Windows Analysis Report
UxTheme.dll.dll

Overview

General Information

Sample name: UxTheme.dll.dll
(renamed file extension from exe to dll)
Original sample name: UxTheme.dll.exe
Analysis ID: 1468058
MD5: 336bed2506b03c75235a8549888e64b9
SHA1: da0808fe16c9b3cf20a133d56343d45bf0faf8ea
SHA256: d25d0df1669dc0f2c1eff862518b263fb3ced9e4ec2a150de6af06939dd9738e
Tags: exe
Infos:

Detection

CobaltStrike
Score: 100
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected CobaltStrike
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Found direct / indirect Syscall (likely to bypass EDR)
Hides threads from debuggers
PE file contains section with special chars
PE file has a writeable .text section
Query firmware table information (likely to detect VMs)
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Entry point lies outside standard sections
One or more processes crash
PE file contains more sections than normal
PE file contains sections with non-standard names
Registers a DLL
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Name Description Attribution Blogpost URLs Link
Cobalt Strike, CobaltStrike Cobalt Strike is a paid penetration testing product that allows an attacker to deploy an agent named 'Beacon' on the victim machine. Beacon includes a wealth of functionality to the attacker, including, but not limited to command execution, key logging, file transfer, SOCKS proxying, privilege escalation, mimikatz, port scanning and lateral movement. Beacon is in-memory/file-less, in that it consists of stageless or multi-stage shellcode that once loaded by exploiting a vulnerability or executing a shellcode loader, will reflectively load itself into the memory of a process without touching the disk. It supports C2 and staging over HTTP, HTTPS, DNS, SMB named pipes as well as forward and reverse TCP; Beacons can be daisy-chained. Cobalt Strike comes with a toolkit for developing shellcode loaders, called Artifact Kit.The Beacon implant has become popular amongst targeted attackers and criminal users as it is well written, stable, and highly customizable.
  • APT 29
  • APT32
  • APT41
  • AQUATIC PANDA
  • Anunak
  • Cobalt
  • Codoso
  • CopyKittens
  • DarkHydrus
  • FIN6
  • FIN7
  • Leviathan
  • Mustang Panda
  • Shell Crew
  • Stone Panda
  • TianWu
  • UNC1878
  • UNC2452
  • Winnti Umbrella
https://malpedia.caad.fkie.fraunhofer.de/details/win.cobalt_strike

AV Detection

barindex
Source: 00000010.00000003.2777687515.00000256A6980000.00000004.00001000.00020000.00000000.sdmp Malware Configuration Extractor: CobaltStrike {"BeaconType": ["HTTPS"], "Port": 443, "SleepTime": 60000, "MaxGetSize": 11456204, "Jitter": 51, "C2Server": "us-central1-keepass-415209.cloudfunctions.net,/keepasswork/api/v1/metadata/private", "HttpPostUri": "/keepasswork/api/v1/metadata/user/avatar", "Malleable_C2_Instructions": ["Remove 2 bytes from the end", "Remove 60 bytes from the beginning", "Base64 URL-safe decode", "XOR mask w/ random key", "NetBIOS decode 'a'"], "HttpGet_Verb": "GET", "HttpPost_Verb": "POST", "HttpPostChunk": 0, "Spawnto_x86": "%windir%\\syswow64\\WerFault.exe -u -p 1324 -s 1528", "Spawnto_x64": "%windir%\\sysnative\\WerFault.exe -u -p 1324 -s 1528", "CryptoScheme": 0, "Proxy_Behavior": "Use IE settings", "Watermark": 628807914, "bStageCleanup": "True", "bCFGCaution": "False", "KillDate": "2024-03-31", "bProcInject_StartRWX": "False", "bProcInject_UseRWX": "False", "bProcInject_MinAllocSize": 379133, "ProcInject_PrependAppend_x86": ["kJCQkJCQkJCQ", "kJCQkJCQkJCQ"], "ProcInject_PrependAppend_x64": ["kJCQkJCQkJCQ", "kJCQkJCQkJCQ"], "ProcInject_Execute": ["ntdll:RtlUserThreadStart", "CreateThread", "NtQueueApcThread-s", "NtQueueApcThread", "RtlCreateUserThread", "SetThreadContext", "CreateRemoteThread"], "ProcInject_AllocationMethod": "NtMapViewOfSection", "bUsesCookies": "True", "HostHeader": "Host: us-central1-keepass-415209.cloudfunctions.net\r\n"}
Source: UxTheme.dll.dll Virustotal: Detection: 37% Perma Link
Source: UxTheme.dll.dll ReversingLabs: Detection: 34%
Source: Submited Sample Integrated Neural Analysis Model: Matched 100.0% probability
Source: Binary string: Z:\data\loaders\EvilProxyDll-master\EvilProxyDLL\x64\Release\EvilProxyDLL.pdb source: loaddll64.exe, 00000000.00000003.2720535139.0000013678900000.00000004.00001000.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000002.2763457463.00007FFB0C37E000.00000040.00000001.01000000.00000003.sdmp, regsvr32.exe, 00000004.00000002.2632910459.00007FFB0C37E000.00000040.00000001.01000000.00000003.sdmp, regsvr32.exe, 00000004.00000003.2631971858.00000000009A0000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.2637825326.00007FFB0C37E000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000005.00000003.2631582760.000002ED45480000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.2631492658.000001456FC70000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 00000006.00000002.2658497704.00007FFB0C37E000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000007.00000002.2904790460.00007FFB0C37E000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000007.00000003.2660715337.0000020B67A00000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000003.2695239468.000001F028900000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000002.2700982334.00007FFB0C37E000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000D.00000003.2754046806.000001C9B9D90000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 0000000D.00000002.2771474351.00007FFB0C37E000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000E.00000003.2751617374.000002C17C6E0000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000002.2855868309.00007FFB0C37E000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000F.00000002.2770781756.00007FFB0C37E000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000F.00000003.2755178403.0000018A21B00000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 00000010.00000002.2786576454.00007FFB0C37E000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000010.00000003.2749029102.00000256A6940000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.2754536935.0000024FEA5D0000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 00000011.00000002.2763985665.00007FFB0C37E000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000012.00000002.2770313057.00007FFB0C37E000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000012.00000003.2755418217.0000011C193F0000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 00000013.00000002.2769167128.00007FFB0C37E000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000013.00000003.2754499454.0000021B3EE60000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 00000014.00000002.2765583596.00007FFB0C37E000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000014.00000003.2750128068.000001AB07A10000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 00000015.00000003.2754033866.0000011319200
Source: Binary string: c:\miniprojects\x86il\il86\x64\release\IL86.pdb! source: loaddll64.exe, 00000000.00000002.2768698425.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, regsvr32.exe, 00000004.00000002.2633003757.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000005.00000002.2637983839.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000006.00000002.2658617443.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000007.00000002.2904939987.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000C.00000002.2701089699.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000D.00000002.2773109484.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000E.00000002.2856013589.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000F.00000002.2772478758.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000010.00000002.2787040179.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000011.00000002.2764459215.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000012.00000002.2771861469.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000013.00000002.2770124965.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000014.00000002.2766130893.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000015.00000002.2767828792.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000016.00000002.2772321065.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000017.00000002.2772170828.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000018.00000002.2768439722.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000019.00000002.2768538647.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001A.00000002.2776915066.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001B.00000002.2772216438.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001C.00000002.2773680469.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001D.00000002.2758812796.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001E.00000002.2772704180.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001F.00000002.2773205781.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000020.00000002.2772158510.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000021.00000002.2873398411.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000022.00000002.2775937894.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000023.00000002.2761298877.00007FFB0C6EA000.00000040.00000001.0100000
Source: Binary string: c:\miniprojects\x86il\il86\x64\release\IL86.pdb source: loaddll64.exe, loaddll64.exe, 00000000.00000002.2768698425.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, regsvr32.exe, regsvr32.exe, 00000004.00000002.2633003757.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, rundll32.exe, 00000005.00000002.2637983839.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000006.00000002.2658617443.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000007.00000002.2904939987.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000C.00000002.2701089699.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000D.00000002.2773109484.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000E.00000002.2856013589.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000F.00000002.2772478758.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000010.00000002.2787040179.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000011.00000002.2764459215.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000012.00000002.2771861469.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000013.00000002.2770124965.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000014.00000002.2766130893.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000015.00000002.2767828792.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000016.00000002.2772321065.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000017.00000002.2772170828.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000018.00000002.2768439722.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000019.00000002.2768538647.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001A.00000002.2776915066.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001B.00000002.2772216438.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001C.00000002.2773680469.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001D.00000002.2758812796.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001E.00000002.2772704180.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001F.00000002.2773205781.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000020.00000002.2772158510.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000021.00000002.2873398411.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000022.00000002.2775937894.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000023.00000002.2761298877.0

Networking

barindex
Source: Malware configuration extractor URLs: us-central1-keepass-415209.cloudfunctions.net
Source: Amcache.hve.10.dr String found in binary or memory: http://upx.sf.net

System Summary

barindex
Source: 16.3.rundll32.exe.256a6980000.0.unpack, type: UNPACKEDPE Matched rule: Identifies CobaltStrike via unidentified function code Author: unknown
Source: 0.3.loaddll64.exe.13678d70000.0.unpack, type: UNPACKEDPE Matched rule: Identifies CobaltStrike via unidentified function code Author: unknown
Source: 0.3.loaddll64.exe.13678d70000.0.raw.unpack, type: UNPACKEDPE Matched rule: Identifies CobaltStrike via unidentified function code Author: unknown
Source: 6.3.rundll32.exe.14571620000.0.unpack, type: UNPACKEDPE Matched rule: Identifies CobaltStrike via unidentified function code Author: unknown
Source: 6.3.rundll32.exe.14571620000.0.raw.unpack, type: UNPACKEDPE Matched rule: Identifies CobaltStrike via unidentified function code Author: unknown
Source: 16.3.rundll32.exe.256a6980000.0.raw.unpack, type: UNPACKEDPE Matched rule: Identifies CobaltStrike via unidentified function code Author: unknown
Source: 00000010.00000003.2777687515.00000256A6980000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Identifies CobaltStrike via unidentified function code Author: unknown
Source: 00000000.00000002.2754622278.0000013678DC0000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Identifies CobaltStrike via unidentified function code Author: unknown
Source: 00000000.00000003.2753368272.0000013678D70000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Identifies CobaltStrike via unidentified function code Author: unknown
Source: 00000006.00000002.2658118414.0000014571670000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Identifies CobaltStrike via unidentified function code Author: unknown
Source: 00000010.00000002.2786000448.00000256A8720000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Identifies CobaltStrike via unidentified function code Author: unknown
Source: 00000006.00000003.2657321127.0000014571620000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Identifies CobaltStrike via unidentified function code Author: unknown
Source: UxTheme.dll.dll Static PE information: section name:
Source: UxTheme.dll.dll Static PE information: section name:
Source: UxTheme.dll.dll Static PE information: section name:
Source: UxTheme.dll.dll Static PE information: section name:
Source: UxTheme.dll.dll Static PE information: section name:
Source: UxTheme.dll.dll Static PE information: section name:
Source: UxTheme.dll.dll Static PE information: section name:
Source: UxTheme.dll.dll Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
Source: C:\Windows\System32\loaddll64.exe Code function: 0_3_00000136789100A0 NtAllocateVirtualMemory,NtAllocateVirtualMemory, 0_3_00000136789100A0
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_0000013678DC7250 NtFreeVirtualMemory, 0_2_0000013678DC7250
Source: C:\Windows\System32\loaddll64.exe Code function: 0_3_000001367891712E 0_3_000001367891712E
Source: C:\Windows\System32\loaddll64.exe Code function: 0_3_0000013678914F41 0_3_0000013678914F41
Source: C:\Windows\System32\loaddll64.exe Code function: 0_3_00000136789112C0 0_3_00000136789112C0
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_0000013678DDFB38 0_2_0000013678DDFB38
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_0000013678DE9B80 0_2_0000013678DE9B80
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_0000013678DC4571 0_2_0000013678DC4571
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_0000013678DF3E70 0_2_0000013678DF3E70
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_0000013678DE6D98 0_2_0000013678DE6D98
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_0000013678DC675E 0_2_0000013678DC675E
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_0000013678DF47E0 0_2_0000013678DF47E0
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_0000013678DE9118 0_2_0000013678DE9118
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_0000013678DC08F0 0_2_0000013678DC08F0
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_0000013678DE8A54 0_2_0000013678DE8A54
Source: C:\Windows\System32\rundll32.exe Process created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 4116 -s 416
Source: UxTheme.dll.dll Static PE information: Number of sections : 12 > 10
Source: UxTheme.dll.dll Binary or memory string: OriginalFilenameUxTheme.dllj% vs UxTheme.dll.dll
Source: 16.3.rundll32.exe.256a6980000.0.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17
Source: 0.3.loaddll64.exe.13678d70000.0.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17
Source: 0.3.loaddll64.exe.13678d70000.0.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17
Source: 6.3.rundll32.exe.14571620000.0.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17
Source: 6.3.rundll32.exe.14571620000.0.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17
Source: 16.3.rundll32.exe.256a6980000.0.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17
Source: 00000010.00000003.2777687515.00000256A6980000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17
Source: 00000000.00000002.2754622278.0000013678DC0000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17
Source: 00000000.00000003.2753368272.0000013678D70000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17
Source: 00000006.00000002.2658118414.0000014571670000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17
Source: 00000010.00000002.2786000448.00000256A8720000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17
Source: 00000006.00000003.2657321127.0000014571620000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17
Source: UxTheme.dll.dll Static PE information: Section: ZLIB complexity 0.9977936921296297
Source: UxTheme.dll.dll Static PE information: Section: ZLIB complexity 0.9974365234375
Source: UxTheme.dll.dll Static PE information: Section: ZLIB complexity 0.9931918806221889
Source: classification engine Classification label: mal100.troj.evad.winDLL@76/5@0/0
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6700:120:WilError_03
Source: C:\Windows\System32\WerFault.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess4116
Source: C:\Windows\System32\WerFault.exe File created: C:\ProgramData\Microsoft\Windows\WER\Temp\93a05f0a-522e-47d9-8c16-75fbe37a3a9b Jump to behavior
Source: C:\Windows\System32\loaddll64.exe Key opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: C:\Windows\System32\loaddll64.exe Process created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\UxTheme.dll.dll,BeginBufferedAnimation
Source: UxTheme.dll.dll Virustotal: Detection: 37%
Source: UxTheme.dll.dll ReversingLabs: Detection: 34%
Source: unknown Process created: C:\Windows\System32\loaddll64.exe loaddll64.exe "C:\Users\user\Desktop\UxTheme.dll.dll"
Source: C:\Windows\System32\loaddll64.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\loaddll64.exe Process created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",#1
Source: C:\Windows\System32\loaddll64.exe Process created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\UxTheme.dll.dll
Source: C:\Windows\System32\loaddll64.exe Process created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\UxTheme.dll.dll,BeginBufferedAnimation
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",#1
Source: C:\Windows\System32\loaddll64.exe Process created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\UxTheme.dll.dll,BeginBufferedPaint
Source: C:\Windows\System32\rundll32.exe Process created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 4116 -s 416
Source: C:\Windows\System32\loaddll64.exe Process created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\UxTheme.dll.dll,BeginPanningFeedback
Source: C:\Windows\System32\loaddll64.exe Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",BeginBufferedAnimation
Source: C:\Windows\System32\loaddll64.exe Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",BeginBufferedPaint
Source: C:\Windows\System32\loaddll64.exe Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",BeginPanningFeedback
Source: C:\Windows\System32\loaddll64.exe Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",UpdateSignature
Source: C:\Windows\System32\loaddll64.exe Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",UpdatePanningFeedback
Source: C:\Windows\System32\loaddll64.exe Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",ThemeInitApiHook
Source: C:\Windows\System32\loaddll64.exe Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",SetWindowThemeAttribute
Source: C:\Windows\System32\loaddll64.exe Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",SetWindowTheme
Source: C:\Windows\System32\loaddll64.exe Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",SetThemeAppProperties
Source: C:\Windows\System32\loaddll64.exe Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",OpenThemeDataForDpi
Source: C:\Windows\System32\loaddll64.exe Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",OpenThemeDataEx
Source: C:\Windows\System32\loaddll64.exe Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",OpenThemeData
Source: C:\Windows\System32\loaddll64.exe Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",IsThemePartDefined
Source: C:\Windows\System32\loaddll64.exe Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",IsThemeDialogTextureEnabled
Source: C:\Windows\System32\loaddll64.exe Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",IsThemeBackgroundPartiallyTransparent
Source: C:\Windows\System32\loaddll64.exe Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",IsThemeActive
Source: C:\Windows\System32\loaddll64.exe Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",IsCompositionActive
Source: C:\Windows\System32\loaddll64.exe Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",IsAppThemed
Source: C:\Windows\System32\loaddll64.exe Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",HitTestThemeBackground
Source: C:\Windows\System32\loaddll64.exe Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",GetWindowTheme
Source: C:\Windows\System32\loaddll64.exe Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",GetUserColorPreference
Source: C:\Windows\System32\loaddll64.exe Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",GetThemeTimingFunction
Source: C:\Windows\System32\loaddll64.exe Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",GetThemeTextMetrics
Source: C:\Windows\System32\loaddll64.exe Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",GetThemeTextExtent
Source: C:\Windows\System32\loaddll64.exe Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",GetThemeSysString
Source: C:\Windows\System32\loaddll64.exe Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",GetThemeSysSize
Source: C:\Windows\System32\loaddll64.exe Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",GetThemeSysInt
Source: C:\Windows\System32\loaddll64.exe Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",GetThemeSysFont
Source: C:\Windows\System32\loaddll64.exe Process created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",#1 Jump to behavior
Source: C:\Windows\System32\loaddll64.exe Process created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\UxTheme.dll.dll Jump to behavior
Source: C:\Windows\System32\loaddll64.exe Process created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\UxTheme.dll.dll,BeginBufferedAnimation Jump to behavior
Source: C:\Windows\System32\loaddll64.exe Process created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\UxTheme.dll.dll,BeginBufferedPaint Jump to behavior
Source: C:\Windows\System32\loaddll64.exe Process created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\UxTheme.dll.dll,BeginPanningFeedback Jump to behavior
Source: C:\Windows\System32\loaddll64.exe Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",BeginBufferedAnimation Jump to behavior
Source: C:\Windows\System32\loaddll64.exe Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",BeginBufferedPaint Jump to behavior
Source: C:\Windows\System32\loaddll64.exe Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",BeginPanningFeedback Jump to behavior
Source: C:\Windows\System32\loaddll64.exe Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",UpdateSignature Jump to behavior
Source: C:\Windows\System32\loaddll64.exe Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",UpdatePanningFeedback Jump to behavior
Source: C:\Windows\System32\loaddll64.exe Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",ThemeInitApiHook Jump to behavior
Source: C:\Windows\System32\loaddll64.exe Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",SetWindowThemeAttribute Jump to behavior
Source: C:\Windows\System32\loaddll64.exe Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",SetWindowTheme Jump to behavior
Source: C:\Windows\System32\loaddll64.exe Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",SetThemeAppProperties Jump to behavior
Source: C:\Windows\System32\loaddll64.exe Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",OpenThemeDataForDpi Jump to behavior
Source: C:\Windows\System32\loaddll64.exe Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",OpenThemeDataEx Jump to behavior
Source: C:\Windows\System32\loaddll64.exe Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",OpenThemeData Jump to behavior
Source: C:\Windows\System32\loaddll64.exe Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",IsThemePartDefined Jump to behavior
Source: C:\Windows\System32\loaddll64.exe Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",IsThemeDialogTextureEnabled Jump to behavior
Source: C:\Windows\System32\loaddll64.exe Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",IsThemeBackgroundPartiallyTransparent Jump to behavior
Source: C:\Windows\System32\loaddll64.exe Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",IsThemeActive Jump to behavior
Source: C:\Windows\System32\loaddll64.exe Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",IsCompositionActive Jump to behavior
Source: C:\Windows\System32\loaddll64.exe Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",IsAppThemed Jump to behavior
Source: C:\Windows\System32\loaddll64.exe Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",HitTestThemeBackground Jump to behavior
Source: C:\Windows\System32\loaddll64.exe Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",GetWindowTheme Jump to behavior
Source: C:\Windows\System32\loaddll64.exe Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",GetUserColorPreference Jump to behavior
Source: C:\Windows\System32\loaddll64.exe Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",#1 Jump to behavior
Source: C:\Windows\System32\loaddll64.exe Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",GetThemeTimingFunction Jump to behavior
Source: C:\Windows\System32\loaddll64.exe Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",GetThemeTextMetrics Jump to behavior
Source: C:\Windows\System32\loaddll64.exe Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",GetThemeTextExtent Jump to behavior
Source: C:\Windows\System32\loaddll64.exe Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",GetThemeSysString Jump to behavior
Source: C:\Windows\System32\loaddll64.exe Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",GetThemeSysSize Jump to behavior
Source: C:\Windows\System32\loaddll64.exe Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",GetThemeSysInt Jump to behavior
Source: C:\Windows\System32\loaddll64.exe Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",GetThemeSysFont Jump to behavior
Source: C:\Windows\System32\loaddll64.exe Process created: unknown unknown Jump to behavior
Source: C:\Windows\System32\loaddll64.exe Process created: unknown unknown Jump to behavior
Source: C:\Windows\System32\loaddll64.exe Process created: unknown unknown Jump to behavior
Source: C:\Windows\System32\loaddll64.exe Process created: unknown unknown Jump to behavior
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",#1 Jump to behavior
Source: C:\Windows\System32\loaddll64.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Windows\System32\loaddll64.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Windows\System32\loaddll64.exe Section loaded: cryptsp.dll Jump to behavior
Source: C:\Windows\System32\loaddll64.exe Section loaded: rsaenh.dll Jump to behavior
Source: C:\Windows\System32\loaddll64.exe Section loaded: cryptbase.dll Jump to behavior
Source: C:\Windows\System32\loaddll64.exe Section loaded: wininet.dll Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Section loaded: aclayers.dll Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Section loaded: sfc.dll Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Section loaded: sfc_os.dll Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Windows\System32\rundll32.exe Automated click: OK
Source: C:\Windows\System32\rundll32.exe Automated click: OK
Source: Window Recorder Window detected: More than 3 window changes detected
Source: UxTheme.dll.dll Static PE information: Virtual size of .text is bigger than: 0x100000
Source: UxTheme.dll.dll Static PE information: Image base 0x180000000 > 0x60000000
Source: UxTheme.dll.dll Static file information: File size 3842048 > 1048576
Source: UxTheme.dll.dll Static PE information: Raw size of .boot is bigger than: 0x100000 < 0x345c00
Source: Binary string: Z:\data\loaders\EvilProxyDll-master\EvilProxyDLL\x64\Release\EvilProxyDLL.pdb source: loaddll64.exe, 00000000.00000003.2720535139.0000013678900000.00000004.00001000.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000002.2763457463.00007FFB0C37E000.00000040.00000001.01000000.00000003.sdmp, regsvr32.exe, 00000004.00000002.2632910459.00007FFB0C37E000.00000040.00000001.01000000.00000003.sdmp, regsvr32.exe, 00000004.00000003.2631971858.00000000009A0000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.2637825326.00007FFB0C37E000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000005.00000003.2631582760.000002ED45480000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.2631492658.000001456FC70000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 00000006.00000002.2658497704.00007FFB0C37E000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000007.00000002.2904790460.00007FFB0C37E000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000007.00000003.2660715337.0000020B67A00000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000003.2695239468.000001F028900000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000002.2700982334.00007FFB0C37E000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000D.00000003.2754046806.000001C9B9D90000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 0000000D.00000002.2771474351.00007FFB0C37E000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000E.00000003.2751617374.000002C17C6E0000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000002.2855868309.00007FFB0C37E000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000F.00000002.2770781756.00007FFB0C37E000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000F.00000003.2755178403.0000018A21B00000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 00000010.00000002.2786576454.00007FFB0C37E000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000010.00000003.2749029102.00000256A6940000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.2754536935.0000024FEA5D0000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 00000011.00000002.2763985665.00007FFB0C37E000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000012.00000002.2770313057.00007FFB0C37E000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000012.00000003.2755418217.0000011C193F0000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 00000013.00000002.2769167128.00007FFB0C37E000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000013.00000003.2754499454.0000021B3EE60000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 00000014.00000002.2765583596.00007FFB0C37E000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000014.00000003.2750128068.000001AB07A10000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 00000015.00000003.2754033866.0000011319200
Source: Binary string: c:\miniprojects\x86il\il86\x64\release\IL86.pdb! source: loaddll64.exe, 00000000.00000002.2768698425.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, regsvr32.exe, 00000004.00000002.2633003757.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000005.00000002.2637983839.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000006.00000002.2658617443.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000007.00000002.2904939987.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000C.00000002.2701089699.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000D.00000002.2773109484.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000E.00000002.2856013589.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000F.00000002.2772478758.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000010.00000002.2787040179.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000011.00000002.2764459215.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000012.00000002.2771861469.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000013.00000002.2770124965.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000014.00000002.2766130893.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000015.00000002.2767828792.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000016.00000002.2772321065.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000017.00000002.2772170828.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000018.00000002.2768439722.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000019.00000002.2768538647.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001A.00000002.2776915066.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001B.00000002.2772216438.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001C.00000002.2773680469.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001D.00000002.2758812796.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001E.00000002.2772704180.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001F.00000002.2773205781.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000020.00000002.2772158510.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000021.00000002.2873398411.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000022.00000002.2775937894.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000023.00000002.2761298877.00007FFB0C6EA000.00000040.00000001.0100000
Source: Binary string: c:\miniprojects\x86il\il86\x64\release\IL86.pdb source: loaddll64.exe, loaddll64.exe, 00000000.00000002.2768698425.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, regsvr32.exe, regsvr32.exe, 00000004.00000002.2633003757.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, rundll32.exe, 00000005.00000002.2637983839.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000006.00000002.2658617443.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000007.00000002.2904939987.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000C.00000002.2701089699.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000D.00000002.2773109484.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000E.00000002.2856013589.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000F.00000002.2772478758.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000010.00000002.2787040179.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000011.00000002.2764459215.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000012.00000002.2771861469.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000013.00000002.2770124965.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000014.00000002.2766130893.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000015.00000002.2767828792.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000016.00000002.2772321065.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000017.00000002.2772170828.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000018.00000002.2768439722.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000019.00000002.2768538647.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001A.00000002.2776915066.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001B.00000002.2772216438.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001C.00000002.2773680469.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001D.00000002.2758812796.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001E.00000002.2772704180.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001F.00000002.2773205781.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000020.00000002.2772158510.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000021.00000002.2873398411.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000022.00000002.2775937894.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000023.00000002.2761298877.0
Source: initial sample Static PE information: section where entry point is pointing to: .boot
Source: UxTheme.dll.dll Static PE information: section name:
Source: UxTheme.dll.dll Static PE information: section name:
Source: UxTheme.dll.dll Static PE information: section name:
Source: UxTheme.dll.dll Static PE information: section name:
Source: UxTheme.dll.dll Static PE information: section name:
Source: UxTheme.dll.dll Static PE information: section name:
Source: UxTheme.dll.dll Static PE information: section name:
Source: UxTheme.dll.dll Static PE information: section name: .boot
Source: C:\Windows\System32\loaddll64.exe Process created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\UxTheme.dll.dll
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_0000013678DD235D push edi; iretd 0_2_0000013678DD235E
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_0000013678DF243F push ebp; iretd 0_2_0000013678DF2440
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_0000013678DF245F push ebp; iretd 0_2_0000013678DF2460
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_0000013678DD3D58 push ebp; iretd 0_2_0000013678DD3D59
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_0000013678DF2488 push ebp; iretd 0_2_0000013678DF2489
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_0000013678DE1EF6 push edx; ret 0_2_0000013678DE1EF7
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_0000013678DD271E push cs; retf 0_2_0000013678DD271F
Source: UxTheme.dll.dll Static PE information: section name: entropy: 7.96741105930464

Boot Survival

barindex
Source: C:\Windows\System32\loaddll64.exe Window searched: window name: FilemonClass Jump to behavior
Source: C:\Windows\System32\loaddll64.exe Window searched: window name: PROCMON_WINDOW_CLASS Jump to behavior
Source: C:\Windows\System32\loaddll64.exe Window searched: window name: RegmonClass Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Window searched: window name: FilemonClass Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Window searched: window name: PROCMON_WINDOW_CLASS Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Window searched: window name: RegmonClass Jump to behavior
Source: C:\Windows\System32\rundll32.exe Window searched: window name: FilemonClass Jump to behavior
Source: C:\Windows\System32\rundll32.exe Window searched: window name: PROCMON_WINDOW_CLASS Jump to behavior
Source: C:\Windows\System32\rundll32.exe Window searched: window name: RegmonClass Jump to behavior
Source: C:\Windows\System32\rundll32.exe Window searched: window name: FilemonClass Jump to behavior
Source: C:\Windows\System32\rundll32.exe Window searched: window name: PROCMON_WINDOW_CLASS Jump to behavior
Source: C:\Windows\System32\rundll32.exe Window searched: window name: RegmonClass Jump to behavior
Source: C:\Windows\System32\rundll32.exe Window searched: window name: FilemonClass Jump to behavior
Source: C:\Windows\System32\rundll32.exe Window searched: window name: PROCMON_WINDOW_CLASS Jump to behavior
Source: C:\Windows\System32\rundll32.exe Window searched: window name: RegmonClass Jump to behavior
Source: C:\Windows\System32\rundll32.exe Window searched: window name: FilemonClass Jump to behavior
Source: C:\Windows\System32\rundll32.exe Window searched: window name: PROCMON_WINDOW_CLASS Jump to behavior
Source: C:\Windows\System32\rundll32.exe Window searched: window name: RegmonClass Jump to behavior
Source: C:\Windows\System32\rundll32.exe Window searched: window name: FilemonClass Jump to behavior
Source: C:\Windows\System32\rundll32.exe Window searched: window name: PROCMON_WINDOW_CLASS Jump to behavior
Source: C:\Windows\System32\rundll32.exe Window searched: window name: RegmonClass Jump to behavior
Source: C:\Windows\System32\rundll32.exe Window searched: window name: FilemonClass Jump to behavior
Source: C:\Windows\System32\rundll32.exe Window searched: window name: PROCMON_WINDOW_CLASS Jump to behavior
Source: C:\Windows\System32\rundll32.exe Window searched: window name: RegmonClass Jump to behavior
Source: C:\Windows\System32\rundll32.exe Window searched: window name: FilemonClass Jump to behavior
Source: C:\Windows\System32\rundll32.exe Window searched: window name: PROCMON_WINDOW_CLASS Jump to behavior
Source: C:\Windows\System32\rundll32.exe Window searched: window name: RegmonClass Jump to behavior
Source: C:\Windows\System32\rundll32.exe Window searched: window name: FilemonClass Jump to behavior
Source: C:\Windows\System32\rundll32.exe Window searched: window name: PROCMON_WINDOW_CLASS Jump to behavior
Source: C:\Windows\System32\rundll32.exe Window searched: window name: RegmonClass Jump to behavior
Source: C:\Windows\System32\rundll32.exe Window searched: window name: FilemonClass Jump to behavior
Source: C:\Windows\System32\rundll32.exe Window searched: window name: PROCMON_WINDOW_CLASS Jump to behavior
Source: C:\Windows\System32\rundll32.exe Window searched: window name: RegmonClass Jump to behavior
Source: C:\Windows\System32\rundll32.exe Window searched: window name: FilemonClass Jump to behavior
Source: C:\Windows\System32\rundll32.exe Window searched: window name: PROCMON_WINDOW_CLASS Jump to behavior
Source: C:\Windows\System32\rundll32.exe Window searched: window name: RegmonClass Jump to behavior
Source: C:\Windows\System32\rundll32.exe Window searched: window name: FilemonClass Jump to behavior
Source: C:\Windows\System32\rundll32.exe Window searched: window name: PROCMON_WINDOW_CLASS Jump to behavior
Source: C:\Windows\System32\rundll32.exe Window searched: window name: RegmonClass Jump to behavior
Source: C:\Windows\System32\rundll32.exe Window searched: window name: FilemonClass Jump to behavior
Source: C:\Windows\System32\rundll32.exe Window searched: window name: PROCMON_WINDOW_CLASS Jump to behavior
Source: C:\Windows\System32\rundll32.exe Window searched: window name: RegmonClass Jump to behavior
Source: C:\Windows\System32\rundll32.exe Window searched: window name: FilemonClass Jump to behavior
Source: C:\Windows\System32\rundll32.exe Window searched: window name: PROCMON_WINDOW_CLASS Jump to behavior
Source: C:\Windows\System32\rundll32.exe Window searched: window name: RegmonClass Jump to behavior
Source: C:\Windows\System32\rundll32.exe Window searched: window name: FilemonClass Jump to behavior
Source: C:\Windows\System32\rundll32.exe Window searched: window name: PROCMON_WINDOW_CLASS Jump to behavior
Source: C:\Windows\System32\rundll32.exe Window searched: window name: RegmonClass Jump to behavior
Source: C:\Windows\System32\rundll32.exe Window searched: window name: FilemonClass Jump to behavior
Source: C:\Windows\System32\rundll32.exe Window searched: window name: PROCMON_WINDOW_CLASS Jump to behavior
Source: C:\Windows\System32\rundll32.exe Window searched: window name: RegmonClass Jump to behavior
Source: C:\Windows\System32\rundll32.exe Window searched: window name: FilemonClass Jump to behavior
Source: C:\Windows\System32\rundll32.exe Window searched: window name: PROCMON_WINDOW_CLASS Jump to behavior
Source: C:\Windows\System32\rundll32.exe Window searched: window name: RegmonClass Jump to behavior
Source: C:\Windows\System32\rundll32.exe Window searched: window name: FilemonClass Jump to behavior
Source: C:\Windows\System32\rundll32.exe Window searched: window name: PROCMON_WINDOW_CLASS Jump to behavior
Source: C:\Windows\System32\rundll32.exe Window searched: window name: RegmonClass Jump to behavior
Source: C:\Windows\System32\rundll32.exe Window searched: window name: FilemonClass Jump to behavior
Source: C:\Windows\System32\rundll32.exe Window searched: window name: PROCMON_WINDOW_CLASS Jump to behavior
Source: C:\Windows\System32\rundll32.exe Window searched: window name: RegmonClass Jump to behavior
Source: C:\Windows\System32\rundll32.exe Window searched: window name: FilemonClass Jump to behavior
Source: C:\Windows\System32\rundll32.exe Window searched: window name: PROCMON_WINDOW_CLASS Jump to behavior
Source: C:\Windows\System32\rundll32.exe Window searched: window name: RegmonClass Jump to behavior
Source: C:\Windows\System32\rundll32.exe Window searched: window name: FilemonClass
Source: C:\Windows\System32\rundll32.exe Window searched: window name: PROCMON_WINDOW_CLASS
Source: C:\Windows\System32\rundll32.exe Window searched: window name: RegmonClass
Source: C:\Windows\System32\rundll32.exe Window searched: window name: FilemonClass
Source: C:\Windows\System32\rundll32.exe Window searched: window name: PROCMON_WINDOW_CLASS
Source: C:\Windows\System32\rundll32.exe Window searched: window name: RegmonClass
Source: C:\Windows\System32\rundll32.exe Window searched: window name: FilemonClass
Source: C:\Windows\System32\rundll32.exe Window searched: window name: PROCMON_WINDOW_CLASS
Source: C:\Windows\System32\rundll32.exe Window searched: window name: RegmonClass
Source: C:\Windows\System32\rundll32.exe Window searched: window name: FilemonClass
Source: C:\Windows\System32\rundll32.exe Window searched: window name: PROCMON_WINDOW_CLASS
Source: C:\Windows\System32\rundll32.exe Window searched: window name: RegmonClass
Source: C:\Windows\System32\rundll32.exe Window searched: window name: FilemonClass
Source: C:\Windows\System32\rundll32.exe Window searched: window name: PROCMON_WINDOW_CLASS
Source: C:\Windows\System32\rundll32.exe Window searched: window name: RegmonClass
Source: C:\Windows\System32\rundll32.exe Window searched: window name: FilemonClass
Source: C:\Windows\System32\rundll32.exe Window searched: window name: PROCMON_WINDOW_CLASS
Source: C:\Windows\System32\rundll32.exe Window searched: window name: RegmonClass
Source: C:\Windows\System32\rundll32.exe Window searched: window name: FilemonClass
Source: C:\Windows\System32\rundll32.exe Window searched: window name: PROCMON_WINDOW_CLASS
Source: C:\Windows\System32\rundll32.exe Window searched: window name: RegmonClass
Source: C:\Windows\System32\rundll32.exe Window searched: window name: FilemonClass
Source: C:\Windows\System32\rundll32.exe Window searched: window name: PROCMON_WINDOW_CLASS
Source: C:\Windows\System32\rundll32.exe Window searched: window name: RegmonClass
Source: C:\Windows\System32\rundll32.exe Window searched: window name: FilemonClass
Source: C:\Windows\System32\rundll32.exe Window searched: window name: PROCMON_WINDOW_CLASS
Source: C:\Windows\System32\rundll32.exe Window searched: window name: RegmonClass
Source: C:\Windows\System32\rundll32.exe Window searched: window name: FilemonClass
Source: C:\Windows\System32\rundll32.exe Window searched: window name: PROCMON_WINDOW_CLASS
Source: C:\Windows\System32\rundll32.exe Window searched: window name: RegmonClass
Source: C:\Windows\System32\rundll32.exe Window searched: window name: FilemonClass
Source: C:\Windows\System32\rundll32.exe Window searched: window name: PROCMON_WINDOW_CLASS
Source: C:\Windows\System32\rundll32.exe Window searched: window name: RegmonClass
Source: C:\Windows\System32\rundll32.exe Window searched: window name: FilemonClass
Source: C:\Windows\System32\rundll32.exe Window searched: window name: PROCMON_WINDOW_CLASS
Source: C:\Windows\System32\rundll32.exe Window searched: window name: RegmonClass
Source: C:\Windows\System32\rundll32.exe Window searched: window name: FilemonClass
Source: C:\Windows\System32\rundll32.exe Window searched: window name: PROCMON_WINDOW_CLASS
Source: C:\Windows\System32\rundll32.exe Window searched: window name: RegmonClass
Source: C:\Windows\System32\rundll32.exe Window searched: window name: FilemonClass
Source: C:\Windows\System32\rundll32.exe Window searched: window name: PROCMON_WINDOW_CLASS
Source: C:\Windows\System32\rundll32.exe Window searched: window name: RegmonClass
Source: C:\Windows\System32\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\rundll32.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exe Process information set: NOOPENFILEERRORBOX

Malware Analysis System Evasion

barindex
Source: C:\Windows\System32\loaddll64.exe System information queried: FirmwareTableInformation Jump to behavior
Source: C:\Windows\System32\regsvr32.exe System information queried: FirmwareTableInformation Jump to behavior
Source: C:\Windows\System32\loaddll64.exe File opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Jump to behavior
Source: C:\Windows\System32\regsvr32.exe File opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Jump to behavior
Source: C:\Windows\System32\rundll32.exe File opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Jump to behavior
Source: C:\Windows\System32\rundll32.exe File opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Jump to behavior
Source: C:\Windows\System32\rundll32.exe File opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Jump to behavior
Source: C:\Windows\System32\rundll32.exe File opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Jump to behavior
Source: C:\Windows\System32\rundll32.exe File opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Jump to behavior
Source: C:\Windows\System32\rundll32.exe File opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Jump to behavior
Source: C:\Windows\System32\rundll32.exe File opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Jump to behavior
Source: C:\Windows\System32\rundll32.exe File opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Jump to behavior
Source: C:\Windows\System32\rundll32.exe File opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Jump to behavior
Source: C:\Windows\System32\rundll32.exe File opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Jump to behavior
Source: C:\Windows\System32\rundll32.exe File opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Jump to behavior
Source: C:\Windows\System32\rundll32.exe File opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Jump to behavior
Source: C:\Windows\System32\rundll32.exe File opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Jump to behavior
Source: C:\Windows\System32\rundll32.exe File opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Jump to behavior
Source: C:\Windows\System32\rundll32.exe File opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Jump to behavior
Source: C:\Windows\System32\rundll32.exe File opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Jump to behavior
Source: C:\Windows\System32\rundll32.exe File opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Jump to behavior
Source: C:\Windows\System32\rundll32.exe File opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Jump to behavior
Source: C:\Windows\System32\rundll32.exe File opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Jump to behavior
Source: C:\Windows\System32\rundll32.exe File opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__
Source: C:\Windows\System32\rundll32.exe File opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__
Source: C:\Windows\System32\rundll32.exe File opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__
Source: C:\Windows\System32\rundll32.exe File opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__
Source: C:\Windows\System32\rundll32.exe File opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__
Source: C:\Windows\System32\rundll32.exe File opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__
Source: C:\Windows\System32\rundll32.exe File opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__
Source: C:\Windows\System32\rundll32.exe File opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__
Source: C:\Windows\System32\rundll32.exe File opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__
Source: C:\Windows\System32\rundll32.exe File opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__
Source: C:\Windows\System32\rundll32.exe File opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__
Source: C:\Windows\System32\rundll32.exe File opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__
Source: C:\Windows\System32\rundll32.exe File opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__
Source: C:\Windows\System32\rundll32.exe File opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__
Source: rundll32.exe, 00000023.00000002.2760933840.00000280F2458000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: SBIEDLL.DLL$
Source: rundll32.exe, 00000027.00000002.2773806655.000001D8CDF68000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: SBIEDLL.DLLJH
Source: regsvr32.exe, 00000004.00000002.2632797000.00000000009EB000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000012.00000002.2768545737.0000011C192B8000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000016.00000002.2769800847.00000215C2788000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000018.00000002.2767556258.000001AE5C5E8000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: SBIEDLL.DLL
Source: rundll32.exe, 00000024.00000002.2772781234.000001B683328000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: SBIEDLL.DLL'
Source: rundll32.exe, 0000000F.00000002.2767623987.0000018A21898000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: SBIEDLL.DLL5
Source: rundll32.exe, 00000019.00000002.2755670049.0000026D95968000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: SBIEDLL.DLLS
Source: rundll32.exe, 00000015.00000002.2767093911.0000011319018000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: SBIEDLL.DLL}
Source: C:\Windows\System32\rundll32.exe Registry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}\0000 name: DriverDesc
Source: C:\Windows\System32\rundll32.exe Registry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: SystemBiosVersion
Source: C:\Windows\System32\rundll32.exe Registry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: VideoBiosVersion
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: C:\Windows\System32\rundll32.exe Last function: Thread delayed
Source: C:\Windows\System32\rundll32.exe Last function: Thread delayed
Source: C:\Windows\System32\rundll32.exe Last function: Thread delayed
Source: rundll32.exe, 0000001D.00000002.2758361312.000001C4AED58000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000002.2769511865.000001DE1A4A8000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000020.00000002.2769852932.000001F8DCC48000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000025.00000002.2771437325.000001D464168000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: HARDWARE\ACPI\DSDT\VBOX__
Source: Amcache.hve.10.dr Binary or memory string: VMware
Source: Amcache.hve.10.dr Binary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.10.dr Binary or memory string: vmci.syshbin
Source: Amcache.hve.10.dr Binary or memory string: VMware, Inc.
Source: Amcache.hve.10.dr Binary or memory string: VMware20,1hbin@
Source: Amcache.hve.10.dr Binary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.10.dr Binary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.10.dr Binary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: rundll32.exe, 00000015.00000002.2767093911.0000011319018000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000021.00000002.2873046801.00000240FF928000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: HARDWARE\ACPI\DSDT\VBOX__#
Source: Amcache.hve.10.dr Binary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.10.dr Binary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.10.dr Binary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.10.dr Binary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.10.dr Binary or memory string: vmci.sys
Source: Amcache.hve.10.dr Binary or memory string: vmci.syshbin`
Source: rundll32.exe, 00000029.00000002.2758721043.0000022766D98000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: HARDWARE\ACPI\DSDT\VBOX__m?$tS
Source: Amcache.hve.10.dr Binary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.10.dr Binary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.10.dr Binary or memory string: VMware20,1
Source: Amcache.hve.10.dr Binary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.10.dr Binary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.10.dr Binary or memory string: VMware Virtual disk SCSI Disk Device
Source: rundll32.exe, 00000026.00000002.2768659401.00000164F1AC8000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: HARDWARE\ACPI\DSDT\VBOX__m@
Source: Amcache.hve.10.dr Binary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.10.dr Binary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.10.dr Binary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.10.dr Binary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.10.dr Binary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.10.dr Binary or memory string: VMware Virtual RAM
Source: Amcache.hve.10.dr Binary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.10.dr Binary or memory string: VMware-42 27 88 19 56 cc 59 1a-97 79 fb 8c bf a1 e2 9d
Source: Amcache.hve.10.dr Binary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Windows\System32\loaddll64.exe System information queried: ModuleInformation Jump to behavior
Source: C:\Windows\System32\loaddll64.exe Process information queried: ProcessInformation Jump to behavior

Anti Debugging

barindex
Source: C:\Windows\System32\loaddll64.exe Thread information set: HideFromDebugger Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Thread information set: HideFromDebugger Jump to behavior
Source: C:\Windows\System32\rundll32.exe Thread information set: HideFromDebugger Jump to behavior
Source: C:\Windows\System32\rundll32.exe Thread information set: HideFromDebugger Jump to behavior
Source: C:\Windows\System32\rundll32.exe Thread information set: HideFromDebugger Jump to behavior
Source: C:\Windows\System32\rundll32.exe Thread information set: HideFromDebugger Jump to behavior
Source: C:\Windows\System32\rundll32.exe Thread information set: HideFromDebugger Jump to behavior
Source: C:\Windows\System32\rundll32.exe Thread information set: HideFromDebugger Jump to behavior
Source: C:\Windows\System32\rundll32.exe Thread information set: HideFromDebugger Jump to behavior
Source: C:\Windows\System32\rundll32.exe Thread information set: HideFromDebugger Jump to behavior
Source: C:\Windows\System32\rundll32.exe Thread information set: HideFromDebugger Jump to behavior
Source: C:\Windows\System32\rundll32.exe Thread information set: HideFromDebugger Jump to behavior
Source: C:\Windows\System32\rundll32.exe Thread information set: HideFromDebugger Jump to behavior
Source: C:\Windows\System32\rundll32.exe Thread information set: HideFromDebugger Jump to behavior
Source: C:\Windows\System32\rundll32.exe Thread information set: HideFromDebugger Jump to behavior
Source: C:\Windows\System32\rundll32.exe Thread information set: HideFromDebugger Jump to behavior
Source: C:\Windows\System32\rundll32.exe Thread information set: HideFromDebugger Jump to behavior
Source: C:\Windows\System32\rundll32.exe Thread information set: HideFromDebugger Jump to behavior
Source: C:\Windows\System32\rundll32.exe Thread information set: HideFromDebugger Jump to behavior
Source: C:\Windows\System32\rundll32.exe Thread information set: HideFromDebugger Jump to behavior
Source: C:\Windows\System32\rundll32.exe Thread information set: HideFromDebugger Jump to behavior
Source: C:\Windows\System32\rundll32.exe Thread information set: HideFromDebugger
Source: C:\Windows\System32\rundll32.exe Thread information set: HideFromDebugger
Source: C:\Windows\System32\rundll32.exe Thread information set: HideFromDebugger
Source: C:\Windows\System32\rundll32.exe Thread information set: HideFromDebugger
Source: C:\Windows\System32\rundll32.exe Thread information set: HideFromDebugger
Source: C:\Windows\System32\rundll32.exe Thread information set: HideFromDebugger
Source: C:\Windows\System32\rundll32.exe Thread information set: HideFromDebugger
Source: C:\Windows\System32\rundll32.exe Thread information set: HideFromDebugger
Source: C:\Windows\System32\rundll32.exe Thread information set: HideFromDebugger
Source: C:\Windows\System32\rundll32.exe Thread information set: HideFromDebugger
Source: C:\Windows\System32\rundll32.exe Thread information set: HideFromDebugger
Source: C:\Windows\System32\rundll32.exe Thread information set: HideFromDebugger
Source: C:\Windows\System32\rundll32.exe Thread information set: HideFromDebugger
Source: C:\Windows\System32\rundll32.exe Thread information set: HideFromDebugger
Source: C:\Windows\System32\rundll32.exe Open window title or class name: regmonclass
Source: C:\Windows\System32\rundll32.exe Open window title or class name: process monitor - sysinternals: www.sysinternals.com
Source: C:\Windows\System32\rundll32.exe Open window title or class name: procmon_window_class
Source: C:\Windows\System32\rundll32.exe Open window title or class name: registry monitor - sysinternals: www.sysinternals.com
Source: C:\Windows\System32\rundll32.exe Open window title or class name: filemonclass
Source: C:\Windows\System32\rundll32.exe Open window title or class name: file monitor - sysinternals: www.sysinternals.com
Source: C:\Windows\System32\loaddll64.exe Process queried: DebugPort Jump to behavior
Source: C:\Windows\System32\loaddll64.exe Process queried: DebugObjectHandle Jump to behavior
Source: C:\Windows\System32\loaddll64.exe Process queried: DebugPort Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Process queried: DebugPort Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Process queried: DebugObjectHandle Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Process queried: DebugPort Jump to behavior
Source: C:\Windows\System32\rundll32.exe Process queried: DebugPort Jump to behavior
Source: C:\Windows\System32\rundll32.exe Process queried: DebugObjectHandle Jump to behavior
Source: C:\Windows\System32\rundll32.exe Process queried: DebugPort Jump to behavior
Source: C:\Windows\System32\rundll32.exe Process queried: DebugPort Jump to behavior
Source: C:\Windows\System32\rundll32.exe Process queried: DebugObjectHandle Jump to behavior
Source: C:\Windows\System32\rundll32.exe Process queried: DebugPort Jump to behavior
Source: C:\Windows\System32\rundll32.exe Process queried: DebugPort Jump to behavior
Source: C:\Windows\System32\rundll32.exe Process queried: DebugObjectHandle Jump to behavior
Source: C:\Windows\System32\rundll32.exe Process queried: DebugPort Jump to behavior
Source: C:\Windows\System32\rundll32.exe Process queried: DebugPort Jump to behavior
Source: C:\Windows\System32\rundll32.exe Process queried: DebugPort Jump to behavior
Source: C:\Windows\System32\rundll32.exe Process queried: DebugPort Jump to behavior
Source: C:\Windows\System32\rundll32.exe Process queried: DebugObjectHandle Jump to behavior
Source: C:\Windows\System32\rundll32.exe Process queried: DebugPort Jump to behavior
Source: C:\Windows\System32\rundll32.exe Process queried: DebugPort Jump to behavior
Source: C:\Windows\System32\rundll32.exe Process queried: DebugObjectHandle Jump to behavior
Source: C:\Windows\System32\rundll32.exe Process queried: DebugPort Jump to behavior
Source: C:\Windows\System32\rundll32.exe Process queried: DebugPort Jump to behavior
Source: C:\Windows\System32\rundll32.exe Process queried: DebugObjectHandle Jump to behavior
Source: C:\Windows\System32\rundll32.exe Process queried: DebugPort Jump to behavior
Source: C:\Windows\System32\rundll32.exe Process queried: DebugPort Jump to behavior
Source: C:\Windows\System32\rundll32.exe Process queried: DebugPort Jump to behavior
Source: C:\Windows\System32\rundll32.exe Process queried: DebugPort Jump to behavior
Source: C:\Windows\System32\rundll32.exe Process queried: DebugObjectHandle Jump to behavior
Source: C:\Windows\System32\rundll32.exe Process queried: DebugPort Jump to behavior
Source: C:\Windows\System32\rundll32.exe Process queried: DebugPort Jump to behavior
Source: C:\Windows\System32\rundll32.exe Process queried: DebugObjectHandle Jump to behavior
Source: C:\Windows\System32\rundll32.exe Process queried: DebugPort Jump to behavior
Source: C:\Windows\System32\rundll32.exe Process queried: DebugPort Jump to behavior
Source: C:\Windows\System32\rundll32.exe Process queried: DebugObjectHandle Jump to behavior
Source: C:\Windows\System32\rundll32.exe Process queried: DebugPort Jump to behavior
Source: C:\Windows\System32\rundll32.exe Process queried: DebugPort Jump to behavior
Source: C:\Windows\System32\rundll32.exe Process queried: DebugObjectHandle Jump to behavior
Source: C:\Windows\System32\rundll32.exe Process queried: DebugPort Jump to behavior
Source: C:\Windows\System32\rundll32.exe Process queried: DebugPort Jump to behavior
Source: C:\Windows\System32\rundll32.exe Process queried: DebugObjectHandle Jump to behavior
Source: C:\Windows\System32\rundll32.exe Process queried: DebugPort Jump to behavior
Source: C:\Windows\System32\rundll32.exe Process queried: DebugPort Jump to behavior
Source: C:\Windows\System32\rundll32.exe Process queried: DebugObjectHandle Jump to behavior
Source: C:\Windows\System32\rundll32.exe Process queried: DebugPort Jump to behavior
Source: C:\Windows\System32\rundll32.exe Process queried: DebugPort Jump to behavior
Source: C:\Windows\System32\rundll32.exe Process queried: DebugObjectHandle Jump to behavior
Source: C:\Windows\System32\rundll32.exe Process queried: DebugPort Jump to behavior
Source: C:\Windows\System32\rundll32.exe Process queried: DebugPort Jump to behavior
Source: C:\Windows\System32\rundll32.exe Process queried: DebugObjectHandle Jump to behavior
Source: C:\Windows\System32\rundll32.exe Process queried: DebugPort Jump to behavior
Source: C:\Windows\System32\rundll32.exe Process queried: DebugPort Jump to behavior
Source: C:\Windows\System32\rundll32.exe Process queried: DebugObjectHandle Jump to behavior
Source: C:\Windows\System32\rundll32.exe Process queried: DebugPort Jump to behavior
Source: C:\Windows\System32\rundll32.exe Process queried: DebugPort Jump to behavior
Source: C:\Windows\System32\rundll32.exe Process queried: DebugObjectHandle Jump to behavior
Source: C:\Windows\System32\rundll32.exe Process queried: DebugPort Jump to behavior
Source: C:\Windows\System32\rundll32.exe Process queried: DebugPort Jump to behavior
Source: C:\Windows\System32\rundll32.exe Process queried: DebugObjectHandle Jump to behavior
Source: C:\Windows\System32\rundll32.exe Process queried: DebugPort Jump to behavior
Source: C:\Windows\System32\rundll32.exe Process queried: DebugPort Jump to behavior
Source: C:\Windows\System32\rundll32.exe Process queried: DebugObjectHandle Jump to behavior
Source: C:\Windows\System32\rundll32.exe Process queried: DebugPort Jump to behavior
Source: C:\Windows\System32\rundll32.exe Process queried: DebugPort Jump to behavior
Source: C:\Windows\System32\rundll32.exe Process queried: DebugObjectHandle Jump to behavior
Source: C:\Windows\System32\rundll32.exe Process queried: DebugPort Jump to behavior
Source: C:\Windows\System32\rundll32.exe Process queried: DebugPort
Source: C:\Windows\System32\rundll32.exe Process queried: DebugObjectHandle
Source: C:\Windows\System32\rundll32.exe Process queried: DebugPort
Source: C:\Windows\System32\rundll32.exe Process queried: DebugPort
Source: C:\Windows\System32\rundll32.exe Process queried: DebugObjectHandle
Source: C:\Windows\System32\rundll32.exe Process queried: DebugPort
Source: C:\Windows\System32\rundll32.exe Process queried: DebugPort
Source: C:\Windows\System32\rundll32.exe Process queried: DebugObjectHandle
Source: C:\Windows\System32\rundll32.exe Process queried: DebugPort
Source: C:\Windows\System32\rundll32.exe Process queried: DebugPort
Source: C:\Windows\System32\rundll32.exe Process queried: DebugObjectHandle
Source: C:\Windows\System32\rundll32.exe Process queried: DebugPort
Source: C:\Windows\System32\rundll32.exe Process queried: DebugPort
Source: C:\Windows\System32\rundll32.exe Process queried: DebugObjectHandle
Source: C:\Windows\System32\rundll32.exe Process queried: DebugPort
Source: C:\Windows\System32\rundll32.exe Process queried: DebugPort
Source: C:\Windows\System32\rundll32.exe Process queried: DebugObjectHandle
Source: C:\Windows\System32\rundll32.exe Process queried: DebugPort
Source: C:\Windows\System32\rundll32.exe Process queried: DebugPort
Source: C:\Windows\System32\rundll32.exe Process queried: DebugPort
Source: C:\Windows\System32\rundll32.exe Process queried: DebugPort
Source: C:\Windows\System32\rundll32.exe Process queried: DebugObjectHandle
Source: C:\Windows\System32\rundll32.exe Process queried: DebugPort
Source: C:\Windows\System32\rundll32.exe Process queried: DebugPort
Source: C:\Windows\System32\rundll32.exe Process queried: DebugObjectHandle
Source: C:\Windows\System32\rundll32.exe Process queried: DebugPort
Source: C:\Windows\System32\rundll32.exe Process queried: DebugPort
Source: C:\Windows\System32\rundll32.exe Process queried: DebugObjectHandle
Source: C:\Windows\System32\rundll32.exe Process queried: DebugPort
Source: C:\Windows\System32\rundll32.exe Process queried: DebugPort
Source: C:\Windows\System32\rundll32.exe Process queried: DebugObjectHandle
Source: C:\Windows\System32\rundll32.exe Process queried: DebugPort
Source: C:\Windows\System32\rundll32.exe Process queried: DebugPort
Source: C:\Windows\System32\rundll32.exe Process queried: DebugObjectHandle
Source: C:\Windows\System32\rundll32.exe Process queried: DebugPort
Source: C:\Windows\System32\rundll32.exe Process queried: DebugPort
Source: C:\Windows\System32\rundll32.exe Process queried: DebugObjectHandle
Source: C:\Windows\System32\rundll32.exe Process queried: DebugPort
Source: C:\Windows\System32\rundll32.exe Process queried: DebugPort
Source: C:\Windows\System32\rundll32.exe Process queried: DebugObjectHandle
Source: C:\Windows\System32\rundll32.exe Process queried: DebugPort
Source: C:\Windows\System32\rundll32.exe Process queried: DebugPort
Source: C:\Windows\System32\rundll32.exe Process queried: DebugObjectHandle
Source: C:\Windows\System32\rundll32.exe Process queried: DebugPort
Source: C:\Windows\System32\loaddll64.exe Code function: 0_3_0000013678914670 LdrLoadDll, 0_3_0000013678914670

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Windows\System32\loaddll64.exe NtQuerySystemInformation: Indirect: 0x7FFB0C885ADD Jump to behavior
Source: C:\Windows\System32\loaddll64.exe NtQueryInformationProcess: Indirect: 0x7FFB0C89C164 Jump to behavior
Source: C:\Windows\System32\loaddll64.exe NtProtectVirtualMemory: Indirect: 0x13678910955 Jump to behavior
Source: C:\Windows\System32\loaddll64.exe NtSetInformationThread: Indirect: 0x7FFB0C8B9FA2 Jump to behavior
Source: C:\Windows\System32\loaddll64.exe NtAllocateVirtualMemory: Indirect: 0x136789102AF Jump to behavior
Source: C:\Windows\System32\loaddll64.exe NtAllocateVirtualMemory: Indirect: 0x136789101F2 Jump to behavior
Source: C:\Windows\System32\loaddll64.exe NtQueryInformationProcess: Indirect: 0x7FFB0C8B3FF9 Jump to behavior
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",#1 Jump to behavior
Source: C:\Windows\System32\loaddll64.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid Jump to behavior
Source: Amcache.hve.10.dr Binary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.10.dr Binary or memory string: msmpeng.exe
Source: Amcache.hve.10.dr Binary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.10.dr Binary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
Source: Amcache.hve.10.dr Binary or memory string: MsMpEng.exe

Remote Access Functionality

barindex
Source: Yara match File source: 16.3.rundll32.exe.256a6980000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.3.loaddll64.exe.13678d70000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.3.loaddll64.exe.13678d70000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 6.3.rundll32.exe.14571620000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 6.3.rundll32.exe.14571620000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 16.3.rundll32.exe.256a6980000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000010.00000003.2777687515.00000256A6980000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000010.00000002.2786136846.00000256A8758000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000003.2753368272.0000013678D70000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000006.00000002.2658150493.00000145716A8000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000006.00000003.2657321127.0000014571620000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000002.2754647446.0000013678DF8000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: loaddll64.exe PID: 3868, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: rundll32.exe PID: 6376, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: rundll32.exe PID: 6788, type: MEMORYSTR
No contacted IP infos