Edit tour
Windows
Analysis Report
libpkcs11-helper-1.dll.dll
Overview
General Information
Sample name: | libpkcs11-helper-1.dll.dll (renamed file extension from exe to dll) |
Original sample name: | libpkcs11-helper-1.dll.exe |
Analysis ID: | 1562676 |
MD5: | 923f2b061c22b2de64f2b228f676fe95 |
SHA1: | 40830c37101ed4f779955c8d0e1718d51714eb83 |
SHA256: | 5d15ca989acd53de9e458bca2ac226ece6c3e1cf97b070c930a9f3f4b6144a21 |
Tags: | exeuser-johnk3r |
Infos: | |
Detection
Score: | 56 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Machine Learning detection for sample
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found evasive API chain (might use process or thread times for sandbox detection)
Found potential string decryption / allocating functions
Installs a raw input device (often for capturing keystrokes)
PE file contains sections with non-standard names
Program does not show much activity (idle)
Sample execution stops while process was sleeping (likely an evasion)
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Classification
- System is w10x64
- loaddll64.exe (PID: 6564 cmdline:
loaddll64. exe "C:\Us ers\user\D esktop\lib pkcs11-hel per-1.dll. dll" MD5: 763455F9DCB24DFEECC2B9D9F8D46D52) - conhost.exe (PID: 5664 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - cmd.exe (PID: 1644 cmdline:
cmd.exe /C rundll32. exe "C:\Us ers\user\D esktop\lib pkcs11-hel per-1.dll. dll",#1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - rundll32.exe (PID: 7160 cmdline:
rundll32.e xe "C:\Use rs\user\De sktop\libp kcs11-help er-1.dll.d ll",#1 MD5: EF3179D498793BF4234F708D3BE28633) - rundll32.exe (PID: 7120 cmdline:
rundll32.e xe C:\User s\user\Des ktop\libpk cs11-helpe r-1.dll.dl l,DTLS_get _data_mtu MD5: EF3179D498793BF4234F708D3BE28633) - rundll32.exe (PID: 6632 cmdline:
rundll32.e xe C:\User s\user\Des ktop\libpk cs11-helpe r-1.dll.dl l,DTLSv1_c lient_meth od MD5: EF3179D498793BF4234F708D3BE28633) - rundll32.exe (PID: 1488 cmdline:
rundll32.e xe C:\User s\user\Des ktop\libpk cs11-helpe r-1.dll.dl l,DTLSv1_l isten MD5: EF3179D498793BF4234F708D3BE28633)
- cleanup
⊘No configs have been found
⊘No yara matches
⊘No Sigma rule has matched
⊘No Suricata rule has matched
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: |
Source: | Code function: | 0_2_00007FF8A8C578C0 |
Source: | Static PE information: |
Source: | Code function: | 0_2_00007FF8A8C5AC80 | |
Source: | Code function: | 0_2_00007FF8A8C578C0 | |
Source: | Code function: | 0_2_00007FF8A8D901C0 | |
Source: | Code function: | 0_2_00007FF8A8CFC1EC | |
Source: | Code function: |