Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Drivespan.dll

Overview

General Information

Sample name:Drivespan.dll
Analysis ID:1584902
MD5:4d9c5296957da900b90aefba32b40072
SHA1:7f326b02a73e0cb58933c7a9f7c32d4bf9ec555e
SHA256:11a01ce93db410211c6d64febcc9c621206761ab865c7bd4dd5074628103ac6a
Tags:bankerdlllatamtrojanuser-johnk3r
Infos:

Detection

Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Allocates memory in foreign processes
Connects to a pastebin service (likely for C&C)
Creates a thread in another existing process (thread injection)
Injects a PE file into a foreign processes
Machine Learning detection for sample
Writes to foreign memory regions
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected non-DNS traffic on DNS port
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Sample execution stops while process was sleeping (likely an evasion)
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication

Classification

  • System is w10x64
  • loaddll32.exe (PID: 6644 cmdline: loaddll32.exe "C:\Users\user\Desktop\Drivespan.dll" MD5: 51E6071F9CBA48E79F10C84515AAE618)
    • conhost.exe (PID: 6672 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 6784 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\Drivespan.dll",#1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • rundll32.exe (PID: 6856 cmdline: rundll32.exe "C:\Users\user\Desktop\Drivespan.dll",#1 MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 6804 cmdline: rundll32.exe C:\Users\user\Desktop\Drivespan.dll,EntryPointProc MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7012 cmdline: rundll32.exe C:\Users\user\Desktop\Drivespan.dll,eQ8FKAFK298HGKAF0PK1K0RFJF9OMG9348 MD5: 889B99C52A60DD49227C5E485A016679)
      • cttune.exe (PID: 7088 cmdline: "C:\Windows\SysWOW64\cttune.exe" MD5: E515AF722F75E1A5708B532FAA483333)
    • rundll32.exe (PID: 2844 cmdline: rundll32.exe C:\Users\user\Desktop\Drivespan.dll,ru3n MD5: 889B99C52A60DD49227C5E485A016679)
      • cttune.exe (PID: 1436 cmdline: "C:\Windows\SysWOW64\cttune.exe" MD5: E515AF722F75E1A5708B532FAA483333)
    • rundll32.exe (PID: 6684 cmdline: rundll32.exe "C:\Users\user\Desktop\Drivespan.dll",EntryPointProc MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 6664 cmdline: rundll32.exe "C:\Users\user\Desktop\Drivespan.dll",eQ8FKAFK298HGKAF0PK1K0RFJF9OMG9348 MD5: 889B99C52A60DD49227C5E485A016679)
      • cttune.exe (PID: 7108 cmdline: "C:\Windows\SysWOW64\cttune.exe" MD5: E515AF722F75E1A5708B532FAA483333)
    • rundll32.exe (PID: 6932 cmdline: rundll32.exe "C:\Users\user\Desktop\Drivespan.dll",ru3n MD5: 889B99C52A60DD49227C5E485A016679)
      • cttune.exe (PID: 7032 cmdline: "C:\Windows\SysWOW64\cttune.exe" MD5: E515AF722F75E1A5708B532FAA483333)
    • rundll32.exe (PID: 6884 cmdline: rundll32.exe "C:\Users\user\Desktop\Drivespan.dll",rusn MD5: 889B99C52A60DD49227C5E485A016679)
      • cttune.exe (PID: 3320 cmdline: "C:\Windows\SysWOW64\cttune.exe" MD5: E515AF722F75E1A5708B532FAA483333)
    • rundll32.exe (PID: 6860 cmdline: rundll32.exe "C:\Users\user\Desktop\Drivespan.dll",run MD5: 889B99C52A60DD49227C5E485A016679)
      • cttune.exe (PID: 6404 cmdline: "C:\Windows\SysWOW64\cttune.exe" MD5: E515AF722F75E1A5708B532FAA483333)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2025-01-06T18:14:00.909217+010020283713Unknown Traffic192.168.2.449731104.20.3.235443TCP

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Drivespan.dllAvira: detected
Source: Drivespan.dllReversingLabs: Detection: 31%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.7% probability
Source: Drivespan.dllJoe Sandbox ML: detected
Source: Drivespan.dllStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL
Source: unknownHTTPS traffic detected: 104.20.3.235:443 -> 192.168.2.4:49731 version: TLS 1.2
Source: Drivespan.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT
Source: Binary string: C:\Users\Administrator\source\repos\Dll2\Release\Drivespan.pdb source: Drivespan.dll

Networking

barindex
Source: unknownDNS query: name: pastebin.com
Source: global trafficTCP traffic: 192.168.2.4:49735 -> 217.77.11.216:4464
Source: global trafficTCP traffic: 192.168.2.4:58629 -> 1.1.1.1:53
Source: Joe Sandbox ViewIP Address: 104.20.3.235 104.20.3.235
Source: Joe Sandbox ViewIP Address: 104.20.3.235 104.20.3.235
Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49731 -> 104.20.3.235:443
Source: global trafficHTTP traffic detected: GET /raw/qLipTDP9 HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: pastebin.com
Source: unknownTCP traffic detected without corresponding DNS query: 217.77.11.216
Source: unknownTCP traffic detected without corresponding DNS query: 217.77.11.216
Source: unknownTCP traffic detected without corresponding DNS query: 217.77.11.216
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /raw/qLipTDP9 HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: pastebin.com
Source: global trafficDNS traffic detected: DNS query: pastebin.com
Source: cttune.exe, cttune.exe, 0000000F.00000002.1774164934.0000000004A3B000.00000040.00000400.00020000.00000000.sdmp, cttune.exe, 0000000F.00000002.1765628643.0000000002F3B000.00000040.00000001.00020000.00000000.sdmp, cttune.exe, 0000000F.00000002.1774993393.000000000542F000.00000004.00001000.00020000.00000000.sdmp, cttune.exe, 0000000F.00000002.1774591539.0000000004EEB000.00000040.00000400.00020000.00000000.sdmp, cttune.exe, 0000000F.00000002.1775429872.000000000566F000.00000004.00001000.00020000.00000000.sdmp, Drivespan.dllString found in binary or memory: http://www.indyproject.org/
Source: cttune.exe, 00000006.00000002.1736417809.0000000004B41000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://g1.gestaoclicki.site/1.txtlWhite
Source: cttune.exe, cttune.exe, 0000000F.00000002.1774164934.0000000004A3B000.00000040.00000400.00020000.00000000.sdmp, cttune.exe, 0000000F.00000002.1765628643.0000000002F3B000.00000040.00000001.00020000.00000000.sdmp, cttune.exe, 0000000F.00000002.1774591539.0000000004EEB000.00000040.00000400.00020000.00000000.sdmp, Drivespan.dllString found in binary or memory: https://pastebin.com/raw/qLipTDP9
Source: cttune.exe, 00000006.00000002.1733275825.000000000054A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pastebin.com/raw/qLipTDP9Q
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
Source: unknownHTTPS traffic detected: 104.20.3.235:443 -> 192.168.2.4:49731 version: TLS 1.2
Source: Drivespan.dllStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL
Source: classification engineClassification label: mal84.troj.evad.winDLL@34/0@1/2
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6672:120:WilError_03
Source: C:\Windows\SysWOW64\cttune.exeMutant created: \Sessions\1\BaseNamedObjects\ClearTypeTunerWizardMutex
Source: C:\Windows\SysWOW64\cttune.exeMutant created: \Sessions\1\BaseNamedObjects\My-Comercio
Source: Drivespan.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Windows\SysWOW64\cttune.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\Drivespan.dll,EntryPointProc
Source: Drivespan.dllReversingLabs: Detection: 31%
Source: cttune.exeString found in binary or memory: jp-ocr-hand-add
Source: cttune.exeString found in binary or memory: jp-ocr-b-add
Source: cttune.exeString found in binary or memory: JIS_C6229-1984-b-add
Source: cttune.exeString found in binary or memory: JIS_C6229-1984-hand-add
Source: cttune.exeString found in binary or memory: ISO_6937-2-add
Source: cttune.exeString found in binary or memory: NATS-SEFI-ADD
Source: cttune.exeString found in binary or memory: NATS-DANO-ADD
Source: cttune.exeString found in binary or memory: jp-ocr-hand-add
Source: cttune.exeString found in binary or memory: jp-ocr-b-add
Source: cttune.exeString found in binary or memory: JIS_C6229-1984-b-add
Source: cttune.exeString found in binary or memory: JIS_C6229-1984-hand-add
Source: cttune.exeString found in binary or memory: ISO_6937-2-add
Source: cttune.exeString found in binary or memory: NATS-SEFI-ADD
Source: cttune.exeString found in binary or memory: NATS-DANO-ADD
Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\Drivespan.dll"
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\Drivespan.dll",#1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\Drivespan.dll,EntryPointProc
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\Drivespan.dll",#1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\Drivespan.dll,eQ8FKAFK298HGKAF0PK1K0RFJF9OMG9348
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\cttune.exe "C:\Windows\SysWOW64\cttune.exe"
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\Drivespan.dll,ru3n
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\cttune.exe "C:\Windows\SysWOW64\cttune.exe"
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\Drivespan.dll",EntryPointProc
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\Drivespan.dll",eQ8FKAFK298HGKAF0PK1K0RFJF9OMG9348
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\Drivespan.dll",ru3n
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\Drivespan.dll",rusn
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\Drivespan.dll",run
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\cttune.exe "C:\Windows\SysWOW64\cttune.exe"
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\cttune.exe "C:\Windows\SysWOW64\cttune.exe"
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\cttune.exe "C:\Windows\SysWOW64\cttune.exe"
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\cttune.exe "C:\Windows\SysWOW64\cttune.exe"
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\Drivespan.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\Drivespan.dll,EntryPointProcJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\Drivespan.dll,eQ8FKAFK298HGKAF0PK1K0RFJF9OMG9348Jump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\Drivespan.dll,ru3nJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\Drivespan.dll",EntryPointProcJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\Drivespan.dll",eQ8FKAFK298HGKAF0PK1K0RFJF9OMG9348Jump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\Drivespan.dll",ru3nJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\Drivespan.dll",rusnJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\Drivespan.dll",runJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\Drivespan.dll",#1Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\cttune.exe "C:\Windows\SysWOW64\cttune.exe"Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\cttune.exe "C:\Windows\SysWOW64\cttune.exe"Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\cttune.exe "C:\Windows\SysWOW64\cttune.exe"Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\cttune.exe "C:\Windows\SysWOW64\cttune.exe"Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\cttune.exe "C:\Windows\SysWOW64\cttune.exe"Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\cttune.exe "C:\Windows\SysWOW64\cttune.exe"Jump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: msvcp140.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: dwrite.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: oleacc.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: wininet.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: wsock32.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: magnification.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: wtsapi32.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: d3d9.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: security.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: idndl.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: devobj.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: winhttpcom.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: webio.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: duser.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: xmllite.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: schannel.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: atlthunk.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: mlang.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: dpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: d3d10warp.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: resourcepolicyclient.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: dxcore.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: dcomp.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: winmm.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: napinsp.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: pnrpnsp.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: wshbth.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: nlaapi.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: winrnr.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: dwrite.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: oleacc.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: dwrite.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: oleacc.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: wininet.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: wsock32.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: magnification.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: wtsapi32.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: d3d9.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: security.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: dwrite.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: oleacc.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: devobj.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: duser.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: xmllite.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: atlthunk.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: dwrite.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: oleacc.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: devobj.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: duser.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: xmllite.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: atlthunk.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: dwrite.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: oleacc.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: devobj.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: duser.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: xmllite.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: atlthunk.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}\InprocServer32Jump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: Drivespan.dllStatic file information: File size 4244992 > 1048576
Source: Drivespan.dllStatic PE information: Raw size of .data is bigger than: 0x100000 < 0x409400
Source: Drivespan.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: Drivespan.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: Drivespan.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: Drivespan.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Drivespan.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: Drivespan.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: Drivespan.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT
Source: Drivespan.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: C:\Users\Administrator\source\repos\Dll2\Release\Drivespan.pdb source: Drivespan.dll
Source: Drivespan.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: Drivespan.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: Drivespan.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: Drivespan.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: Drivespan.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cttune.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cttune.exe TID: 2304Thread sleep time: -30000s >= -30000sJump to behavior
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 120000Jump to behavior
Source: cttune.exe, 00000006.00000002.1733275825.000000000054A000.00000004.00000020.00020000.00000000.sdmp, cttune.exe, 00000006.00000002.1733275825.0000000000598000.00000004.00000020.00020000.00000000.sdmp, cttune.exe, 00000006.00000003.1711852033.0000000000598000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Windows\SysWOW64\rundll32.exeMemory allocated: C:\Windows\SysWOW64\cttune.exe base: 45E0000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory allocated: C:\Windows\SysWOW64\cttune.exe base: 4A00000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory allocated: C:\Windows\SysWOW64\cttune.exe base: AAF0000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory allocated: C:\Windows\SysWOW64\cttune.exe base: 52E0000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory allocated: C:\Windows\SysWOW64\cttune.exe base: 5890000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory allocated: C:\Windows\SysWOW64\cttune.exe base: 2F10000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory allocated: C:\Windows\SysWOW64\cttune.exe base: 4ED0000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory allocated: C:\Windows\SysWOW64\cttune.exe base: 5300000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory allocated: C:\Windows\SysWOW64\cttune.exe base: 4A20000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory allocated: C:\Windows\SysWOW64\cttune.exe base: 44C0000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory allocated: C:\Windows\SysWOW64\cttune.exe base: 2F20000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory allocated: C:\Windows\SysWOW64\cttune.exe base: 3340000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeThread created: C:\Windows\SysWOW64\cttune.exe EIP: 4A00018Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeThread created: unknown EIP: 52E0018Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeThread created: C:\Windows\SysWOW64\cttune.exe EIP: 5300018Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeThread created: C:\Windows\SysWOW64\cttune.exe EIP: 44C0018Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\cttune.exe base: 45E0000 value starts with: 4D5AJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\cttune.exe base: AAF0000 value starts with: 4D5AJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\cttune.exe base: 5890000 value starts with: 4D5AJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\cttune.exe base: 4ED0000 value starts with: 4D5AJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\cttune.exe base: 4A20000 value starts with: 4D5AJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\cttune.exe base: 2F20000 value starts with: 4D5AJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\cttune.exe base: 45E0000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\cttune.exe base: 45E1000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\cttune.exe base: 4969000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\cttune.exe base: 496C000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\cttune.exe base: 497A000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\cttune.exe base: 4981000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\cttune.exe base: 4985000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\cttune.exe base: 4986000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\cttune.exe base: 4987000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\cttune.exe base: 4988000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\cttune.exe base: 49DD000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\cttune.exe base: 4A00000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\cttune.exe base: 4A00018Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\cttune.exe base: AAF0000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\cttune.exe base: AAF1000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\cttune.exe base: AE79000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\cttune.exe base: AE7C000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\cttune.exe base: AE8A000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\cttune.exe base: AE91000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\cttune.exe base: AE95000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\cttune.exe base: AE96000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\cttune.exe base: AE97000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\cttune.exe base: AE98000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\cttune.exe base: AEED000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\cttune.exe base: 52E0000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\cttune.exe base: 52E0018Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\cttune.exe base: 5890000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\cttune.exe base: 5891000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\cttune.exe base: 5C19000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\cttune.exe base: 5C1C000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\cttune.exe base: 5C2A000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\cttune.exe base: 5C31000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\cttune.exe base: 5C35000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\cttune.exe base: 5C36000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\cttune.exe base: 5C37000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\cttune.exe base: 5C38000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\cttune.exe base: 5C8D000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\cttune.exe base: 2F10000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\cttune.exe base: 2F10018Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\cttune.exe base: 4ED0000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\cttune.exe base: 4ED1000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\cttune.exe base: 5259000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\cttune.exe base: 525C000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\cttune.exe base: 526A000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\cttune.exe base: 5271000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\cttune.exe base: 5275000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\cttune.exe base: 5276000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\cttune.exe base: 5277000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\cttune.exe base: 5278000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\cttune.exe base: 52CD000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\cttune.exe base: 5300000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\cttune.exe base: 5300018Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\cttune.exe base: 4A20000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\cttune.exe base: 4A21000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\cttune.exe base: 4DA9000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\cttune.exe base: 4DAC000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\cttune.exe base: 4DBA000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\cttune.exe base: 4DC1000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\cttune.exe base: 4DC5000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\cttune.exe base: 4DC6000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\cttune.exe base: 4DC7000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\cttune.exe base: 4DC8000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\cttune.exe base: 4E1D000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\cttune.exe base: 44C0000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\cttune.exe base: 44C0018Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\cttune.exe base: 2F20000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\cttune.exe base: 2F21000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\cttune.exe base: 32A9000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\cttune.exe base: 32AC000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\cttune.exe base: 32BA000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\cttune.exe base: 32C1000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\cttune.exe base: 32C5000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\cttune.exe base: 32C6000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\cttune.exe base: 32C7000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\cttune.exe base: 32C8000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\cttune.exe base: 331D000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\cttune.exe base: 3340000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\cttune.exe base: 3340018Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\Drivespan.dll",#1Jump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
411
Process Injection
11
Virtualization/Sandbox Evasion
OS Credential Dumping1
Security Software Discovery
Remote ServicesData from Local System1
Web Service
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
411
Process Injection
LSASS Memory11
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable Media1
Encrypted Channel
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Rundll32
Security Account Manager1
System Information Discovery
SMB/Windows Admin SharesData from Network Shared Drive1
Non-Standard Port
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture1
Ingress Tool Transfer
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA SecretsInternet Connection DiscoverySSHKeylogging2
Non-Application Layer Protocol
Scheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain CredentialsWi-Fi DiscoveryVNCGUI Input Capture13
Application Layer Protocol
Data Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1584902 Sample: Drivespan.dll Startdate: 06/01/2025 Architecture: WINDOWS Score: 84 34 pastebin.com 2->34 40 Antivirus / Scanner detection for submitted sample 2->40 42 Multi AV Scanner detection for submitted file 2->42 44 Machine Learning detection for sample 2->44 46 AI detected suspicious sample 2->46 8 loaddll32.exe 1 2->8         started        signatures3 48 Connects to a pastebin service (likely for C&C) 34->48 process4 process5 10 rundll32.exe 8->10         started        13 rundll32.exe 8->13         started        15 rundll32.exe 8->15         started        17 7 other processes 8->17 signatures6 50 Writes to foreign memory regions 10->50 52 Allocates memory in foreign processes 10->52 54 Creates a thread in another existing process (thread injection) 10->54 19 cttune.exe 10->19         started        56 Injects a PE file into a foreign processes 13->56 22 cttune.exe 13->22         started        24 cttune.exe 15->24         started        26 cttune.exe 17->26         started        28 cttune.exe 17->28         started        30 cttune.exe 17->30         started        32 rundll32.exe 17->32         started        process7 dnsIp8 36 217.77.11.216, 4464, 49735 SEVEN-ASGB United Kingdom 19->36 38 pastebin.com 104.20.3.235, 443, 49731 CLOUDFLARENETUS United States 19->38

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
Drivespan.dll32%ReversingLabsWin32.Dropper.Generic
Drivespan.dll100%AviraTR/Dropper.Gen
Drivespan.dll100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://g1.gestaoclicki.site/1.txtlWhite0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
pastebin.com
104.20.3.235
truefalse
    high
    NameMaliciousAntivirus DetectionReputation
    https://pastebin.com/raw/qLipTDP9false
      high
      NameSourceMaliciousAntivirus DetectionReputation
      http://www.indyproject.org/cttune.exe, cttune.exe, 0000000F.00000002.1774164934.0000000004A3B000.00000040.00000400.00020000.00000000.sdmp, cttune.exe, 0000000F.00000002.1765628643.0000000002F3B000.00000040.00000001.00020000.00000000.sdmp, cttune.exe, 0000000F.00000002.1774993393.000000000542F000.00000004.00001000.00020000.00000000.sdmp, cttune.exe, 0000000F.00000002.1774591539.0000000004EEB000.00000040.00000400.00020000.00000000.sdmp, cttune.exe, 0000000F.00000002.1775429872.000000000566F000.00000004.00001000.00020000.00000000.sdmp, Drivespan.dllfalse
        high
        https://g1.gestaoclicki.site/1.txtlWhitecttune.exe, 00000006.00000002.1736417809.0000000004B41000.00000004.00001000.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        https://pastebin.com/raw/qLipTDP9Qcttune.exe, 00000006.00000002.1733275825.000000000054A000.00000004.00000020.00020000.00000000.sdmpfalse
          high
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          104.20.3.235
          pastebin.comUnited States
          13335CLOUDFLARENETUSfalse
          217.77.11.216
          unknownUnited Kingdom
          16362SEVEN-ASGBfalse
          Joe Sandbox version:41.0.0 Charoite
          Analysis ID:1584902
          Start date and time:2025-01-06 18:13:05 +01:00
          Joe Sandbox product:CloudBasic
          Overall analysis duration:0h 6m 35s
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
          Number of analysed new started processes analysed:23
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Sample name:Drivespan.dll
          Detection:MAL
          Classification:mal84.troj.evad.winDLL@34/0@1/2
          EGA Information:
          • Successful, ratio: 100%
          HCA Information:Failed
          Cookbook Comments:
          • Found application associated with file extension: .dll
          • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
          • Excluded IPs from analysis (whitelisted): 23.56.254.164, 4.175.87.197, 13.107.246.45
          • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, dns.msftncsi.com, fe3cr.delivery.mp.microsoft.com
          • Not all processes where analyzed, report is missing behavior information
          • Report size exceeded maximum capacity and may have missing behavior information.
          • Report size getting too big, too many NtOpenKeyEx calls found.
          • Report size getting too big, too many NtProtectVirtualMemory calls found.
          • Report size getting too big, too many NtQueryValueKey calls found.
          • VT rate limit hit for: Drivespan.dll
          TimeTypeDescription
          12:13:59API Interceptor3x Sleep call for process: cttune.exe modified
          12:14:05API Interceptor1x Sleep call for process: loaddll32.exe modified
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          104.20.3.235cr_asm3.ps1Get hashmaliciousUnknownBrowse
          • pastebin.com/raw/sA04Mwk2
          gabe.ps1Get hashmaliciousUnknownBrowse
          • pastebin.com/raw/sA04Mwk2
          cr_asm.ps1Get hashmaliciousUnknownBrowse
          • pastebin.com/raw/sA04Mwk2
          cr_asm_atCAD.ps1Get hashmaliciousUnknownBrowse
          • pastebin.com/raw/sA04Mwk2
          vF20HtY4a4.exeGet hashmaliciousUnknownBrowse
          • pastebin.com/raw/sA04Mwk2
          OSLdZanXNc.exeGet hashmaliciousUnknownBrowse
          • pastebin.com/raw/sA04Mwk2
          5UIy3bo46y.dllGet hashmaliciousUnknownBrowse
          • pastebin.com/raw/sA04Mwk2
          Lm9IJ4r9oO.exeGet hashmaliciousUnknownBrowse
          • pastebin.com/raw/sA04Mwk2
          BeginSync lnk.lnkGet hashmaliciousUnknownBrowse
          • pastebin.com/raw/sA04Mwk2
          sostener.vbsGet hashmaliciousNjratBrowse
          • pastebin.com/raw/V9y5Q5vv
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          pastebin.comXClient.exeGet hashmaliciousXWormBrowse
          • 172.67.19.24
          ogVinh0jhq.exeGet hashmaliciousDCRatBrowse
          • 104.20.4.235
          hiwA7Blv7C.exeGet hashmaliciousXmrigBrowse
          • 172.67.19.24
          CRf9KBk4ra.exeGet hashmaliciousDCRatBrowse
          • 172.67.19.24
          dF66DKQP7u.exeGet hashmaliciousXWormBrowse
          • 104.20.3.235
          2QaN4hOyJs.exeGet hashmaliciousXWormBrowse
          • 104.20.3.235
          bad.txtGet hashmaliciousAsyncRATBrowse
          • 104.20.3.235
          dlhost.exeGet hashmaliciousXWormBrowse
          • 104.20.4.235
          htkeUc1zJ0.exeGet hashmaliciousUnknownBrowse
          • 104.20.4.235
          c2.exeGet hashmaliciousXmrigBrowse
          • 104.20.4.235
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          SEVEN-ASGBhttps://maya-lopez.filemail.com/t/BLFGBJSQGet hashmaliciousHTMLPhisherBrowse
          • 217.77.11.121
          https://identitys.fraudguard.es/SSA_Updated_StatementGet hashmaliciousScreenConnect ToolBrowse
          • 217.77.14.110
          CLOUDFLARENETUShttps://www.figma.com/design/Sw6t5vElBVmnrFNiteka8B/Untitled-(Copy)?node-id=0-1&p=f&t=x9aFU3FgLH1rkKBK-0Get hashmaliciousUnknownBrowse
          • 172.66.0.227
          https://linkedln.contact/ugtxCQqLJUk?in/fuat-kirikci22-46d64297c/Get hashmaliciousUnknownBrowse
          • 104.18.9.247
          http://joeschmidtmusic.netGet hashmaliciousUnknownBrowse
          • 1.1.1.1
          https://linkedln.contact/ugtxCQqLJUk?in/fuat-kirikci22-46d64297c/Get hashmaliciousUnknownBrowse
          • 104.18.9.247
          https://url9577.spatialobjects.com/ls/click?upn=u001.4ivVkFS2-2B4Sp-2Bivia16FvZ0teKfwckAWDUNO-2FsqtRchREXEyTglUEhVzVLlqiPt6oyeeJPuBMPPn-2FAJy8GEEGQs1-2BYVSMuO8RcYEmOVkcjI-3DnYq7_5kJ5LjeESMs3fQdMgHqyuvFFc7nFcZjYyI3vr6BFlw-2BbBsOMKGykWhuto9VBBSTEAWm9RK1szoMJSY3w0qEGh2haan1Og8NtlsLY75H85AELmELLmWbs81ikIO79Vk-2BAlUDIKzd2g1S8a2OhhfsFXuY6OMfebPMC6myP97HBZna1K6-2Bf-2BMbrfkWXlYPN21iZCikY-2Fj1mWRtbJrLJTAOgMXiWNk9cXQxyzwLnkUSS-2BNxcVuCkqDWejp6A-2FGSU05Z-2F9a1Dpa0znzETm-2Be8z9Abw3rZWiLfMFYofxE0t9vgWDzkWRWL6PmrMBcXk8MmBC1ALYIO7SJA6ICZQww3qf73KQ-3D-3DGet hashmaliciousUnknownBrowse
          • 104.18.40.68
          https://tfeweb.co.uk/signoffGet hashmaliciousUnknownBrowse
          • 104.17.24.14
          Remittance details.docxGet hashmaliciousUnknownBrowse
          • 104.16.117.116
          https://z97f4f2525fyg27.webflow.io/Get hashmaliciousHTMLPhisherBrowse
          • 188.114.97.3
          Remittance details.docxGet hashmaliciousUnknownBrowse
          • 104.16.117.116
          DownloadedMessage.zipGet hashmaliciousHTMLPhisherBrowse
          • 104.21.52.152
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          a0e9f5d64349fb13191bc781f81f42e1installer_1.05_36.8.exeGet hashmaliciousLummaCBrowse
          • 104.20.3.235
          setup.exeGet hashmaliciousLummaCBrowse
          • 104.20.3.235
          SET_UP.exeGet hashmaliciousLummaCBrowse
          • 104.20.3.235
          anrek.mp4.htaGet hashmaliciousLummaC StealerBrowse
          • 104.20.3.235
          title.mp4.htaGet hashmaliciousLummaC, PureLog Stealer, zgRATBrowse
          • 104.20.3.235
          Setup.exeGet hashmaliciousLummaCBrowse
          • 104.20.3.235
          PI ITS15235.docGet hashmaliciousDBatLoader, PureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
          • 104.20.3.235
          un30brGAKP.exeGet hashmaliciousLummaCBrowse
          • 104.20.3.235
          Patcher_I5cxa9AN.exeGet hashmaliciousLummaCBrowse
          • 104.20.3.235
          No context
          No created / dropped files found
          File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
          Entropy (8bit):6.577491583408384
          TrID:
          • Win32 Dynamic Link Library (generic) (1002004/3) 95.65%
          • Win32 EXE PECompact compressed (generic) (41571/9) 3.97%
          • Generic Win/DOS Executable (2004/3) 0.19%
          • DOS Executable Generic (2002/1) 0.19%
          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
          File name:Drivespan.dll
          File size:4'244'992 bytes
          MD5:4d9c5296957da900b90aefba32b40072
          SHA1:7f326b02a73e0cb58933c7a9f7c32d4bf9ec555e
          SHA256:11a01ce93db410211c6d64febcc9c621206761ab865c7bd4dd5074628103ac6a
          SHA512:7e20cf58dade7ca60d863521a40ce9e0fa691055a67baf9031c48f99b0d169f1bae8224e98ceaa0b5e150fbfdb792acecb180d6d4eddb679ee32e31e58c57341
          SSDEEP:49152:sHRvwDCUV2SaiCrTHh4y6tvuJZEGWwzMvPMzmNjUDmpv4v6dTad0YoJCbN:sxoBCPowz7YUDmpvPc
          TLSH:4D165C23B284713ED06B4E3A593BA65C993FBB7139128C5B67F4098C4E355806E3F61B
          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........9sYyW YyW YyW P.. ]yW H.T!XyW H.S!SyW H.R!UyW H.V!]yW ..V!ZyW YyV .yW ..^![yW ..W!XyW ... XyW ..U!XyW RichYyW ...............
          Icon Hash:7ae282899bbab082
          Entrypoint:0x10001ad6
          Entrypoint Section:.text
          Digitally signed:false
          Imagebase:0x10000000
          Subsystem:windows gui
          Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL
          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT
          Time Stamp:0x677044D8 [Sat Dec 28 18:35:04 2024 UTC]
          TLS Callbacks:
          CLR (.Net) Version:
          OS Version Major:6
          OS Version Minor:0
          File Version Major:6
          File Version Minor:0
          Subsystem Version Major:6
          Subsystem Version Minor:0
          Import Hash:c8e66c16159ae2be96ac243273edf23c
          Instruction
          push ebp
          mov ebp, esp
          cmp dword ptr [ebp+0Ch], 01h
          jne 00007F9388B41947h
          call 00007F9388B41ACAh
          push dword ptr [ebp+10h]
          push dword ptr [ebp+0Ch]
          push dword ptr [ebp+08h]
          call 00007F9388B417F3h
          add esp, 0Ch
          pop ebp
          retn 000Ch
          push ebp
          mov ebp, esp
          push 00000000h
          call dword ptr [10003058h]
          push dword ptr [ebp+08h]
          call dword ptr [1000305Ch]
          push C0000409h
          call dword ptr [10003054h]
          push eax
          call dword ptr [10003050h]
          pop ebp
          ret
          push ebp
          mov ebp, esp
          sub esp, 00000324h
          push 00000017h
          call dword ptr [1000304Ch]
          test eax, eax
          je 00007F9388B41947h
          push 00000002h
          pop ecx
          int 29h
          mov dword ptr [1040D368h], eax
          mov dword ptr [1040D364h], ecx
          mov dword ptr [1040D360h], edx
          mov dword ptr [1040D35Ch], ebx
          mov dword ptr [1040D358h], esi
          mov dword ptr [1040D354h], edi
          mov word ptr [1040D380h], ss
          mov word ptr [1040D374h], cs
          mov word ptr [1040D350h], ds
          mov word ptr [1040D34Ch], es
          mov word ptr [1040D348h], fs
          mov word ptr [1040D344h], gs
          pushfd
          pop dword ptr [1040D378h]
          mov eax, dword ptr [ebp+00h]
          mov dword ptr [1040D36Ch], eax
          mov eax, dword ptr [ebp+04h]
          mov dword ptr [0040D370h], eax
          Programming Language:
          • [IMP] VS2008 SP1 build 30729
          NameVirtual AddressVirtual Size Is in Section
          IMAGE_DIRECTORY_ENTRY_EXPORT0x37500xa8.rdata
          IMAGE_DIRECTORY_ENTRY_IMPORT0x37f80x64.rdata
          IMAGE_DIRECTORY_ENTRY_RESOURCE0x40e0000xf8.rsrc
          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
          IMAGE_DIRECTORY_ENTRY_BASERELOC0x40f0000x210.reloc
          IMAGE_DIRECTORY_ENTRY_DEBUG0x32400x70.rdata
          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x31800x40.rdata
          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IAT0x30000xd0.rdata
          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
          .text0x10000x164d0x1800ad54765767bfc9d2c0fec44d838d4a20False0.59423828125data6.101734864176362IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          .rdata0x30000xf060x1000683f9cbfe2404e25fa468e9b775222edFalse0.42529296875data4.76105142635359IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          .data0x40000x4095d80x40940095721aade57b1b2f59b3ead944321592unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
          .rsrc0x40e0000xf80x200292de3d8825b6eb238864ebf5bed675bFalse0.3359375data2.5312981004807127IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          .reloc0x40f0000x2100x40054ff3137e76e751da7b2d2437ed0075eFalse0.5029296875data4.092184468329379IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
          NameRVASizeTypeLanguageCountryZLIB Complexity
          RT_MANIFEST0x40e0600x91XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.8689655172413793
          DLLImport
          KERNEL32.dllWriteProcessMemory, OpenProcess, CreateToolhelp32Snapshot, Sleep, Process32NextW, LoadLibraryA, Process32FirstW, CloseHandle, GetProcAddress, VirtualAllocEx, CreateProcessW, CreateRemoteThread, lstrcmpW, IsDebuggerPresent, InitializeSListHead, GetSystemTimeAsFileTime, GetCurrentThreadId, GetCurrentProcessId, QueryPerformanceCounter, IsProcessorFeaturePresent, TerminateProcess, GetCurrentProcess, SetUnhandledExceptionFilter, UnhandledExceptionFilter
          MSVCP140.dll?good@ios_base@std@@QBE_NXZ, ?put@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV12@D@Z, ?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QBEDD@Z, ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEHD@Z, ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QAEXH_N@Z, ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAE_JPBD_J@Z, ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEXXZ, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@P6AAAV01@AAV01@@Z@Z, ?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A, ?uncaught_exception@std@@YA_NXZ, ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV12@XZ
          VCRUNTIME140.dll__std_type_info_destroy_list, __std_terminate, __CxxFrameHandler3, memset, _except_handler4_common
          api-ms-win-crt-runtime-l1-1-0.dll_execute_onexit_table, _initialize_narrow_environment, _configure_narrow_argv, _seh_filter_dll, _cexit, _initterm_e, _initterm, _initialize_onexit_table
          NameOrdinalAddress
          EntryPointProc10x100013e0
          eQ8FKAFK298HGKAF0PK1K0RFJF9OMG934820x10001140
          ru3n30x10001470
          run40x10001470
          rusn50x10001470
          Language of compilation systemCountry where language is spokenMap
          EnglishUnited States
          TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
          2025-01-06T18:14:00.909217+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449731104.20.3.235443TCP
          TimestampSource PortDest PortSource IPDest IP
          Jan 6, 2025 18:14:00.427367926 CET49731443192.168.2.4104.20.3.235
          Jan 6, 2025 18:14:00.427402973 CET44349731104.20.3.235192.168.2.4
          Jan 6, 2025 18:14:00.427508116 CET49731443192.168.2.4104.20.3.235
          Jan 6, 2025 18:14:00.431972980 CET49731443192.168.2.4104.20.3.235
          Jan 6, 2025 18:14:00.431989908 CET44349731104.20.3.235192.168.2.4
          Jan 6, 2025 18:14:00.909142971 CET44349731104.20.3.235192.168.2.4
          Jan 6, 2025 18:14:00.909216881 CET49731443192.168.2.4104.20.3.235
          Jan 6, 2025 18:14:00.912763119 CET49731443192.168.2.4104.20.3.235
          Jan 6, 2025 18:14:00.912770987 CET44349731104.20.3.235192.168.2.4
          Jan 6, 2025 18:14:00.913008928 CET44349731104.20.3.235192.168.2.4
          Jan 6, 2025 18:14:00.963171005 CET49731443192.168.2.4104.20.3.235
          Jan 6, 2025 18:14:00.991436005 CET49731443192.168.2.4104.20.3.235
          Jan 6, 2025 18:14:01.035335064 CET44349731104.20.3.235192.168.2.4
          Jan 6, 2025 18:14:01.302278042 CET44349731104.20.3.235192.168.2.4
          Jan 6, 2025 18:14:01.302376032 CET44349731104.20.3.235192.168.2.4
          Jan 6, 2025 18:14:01.302449942 CET49731443192.168.2.4104.20.3.235
          Jan 6, 2025 18:14:01.305167913 CET49731443192.168.2.4104.20.3.235
          Jan 6, 2025 18:14:01.305187941 CET44349731104.20.3.235192.168.2.4
          Jan 6, 2025 18:14:02.873861074 CET497354464192.168.2.4217.77.11.216
          Jan 6, 2025 18:14:02.878817081 CET446449735217.77.11.216192.168.2.4
          Jan 6, 2025 18:14:02.878882885 CET497354464192.168.2.4217.77.11.216
          Jan 6, 2025 18:14:04.217024088 CET497354464192.168.2.4217.77.11.216
          Jan 6, 2025 18:14:17.768775940 CET5862953192.168.2.41.1.1.1
          Jan 6, 2025 18:14:17.773550987 CET53586291.1.1.1192.168.2.4
          Jan 6, 2025 18:14:17.773611069 CET5862953192.168.2.41.1.1.1
          Jan 6, 2025 18:14:17.778390884 CET53586291.1.1.1192.168.2.4
          Jan 6, 2025 18:14:18.240701914 CET5862953192.168.2.41.1.1.1
          Jan 6, 2025 18:14:18.245618105 CET53586291.1.1.1192.168.2.4
          Jan 6, 2025 18:14:18.245662928 CET5862953192.168.2.41.1.1.1
          TimestampSource PortDest PortSource IPDest IP
          Jan 6, 2025 18:14:00.413525105 CET5427753192.168.2.41.1.1.1
          Jan 6, 2025 18:14:00.421278000 CET53542771.1.1.1192.168.2.4
          Jan 6, 2025 18:14:17.768285990 CET53544781.1.1.1192.168.2.4
          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
          Jan 6, 2025 18:14:00.413525105 CET192.168.2.41.1.1.10xf6c8Standard query (0)pastebin.comA (IP address)IN (0x0001)false
          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
          Jan 6, 2025 18:14:00.421278000 CET1.1.1.1192.168.2.40xf6c8No error (0)pastebin.com104.20.3.235A (IP address)IN (0x0001)false
          Jan 6, 2025 18:14:00.421278000 CET1.1.1.1192.168.2.40xf6c8No error (0)pastebin.com172.67.19.24A (IP address)IN (0x0001)false
          Jan 6, 2025 18:14:00.421278000 CET1.1.1.1192.168.2.40xf6c8No error (0)pastebin.com104.20.4.235A (IP address)IN (0x0001)false
          • pastebin.com
          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          0192.168.2.449731104.20.3.2354437088C:\Windows\SysWOW64\cttune.exe
          TimestampBytes transferredDirectionData
          2025-01-06 17:14:00 UTC158OUTGET /raw/qLipTDP9 HTTP/1.1
          Connection: Keep-Alive
          Accept: */*
          User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
          Host: pastebin.com
          2025-01-06 17:14:01 UTC388INHTTP/1.1 200 OK
          Date: Mon, 06 Jan 2025 17:14:01 GMT
          Content-Type: text/plain; charset=utf-8
          Transfer-Encoding: chunked
          Connection: close
          x-frame-options: DENY
          x-content-type-options: nosniff
          x-xss-protection: 1;mode=block
          cache-control: public, max-age=1801
          CF-Cache-Status: MISS
          Last-Modified: Mon, 06 Jan 2025 17:14:01 GMT
          Server: cloudflare
          CF-RAY: 8fdd578c88c7c358-EWR
          2025-01-06 17:14:01 UTC83INData Raw: 34 64 0d 0a 69 6e 69 63 69 6f 7b 0d 0a 22 68 6f 73 74 22 3a 22 32 32 31 36 30 36 36 38 46 32 36 44 46 44 36 42 46 30 34 35 32 42 36 45 45 38 34 41 22 2c 0d 0a 22 70 6f 72 74 61 22 3a 22 42 30 41 35 39 34 39 31 41 35 39 32 22 0d 0a 7d 66 69 6d 0d 0a
          Data Ascii: 4dinicio{"host":"22160668F26DFD6BF0452B6EE84A","porta":"B0A59491A592"}fim
          2025-01-06 17:14:01 UTC5INData Raw: 30 0d 0a 0d 0a
          Data Ascii: 0


          Click to jump to process

          Click to jump to process

          Click to dive into process behavior distribution

          Click to jump to process

          Target ID:0
          Start time:12:13:56
          Start date:06/01/2025
          Path:C:\Windows\System32\loaddll32.exe
          Wow64 process (32bit):true
          Commandline:loaddll32.exe "C:\Users\user\Desktop\Drivespan.dll"
          Imagebase:0x50000
          File size:126'464 bytes
          MD5 hash:51E6071F9CBA48E79F10C84515AAE618
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high
          Has exited:true

          Target ID:1
          Start time:12:13:56
          Start date:06/01/2025
          Path:C:\Windows\System32\conhost.exe
          Wow64 process (32bit):false
          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Imagebase:0x7ff7699e0000
          File size:862'208 bytes
          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high
          Has exited:true

          Target ID:2
          Start time:12:13:56
          Start date:06/01/2025
          Path:C:\Windows\SysWOW64\cmd.exe
          Wow64 process (32bit):true
          Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\Drivespan.dll",#1
          Imagebase:0x240000
          File size:236'544 bytes
          MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high
          Has exited:true

          Target ID:3
          Start time:12:13:56
          Start date:06/01/2025
          Path:C:\Windows\SysWOW64\rundll32.exe
          Wow64 process (32bit):true
          Commandline:rundll32.exe C:\Users\user\Desktop\Drivespan.dll,EntryPointProc
          Imagebase:0x400000
          File size:61'440 bytes
          MD5 hash:889B99C52A60DD49227C5E485A016679
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high
          Has exited:true

          Target ID:4
          Start time:12:13:56
          Start date:06/01/2025
          Path:C:\Windows\SysWOW64\rundll32.exe
          Wow64 process (32bit):true
          Commandline:rundll32.exe "C:\Users\user\Desktop\Drivespan.dll",#1
          Imagebase:0x400000
          File size:61'440 bytes
          MD5 hash:889B99C52A60DD49227C5E485A016679
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high
          Has exited:true

          Target ID:5
          Start time:12:13:59
          Start date:06/01/2025
          Path:C:\Windows\SysWOW64\rundll32.exe
          Wow64 process (32bit):true
          Commandline:rundll32.exe C:\Users\user\Desktop\Drivespan.dll,eQ8FKAFK298HGKAF0PK1K0RFJF9OMG9348
          Imagebase:0x400000
          File size:61'440 bytes
          MD5 hash:889B99C52A60DD49227C5E485A016679
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high
          Has exited:true

          Target ID:6
          Start time:12:13:59
          Start date:06/01/2025
          Path:C:\Windows\SysWOW64\cttune.exe
          Wow64 process (32bit):true
          Commandline:"C:\Windows\SysWOW64\cttune.exe"
          Imagebase:0xb60000
          File size:72'192 bytes
          MD5 hash:E515AF722F75E1A5708B532FAA483333
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:Borland Delphi
          Reputation:moderate
          Has exited:true

          Target ID:8
          Start time:12:14:02
          Start date:06/01/2025
          Path:C:\Windows\SysWOW64\rundll32.exe
          Wow64 process (32bit):true
          Commandline:rundll32.exe C:\Users\user\Desktop\Drivespan.dll,ru3n
          Imagebase:0x400000
          File size:61'440 bytes
          MD5 hash:889B99C52A60DD49227C5E485A016679
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high
          Has exited:true

          Target ID:9
          Start time:12:14:02
          Start date:06/01/2025
          Path:C:\Windows\SysWOW64\cttune.exe
          Wow64 process (32bit):true
          Commandline:"C:\Windows\SysWOW64\cttune.exe"
          Imagebase:0x7ff7699e0000
          File size:72'192 bytes
          MD5 hash:E515AF722F75E1A5708B532FAA483333
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:moderate
          Has exited:true

          Target ID:10
          Start time:12:14:05
          Start date:06/01/2025
          Path:C:\Windows\SysWOW64\rundll32.exe
          Wow64 process (32bit):true
          Commandline:rundll32.exe "C:\Users\user\Desktop\Drivespan.dll",EntryPointProc
          Imagebase:0x400000
          File size:61'440 bytes
          MD5 hash:889B99C52A60DD49227C5E485A016679
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high
          Has exited:true

          Target ID:11
          Start time:12:14:05
          Start date:06/01/2025
          Path:C:\Windows\SysWOW64\rundll32.exe
          Wow64 process (32bit):true
          Commandline:rundll32.exe "C:\Users\user\Desktop\Drivespan.dll",eQ8FKAFK298HGKAF0PK1K0RFJF9OMG9348
          Imagebase:0x400000
          File size:61'440 bytes
          MD5 hash:889B99C52A60DD49227C5E485A016679
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Has exited:true

          Target ID:12
          Start time:12:14:05
          Start date:06/01/2025
          Path:C:\Windows\SysWOW64\rundll32.exe
          Wow64 process (32bit):true
          Commandline:rundll32.exe "C:\Users\user\Desktop\Drivespan.dll",ru3n
          Imagebase:0x400000
          File size:61'440 bytes
          MD5 hash:889B99C52A60DD49227C5E485A016679
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Has exited:true

          Target ID:13
          Start time:12:14:05
          Start date:06/01/2025
          Path:C:\Windows\SysWOW64\rundll32.exe
          Wow64 process (32bit):true
          Commandline:rundll32.exe "C:\Users\user\Desktop\Drivespan.dll",rusn
          Imagebase:0x400000
          File size:61'440 bytes
          MD5 hash:889B99C52A60DD49227C5E485A016679
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Has exited:true

          Target ID:14
          Start time:12:14:05
          Start date:06/01/2025
          Path:C:\Windows\SysWOW64\rundll32.exe
          Wow64 process (32bit):true
          Commandline:rundll32.exe "C:\Users\user\Desktop\Drivespan.dll",run
          Imagebase:0x400000
          File size:61'440 bytes
          MD5 hash:889B99C52A60DD49227C5E485A016679
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Has exited:true

          Target ID:15
          Start time:12:14:05
          Start date:06/01/2025
          Path:C:\Windows\SysWOW64\cttune.exe
          Wow64 process (32bit):true
          Commandline:"C:\Windows\SysWOW64\cttune.exe"
          Imagebase:0xb60000
          File size:72'192 bytes
          MD5 hash:E515AF722F75E1A5708B532FAA483333
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:Borland Delphi
          Has exited:true

          Target ID:16
          Start time:12:14:05
          Start date:06/01/2025
          Path:C:\Windows\SysWOW64\cttune.exe
          Wow64 process (32bit):true
          Commandline:"C:\Windows\SysWOW64\cttune.exe"
          Imagebase:0xb60000
          File size:72'192 bytes
          MD5 hash:E515AF722F75E1A5708B532FAA483333
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Has exited:false

          Target ID:17
          Start time:12:14:05
          Start date:06/01/2025
          Path:C:\Windows\SysWOW64\cttune.exe
          Wow64 process (32bit):true
          Commandline:"C:\Windows\SysWOW64\cttune.exe"
          Imagebase:0xb60000
          File size:72'192 bytes
          MD5 hash:E515AF722F75E1A5708B532FAA483333
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Has exited:false

          Target ID:18
          Start time:12:14:05
          Start date:06/01/2025
          Path:C:\Windows\SysWOW64\cttune.exe
          Wow64 process (32bit):true
          Commandline:"C:\Windows\SysWOW64\cttune.exe"
          Imagebase:0xb60000
          File size:72'192 bytes
          MD5 hash:E515AF722F75E1A5708B532FAA483333
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Has exited:false

          Reset < >

            Execution Graph

            Execution Coverage:37.6%
            Dynamic/Decrypted Code Coverage:0%
            Signature Coverage:0%
            Total number of Nodes:28
            Total number of Limit Nodes:1
            execution_graph 126 45e9ccc 127 45e9cd4 126->127 130 45e6f04 127->130 129 45e9cf2 131 45e6f08 130->131 132 45e6f12 130->132 131->132 135 45e6ff8 131->135 132->129 134 45e7057 134->129 136 45e700a 135->136 138 45e701d 136->138 139 45f0904 136->139 138->134 140 45f0939 TlsGetValue 139->140 141 45f0913 139->141 142 45f091e 140->142 143 45f0943 140->143 141->138 147 45f0838 142->147 143->138 145 45f0923 TlsGetValue 146 45f0932 145->146 146->138 148 45f083e 147->148 152 45f0862 148->152 153 45f0824 LocalAlloc 148->153 150 45f085e 151 45f086e TlsSetValue 150->151 150->152 151->152 152->145 153->150 154 4a00018 156 4a00032 154->156 155 4a0010a 156->155 157 4a000ec LoadLibraryA 156->157 158 4a000c3 GetProcAddress 156->158 157->155 157->156 158->155 158->156

            Callgraph

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 0 4a00018-4a00030 1 4a00032 0->1 2 4a0007c-4a00086 0->2 3 4a00038-4a00044 1->3 4 4a00115-4a0011d 2->4 5 4a0008c-4a000a8 2->5 6 4a00046-4a00050 3->6 7 4a00077-4a0007a 3->7 8 4a00133-4a0013e 4->8 9 4a0011f-4a00126 4->9 13 4a0010a-4a00112 5->13 14 4a000aa-4a000ae 5->14 11 4a00052 6->11 12 4a00075 6->12 7->2 7->3 16 4a0012a-4a00130 9->16 15 4a00058-4a00060 11->15 12->7 17 4a000b0-4a000b3 14->17 18 4a000dd-4a000ea 14->18 19 4a00062-4a0006b 15->19 20 4a0006d-4a00070 15->20 21 4a000b5 17->21 18->4 22 4a000ec-4a00108 LoadLibraryA 18->22 19->20 20->15 23 4a00072 20->23 24 4a000b7-4a000ba 21->24 25 4a000bc-4a000c1 21->25 22->13 22->14 23->12 26 4a000c3-4a000cc GetProcAddress 24->26 25->26 26->13 27 4a000ce-4a000db 26->27 27->18 27->21
            APIs
            • GetProcAddress.KERNEL32(00000000,-00000002), ref: 04A000C8
            • LoadLibraryA.KERNEL32(?), ref: 04A00102
            Memory Dump Source
            • Source File: 00000006.00000002.1736289447.0000000004A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 04A00000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_4a00000_cttune.jbxd
            Similarity
            • API ID: AddressLibraryLoadProc
            • String ID:
            • API String ID: 2574300362-0
            • Opcode ID: cb9b0787db191ec1bce4ce323a6da168da29d2a908fe8e72052c21ee0be81112
            • Instruction ID: 7e55169096d7f7cfd6a8727ec51b696477c7f9841721d85a5de0d269ba50fa81
            • Opcode Fuzzy Hash: cb9b0787db191ec1bce4ce323a6da168da29d2a908fe8e72052c21ee0be81112
            • Instruction Fuzzy Hash: F6416972B052069FEB24CF59E880B65F7E4FF49315B1881A9E918DB381E731F991CB90

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 28 52e0018-52e0030 29 52e007c-52e0086 28->29 30 52e0032 28->30 32 52e008c-52e00a8 29->32 33 52e0115-52e011d 29->33 31 52e0038-52e0044 30->31 34 52e0046-52e0050 31->34 35 52e0077-52e007a 31->35 43 52e010a-52e0112 32->43 44 52e00aa-52e00ae 32->44 36 52e011f-52e0126 33->36 37 52e0133-52e013e 33->37 38 52e0075 34->38 39 52e0052 34->39 35->29 35->31 41 52e012a-52e0130 36->41 38->35 42 52e0058-52e0060 39->42 47 52e006d-52e0070 42->47 48 52e0062-52e006b 42->48 45 52e00dd-52e00ea 44->45 46 52e00b0-52e00b3 44->46 45->33 51 52e00ec-52e0108 45->51 49 52e00b5 46->49 47->42 50 52e0072 47->50 48->47 52 52e00bc-52e00c1 49->52 53 52e00b7-52e00ba 49->53 50->38 51->43 51->44 54 52e00c3-52e00cc 52->54 53->54 54->43 57 52e00ce-52e00db 54->57 57->45 57->49
            Memory Dump Source
            • Source File: 00000006.00000002.1737307412.00000000052E0000.00000040.00000400.00020000.00000000.sdmp, Offset: 052E0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_52e0000_cttune.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: cb9b0787db191ec1bce4ce323a6da168da29d2a908fe8e72052c21ee0be81112
            • Instruction ID: c211126f0ea2a817b61ef911e964ce2c0a12a75a0889f3e11f61ee46b49f5465
            • Opcode Fuzzy Hash: cb9b0787db191ec1bce4ce323a6da168da29d2a908fe8e72052c21ee0be81112
            • Instruction Fuzzy Hash: D74178727142069FDB24CF59C884F69F3E4FF49310B5881A9E809DB341E7B1E892CB90

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 58 45e9ccc-45e9cf3 call 45e7ca0 call 45e6f04 63 45e9cf6-45e9cff 58->63
            Memory Dump Source
            • Source File: 00000006.00000002.1735128740.00000000045E0000.00000040.00000400.00020000.00000000.sdmp, Offset: 045E0000, based on PE: true
            • Associated: 00000006.00000002.1735128740.00000000045FB000.00000040.00000400.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1735128740.000000000497F000.00000040.00000400.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1735128740.0000000004988000.00000040.00000400.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_45e0000_cttune.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 515cd2e9baeb67353980e33e0740b7984e54f6a04955967e2318308f814bbaa8
            • Instruction ID: d815ebba13c22e924b12ffa57aaa159c0b7bdf2b2cb1e7146c43959fbb590d53
            • Opcode Fuzzy Hash: 515cd2e9baeb67353980e33e0740b7984e54f6a04955967e2318308f814bbaa8
            • Instruction Fuzzy Hash: 8FE04FB62087049FA709DF66F862C36B7A9E7C9B20310C46EE80487A10D935B811D468

            Execution Graph

            Execution Coverage:47.1%
            Dynamic/Decrypted Code Coverage:0%
            Signature Coverage:0%
            Total number of Nodes:5
            Total number of Limit Nodes:0
            execution_graph 64 44c0018 66 44c0032 64->66 65 44c010a 66->65 67 44c00ec LoadLibraryA 66->67 68 44c00c3 GetProcAddress 66->68 67->65 67->66 68->65 68->66

            Callgraph

            • Executed
            • Not Executed
            • Opacity -> Relevance
            • Disassembly available
            callgraph 0 Function_04ED96CC 1 Function_0525B854 2 Function_044C0018 3 Function_05300018 4 Function_04DAB854 5 Function_04A296CC

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 0 44c0018-44c0030 1 44c007c-44c0086 0->1 2 44c0032 0->2 4 44c008c-44c00a8 1->4 5 44c0115-44c011d 1->5 3 44c0038-44c0044 2->3 6 44c0046-44c0050 3->6 7 44c0077-44c007a 3->7 13 44c010a-44c0112 4->13 14 44c00aa-44c00ae 4->14 8 44c011f-44c0126 5->8 9 44c0133-44c013e 5->9 11 44c0075 6->11 12 44c0052 6->12 7->1 7->3 16 44c012a-44c0130 8->16 11->7 15 44c0058-44c0060 12->15 17 44c00dd-44c00ea 14->17 18 44c00b0-44c00b3 14->18 19 44c006d-44c0070 15->19 20 44c0062-44c006b 15->20 17->5 22 44c00ec-44c0108 LoadLibraryA 17->22 21 44c00b5 18->21 19->15 23 44c0072 19->23 20->19 24 44c00bc-44c00c1 21->24 25 44c00b7-44c00ba 21->25 22->13 22->14 23->11 26 44c00c3-44c00cc GetProcAddress 24->26 25->26 26->13 27 44c00ce-44c00db 26->27 27->17 27->21
            APIs
            • GetProcAddress.KERNELBASE(00000000,-00000002), ref: 044C00C8
            • LoadLibraryA.KERNELBASE(?), ref: 044C0102
            Memory Dump Source
            • Source File: 0000000F.00000002.1773977454.00000000044C0000.00000040.00000400.00020000.00000000.sdmp, Offset: 044C0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_15_2_44c0000_cttune.jbxd
            Similarity
            • API ID: AddressLibraryLoadProc
            • String ID:
            • API String ID: 2574300362-0
            • Opcode ID: cb9b0787db191ec1bce4ce323a6da168da29d2a908fe8e72052c21ee0be81112
            • Instruction ID: 0790baa22a96e7f15b5677af9f27dc53c78b6db010f3719c83cbf1f609a71f26
            • Opcode Fuzzy Hash: cb9b0787db191ec1bce4ce323a6da168da29d2a908fe8e72052c21ee0be81112
            • Instruction Fuzzy Hash: E6414776600206DFDB54CF99D880A66F3E4FF45315B19816EE808DB341E731F991CB90

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 28 5300018-5300030 29 5300032 28->29 30 530007c-5300086 28->30 31 5300038-5300044 29->31 32 5300115-530011d 30->32 33 530008c-53000a8 30->33 34 5300046-5300050 31->34 35 5300077-530007a 31->35 36 5300133-530013e 32->36 37 530011f-5300126 32->37 43 530010a-5300112 33->43 44 53000aa-53000ae 33->44 38 5300052 34->38 39 5300075 34->39 35->30 35->31 41 530012a-5300130 37->41 42 5300058-5300060 38->42 39->35 47 5300062-530006b 42->47 48 530006d-5300070 42->48 45 53000b0-53000b3 44->45 46 53000dd-53000ea 44->46 49 53000b5 45->49 46->32 51 53000ec-5300108 46->51 47->48 48->42 50 5300072 48->50 52 53000b7-53000ba 49->52 53 53000bc-53000c1 49->53 50->39 51->43 51->44 54 53000c3-53000cc 52->54 53->54 54->43 57 53000ce-53000db 54->57 57->46 57->49
            Memory Dump Source
            • Source File: 0000000F.00000002.1774936377.0000000005300000.00000040.00000400.00020000.00000000.sdmp, Offset: 05300000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_15_2_5300000_cttune.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: cb9b0787db191ec1bce4ce323a6da168da29d2a908fe8e72052c21ee0be81112
            • Instruction ID: ded2bf98ef5a68650274414e863e1dd52480bc077db706af50410b8a92dd24ca
            • Opcode Fuzzy Hash: cb9b0787db191ec1bce4ce323a6da168da29d2a908fe8e72052c21ee0be81112
            • Instruction Fuzzy Hash: 0C416872B043069FDB18CF59C894B66F3E4FF45314B5881A9E819DB381E771E991CB90