Analysis Report
Overview
General Information |
---|
Joe Sandbox Version: | 20.0.0 |
Analysis ID: | 309071 |
Start time: | 22:05:09 |
Joe Sandbox Product: | Cloud |
Start date: | 12.07.2017 |
Overall analysis duration: | 0h 10m 34s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Sample file name: | abc.dll |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 7 (Office 2010 v14.0.4, Java 1.8.0_40, Flash 16.0.0.305, Acrobat Reader 11.0.08, Internet Explorer 11, Chrome 55, Firefox 43) |
Number of analysed new started processes analysed: | 15 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies |
|
Detection: | MAL |
Classification: | mal100.evad.spre.expl.rans.spyw.winDLL@21/7@0/5 |
HCA Information: |
|
EGA Information: |
|
Cookbook Comments: |
|
Warnings: | Show All
|
Detection |
---|
Strategy | Score | Range | Reporting | Detection | |
---|---|---|---|---|---|
Threshold | 100 | 0 - 100 | Report FP / FN |
Confidence |
---|
Strategy | Score | Range | Further Analysis Required? | Confidence | |
---|---|---|---|---|---|
Threshold | 5 | 0 - 5 | false |
Collider Navigation |
---|
Classification |
---|
Analysis Advice |
---|
Sample drops PE files which have not been started, submit dropped PE samples for a secondary analysis to Joe Sandbox |
Sample sleeps for a long time, analyze it with the 'Bypass long sleeps' cookbook |
Signature Overview |
---|
Click to jump to signature section
Operating System Destruction: |
---|
Contains functionality to access PhysicalDrive, possible boot sector overwrite | Show sources |
Source: C:\Windows\System32\rundll32.exe | Code function: | 1_2_011E8CBF |
Cryptography: |
---|
Uses Microsoft's Enhanced Cryptographic Provider | Show sources |
Source: C:\Windows\System32\rundll32.exe | Code function: | 1_2_011E1BA0 | |
Source: C:\Windows\System32\rundll32.exe | Code function: | 1_2_011E1E51 | |
Source: C:\Windows\System32\rundll32.exe | Code function: | 1_2_011E1424 | |
Source: C:\Windows\System32\rundll32.exe | Code function: | 1_2_011E189A | |
Source: C:\Windows\System32\rundll32.exe | Code function: | 1_2_011E1C7F | |
Source: C:\Windows\System32\rundll32.exe | Code function: | 1_2_011E1B4E |
Spam, unwanted Advertisements and Ransom Demands: |
---|
Contains functionality to import cryptographic keys (often used in ransomware) | Show sources |
Source: C:\Windows\System32\rundll32.exe | Code function: | 1_2_011E1BA0 |
Clears the journal log | Show sources |
Source: unknown | Process created: | ||
Source: unknown | Process created: | ||
Source: C:\Windows\System32\rundll32.exe | Process created: | ||
Source: C:\Windows\System32\cmd.exe | Process created: |
Clears the windows event log | Show sources |
Source: unknown | Process created: | ||
Source: C:\Windows\System32\rundll32.exe | Process created: |
Writes a notice file (html or txt) to demand a ransom | Show sources |
Source: C:\Windows\System32\rundll32.exe | File dropped: |
Petya / NotPetya detected (based on Eternalblue SMBv1 Shellcode pattern) | Show sources |
Source: C:\Windows\System32\rundll32.exe | Code function: | 1_2_011E3CA0 |
Exploits: |
---|
Contains functionality to create an SMB header | Show sources |
Source: C:\Windows\System32\rundll32.exe | Code function: | 1_2_011E2466 |
Connects to many different private IPs (likely to spread or exploit) | Show sources |
Source: global traffic | TCP traffic: | ||
Source: global traffic | TCP traffic: | ||
Source: global traffic | TCP traffic: | ||
Source: global traffic | TCP traffic: | ||
Source: global traffic | TCP traffic: |
Connects to many different private IPs via SMB (likely to spread or exploit) | Show sources |
Source: global traffic | TCP traffic: | ||
Source: global traffic | TCP traffic: | ||
Source: global traffic | TCP traffic: | ||
Source: global traffic | TCP traffic: | ||
Source: global traffic | TCP traffic: |
Networking: |
---|
Contains functionality to download additional files from the internet | Show sources |
Source: C:\Windows\System32\rundll32.exe | Code function: | 1_2_011E67AF |
Urls found in memory or binary data | Show sources |
Source: rundll32.exe | String found in binary or memory: |
Boot Survival: |
---|
Contains functionality to infect the boot sector | Show sources |
Source: C:\Windows\System32\rundll32.exe | Code function: | 1_2_011E1038 | |
Source: C:\Windows\System32\rundll32.exe | Code function: | 1_2_011E8CBF |
Infects the boot sector of the hard disk | Show sources |
Source: C:\Windows\System32\rundll32.exe | File written: | ||
Source: C:\Windows\System32\rundll32.exe | File written: | ||
Source: C:\Windows\System32\rundll32.exe | File written: | ||
Source: C:\Windows\System32\rundll32.exe | File written: |
Uses schtasks.exe or at.exe to add and modify task schedules | Show sources |
Source: unknown | Process created: |
Stealing of Sensitive Information: |
---|
Shows file infection / information gathering behavior (enumerates multiple directory for files) | Show sources |
Source: C:\Windows\System32\rundll32.exe | Directory queried: |
Contains functionality to dump credential hashes (LSA Dump) | Show sources |
Source: C:\Users\LUKETA~1\AppData\Local\Temp\F915.tmp | Code function: | 5_2_00F62143 | |
Source: C:\Users\LUKETA~1\AppData\Local\Temp\F915.tmp | Code function: | 5_1_00F62143 |
Persistence and Installation Behavior: |
---|
Creates license or readme file | Show sources |
Source: C:\Windows\System32\rundll32.exe | File created: |
Drops PE files | Show sources |
Source: C:\Windows\System32\rundll32.exe | File created: | ||
Source: C:\Windows\System32\rundll32.exe | File created: |
Drops PE files to the windows directory (C:\Windows) | Show sources |
Source: C:\Windows\System32\rundll32.exe | File created: |
May use bcdedit to modify the Windows boot settings | Show sources |
Source: loaddll32.exe | Binary or memory string: |
Contains functionality to infect the boot sector | Show sources |
Source: C:\Windows\System32\rundll32.exe | Code function: | 1_2_011E1038 | |
Source: C:\Windows\System32\rundll32.exe | Code function: | 1_2_011E8CBF |
Infects the boot sector of the hard disk | Show sources |
Source: C:\Windows\System32\rundll32.exe | File written: | ||
Source: C:\Windows\System32\rundll32.exe | File written: | ||
Source: C:\Windows\System32\rundll32.exe | File written: | ||
Source: C:\Windows\System32\rundll32.exe | File written: |
Writes directly to the primary disk partition (DR0) | Show sources |
Source: C:\Windows\System32\rundll32.exe | File written: | ||
Source: C:\Windows\System32\rundll32.exe | File written: | ||
Source: C:\Windows\System32\rundll32.exe | File written: | ||
Source: C:\Windows\System32\rundll32.exe | File written: |
Data Obfuscation: |
---|
Contains functionality to dynamically determine API calls | Show sources |
Source: C:\Windows\System32\rundll32.exe | Code function: | 1_2_011E9367 |
Generates new code (likely due to unpacking of malware or shellcode) | Show sources |
Source: C:\Windows\System32\rundll32.exe | Code execution: |
PE file contains an invalid checksum | Show sources |
Source: F915.tmp.2724.dr | Static PE information: |
Uses code obfuscation techniques (call, push, ret) | Show sources |
Source: C:\Users\LUKETA~1\AppData\Local\Temp\F915.tmp | Code function: | 5_2_00F65968 | |
Source: C:\Users\LUKETA~1\AppData\Local\Temp\F915.tmp | Code function: | 5_1_00F65968 |
Contains functionality to check for running processes (XOR) | Show sources |
Source: C:\Windows\System32\rundll32.exe | Code function: | 1_2_011E8677 |
Spreading: |
---|
Contains functionality to enumerate / list files inside a directory | Show sources |
Source: C:\Windows\System32\rundll32.exe | Code function: | 1_2_011E1973 |
Creates COM task schedule object (often to register a task for autostart) | Show sources |
Source: C:\Windows\System32\schtasks.exe | Key opened: | ||
Source: C:\Windows\System32\schtasks.exe | Key opened: | ||
Source: C:\Windows\System32\schtasks.exe | Key opened: | ||
Source: C:\Windows\System32\schtasks.exe | Key opened: | ||
Source: C:\Windows\System32\schtasks.exe | Key opened: | ||
Source: C:\Windows\System32\schtasks.exe | Key opened: | ||
Source: C:\Windows\System32\schtasks.exe | Key opened: | ||
Source: C:\Windows\System32\schtasks.exe | Key opened: | ||
Source: C:\Windows\System32\schtasks.exe | Key opened: | ||
Source: C:\Windows\System32\schtasks.exe | Key opened: | ||
Source: C:\Windows\System32\schtasks.exe | Key opened: | ||
Source: C:\Windows\System32\schtasks.exe | Key opened: | ||
Source: C:\Windows\System32\schtasks.exe | Key opened: | ||
Source: C:\Windows\System32\schtasks.exe | Key opened: | ||
Source: C:\Windows\System32\schtasks.exe | Key opened: | ||
Source: C:\Windows\System32\schtasks.exe | Key opened: | ||
Source: C:\Windows\System32\schtasks.exe | Key opened: | ||
Source: C:\Windows\System32\schtasks.exe | Key opened: | ||
Source: C:\Windows\System32\schtasks.exe | Key opened: | ||
Source: C:\Windows\System32\schtasks.exe | Key opened: | ||
Source: C:\Windows\System32\schtasks.exe | Key opened: | ||
Source: C:\Windows\System32\schtasks.exe | Key opened: | ||
Source: C:\Windows\System32\schtasks.exe | Key opened: | ||
Source: C:\Windows\System32\schtasks.exe | Key opened: | ||
Source: C:\Windows\System32\schtasks.exe | Key opened: | ||
Source: C:\Windows\System32\schtasks.exe | Key opened: |
Enumerates the file system | Show sources |
Source: C:\Windows\System32\rundll32.exe | File opened: | ||
Source: C:\Windows\System32\rundll32.exe | File opened: | ||
Source: C:\Windows\System32\rundll32.exe | File opened: | ||
Source: C:\Windows\System32\rundll32.exe | File opened: | ||
Source: C:\Windows\System32\rundll32.exe | File opened: | ||
Source: C:\Windows\System32\rundll32.exe | File opened: |
Shows file infection / information gathering behavior (enumerates multiple directory for files) | Show sources |
Source: C:\Windows\System32\rundll32.exe | Directory queried: |
Contains functionality to enumerate network shares of other devices | Show sources |
Source: C:\Windows\System32\rundll32.exe | Code function: | 1_2_011E9987 |
Contains functionality to spread via wmic.exe | Show sources |
Source: C:\Windows\System32\rundll32.exe | Code function: | 1_2_011E98AB |
System Summary: |
---|
Contains modern PE file flags such as dynamic base (ASLR) or NX | Show sources |
Source: abc.dll | Static PE information: |
Binary contains paths to debug symbols | Show sources |
Source: | Binary string: | ||
Source: | Binary string: |
Binary contains paths to development resources | Show sources |
Source: rundll32.exe, abc.dll | Binary or memory string: |
Classification label | Show sources |
Source: classification engine | Classification label: |
Contains functionality to adjust token privileges (e.g. debug / backup) | Show sources |
Source: C:\Windows\System32\rundll32.exe | Code function: | 1_2_011E81BA |
Contains functionality to enum processes or threads | Show sources |
Source: C:\Windows\System32\rundll32.exe | Code function: | 1_2_011E8677 |
Contains functionality to load and extract PE file embedded resources | Show sources |
Source: C:\Windows\System32\rundll32.exe | Code function: | 1_2_011E85D0 |
Creates temporary files | Show sources |
Source: C:\Windows\System32\rundll32.exe | File created: |
PE file has an executable .text section and no other executable section | Show sources |
Source: abc.dll | Static PE information: |
Reads software policies | Show sources |
Source: C:\Windows\System32\loaddll32.exe | Key opened: |
Runs a DLL by calling functions | Show sources |
Source: unknown | Process created: |
Spawns processes | Show sources |
Source: unknown | Process created: | ||
Source: unknown | Process created: | ||
Source: unknown | Process created: | ||
Source: unknown | Process created: | ||
Source: unknown | Process created: | ||
Source: unknown | Process created: | ||
Source: unknown | Process created: | ||
Source: unknown | Process created: | ||
Source: unknown | Process created: | ||
Source: unknown | Process created: | ||
Source: unknown | Process created: | ||
Source: C:\Windows\System32\loaddll32.exe | Process created: | ||
Source: C:\Windows\System32\rundll32.exe | Process created: | ||
Source: C:\Windows\System32\rundll32.exe | Process created: | ||
Source: C:\Windows\System32\rundll32.exe | Process created: | ||
Source: C:\Windows\System32\cmd.exe | Process created: | ||
Source: C:\Windows\System32\cmd.exe | Process created: | ||
Source: C:\Windows\System32\cmd.exe | Process created: | ||
Source: C:\Windows\System32\cmd.exe | Process created: | ||
Source: C:\Windows\System32\cmd.exe | Process created: | ||
Source: C:\Windows\System32\cmd.exe | Process created: |
Uses an in-process (OLE) Automation server | Show sources |
Source: C:\Windows\System32\schtasks.exe | Key value queried: |
PE file has section (not .text) which is very likely to contain packed code (zlib compression ratio < 0.011) | Show sources |
Source: abc.dll | Static PE information: |
Contains functionality to call native functions | Show sources |
Source: C:\Windows\System32\rundll32.exe | Code function: | 1_2_011E7DEB | |
Source: C:\Users\LUKETA~1\AppData\Local\Temp\F915.tmp | Code function: | 5_2_00F618D9 | |
Source: C:\Users\LUKETA~1\AppData\Local\Temp\F915.tmp | Code function: | 5_2_00F61D5F | |
Source: C:\Users\LUKETA~1\AppData\Local\Temp\F915.tmp | Code function: | 5_1_00F618D9 | |
Source: C:\Users\LUKETA~1\AppData\Local\Temp\F915.tmp | Code function: | 5_1_00F61D5F |
Contains functionality to communicate with device drivers | Show sources |
Source: C:\Windows\System32\rundll32.exe | Code function: | 1_2_011E8D5A |
Contains functionality to launch a process as a different user | Show sources |
Source: C:\Windows\System32\rundll32.exe | Code function: | 1_2_011E9987 |
Contains functionality to shutdown / reboot the system | Show sources |
Source: C:\Windows\System32\rundll32.exe | Code function: | 1_2_011E7DEB |
Creates files inside the system directory | Show sources |
Source: C:\Windows\System32\rundll32.exe | File created: |
Enables security privileges | Show sources |
Source: C:\Windows\System32\wevtutil.exe | Process token adjusted: |
PE file contains executable resources (Code or Archives) | Show sources |
Source: dllhost.dat.2724.dr | Static PE information: |
PE file has an invalid certificate | Show sources |
Source: abc.dll | Static PE information: |
Reads the hosts file | Show sources |
Source: C:\Windows\System32\rundll32.exe | File read: | ||
Source: C:\Windows\System32\rundll32.exe | File read: | ||
Source: C:\Windows\System32\rundll32.exe | File read: | ||
Source: C:\Windows\System32\rundll32.exe | File read: | ||
Source: C:\Windows\System32\rundll32.exe | File read: | ||
Source: C:\Windows\System32\rundll32.exe | File read: | ||
Source: C:\Windows\System32\rundll32.exe | File read: | ||
Source: C:\Windows\System32\rundll32.exe | File read: | ||
Source: C:\Windows\System32\rundll32.exe | File read: | ||
Source: C:\Windows\System32\rundll32.exe | File read: |
Contains functionality to create processes via WMI | Show sources |
Performs an instant shutdown (NtRaiseHardError) | Show sources |
Source: C:\Windows\System32\rundll32.exe | Hard error raised: |
HIPS / PFW / Operating System Protection Evasion: |
---|
Contains functionality to add an ACL to a security descriptor | Show sources |
Source: C:\Windows\System32\rundll32.exe | Code function: | 1_2_011E73FD |
May try to detect the Windows Explorer process (often used for injection) | Show sources |
Source: rundll32.exe | Binary or memory string: | ||
Source: rundll32.exe | Binary or memory string: | ||
Source: rundll32.exe | Binary or memory string: |
Anti Debugging: |
---|
Contains functionality to register its own exception handler | Show sources |
Source: C:\Users\LUKETA~1\AppData\Local\Temp\F915.tmp | Code function: | 5_2_00F64CD8 | |
Source: C:\Users\LUKETA~1\AppData\Local\Temp\F915.tmp | Code function: | 5_2_00F65F8E | |
Source: C:\Users\LUKETA~1\AppData\Local\Temp\F915.tmp | Code function: | 5_2_00F64AB6 | |
Source: C:\Users\LUKETA~1\AppData\Local\Temp\F915.tmp | Code function: | 5_1_00F64CD8 | |
Source: C:\Users\LUKETA~1\AppData\Local\Temp\F915.tmp | Code function: | 5_1_00F65F8E | |
Source: C:\Users\LUKETA~1\AppData\Local\Temp\F915.tmp | Code function: | 5_1_00F64AB6 |
Checks for kernel debuggers (NtQuerySystemInformation(SystemKernelDebuggerInformation)) | Show sources |
Source: C:\Windows\System32\rundll32.exe | System information queried: |
Contains functionality to check if a debugger is running (IsDebuggerPresent) | Show sources |
Source: C:\Users\LUKETA~1\AppData\Local\Temp\F915.tmp | Code function: | 5_2_00F65F8E |
Contains functionality to dynamically determine API calls | Show sources |
Source: C:\Windows\System32\rundll32.exe | Code function: | 1_2_011E9367 |
Contains functionality which may be used to detect a debugger (GetProcessHeap) | Show sources |
Source: C:\Windows\System32\rundll32.exe | Code function: | 1_2_011EA073 |
Enables debug privileges | Show sources |
Source: C:\Windows\System32\rundll32.exe | Process token adjusted: | ||
Source: C:\Users\LUKETA~1\AppData\Local\Temp\F915.tmp | Process token adjusted: |
Malware Analysis System Evasion: |
---|
Contains functionality to enumerate / list files inside a directory | Show sources |
Source: C:\Windows\System32\rundll32.exe | Code function: | 1_2_011E1973 |
Program exit points | Show sources |
Source: C:\Windows\System32\rundll32.exe | API call chain: | graph_1-5851 | ||
Source: C:\Windows\System32\rundll32.exe | API call chain: | graph_1-5775 | ||
Source: C:\Windows\System32\rundll32.exe | API call chain: | graph_1-5906 |
Queries a list of all running processes | Show sources |
Source: C:\Windows\System32\rundll32.exe | Process information queried: |
Contains long sleeps (>= 3 min) | Show sources |
Source: C:\Windows\System32\loaddll32.exe | Thread delayed: |
Enumerates the file system | Show sources |
Source: C:\Windows\System32\rundll32.exe | File opened: | ||
Source: C:\Windows\System32\rundll32.exe | File opened: | ||
Source: C:\Windows\System32\rundll32.exe | File opened: | ||
Source: C:\Windows\System32\rundll32.exe | File opened: | ||
Source: C:\Windows\System32\rundll32.exe | File opened: | ||
Source: C:\Windows\System32\rundll32.exe | File opened: |
Found decision node followed by non-executed suspicious APIs | Show sources |
Source: C:\Windows\System32\rundll32.exe | Decision node followed by non-executed suspicious API: | graph_1-7255 |
Found dropped PE file which has not been started or loaded | Show sources |
Source: C:\Windows\System32\rundll32.exe | Dropped PE file which has not been started: | ||
Source: C:\Windows\System32\rundll32.exe | Dropped PE file which has not been started: |
Found evasive API chain (may stop execution after checking a module file name) | Show sources |
Source: C:\Users\LUKETA~1\AppData\Local\Temp\F915.tmp | Evasive API call chain: | graph_5-3844 |
May sleep (evasive loops) to hinder dynamic analysis | Show sources |
Source: C:\Windows\System32\loaddll32.exe TID: 2720 | Thread sleep time: | ||
Source: C:\Windows\System32\rundll32.exe TID: 2792 | Thread sleep time: | ||
Source: C:\Windows\System32\rundll32.exe TID: 2728 | Thread sleep time: | ||
Source: C:\Windows\System32\rundll32.exe TID: 2852 | Thread sleep time: | ||
Source: C:\Windows\System32\rundll32.exe TID: 2728 | Thread sleep time: | ||
Source: C:\Windows\System32\rundll32.exe TID: 2852 | Thread sleep time: | ||
Source: C:\Windows\System32\rundll32.exe TID: 2776 | Thread sleep time: | ||
Source: C:\Windows\System32\rundll32.exe TID: 2852 | Thread sleep time: | ||
Source: C:\Windows\System32\rundll32.exe TID: 2852 | Thread sleep time: | ||
Source: C:\Windows\System32\rundll32.exe TID: 2856 | Thread sleep time: | ||
Source: C:\Windows\System32\rundll32.exe TID: 2728 | Thread sleep time: | ||
Source: C:\Windows\System32\rundll32.exe TID: 2852 | Thread sleep time: | ||
Source: C:\Windows\System32\rundll32.exe TID: 2848 | Thread sleep time: | ||
Source: C:\Windows\System32\rundll32.exe TID: 2776 | Thread sleep time: |
Queries disk information (often used to detect virtual machines) | Show sources |
Source: C:\Windows\System32\rundll32.exe | File opened: |
Hooking and other Techniques for Hiding and Protection: |
---|
Disables application error messsages (SetErrorMode) | Show sources |
Source: C:\Windows\System32\loaddll32.exe | Process information set: | ||
Source: C:\Windows\System32\loaddll32.exe | Process information set: | ||
Source: C:\Windows\System32\loaddll32.exe | Process information set: | ||
Source: C:\Windows\System32\rundll32.exe | Process information set: | ||
Source: C:\Windows\System32\rundll32.exe | Process information set: | ||
Source: C:\Windows\System32\rundll32.exe | Process information set: | ||
Source: C:\Windows\System32\rundll32.exe | Process information set: | ||
Source: C:\Windows\System32\rundll32.exe | Process information set: | ||
Source: C:\Windows\System32\rundll32.exe | Process information set: | ||
Source: C:\Windows\System32\rundll32.exe | Process information set: | ||
Source: C:\Windows\System32\rundll32.exe | Process information set: | ||
Source: C:\Windows\System32\cmd.exe | Process information set: | ||
Source: C:\Windows\System32\schtasks.exe | Process information set: | ||
Source: C:\Windows\System32\schtasks.exe | Process information set: | ||
Source: C:\Windows\System32\schtasks.exe | Process information set: | ||
Source: C:\Windows\System32\schtasks.exe | Process information set: | ||
Source: C:\Windows\System32\cmd.exe | Process information set: | ||
Source: C:\Windows\System32\cmd.exe | Process information set: | ||
Source: C:\Windows\System32\cmd.exe | Process information set: | ||
Source: C:\Windows\System32\cmd.exe | Process information set: | ||
Source: C:\Windows\System32\cmd.exe | Process information set: | ||
Source: C:\Windows\System32\cmd.exe | Process information set: | ||
Source: C:\Windows\System32\cmd.exe | Process information set: | ||
Source: C:\Windows\System32\cmd.exe | Process information set: | ||
Source: C:\Windows\System32\cmd.exe | Process information set: |
Extensive use of GetProcAddress (often used to hide API calls) | Show sources |
Source: C:\Users\LUKETA~1\AppData\Local\Temp\F915.tmp | Code function: | 5_2_00F62566 |
Language, Device and Operating System Detection: |
---|
Contains functionality to create pipes for IPC | Show sources |
Source: C:\Windows\System32\rundll32.exe | Code function: | 1_2_011E73FD |
Contains functionality to query local / system time | Show sources |
Source: C:\Windows\System32\rundll32.exe | Code function: | 1_2_011E84DF |
Contains functionality to query windows version | Show sources |
Source: C:\Windows\System32\rundll32.exe | Code function: | 1_2_011E7DEB |
Queries the cryptographic machine GUID | Show sources |
Source: C:\Windows\System32\rundll32.exe | Key value queried: |
Behavior Graph |
---|
Yara Overview |
---|
No Yara matches |
---|
Screenshot |
---|
Startup |
---|
|
Created / dropped Files |
---|
File Path | Type and Hashes | Malicious |
---|---|---|
| true | |
| true | |
| true | |
| false | |
| false | |
| true | |
| true |
Contacted Domains/Contacted IPs |
---|
Contacted Domains |
---|
No contacted domains info |
---|
Contacted IPs |
---|
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|
192.168.1.1 | unknown | unknown | unknown | false | |
192.168.1.0 | unknown | unknown | unknown | false | |
192.168.1.2 | unknown | unknown | unknown | false | |
192.168.1.16 | unknown | unknown | unknown | false | |
192.168.1.13 | unknown | unknown | unknown | false |
Static File Info |
---|
General | |
---|---|
File type: | |
TrID: |
|
File name: | abc.dll |
File size: | 362360 |
MD5: | 71b6a493388e7d0b40c83ce903bc6b04 |
SHA1: | 34f917aaba5684fbe56d3c57d48ef2a1aa7cf06d |
SHA256: | 027cc450ef5f8c5f653329641ec1fed91f694e0d229928963b30f6b0d7d3a745 |
SHA512: | 072205eca5099d9269f358fe534b370ff21a4f12d7938d6d2e2713f69310f0698e53b8aff062849f0b2a521f68bee097c1840993825d2a5a3aa8cf4145911c6f |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........8/.jV|.jV|.jV|&$.|.jV|...|.jV|...|.jV|...|.jV|...|.jV|.jW|.jV|...|.jV|...|.jV|...|.jV|Rich.jV|................PE..L...\(FY... |
File Icon |
---|
Static PE Info |
---|
General | |
---|---|
Entrypoint: | 0x10007d39 |
Entrypoint Section: | .text |
Digitally signed: | true |
Imagebase: | 0x10000000 |
Subsystem: | windows cui |
Image File Characteristics: | 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT |
Time Stamp: | 0x5946285C [Sun Jun 18 07:14:36 2017 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 5 |
OS Version Minor: | 1 |
File Version Major: | 5 |
File Version Minor: | 1 |
Subsystem Version Major: | 5 |
Subsystem Version Minor: | 1 |
Import Hash: | 52dd60b5f3c9e2f17c2e303e8c8d4eab |
Authenticode Signature |
---|
Signature Valid: | false |
Signature Issuer: | CN=Microsoft Code Signing PCA, O=Microsoft Corporation, L=Redmond, S=Washington, C=US |
Signature Validation Error: | The digital signature of the object did not verify |
Error Number: | -2146869232 |
Not Before, Not After |
|
Subject Chain |
|
Version: | 3 |
Thumbprint: | 9617094A1CFB59AE7C1F7DFDB6739E4E7C40508F |
Serial: | 6101CF3E00000000000F |
Entrypoint Preview |
---|
Instruction |
---|
push ebp |
mov ebp, esp |
mov eax, dword ptr [ebp+0Ch] |
dec eax |
jne 0E4F04A1h |
mov eax, dword ptr [ebp+08h] |
push eax |
mov dword ptr [1001F120h], eax |
call dword ptr [1000D0E0h] |
xor eax, eax |
inc eax |
pop ebp |
retn 000Ch |
push ebp |
mov ebp, esp |
call 0E4F12FBh |
mov ecx, dword ptr [ebp+08h] |
test ecx, ecx |
je 0E4F0494h |
mov dword ptr [ecx], eax |
xor eax, eax |
pop ebp |
retn 0004h |
push ebp |
mov ebp, esp |
sub esp, 00000618h |
push esi |
xor esi, esi |
cmp dword ptr [1001F0FCh], esi |
je 0E4F04F0h |
cmp dword ptr [1001F11Ch], esi |
je 0E4F04E8h |
mov eax, dword ptr [ebp+08h] |
lea edx, dword ptr [eax+02h] |
mov cx, word ptr [eax] |
add eax, 02h |
cmp cx, si |
jne 0E4F0487h |
sub eax, edx |
sar eax, 1 |
push eax |
push dword ptr [ebp+08h] |
push 100140D0h |
call 0E4F1DAEh |
test eax, eax |
je 0E4F04C1h |
push 00000BB8h |
call dword ptr [1000D188h] |
lea eax, dword ptr [ebp-00000618h] |
push eax |
call 0E4F09ECh |
test eax, eax |
je 0E4F04A6h |
lea eax, dword ptr [ebp-00000618h] |
push eax |
call dword ptr [1000D228h] |
test eax, eax |
je 0E4F0495h |
xor esi, esi |
inc esi |
mov eax, esi |
pop esi |
leave |
retn 0004h |
int3 |
int3 |
int3 |
push ebp |
mov ebp, esp |
mov eax, 00004A18h |
call 0E4F2B8Dh |
Data Directories |
---|
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x15510 | 0x36 | .rdata |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x145f0 | 0x118 | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x20000 | 0x3c738 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x57000 | 0x1778 | .rsrc |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x5d000 | 0x844 | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0xd000 | 0x2c8 | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Sections |
---|
Name | Virtual Address | Virtual Size | Raw Size | Entropy | Xored PE | ZLIB Complexity | File Type | Characteristics |
---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0xbd63 | 0xbe00 | False | 0.597512335526 | ump; data | 6.54653060932 | IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ |
.rdata | 0xd000 | 0x8546 | 0x8600 | False | 0.615875699627 | ump; data | 6.99212929533 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0x16000 | 0x9b4a | 0x5200 | False | 0.457459984756 | ump; data | 5.42698913823 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ |
.rsrc | 0x20000 | 0x3c738 | 0x3c800 | False | 0.999495577221 | ump; data | 7.9982879669 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x5d000 | 0xc02 | 0xe00 | False | 0.522321428571 | ump; data | 4.77168126134 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Resources |
---|
Name | RVA | Size | Type | Language | Country |
---|---|---|---|---|---|
RT_RCDATA | 0x200e8 | 0x617e | ump; data | English | United States |
RT_RCDATA | 0x26268 | 0x6b22 | ump; data | English | United States |
RT_RCDATA | 0x2cd8c | 0x2ec75 | ump; data | English | United States |
RT_RCDATA | 0x5ba04 | 0xd33 | ump; data | English | United States |
Imports |
---|
DLL | Import |
---|---|
KERNEL32.dll | ConnectNamedPipe, GetModuleHandleW, CreateNamedPipeW, TerminateThread, DisconnectNamedPipe, FlushFileBuffers, GetTempPathW, GetProcAddress, DeleteFileW, FreeLibrary, GlobalAlloc, LoadLibraryW, GetComputerNameExW, GlobalFree, ExitProcess, GetVersionExW, GetModuleFileNameW, DisableThreadLibraryCalls, ResumeThread, GetEnvironmentVariableW, GetFileSize, SetFilePointer, SetLastError, LoadResource, GetCurrentThread, OpenProcess, GetSystemDirectoryW, SizeofResource, GetLocalTime, Process32FirstW, LockResource, Process32NextW, GetModuleHandleA, lstrcatW, CreateToolhelp32Snapshot, GetCurrentProcess, VirtualFree, VirtualAlloc, LoadLibraryA, VirtualProtect, WideCharToMultiByte, GetExitCodeProcess, WaitForMultipleObjects, CreateProcessW, PeekNamedPipe, GetTempFileNameW, InterlockedExchange, LeaveCriticalSection, MultiByteToWideChar, CreateFileA, GetTickCount, CreateThread, LocalFree, FindNextFileW, CreateFileMappingW, LocalAlloc, FindClose, GetFileSizeEx, CreateFileW, Sleep, FlushViewOfFile, GetLogicalDrives, WaitForSingleObject, GetDriveTypeW, UnmapViewOfFile, MapViewOfFile, FindFirstFileW, CloseHandle, DeviceIoControl, GetLastError, GetSystemDirectoryA, ReadFile, WriteFile, GetProcessHeap, InitializeCriticalSection, HeapReAlloc, GetWindowsDirectoryW, EnterCriticalSection, HeapFree, SetFilePointerEx, HeapAlloc, FindResourceW |
USER32.dll | ExitWindowsEx, wsprintfA, wsprintfW |
ADVAPI32.dll | CryptGenRandom, CryptAcquireContextA, CryptExportKey, CryptAcquireContextW, CreateProcessAsUserW, InitiateSystemShutdownExW, DuplicateTokenEx, SetTokenInformation, GetTokenInformation, GetSidSubAuthorityCount, OpenThreadToken, GetSidSubAuthority, AdjustTokenPrivileges, LookupPrivilegeValueW, OpenProcessToken, SetThreadToken, CredEnumerateW, CredFree, SetSecurityDescriptorDacl, InitializeSecurityDescriptor, CryptDestroyKey, CryptGenKey, CryptEncrypt, CryptImportKey, CryptSetKeyParam, CryptReleaseContext |
SHELL32.dll | CommandLineToArgvW, SHGetFolderPathW |
ole32.dll | CoCreateGuid, CoTaskMemFree, StringFromCLSID |
CRYPT32.dll | CryptStringToBinaryW, CryptBinaryToStringW, CryptDecodeObjectEx |
SHLWAPI.dll | PathAppendW, StrToIntW, PathFindFileNameW, PathFileExistsW, StrCmpW, StrCmpIW, StrChrW, StrCatW, StrStrW, PathFindExtensionW, PathCombineW, StrStrIW |
IPHLPAPI.DLL | GetIpNetTable, GetAdaptersInfo |
WS2_32.dll | inet_ntoa, gethostbyname, __WSAFDIsSet, ntohl, ioctlsocket, connect, inet_addr, select, recv, send, htons, closesocket, socket, WSAStartup |
MPR.dll | WNetOpenEnumW, WNetEnumResourceW, WNetCancelConnection2W, WNetAddConnection2W, WNetCloseEnum |
NETAPI32.dll | NetServerEnum, NetApiBufferFree, NetServerGetInfo |
DHCPSAPI.DLL | DhcpEnumSubnetClients, DhcpRpcFreeMemory, DhcpGetSubnetInfo, DhcpEnumSubnets |
msvcrt.dll | malloc, _itoa, free, memset, rand, memcpy |
Possible Origin |
---|
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Network Behavior |
---|
TCP Packets |
---|
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jul 12, 2017 22:07:23.542896986 MESZ | 49235 | 80 | 192.168.1.16 | 192.168.1.2 |
Jul 12, 2017 22:07:23.542942047 MESZ | 80 | 49235 | 192.168.1.2 | 192.168.1.16 |
Jul 12, 2017 22:07:24.085721016 MESZ | 49235 | 80 | 192.168.1.16 | 192.168.1.2 |
Jul 12, 2017 22:07:24.085777044 MESZ | 80 | 49235 | 192.168.1.2 | 192.168.1.16 |
Jul 12, 2017 22:07:24.585623980 MESZ | 49235 | 80 | 192.168.1.16 | 192.168.1.2 |
Jul 12, 2017 22:07:24.585654020 MESZ | 80 | 49235 | 192.168.1.2 | 192.168.1.16 |
Jul 12, 2017 22:07:24.612267017 MESZ | 49240 | 80 | 192.168.1.16 | 192.168.1.2 |
Jul 12, 2017 22:07:24.612302065 MESZ | 80 | 49240 | 192.168.1.2 | 192.168.1.16 |
Jul 12, 2017 22:07:25.179496050 MESZ | 49240 | 80 | 192.168.1.16 | 192.168.1.2 |
Jul 12, 2017 22:07:25.179527044 MESZ | 80 | 49240 | 192.168.1.2 | 192.168.1.16 |
Jul 12, 2017 22:07:25.741707087 MESZ | 49240 | 80 | 192.168.1.16 | 192.168.1.2 |
Jul 12, 2017 22:07:25.741758108 MESZ | 80 | 49240 | 192.168.1.2 | 192.168.1.16 |
Jul 12, 2017 22:07:26.020550966 MESZ | 49259 | 80 | 192.168.1.16 | 192.168.1.2 |
Jul 12, 2017 22:07:26.020584106 MESZ | 80 | 49259 | 192.168.1.2 | 192.168.1.16 |
Jul 12, 2017 22:07:26.538785934 MESZ | 49259 | 80 | 192.168.1.16 | 192.168.1.2 |
Jul 12, 2017 22:07:26.538822889 MESZ | 80 | 49259 | 192.168.1.2 | 192.168.1.16 |
Jul 12, 2017 22:07:27.038621902 MESZ | 49259 | 80 | 192.168.1.16 | 192.168.1.2 |
Jul 12, 2017 22:07:27.038667917 MESZ | 80 | 49259 | 192.168.1.2 | 192.168.1.16 |
Jul 12, 2017 22:07:27.042435884 MESZ | 49269 | 80 | 192.168.1.16 | 192.168.1.2 |
Jul 12, 2017 22:07:27.042479992 MESZ | 80 | 49269 | 192.168.1.2 | 192.168.1.16 |
Jul 12, 2017 22:07:27.538759947 MESZ | 49269 | 80 | 192.168.1.16 | 192.168.1.2 |
Jul 12, 2017 22:07:27.538794994 MESZ | 80 | 49269 | 192.168.1.2 | 192.168.1.16 |
Jul 12, 2017 22:07:28.053831100 MESZ | 49269 | 80 | 192.168.1.16 | 192.168.1.2 |
Jul 12, 2017 22:07:28.053863049 MESZ | 80 | 49269 | 192.168.1.2 | 192.168.1.16 |
Code Manipulations |
---|
Statistics |
---|
CPU Usage |
---|
Click to jump to process
Memory Usage |
---|
Click to jump to process
High Level Behavior Distribution |
---|
back
Click to dive into process behavior distribution
Behavior |
---|
Click to jump to process
System Behavior |
---|
General |
---|
Start time: | 22:08:08 |
Start date: | 12/07/2017 |
Path: | C:\Windows\System32\loaddll32.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x2b0000 |
File size: | 112640 bytes |
MD5 hash: | D2792A55032CFE825F07DCD4BEC5F40F |
Programmed in: | C, C++ or other language |
General |
---|
Start time: | 22:08:08 |
Start date: | 12/07/2017 |
Path: | C:\Windows\System32\rundll32.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0xf0000 |
File size: | 44544 bytes |
MD5 hash: | 51138BEEA3E2C21EC44D0932C71762A8 |
Programmed in: | C, C++ or other language |
General |
---|
Start time: | 22:08:08 |
Start date: | 12/07/2017 |
Path: | C:\Windows\System32\cmd.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x49e20000 |
File size: | 302592 bytes |
MD5 hash: | AD7B9C14083B52BC532FBA5948342B98 |
Programmed in: | C, C++ or other language |
General |
---|
Start time: | 22:08:09 |
Start date: | 12/07/2017 |
Path: | C:\Users\LUKETA~1\AppData\Local\Temp\F915.tmp |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0xf60000 |
File size: | 47616 bytes |
MD5 hash: | 2813D34F6197EB4DF42C886EC7F234A1 |
Programmed in: | C, C++ or other language |
General |
---|
Start time: | 22:08:09 |
Start date: | 12/07/2017 |
Path: | C:\Windows\System32\schtasks.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x76e20000 |
File size: | 179712 bytes |
MD5 hash: | 2003E9B15E1C502B146DAD2E383AC1E3 |
Programmed in: | C, C++ or other language |
General |
---|
Start time: | 22:08:11 |
Start date: | 12/07/2017 |
Path: | C:\Windows\System32\cmd.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x49f60000 |
File size: | 302592 bytes |
MD5 hash: | AD7B9C14083B52BC532FBA5948342B98 |
Programmed in: | C, C++ or other language |
General |
---|
Start time: | 22:08:12 |
Start date: | 12/07/2017 |
Path: | C:\Windows\System32\wevtutil.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0xda0000 |
File size: | 175616 bytes |
MD5 hash: | 81538B795F922B8DA6FD897EFB04B5EE |
Programmed in: | C, C++ or other language |
General |
---|
Start time: | 22:08:13 |
Start date: | 12/07/2017 |
Path: | C:\Windows\System32\wevtutil.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0xb10000 |
File size: | 175616 bytes |
MD5 hash: | 81538B795F922B8DA6FD897EFB04B5EE |
Programmed in: | C, C++ or other language |
General |
---|
Start time: | 22:08:13 |
Start date: | 12/07/2017 |
Path: | C:\Windows\System32\wevtutil.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7a0000 |
File size: | 175616 bytes |
MD5 hash: | 81538B795F922B8DA6FD897EFB04B5EE |
Programmed in: | C, C++ or other language |
General |
---|
Start time: | 22:08:13 |
Start date: | 12/07/2017 |
Path: | C:\Windows\System32\wevtutil.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x8f0000 |
File size: | 175616 bytes |
MD5 hash: | 81538B795F922B8DA6FD897EFB04B5EE |
Programmed in: | C, C++ or other language |
General |
---|
Start time: | 22:08:14 |
Start date: | 12/07/2017 |
Path: | C:\Windows\System32\fsutil.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0xe20000 |
File size: | 74240 bytes |
MD5 hash: | B4834F08230A2EB7F498DE4E5B6AB814 |
Programmed in: | C, C++ or other language |
Disassembly |
---|
Code Analysis |
---|
Execution Graph |
---|
Execution Coverage: | 24.6% |
Dynamic/Decrypted Code Coverage: | 100% |
Signature Coverage: | 15.7% |
Total number of Nodes: | 1687 |
Total number of Limit Nodes: | 18 |
Graph
Executed Functions |
---|
C-Code - Quality: 80% |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
C-Code - Quality: 62% |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
C-Code - Quality: 85% |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
C-Code - Quality: 94% |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
C-Code - Quality: 92% |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
C-Code - Quality: 100% |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
C-Code - Quality: 100% |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
C-Code - Quality: 72% |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
C-Code - Quality: 39% |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
C-Code - Quality: 100% |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
C-Code - Quality: 100% |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
C-Code - Quality: 84% |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
C-Code - Quality: 15% |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
C-Code - Quality: 95% |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
C-Code - Quality: 70% |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
C-Code - Quality: 67% |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
C-Code - Quality: 100% |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
C-Code - Quality: 100% |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
C-Code - Quality: 79% |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
C-Code - Quality: 84% |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
C-Code - Quality: 69% |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
C-Code - Quality: 100% |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
C-Code - Quality: 94% |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
C-Code - Quality: 25% |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
C-Code - Quality: 74% |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
C-Code - Quality: 100% |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
C-Code - Quality: 95% |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
C-Code - Quality: 100% |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
C-Code - Quality: 95% |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
C-Code - Quality: 58% |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
C-Code - Quality: 100% |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
C-Code - Quality: 80% |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
C-Code - Quality: 44% |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
C-Code - Quality: 100% |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
C-Code - Quality: 75% |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
C-Code - Quality: 37% |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
C-Code - Quality: 100% |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
C-Code - Quality: 100% |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
C-Code - Quality: 61% |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
C-Code - Quality: 100% |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
C-Code - Quality: 100% |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
C-Code - Quality: 51% |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
C-Code - Quality: 68% |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
C-Code - Quality: 100% |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
C-Code - Quality: 37% |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
C-Code - Quality: 100% |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
C-Code - Quality: 96% |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
C-Code - Quality: 98% |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
C-Code - Quality: 94% |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
C-Code - Quality: 100% |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
C-Code - Quality: 96% |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
C-Code - Quality: 91% |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
C-Code - Quality: 100% |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Non-executed Functions |
---|
C-Code - Quality: 100% |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
C-Code - Quality: 100% |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
C-Code - Quality: 77% |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
C-Code - Quality: 100% |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
C-Code - Quality: 37% |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
C-Code - Quality: 100% |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
C-Code - Quality: 96% |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
C-Code - Quality: 100% |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
C-Code - Quality: 17% |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
C-Code - Quality: 100% |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
C-Code - Quality: 100% |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
C-Code - Quality: 95% |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
C-Code - Quality: 100% |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
C-Code - Quality: 100% |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
C-Code - Quality: 100% |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
C-Code - Quality: 86% |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
C-Code - Quality: 87% |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
C-Code - Quality: 100% |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
C-Code - Quality: 100% |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
C-Code - Quality: 100% |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
C-Code - Quality: 100% |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
C-Code - Quality: 100% |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
C-Code - Quality: 85% |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
C-Code - Quality: 35% |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
C-Code - Quality: 100% |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
C-Code - Quality: 100% |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
C-Code - Quality: 100% |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
C-Code - Quality: 100% |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Execution Graph |
---|
Execution Coverage: | 21.2% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 4.1% |
Total number of Nodes: | 1285 |
Total number of Limit Nodes: | 46 |