Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
RasTls.dll

Overview

General Information

Sample name:RasTls.dll
Analysis ID:1561846
MD5:f1c9f093d5479560e83a0759201210b7
SHA1:9553567e231a172c69f0ef8800a927193b9cbd49
SHA256:1906e7d5a745a364c91f5e230e16e1566721ace1183a57e8d25ff437664c7d02
Infos:

Detection

Score:88
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
System process connects to network (likely due to code injection or exploit)
AI detected suspicious sample
Machine Learning detection for sample
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
PE file contains section with special chars
Switches to a custom stack to bypass stack traces
Tries to detect virtualization through RDTSC time measurements
Creates a process in suspended mode (likely to inject code)
Entry point lies outside standard sections
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Sample execution stops while process was sleeping (likely an evasion)
Uses 32bit PE files

Classification

  • System is w10x64
  • loaddll32.exe (PID: 6668 cmdline: loaddll32.exe "C:\Users\user\Desktop\RasTls.dll" MD5: 51E6071F9CBA48E79F10C84515AAE618)
    • conhost.exe (PID: 6616 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 5856 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\RasTls.dll",#1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • rundll32.exe (PID: 1368 cmdline: rundll32.exe "C:\Users\user\Desktop\RasTls.dll",#1 MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 736 cmdline: rundll32.exe C:\Users\user\Desktop\RasTls.dll,GetOfficeDatatal MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 2416 cmdline: rundll32.exe "C:\Users\user\Desktop\RasTls.dll",GetOfficeDatatal MD5: 889B99C52A60DD49227C5E485A016679)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: RasTls.dllAvira: detected
Source: RasTls.dllReversingLabs: Detection: 68%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
Source: RasTls.dllJoe Sandbox ML: detected
Source: RasTls.dllStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL
Source: RasTls.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT

Networking

barindex
Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 65.20.90.139 443Jump to behavior
Source: Joe Sandbox ViewASN Name: CP-ASDE CP-ASDE
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: swiftandfast.net
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49942
Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49836 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49932 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49828 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49933 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49942 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49836
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49933
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49932
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49830
Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49830 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49828
Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443

System Summary

barindex
Source: RasTls.dllStatic PE information: section name: .X:T
Source: RasTls.dllStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL
Source: classification engineClassification label: mal88.evad.winDLL@10/0@1/1
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6616:120:WilError_03
Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\RasTls.dll,GetOfficeDatatal
Source: RasTls.dllReversingLabs: Detection: 68%
Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\RasTls.dll"
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\RasTls.dll",#1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\RasTls.dll,GetOfficeDatatal
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\RasTls.dll",#1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\RasTls.dll",GetOfficeDatatal
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\RasTls.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\RasTls.dll,GetOfficeDatatalJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\RasTls.dll",GetOfficeDatatalJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\RasTls.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
Source: RasTls.dllStatic file information: File size 6302208 > 1048576
Source: RasTls.dllStatic PE information: Raw size of .WFm is bigger than: 0x100000 < 0x601800
Source: RasTls.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT
Source: initial sampleStatic PE information: section where entry point is pointing to: .WFm
Source: RasTls.dllStatic PE information: section name: .X:T
Source: RasTls.dllStatic PE information: section name: .BXf
Source: RasTls.dllStatic PE information: section name: .WFm

Hooking and other Techniques for Hiding and Protection

barindex
Source: C:\Windows\System32\loaddll32.exeMemory written: PID: 6668 base: B60005 value: E9 8B 2F 3A 76 Jump to behavior
Source: C:\Windows\System32\loaddll32.exeMemory written: PID: 6668 base: 76F02F90 value: E9 7A D0 C5 89 Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 736 base: 2940005 value: E9 8B 2F 5C 74 Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 736 base: 76F02F90 value: E9 7A D0 A3 8B Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 1368 base: 33A0005 value: E9 8B 2F B6 73 Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 1368 base: 76F02F90 value: E9 7A D0 49 8C Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 2416 base: 3110005 value: E9 8B 2F DF 73 Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 2416 base: 76F02F90 value: E9 7A D0 20 8C Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Windows\System32\loaddll32.exeAPI/Special instruction interceptor: Address: 6C8B454B
Source: C:\Windows\System32\loaddll32.exeAPI/Special instruction interceptor: Address: 6C8B5B49
Source: C:\Windows\System32\loaddll32.exeAPI/Special instruction interceptor: Address: 6C77132F
Source: C:\Windows\System32\loaddll32.exeAPI/Special instruction interceptor: Address: 6C703714
Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 6C5D745C second address: 6C5D7467 instructions: 0x00000000 rdtsc 0x00000002 pop esi 0x00000003 movsx dx, bh 0x00000007 mov bp, 091Bh 0x0000000b rdtsc
Source: C:\Windows\System32\loaddll32.exeRDTSC instruction interceptor: First address: 6C5D745C second address: 6C5D7467 instructions: 0x00000000 rdtsc 0x00000002 pop esi 0x00000003 movsx dx, bh 0x00000007 mov bp, 091Bh 0x0000000b rdtsc
Source: C:\Windows\System32\loaddll32.exeRDTSC instruction interceptor: First address: 6C615B71 second address: 6C615B75 instructions: 0x00000000 rdtsc 0x00000002 pop ebx 0x00000003 cdq 0x00000004 rdtsc
Source: C:\Windows\System32\loaddll32.exeRDTSC instruction interceptor: First address: 6C6A9216 second address: 6C6A921A instructions: 0x00000000 rdtsc 0x00000002 pop ebx 0x00000003 cdq 0x00000004 rdtsc
Source: C:\Windows\SysWOW64\rundll32.exe TID: 4180Thread sleep count: 170 > 30Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe TID: 4180Thread sleep time: -170000s >= -30000sJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe TID: 6096Thread sleep count: 170 > 30Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe TID: 6096Thread sleep time: -170000s >= -30000sJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe TID: 2828Thread sleep count: 167 > 30Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe TID: 2828Thread sleep time: -167000s >= -30000sJump to behavior
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\SysWOW64\rundll32.exeLast function: Thread delayed
Source: C:\Windows\SysWOW64\rundll32.exeLast function: Thread delayed
Source: C:\Windows\SysWOW64\rundll32.exeLast function: Thread delayed
Source: C:\Windows\SysWOW64\rundll32.exeLast function: Thread delayed
Source: C:\Windows\SysWOW64\rundll32.exeLast function: Thread delayed
Source: C:\Windows\SysWOW64\rundll32.exeLast function: Thread delayed
Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 120000Jump to behavior
Source: rundll32.exe, 00000003.00000002.3555760931.000000000297A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.3555728306.000000000346A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.3555760361.000000000315A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Windows\System32\loaddll32.exeProcess information queried: ProcessInformationJump to behavior

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 65.20.90.139 443Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\RasTls.dll",#1Jump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
111
Process Injection
1
Rundll32
1
Credential API Hooking
21
Security Software Discovery
Remote Services1
Credential API Hooking
2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
11
Virtualization/Sandbox Evasion
LSASS Memory1
Process Discovery
Remote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)111
Process Injection
Security Account Manager11
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared Drive2
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDS21
System Information Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
RasTls.dll68%ReversingLabsWin32.Backdoor.Healquick
RasTls.dll100%AviraTR/Redcap.mvaff
RasTls.dll100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
swiftandfast.net
65.20.90.139
truetrue
    unknown
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    65.20.90.139
    swiftandfast.netUnited States
    199592CP-ASDEtrue
    Joe Sandbox version:41.0.0 Charoite
    Analysis ID:1561846
    Start date and time:2024-11-24 13:36:16 +01:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 5m 6s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Run name:Run with higher sleep bypass
    Number of analysed new started processes analysed:10
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:RasTls.dll
    Detection:MAL
    Classification:mal88.evad.winDLL@10/0@1/1
    Cookbook Comments:
    • Found application associated with file extension: .dll
    • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
    • Sleep loops longer than 100000000ms are bypassed. Single calls with delay of 100000000ms and higher are ignored
    • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
    • Not all processes where analyzed, report is missing behavior information
    • VT rate limit hit for: RasTls.dll
    No simulations
    No context
    No context
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    CP-ASDERFQ.scr.exeGet hashmaliciousDiscord Token StealerBrowse
    • 65.21.66.211
    hiss.arm7.elfGet hashmaliciousUnknownBrowse
    • 65.20.118.153
    Payload 94.75 (2).225.exeGet hashmaliciousUnknownBrowse
    • 65.21.172.133
    Payload 94.75.225.exeGet hashmaliciousUnknownBrowse
    • 65.21.98.72
    0438.pdf.exeGet hashmaliciousUnknownBrowse
    • 65.21.245.7
    0438.pdf.exeGet hashmaliciousUnknownBrowse
    • 65.21.245.7
    J4zGPhVRV3.exeGet hashmaliciousRMSRemoteAdminBrowse
    • 65.21.245.7
    J4zGPhVRV3.exeGet hashmaliciousRMSRemoteAdminBrowse
    • 65.21.245.7
    FPPhfkcDCh.exeGet hashmaliciousRemcosBrowse
    • 65.21.245.7
    No context
    No context
    No created / dropped files found
    File type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
    Entropy (8bit):7.965303809439106
    TrID:
    • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
    • Generic Win/DOS Executable (2004/3) 0.20%
    • DOS Executable Generic (2002/1) 0.20%
    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
    File name:RasTls.dll
    File size:6'302'208 bytes
    MD5:f1c9f093d5479560e83a0759201210b7
    SHA1:9553567e231a172c69f0ef8800a927193b9cbd49
    SHA256:1906e7d5a745a364c91f5e230e16e1566721ace1183a57e8d25ff437664c7d02
    SHA512:be63e2da1a550053d599e4369fe2e4a96bfed5bf0dc52bd4cba2a6ab0f8995c9953d4b703547e3bed45ce640c0eee4ebe3aef15849f126fff39b1f0178951201
    SSDEEP:196608:5y0OghWwkjhzqi5DOjUl2DGzNZZkuBm1W8xQVW:5JFEDj9qiloUl7Ux1W
    TLSH:E3562363216A0006E5F9883DC61F7D9831F742769B43E87CB1B6ADD52B269B1F203B53
    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....Ob...........!................0.=..............................................:`...@.............................N..
    Icon Hash:7ae282899bbab082
    Entrypoint:0x103dc030
    Entrypoint Section:.WFm
    Digitally signed:false
    Imagebase:0x10000000
    Subsystem:windows cui
    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL
    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT
    Time Stamp:0x624FFDD6 [Fri Apr 8 09:18:14 2022 UTC]
    TLS Callbacks:
    CLR (.Net) Version:
    OS Version Major:5
    OS Version Minor:1
    File Version Major:5
    File Version Minor:1
    Subsystem Version Major:5
    Subsystem Version Minor:1
    Import Hash:1a39c9a6ecf0ca64fc5770962bbdc4e5
    Instruction
    push BFD4F858h
    call 00007F8A00B455FCh
    dec edx
    not edx
    jmp 00007F8A00BE90E9h
    mov eax, dword ptr [ebp+00h]
    sub cx, 5642h
    shrd cx, dx, 00000081h
    mov cx, word ptr [ebp+04h]
    lea ebp, dword ptr [ebp+00000006h]
    jmp 00007F8A00B815E3h
    bt ecx, esi
    mov ecx, dword ptr [ebp+00h]
    jmp 00007F8A00D391E5h
    add edi, eax
    jmp 00007F8A00BA710Dh
    jne 00007F8A00B92BCEh
    mov eax, dword ptr [ebp+00h]
    jmp 00007F8A00B06AB0h
    add esi, 00000004h
    test di, ax
    xor ecx, ebx
    jmp 00007F8A00B3436Dh
    mov eax, dword ptr [esi]
    mov edx, esi
    bt edx, 1Ah
    btc edx, 14h
    mov edx, dword ptr [eax]
    cmc
    cmp sp, 55CAh
    mov dword ptr [esi], edx
    btc dx, di
    add edx, edx
    test ebp, 4118545Dh
    mov edx, dword ptr [ebp+00h]
    test cl, dh
    jmp 00007F8A00BECD4Eh
    inc ecx
    not ecx
    xor ebx, ecx
    jmp 00007F8A00B60936h
    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x9216d00x4e.WFm
    IMAGE_DIRECTORY_ENTRY_IMPORT0x5c5ac40x118.WFm
    IMAGE_DIRECTORY_ENTRY_RESOURCE0x96a0000x1b2.rsrc
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0x9690000x5fc.reloc
    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x9686700x40.WFm
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0x3660000x90.BXf
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
    .text0x10000x1a59b0x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    .rdata0x1c0000x462e0x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .data0x210000xa9000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .X:T0x2c0000x339eac0x0d41d8cd98f00b204e9800998ecf8427eunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    .BXf0x3660000x5b00x6007ef56d7580a2e67cae4f7f89e6eafb55False0.07877604166666667data0.5089280985485166IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .WFm0x3670000x6018000x60180061ee4f262fb1277e667af5bfdf9afdabunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    .reloc0x9690000x5fc0x60028b0624b163f2fd9b5e789a185b2c2dbFalse0.52734375data4.347436157519483IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .rsrc0x96a0000x1b20x2006a1cfcb854d8d3c8d4a13f0819166e2eFalse0.470703125data4.47450519324645IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    NameRVASizeTypeLanguageCountryZLIB Complexity
    RT_MANIFEST0x96a0580x15aASCII text, with CRLF line terminatorsEnglishUnited States0.5491329479768786
    DLLImport
    KERNEL32.dllGetVersionExW
    USER32.dllwsprintfA
    ADVAPI32.dllCredEnumerateA
    SHELL32.dllShellExecuteW
    WS2_32.dllWSAIoctl
    SHLWAPI.dllPathGetArgsW
    NETAPI32.dllNetUserGetInfo
    IPHLPAPI.DLLGetAdaptersInfo
    CRYPT32.dllCryptUnprotectData
    OLEAUT32.dllGetErrorInfo
    KERNEL32.dllGetSystemTimeAsFileTime
    USER32.dllCharUpperBuffW
    KERNEL32.dllLocalAlloc, LocalFree, GetModuleFileNameW, GetProcessAffinityMask, SetProcessAffinityMask, SetThreadAffinityMask, Sleep, ExitProcess, LoadLibraryA, GetModuleHandleA, GetProcAddress
    NameOrdinalAddress
    GetOfficeDatatal10x100098d0
    Language of compilation systemCountry where language is spokenMap
    EnglishUnited States
    TimestampSource PortDest PortSource IPDest IP
    Nov 24, 2024 13:37:12.508543968 CET49730443192.168.2.465.20.90.139
    Nov 24, 2024 13:37:12.508558035 CET49731443192.168.2.465.20.90.139
    Nov 24, 2024 13:37:12.508575916 CET4434973065.20.90.139192.168.2.4
    Nov 24, 2024 13:37:12.508654118 CET49730443192.168.2.465.20.90.139
    Nov 24, 2024 13:37:12.508656979 CET4434973165.20.90.139192.168.2.4
    Nov 24, 2024 13:37:12.508712053 CET49730443192.168.2.465.20.90.139
    Nov 24, 2024 13:37:12.508717060 CET4434973065.20.90.139192.168.2.4
    Nov 24, 2024 13:37:12.508730888 CET49731443192.168.2.465.20.90.139
    Nov 24, 2024 13:37:12.508800030 CET49731443192.168.2.465.20.90.139
    Nov 24, 2024 13:37:12.508819103 CET4434973165.20.90.139192.168.2.4
    Nov 24, 2024 13:37:15.656908989 CET49732443192.168.2.465.20.90.139
    Nov 24, 2024 13:37:15.656975985 CET4434973265.20.90.139192.168.2.4
    Nov 24, 2024 13:37:15.657051086 CET49732443192.168.2.465.20.90.139
    Nov 24, 2024 13:37:15.657095909 CET49732443192.168.2.465.20.90.139
    Nov 24, 2024 13:37:15.657104015 CET4434973265.20.90.139192.168.2.4
    Nov 24, 2024 13:37:56.659132004 CET4434973065.20.90.139192.168.2.4
    Nov 24, 2024 13:37:56.659212112 CET49730443192.168.2.465.20.90.139
    Nov 24, 2024 13:37:56.659288883 CET49730443192.168.2.465.20.90.139
    Nov 24, 2024 13:37:56.659305096 CET4434973065.20.90.139192.168.2.4
    Nov 24, 2024 13:37:56.750670910 CET4434973165.20.90.139192.168.2.4
    Nov 24, 2024 13:37:56.750802040 CET49731443192.168.2.465.20.90.139
    Nov 24, 2024 13:37:56.750924110 CET49731443192.168.2.465.20.90.139
    Nov 24, 2024 13:37:56.750946999 CET4434973165.20.90.139192.168.2.4
    Nov 24, 2024 13:37:59.667820930 CET49739443192.168.2.465.20.90.139
    Nov 24, 2024 13:37:59.667879105 CET4434973965.20.90.139192.168.2.4
    Nov 24, 2024 13:37:59.667973995 CET49739443192.168.2.465.20.90.139
    Nov 24, 2024 13:37:59.668024063 CET49739443192.168.2.465.20.90.139
    Nov 24, 2024 13:37:59.668031931 CET4434973965.20.90.139192.168.2.4
    Nov 24, 2024 13:37:59.741568089 CET4434973265.20.90.139192.168.2.4
    Nov 24, 2024 13:37:59.741672039 CET49732443192.168.2.465.20.90.139
    Nov 24, 2024 13:37:59.741758108 CET49732443192.168.2.465.20.90.139
    Nov 24, 2024 13:37:59.741796017 CET4434973265.20.90.139192.168.2.4
    Nov 24, 2024 13:37:59.761442900 CET49740443192.168.2.465.20.90.139
    Nov 24, 2024 13:37:59.761486053 CET4434974065.20.90.139192.168.2.4
    Nov 24, 2024 13:37:59.761567116 CET49740443192.168.2.465.20.90.139
    Nov 24, 2024 13:37:59.761615038 CET49740443192.168.2.465.20.90.139
    Nov 24, 2024 13:37:59.761622906 CET4434974065.20.90.139192.168.2.4
    Nov 24, 2024 13:38:02.746087074 CET49741443192.168.2.465.20.90.139
    Nov 24, 2024 13:38:02.746192932 CET4434974165.20.90.139192.168.2.4
    Nov 24, 2024 13:38:02.746413946 CET49741443192.168.2.465.20.90.139
    Nov 24, 2024 13:38:02.746490955 CET49741443192.168.2.465.20.90.139
    Nov 24, 2024 13:38:02.746510029 CET4434974165.20.90.139192.168.2.4
    Nov 24, 2024 13:38:43.845158100 CET4434973965.20.90.139192.168.2.4
    Nov 24, 2024 13:38:43.845355034 CET49739443192.168.2.465.20.90.139
    Nov 24, 2024 13:38:43.845355034 CET49739443192.168.2.465.20.90.139
    Nov 24, 2024 13:38:43.892118931 CET4434974065.20.90.139192.168.2.4
    Nov 24, 2024 13:38:43.892313957 CET49740443192.168.2.465.20.90.139
    Nov 24, 2024 13:38:43.892433882 CET49740443192.168.2.465.20.90.139
    Nov 24, 2024 13:38:43.892443895 CET4434974065.20.90.139192.168.2.4
    Nov 24, 2024 13:38:44.151957989 CET49739443192.168.2.465.20.90.139
    Nov 24, 2024 13:38:44.151983023 CET4434973965.20.90.139192.168.2.4
    Nov 24, 2024 13:38:46.855658054 CET49828443192.168.2.465.20.90.139
    Nov 24, 2024 13:38:46.855686903 CET4434982865.20.90.139192.168.2.4
    Nov 24, 2024 13:38:46.855761051 CET49828443192.168.2.465.20.90.139
    Nov 24, 2024 13:38:46.855844975 CET49828443192.168.2.465.20.90.139
    Nov 24, 2024 13:38:46.855853081 CET4434982865.20.90.139192.168.2.4
    Nov 24, 2024 13:38:46.902158976 CET49830443192.168.2.465.20.90.139
    Nov 24, 2024 13:38:46.902174950 CET4434983065.20.90.139192.168.2.4
    Nov 24, 2024 13:38:46.902379990 CET49830443192.168.2.465.20.90.139
    Nov 24, 2024 13:38:46.902461052 CET49830443192.168.2.465.20.90.139
    Nov 24, 2024 13:38:46.902468920 CET4434983065.20.90.139192.168.2.4
    Nov 24, 2024 13:38:46.927247047 CET4434974165.20.90.139192.168.2.4
    Nov 24, 2024 13:38:46.927400112 CET49741443192.168.2.465.20.90.139
    Nov 24, 2024 13:38:46.927519083 CET49741443192.168.2.465.20.90.139
    Nov 24, 2024 13:38:46.927541018 CET4434974165.20.90.139192.168.2.4
    Nov 24, 2024 13:38:49.933461905 CET49836443192.168.2.465.20.90.139
    Nov 24, 2024 13:38:49.933516026 CET4434983665.20.90.139192.168.2.4
    Nov 24, 2024 13:38:49.933707952 CET49836443192.168.2.465.20.90.139
    Nov 24, 2024 13:38:49.933800936 CET49836443192.168.2.465.20.90.139
    Nov 24, 2024 13:38:49.933809996 CET4434983665.20.90.139192.168.2.4
    Nov 24, 2024 13:39:30.977833986 CET4434982865.20.90.139192.168.2.4
    Nov 24, 2024 13:39:30.977966070 CET49828443192.168.2.465.20.90.139
    Nov 24, 2024 13:39:30.978156090 CET49828443192.168.2.465.20.90.139
    Nov 24, 2024 13:39:30.978169918 CET4434982865.20.90.139192.168.2.4
    Nov 24, 2024 13:39:31.111716986 CET4434983065.20.90.139192.168.2.4
    Nov 24, 2024 13:39:31.111788034 CET49830443192.168.2.465.20.90.139
    Nov 24, 2024 13:39:31.111844063 CET49830443192.168.2.465.20.90.139
    Nov 24, 2024 13:39:31.111852884 CET4434983065.20.90.139192.168.2.4
    Nov 24, 2024 13:39:33.980344057 CET49932443192.168.2.465.20.90.139
    Nov 24, 2024 13:39:33.980379105 CET4434993265.20.90.139192.168.2.4
    Nov 24, 2024 13:39:33.980463982 CET49932443192.168.2.465.20.90.139
    Nov 24, 2024 13:39:33.980592012 CET49932443192.168.2.465.20.90.139
    Nov 24, 2024 13:39:33.980600119 CET4434993265.20.90.139192.168.2.4
    Nov 24, 2024 13:39:34.096189022 CET4434983665.20.90.139192.168.2.4
    Nov 24, 2024 13:39:34.096278906 CET49836443192.168.2.465.20.90.139
    Nov 24, 2024 13:39:34.096343040 CET49836443192.168.2.465.20.90.139
    Nov 24, 2024 13:39:34.096379995 CET4434983665.20.90.139192.168.2.4
    Nov 24, 2024 13:39:34.120963097 CET49933443192.168.2.465.20.90.139
    Nov 24, 2024 13:39:34.120997906 CET4434993365.20.90.139192.168.2.4
    Nov 24, 2024 13:39:34.121076107 CET49933443192.168.2.465.20.90.139
    Nov 24, 2024 13:39:34.121157885 CET49933443192.168.2.465.20.90.139
    Nov 24, 2024 13:39:34.121165991 CET4434993365.20.90.139192.168.2.4
    Nov 24, 2024 13:39:37.105736017 CET49942443192.168.2.465.20.90.139
    Nov 24, 2024 13:39:37.105787039 CET4434994265.20.90.139192.168.2.4
    Nov 24, 2024 13:39:37.105866909 CET49942443192.168.2.465.20.90.139
    Nov 24, 2024 13:39:37.105936050 CET49942443192.168.2.465.20.90.139
    Nov 24, 2024 13:39:37.105945110 CET4434994265.20.90.139192.168.2.4
    Nov 24, 2024 13:40:18.097523928 CET4434993265.20.90.139192.168.2.4
    Nov 24, 2024 13:40:18.097615957 CET49932443192.168.2.465.20.90.139
    Nov 24, 2024 13:40:18.488009930 CET4434993365.20.90.139192.168.2.4
    Nov 24, 2024 13:40:18.488070965 CET49933443192.168.2.465.20.90.139
    TimestampSource PortDest PortSource IPDest IP
    Nov 24, 2024 13:37:12.252051115 CET6043353192.168.2.41.1.1.1
    Nov 24, 2024 13:37:12.500844002 CET53604331.1.1.1192.168.2.4
    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
    Nov 24, 2024 13:37:12.252051115 CET192.168.2.41.1.1.10xa9bcStandard query (0)swiftandfast.netA (IP address)IN (0x0001)false
    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
    Nov 24, 2024 13:37:12.500844002 CET1.1.1.1192.168.2.40xa9bcNo error (0)swiftandfast.net65.20.90.139A (IP address)IN (0x0001)false

    Click to jump to process

    Click to jump to process

    Click to dive into process behavior distribution

    Click to jump to process

    Target ID:0
    Start time:07:37:09
    Start date:24/11/2024
    Path:C:\Windows\System32\loaddll32.exe
    Wow64 process (32bit):true
    Commandline:loaddll32.exe "C:\Users\user\Desktop\RasTls.dll"
    Imagebase:0xe80000
    File size:126'464 bytes
    MD5 hash:51E6071F9CBA48E79F10C84515AAE618
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:1
    Start time:07:37:09
    Start date:24/11/2024
    Path:C:\Windows\System32\conhost.exe
    Wow64 process (32bit):false
    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Imagebase:0x7ff7699e0000
    File size:862'208 bytes
    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:false

    Target ID:2
    Start time:07:37:10
    Start date:24/11/2024
    Path:C:\Windows\SysWOW64\cmd.exe
    Wow64 process (32bit):true
    Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\RasTls.dll",#1
    Imagebase:0x240000
    File size:236'544 bytes
    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:false

    Target ID:3
    Start time:07:37:10
    Start date:24/11/2024
    Path:C:\Windows\SysWOW64\rundll32.exe
    Wow64 process (32bit):true
    Commandline:rundll32.exe C:\Users\user\Desktop\RasTls.dll,GetOfficeDatatal
    Imagebase:0x5a0000
    File size:61'440 bytes
    MD5 hash:889B99C52A60DD49227C5E485A016679
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:false

    Target ID:4
    Start time:07:37:10
    Start date:24/11/2024
    Path:C:\Windows\SysWOW64\rundll32.exe
    Wow64 process (32bit):true
    Commandline:rundll32.exe "C:\Users\user\Desktop\RasTls.dll",#1
    Imagebase:0x5a0000
    File size:61'440 bytes
    MD5 hash:889B99C52A60DD49227C5E485A016679
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:false

    Target ID:5
    Start time:07:37:13
    Start date:24/11/2024
    Path:C:\Windows\SysWOW64\rundll32.exe
    Wow64 process (32bit):true
    Commandline:rundll32.exe "C:\Users\user\Desktop\RasTls.dll",GetOfficeDatatal
    Imagebase:0x5a0000
    File size:61'440 bytes
    MD5 hash:889B99C52A60DD49227C5E485A016679
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:false

    No disassembly