEBA20E0 |
Source: C:\Windows\System32\regsvr32.exe |
Code function: CreateThread,GetLocaleInfoA, |
3_2_026C20E0 |
Source: C:\Windows\System32\rundll32.exe |
Code function: CreateThread,GetLocaleInfoA, |
4_2_00000215090320E0 |
Source: C:\Windows\System32\rundll32.exe |
Code function: CreateThread,GetLocaleInfoA, |
5_2_000001A3CA6520E0 |
Source: Yara match |
File source: 0.2.loaddll64.exe.7ffe13246404.1.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 4.2.rundll32.exe.7ffe13240000.0.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.loaddll64.exe.7ffe13240000.0.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 5.2.rundll32.exe.7ffe13246404.1.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 4.2.rundll32.exe.7ffe13246404.1.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.loaddll64.exe.7ffe13246404.1.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 3.2.regsvr32.exe.7ffe13246404.1.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 4.2.rundll32.exe.7ffe13246404.1.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 3.2.regsvr32.exe.7ffe13246404.1.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 5.2.rundll32.exe.7ffe13246404.1.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 5.2.rundll32.exe.7ffe13240000.0.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 3.2.regsvr32.exe.7ffe13240000.0.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 00000005.00000002.1751948158.00007FFE13246000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000005.00000002.1751603344.000001A3CA651000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000004.00000002.1751884781.00007FFE13246000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000000.00000002.1778400098.00007FFE13246000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000004.00000002.1751707509.0000021509031000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000003.00000002.1750393412.00007FFE13246000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000003.00000002.1749542743.00000000026C1000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000000.00000002.1777872156.000001F3AEBA1000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: Process Memory Space: loaddll64.exe PID: 7328, type: MEMORYSTR |
Source: Yara match |
File source: Process Memory Space: regsvr32.exe PID: 7388, type: MEMORYSTR |
Source: Yara match |
File source: Process Memory Space: rundll32.exe PID: 7404, type: MEMORYSTR |
Source: Yara match |
File source: Process Memory Space: rundll32.exe PID: 7412, type: MEMORYSTR |
Source: Yara match |
File source: 0.2.loaddll64.exe.7ffe13246404.1.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 4.2.rundll32.exe.7ffe13240000.0.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.loaddll64.exe.7ffe13240000.0.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 5.2.rundll32.exe.7ffe13246404.1.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 4.2.rundll32.exe.7ffe13246404.1.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 0.2.loaddll64.exe.7ffe13246404.1.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 3.2.regsvr32.exe.7ffe13246404.1.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 4.2.rundll32.exe.7ffe13246404.1.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 3.2.regsvr32.exe.7ffe13246404.1.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 5.2.rundll32.exe.7ffe13246404.1.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 5.2.rundll32.exe.7ffe13240000.0.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 3.2.regsvr32.exe.7ffe13240000.0.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 00000005.00000002.1751948158.00007FFE13246000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000005.00000002.1751603344.000001A3CA651000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000004.00000002.1751884781.00007FFE13246000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000000.00000002.1778400098.00007FFE13246000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000004.00000002.1751707509.0000021509031000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000003.00000002.1750393412.00007FFE13246000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000003.00000002.1749542743.00000000026C1000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000000.00000002.1777872156.000001F3AEBA1000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: Process Memory Space: loaddll64.exe PID: 7328, type: MEMORYSTR |
Source: Yara match |
File source: Process Memory Space: regsvr32.exe PID: 7388, type: MEMORYSTR |
Source: Yara match |
File source: Process Memory Space: rundll32.exe PID: 7404, type: MEMORYSTR |
Source: Yara match |
File source: Process Memory Space: rundll32.exe PID: 7412, type: MEMORYSTR |