Analysis Report
Overview
General Information |
|---|
| Joe Sandbox Version: | 20.0.0 |
| Analysis ID: | 309071 |
| Start time: | 22:05:09 |
| Joe Sandbox Product: | Cloud |
| Start date: | 12.07.2017 |
| Overall analysis duration: | 0h 10m 34s |
| Hypervisor based Inspection enabled: | false |
| Report type: | full |
| Sample file name: | abc.dll |
| Cookbook file name: | default.jbs |
| Analysis system description: | Windows 7 (Office 2010 v14.0.4, Java 1.8.0_40, Flash 16.0.0.305, Acrobat Reader 11.0.08, Internet Explorer 11, Chrome 55, Firefox 43) |
| Number of analysed new started processes analysed: | 15 |
| Number of new started drivers analysed: | 0 |
| Number of existing processes analysed: | 0 |
| Number of existing drivers analysed: | 0 |
| Number of injected processes analysed: | 0 |
| Technologies |
|
| Detection: | MAL |
| Classification: | mal100.evad.spre.expl.rans.spyw.winDLL@21/7@0/5 |
| HCA Information: |
|
| EGA Information: |
|
| Cookbook Comments: |
|
| Warnings: | Show All
|
Detection |
|---|
| Strategy | Score | Range | Reporting | Detection | |
|---|---|---|---|---|---|
| Threshold | 100 | 0 - 100 | Report FP / FN | ||
Confidence |
|---|
| Strategy | Score | Range | Further Analysis Required? | Confidence | |
|---|---|---|---|---|---|
| Threshold | 5 | 0 - 5 | false | ||
Collider Navigation |
|---|
Classification |
|---|
Analysis Advice |
|---|
| Sample drops PE files which have not been started, submit dropped PE samples for a secondary analysis to Joe Sandbox |
| Sample sleeps for a long time, analyze it with the 'Bypass long sleeps' cookbook |
Signature Overview |
|---|
Click to jump to signature section
Operating System Destruction: |
|---|
| Contains functionality to access PhysicalDrive, possible boot sector overwrite | Show sources | ||
| Source: C:\Windows\System32\rundll32.exe | Code function: | 1_2_011E8CBF | |
Cryptography: |
|---|
| Uses Microsoft's Enhanced Cryptographic Provider | Show sources | ||
| Source: C:\Windows\System32\rundll32.exe | Code function: | 1_2_011E1BA0 | |
| Source: C:\Windows\System32\rundll32.exe | Code function: | 1_2_011E1E51 | |
| Source: C:\Windows\System32\rundll32.exe | Code function: | 1_2_011E1424 | |
| Source: C:\Windows\System32\rundll32.exe | Code function: | 1_2_011E189A | |
| Source: C:\Windows\System32\rundll32.exe | Code function: | 1_2_011E1C7F | |
| Source: C:\Windows\System32\rundll32.exe | Code function: | 1_2_011E1B4E | |
Spam, unwanted Advertisements and Ransom Demands: |
|---|
| Contains functionality to import cryptographic keys (often used in ransomware) | Show sources | ||
| Source: C:\Windows\System32\rundll32.exe | Code function: | 1_2_011E1BA0 | |
| Clears the journal log | Show sources | ||
| Source: unknown | Process created: | ||
| Source: unknown | Process created: | ||
| Source: C:\Windows\System32\rundll32.exe | Process created: | ||
| Source: C:\Windows\System32\cmd.exe | Process created: | ||
| Clears the windows event log | Show sources | ||
| Source: unknown | Process created: | ||
| Source: C:\Windows\System32\rundll32.exe | Process created: | ||
| Writes a notice file (html or txt) to demand a ransom | Show sources | ||
| Source: C:\Windows\System32\rundll32.exe | File dropped: | ||
| Petya / NotPetya detected (based on Eternalblue SMBv1 Shellcode pattern) | Show sources | ||
| Source: C:\Windows\System32\rundll32.exe | Code function: | 1_2_011E3CA0 | |
Exploits: |
|---|
| Contains functionality to create an SMB header | Show sources | ||
| Source: C:\Windows\System32\rundll32.exe | Code function: | 1_2_011E2466 | |
| Connects to many different private IPs (likely to spread or exploit) | Show sources | ||
| Source: global traffic | TCP traffic: | ||
| Source: global traffic | TCP traffic: | ||
| Source: global traffic | TCP traffic: | ||
| Source: global traffic | TCP traffic: | ||
| Source: global traffic | TCP traffic: | ||
| Connects to many different private IPs via SMB (likely to spread or exploit) | Show sources | ||
| Source: global traffic | TCP traffic: | ||
| Source: global traffic | TCP traffic: | ||
| Source: global traffic | TCP traffic: | ||
| Source: global traffic | TCP traffic: | ||
| Source: global traffic | TCP traffic: | ||
Networking: |
|---|
| Contains functionality to download additional files from the internet | Show sources | ||
| Source: C:\Windows\System32\rundll32.exe | Code function: | 1_2_011E67AF | |
| Urls found in memory or binary data | Show sources | ||
| Source: rundll32.exe | String found in binary or memory: | ||
Boot Survival: |
|---|
| Contains functionality to infect the boot sector | Show sources | ||
| Source: C:\Windows\System32\rundll32.exe | Code function: | 1_2_011E1038 | |
| Source: C:\Windows\System32\rundll32.exe | Code function: | 1_2_011E8CBF | |
| Infects the boot sector of the hard disk | Show sources | ||
| Source: C:\Windows\System32\rundll32.exe | File written: | ||
| Source: C:\Windows\System32\rundll32.exe | File written: | ||
| Source: C:\Windows\System32\rundll32.exe | File written: | ||
| Source: C:\Windows\System32\rundll32.exe | File written: | ||
| Uses schtasks.exe or at.exe to add and modify task schedules | Show sources | ||
| Source: unknown | Process created: | ||
Stealing of Sensitive Information: |
|---|
| Shows file infection / information gathering behavior (enumerates multiple directory for files) | Show sources | ||
| Source: C:\Windows\System32\rundll32.exe | Directory queried: | ||
| Contains functionality to dump credential hashes (LSA Dump) | Show sources | ||
| Source: C:\Users\LUKETA~1\AppData\Local\Temp\F915.tmp | Code function: | 5_2_00F62143 | |
| Source: C:\Users\LUKETA~1\AppData\Local\Temp\F915.tmp | Code function: | 5_1_00F62143 | |
Persistence and Installation Behavior: |
|---|
| Creates license or readme file | Show sources | ||
| Source: C:\Windows\System32\rundll32.exe | File created: | ||
| Drops PE files | Show sources | ||
| Source: C:\Windows\System32\rundll32.exe | File created: | ||
| Source: C:\Windows\System32\rundll32.exe | File created: | ||
| Drops PE files to the windows directory (C:\Windows) | Show sources | ||
| Source: C:\Windows\System32\rundll32.exe | File created: | ||
| May use bcdedit to modify the Windows boot settings | Show sources | ||
| Source: loaddll32.exe | Binary or memory string: | ||
| Contains functionality to infect the boot sector | Show sources | ||
| Source: C:\Windows\System32\rundll32.exe | Code function: | 1_2_011E1038 | |
| Source: C:\Windows\System32\rundll32.exe | Code function: | 1_2_011E8CBF | |
| Infects the boot sector of the hard disk | Show sources | ||
| Source: C:\Windows\System32\rundll32.exe | File written: | ||
| Source: C:\Windows\System32\rundll32.exe | File written: | ||
| Source: C:\Windows\System32\rundll32.exe | File written: | ||
| Source: C:\Windows\System32\rundll32.exe | File written: | ||
| Writes directly to the primary disk partition (DR0) | Show sources | ||
| Source: C:\Windows\System32\rundll32.exe | File written: | ||
| Source: C:\Windows\System32\rundll32.exe | File written: | ||
| Source: C:\Windows\System32\rundll32.exe | File written: | ||
| Source: C:\Windows\System32\rundll32.exe | File written: | ||
Data Obfuscation: |
|---|
| Contains functionality to dynamically determine API calls | Show sources | ||
| Source: C:\Windows\System32\rundll32.exe | Code function: | 1_2_011E9367 | |
| Generates new code (likely due to unpacking of malware or shellcode) | Show sources | ||
| Source: C:\Windows\System32\rundll32.exe | Code execution: | ||
| PE file contains an invalid checksum | Show sources | ||
| Source: F915.tmp.2724.dr | Static PE information: | ||
| Uses code obfuscation techniques (call, push, ret) | Show sources | ||
| Source: C:\Users\LUKETA~1\AppData\Local\Temp\F915.tmp | Code function: | 5_2_00F65968 | |
| Source: C:\Users\LUKETA~1\AppData\Local\Temp\F915.tmp | Code function: | 5_1_00F65968 | |
| Contains functionality to check for running processes (XOR) | Show sources | ||
| Source: C:\Windows\System32\rundll32.exe | Code function: | 1_2_011E8677 | |
Spreading: |
|---|
| Contains functionality to enumerate / list files inside a directory | Show sources | ||
| Source: C:\Windows\System32\rundll32.exe | Code function: | 1_2_011E1973 | |
| Creates COM task schedule object (often to register a task for autostart) | Show sources | ||
| Source: C:\Windows\System32\schtasks.exe | Key opened: | ||
| Source: C:\Windows\System32\schtasks.exe | Key opened: | ||
| Source: C:\Windows\System32\schtasks.exe | Key opened: | ||
| Source: C:\Windows\System32\schtasks.exe | Key opened: | ||
| Source: C:\Windows\System32\schtasks.exe | Key opened: | ||
| Source: C:\Windows\System32\schtasks.exe | Key opened: | ||
| Source: C:\Windows\System32\schtasks.exe | Key opened: | ||
| Source: C:\Windows\System32\schtasks.exe | Key opened: | ||
| Source: C:\Windows\System32\schtasks.exe | Key opened: | ||
| Source: C:\Windows\System32\schtasks.exe | Key opened: | ||
| Source: C:\Windows\System32\schtasks.exe | Key opened: | ||
| Source: C:\Windows\System32\schtasks.exe | Key opened: | ||
| Source: C:\Windows\System32\schtasks.exe | Key opened: | ||
| Source: C:\Windows\System32\schtasks.exe | Key opened: | ||
| Source: C:\Windows\System32\schtasks.exe | Key opened: | ||
| Source: C:\Windows\System32\schtasks.exe | Key opened: | ||
| Source: C:\Windows\System32\schtasks.exe | Key opened: | ||
| Source: C:\Windows\System32\schtasks.exe | Key opened: | ||
| Source: C:\Windows\System32\schtasks.exe | Key opened: | ||
| Source: C:\Windows\System32\schtasks.exe | Key opened: | ||
| Source: C:\Windows\System32\schtasks.exe | Key opened: | ||
| Source: C:\Windows\System32\schtasks.exe | Key opened: | ||
| Source: C:\Windows\System32\schtasks.exe | Key opened: | ||
| Source: C:\Windows\System32\schtasks.exe | Key opened: | ||
| Source: C:\Windows\System32\schtasks.exe | Key opened: | ||
| Source: C:\Windows\System32\schtasks.exe | Key opened: | ||
| Enumerates the file system | Show sources | ||
| Source: C:\Windows\System32\rundll32.exe | File opened: | ||
| Source: C:\Windows\System32\rundll32.exe | File opened: | ||
| Source: C:\Windows\System32\rundll32.exe | File opened: | ||
| Source: C:\Windows\System32\rundll32.exe | File opened: | ||
| Source: C:\Windows\System32\rundll32.exe | File opened: | ||
| Source: C:\Windows\System32\rundll32.exe | File opened: | ||
| Shows file infection / information gathering behavior (enumerates multiple directory for files) | Show sources | ||
| Source: C:\Windows\System32\rundll32.exe | Directory queried: | ||
| Contains functionality to enumerate network shares of other devices | Show sources | ||
| Source: C:\Windows\System32\rundll32.exe | Code function: | 1_2_011E9987 | |
| Contains functionality to spread via wmic.exe | Show sources | ||
| Source: C:\Windows\System32\rundll32.exe | Code function: | 1_2_011E98AB | |
System Summary: |
|---|
| Contains modern PE file flags such as dynamic base (ASLR) or NX | Show sources | ||
| Source: abc.dll | Static PE information: | ||
| Binary contains paths to debug symbols | Show sources | ||
| Source: | Binary string: | ||
| Source: | Binary string: | ||
| Binary contains paths to development resources | Show sources | ||
| Source: rundll32.exe, abc.dll | Binary or memory string: | ||
| Classification label | Show sources | ||
| Source: classification engine | Classification label: | ||
| Contains functionality to adjust token privileges (e.g. debug / backup) | Show sources | ||
| Source: C:\Windows\System32\rundll32.exe | Code function: | 1_2_011E81BA | |
| Contains functionality to enum processes or threads | Show sources | ||
| Source: C:\Windows\System32\rundll32.exe | Code function: | 1_2_011E8677 | |
| Contains functionality to load and extract PE file embedded resources | Show sources | ||
| Source: C:\Windows\System32\rundll32.exe | Code function: | 1_2_011E85D0 | |
| Creates temporary files | Show sources | ||
| Source: C:\Windows\System32\rundll32.exe | File created: | ||
| PE file has an executable .text section and no other executable section | Show sources | ||
| Source: abc.dll | Static PE information: | ||
| Reads software policies | Show sources | ||
| Source: C:\Windows\System32\loaddll32.exe | Key opened: | ||
| Runs a DLL by calling functions | Show sources | ||
| Source: unknown | Process created: | ||
| Spawns processes | Show sources | ||
| Source: unknown | Process created: | ||
| Source: unknown | Process created: | ||
| Source: unknown | Process created: | ||
| Source: unknown | Process created: | ||
| Source: unknown | Process created: | ||
| Source: unknown | Process created: | ||
| Source: unknown | Process created: | ||
| Source: unknown | Process created: | ||
| Source: unknown | Process created: | ||
| Source: unknown | Process created: | ||
| Source: unknown | Process created: | ||
| Source: C:\Windows\System32\loaddll32.exe | Process created: | ||
| Source: C:\Windows\System32\rundll32.exe | Process created: | ||
| Source: C:\Windows\System32\rundll32.exe | Process created: | ||
| Source: C:\Windows\System32\rundll32.exe | Process created: | ||
| Source: C:\Windows\System32\cmd.exe | Process created: | ||
| Source: C:\Windows\System32\cmd.exe | Process created: | ||
| Source: C:\Windows\System32\cmd.exe | Process created: | ||
| Source: C:\Windows\System32\cmd.exe | Process created: | ||
| Source: C:\Windows\System32\cmd.exe | Process created: | ||
| Source: C:\Windows\System32\cmd.exe | Process created: | ||
| Uses an in-process (OLE) Automation server | Show sources | ||
| Source: C:\Windows\System32\schtasks.exe | Key value queried: | ||
| PE file has section (not .text) which is very likely to contain packed code (zlib compression ratio < 0.011) | Show sources | ||
| Source: abc.dll | Static PE information: | ||
| Contains functionality to call native functions | Show sources | ||
| Source: C:\Windows\System32\rundll32.exe | Code function: | 1_2_011E7DEB | |
| Source: C:\Users\LUKETA~1\AppData\Local\Temp\F915.tmp | Code function: | 5_2_00F618D9 | |
| Source: C:\Users\LUKETA~1\AppData\Local\Temp\F915.tmp | Code function: | 5_2_00F61D5F | |
| Source: C:\Users\LUKETA~1\AppData\Local\Temp\F915.tmp | Code function: | 5_1_00F618D9 | |
| Source: C:\Users\LUKETA~1\AppData\Local\Temp\F915.tmp | Code function: | 5_1_00F61D5F | |
| Contains functionality to communicate with device drivers | Show sources | ||
| Source: C:\Windows\System32\rundll32.exe | Code function: | 1_2_011E8D5A | |
| Contains functionality to launch a process as a different user | Show sources | ||
| Source: C:\Windows\System32\rundll32.exe | Code function: | 1_2_011E9987 | |
| Contains functionality to shutdown / reboot the system | Show sources | ||
| Source: C:\Windows\System32\rundll32.exe | Code function: | 1_2_011E7DEB | |
| Creates files inside the system directory | Show sources | ||
| Source: C:\Windows\System32\rundll32.exe | File created: | ||
| Enables security privileges | Show sources | ||
| Source: C:\Windows\System32\wevtutil.exe | Process token adjusted: | ||
| PE file contains executable resources (Code or Archives) | Show sources | ||
| Source: dllhost.dat.2724.dr | Static PE information: | ||
| PE file has an invalid certificate | Show sources | ||
| Source: abc.dll | Static PE information: | ||
| Reads the hosts file | Show sources | ||
| Source: C:\Windows\System32\rundll32.exe | File read: | ||
| Source: C:\Windows\System32\rundll32.exe | File read: | ||
| Source: C:\Windows\System32\rundll32.exe | File read: | ||
| Source: C:\Windows\System32\rundll32.exe | File read: | ||
| Source: C:\Windows\System32\rundll32.exe | File read: | ||
| Source: C:\Windows\System32\rundll32.exe | File read: | ||
| Source: C:\Windows\System32\rundll32.exe | File read: | ||
| Source: C:\Windows\System32\rundll32.exe | File read: | ||
| Source: C:\Windows\System32\rundll32.exe | File read: | ||
| Source: C:\Windows\System32\rundll32.exe | File read: | ||
| Contains functionality to create processes via WMI | Show sources | ||
| Performs an instant shutdown (NtRaiseHardError) | Show sources | ||
| Source: C:\Windows\System32\rundll32.exe | Hard error raised: | ||
HIPS / PFW / Operating System Protection Evasion: |
|---|
| Contains functionality to add an ACL to a security descriptor | Show sources | ||
| Source: C:\Windows\System32\rundll32.exe | Code function: | 1_2_011E73FD | |
| May try to detect the Windows Explorer process (often used for injection) | Show sources | ||
| Source: rundll32.exe | Binary or memory string: | ||
| Source: rundll32.exe | Binary or memory string: | ||
| Source: rundll32.exe | Binary or memory string: | ||
Anti Debugging: |
|---|
| Contains functionality to register its own exception handler | Show sources | ||
| Source: C:\Users\LUKETA~1\AppData\Local\Temp\F915.tmp | Code function: | 5_2_00F64CD8 | |
| Source: C:\Users\LUKETA~1\AppData\Local\Temp\F915.tmp | Code function: | 5_2_00F65F8E | |
| Source: C:\Users\LUKETA~1\AppData\Local\Temp\F915.tmp | Code function: | 5_2_00F64AB6 | |
| Source: C:\Users\LUKETA~1\AppData\Local\Temp\F915.tmp | Code function: | 5_1_00F64CD8 | |
| Source: C:\Users\LUKETA~1\AppData\Local\Temp\F915.tmp | Code function: | 5_1_00F65F8E | |
| Source: C:\Users\LUKETA~1\AppData\Local\Temp\F915.tmp | Code function: | 5_1_00F64AB6 | |
| Checks for kernel debuggers (NtQuerySystemInformation(SystemKernelDebuggerInformation)) | Show sources | ||
| Source: C:\Windows\System32\rundll32.exe | System information queried: | ||
| Contains functionality to check if a debugger is running (IsDebuggerPresent) | Show sources | ||
| Source: C:\Users\LUKETA~1\AppData\Local\Temp\F915.tmp | Code function: | 5_2_00F65F8E | |
| Contains functionality to dynamically determine API calls | Show sources | ||
| Source: C:\Windows\System32\rundll32.exe | Code function: | 1_2_011E9367 | |
| Contains functionality which may be used to detect a debugger (GetProcessHeap) | Show sources | ||
| Source: C:\Windows\System32\rundll32.exe | Code function: | 1_2_011EA073 | |
| Enables debug privileges | Show sources | ||
| Source: C:\Windows\System32\rundll32.exe | Process token adjusted: | ||
| Source: C:\Users\LUKETA~1\AppData\Local\Temp\F915.tmp | Process token adjusted: | ||
Malware Analysis System Evasion: |
|---|
| Contains functionality to enumerate / list files inside a directory | Show sources | ||
| Source: C:\Windows\System32\rundll32.exe | Code function: | 1_2_011E1973 | |
| Program exit points | Show sources | ||
| Source: C:\Windows\System32\rundll32.exe | API call chain: | graph_1-5851 | ||
| Source: C:\Windows\System32\rundll32.exe | API call chain: | graph_1-5775 | ||
| Source: C:\Windows\System32\rundll32.exe | API call chain: | graph_1-5906 | ||
| Queries a list of all running processes | Show sources | ||
| Source: C:\Windows\System32\rundll32.exe | Process information queried: | ||
| Contains long sleeps (>= 3 min) | Show sources | ||
| Source: C:\Windows\System32\loaddll32.exe | Thread delayed: | ||
| Enumerates the file system | Show sources | ||
| Source: C:\Windows\System32\rundll32.exe | File opened: | ||
| Source: C:\Windows\System32\rundll32.exe | File opened: | ||
| Source: C:\Windows\System32\rundll32.exe | File opened: | ||
| Source: C:\Windows\System32\rundll32.exe | File opened: | ||
| Source: C:\Windows\System32\rundll32.exe | File opened: | ||
| Source: C:\Windows\System32\rundll32.exe | File opened: | ||
| Found decision node followed by non-executed suspicious APIs | Show sources | ||
| Source: C:\Windows\System32\rundll32.exe | Decision node followed by non-executed suspicious API: | graph_1-7255 | ||
| Found dropped PE file which has not been started or loaded | Show sources | ||
| Source: C:\Windows\System32\rundll32.exe | Dropped PE file which has not been started: | ||
| Source: C:\Windows\System32\rundll32.exe | Dropped PE file which has not been started: | ||
| Found evasive API chain (may stop execution after checking a module file name) | Show sources | ||
| Source: C:\Users\LUKETA~1\AppData\Local\Temp\F915.tmp | Evasive API call chain: | graph_5-3844 | ||
| May sleep (evasive loops) to hinder dynamic analysis | Show sources | ||
| Source: C:\Windows\System32\loaddll32.exe TID: 2720 | Thread sleep time: | ||
| Source: C:\Windows\System32\rundll32.exe TID: 2792 | Thread sleep time: | ||
| Source: C:\Windows\System32\rundll32.exe TID: 2728 | Thread sleep time: | ||
| Source: C:\Windows\System32\rundll32.exe TID: 2852 | Thread sleep time: | ||
| Source: C:\Windows\System32\rundll32.exe TID: 2728 | Thread sleep time: | ||
| Source: C:\Windows\System32\rundll32.exe TID: 2852 | Thread sleep time: | ||
| Source: C:\Windows\System32\rundll32.exe TID: 2776 | Thread sleep time: | ||
| Source: C:\Windows\System32\rundll32.exe TID: 2852 | Thread sleep time: | ||
| Source: C:\Windows\System32\rundll32.exe TID: 2852 | Thread sleep time: | ||
| Source: C:\Windows\System32\rundll32.exe TID: 2856 | Thread sleep time: | ||
| Source: C:\Windows\System32\rundll32.exe TID: 2728 | Thread sleep time: | ||
| Source: C:\Windows\System32\rundll32.exe TID: 2852 | Thread sleep time: | ||
| Source: C:\Windows\System32\rundll32.exe TID: 2848 | Thread sleep time: | ||
| Source: C:\Windows\System32\rundll32.exe TID: 2776 | Thread sleep time: | ||
| Queries disk information (often used to detect virtual machines) | Show sources | ||
| Source: C:\Windows\System32\rundll32.exe | File opened: | ||
Hooking and other Techniques for Hiding and Protection: |
|---|
| Disables application error messsages (SetErrorMode) | Show sources | ||
| Source: C:\Windows\System32\loaddll32.exe | Process information set: | ||
| Source: C:\Windows\System32\loaddll32.exe | Process information set: | ||
| Source: C:\Windows\System32\loaddll32.exe | Process information set: | ||
| Source: C:\Windows\System32\rundll32.exe | Process information set: | ||
| Source: C:\Windows\System32\rundll32.exe | Process information set: | ||
| Source: C:\Windows\System32\rundll32.exe | Process information set: | ||
| Source: C:\Windows\System32\rundll32.exe | Process information set: | ||
| Source: C:\Windows\System32\rundll32.exe | Process information set: | ||
| Source: C:\Windows\System32\rundll32.exe | Process information set: | ||
| Source: C:\Windows\System32\rundll32.exe | Process information set: | ||
| Source: C:\Windows\System32\rundll32.exe | Process information set: | ||
| Source: C:\Windows\System32\cmd.exe | Process information set: | ||
| Source: C:\Windows\System32\schtasks.exe | Process information set: | ||
| Source: C:\Windows\System32\schtasks.exe | Process information set: | ||
| Source: C:\Windows\System32\schtasks.exe | Process information set: | ||
| Source: C:\Windows\System32\schtasks.exe | Process information set: | ||
| Source: C:\Windows\System32\cmd.exe | Process information set: | ||
| Source: C:\Windows\System32\cmd.exe | Process information set: | ||
| Source: C:\Windows\System32\cmd.exe | Process information set: | ||
| Source: C:\Windows\System32\cmd.exe | Process information set: | ||
| Source: C:\Windows\System32\cmd.exe | Process information set: | ||
| Source: C:\Windows\System32\cmd.exe | Process information set: | ||
| Source: C:\Windows\System32\cmd.exe | Process information set: | ||
| Source: C:\Windows\System32\cmd.exe | Process information set: | ||
| Source: C:\Windows\System32\cmd.exe | Process information set: | ||
| Extensive use of GetProcAddress (often used to hide API calls) | Show sources | ||
| Source: C:\Users\LUKETA~1\AppData\Local\Temp\F915.tmp | Code function: | 5_2_00F62566 | |
Language, Device and Operating System Detection: |
|---|
| Contains functionality to create pipes for IPC | Show sources | ||
| Source: C:\Windows\System32\rundll32.exe | Code function: | 1_2_011E73FD | |
| Contains functionality to query local / system time | Show sources | ||
| Source: C:\Windows\System32\rundll32.exe | Code function: | 1_2_011E84DF | |
| Contains functionality to query windows version | Show sources | ||
| Source: C:\Windows\System32\rundll32.exe | Code function: | 1_2_011E7DEB | |
| Queries the cryptographic machine GUID | Show sources | ||
| Source: C:\Windows\System32\rundll32.exe | Key value queried: | ||
Behavior Graph |
|---|
Yara Overview |
|---|
| No Yara matches |
|---|
Screenshot |
|---|
Startup |
|---|
|
Created / dropped Files |
|---|
| File Path | Type and Hashes | Malicious |
|---|---|---|
| true | |
| true | |
| true | |
| false | |
| false | |
| true | |
| true |
Contacted Domains/Contacted IPs |
|---|
Contacted Domains |
|---|
| No contacted domains info |
|---|
Contacted IPs |
|---|
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
| IP | Country | Flag | ASN | ASN Name | Malicious |
|---|---|---|---|---|---|
| 192.168.1.1 | unknown | unknown | unknown | false | |
| 192.168.1.0 | unknown | unknown | unknown | false | |
| 192.168.1.2 | unknown | unknown | unknown | false | |
| 192.168.1.16 | unknown | unknown | unknown | false | |
| 192.168.1.13 | unknown | unknown | unknown | false |
Static File Info |
|---|
General | |
|---|---|
| File type: | |
| TrID: |
|
| File name: | abc.dll |
| File size: | 362360 |
| MD5: | 71b6a493388e7d0b40c83ce903bc6b04 |
| SHA1: | 34f917aaba5684fbe56d3c57d48ef2a1aa7cf06d |
| SHA256: | 027cc450ef5f8c5f653329641ec1fed91f694e0d229928963b30f6b0d7d3a745 |
| SHA512: | 072205eca5099d9269f358fe534b370ff21a4f12d7938d6d2e2713f69310f0698e53b8aff062849f0b2a521f68bee097c1840993825d2a5a3aa8cf4145911c6f |
| File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........8/.jV|.jV|.jV|&$.|.jV|...|.jV|...|.jV|...|.jV|...|.jV|.jW|.jV|...|.jV|...|.jV|...|.jV|Rich.jV|................PE..L...\(FY... |
File Icon |
|---|
Static PE Info |
|---|
General | |
|---|---|
| Entrypoint: | 0x10007d39 |
| Entrypoint Section: | .text |
| Digitally signed: | true |
| Imagebase: | 0x10000000 |
| Subsystem: | windows cui |
| Image File Characteristics: | 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL |
| DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT |
| Time Stamp: | 0x5946285C [Sun Jun 18 07:14:36 2017 UTC] |
| TLS Callbacks: | |
| CLR (.Net) Version: | |
| OS Version Major: | 5 |
| OS Version Minor: | 1 |
| File Version Major: | 5 |
| File Version Minor: | 1 |
| Subsystem Version Major: | 5 |
| Subsystem Version Minor: | 1 |
| Import Hash: | 52dd60b5f3c9e2f17c2e303e8c8d4eab |
Authenticode Signature |
|---|
| Signature Valid: | false |
| Signature Issuer: | CN=Microsoft Code Signing PCA, O=Microsoft Corporation, L=Redmond, S=Washington, C=US |
| Signature Validation Error: | The digital signature of the object did not verify |
| Error Number: | -2146869232 |
| Not Before, Not After |
|
| Subject Chain |
|
| Version: | 3 |
| Thumbprint: | 9617094A1CFB59AE7C1F7DFDB6739E4E7C40508F |
| Serial: | 6101CF3E00000000000F |
Entrypoint Preview |
|---|
| Instruction |
|---|
| push ebp |
| mov ebp, esp |
| mov eax, dword ptr [ebp+0Ch] |
| dec eax |
| jne 0E4F04A1h |
| mov eax, dword ptr [ebp+08h] |
| push eax |
| mov dword ptr [1001F120h], eax |
| call dword ptr [1000D0E0h] |
| xor eax, eax |
| inc eax |
| pop ebp |
| retn 000Ch |
| push ebp |
| mov ebp, esp |
| call 0E4F12FBh |
| mov ecx, dword ptr [ebp+08h] |
| test ecx, ecx |
| je 0E4F0494h |
| mov dword ptr [ecx], eax |
| xor eax, eax |
| pop ebp |
| retn 0004h |
| push ebp |
| mov ebp, esp |
| sub esp, 00000618h |
| push esi |
| xor esi, esi |
| cmp dword ptr [1001F0FCh], esi |
| je 0E4F04F0h |
| cmp dword ptr [1001F11Ch], esi |
| je 0E4F04E8h |
| mov eax, dword ptr [ebp+08h] |
| lea edx, dword ptr [eax+02h] |
| mov cx, word ptr [eax] |
| add eax, 02h |
| cmp cx, si |
| jne 0E4F0487h |
| sub eax, edx |
| sar eax, 1 |
| push eax |
| push dword ptr [ebp+08h] |
| push 100140D0h |
| call 0E4F1DAEh |
| test eax, eax |
| je 0E4F04C1h |
| push 00000BB8h |
| call dword ptr [1000D188h] |
| lea eax, dword ptr [ebp-00000618h] |
| push eax |
| call 0E4F09ECh |
| test eax, eax |
| je 0E4F04A6h |
| lea eax, dword ptr [ebp-00000618h] |
| push eax |
| call dword ptr [1000D228h] |
| test eax, eax |
| je 0E4F0495h |
| xor esi, esi |
| inc esi |
| mov eax, esi |
| pop esi |
| leave |
| retn 0004h |
| int3 |
| int3 |
| int3 |
| push ebp |
| mov ebp, esp |
| mov eax, 00004A18h |
| call 0E4F2B8Dh |
Data Directories |
|---|
| Name | Virtual Address | Virtual Size | Is in Section |
|---|---|---|---|
| IMAGE_DIRECTORY_ENTRY_EXPORT | 0x15510 | 0x36 | .rdata |
| IMAGE_DIRECTORY_ENTRY_IMPORT | 0x145f0 | 0x118 | .rdata |
| IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x20000 | 0x3c738 | .rsrc |
| IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
| IMAGE_DIRECTORY_ENTRY_SECURITY | 0x57000 | 0x1778 | .rsrc |
| IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x5d000 | 0x844 | .reloc |
| IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
| IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
| IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
| IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
| IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
| IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
| IMAGE_DIRECTORY_ENTRY_IAT | 0xd000 | 0x2c8 | .rdata |
| IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
| IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
| IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Sections |
|---|
| Name | Virtual Address | Virtual Size | Raw Size | Entropy | Xored PE | ZLIB Complexity | File Type | Characteristics |
|---|---|---|---|---|---|---|---|---|
| .text | 0x1000 | 0xbd63 | 0xbe00 | False | 0.597512335526 | ump; data | 6.54653060932 | IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ |
| .rdata | 0xd000 | 0x8546 | 0x8600 | False | 0.615875699627 | ump; data | 6.99212929533 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
| .data | 0x16000 | 0x9b4a | 0x5200 | False | 0.457459984756 | ump; data | 5.42698913823 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ |
| .rsrc | 0x20000 | 0x3c738 | 0x3c800 | False | 0.999495577221 | ump; data | 7.9982879669 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
| .reloc | 0x5d000 | 0xc02 | 0xe00 | False | 0.522321428571 | ump; data | 4.77168126134 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Resources |
|---|
| Name | RVA | Size | Type | Language | Country |
|---|---|---|---|---|---|
| RT_RCDATA | 0x200e8 | 0x617e | ump; data | English | United States |
| RT_RCDATA | 0x26268 | 0x6b22 | ump; data | English | United States |
| RT_RCDATA | 0x2cd8c | 0x2ec75 | ump; data | English | United States |
| RT_RCDATA | 0x5ba04 | 0xd33 | ump; data | English | United States |
Imports |
|---|
| DLL | Import |
|---|---|
| KERNEL32.dll | ConnectNamedPipe, GetModuleHandleW, CreateNamedPipeW, TerminateThread, DisconnectNamedPipe, FlushFileBuffers, GetTempPathW, GetProcAddress, DeleteFileW, FreeLibrary, GlobalAlloc, LoadLibraryW, GetComputerNameExW, GlobalFree, ExitProcess, GetVersionExW, GetModuleFileNameW, DisableThreadLibraryCalls, ResumeThread, GetEnvironmentVariableW, GetFileSize, SetFilePointer, SetLastError, LoadResource, GetCurrentThread, OpenProcess, GetSystemDirectoryW, SizeofResource, GetLocalTime, Process32FirstW, LockResource, Process32NextW, GetModuleHandleA, lstrcatW, CreateToolhelp32Snapshot, GetCurrentProcess, VirtualFree, VirtualAlloc, LoadLibraryA, VirtualProtect, WideCharToMultiByte, GetExitCodeProcess, WaitForMultipleObjects, CreateProcessW, PeekNamedPipe, GetTempFileNameW, InterlockedExchange, LeaveCriticalSection, MultiByteToWideChar, CreateFileA, GetTickCount, CreateThread, LocalFree, FindNextFileW, CreateFileMappingW, LocalAlloc, FindClose, GetFileSizeEx, CreateFileW, Sleep, FlushViewOfFile, GetLogicalDrives, WaitForSingleObject, GetDriveTypeW, UnmapViewOfFile, MapViewOfFile, FindFirstFileW, CloseHandle, DeviceIoControl, GetLastError, GetSystemDirectoryA, ReadFile, WriteFile, GetProcessHeap, InitializeCriticalSection, HeapReAlloc, GetWindowsDirectoryW, EnterCriticalSection, HeapFree, SetFilePointerEx, HeapAlloc, FindResourceW |
| USER32.dll | ExitWindowsEx, wsprintfA, wsprintfW |
| ADVAPI32.dll | CryptGenRandom, CryptAcquireContextA, CryptExportKey, CryptAcquireContextW, CreateProcessAsUserW, InitiateSystemShutdownExW, DuplicateTokenEx, SetTokenInformation, GetTokenInformation, GetSidSubAuthorityCount, OpenThreadToken, GetSidSubAuthority, AdjustTokenPrivileges, LookupPrivilegeValueW, OpenProcessToken, SetThreadToken, CredEnumerateW, CredFree, SetSecurityDescriptorDacl, InitializeSecurityDescriptor, CryptDestroyKey, CryptGenKey, CryptEncrypt, CryptImportKey, CryptSetKeyParam, CryptReleaseContext |
| SHELL32.dll | CommandLineToArgvW, SHGetFolderPathW |
| ole32.dll | CoCreateGuid, CoTaskMemFree, StringFromCLSID |
| CRYPT32.dll | CryptStringToBinaryW, CryptBinaryToStringW, CryptDecodeObjectEx |
| SHLWAPI.dll | PathAppendW, StrToIntW, PathFindFileNameW, PathFileExistsW, StrCmpW, StrCmpIW, StrChrW, StrCatW, StrStrW, PathFindExtensionW, PathCombineW, StrStrIW |
| IPHLPAPI.DLL | GetIpNetTable, GetAdaptersInfo |
| WS2_32.dll | inet_ntoa, gethostbyname, __WSAFDIsSet, ntohl, ioctlsocket, connect, inet_addr, select, recv, send, htons, closesocket, socket, WSAStartup |
| MPR.dll | WNetOpenEnumW, WNetEnumResourceW, WNetCancelConnection2W, WNetAddConnection2W, WNetCloseEnum |
| NETAPI32.dll | NetServerEnum, NetApiBufferFree, NetServerGetInfo |
| DHCPSAPI.DLL | DhcpEnumSubnetClients, DhcpRpcFreeMemory, DhcpGetSubnetInfo, DhcpEnumSubnets |
| msvcrt.dll | malloc, _itoa, free, memset, rand, memcpy |
Possible Origin |
|---|
| Language of compilation system | Country where language is spoken | Map |
|---|---|---|
| English | United States |
Network Behavior |
|---|
TCP Packets |
|---|
| Timestamp | Source Port | Dest Port | Source IP | Dest IP |
|---|---|---|---|---|
| Jul 12, 2017 22:07:23.542896986 MESZ | 49235 | 80 | 192.168.1.16 | 192.168.1.2 |
| Jul 12, 2017 22:07:23.542942047 MESZ | 80 | 49235 | 192.168.1.2 | 192.168.1.16 |
| Jul 12, 2017 22:07:24.085721016 MESZ | 49235 | 80 | 192.168.1.16 | 192.168.1.2 |
| Jul 12, 2017 22:07:24.085777044 MESZ | 80 | 49235 | 192.168.1.2 | 192.168.1.16 |
| Jul 12, 2017 22:07:24.585623980 MESZ | 49235 | 80 | 192.168.1.16 | 192.168.1.2 |
| Jul 12, 2017 22:07:24.585654020 MESZ | 80 | 49235 | 192.168.1.2 | 192.168.1.16 |
| Jul 12, 2017 22:07:24.612267017 MESZ | 49240 | 80 | 192.168.1.16 | 192.168.1.2 |
| Jul 12, 2017 22:07:24.612302065 MESZ | 80 | 49240 | 192.168.1.2 | 192.168.1.16 |
| Jul 12, 2017 22:07:25.179496050 MESZ | 49240 | 80 | 192.168.1.16 | 192.168.1.2 |
| Jul 12, 2017 22:07:25.179527044 MESZ | 80 | 49240 | 192.168.1.2 | 192.168.1.16 |
| Jul 12, 2017 22:07:25.741707087 MESZ | 49240 | 80 | 192.168.1.16 | 192.168.1.2 |
| Jul 12, 2017 22:07:25.741758108 MESZ | 80 | 49240 | 192.168.1.2 | 192.168.1.16 |
| Jul 12, 2017 22:07:26.020550966 MESZ | 49259 | 80 | 192.168.1.16 | 192.168.1.2 |
| Jul 12, 2017 22:07:26.020584106 MESZ | 80 | 49259 | 192.168.1.2 | 192.168.1.16 |
| Jul 12, 2017 22:07:26.538785934 MESZ | 49259 | 80 | 192.168.1.16 | 192.168.1.2 |
| Jul 12, 2017 22:07:26.538822889 MESZ | 80 | 49259 | 192.168.1.2 | 192.168.1.16 |
| Jul 12, 2017 22:07:27.038621902 MESZ | 49259 | 80 | 192.168.1.16 | 192.168.1.2 |
| Jul 12, 2017 22:07:27.038667917 MESZ | 80 | 49259 | 192.168.1.2 | 192.168.1.16 |
| Jul 12, 2017 22:07:27.042435884 MESZ | 49269 | 80 | 192.168.1.16 | 192.168.1.2 |
| Jul 12, 2017 22:07:27.042479992 MESZ | 80 | 49269 | 192.168.1.2 | 192.168.1.16 |
| Jul 12, 2017 22:07:27.538759947 MESZ | 49269 | 80 | 192.168.1.16 | 192.168.1.2 |
| Jul 12, 2017 22:07:27.538794994 MESZ | 80 | 49269 | 192.168.1.2 | 192.168.1.16 |
| Jul 12, 2017 22:07:28.053831100 MESZ | 49269 | 80 | 192.168.1.16 | 192.168.1.2 |
| Jul 12, 2017 22:07:28.053863049 MESZ | 80 | 49269 | 192.168.1.2 | 192.168.1.16 |
Code Manipulations |
|---|
Statistics |
|---|
CPU Usage |
|---|
Click to jump to process
Memory Usage |
|---|
Click to jump to process
High Level Behavior Distribution |
|---|
back
Click to dive into process behavior distribution
Behavior |
|---|
Click to jump to process
System Behavior |
|---|
General |
|---|
| Start time: | 22:08:08 |
| Start date: | 12/07/2017 |
| Path: | C:\Windows\System32\loaddll32.exe |
| Wow64 process (32bit): | false |
| Commandline: | |
| Imagebase: | 0x2b0000 |
| File size: | 112640 bytes |
| MD5 hash: | D2792A55032CFE825F07DCD4BEC5F40F |
| Programmed in: | C, C++ or other language |
General |
|---|
| Start time: | 22:08:08 |
| Start date: | 12/07/2017 |
| Path: | C:\Windows\System32\rundll32.exe |
| Wow64 process (32bit): | false |
| Commandline: | |
| Imagebase: | 0xf0000 |
| File size: | 44544 bytes |
| MD5 hash: | 51138BEEA3E2C21EC44D0932C71762A8 |
| Programmed in: | C, C++ or other language |
General |
|---|
| Start time: | 22:08:08 |
| Start date: | 12/07/2017 |
| Path: | C:\Windows\System32\cmd.exe |
| Wow64 process (32bit): | false |
| Commandline: | |
| Imagebase: | 0x49e20000 |
| File size: | 302592 bytes |
| MD5 hash: | AD7B9C14083B52BC532FBA5948342B98 |
| Programmed in: | C, C++ or other language |
General |
|---|
| Start time: | 22:08:09 |
| Start date: | 12/07/2017 |
| Path: | C:\Users\LUKETA~1\AppData\Local\Temp\F915.tmp |
| Wow64 process (32bit): | false |
| Commandline: | |
| Imagebase: | 0xf60000 |
| File size: | 47616 bytes |
| MD5 hash: | 2813D34F6197EB4DF42C886EC7F234A1 |
| Programmed in: | C, C++ or other language |
General |
|---|
| Start time: | 22:08:09 |
| Start date: | 12/07/2017 |
| Path: | C:\Windows\System32\schtasks.exe |
| Wow64 process (32bit): | false |
| Commandline: | |
| Imagebase: | 0x76e20000 |
| File size: | 179712 bytes |
| MD5 hash: | 2003E9B15E1C502B146DAD2E383AC1E3 |
| Programmed in: | C, C++ or other language |
General |
|---|
| Start time: | 22:08:11 |
| Start date: | 12/07/2017 |
| Path: | C:\Windows\System32\cmd.exe |
| Wow64 process (32bit): | false |
| Commandline: | |
| Imagebase: | 0x49f60000 |
| File size: | 302592 bytes |
| MD5 hash: | AD7B9C14083B52BC532FBA5948342B98 |
| Programmed in: | C, C++ or other language |
General |
|---|
| Start time: | 22:08:12 |
| Start date: | 12/07/2017 |
| Path: | C:\Windows\System32\wevtutil.exe |
| Wow64 process (32bit): | false |
| Commandline: | |
| Imagebase: | 0xda0000 |
| File size: | 175616 bytes |
| MD5 hash: | 81538B795F922B8DA6FD897EFB04B5EE |
| Programmed in: | C, C++ or other language |
General |
|---|
| Start time: | 22:08:13 |
| Start date: | 12/07/2017 |
| Path: | C:\Windows\System32\wevtutil.exe |
| Wow64 process (32bit): | false |
| Commandline: | |
| Imagebase: | 0xb10000 |
| File size: | 175616 bytes |
| MD5 hash: | 81538B795F922B8DA6FD897EFB04B5EE |
| Programmed in: | C, C++ or other language |
General |
|---|
| Start time: | 22:08:13 |
| Start date: | 12/07/2017 |
| Path: | C:\Windows\System32\wevtutil.exe |
| Wow64 process (32bit): | false |
| Commandline: | |
| Imagebase: | 0x7a0000 |
| File size: | 175616 bytes |
| MD5 hash: | 81538B795F922B8DA6FD897EFB04B5EE |
| Programmed in: | C, C++ or other language |
General |
|---|
| Start time: | 22:08:13 |
| Start date: | 12/07/2017 |
| Path: | C:\Windows\System32\wevtutil.exe |
| Wow64 process (32bit): | false |
| Commandline: | |
| Imagebase: | 0x8f0000 |
| File size: | 175616 bytes |
| MD5 hash: | 81538B795F922B8DA6FD897EFB04B5EE |
| Programmed in: | C, C++ or other language |
General |
|---|
| Start time: | 22:08:14 |
| Start date: | 12/07/2017 |
| Path: | C:\Windows\System32\fsutil.exe |
| Wow64 process (32bit): | false |
| Commandline: | |
| Imagebase: | 0xe20000 |
| File size: | 74240 bytes |
| MD5 hash: | B4834F08230A2EB7F498DE4E5B6AB814 |
| Programmed in: | C, C++ or other language |
Disassembly |
|---|
Code Analysis |
|---|
Execution Graph |
|---|
| Execution Coverage: | 24.6% |
| Dynamic/Decrypted Code Coverage: | 100% |
| Signature Coverage: | 15.7% |
| Total number of Nodes: | 1687 |
| Total number of Limit Nodes: | 18 |
Graph
Executed Functions |
|---|
| C-Code - Quality: 80% |
|
| APIs |
|
| Strings |
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 62% |
|
| APIs |
|
| Strings |
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 85% |
|
| APIs |
|
| Strings |
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 94% |
|
| APIs |
|
| Strings |
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 92% |
|
| APIs |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Strings |
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 100% |
|
| APIs |
|
| Strings |
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 100% |
|
| APIs |
|
| Strings |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 72% |
|
| APIs |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 39% |
|
| APIs |
|
| Strings |
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 100% |
|
| APIs |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| APIs |
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 100% |
|
| APIs |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 84% |
|
| APIs |
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 15% |
|
| APIs |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 95% |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 70% |
|
| APIs |
|
| Strings |
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 67% |
|
| APIs |
|
| Strings |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 100% |
|
| APIs |
|
| Strings |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 100% |
|
| APIs |
|
| Strings |
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 79% |
|
| APIs |
|
| Strings |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 84% |
|
| APIs |
|
| Strings |
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 69% |
|
| APIs |
|
| Strings |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 100% |
|
| APIs |
|
| Strings |
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 94% |
|
| APIs |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 25% |
|
| APIs |
|
| Strings |
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 74% |
|
| APIs |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 100% |
|
| APIs |
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 95% |
|
| APIs |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 100% |
|
| APIs |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 95% |
|
| APIs |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 58% |
|
| APIs |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 100% |
|
| APIs |
| Strings |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 80% |
|
| APIs |
|
| Strings |
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 44% |
|
| APIs |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 100% |
|
| APIs |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| APIs |
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 75% |
|
| APIs |
|
| Strings |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 37% |
|
| APIs |
| Strings |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| APIs |
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 100% |
|
| APIs |
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 100% |
|
| APIs |
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 61% |
|
| APIs |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 100% |
|
| APIs |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 100% |
|
| APIs |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 51% |
|
| APIs |
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 68% |
|
| APIs |
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 100% |
|
| APIs |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 37% |
|
| APIs |
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 100% |
|
| APIs |
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 96% |
|
| APIs |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 98% |
|
| APIs |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 94% |
|
| APIs |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 100% |
|
| APIs |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 96% |
|
| APIs |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 91% |
|
| APIs |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 100% |
|
| APIs |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
Non-executed Functions |
|---|
| C-Code - Quality: 100% |
|
| APIs |
|
| Strings |
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Strings |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 100% |
|
| APIs |
|
| Strings |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 77% |
|
| APIs |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 100% |
|
| APIs |
| Strings |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| APIs |
| Strings |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 37% |
|
| APIs |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 100% |
|
| APIs |
|
| Strings |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 96% |
|
| APIs |
|
| Strings |
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 100% |
|
| APIs |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 17% |
|
| APIs |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 100% |
|
| APIs |
|
| Strings |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 100% |
|
| APIs |
|
| Strings |
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 95% |
|
| APIs |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 100% |
|
| APIs |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 100% |
|
| APIs |
|
| Strings |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 100% |
|
| APIs |
|
| Strings |
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 86% |
|
| APIs |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 87% |
|
| APIs |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 100% |
|
| APIs |
| Strings |
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 100% |
|
| APIs |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 100% |
|
| APIs |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 100% |
|
| APIs |
|
| Strings |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 100% |
|
| APIs |
|
| Strings |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 85% |
|
| APIs |
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 35% |
|
| APIs |
|
| Strings |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 100% |
|
| APIs |
|
| Strings |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 100% |
|
| APIs |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 100% |
|
| APIs |
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 100% |
|
| APIs |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
Execution Graph |
|---|
| Execution Coverage: | 21.2% |
| Dynamic/Decrypted Code Coverage: | 0% |
| Signature Coverage: | 4.1% |
| Total number of Nodes: | 1285 |
| Total number of Limit Nodes: | 46 |
Graph
Executed Functions |
|---|
| C-Code - Quality: 79% |
|
| APIs |
|
| Strings |
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 50% |
|
| APIs |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 100% |
|
| APIs |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 62% |
|
| APIs |
|
| Strings |
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 56% |
|
| APIs |
|
| Strings |
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 90% |
|
| APIs |
|
| Strings |
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 80% |
|
| APIs |
|
| Strings |
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 96% |
|
| APIs |
|
| Strings |
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 76% |
|
| APIs |
|
| Strings |
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 84% |
|
| APIs |
|
| Strings |
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 78% |
|
| APIs |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 54% |
|
| APIs |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 100% |
|
| APIs |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 77% |
|
| Strings |
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 93% |
|
| APIs |
|
| Strings |
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 93% |
|
| APIs |
|
| Strings |
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 93% |
|
| APIs |
|
| Strings |
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 24% |
|
| APIs |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 21% |
|
| APIs |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 88% |
|
| APIs |
|
| Strings |
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 79% |
|
| APIs |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 90% |
|
| APIs |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 23% |
|
| APIs |
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 37% |
|
| APIs |
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 100% |
|
| APIs |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 100% |
|
| APIs |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 86% |
|
| APIs |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 100% |
|
| APIs |
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 84% |
|
| APIs |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
Non-executed Functions |
|---|
| C-Code - Quality: 97% |
|
| APIs |
|
| Strings |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 89% |
|
| APIs |
|
| Strings |
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| APIs |
|
| Strings |
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 26% |
|
| APIs |
|
| Strings |
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 69% |
|
| APIs |
|
| Strings |
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 78% |
|
| APIs |
|
| Strings |
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 80% |
|
| APIs |
|
| Strings |
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 79% |
|
| APIs |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 88% |
|
| APIs |
|
| Strings |
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 100% |
|
| APIs |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 100% |
|
| APIs |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 67% |
|
| APIs |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 79% |
|
| APIs |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 100% |
|
| APIs |
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 95% |
|
| APIs |
|
| Strings |
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 68% |
|
| APIs |
| Strings |
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 50% |
|
| APIs |
| Strings |
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 100% |
|
| APIs |
|
| Strings |
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 91% |
|
| APIs |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 58% |
|
| APIs |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 81% |
|
| APIs |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 58% |
|
| APIs |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 40% |
|
| APIs |
|
| Strings |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|
| C-Code - Quality: 91% |
|
| APIs |
|
| Strings |
|
| Memory Dump Source |
|
|
| Joe Sandbox IDA Plugin |
|