Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Win64.MetasploitEncod-B.26495.10712.dll

Overview

General Information

Sample name:SecuriteInfo.com.Win64.MetasploitEncod-B.26495.10712.dll
(renamed file extension from exe to dll)
Original sample name:SecuriteInfo.com.Win64.MetasploitEncod-B.26495.10712.exe
Analysis ID:1467859
MD5:871caeec989ffecccf0c3959dc616e2a
SHA1:8697c921d392599123bf0b153f1dfc61f35fb7b0
SHA256:28fcf4b235518de264af772326317d63fcbf845fbd9d48ef8f996a2a3d9955f1
Tags:exe
Infos:

Detection

Metasploit
Score:88
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
System process connects to network (likely due to code injection or exploit)
Yara detected Metasploit Payload
AI detected suspicious sample
Contains functionality to start reverse TCP shell (cmd.exe)
Contains functionality to dynamically determine API calls
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Internet Provider seen in connection with other malware
PE file contains more sections than normal
PE file contains sections with non-standard names
Program does not show much activity (idle)
Sample execution stops while process was sleeping (likely an evasion)
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • loaddll64.exe (PID: 7300 cmdline: loaddll64.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win64.MetasploitEncod-B.26495.10712.dll" MD5: 763455F9DCB24DFEECC2B9D9F8D46D52)
    • conhost.exe (PID: 7308 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 7352 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win64.MetasploitEncod-B.26495.10712.dll",#1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • rundll32.exe (PID: 7380 cmdline: rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win64.MetasploitEncod-B.26495.10712.dll",#1 MD5: EF3179D498793BF4234F708D3BE28633)
        • cmd.exe (PID: 7408 cmdline: cmd MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • conhost.exe (PID: 7424 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • rundll32.exe (PID: 7360 cmdline: rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Win64.MetasploitEncod-B.26495.10712.dll,buf MD5: EF3179D498793BF4234F708D3BE28633)
      • cmd.exe (PID: 7400 cmdline: cmd MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 7416 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 7524 cmdline: cmd MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
  • cleanup
{"Type": "Metasploit Connect", "IP": "185.208.158.176", "Port": 9283}
SourceRuleDescriptionAuthorStrings
00000000.00000002.1671128560.0000014ECF510000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_MetasploitPayload_3Yara detected Metasploit PayloadJoe Security
    00000000.00000002.1671128560.0000014ECF510000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Metasploit_7bc0f998Identifies the API address lookup function leverage by metasploit shellcodeunknown
    • 0x38:$a1: 48 31 D2 65 48 8B 52 60 48 8B 52 18 48 8B 52 20 48 8B 72 50 48 0F B7 4A 4A 4D 31 C9 48 31 C0 AC 3C 61
    00000000.00000002.1671128560.0000014ECF510000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Metasploit_c9773203Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families.unknown
    • 0x9c:$a: 48 31 C0 AC 41 C1 C9 0D 41 01 C1 38 E0 75 F1 4C 03 4C 24 08 45 39 D1
    00000000.00000002.1671128560.0000014ECF510000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Metasploit_91bc5d7dunknownunknown
    • 0xf2:$a: 49 BE 77 73 32 5F 33 32 00 00 41 56 49 89 E6 48 81 EC A0 01 00 00 49 89 E5
    00000003.00000002.1643896439.00000251F1770000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_MetasploitPayload_3Yara detected Metasploit PayloadJoe Security
      Click to see the 7 entries
      No Sigma rule has matched
      No Snort rule has matched

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: 00000000.00000002.1671128560.0000014ECF510000.00000040.00001000.00020000.00000000.sdmpMalware Configuration Extractor: Metasploit {"Type": "Metasploit Connect", "IP": "185.208.158.176", "Port": 9283}
      Source: SecuriteInfo.com.Win64.MetasploitEncod-B.26495.10712.dllReversingLabs: Detection: 79%
      Source: Submited SampleIntegrated Neural Analysis Model: Matched 98.4% probability
      Source: SecuriteInfo.com.Win64.MetasploitEncod-B.26495.10712.dllStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT

      Networking

      barindex
      Source: C:\Windows\System32\rundll32.exeNetwork Connect: 185.208.158.176 9283Jump to behavior
      Source: global trafficTCP traffic: 192.168.2.4:49730 -> 185.208.158.176:9283
      Source: Joe Sandbox ViewASN Name: SIMPLECARRER2IT SIMPLECARRER2IT
      Source: unknownTCP traffic detected without corresponding DNS query: 185.208.158.176
      Source: unknownTCP traffic detected without corresponding DNS query: 185.208.158.176
      Source: unknownTCP traffic detected without corresponding DNS query: 185.208.158.176
      Source: unknownTCP traffic detected without corresponding DNS query: 185.208.158.176
      Source: unknownTCP traffic detected without corresponding DNS query: 185.208.158.176
      Source: unknownTCP traffic detected without corresponding DNS query: 185.208.158.176
      Source: unknownTCP traffic detected without corresponding DNS query: 185.208.158.176
      Source: unknownTCP traffic detected without corresponding DNS query: 185.208.158.176
      Source: unknownTCP traffic detected without corresponding DNS query: 185.208.158.176
      Source: unknownTCP traffic detected without corresponding DNS query: 185.208.158.176
      Source: unknownTCP traffic detected without corresponding DNS query: 185.208.158.176
      Source: unknownTCP traffic detected without corresponding DNS query: 185.208.158.176
      Source: unknownTCP traffic detected without corresponding DNS query: 185.208.158.176
      Source: unknownTCP traffic detected without corresponding DNS query: 185.208.158.176
      Source: unknownTCP traffic detected without corresponding DNS query: 185.208.158.176
      Source: unknownTCP traffic detected without corresponding DNS query: 185.208.158.176
      Source: unknownTCP traffic detected without corresponding DNS query: 185.208.158.176
      Source: unknownTCP traffic detected without corresponding DNS query: 185.208.158.176

      System Summary

      barindex
      Source: 00000000.00000002.1671128560.0000014ECF510000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies the API address lookup function leverage by metasploit shellcode Author: unknown
      Source: 00000000.00000002.1671128560.0000014ECF510000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families. Author: unknown
      Source: 00000000.00000002.1671128560.0000014ECF510000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_91bc5d7d Author: unknown
      Source: 00000003.00000002.1643896439.00000251F1770000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies the API address lookup function leverage by metasploit shellcode Author: unknown
      Source: 00000003.00000002.1643896439.00000251F1770000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families. Author: unknown
      Source: 00000003.00000002.1643896439.00000251F1770000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_91bc5d7d Author: unknown
      Source: 00000004.00000002.1643975129.0000019540F00000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies the API address lookup function leverage by metasploit shellcode Author: unknown
      Source: 00000004.00000002.1643975129.0000019540F00000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families. Author: unknown
      Source: 00000004.00000002.1643975129.0000019540F00000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_91bc5d7d Author: unknown
      Source: SecuriteInfo.com.Win64.MetasploitEncod-B.26495.10712.dllStatic PE information: Number of sections : 21 > 10
      Source: 00000000.00000002.1671128560.0000014ECF510000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_7bc0f998 os = windows, severity = x86, description = Identifies the API address lookup function leverage by metasploit shellcode, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = fdb5c665503f07b2fc1ed7e4e688295e1222a500bfb68418661db60c8e75e835, id = 7bc0f998-7014-4883-8a56-d5ee00c15aed, last_modified = 2021-08-23
      Source: 00000000.00000002.1671128560.0000014ECF510000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_c9773203 os = windows, severity = x86, description = Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., creation_date = 2021-04-07, scan_context = file, memory, reference = https://github.com/rapid7/metasploit-framework/blob/04e8752b9b74cbaad7cb0ea6129c90e3172580a2/external/source/shellcode/windows/x64/src/block/block_api.asm, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = afde93eeb14b4d0c182f475a22430f101394938868741ffa06445e478b6ece36, id = c9773203-6d1e-4246-a1e0-314217e0207a, last_modified = 2021-08-23
      Source: 00000000.00000002.1671128560.0000014ECF510000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_91bc5d7d reference_sample = 0dd993ff3917dc56ef02324375165f0d66506c5a9b9548eda57c58e041030987, os = windows, severity = x86, creation_date = 2021-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 8848a3de66a25dd98278761a7953f31b7995e48621dec258f3d92bd91a4a3aa3, id = 91bc5d7d-31e3-4c02-82b3-a685194981f3, last_modified = 2021-10-04
      Source: 00000003.00000002.1643896439.00000251F1770000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_7bc0f998 os = windows, severity = x86, description = Identifies the API address lookup function leverage by metasploit shellcode, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = fdb5c665503f07b2fc1ed7e4e688295e1222a500bfb68418661db60c8e75e835, id = 7bc0f998-7014-4883-8a56-d5ee00c15aed, last_modified = 2021-08-23
      Source: 00000003.00000002.1643896439.00000251F1770000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_c9773203 os = windows, severity = x86, description = Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., creation_date = 2021-04-07, scan_context = file, memory, reference = https://github.com/rapid7/metasploit-framework/blob/04e8752b9b74cbaad7cb0ea6129c90e3172580a2/external/source/shellcode/windows/x64/src/block/block_api.asm, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = afde93eeb14b4d0c182f475a22430f101394938868741ffa06445e478b6ece36, id = c9773203-6d1e-4246-a1e0-314217e0207a, last_modified = 2021-08-23
      Source: 00000003.00000002.1643896439.00000251F1770000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_91bc5d7d reference_sample = 0dd993ff3917dc56ef02324375165f0d66506c5a9b9548eda57c58e041030987, os = windows, severity = x86, creation_date = 2021-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 8848a3de66a25dd98278761a7953f31b7995e48621dec258f3d92bd91a4a3aa3, id = 91bc5d7d-31e3-4c02-82b3-a685194981f3, last_modified = 2021-10-04
      Source: 00000004.00000002.1643975129.0000019540F00000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_7bc0f998 os = windows, severity = x86, description = Identifies the API address lookup function leverage by metasploit shellcode, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = fdb5c665503f07b2fc1ed7e4e688295e1222a500bfb68418661db60c8e75e835, id = 7bc0f998-7014-4883-8a56-d5ee00c15aed, last_modified = 2021-08-23
      Source: 00000004.00000002.1643975129.0000019540F00000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_c9773203 os = windows, severity = x86, description = Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., creation_date = 2021-04-07, scan_context = file, memory, reference = https://github.com/rapid7/metasploit-framework/blob/04e8752b9b74cbaad7cb0ea6129c90e3172580a2/external/source/shellcode/windows/x64/src/block/block_api.asm, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = afde93eeb14b4d0c182f475a22430f101394938868741ffa06445e478b6ece36, id = c9773203-6d1e-4246-a1e0-314217e0207a, last_modified = 2021-08-23
      Source: 00000004.00000002.1643975129.0000019540F00000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_91bc5d7d reference_sample = 0dd993ff3917dc56ef02324375165f0d66506c5a9b9548eda57c58e041030987, os = windows, severity = x86, creation_date = 2021-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 8848a3de66a25dd98278761a7953f31b7995e48621dec258f3d92bd91a4a3aa3, id = 91bc5d7d-31e3-4c02-82b3-a685194981f3, last_modified = 2021-10-04
      Source: classification engineClassification label: mal88.troj.evad.winDLL@16/0@0/1
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7416:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7424:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7308:120:WilError_03
      Source: SecuriteInfo.com.Win64.MetasploitEncod-B.26495.10712.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: C:\Windows\System32\loaddll64.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Win64.MetasploitEncod-B.26495.10712.dll,buf
      Source: SecuriteInfo.com.Win64.MetasploitEncod-B.26495.10712.dllReversingLabs: Detection: 79%
      Source: unknownProcess created: C:\Windows\System32\loaddll64.exe loaddll64.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win64.MetasploitEncod-B.26495.10712.dll"
      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win64.MetasploitEncod-B.26495.10712.dll",#1
      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Win64.MetasploitEncod-B.26495.10712.dll,buf
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win64.MetasploitEncod-B.26495.10712.dll",#1
      Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\cmd.exe cmd
      Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\cmd.exe cmd
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd
      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win64.MetasploitEncod-B.26495.10712.dll",#1Jump to behavior
      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Win64.MetasploitEncod-B.26495.10712.dll,bufJump to behavior
      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmdJump to behavior
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win64.MetasploitEncod-B.26495.10712.dll",#1Jump to behavior
      Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\cmd.exe cmdJump to behavior
      Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\cmd.exe cmdJump to behavior
      Source: C:\Windows\System32\loaddll64.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Windows\System32\loaddll64.exeSection loaded: mswsock.dllJump to behavior
      Source: C:\Windows\System32\cmd.exeSection loaded: winbrand.dllJump to behavior
      Source: C:\Windows\System32\cmd.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Windows\System32\cmd.exeSection loaded: winbrand.dll
      Source: C:\Windows\System32\cmd.exeSection loaded: wldp.dll
      Source: C:\Windows\System32\cmd.exeSection loaded: winbrand.dll
      Source: C:\Windows\System32\cmd.exeSection loaded: wldp.dll
      Source: Window RecorderWindow detected: More than 3 window changes detected
      Source: SecuriteInfo.com.Win64.MetasploitEncod-B.26495.10712.dllStatic PE information: Image base 0x1d57b0000 > 0x60000000
      Source: SecuriteInfo.com.Win64.MetasploitEncod-B.26495.10712.dllStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFE126D1370 GetModuleHandleA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00007FFE126D1370
      Source: SecuriteInfo.com.Win64.MetasploitEncod-B.26495.10712.dllStatic PE information: section name: /4
      Source: SecuriteInfo.com.Win64.MetasploitEncod-B.26495.10712.dllStatic PE information: section name: .xdata
      Source: SecuriteInfo.com.Win64.MetasploitEncod-B.26495.10712.dllStatic PE information: section name: /14
      Source: SecuriteInfo.com.Win64.MetasploitEncod-B.26495.10712.dllStatic PE information: section name: /29
      Source: SecuriteInfo.com.Win64.MetasploitEncod-B.26495.10712.dllStatic PE information: section name: /41
      Source: SecuriteInfo.com.Win64.MetasploitEncod-B.26495.10712.dllStatic PE information: section name: /55
      Source: SecuriteInfo.com.Win64.MetasploitEncod-B.26495.10712.dllStatic PE information: section name: /67
      Source: SecuriteInfo.com.Win64.MetasploitEncod-B.26495.10712.dllStatic PE information: section name: /80
      Source: SecuriteInfo.com.Win64.MetasploitEncod-B.26495.10712.dllStatic PE information: section name: /91
      Source: SecuriteInfo.com.Win64.MetasploitEncod-B.26495.10712.dllStatic PE information: section name: /107
      Source: SecuriteInfo.com.Win64.MetasploitEncod-B.26495.10712.dllStatic PE information: section name: /123
      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFE126E02D5 pushfq ; retf 0_2_00007FFE126E02EC
      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: loaddll64.exe, 00000000.00000002.1671178171.0000014ECF538000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.1643910760.00000251F1788000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.1643917605.0000019540E08000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFE126D1370 GetModuleHandleA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00007FFE126D1370
      Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected

      HIPS / PFW / Operating System Protection Evasion

      barindex
      Source: C:\Windows\System32\rundll32.exeNetwork Connect: 185.208.158.176 9283Jump to behavior
      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmdJump to behavior
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win64.MetasploitEncod-B.26495.10712.dll",#1Jump to behavior
      Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\cmd.exe cmdJump to behavior
      Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\cmd.exe cmdJump to behavior

      Remote Access Functionality

      barindex
      Source: Yara matchFile source: 00000000.00000002.1671128560.0000014ECF510000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000003.00000002.1643896439.00000251F1770000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000004.00000002.1643975129.0000019540F00000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000014ECF5100F1 LoadLibraryA,WSAStartup,WSASocketA,connect,CreateProcessA,ExitProcess, string: cmd0_2_0000014ECF5100F1
      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000251F17700F1 LoadLibraryA,WSAStartup,WSASocketA,connect,CreateProcessA,ExitProcess, string: cmd3_2_00000251F17700F1
      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000019540F000F1 LoadLibraryA,WSAStartup,WSASocketA,connect,CreateProcessA,ExitProcess, string: cmd4_2_0000019540F000F1
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
      Command and Scripting Interpreter
      1
      DLL Side-Loading
      111
      Process Injection
      1
      Rundll32
      OS Credential Dumping1
      Security Software Discovery
      Remote ServicesData from Local System1
      Non-Standard Port
      Exfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault Accounts1
      Native API
      Boot or Logon Initialization Scripts1
      DLL Side-Loading
      111
      Process Injection
      LSASS Memory1
      System Information Discovery
      Remote Desktop ProtocolData from Removable Media1
      Remote Access Software
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
      DLL Side-Loading
      Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
      Obfuscated Files or Information
      NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet
      behaviorgraph top1 signatures2 2 Behavior Graph ID: 1467859 Sample: SecuriteInfo.com.Win64.Meta... Startdate: 04/07/2024 Architecture: WINDOWS Score: 88 35 Found malware configuration 2->35 37 Malicious sample detected (through community Yara rule) 2->37 39 Multi AV Scanner detection for submitted file 2->39 41 2 other signatures 2->41 9 loaddll64.exe 1 2->9         started        process3 signatures4 45 Contains functionality to start reverse TCP shell (cmd.exe) 9->45 12 rundll32.exe 9->12         started        16 cmd.exe 1 9->16         started        18 conhost.exe 9->18         started        20 cmd.exe 9->20         started        process5 dnsIp6 33 185.208.158.176, 49730, 49731, 49732 SIMPLECARRER2IT Switzerland 12->33 47 Contains functionality to start reverse TCP shell (cmd.exe) 12->47 22 cmd.exe 1 12->22         started        24 rundll32.exe 16->24         started        signatures7 process8 signatures9 27 conhost.exe 22->27         started        43 System process connects to network (likely due to code injection or exploit) 24->43 29 cmd.exe 24->29         started        process10 process11 31 conhost.exe 29->31         started       

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      SecuriteInfo.com.Win64.MetasploitEncod-B.26495.10712.dll79%ReversingLabsWin64.Backdoor.Meterpreter
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      No contacted domains info
      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs
      IPDomainCountryFlagASNASN NameMalicious
      185.208.158.176
      unknownSwitzerland
      34888SIMPLECARRER2ITtrue
      Joe Sandbox version:40.0.0 Tourmaline
      Analysis ID:1467859
      Start date and time:2024-07-04 23:23:05 +02:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 1m 55s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Number of analysed new started processes analysed:10
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:SecuriteInfo.com.Win64.MetasploitEncod-B.26495.10712.dll
      (renamed file extension from exe to dll)
      Original Sample Name:SecuriteInfo.com.Win64.MetasploitEncod-B.26495.10712.exe
      Detection:MAL
      Classification:mal88.troj.evad.winDLL@16/0@0/1
      EGA Information:
      • Successful, ratio: 100%
      HCA Information:
      • Successful, ratio: 100%
      • Number of executed functions: 4
      • Number of non-executed functions: 3
      Cookbook Comments:
      • Stop behavior analysis, all processes terminated
      • Not all processes where analyzed, report is missing behavior information
      • VT rate limit hit for: SecuriteInfo.com.Win64.MetasploitEncod-B.26495.10712.dll
      No simulations
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      185.208.158.176EERIE_EAVE.exeGet hashmaliciousSliverBrowse
      • 185.208.158.176:8080/samples.html?_=64t16897&ei=72928428
      EERIE_EAVE.exeGet hashmaliciousSliverBrowse
      • 185.208.158.176:8080/samples.html?_=46175850&el=749489d56
      No context
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      SIMPLECARRER2ITJD40PL83OU.exeGet hashmaliciousSliverBrowse
      • 185.208.158.176
      EERIE_EAVE.exeGet hashmaliciousSliverBrowse
      • 185.208.158.176
      EERIE_EAVE.exeGet hashmaliciousSliverBrowse
      • 185.208.158.176
      ok.exeGet hashmaliciousSliverBrowse
      • 185.208.158.176
      3lcoXbiq6u.exeGet hashmaliciousUnknownBrowse
      • 185.196.8.223
      oDlNf4iAZo.exeGet hashmaliciousNightingale StealerBrowse
      • 185.196.8.243
      pC8PWLyWY5.exeGet hashmaliciousNightingale StealerBrowse
      • 185.196.8.223
      http://appsjda.link/Get hashmaliciousUnknownBrowse
      • 185.208.158.232
      kuQuRlbfuGOQVwhnGet hashmaliciousUnknownBrowse
      • 185.196.8.104
      VYpUjX9FuO.elfGet hashmaliciousGafgyt, MiraiBrowse
      • 185.196.8.31
      No context
      No context
      No created / dropped files found
      File type:PE32+ executable (DLL) (console) x86-64, for MS Windows
      Entropy (8bit):5.437119343689565
      TrID:
      • Win64 Dynamic Link Library (generic) (102004/3) 86.43%
      • Win64 Executable (generic) (12005/4) 10.17%
      • Generic Win/DOS Executable (2004/3) 1.70%
      • DOS Executable Generic (2002/1) 1.70%
      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.01%
      File name:SecuriteInfo.com.Win64.MetasploitEncod-B.26495.10712.dll
      File size:97'776 bytes
      MD5:871caeec989ffecccf0c3959dc616e2a
      SHA1:8697c921d392599123bf0b153f1dfc61f35fb7b0
      SHA256:28fcf4b235518de264af772326317d63fcbf845fbd9d48ef8f996a2a3d9955f1
      SHA512:c4dded959c5238cf8b2e43f3e8869027862f7d8f2cec98217f6e3f9034db3e171da40fd36b7cc97727807f1b2540366c476048de1809ebcbdecdb858237f3125
      SSDEEP:1536:uSyZzfkXVEDS9vNzTISZfwZzds/Wohl8IWRuEFHyNhKO5n195jfh187Rt9hg2aE9:fEzsXVE2/MhuXC
      TLSH:97A30882AAC5FD93CA056234A1BB03192338F6D95F874B533D6996350E037E0BE9F647
      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.....of.&........& ...'.....4...... .........{..............................0............`... ............................
      Icon Hash:7ae282899bbab082
      Entrypoint:0x1d57b1320
      Entrypoint Section:.text
      Digitally signed:false
      Imagebase:0x1d57b0000
      Subsystem:windows cui
      Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LARGE_ADDRESS_AWARE, DLL
      DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
      Time Stamp:0x666FF8F0 [Mon Jun 17 08:50:56 2024 UTC]
      TLS Callbacks:0xd57b1610, 0x1, 0xd57b15e0, 0x1
      CLR (.Net) Version:
      OS Version Major:4
      OS Version Minor:0
      File Version Major:4
      File Version Minor:0
      Subsystem Version Major:4
      Subsystem Version Minor:0
      Import Hash:6490015bd77f7aa9aab54479cf5a74a0
      Instruction
      dec eax
      mov eax, dword ptr [00002F59h]
      mov dword ptr [eax], 00000000h
      jmp 00007F889D2A7F53h
      nop word ptr [eax+eax+00000000h]
      nop dword ptr [eax]
      dec eax
      mov edx, ecx
      dec eax
      lea ecx, dword ptr [00006CB6h]
      jmp 00007F889D2A9066h
      nop
      ret
      nop word ptr [eax+eax+00000000h]
      nop dword ptr [eax+00h]
      xor eax, eax
      ret
      nop word ptr [eax+eax+00000000h]
      nop
      push ebp
      push edi
      push esi
      push ebx
      dec eax
      sub esp, 28h
      dec eax
      lea ebp, dword ptr [esp+20h]
      dec eax
      lea esi, dword ptr [00002C7Ch]
      dec eax
      mov ecx, esi
      call dword ptr [00008DB7h]
      dec eax
      mov ebx, eax
      dec eax
      test eax, eax
      je 00007F889D2A811Dh
      dec eax
      mov ecx, esi
      call dword ptr [00008DC6h]
      dec eax
      mov edi, dword ptr [00008DA7h]
      dec eax
      lea edx, dword ptr [00002C67h]
      dec eax
      mov ecx, ebx
      dec eax
      mov dword ptr [00006C6Ah], eax
      call edi
      dec eax
      lea edx, dword ptr [00002C6Ah]
      dec eax
      mov ecx, ebx
      dec eax
      mov esi, eax
      call edi
      dec eax
      mov dword ptr [00001C42h], eax
      dec eax
      test esi, esi
      je 00007F889D2A80C2h
      dec eax
      lea edx, dword ptr [00006C66h]
      dec eax
      lea ecx, dword ptr [00003C1Fh]
      call esi
      dec eax
      lea ecx, dword ptr [00000036h]
      NameVirtual AddressVirtual Size Is in Section
      IMAGE_DIRECTORY_ENTRY_EXPORT0x90000x43.edata
      IMAGE_DIRECTORY_ENTRY_IMPORT0xa0000x41c.idata
      IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x60000x1d4.pdata
      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
      IMAGE_DIRECTORY_ENTRY_BASERELOC0xd0000x60.reloc
      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
      IMAGE_DIRECTORY_ENTRY_TLS0x40800x28.rdata
      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IAT0xa1240xe8.idata
      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
      .text0x10000x15580x1600bb8aca4bc8910872f87fdeea04db49beFalse0.5882457386363636data5.9428743225652605IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      .data0x30000x2800x40004687243130680ed256ec5ad6c8847acFalse0.5458984375data4.801712562155376IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      .rdata0x40000x5600x600459f3a9200a031a2e79450967a07811aFalse0.24348958333333334data3.694226834730464IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      /40x50000x40x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      .pdata0x60000x1d40x2003180bd25b80e54c3cb8828e0b22f9499False0.548828125data3.497334147094282IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .xdata0x70000x1540x2006cf9920431fdfb39b855eeb20fbef00aFalse0.345703125data2.984183795217659IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .bss0x80000x1700x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      .edata0x90000x430x20038b0549c7847bede2b6e3bcf28c8bf69False0.123046875data0.6426194097824256IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .idata0xa0000x41c0x600a9b92cc364ee2ffcd7eff97d44669782False0.2766927083333333data2.855490786391457IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      .CRT0xb0000x580x2009dff61b180a9f0965e4da600c5edaac5False0.056640625data0.25323120180391656IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      .tls0xc0000x100x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      .reloc0xd0000x600x20034c0d0b259d4837222854ce3cea0fa46False0.189453125data1.0186626409090969IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
      /140xe0000x2d00x4003ca658f512f24ae3a14c54c5a55c3f9bFalse0.181640625data1.3447244320081995IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
      /290xf0000x81930x8200853ed351e1ea69423670550dfa2bb90cFalse0.4075721153846154Squeak image data5.924485700162219IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
      /410x180000x16400x180078c62db818fbcb5c75ef23ad9f250850False0.2810872395833333data4.676113924741409IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
      /550x1a0000x17270x18004f2772bdf8b207d841c92265c6acc44eFalse0.4978841145833333data4.9303519765616315IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
      /670x1c0000x9900xa00a91ec38f24b9ab48eab8d0560dc01204False0.30234375data3.4737412794346043IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
      /800x1d0000x1860x2005126e545058b9dca56a5fca3e5550cccFalse0.4609375data4.419913741331939IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
      /910x1e0000x152d0x16001fb5f8a0169fe8bcf13df1418e6a4bb9False0.107421875data4.664808635473231IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
      /1070x200000x11a70x12001e36692fec0841986b7b87e0bc8d916dFalse0.484375data5.029951036905709IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
      /1230x220000x18b0x200b0a4ffc1fa0a8b228f644c13041206b0False0.55078125data4.0696893516273445IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
      DLLImport
      KERNEL32.dllDeleteCriticalSection, EnterCriticalSection, FreeLibrary, GetLastError, GetModuleHandleA, GetProcAddress, InitializeCriticalSection, LeaveCriticalSection, LoadLibraryA, Sleep, TlsGetValue, VirtualAlloc, VirtualProtect, VirtualQuery
      msvcrt.dll__iob_func, _amsg_exit, _initterm, _lock, _unlock, abort, calloc, free, fwrite, realloc, strlen, strncmp, vfprintf
      NameOrdinalAddress
      buf10x1d57b3020
      TimestampSource PortDest PortSource IPDest IP
      Jul 4, 2024 23:23:51.328109026 CEST497309283192.168.2.4185.208.158.176
      Jul 4, 2024 23:23:51.329319954 CEST497319283192.168.2.4185.208.158.176
      Jul 4, 2024 23:23:51.335256100 CEST928349730185.208.158.176192.168.2.4
      Jul 4, 2024 23:23:51.335778952 CEST928349731185.208.158.176192.168.2.4
      Jul 4, 2024 23:23:51.335875988 CEST497319283192.168.2.4185.208.158.176
      Jul 4, 2024 23:23:51.335880995 CEST497309283192.168.2.4185.208.158.176
      Jul 4, 2024 23:23:51.442523003 CEST497319283192.168.2.4185.208.158.176
      Jul 4, 2024 23:23:51.442534924 CEST497309283192.168.2.4185.208.158.176
      Jul 4, 2024 23:23:51.447670937 CEST928349731185.208.158.176192.168.2.4
      Jul 4, 2024 23:23:51.447681904 CEST928349730185.208.158.176192.168.2.4
      Jul 4, 2024 23:23:51.447748899 CEST497319283192.168.2.4185.208.158.176
      Jul 4, 2024 23:23:51.447767973 CEST497309283192.168.2.4185.208.158.176
      Jul 4, 2024 23:23:51.452581882 CEST928349731185.208.158.176192.168.2.4
      Jul 4, 2024 23:23:51.452634096 CEST928349730185.208.158.176192.168.2.4
      Jul 4, 2024 23:23:53.274375916 CEST928349730185.208.158.176192.168.2.4
      Jul 4, 2024 23:23:53.274650097 CEST497309283192.168.2.4185.208.158.176
      Jul 4, 2024 23:23:53.274703026 CEST928349731185.208.158.176192.168.2.4
      Jul 4, 2024 23:23:53.274764061 CEST497319283192.168.2.4185.208.158.176
      Jul 4, 2024 23:23:53.663568020 CEST497319283192.168.2.4185.208.158.176
      Jul 4, 2024 23:23:53.665779114 CEST497309283192.168.2.4185.208.158.176
      Jul 4, 2024 23:23:54.326725006 CEST497329283192.168.2.4185.208.158.176
      Jul 4, 2024 23:23:54.331659079 CEST928349732185.208.158.176192.168.2.4
      Jul 4, 2024 23:23:54.331770897 CEST497329283192.168.2.4185.208.158.176
      Jul 4, 2024 23:23:54.349744081 CEST497329283192.168.2.4185.208.158.176
      Jul 4, 2024 23:23:54.354506016 CEST928349732185.208.158.176192.168.2.4
      Jul 4, 2024 23:23:54.354579926 CEST497329283192.168.2.4185.208.158.176
      Jul 4, 2024 23:23:54.359385967 CEST928349732185.208.158.176192.168.2.4
      Jul 4, 2024 23:23:56.256891966 CEST928349732185.208.158.176192.168.2.4
      Jul 4, 2024 23:23:56.256982088 CEST497329283192.168.2.4185.208.158.176
      Jul 4, 2024 23:23:56.667321920 CEST497329283192.168.2.4185.208.158.176

      Click to jump to process

      Click to jump to process

      Click to dive into process behavior distribution

      Click to jump to process

      Target ID:0
      Start time:17:23:50
      Start date:04/07/2024
      Path:C:\Windows\System32\loaddll64.exe
      Wow64 process (32bit):false
      Commandline:loaddll64.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win64.MetasploitEncod-B.26495.10712.dll"
      Imagebase:0x7ff6aeb60000
      File size:165'888 bytes
      MD5 hash:763455F9DCB24DFEECC2B9D9F8D46D52
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Yara matches:
      • Rule: JoeSecurity_MetasploitPayload_3, Description: Yara detected Metasploit Payload, Source: 00000000.00000002.1671128560.0000014ECF510000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
      • Rule: Windows_Trojan_Metasploit_7bc0f998, Description: Identifies the API address lookup function leverage by metasploit shellcode, Source: 00000000.00000002.1671128560.0000014ECF510000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
      • Rule: Windows_Trojan_Metasploit_c9773203, Description: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., Source: 00000000.00000002.1671128560.0000014ECF510000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
      • Rule: Windows_Trojan_Metasploit_91bc5d7d, Description: unknown, Source: 00000000.00000002.1671128560.0000014ECF510000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
      Reputation:high
      Has exited:true

      Target ID:1
      Start time:17:23:50
      Start date:04/07/2024
      Path:C:\Windows\System32\conhost.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Imagebase:0x7ff7699e0000
      File size:862'208 bytes
      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:2
      Start time:17:23:50
      Start date:04/07/2024
      Path:C:\Windows\System32\cmd.exe
      Wow64 process (32bit):false
      Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win64.MetasploitEncod-B.26495.10712.dll",#1
      Imagebase:0x7ff75bb60000
      File size:289'792 bytes
      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:3
      Start time:17:23:50
      Start date:04/07/2024
      Path:C:\Windows\System32\rundll32.exe
      Wow64 process (32bit):false
      Commandline:rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Win64.MetasploitEncod-B.26495.10712.dll,buf
      Imagebase:0x7ff63ac50000
      File size:71'680 bytes
      MD5 hash:EF3179D498793BF4234F708D3BE28633
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Yara matches:
      • Rule: JoeSecurity_MetasploitPayload_3, Description: Yara detected Metasploit Payload, Source: 00000003.00000002.1643896439.00000251F1770000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
      • Rule: Windows_Trojan_Metasploit_7bc0f998, Description: Identifies the API address lookup function leverage by metasploit shellcode, Source: 00000003.00000002.1643896439.00000251F1770000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
      • Rule: Windows_Trojan_Metasploit_c9773203, Description: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., Source: 00000003.00000002.1643896439.00000251F1770000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
      • Rule: Windows_Trojan_Metasploit_91bc5d7d, Description: unknown, Source: 00000003.00000002.1643896439.00000251F1770000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
      Reputation:high
      Has exited:true

      Target ID:4
      Start time:17:23:50
      Start date:04/07/2024
      Path:C:\Windows\System32\rundll32.exe
      Wow64 process (32bit):false
      Commandline:rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win64.MetasploitEncod-B.26495.10712.dll",#1
      Imagebase:0x7ff63ac50000
      File size:71'680 bytes
      MD5 hash:EF3179D498793BF4234F708D3BE28633
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Yara matches:
      • Rule: JoeSecurity_MetasploitPayload_3, Description: Yara detected Metasploit Payload, Source: 00000004.00000002.1643975129.0000019540F00000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
      • Rule: Windows_Trojan_Metasploit_7bc0f998, Description: Identifies the API address lookup function leverage by metasploit shellcode, Source: 00000004.00000002.1643975129.0000019540F00000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
      • Rule: Windows_Trojan_Metasploit_c9773203, Description: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., Source: 00000004.00000002.1643975129.0000019540F00000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
      • Rule: Windows_Trojan_Metasploit_91bc5d7d, Description: unknown, Source: 00000004.00000002.1643975129.0000019540F00000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
      Reputation:high
      Has exited:true

      Target ID:5
      Start time:17:23:50
      Start date:04/07/2024
      Path:C:\Windows\System32\cmd.exe
      Wow64 process (32bit):false
      Commandline:cmd
      Imagebase:0x7ff75bb60000
      File size:289'792 bytes
      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:6
      Start time:17:23:50
      Start date:04/07/2024
      Path:C:\Windows\System32\cmd.exe
      Wow64 process (32bit):false
      Commandline:cmd
      Imagebase:0x7ff75bb60000
      File size:289'792 bytes
      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:7
      Start time:17:23:50
      Start date:04/07/2024
      Path:C:\Windows\System32\conhost.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Imagebase:0x7ff7699e0000
      File size:862'208 bytes
      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:8
      Start time:17:23:50
      Start date:04/07/2024
      Path:C:\Windows\System32\conhost.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Imagebase:0x7ff7699e0000
      File size:862'208 bytes
      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:9
      Start time:17:23:53
      Start date:04/07/2024
      Path:C:\Windows\System32\cmd.exe
      Wow64 process (32bit):false
      Commandline:cmd
      Imagebase:0x7ff75bb60000
      File size:289'792 bytes
      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Reset < >

        Execution Graph

        Execution Coverage:20.1%
        Dynamic/Decrypted Code Coverage:6.1%
        Signature Coverage:7.1%
        Total number of Nodes:99
        Total number of Limit Nodes:1
        execution_graph 476 7ffe126d1c5b 477 7ffe126d1c80 calloc 476->477 478 7ffe126d1c76 476->478 477->478 479 7ffe126d1c97 EnterCriticalSection LeaveCriticalSection 477->479 479->478 391 14ecf510000 392 14ecf51001b 391->392 392->392 395 14ecf5100f1 LoadLibraryA WSAStartup WSASocketA connect 392->395 396 14ecf510188 395->396 396->396 397 14ecf51018c CreateProcessA 396->397 399 14ecf5101cc ExitProcess 397->399 400 7ffe126d11d0 401 7ffe126d1238 400->401 405 7ffe126d11f1 400->405 403 7ffe126d12f8 401->403 404 7ffe126d1251 401->404 402 7ffe126d1220 406 7ffe126d1460 VirtualAlloc 403->406 418 7ffe126d1010 404->418 405->402 408 7ffe126d1460 VirtualAlloc 405->408 409 7ffe126d120d 406->409 408->409 409->402 411 7ffe126d1010 5 API calls 409->411 410 7ffe126d1256 410->402 410->405 412 7ffe126d127a 410->412 417 7ffe126d12a2 410->417 411->402 430 7ffe126d1460 412->430 413 7ffe126d1010 5 API calls 413->402 416 7ffe126d1460 VirtualAlloc 416->417 417->402 417->413 419 7ffe126d1026 418->419 422 7ffe126d10a0 418->422 420 7ffe126d1068 419->420 421 7ffe126d1050 Sleep 419->421 428 7ffe126d1084 419->428 423 7ffe126d107a _amsg_exit 420->423 424 7ffe126d1140 420->424 421->419 425 7ffe126d10d1 Sleep 422->425 426 7ffe126d10e6 422->426 422->428 423->428 433 7ffe126d23d0 424->433 425->422 426->428 429 7ffe126d1180 _initterm 426->429 428->410 429->428 431 7ffe126d128f 430->431 432 7ffe126d1481 VirtualAlloc 430->432 431->402 431->416 432->431 436 7ffe126d23e4 433->436 434 7ffe126d242d 434->428 435 7ffe126d2425 free 435->434 436->434 436->435 437 7ffe126d1370 GetModuleHandleA 438 7ffe126d1395 LoadLibraryA GetProcAddress GetProcAddress 437->438 439 7ffe126d13d3 437->439 438->439 440 7ffe126d1720 448 7ffe126d1739 440->448 441 7ffe126d17ee 442 7ffe126d1872 443 7ffe126d16b0 3 API calls 442->443 444 7ffe126d1881 443->444 445 7ffe126d17ad VirtualQuery 446 7ffe126d1857 445->446 445->448 447 7ffe126d16b0 3 API calls 446->447 447->442 448->441 448->442 448->445 449 7ffe126d1800 VirtualProtect 448->449 449->441 450 7ffe126d1838 GetLastError 449->450 452 7ffe126d16b0 450->452 455 7ffe126d16dc 452->455 453 7ffe126d17ad VirtualQuery 454 7ffe126d17ee 453->454 453->455 454->448 455->453 455->454 456 7ffe126d1800 VirtualProtect 455->456 456->454 457 7ffe126d1838 GetLastError 456->457 457->455 458 7ffe126d1ee0 459 7ffe126d1eef 458->459 460 7ffe126d1f5e 459->460 461 7ffe126d1f49 strncmp 459->461 461->459 461->460 462 7ffe126d15e0 463 7ffe126d15e9 462->463 464 7ffe126d15ed 463->464 467 7ffe126d1d60 463->467 466 7ffe126d1605 468 7ffe126d1d6e 467->468 469 7ffe126d1e20 467->469 470 7ffe126d1d74 468->470 471 7ffe126d1d82 468->471 474 7ffe126d1dc0 468->474 469->466 470->471 472 7ffe126d1e40 InitializeCriticalSection 470->472 471->466 472->471 473 7ffe126d1df9 DeleteCriticalSection 473->471 474->471 474->473 475 7ffe126d1de8 free 474->475 475->473 475->475 480 7ffe126d1610 481 7ffe126d1622 480->481 482 7ffe126d1632 481->482 483 7ffe126d1d60 3 API calls 481->483 484 7ffe126d1685 483->484 485 7ffe126d1cd0 486 7ffe126d1ce2 485->486 487 7ffe126d1cf0 EnterCriticalSection 485->487 488 7ffe126d1d33 LeaveCriticalSection 487->488 489 7ffe126d1d0c 487->489 489->488 490 7ffe126d1d2e free 489->490 490->488 491 7ffe126d1340 492 7ffe126d2300 491->492 493 7ffe126d2317 _lock 492->493 494 7ffe126d234b 492->494 495 7ffe126d2327 493->495 496 7ffe126d2334 _unlock 495->496 497 7ffe126d23be _unlock 495->497 498 7ffe126d2379 495->498 496->494 497->494 498->496

        Callgraph

        • Executed
        • Not Executed
        • Opacity -> Relevance
        • Disassembly available
        callgraph 0 Function_00007FFE126D1AB6 1 Function_00007FFE126DE139 2 Function_00007FFE126D1BB2 3 Function_00007FFE126E1A32 4 Function_00007FFE126D22B0 5 Function_00007FFE126D16B0 5->5 19 Function_00007FFE126D1F80 5->19 46 Function_00007FFE126D22C0 5->46 47 Function_00007FFE126D20C0 5->47 6 Function_00007FFE126D1720 6->5 6->19 6->47 7 Function_00007FFE126D16A0 8 Function_00007FFE126D1320 9 Function_00007FFE126E161B 10 Function_0000014ECF510000 17 Function_0000014ECF5100F1 10->17 11 Function_00007FFE126D2519 12 Function_00007FFE126D1E90 13 Function_00007FFE126D2190 14 Function_00007FFE126D1010 40 Function_00007FFE126D23D0 14->40 15 Function_00007FFE126D1510 16 Function_00007FFE126D1610 31 Function_00007FFE126D1D60 16->31 18 Function_00007FFE126D2000 20 Function_00007FFE126D1000 21 Function_00007FFE126D2100 22 Function_00007FFE126DE000 23 Function_00007FFE126D1BF8 24 Function_00007FFE126E37EF 25 Function_00007FFE126D2270 26 Function_00007FFE126D1370 27 Function_00007FFE126E17DF 28 Function_00007FFE126D1460 29 Function_00007FFE126D1360 30 Function_00007FFE126D2260 31->30 32 Function_00007FFE126D1E60 33 Function_00007FFE126D1EE0 34 Function_00007FFE126D15E0 34->31 35 Function_00007FFE126DE060 36 Function_00007FFE126D145B 37 Function_00007FFE126D1C5B 38 Function_00007FFE126E02D5 39 Function_00007FFE126D11D0 39->4 39->14 39->28 48 Function_00007FFE126D15C0 39->48 41 Function_00007FFE126D1CD0 42 Function_00007FFE126E2D4B 43 Function_00007FFE126D1943 44 Function_00007FFE126D1340 45 Function_00007FFE126D2040

        Control-flow Graph

        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1671128560.0000014ECF510000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000014ECF510000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_14ecf510000_loaddll64.jbxd
        Yara matches
        Similarity
        • API ID: Process$CreateExitLibraryLoadSocketStartupconnect
        • String ID: cmd$ws2_
        • API String ID: 1708454136-3237529508
        • Opcode ID: 71dfb261d9fd836fd7f0068f1150b946d067d1891a4b52393b0335abde82cc52
        • Instruction ID: 6feb498fe7adfdcedc0dd7c3901e6e160dab0dfe803cc24cecad38e9fecdca7a
        • Opcode Fuzzy Hash: 71dfb261d9fd836fd7f0068f1150b946d067d1891a4b52393b0335abde82cc52
        • Instruction Fuzzy Hash: F1312760B58A4C1BF21D21596C0E93736CED79B715F10816FF98AC72E7DC509C8341AB

        Control-flow Graph

        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.1671873164.00007FFE126D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE126D0000, based on PE: true
        • Associated: 00000000.00000002.1671857165.00007FFE126D0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1671887080.00007FFE126D3000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1671907968.00007FFE126D4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1672014765.00007FFE126D6000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1672764476.00007FFE126DA000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1672844194.00007FFE126DE000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ffe126d0000_loaddll64.jbxd
        Similarity
        • API ID: AllocVirtual
        • String ID:
        • API String ID: 4275171209-0
        • Opcode ID: 550f36a69d5fc6f3d7ef6075f3b9dfda6a51651a98a0a4e7fe176978030951ad
        • Instruction ID: b848c15bf8c258c17e60210322d0fecae67bbd643135497c1dcabababdfb7f3a
        • Opcode Fuzzy Hash: 550f36a69d5fc6f3d7ef6075f3b9dfda6a51651a98a0a4e7fe176978030951ad
        • Instruction Fuzzy Hash: 7F119172B20B8886E7048B69D8006DC27A0E749BF4F544239DE6C57BD4DA38C551C340

        Control-flow Graph

        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1671873164.00007FFE126D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE126D0000, based on PE: true
        • Associated: 00000000.00000002.1671857165.00007FFE126D0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1671887080.00007FFE126D3000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1671907968.00007FFE126D4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1672014765.00007FFE126D6000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1672764476.00007FFE126DA000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1672844194.00007FFE126DE000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ffe126d0000_loaddll64.jbxd
        Similarity
        • API ID: AddressProc$HandleLibraryLoadModule
        • String ID: __deregister_frame_info$__register_frame_info$libgcc_s_dw2-1.dll
        • API String ID: 384173800-1835852900
        • Opcode ID: d7019b6e49358472544b9a1482c9ccd247431350295f6d8abb0b0ffc93d1be17
        • Instruction ID: d459ee0be3287634dedfe5d348e0b72a7220ef057511c70bcf196ea06b0fa70c
        • Opcode Fuzzy Hash: d7019b6e49358472544b9a1482c9ccd247431350295f6d8abb0b0ffc93d1be17
        • Instruction Fuzzy Hash: 4D01B720E09E5F93EA259B47BC502B423A4BF487A5B8545B1C88D437B4EEECA906C340

        Control-flow Graph

        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1671873164.00007FFE126D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE126D0000, based on PE: true
        • Associated: 00000000.00000002.1671857165.00007FFE126D0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1671887080.00007FFE126D3000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1671907968.00007FFE126D4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1672014765.00007FFE126D6000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1672764476.00007FFE126DA000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1672844194.00007FFE126DE000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ffe126d0000_loaddll64.jbxd
        Similarity
        • API ID: QueryVirtual
        • String ID: VirtualProtect failed with code 0x%x$ VirtualQuery failed for %d bytes at address %p$Address %p has no image-section$Mingw-w64 runtime failure:
        • API String ID: 1804819252-1534286854
        • Opcode ID: 047ac82dca066b42efc2a601d2e153124c0eb051c46cc83277b14deb1ea37f26
        • Instruction ID: a876f1b108ec037f100674bed2f0103b08d574749da32a2e6f0ed14ef01b1829
        • Opcode Fuzzy Hash: 047ac82dca066b42efc2a601d2e153124c0eb051c46cc83277b14deb1ea37f26
        • Instruction Fuzzy Hash: 2F419076A08E4E83EB109F52EC446A967A0FF85BA4F8442B5DA8C073F5DEBCE545C740

        Control-flow Graph

        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.1671873164.00007FFE126D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE126D0000, based on PE: true
        • Associated: 00000000.00000002.1671857165.00007FFE126D0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1671887080.00007FFE126D3000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1671907968.00007FFE126D4000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1672014765.00007FFE126D6000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1672764476.00007FFE126DA000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1672844194.00007FFE126DE000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ffe126d0000_loaddll64.jbxd
        Similarity
        • API ID: Sleep_amsg_exit
        • String ID:
        • API String ID: 1015461914-0
        • Opcode ID: 83309196a835a35b6abbe5e2eb965c1e7e9af00a985b5e7e06ca3a5a340e373e
        • Instruction ID: 2ce8544c1834f759acb9eb8caa91dcbf6b6ce93a46d5eeb303b3a1fd55c2d3ed
        • Opcode Fuzzy Hash: 83309196a835a35b6abbe5e2eb965c1e7e9af00a985b5e7e06ca3a5a340e373e
        • Instruction Fuzzy Hash: FF413731A09A8EC7F761AB57EC807792291AF44BA4F9440B5CE8C873F5DEECE8419340

        Execution Graph

        Execution Coverage:60.3%
        Dynamic/Decrypted Code Coverage:100%
        Signature Coverage:0%
        Total number of Nodes:6
        Total number of Limit Nodes:0

        Callgraph

        • Executed
        • Not Executed
        • Opacity -> Relevance
        • Disassembly available
        callgraph 0 Function_00000251F17700F1 1 Function_00000251F1770000 1->0

        Control-flow Graph

        APIs
        Strings
        Memory Dump Source
        • Source File: 00000003.00000002.1643896439.00000251F1770000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000251F1770000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_251f1770000_rundll32.jbxd
        Yara matches
        Similarity
        • API ID: Process$CreateExitLibraryLoadSocketStartupconnect
        • String ID: cmd$ws2_
        • API String ID: 1708454136-3237529508
        • Opcode ID: 71dfb261d9fd836fd7f0068f1150b946d067d1891a4b52393b0335abde82cc52
        • Instruction ID: 8685c32a923c86c36b6fb03fb709b77b47f8899c70fcb2f918e6e30a663ddb20
        • Opcode Fuzzy Hash: 71dfb261d9fd836fd7f0068f1150b946d067d1891a4b52393b0335abde82cc52
        • Instruction Fuzzy Hash: 1F312760B58A4C1BE21C61596C0EA3736CEC79B716F10426FE88EC72D7DC519C8341AB

        Execution Graph

        Execution Coverage:60.3%
        Dynamic/Decrypted Code Coverage:100%
        Signature Coverage:0%
        Total number of Nodes:6
        Total number of Limit Nodes:0

        Callgraph

        • Executed
        • Not Executed
        • Opacity -> Relevance
        • Disassembly available
        callgraph 0 Function_0000019540F00000 1 Function_0000019540F000F1 0->1

        Control-flow Graph

        APIs
        Strings
        Memory Dump Source
        • Source File: 00000004.00000002.1643975129.0000019540F00000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000019540F00000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_19540f00000_rundll32.jbxd
        Yara matches
        Similarity
        • API ID: Process$CreateExitLibraryLoadSocketStartupconnect
        • String ID: cmd$ws2_
        • API String ID: 1708454136-3237529508
        • Opcode ID: 71dfb261d9fd836fd7f0068f1150b946d067d1891a4b52393b0335abde82cc52
        • Instruction ID: 051610d3d6727538a9839e9c0f7bfa95b584518320dbbd796d4df50366874b46
        • Opcode Fuzzy Hash: 71dfb261d9fd836fd7f0068f1150b946d067d1891a4b52393b0335abde82cc52
        • Instruction Fuzzy Hash: 6C31E561B58A8C2BE21D61696C0E93736CEC79B715F10417FE98AC7296EC509C8341AB