Click to jump to signature section
Source: loaddll32.exe.7584.0.memstrmin | Malware Configuration Extractor: Socks5Systemz {"C2 list": ["gjeqiox.com"]} |
Source: Network traffic | Suricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49759 -> 94.232.249.187:80 |
Source: Network traffic | Suricata IDS: 2049468 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49759 -> 94.232.249.187:80 |
Source: Network traffic | Suricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49787 -> 94.232.249.187:80 |
Source: Network traffic | Suricata IDS: 2049468 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49787 -> 94.232.249.187:80 |
Source: Network traffic | Suricata IDS: 2829008 - Severity 1 - ETPRO MALWARE W32/Teamspy Variant Checkin : 192.168.2.4:49787 -> 94.232.249.187:80 |
Source: Network traffic | Suricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49874 -> 185.237.206.129:80 |
Source: Network traffic | Suricata IDS: 2049468 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49874 -> 185.237.206.129:80 |
Source: Network traffic | Suricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49817 -> 94.232.249.187:80 |
Source: Network traffic | Suricata IDS: 2049468 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49817 -> 94.232.249.187:80 |
Source: Network traffic | Suricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50013 -> 185.237.206.129:80 |
Source: Network traffic | Suricata IDS: 2049468 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50013 -> 185.237.206.129:80 |
Source: Joe Sandbox View | ASN Name: INT-PDN-STE-ASSTEPDNInternalASSY INT-PDN-STE-ASSTEPDNInternalASSY |
Source: Joe Sandbox View | ASN Name: ITLDC-NLUA ITLDC-NLUA |
Source: global traffic | HTTP traffic detected: GET /fox.php?c=de7ef49b2c006853fb383e293402a01561ac1905c311578eaae3c7edb62dde24353e1d9a943e9d15038842974dbc1dbaf7a1439e40c87a0c95308147919e3c227a17f5652d73d5c323748588dc365e508ddb06fa16 HTTP/1.1Host: eeikzox.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US) |
Source: global traffic | HTTP traffic detected: GET /fox.php?c=de7ef49b2c006853fb383e293402a01561ac1905c311578eaae3c7edb62dde24353e1d9a943e9d15038842974dbc1dbaf7a1439e40c87a0c95308147919e3c227a17f5652d73d5c323748588dc365e508ddb06fa16 HTTP/1.1Host: eeikzox.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US) |
Source: global traffic | HTTP traffic detected: GET /fox.php?c=de7ef49b2c006853fb383e293402a01561ac1905c311578eaae3c7edb62dde24353e1d9a943e9d15038842974dbc1dbaf7a1439e40c87a0c95308147919e3c227a17f5652d73d5c323748588dc365e508ddb06fa16 HTTP/1.1Host: eeikzox.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US) |
Source: global traffic | HTTP traffic detected: GET /fox.php?c=de7ef49b2c006853fb383e293402a01561ac1905c311578eaae3c7edb62dde24353e1d9a943e9d15038842974dbc1dbaf7a1439e40c87a0c95308147919e3c227a17f5652d73d5c323748588dc365e508ddb06fa16 HTTP/1.1Host: gjeqiox.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US) |
Source: global traffic | HTTP traffic detected: GET /fox.php?c=de7ef49b2c006853fb383e293402a01561ac1905c311578eaae3c7edb62cde24353e1d9a943e9d15038842925ce04feea4a21bca13c034078571c0549e823e3c6541a221362694d36a2c9edd9f6c575388d802fb13ced95fb4 HTTP/1.1Host: gjeqiox.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US) |
Source: global traffic | HTTP traffic detected: GET /fox.php?c=de7ef49b2c006853fb383e293402a01561ac1905c311578eaae3c7edb62dde24353e1d9a943e9d15038842925ce04feea4a21bca13c034078571c0549e823e3c6541a221362694d36a2c9edd9f6c575388d802fb13ced95fb4 HTTP/1.1Host: gjeqiox.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US) |
Source: unknown | TCP traffic detected without corresponding DNS query: 45.155.250.225 |
Source: unknown | TCP traffic detected without corresponding DNS query: 45.155.250.225 |
Source: unknown | TCP traffic detected without corresponding DNS query: 45.155.250.225 |
Source: unknown | TCP traffic detected without corresponding DNS query: 45.155.250.225 |
Source: unknown | TCP traffic detected without corresponding DNS query: 45.155.250.225 |
Source: unknown | TCP traffic detected without corresponding DNS query: 45.155.250.225 |
Source: unknown | UDP traffic detected without corresponding DNS query: 45.155.250.90 |
Source: unknown | UDP traffic detected without corresponding DNS query: 81.31.197.8 |
Source: unknown | UDP traffic detected without corresponding DNS query: 81.31.197.8 |
Source: unknown | UDP traffic detected without corresponding DNS query: 81.31.197.8 |
Source: unknown | UDP traffic detected without corresponding DNS query: 81.31.197.8 |
Source: unknown | UDP traffic detected without corresponding DNS query: 81.31.197.8 |
Source: unknown | UDP traffic detected without corresponding DNS query: 45.155.250.90 |
Source: global traffic | HTTP traffic detected: GET /fox.php?c=de7ef49b2c006853fb383e293402a01561ac1905c311578eaae3c7edb62dde24353e1d9a943e9d15038842974dbc1dbaf7a1439e40c87a0c95308147919e3c227a17f5652d73d5c323748588dc365e508ddb06fa16 HTTP/1.1Host: eeikzox.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US) |
Source: global traffic | HTTP traffic detected: GET /fox.php?c=de7ef49b2c006853fb383e293402a01561ac1905c311578eaae3c7edb62dde24353e1d9a943e9d15038842974dbc1dbaf7a1439e40c87a0c95308147919e3c227a17f5652d73d5c323748588dc365e508ddb06fa16 HTTP/1.1Host: eeikzox.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US) |
Source: global traffic | HTTP traffic detected: GET /fox.php?c=de7ef49b2c006853fb383e293402a01561ac1905c311578eaae3c7edb62dde24353e1d9a943e9d15038842974dbc1dbaf7a1439e40c87a0c95308147919e3c227a17f5652d73d5c323748588dc365e508ddb06fa16 HTTP/1.1Host: eeikzox.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US) |
Source: global traffic | HTTP traffic detected: GET /fox.php?c=de7ef49b2c006853fb383e293402a01561ac1905c311578eaae3c7edb62dde24353e1d9a943e9d15038842974dbc1dbaf7a1439e40c87a0c95308147919e3c227a17f5652d73d5c323748588dc365e508ddb06fa16 HTTP/1.1Host: gjeqiox.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US) |
Source: global traffic | HTTP traffic detected: GET /fox.php?c=de7ef49b2c006853fb383e293402a01561ac1905c311578eaae3c7edb62cde24353e1d9a943e9d15038842925ce04feea4a21bca13c034078571c0549e823e3c6541a221362694d36a2c9edd9f6c575388d802fb13ced95fb4 HTTP/1.1Host: gjeqiox.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US) |
Source: global traffic | HTTP traffic detected: GET /fox.php?c=de7ef49b2c006853fb383e293402a01561ac1905c311578eaae3c7edb62dde24353e1d9a943e9d15038842925ce04feea4a21bca13c034078571c0549e823e3c6541a221362694d36a2c9edd9f6c575388d802fb13ced95fb4 HTTP/1.1Host: gjeqiox.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US) |
Source: loaddll32.exe, 00000000.00000002.3600686711.000000000107C000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.237.206.129/ |
Source: loaddll32.exe, 00000000.00000002.3600686711.00000000010CC000.00000004.00000020.00020000.00000000.sdmp, loaddll32.exe, 00000000.00000002.3600686711.000000000107C000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.237.206.129/fox.php?c=de7ef49b2c006853fb383e293402a01561ac1905c311578eaae3c7edb62cde24353 |
Source: loaddll32.exe, 00000000.00000002.3600686711.00000000010AA000.00000004.00000020.00020000.00000000.sdmp, loaddll32.exe, 00000000.00000002.3600686711.000000000107C000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.237.206.129/fox.php?c=de7ef49b2c006853fb383e293402a01561ac1905c311578eaae3c7edb62dde24353 |
Source: loaddll32.exe, 00000000.00000002.3600686711.000000000107C000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://94.232.249.187/fox.php?c=de7ef49b2c006853fb383e293402a01561ac1905c311578eaae3c7edb62dde24353e |
Source: Amcache.hve.6.dr | String found in binary or memory: http://upx.sf.net |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_6CEB68FD | 0_2_6CEB68FD |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_6CED0C52 | 0_2_6CED0C52 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_6CED6C29 | 0_2_6CED6C29 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_6CEFBDBD | 0_2_6CEFBDBD |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_6CED7D9F | 0_2_6CED7D9F |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_6CED2E0A | 0_2_6CED2E0A |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_6CEDAE02 | 0_2_6CEDAE02 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_6CEDA890 | 0_2_6CEDA890 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_6CEDD9E0 | 0_2_6CEDD9E0 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_6CED796A | 0_2_6CED796A |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_6CED3BCA | 0_2_6CED3BCA |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_6CEDC5D3 | 0_2_6CEDC5D3 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_6CECF538 | 0_2_6CECF538 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_6CED7535 | 0_2_6CED7535 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_6CEC775F | 0_2_6CEC775F |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_6CED711D | 0_2_6CED711D |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_6CEDD3E9 | 0_2_6CEDD3E9 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_6CEDB374 | 0_2_6CEDB374 |
Source: C:\Windows\System32\loaddll32.exe | Code function: String function: 6CEDD8F0 appears 46 times | |
Source: C:\Windows\System32\loaddll32.exe | Code function: String function: 6CED12F0 appears 37 times | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7652 -s 892 |
Source: C:\Windows\SysWOW64\WerFault.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7652 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7592:120:WilError_03 |
Source: C:\Windows\System32\loaddll32.exe | File read: C:\Windows\System32\drivers\etc\hosts | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | File read: C:\Windows\System32\drivers\etc\hosts | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | File read: C:\Windows\System32\drivers\etc\hosts | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | File read: C:\Windows\System32\drivers\etc\hosts | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | File read: C:\Windows\System32\drivers\etc\hosts | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | File read: C:\Windows\System32\drivers\etc\hosts | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\cNF6fXdjPw.dll",#1 |
Source: unknown | Process created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\cNF6fXdjPw.dll" | |
Source: C:\Windows\System32\loaddll32.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\loaddll32.exe | Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\cNF6fXdjPw.dll",#1 | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\cNF6fXdjPw.dll",#1 | |
Source: C:\Windows\SysWOW64\rundll32.exe | Process created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7652 -s 892 | |
Source: C:\Windows\System32\loaddll32.exe | Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\cNF6fXdjPw.dll",#1 | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\cNF6fXdjPw.dll",#1 | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Section loaded: dhcpcsvc.dll | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: cNF6fXdjPw.dll | Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata |
Source: cNF6fXdjPw.dll | Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc |
Source: cNF6fXdjPw.dll | Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc |
Source: cNF6fXdjPw.dll | Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata |
Source: cNF6fXdjPw.dll | Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_6CF0A5B0 push ecx; mov dword ptr [esp], ebx | 0_2_6CF0A5BC |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_6CF0A5B0 push edx; mov dword ptr [esp], esi | 0_2_6CF0A5DC |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_6CF0A5B0 push ecx; mov dword ptr [esp], 25F31F85h | 0_2_6CF5803E |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_6CF0A5B0 push 20DA6B82h; mov dword ptr [esp], esi | 0_2_6CF5809E |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_6CF0A5B0 push 18607D66h; mov dword ptr [esp], ecx | 0_2_6CF580C3 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_6CF02CB4 push eax; mov dword ptr [esp], ebx | 0_2_6CF02CCF |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_6CF59CB8 push edi; mov dword ptr [esp], 0F7F8545h | 0_2_6CF59D14 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_6CF59CB8 push ebx; mov dword ptr [esp], 1AFAE18Fh | 0_2_6CF59D35 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_6CF3FC4C push edx; mov dword ptr [esp], 40000000h | 0_2_6CF3FC6D |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_6CF3FC4C push ebp; mov dword ptr [esp], ecx | 0_2_6CF3FC7B |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_6CF3FC4C push 6E3A80FFh; mov dword ptr [esp], ebx | 0_2_6CF3FC92 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_6CF02C33 push 364FDF85h; mov dword ptr [esp], ebx | 0_2_6CF02C38 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_6CF02C33 push ebp; mov dword ptr [esp], 138372B4h | 0_2_6CF02C54 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_6CF02C33 push 57E07055h; mov dword ptr [esp], ecx | 0_2_6CF02C70 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_6CEFBDBD push 006B061Dh; mov dword ptr [esp], esi | 0_2_6CEFBDC2 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_6CEFBDBD push 7789C0A6h; mov dword ptr [esp], ebx | 0_2_6CEFBDE4 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_6CEFBDBD push 38D8E0CEh; mov dword ptr [esp], ecx | 0_2_6CEFBE15 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_6CEFBDBD push ebx; mov dword ptr [esp], 51D38DFFh | 0_2_6CEFBE31 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_6CEFBDBD push 3979AE49h; mov dword ptr [esp], eax | 0_2_6CEFBE4E |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_6CEFBDBD push esi; mov dword ptr [esp], ecx | 0_2_6CEFBE60 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_6CEFBDBD push esi; mov dword ptr [esp], 1F43E62Ah | 0_2_6CF32A5E |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_6CF04D91 push ecx; mov dword ptr [esp], 702DDE1Bh | 0_2_6CF5C07A |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_6CF04D91 push 0EF84AA9h; mov dword ptr [esp], edx | 0_2_6CF5C0BD |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_6CF04D91 push 592BBC36h; mov dword ptr [esp], ebp | 0_2_6CF5C14F |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_6CF0AEF0 push esi; mov dword ptr [esp], ebp | 0_2_6CF58E51 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_6CF0AEF0 push ecx; mov dword ptr [esp], edi | 0_2_6CF58F33 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_6CF59EBC push ebp; mov dword ptr [esp], esi | 0_2_6CF59F1D |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_6CF04E44 push 61B61919h; mov dword ptr [esp], eax | 0_2_6CF04E8F |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_6CF04E44 push ecx; mov dword ptr [esp], eax | 0_2_6CF04EA7 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_6CF02FE4 push 692763DEh; mov dword ptr [esp], edi | 0_2_6CF03018 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_6CF02FE4 push esi; mov dword ptr [esp], ecx | 0_2_6CF03058 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_6CED0C52 EncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress, | 0_2_6CED0C52 |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\WerFault.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Thread delayed: delay time: 120000 | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Thread delayed: delay time: 60000 | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Thread delayed: delay time: 922337203685477 | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Thread delayed: delay time: 60000 | Jump to behavior |
Source: Amcache.hve.6.dr | Binary or memory string: VMware |
Source: Amcache.hve.6.dr | Binary or memory string: VMware Virtual USB Mouse |
Source: Amcache.hve.6.dr | Binary or memory string: vmci.syshbin |
Source: Amcache.hve.6.dr | Binary or memory string: VMware, Inc. |
Source: loaddll32.exe, 00000000.00000002.3600686711.000000000104D000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAWo |
Source: Amcache.hve.6.dr | Binary or memory string: VMware20,1hbin@ |
Source: Amcache.hve.6.dr | Binary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563 |
Source: Amcache.hve.6.dr | Binary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000 |
Source: Amcache.hve.6.dr | Binary or memory string: .Z$c:/windows/system32/drivers/vmci.sys |
Source: loaddll32.exe, 00000000.00000002.3600686711.00000000010CC000.00000004.00000020.00020000.00000000.sdmp, loaddll32.exe, 00000000.00000002.3600686711.00000000010AA000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW |
Source: Amcache.hve.6.dr | Binary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000 |
Source: Amcache.hve.6.dr | Binary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev |
Source: Amcache.hve.6.dr | Binary or memory string: c:/windows/system32/drivers/vmci.sys |
Source: Amcache.hve.6.dr | Binary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000 |
Source: rundll32.exe, 00000003.00000003.2063266726.00000000033F4000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll |
Source: Amcache.hve.6.dr | Binary or memory string: vmci.sys |
Source: Amcache.hve.6.dr | Binary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0 |
Source: Amcache.hve.6.dr | Binary or memory string: vmci.syshbin` |
Source: Amcache.hve.6.dr | Binary or memory string: \driver\vmci,\driver\pci |
Source: Amcache.hve.6.dr | Binary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000 |
Source: Amcache.hve.6.dr | Binary or memory string: VMware20,1 |
Source: Amcache.hve.6.dr | Binary or memory string: Microsoft Hyper-V Generation Counter |
Source: Amcache.hve.6.dr | Binary or memory string: NECVMWar VMware SATA CD00 |
Source: Amcache.hve.6.dr | Binary or memory string: VMware Virtual disk SCSI Disk Device |
Source: Amcache.hve.6.dr | Binary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom |
Source: Amcache.hve.6.dr | Binary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk |
Source: Amcache.hve.6.dr | Binary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver |
Source: Amcache.hve.6.dr | Binary or memory string: VMware PCI VMCI Bus Device |
Source: Amcache.hve.6.dr | Binary or memory string: VMware VMCI Bus Device |
Source: Amcache.hve.6.dr | Binary or memory string: VMware Virtual RAM |
Source: Amcache.hve.6.dr | Binary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1 |
Source: Amcache.hve.6.dr | Binary or memory string: vmci.inf_amd64_68ed49469341f563 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_6CED8F6E EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer, | 0_2_6CED8F6E |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_6CED8F6E EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer, | 0_2_6CED8F6E |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_6CEB68FD InitializeCriticalSection,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetTickCount,GetVersionExA,_malloc,_malloc,_malloc,_malloc,_malloc,_malloc,_malloc,_malloc,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapAlloc,EnterCriticalSection,LeaveCriticalSection,_malloc,_malloc,_malloc,_malloc,QueryPerformanceCounter,Sleep,_malloc,_malloc,Sleep,Sleep,EnterCriticalSection,LeaveCriticalSection,GetTickCount,wsprintfA,wsprintfA,wsprintfA,wsprintfA,wsprintfA,wsprintfA,wsprintfA,wsprintfA,wsprintfA,wsprintfA,wsprintfA,wsprintfA,wsprintfA,wsprintfA,wsprintfA,wsprintfA,wsprintfA,wsprintfA,wsprintfA,wsprintfA,wsprintfA,wsprintfA,wsprintfA,wsprintfA,wsprintfA,wsprintfA,InternetOpenA,InternetSetOptionA,InternetSetOptionA,InternetSetOptionA,InternetOpenUrlA,InternetReadFile,InternetCloseHandle,InternetCloseHandle,EnterCriticalSection,LeaveCriticalSection,_malloc,EnterCriticalSection,LeaveCriticalSection,_malloc,_strtok,_swscanf,_strtok,_free,Sleep,EnterCriticalSection,LeaveCriticalSection,_sprintf,_malloc,_free, | 0_2_6CEB68FD |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_6CED47B1 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter, | 0_2_6CED47B1 |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_2_6CEB68FD InitializeCriticalSection,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetTickCount,GetVersionExA,_malloc,_malloc,_malloc,_malloc,_malloc,_malloc,_malloc,_malloc,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapAlloc,EnterCriticalSection,LeaveCriticalSection,_malloc,_malloc,_malloc,_malloc,QueryPerformanceCounter,Sleep,_malloc,_malloc,Sleep,Sleep,EnterCriticalSection,LeaveCriticalSection,GetTickCount,wsprintfA,wsprintfA,wsprintfA,wsprintfA,wsprintfA,wsprintfA,wsprintfA,wsprintfA,wsprintfA,wsprintfA,wsprintfA,wsprintfA,wsprintfA,wsprintfA,wsprintfA,wsprintfA,wsprintfA,wsprintfA,wsprintfA,wsprintfA,wsprintfA,wsprintfA,wsprintfA,wsprintfA,wsprintfA,wsprintfA,InternetOpenA,InternetSetOptionA,InternetSetOptionA,InternetSetOptionA,InternetOpenUrlA,InternetReadFile,InternetCloseHandle,InternetCloseHandle,EnterCriticalSection,LeaveCriticalSection,_malloc,EnterCriticalSection,LeaveCriticalSection,_malloc,_strtok,_swscanf,_strtok,_free,Sleep,EnterCriticalSection,LeaveCriticalSection,_sprintf,_malloc,_free, | 0_2_6CEB68FD |
Source: Amcache.hve.6.dr | Binary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe |
Source: Amcache.hve.6.dr | Binary or memory string: msmpeng.exe |
Source: Amcache.hve.6.dr | Binary or memory string: c:\program files\windows defender\msmpeng.exe |
Source: Amcache.hve.6.dr | Binary or memory string: MsMpEng.exe |
Source: Yara match | File source: cNF6fXdjPw.dll, type: SAMPLE |
Source: Yara match | File source: 0.2.loaddll32.exe.6ceb0000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 00000000.00000002.3601153795.000000006CEE0000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: loaddll32.exe PID: 7584, type: MEMORYSTR |
Source: Yara match | File source: cNF6fXdjPw.dll, type: SAMPLE |
Source: Yara match | File source: 0.2.loaddll32.exe.6ceb0000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 00000000.00000002.3601153795.000000006CEE0000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: loaddll32.exe PID: 7584, type: MEMORYSTR |