Click to jump to signature section
Source: https://winarkamaps.com/q | Avira URL Cloud: Label: malware |
Source: https://winarkamaps.com/live/comp | Avira URL Cloud: Label: phishing |
Source: https://stratimasesstr.com/F | Avira URL Cloud: Label: malware |
Source: https://winarkamaps.com/live/ | Avira URL Cloud: Label: malware |
Source: https://winarkamaps.com/live/al | Avira URL Cloud: Label: malware |
Source: https://stratimasesstr.com/live/l | Avira URL Cloud: Label: phishing |
Source: https://winarkamaps.com/% | Avira URL Cloud: Label: malware |
Source: https://stratimasesstr.com/ | Avira URL Cloud: Label: malware |
Source: https://winarkamaps.com/m/= | Avira URL Cloud: Label: malware |
Source: https://stratimasesstr.com/live/$ | Avira URL Cloud: Label: phishing |
Source: https://stratimasesstr.com/live/ | Avira URL Cloud: Label: malware |
Source: https://winarkamaps.com/ | Avira URL Cloud: Label: malware |
Source: https://winarkamaps.com/live/F | Avira URL Cloud: Label: malware |
Source: C:\Users\user\AppData\Roaming\Custom_update\Update_8c0cffeb.dll | Avira: detection malicious, Label: TR/Agent.dxjic |
Source: r2iL9TLvO3.dll | Malware Configuration Extractor: Latrodectus {"C2 url": ["https://winarkamaps.com/live/", "https://stratimasesstr.com/live/"], "Group Name": "Facial", "Campaign ID": 3828029093} |
Source: winarkamaps.com | Virustotal: Detection: 20% | Perma Link |
Source: stratimasesstr.com | Virustotal: Detection: 17% | Perma Link |
Source: https://winarkamaps.com/live/ | Virustotal: Detection: 18% | Perma Link |
Source: https://stratimasesstr.com/ | Virustotal: Detection: 17% | Perma Link |
Source: https://winarkamaps.com/live/F | Virustotal: Detection: 17% | Perma Link |
Source: https://winarkamaps.com/ | Virustotal: Detection: 20% | Perma Link |
Source: https://stratimasesstr.com/live/ | Virustotal: Detection: 15% | Perma Link |
Source: C:\Users\user\AppData\Roaming\Custom_update\Update_8c0cffeb.dll | ReversingLabs: Detection: 65% |
Source: C:\Users\user\AppData\Roaming\Custom_update\Update_8c0cffeb.dll | Virustotal: Detection: 79% | Perma Link |
Source: Submited Sample | Integrated Neural Analysis Model: Matched 99.2% probability |
Source: r2iL9TLvO3.dll | String decryptor: /c ipconfig /all |
Source: r2iL9TLvO3.dll | String decryptor: C:\Windows\System32\cmd.exe |
Source: r2iL9TLvO3.dll | String decryptor: /c systeminfo |
Source: r2iL9TLvO3.dll | String decryptor: C:\Windows\System32\cmd.exe |
Source: r2iL9TLvO3.dll | String decryptor: /c nltest /domain_trusts |
Source: r2iL9TLvO3.dll | String decryptor: C:\Windows\System32\cmd.exe |
Source: r2iL9TLvO3.dll | String decryptor: /c net view /all /domain |
Source: r2iL9TLvO3.dll | String decryptor: /c nltest /domain_trusts /all_trusts |
Source: r2iL9TLvO3.dll | String decryptor: C:\Windows\System32\cmd.exe |
Source: r2iL9TLvO3.dll | String decryptor: C:\Windows\System32\cmd.exe |
Source: r2iL9TLvO3.dll | String decryptor: /c net view /all |
Source: r2iL9TLvO3.dll | String decryptor: C:\Windows\System32\cmd.exe |
Source: r2iL9TLvO3.dll | String decryptor: &ipconfig= |
Source: r2iL9TLvO3.dll | String decryptor: /c net group "Domain Admins" /domain |
Source: r2iL9TLvO3.dll | String decryptor: C:\Windows\System32\cmd.exe |
Source: r2iL9TLvO3.dll | String decryptor: /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get * /Format:List |
Source: r2iL9TLvO3.dll | String decryptor: C:\Windows\System32\wbem\wmic.exe |
Source: r2iL9TLvO3.dll | String decryptor: /c net config workstation |
Source: r2iL9TLvO3.dll | String decryptor: C:\Windows\System32\cmd.exe |
Source: r2iL9TLvO3.dll | String decryptor: /c wmic.exe /node:localhost /namespace:\\root\SecurityCenter2 path AntiVirusProduct Get DisplayName | findstr /V /B /C:displayName || echo No Antivirus installed |
Source: r2iL9TLvO3.dll | String decryptor: C:\Windows\System32\cmd.exe |
Source: r2iL9TLvO3.dll | String decryptor: /c whoami /groups |
Source: r2iL9TLvO3.dll | String decryptor: C:\Windows\System32\cmd.exe |
Source: r2iL9TLvO3.dll | String decryptor: &systeminfo= |
Source: r2iL9TLvO3.dll | String decryptor: &domain_trusts= |
Source: r2iL9TLvO3.dll | String decryptor: &domain_trusts_all= |
Source: r2iL9TLvO3.dll | String decryptor: &net_view_all_domain= |
Source: r2iL9TLvO3.dll | String decryptor: &net_view_all= |
Source: r2iL9TLvO3.dll | String decryptor: &net_group= |
Source: r2iL9TLvO3.dll | String decryptor: &wmic= |
Source: r2iL9TLvO3.dll | String decryptor: &net_config_ws= |
Source: r2iL9TLvO3.dll | String decryptor: &net_wmic_av= |
Source: r2iL9TLvO3.dll | String decryptor: &whoami_group= |
Source: r2iL9TLvO3.dll | String decryptor: "pid": |
Source: r2iL9TLvO3.dll | String decryptor: "%d", |
Source: r2iL9TLvO3.dll | String decryptor: "proc": |
Source: r2iL9TLvO3.dll | String decryptor: "%s", |
Source: r2iL9TLvO3.dll | String decryptor: "subproc": [ |
Source: r2iL9TLvO3.dll | String decryptor: &proclist=[ |
Source: r2iL9TLvO3.dll | String decryptor: "pid": |
Source: r2iL9TLvO3.dll | String decryptor: "%d", |
Source: r2iL9TLvO3.dll | String decryptor: "proc": |
Source: r2iL9TLvO3.dll | String decryptor: "%s", |
Source: r2iL9TLvO3.dll | String decryptor: "subproc": [ |
Source: r2iL9TLvO3.dll | String decryptor: &desklinks=[ |
Source: r2iL9TLvO3.dll | String decryptor: *.* |
Source: r2iL9TLvO3.dll | String decryptor: "%s" |
Source: r2iL9TLvO3.dll | String decryptor: Update_%x |
Source: r2iL9TLvO3.dll | String decryptor: Custom_update |
Source: r2iL9TLvO3.dll | String decryptor: .dll |
Source: r2iL9TLvO3.dll | String decryptor: .exe |
Source: r2iL9TLvO3.dll | String decryptor: Updater |
Source: r2iL9TLvO3.dll | String decryptor: "%s" |
Source: r2iL9TLvO3.dll | String decryptor: rundll32.exe |
Source: r2iL9TLvO3.dll | String decryptor: "%s", %s %s |
Source: r2iL9TLvO3.dll | String decryptor: runnung |
Source: r2iL9TLvO3.dll | String decryptor: :wtfbbq |
Source: r2iL9TLvO3.dll | String decryptor: %d |
Source: r2iL9TLvO3.dll | String decryptor: %s%s |
Source: r2iL9TLvO3.dll | String decryptor: files/bp.dat |
Source: r2iL9TLvO3.dll | String decryptor: %s\%d.dll |
Source: r2iL9TLvO3.dll | String decryptor: %d.dat |
Source: r2iL9TLvO3.dll | String decryptor: %s\%s |
Source: r2iL9TLvO3.dll | String decryptor: init -zzzz="%s\%s" |
Source: r2iL9TLvO3.dll | String decryptor: front |
Source: r2iL9TLvO3.dll | String decryptor: /files/ |
Source: r2iL9TLvO3.dll | String decryptor: Facial |
Source: r2iL9TLvO3.dll | String decryptor: .exe |
Source: r2iL9TLvO3.dll | String decryptor: Content-Type: application/x-www-form-urlencoded |
Source: r2iL9TLvO3.dll | String decryptor: POST |
Source: r2iL9TLvO3.dll | String decryptor: GET |
Source: r2iL9TLvO3.dll | String decryptor: curl/7.88.1 |
Source: r2iL9TLvO3.dll | String decryptor: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Tob 1.1) |
Source: r2iL9TLvO3.dll | String decryptor: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Tob 1.1) |
Source: r2iL9TLvO3.dll | String decryptor: CLEARURL |
Source: r2iL9TLvO3.dll | String decryptor: URLS |
Source: r2iL9TLvO3.dll | String decryptor: COMMAND |
Source: r2iL9TLvO3.dll | String decryptor: ERROR |
Source: r2iL9TLvO3.dll | String decryptor: eNIHaXC815vAqddR21qsuD35eJFL7CnSOLI9vUBdcb5RPcS0h6 |
Source: r2iL9TLvO3.dll | String decryptor: counter=%d&type=%d&guid=%s&os=%d&arch=%d&username=%s&group=%lu&ver=%d.%d&up=%d&direction=%s |
Source: r2iL9TLvO3.dll | String decryptor: counter=%d&type=%d&guid=%s&os=%d&arch=%d&username=%s&group=%lu&ver=%d.%d&up=%d&direction=%s |
Source: r2iL9TLvO3.dll | String decryptor: counter=%d&type=%d&guid=%s&os=%d&arch=%d&username=%s&group=%lu&ver=%d.%d&up=%d&direction=%s |
Source: r2iL9TLvO3.dll | String decryptor: C:\WINDOWS\SYSTEM32\rundll32.exe %s,%s |
Source: r2iL9TLvO3.dll | String decryptor: C:\WINDOWS\SYSTEM32\rundll32.exe %s |
Source: r2iL9TLvO3.dll | String decryptor: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Tob 1.1) |
Source: r2iL9TLvO3.dll | String decryptor: <html> |
Source: r2iL9TLvO3.dll | String decryptor: <!DOCTYPE |
Source: r2iL9TLvO3.dll | String decryptor: %s%d.dll |
Source: r2iL9TLvO3.dll | String decryptor: 12345 |
Source: r2iL9TLvO3.dll | String decryptor: &stiller= |
Source: r2iL9TLvO3.dll | String decryptor: %s%d.exe |
Source: r2iL9TLvO3.dll | String decryptor: LogonTrigger |
Source: r2iL9TLvO3.dll | String decryptor: %x%x |
Source: r2iL9TLvO3.dll | String decryptor: TimeTrigger |
Source: r2iL9TLvO3.dll | String decryptor: PT1H%02dM |
Source: r2iL9TLvO3.dll | String decryptor: %04d-%02d-%02dT%02d:%02d:%02d |
Source: r2iL9TLvO3.dll | String decryptor: &mac= |
Source: r2iL9TLvO3.dll | String decryptor: %02x |
Source: r2iL9TLvO3.dll | String decryptor: :%02x |
Source: r2iL9TLvO3.dll | String decryptor: PT0S |
Source: r2iL9TLvO3.dll | String decryptor: &computername=%s |
Source: r2iL9TLvO3.dll | String decryptor: &domain=%s |
Source: r2iL9TLvO3.dll | String decryptor: ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/ |
Source: r2iL9TLvO3.dll | String decryptor: \*.dll |
Source: r2iL9TLvO3.dll | String decryptor: %04X%04X%04X%04X%08X%04X |
Source: r2iL9TLvO3.dll | String decryptor: %04X%04X%04X%04X%08X%04X |
Source: r2iL9TLvO3.dll | String decryptor: \Registry\Machine\ |
Source: r2iL9TLvO3.dll | String decryptor: https://winarkamaps.com/live/ |
Source: r2iL9TLvO3.dll | String decryptor: https://stratimasesstr.com/live/ |
Source: r2iL9TLvO3.dll | String decryptor: AppData |
Source: r2iL9TLvO3.dll | String decryptor: Desktop |
Source: r2iL9TLvO3.dll | String decryptor: Startup |
Source: r2iL9TLvO3.dll | String decryptor: Personal |
Source: r2iL9TLvO3.dll | String decryptor: Local AppData |
Source: r2iL9TLvO3.dll | String decryptor: Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders |
Source: r2iL9TLvO3.dll | String decryptor: \update_data.dat |
Source: r2iL9TLvO3.dll | String decryptor: URLS |
Source: r2iL9TLvO3.dll | String decryptor: URLS|%d|%s |
Source: unknown | HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.7:49708 version: TLS 1.2 |
Source: r2iL9TLvO3.dll | Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT |
Source: C:\Windows\System32\rundll32.exe | Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD} | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAs | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32 | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler32 | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD} | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAs | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32 | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler32 | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\LocalServer32 | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\LocalServer | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD} | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\Elevation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD} | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAs | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Code function: 3_2_00007FFB1E86A350 FindFirstFileW,FindNextFileW,LoadLibraryW, | 3_2_00007FFB1E86A350 |
Source: C:\Windows\System32\rundll32.exe | Code function: 3_2_00007FFB1E861A08 FindFirstFileA,wsprintfA,FindNextFileA,FindClose, | 3_2_00007FFB1E861A08 |
Source: C:\Windows\System32\rundll32.exe | Code function: 6_2_00007FFB1C81A350 FindFirstFileW,FindNextFileW,LoadLibraryW, | 6_2_00007FFB1C81A350 |
Source: C:\Windows\System32\rundll32.exe | Code function: 6_2_00007FFB1C811A08 FindFirstFileA,wsprintfA,FindNextFileA,FindClose, | 6_2_00007FFB1C811A08 |
Source: Malware configuration extractor | URLs: https://winarkamaps.com/live/ |
Source: Malware configuration extractor | URLs: https://stratimasesstr.com/live/ |
Source: Joe Sandbox View | IP Address: 188.114.96.3 188.114.96.3 |
Source: Joe Sandbox View | IP Address: 188.114.96.3 188.114.96.3 |
Source: Joe Sandbox View | ASN Name: CLOUDFLARENETUS CLOUDFLARENETUS |
Source: Joe Sandbox View | JA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19 |
Source: global traffic | HTTP traffic detected: POST /live/ HTTP/1.1Accept: */*Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Tob 1.1)Host: winarkamaps.comContent-Length: 252Cache-Control: no-cache |
Source: global traffic | HTTP traffic detected: POST /live/ HTTP/1.1Accept: */*Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Tob 1.1)Host: winarkamaps.comContent-Length: 252Cache-Control: no-cache |
Source: unknown | UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown | UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: global traffic | DNS traffic detected: DNS query: winarkamaps.com |
Source: global traffic | DNS traffic detected: DNS query: stratimasesstr.com |
Source: unknown | HTTP traffic detected: POST /live/ HTTP/1.1Accept: */*Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Tob 1.1)Host: winarkamaps.comContent-Length: 252Cache-Control: no-cache |
Source: rundll32.exe, 00000006.00000002.2557574678.000001B8F4C49000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://stratimasesstr.com/ |
Source: rundll32.exe, 00000006.00000002.2557574678.000001B8F4C49000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://stratimasesstr.com/F |
Source: rundll32.exe, 00000006.00000002.2557574678.000001B8F4C49000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://stratimasesstr.com/live/ |
Source: rundll32.exe, 00000006.00000002.2557574678.000001B8F4C49000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://stratimasesstr.com/live/$ |
Source: rundll32.exe, 00000006.00000002.2557574678.000001B8F4C49000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://stratimasesstr.com/live/l |
Source: rundll32.exe, 00000006.00000003.2482822204.000001B8F4C10000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://winarkamaps.com/ |
Source: rundll32.exe, 00000006.00000002.2557574678.000001B8F4C49000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://winarkamaps.com/% |
Source: rundll32.exe, 00000006.00000002.2557574678.000001B8F4C49000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://winarkamaps.com/live/ |
Source: rundll32.exe, 00000006.00000002.2557574678.000001B8F4C0B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.2482822204.000001B8F4C10000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://winarkamaps.com/live/F |
Source: rundll32.exe, 00000006.00000002.2557574678.000001B8F4BF5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://winarkamaps.com/live/al |
Source: rundll32.exe, 00000006.00000002.2557574678.000001B8F4C49000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://winarkamaps.com/live/comp |
Source: rundll32.exe, 00000006.00000002.2557574678.000001B8F4C49000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://winarkamaps.com/m/= |
Source: rundll32.exe, 00000006.00000002.2557574678.000001B8F4C49000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://winarkamaps.com/q |
Source: unknown | Network traffic detected: HTTP traffic on port 49708 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49709 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49709 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49708 |
Source: unknown | HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.7:49708 version: TLS 1.2 |
Source: C:\Windows\System32\rundll32.exe | Code function: 3_2_00007FFB1E86AD34 NtAllocateVirtualMemory, | 3_2_00007FFB1E86AD34 |
Source: C:\Windows\System32\rundll32.exe | Code function: 3_2_00007FFB1E867A54 NtWriteFile, | 3_2_00007FFB1E867A54 |
Source: C:\Windows\System32\rundll32.exe | Code function: 3_2_00007FFB1E867B40 NtFreeVirtualMemory, | 3_2_00007FFB1E867B40 |
Source: C:\Windows\System32\rundll32.exe | Code function: 3_2_00007FFB1E86463C GetModuleHandleW,GetCurrentProcessId,GetCurrentProcessId,GetCurrentProcessId,OpenProcess,NtQueryInformationProcess,ReadProcessMemory,ReadProcessMemory,WideCharToMultiByte,FindCloseChangeNotification, | 3_2_00007FFB1E86463C |
Source: C:\Windows\System32\rundll32.exe | Code function: 3_2_00007FFB1E86378C NtClose, | 3_2_00007FFB1E86378C |
Source: C:\Windows\System32\rundll32.exe | Code function: 3_2_00007FFB1E867588 RtlInitUnicodeString,NtCreateFile,NtClose, | 3_2_00007FFB1E867588 |
Source: C:\Windows\System32\rundll32.exe | Code function: 3_2_00007FFB1E8677B0 RtlInitUnicodeString,NtCreateFile, | 3_2_00007FFB1E8677B0 |
Source: C:\Windows\System32\rundll32.exe | Code function: 3_2_00007FFB1E867ACC NtClose, | 3_2_00007FFB1E867ACC |
Source: C:\Windows\System32\rundll32.exe | Code function: 3_2_00007FFB1E86B1D4 NtQueryValueKey,NtQueryValueKey,NtClose, | 3_2_00007FFB1E86B1D4 |
Source: C:\Windows\System32\rundll32.exe | Code function: 3_2_00007FFB1E8678C0 NtReadFile, | 3_2_00007FFB1E8678C0 |
Source: C:\Windows\System32\rundll32.exe | Code function: 3_2_00007FFB1E8679C8 NtClose, | 3_2_00007FFB1E8679C8 |
Source: C:\Windows\System32\rundll32.exe | Code function: 3_2_00007FFB1E86C934 NtDelayExecution, | 3_2_00007FFB1E86C934 |
Source: C:\Windows\System32\rundll32.exe | Code function: 3_2_00007FFB1E86745C RtlInitUnicodeString,NtOpenFile,NtClose, | 3_2_00007FFB1E86745C |
Source: C:\Windows\System32\rundll32.exe | Code function: 3_2_00007FFB1E867694 RtlInitUnicodeString,NtDeleteFile, | 3_2_00007FFB1E867694 |
Source: C:\Windows\System32\rundll32.exe | Code function: 3_2_00007FFB1E867704 NtQueryInformationFile, | 3_2_00007FFB1E867704 |
Source: C:\Windows\System32\rundll32.exe | Code function: 6_2_00007FFB1C81C934 NtDelayExecution, | 6_2_00007FFB1C81C934 |
Source: C:\Windows\System32\rundll32.exe | Code function: 6_2_00007FFB1C81AD34 NtAllocateVirtualMemory, | 6_2_00007FFB1C81AD34 |
Source: C:\Windows\System32\rundll32.exe | Code function: 6_2_00007FFB1C81463C GetModuleHandleW,GetCurrentProcessId,GetCurrentProcessId,GetCurrentProcessId,OpenProcess,NtQueryInformationProcess,ReadProcessMemory,ReadProcessMemory,WideCharToMultiByte,FindCloseChangeNotification, | 6_2_00007FFB1C81463C |
Source: C:\Windows\System32\rundll32.exe | Code function: 6_2_00007FFB1C817B40 NtFreeVirtualMemory, | 6_2_00007FFB1C817B40 |
Source: C:\Windows\System32\rundll32.exe | Code function: 6_2_00007FFB1C81378C NtClose, | 6_2_00007FFB1C81378C |
Source: C:\Windows\System32\rundll32.exe | Code function: 6_2_00007FFB1C8177B0 RtlInitUnicodeString,NtCreateFile, | 6_2_00007FFB1C8177B0 |
Source: C:\Windows\System32\rundll32.exe | Code function: 6_2_00007FFB1C81B1D4 NtQueryValueKey,NtQueryValueKey,NtClose, | 6_2_00007FFB1C81B1D4 |
Source: C:\Windows\System32\rundll32.exe | Code function: 6_2_00007FFB1C8179C8 NtClose, | 6_2_00007FFB1C8179C8 |
Source: C:\Windows\System32\rundll32.exe | Code function: 6_2_00007FFB1C817A54 NtWriteFile, | 6_2_00007FFB1C817A54 |
Source: C:\Windows\System32\rundll32.exe | Code function: 6_2_00007FFB1C81745C RtlInitUnicodeString,NtOpenFile,NtClose, | 6_2_00007FFB1C81745C |
Source: C:\Windows\System32\rundll32.exe | Code function: 6_2_00007FFB1C817694 RtlInitUnicodeString,NtDeleteFile, | 6_2_00007FFB1C817694 |
Source: C:\Windows\System32\rundll32.exe | Code function: 6_2_00007FFB1C817588 RtlInitUnicodeString,NtCreateFile,NtClose, | 6_2_00007FFB1C817588 |
Source: C:\Windows\System32\rundll32.exe | Code function: 6_2_00007FFB1C817ACC NtClose, | 6_2_00007FFB1C817ACC |
Source: C:\Windows\System32\rundll32.exe | Code function: 6_2_00007FFB1C8178C0 NtReadFile, | 6_2_00007FFB1C8178C0 |
Source: C:\Windows\System32\rundll32.exe | Code function: 6_2_00007FFB1C817704 NtQueryInformationFile, | 6_2_00007FFB1C817704 |
Source: classification engine | Classification label: mal100.troj.winDLL@15/1@2/1 |
Source: C:\Windows\System32\rundll32.exe | Code function: 3_2_00007FFB1E868820 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,FindCloseChangeNotification, | 3_2_00007FFB1E868820 |
Source: C:\Windows\System32\rundll32.exe | Mutant created: \Sessions\1\BaseNamedObjects\runnung |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7488:120:WilError_03 |
Source: r2iL9TLvO3.dll | Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
Source: C:\Windows\System32\loaddll64.exe | Process created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\r2iL9TLvO3.dll,extra |
Source: r2iL9TLvO3.dll | Virustotal: Detection: 79% |
Source: r2iL9TLvO3.dll | ReversingLabs: Detection: 65% |
Source: unknown | Process created: C:\Windows\System32\loaddll64.exe loaddll64.exe "C:\Users\user\Desktop\r2iL9TLvO3.dll" | |
Source: C:\Windows\System32\loaddll64.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\loaddll64.exe | Process created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\r2iL9TLvO3.dll",#1 | |
Source: C:\Windows\System32\loaddll64.exe | Process created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\r2iL9TLvO3.dll,extra | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\r2iL9TLvO3.dll",#1 | |
Source: C:\Windows\System32\rundll32.exe | Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\AppData\Roaming\Custom_update\Update_8c0cffeb.dll", extra | |
Source: unknown | Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\AppData\Roaming\Custom_update\Update_8c0cffeb.dll", extra | |
Source: C:\Windows\System32\loaddll64.exe | Process created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\r2iL9TLvO3.dll,follower | |
Source: C:\Windows\System32\loaddll64.exe | Process created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\r2iL9TLvO3.dll,run | |
Source: C:\Windows\System32\loaddll64.exe | Process created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\r2iL9TLvO3.dll",#1 | Jump to behavior |
Source: C:\Windows\System32\loaddll64.exe | Process created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\r2iL9TLvO3.dll,extra | Jump to behavior |
Source: C:\Windows\System32\loaddll64.exe | Process created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\r2iL9TLvO3.dll,follower | Jump to behavior |
Source: C:\Windows\System32\loaddll64.exe | Process created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\r2iL9TLvO3.dll,run | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\r2iL9TLvO3.dll",#1 | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\AppData\Roaming\Custom_update\Update_8c0cffeb.dll", extra | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Automated click: OK |
Source: C:\Windows\System32\rundll32.exe | Automated click: OK |
Source: Window Recorder | Window detected: More than 3 window changes detected |
Source: r2iL9TLvO3.dll | Static PE information: Image base 0x180000000 > 0x60000000 |
Source: r2iL9TLvO3.dll | Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT |
Source: r2iL9TLvO3.dll | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Code function: GetAdaptersInfo,GetAdaptersInfo, | 3_2_00007FFB1E8668E8 |
Source: C:\Windows\System32\rundll32.exe | Code function: GetAdaptersInfo,GetAdaptersInfo,wsprintfA,wsprintfA,wsprintfA,GetComputerNameExA,wsprintfA,GetComputerNameExA,wsprintfA, | 3_2_00007FFB1E867FA8 |
Source: C:\Windows\System32\rundll32.exe | Code function: GetAdaptersInfo,GetAdaptersInfo,wsprintfA,wsprintfA,wsprintfA,GetComputerNameExA,wsprintfA,GetComputerNameExA,wsprintfA, | 6_2_00007FFB1C817FA8 |
Source: C:\Windows\System32\rundll32.exe | Code function: GetAdaptersInfo,GetAdaptersInfo, | 6_2_00007FFB1C8168E8 |
Source: C:\Windows\System32\rundll32.exe TID: 7624 | Thread sleep count: 56 > 30 | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe TID: 7624 | Thread sleep time: -56000s >= -30000s | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe TID: 7636 | Thread sleep count: 657 > 30 | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe TID: 7636 | Thread sleep time: -65700s >= -30000s | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe TID: 7624 | Thread sleep count: 8882 > 30 | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe TID: 7624 | Thread sleep time: -8882000s >= -30000s | Jump to behavior |
Source: C:\Windows\System32\conhost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\rundll32.exe | Code function: 3_2_00007FFB1E86A350 FindFirstFileW,FindNextFileW,LoadLibraryW, | 3_2_00007FFB1E86A350 |
Source: C:\Windows\System32\rundll32.exe | Code function: 3_2_00007FFB1E861A08 FindFirstFileA,wsprintfA,FindNextFileA,FindClose, | 3_2_00007FFB1E861A08 |
Source: C:\Windows\System32\rundll32.exe | Code function: 6_2_00007FFB1C81A350 FindFirstFileW,FindNextFileW,LoadLibraryW, | 6_2_00007FFB1C81A350 |
Source: C:\Windows\System32\rundll32.exe | Code function: 6_2_00007FFB1C811A08 FindFirstFileA,wsprintfA,FindNextFileA,FindClose, | 6_2_00007FFB1C811A08 |
Source: rundll32.exe, 00000006.00000002.2557574678.000001B8F4BA8000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: MWrod_VMware_SATA_CD00#4&224f42ef& |
Source: rundll32.exe, 00000003.00000002.1294789039.000001ED788D8000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: rod_VMware_SATA_CD00#4&22-00a0c91efb8b}\Device\C806e6f6e6963}\DosDevices\D:V |
Source: rundll32.exe, 00000006.00000002.2557574678.000001B8F4C0B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000002.2557574678.000001B8F4C35000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.2482822204.000001B8F4C10000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000002.2557574678.000001B8F4BF5000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW |
Source: rundll32.exe, 00000006.00000002.2557574678.000001B8F4BA8000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: rod_VMware_SATA_CD00#4&22-00a0c91efb8b}\Device\C806e6f6e6963}\DosDevices\D:oW |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\ VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\ VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\ VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\ VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\ VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\ VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\ VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\ VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\ VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\ VolumeInformation | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Queries volume information: C:\ VolumeInformation | Jump to behavior |
Source: Yara match | File source: r2iL9TLvO3.dll, type: SAMPLE |
Source: Yara match | File source: 6.2.rundll32.exe.7ffb1c810000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 3.3.rundll32.exe.1ed7a460000.0.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 3.2.rundll32.exe.7ffb1e860000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 3.3.rundll32.exe.1ed7a460000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 00000003.00000002.1295006377.00007FFB1E861000.00000020.00000001.01000000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000003.00000003.1294422202.000001ED7A460000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000006.00000002.2559163401.00007FFB1C811000.00000020.00000001.01000000.00000005.sdmp, type: MEMORY |
Source: Yara match | File source: 00000006.00000002.2556577168.00000081943F8000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: rundll32.exe PID: 7620, type: MEMORYSTR |
Source: Yara match | File source: decrypted.binstr, type: MEMORYSTR |
Source: Yara match | File source: C:\Users\user\AppData\Roaming\Custom_update\Update_8c0cffeb.dll, type: DROPPED |
Source: Yara match | File source: r2iL9TLvO3.dll, type: SAMPLE |
Source: Yara match | File source: 6.2.rundll32.exe.7ffb1c810000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 3.3.rundll32.exe.1ed7a460000.0.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 3.2.rundll32.exe.7ffb1e860000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 3.3.rundll32.exe.1ed7a460000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 00000003.00000002.1295006377.00007FFB1E861000.00000020.00000001.01000000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000003.00000003.1294422202.000001ED7A460000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000006.00000002.2559163401.00007FFB1C811000.00000020.00000001.01000000.00000005.sdmp, type: MEMORY |
Source: Yara match | File source: 00000006.00000002.2556577168.00000081943F8000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: rundll32.exe PID: 7620, type: MEMORYSTR |
Source: Yara match | File source: decrypted.binstr, type: MEMORYSTR |
Source: Yara match | File source: C:\Users\user\AppData\Roaming\Custom_update\Update_8c0cffeb.dll, type: DROPPED |