Click to jump to signature section
Source: BjLxqVU7m4.dll | ReversingLabs: Detection: 50% |
Source: Submited Sample | Integrated Neural Analysis Model: Matched 98.3% probability |
Source: unknown | HTTPS traffic detected: 148.135.121.165:443 -> 192.168.2.5:49705 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 148.135.121.165:443 -> 192.168.2.5:49704 version: TLS 1.2 |
Source: BjLxqVU7m4.dll | Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT |
Source: | Binary string: F:\Code\ctf\catchme\source\httpshellcode\x64\Release\httpshellcode.pdb&& source: sdiagnhost.exe, 00000003.00000002.3337833644.00000212452D0000.00000004.00001000.00020000.00000000.sdmp, sdiagnhost.exe, 00000003.00000002.3337939260.0000021245313000.00000002.10000000.00040000.00000000.sdmp, sdiagnhost.exe, 00000006.00000002.3337924845.000001E9B9ED3000.00000002.10000000.00040000.00000000.sdmp, sdiagnhost.exe, 00000006.00000002.3337450217.000001E9B9D90000.00000004.00001000.00020000.00000000.sdmp |
Source: | Binary string: F:\Code\ctf\catchme\source\httpshellcode\x64\Release\httpshellcode.pdb source: sdiagnhost.exe, 00000003.00000002.3337833644.00000212452D0000.00000004.00001000.00020000.00000000.sdmp, sdiagnhost.exe, 00000003.00000002.3337939260.0000021245313000.00000002.10000000.00040000.00000000.sdmp, sdiagnhost.exe, 00000006.00000002.3337924845.000001E9B9ED3000.00000002.10000000.00040000.00000000.sdmp, sdiagnhost.exe, 00000006.00000002.3337450217.000001E9B9D90000.00000004.00001000.00020000.00000000.sdmp |
Source: Joe Sandbox View | JA3 fingerprint: 72a589da586844d7f0818ce684948eea |
Source: unknown | TCP traffic detected without corresponding DNS query: 148.135.121.165 |
Source: unknown | TCP traffic detected without corresponding DNS query: 148.135.121.165 |
Source: unknown | TCP traffic detected without corresponding DNS query: 148.135.121.165 |
Source: unknown | TCP traffic detected without corresponding DNS query: 148.135.121.165 |
Source: unknown | TCP traffic detected without corresponding DNS query: 148.135.121.165 |
Source: unknown | TCP traffic detected without corresponding DNS query: 148.135.121.165 |
Source: unknown | TCP traffic detected without corresponding DNS query: 148.135.121.165 |
Source: unknown | TCP traffic detected without corresponding DNS query: 148.135.121.165 |
Source: unknown | TCP traffic detected without corresponding DNS query: 148.135.121.165 |
Source: unknown | TCP traffic detected without corresponding DNS query: 148.135.121.165 |
Source: unknown | TCP traffic detected without corresponding DNS query: 148.135.121.165 |
Source: unknown | TCP traffic detected without corresponding DNS query: 148.135.121.165 |
Source: unknown | TCP traffic detected without corresponding DNS query: 148.135.121.165 |
Source: unknown | TCP traffic detected without corresponding DNS query: 148.135.121.165 |
Source: unknown | TCP traffic detected without corresponding DNS query: 148.135.121.165 |
Source: unknown | TCP traffic detected without corresponding DNS query: 148.135.121.165 |
Source: unknown | TCP traffic detected without corresponding DNS query: 148.135.121.165 |
Source: unknown | TCP traffic detected without corresponding DNS query: 148.135.121.165 |
Source: unknown | TCP traffic detected without corresponding DNS query: 148.135.121.165 |
Source: unknown | TCP traffic detected without corresponding DNS query: 148.135.121.165 |
Source: global traffic | HTTP traffic detected: GET /39ffc7e3-0abd-4695-9967-553cce533999/5b790c2e-bfea-406c-af40-edc931ddeac3 HTTP/1.1Connection: Keep-AliveContent-Type: text/plainUser-Agent: HCMUS-CTF BotnetHost: 148.135.121.165 |
Source: global traffic | HTTP traffic detected: GET /39ffc7e3-0abd-4695-9967-553cce533999/5b790c2e-bfea-406c-af40-edc931ddeac3 HTTP/1.1Connection: Keep-AliveContent-Type: text/plainUser-Agent: HCMUS-CTF BotnetHost: 148.135.121.165 |
Source: sdiagnhost.exe, 00000006.00000002.3337478663.000001E9B9DD2000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000006.00000003.2721704145.000001E9B9DD1000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://148.135.121.165/ |
Source: sdiagnhost.exe, 00000003.00000003.2721646362.0000021245104000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000003.00000002.3337520750.0000021245105000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000003.00000003.2121243744.00000212450FF000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000003.00000002.3337384034.0000021245097000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000006.00000002.3337478663.000001E9B9DD2000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000006.00000003.2721704145.000001E9B9DD1000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000006.00000003.2721388889.000001E9B9E15000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://148.135.121.165/39ffc7e3-0abd-4695-9967-553cce533999/5b790c2e-bfea-406c-af40-edc931ddeac3 |
Source: sdiagnhost.exe, 00000006.00000002.3337478663.000001E9B9DD2000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000006.00000003.2721704145.000001E9B9DD1000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://148.135.121.165/39ffc7e3-0abd-4695-9967-553cce533999/5b790c2e-bfea-406c-af40-edc931ddeac3m |
Source: sdiagnhost.exe, 00000003.00000002.3337384034.0000021245097000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://148.135.121.165/h |
Source: sdiagnhost.exe, 00000003.00000002.3337384034.0000021245097000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000006.00000002.3337478663.000001E9B9DD2000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000006.00000003.2721704145.000001E9B9DD1000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://148.135.121.165:443/39ffc7e3-0abd-4695-9967-553cce533999/5b790c2e-bfea-406c-af40-edc931ddeac |
Source: unknown | Network traffic detected: HTTP traffic on port 49705 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49704 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49705 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49704 |
Source: unknown | HTTPS traffic detected: 148.135.121.165:443 -> 192.168.2.5:49705 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 148.135.121.165:443 -> 192.168.2.5:49704 version: TLS 1.2 |
Source: 00000000.00000002.2097265530.0000023F26458000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown |
Source: 00000000.00000002.2097166418.000000F46C712000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown |
Source: 00000004.00000002.2144696138.000000219F0F2000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown |
Source: 00000006.00000002.3337339703.000001E9B9C30000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown |
Source: 00000003.00000002.3337328614.0000021245060000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown |
Source: 00000004.00000003.2144509875.0000015D67C38000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown |
Source: C:\Windows\System32\sdiagnhost.exe | Code function: 3_2_00000212450675CD NtCreateSection,NtMapViewOfSection,VirtualAlloc,NtUnmapViewOfSection,NtMapViewOfSection,VirtualProtect,VirtualProtect,VirtualProtect, | 3_2_00000212450675CD |
Source: C:\Windows\System32\sdiagnhost.exe | Code function: 6_2_000001E9B9C375CD NtCreateSection,NtMapViewOfSection,VirtualAlloc,NtUnmapViewOfSection,NtMapViewOfSection,VirtualProtect,VirtualProtect,VirtualProtect, | 6_2_000001E9B9C375CD |
Source: C:\Windows\System32\sdiagnhost.exe | Code function: 3_2_0000021245066DC5 | 3_2_0000021245066DC5 |
Source: C:\Windows\System32\sdiagnhost.exe | Code function: 3_2_00000212450675CD | 3_2_00000212450675CD |
Source: C:\Windows\System32\sdiagnhost.exe | Code function: 3_2_000002124506806D | 3_2_000002124506806D |
Source: C:\Windows\System32\sdiagnhost.exe | Code function: 3_2_0000021245067195 | 3_2_0000021245067195 |
Source: C:\Windows\System32\sdiagnhost.exe | Code function: 3_2_000002124506A8C5 | 3_2_000002124506A8C5 |
Source: C:\Windows\System32\sdiagnhost.exe | Code function: 3_2_0000021245065ED1 | 3_2_0000021245065ED1 |
Source: C:\Windows\System32\sdiagnhost.exe | Code function: 3_2_00000212453111C0 | 3_2_00000212453111C0 |
Source: C:\Windows\System32\sdiagnhost.exe | Code function: 6_2_000001E9B9C36DC5 | 6_2_000001E9B9C36DC5 |
Source: C:\Windows\System32\sdiagnhost.exe | Code function: 6_2_000001E9B9C375CD | 6_2_000001E9B9C375CD |
Source: C:\Windows\System32\sdiagnhost.exe | Code function: 6_2_000001E9B9C37195 | 6_2_000001E9B9C37195 |
Source: C:\Windows\System32\sdiagnhost.exe | Code function: 6_2_000001E9B9C3A8C5 | 6_2_000001E9B9C3A8C5 |
Source: C:\Windows\System32\sdiagnhost.exe | Code function: 6_2_000001E9B9C3806D | 6_2_000001E9B9C3806D |
Source: C:\Windows\System32\sdiagnhost.exe | Code function: 6_2_000001E9B9C35ED1 | 6_2_000001E9B9C35ED1 |
Source: C:\Windows\System32\sdiagnhost.exe | Code function: 6_2_000001E9B9ED11C0 | 6_2_000001E9B9ED11C0 |
Source: 00000000.00000002.2097265530.0000023F26458000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13 |
Source: 00000000.00000002.2097166418.000000F46C712000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13 |
Source: 00000004.00000002.2144696138.000000219F0F2000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13 |
Source: 00000006.00000002.3337339703.000001E9B9C30000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13 |
Source: 00000003.00000002.3337328614.0000021245060000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13 |
Source: 00000004.00000003.2144509875.0000015D67C38000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13 |
Source: classification engine | Classification label: mal72.evad.winDLL@12/0@0/1 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6204:120:WilError_03 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2352:120:WilError_03 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5940:120:WilError_03 |
Source: BjLxqVU7m4.dll | Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
Source: C:\Windows\System32\loaddll64.exe | Key opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\BjLxqVU7m4.dll",#1 |
Source: BjLxqVU7m4.dll | ReversingLabs: Detection: 50% |
Source: unknown | Process created: C:\Windows\System32\loaddll64.exe loaddll64.exe "C:\Users\user\Desktop\BjLxqVU7m4.dll" | |
Source: C:\Windows\System32\loaddll64.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\loaddll64.exe | Process created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\BjLxqVU7m4.dll",#1 | |
Source: C:\Windows\System32\loaddll64.exe | Process created: C:\Windows\System32\sdiagnhost.exe c:\windows\System32\sdiagnhost.exe | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\BjLxqVU7m4.dll",#1 | |
Source: C:\Windows\System32\sdiagnhost.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\rundll32.exe | Process created: C:\Windows\System32\sdiagnhost.exe c:\windows\System32\sdiagnhost.exe | |
Source: C:\Windows\System32\sdiagnhost.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\loaddll64.exe | Process created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\BjLxqVU7m4.dll",#1 | Jump to behavior |
Source: C:\Windows\System32\loaddll64.exe | Process created: C:\Windows\System32\sdiagnhost.exe c:\windows\System32\sdiagnhost.exe | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\BjLxqVU7m4.dll",#1 | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process created: C:\Windows\System32\sdiagnhost.exe c:\windows\System32\sdiagnhost.exe | Jump to behavior |
Source: C:\Windows\System32\loaddll64.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Windows\System32\loaddll64.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe | Section loaded: msvcp140.dll | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe | Section loaded: vcruntime140.dll | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe | Section loaded: vcruntime140_1.dll | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe | Section loaded: webio.dll | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe | Section loaded: schannel.dll | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe | Section loaded: mskeyprotect.dll | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe | Section loaded: ncryptsslp.dll | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe | Section loaded: dpapi.dll | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe | Section loaded: msvcp140.dll | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe | Section loaded: vcruntime140.dll | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe | Section loaded: vcruntime140_1.dll | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe | Section loaded: webio.dll | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe | Section loaded: schannel.dll | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe | Section loaded: mskeyprotect.dll | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe | Section loaded: ncryptsslp.dll | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe | Section loaded: dpapi.dll | Jump to behavior |
Source: Window Recorder | Window detected: More than 3 window changes detected |
Source: BjLxqVU7m4.dll | Static PE information: Image base 0x180000000 > 0x60000000 |
Source: BjLxqVU7m4.dll | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT |
Source: BjLxqVU7m4.dll | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE |
Source: BjLxqVU7m4.dll | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC |
Source: BjLxqVU7m4.dll | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG |
Source: BjLxqVU7m4.dll | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG |
Source: BjLxqVU7m4.dll | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT |
Source: BjLxqVU7m4.dll | Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT |
Source: BjLxqVU7m4.dll | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG |
Source: | Binary string: F:\Code\ctf\catchme\source\httpshellcode\x64\Release\httpshellcode.pdb&& source: sdiagnhost.exe, 00000003.00000002.3337833644.00000212452D0000.00000004.00001000.00020000.00000000.sdmp, sdiagnhost.exe, 00000003.00000002.3337939260.0000021245313000.00000002.10000000.00040000.00000000.sdmp, sdiagnhost.exe, 00000006.00000002.3337924845.000001E9B9ED3000.00000002.10000000.00040000.00000000.sdmp, sdiagnhost.exe, 00000006.00000002.3337450217.000001E9B9D90000.00000004.00001000.00020000.00000000.sdmp |
Source: | Binary string: F:\Code\ctf\catchme\source\httpshellcode\x64\Release\httpshellcode.pdb source: sdiagnhost.exe, 00000003.00000002.3337833644.00000212452D0000.00000004.00001000.00020000.00000000.sdmp, sdiagnhost.exe, 00000003.00000002.3337939260.0000021245313000.00000002.10000000.00040000.00000000.sdmp, sdiagnhost.exe, 00000006.00000002.3337924845.000001E9B9ED3000.00000002.10000000.00040000.00000000.sdmp, sdiagnhost.exe, 00000006.00000002.3337450217.000001E9B9D90000.00000004.00001000.00020000.00000000.sdmp |
Source: BjLxqVU7m4.dll | Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata |
Source: BjLxqVU7m4.dll | Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc |
Source: BjLxqVU7m4.dll | Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc |
Source: BjLxqVU7m4.dll | Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata |
Source: BjLxqVU7m4.dll | Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\conhost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe | Thread delayed: delay time: 922337203685477 | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe | Thread delayed: delay time: 922337203685477 | Jump to behavior |
Source: C:\Windows\System32\loaddll64.exe TID: 1276 | Thread sleep time: -120000s >= -30000s | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe TID: 3180 | Thread sleep time: -30000s >= -30000s | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe TID: 5520 | Thread sleep time: -922337203685477s >= -30000s | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe TID: 5692 | Thread sleep time: -30000s >= -30000s | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe TID: 2364 | Thread sleep time: -922337203685477s >= -30000s | Jump to behavior |
Source: C:\Windows\System32\conhost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\sdiagnhost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\loaddll64.exe | Thread delayed: delay time: 120000 | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe | Thread delayed: delay time: 922337203685477 | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe | Thread delayed: delay time: 922337203685477 | Jump to behavior |
Source: sdiagnhost.exe, 00000006.00000002.3337745462.000001E9B9E1F000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000006.00000003.2121162740.000001E9B9E1C000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000006.00000003.2721916034.000001E9B9E1C000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000006.00000003.2721388889.000001E9B9E1C000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW4 |
Source: sdiagnhost.exe, 00000003.00000003.2721386114.0000021245112000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000003.00000003.2721646362.0000021245104000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000003.00000002.3337520750.0000021245105000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000003.00000003.2721894603.0000021245113000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000003.00000003.2121421493.0000021245112000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000003.00000003.2121243744.00000212450FF000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000003.00000003.2721702995.0000021245113000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000003.00000002.3337384034.0000021245097000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000006.00000003.2121162740.000001E9B9E1C000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000006.00000003.2721916034.000001E9B9E1C000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW |
Source: sdiagnhost.exe, 00000006.00000003.2722045406.000001E9B9DE1000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000006.00000003.2721704145.000001E9B9DD1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW` |
Source: C:\Windows\System32\loaddll64.exe | Memory allocated: C:\Windows\System32\sdiagnhost.exe base: 21245060000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Memory allocated: C:\Windows\System32\sdiagnhost.exe base: 1E9B9C30000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\System32\loaddll64.exe | Thread created: C:\Windows\System32\sdiagnhost.exe EIP: 45060000 | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Thread created: C:\Windows\System32\sdiagnhost.exe EIP: B9C30000 | Jump to behavior |
Source: C:\Windows\System32\loaddll64.exe | Memory written: C:\Windows\System32\sdiagnhost.exe base: 21245060000 | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Memory written: C:\Windows\System32\sdiagnhost.exe base: 1E9B9C30000 | Jump to behavior |
Source: C:\Windows\System32\loaddll64.exe | Process created: C:\Windows\System32\sdiagnhost.exe c:\windows\System32\sdiagnhost.exe | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\BjLxqVU7m4.dll",#1 | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process created: C:\Windows\System32\sdiagnhost.exe c:\windows\System32\sdiagnhost.exe | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe | Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid | Jump to behavior |