Click to jump to signature section
Source: B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll | ReversingLabs: Detection: 43% |
Source: B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll | Virustotal: Detection: 71% | Perma Link |
Source: 4.2.rundll32.exe.10000000.0.unpack | Malware Configuration Extractor: Raccoon {"C2 url": ["http://85.192.63.204/", "http://185.229.65.197/"], "Bot ID": "e501fdc78ff3edbb9f720e1766e14ded", "RC4_key1": "e501fdc78ff3edbb9f720e1766e14ded"} |
Source: B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll | Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL |
Source: B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll | Static PE information: DYNAMIC_BASE, NX_COMPAT |
Source: C:\Windows\SysWOW64\rundll32.exe | Network Connect: 185.229.65.197 80 | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Network Connect: 85.192.63.204 80 | Jump to behavior |
Source: Traffic | Snort IDS: 2043003 ET TROJAN Win32/RecordBreaker - Observed UA M5 (23591) 192.168.2.7:49716 -> 185.229.65.197:80 |
Source: Traffic | Snort IDS: 2036934 ET TROJAN Win32/RecordBreaker CnC Checkin M1 192.168.2.7:49716 -> 185.229.65.197:80 |
Source: Traffic | Snort IDS: 2043003 ET TROJAN Win32/RecordBreaker - Observed UA M5 (23591) 192.168.2.7:49717 -> 185.229.65.197:80 |
Source: Traffic | Snort IDS: 2036934 ET TROJAN Win32/RecordBreaker CnC Checkin M1 192.168.2.7:49717 -> 185.229.65.197:80 |
Source: Traffic | Snort IDS: 2043003 ET TROJAN Win32/RecordBreaker - Observed UA M5 (23591) 192.168.2.7:49721 -> 185.229.65.197:80 |
Source: Traffic | Snort IDS: 2036934 ET TROJAN Win32/RecordBreaker CnC Checkin M1 192.168.2.7:49721 -> 185.229.65.197:80 |
Source: Malware configuration extractor | URLs: http://85.192.63.204/ |
Source: Malware configuration extractor | URLs: http://185.229.65.197/ |
Source: Joe Sandbox View | ASN Name: LINK-ASRU LINK-ASRU |
Source: unknown | TCP traffic detected without corresponding DNS query: 85.192.63.204 |
Source: unknown | TCP traffic detected without corresponding DNS query: 85.192.63.204 |
Source: unknown | TCP traffic detected without corresponding DNS query: 85.192.63.204 |
Source: unknown | TCP traffic detected without corresponding DNS query: 85.192.63.204 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.229.65.197 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.229.65.197 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.229.65.197 |
Source: unknown | TCP traffic detected without corresponding DNS query: 85.192.63.204 |
Source: unknown | TCP traffic detected without corresponding DNS query: 85.192.63.204 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.229.65.197 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.229.65.197 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.229.65.197 |
Source: unknown | TCP traffic detected without corresponding DNS query: 85.192.63.204 |
Source: unknown | TCP traffic detected without corresponding DNS query: 85.192.63.204 |
Source: unknown | TCP traffic detected without corresponding DNS query: 85.192.63.204 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.229.65.197 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.229.65.197 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.229.65.197 |
Source: rundll32.exe, 00000004.00000003.330132238.0000000000E0C000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.229.65.197/ |
Source: rundll32.exe, 00000004.00000002.330899425.0000000000E0C000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.330132238.0000000000E0C000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.229.65.197/:Dfw |
Source: rundll32.exe, 00000004.00000002.330899425.0000000000E0C000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.330132238.0000000000E0C000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.229.65.197/KF |
Source: rundll32.exe, 00000004.00000002.330899425.0000000000DDA000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.229.65.197/L |
Source: rundll32.exe, 00000004.00000002.330899425.0000000000E0C000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.330132238.0000000000E0C000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.229.65.197/YF |
Source: rundll32.exe, 00000004.00000002.330899425.0000000000E0C000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.330132238.0000000000E0C000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.229.65.197/ws |
Source: rundll32.exe, 00000004.00000003.323164236.0000000000E2F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.323164236.0000000000E0C000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.330899425.0000000000DDA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.330132238.0000000000E0C000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://85.192.63.204/ |
Source: rundll32.exe, 00000004.00000002.330899425.0000000000E0C000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.323164236.0000000000E0C000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.330132238.0000000000E0C000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://85.192.63.204/= |
Source: rundll32.exe, 00000004.00000002.330899425.0000000000DDA000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://85.192.63.204/w |
Source: B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll | String found in binary or memory: http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t |
Source: B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll | String found in binary or memory: http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0# |
Source: B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll | String found in binary or memory: http://ocsp.sectigo.com0 |
Source: B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll | String found in binary or memory: https://sectigo.com/CPS0 |
Source: unknown | HTTP traffic detected: POST / HTTP/1.1Accept: */*Content-Type: application/x-www-form-urlencoded; charset=utf-8User-Agent: 23591Host: 185.229.65.197Content-Length: 95Connection: Keep-AliveCache-Control: no-cacheData Raw: 6d 61 63 68 69 6e 65 49 64 3d 64 30 36 65 64 36 33 35 2d 36 38 66 36 2d 34 65 39 61 2d 39 35 35 63 2d 34 38 39 39 66 35 66 35 37 62 39 61 7c 61 6c 66 6f 6e 73 26 63 6f 6e 66 69 67 49 64 3d 65 35 30 31 66 64 63 37 38 66 66 33 65 64 62 62 39 66 37 32 30 65 31 37 36 36 65 31 34 64 65 64 Data Ascii: machineId=d06ed635-68f6-4e9a-955c-4899f5f57b9a|user&configId=e501fdc78ff3edbb9f720e1766e14ded |
Source: loaddll32.exe, 00000000.00000002.582549578.000000000125B000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/> | |
Source: B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll | Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL |
Source: B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll | Binary or memory string: OriginalFilenameScanner.dll@ vs B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll |
Source: C:\Windows\System32\loaddll32.exe | Section loaded: vboxhook.dll | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Section loaded: vboxogl.dll | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Code function: String function: 02E50413 appears 70 times | |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: String function: 00C40413 appears 169 times | |
Source: B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll | Static PE information: invalid certificate |
Source: B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll | ReversingLabs: Detection: 43% |
Source: B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll | Virustotal: Detection: 71% |
Source: C:\Windows\System32\loaddll32.exe | Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll,_Start@16 |
Source: unknown | Process created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll" | |
Source: C:\Windows\System32\loaddll32.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\loaddll32.exe | Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll",#1 | |
Source: C:\Windows\System32\loaddll32.exe | Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll,_Start@16 | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll",#1 | |
Source: C:\Windows\System32\loaddll32.exe | Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll",_Start@16 | |
Source: C:\Windows\System32\loaddll32.exe | Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll",#1 | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll,_Start@16 | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll",_Start@16 | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll",#1 | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32 | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Mutant created: \Sessions\1\BaseNamedObjects\VMwareGuestDnDDataMutex |
Source: C:\Windows\SysWOW64\rundll32.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\VMToolsHookQueueLock |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2868:120:WilError_01 |
Source: classification engine | Classification label: mal76.troj.evad.winDLL@10/0@0/3 |
Source: B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll | Static file information: File size 2103000 > 1048576 |
Source: B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll | Static PE information: Raw size of DSEG is bigger than: 0x100000 < 0x119a00 |
Source: B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll | Static PE information: DYNAMIC_BASE, NX_COMPAT |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_3_02E606AC push cs; iretd | 0_3_02E606AD |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_3_02E606AC push cs; iretd | 0_3_02E606AD |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_3_02E606AC push cs; iretd | 0_3_02E606AD |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_3_02E606AC push cs; iretd | 0_3_02E606AD |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_3_02E5046A push es; iretd | 0_3_02E5046B |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_3_02E5046A push es; iretd | 0_3_02E5046B |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_3_02E5046A push es; iretd | 0_3_02E5046B |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_3_02E5046A push es; iretd | 0_3_02E5046B |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_3_02E5046A push es; iretd | 0_3_02E5046B |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_3_02E5046A push es; iretd | 0_3_02E5046B |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_3_02E5046A push es; iretd | 0_3_02E5046B |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_3_02E5046A push es; iretd | 0_3_02E5046B |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_3_02E5046A push es; iretd | 0_3_02E5046B |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_3_02E5046A push es; iretd | 0_3_02E5046B |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_3_02E606AC push cs; iretd | 0_3_02E606AD |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_3_02E606AC push cs; iretd | 0_3_02E606AD |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_3_02E606AC push cs; iretd | 0_3_02E606AD |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_3_02E606AC push cs; iretd | 0_3_02E606AD |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_3_02DF06BC push cs; iretd | 0_3_02DF06BD |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_3_02DF06BC push cs; iretd | 0_3_02DF06BD |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_3_02DF06BC push cs; iretd | 0_3_02DF06BD |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_3_02DF06BC push cs; iretd | 0_3_02DF06BD |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_3_02DF06BC push cs; iretd | 0_3_02DF06BD |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_3_02DF06BC push cs; iretd | 0_3_02DF06BD |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_3_02DF06BC push cs; iretd | 0_3_02DF06BD |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_3_02DF06BC push cs; iretd | 0_3_02DF06BD |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_3_02DF06BC push cs; iretd | 0_3_02DF06BD |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_3_02DF06BC push cs; iretd | 0_3_02DF06BD |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_3_02DF06BC push cs; iretd | 0_3_02DF06BD |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_3_02DF06BC push cs; iretd | 0_3_02DF06BD |
Source: C:\Windows\System32\loaddll32.exe | Code function: 0_3_02DF06BC push cs; iretd | 0_3_02DF06BD |
Source: B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll | Static PE information: section name: DSEG |
Source: B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll | Static PE information: section name: DSEG |
Source: B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll | Static PE information: section name: DSEG |
Source: initial sample | Static PE information: section where entry point is pointing to: DSEG |
Source: initial sample | Static PE information: section name: DSEG entropy: 7.980689708362385 |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Window / User API: threadDelayed 2873 | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Window / User API: threadDelayed 489 | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe TID: 4968 | Thread sleep count: 46 > 30 | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe TID: 4968 | Thread sleep count: 56 > 30 | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe TID: 6044 | Thread sleep count: 81 > 30 | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe TID: 6044 | Thread sleep count: 38 > 30 | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Thread sleep count: Count: 2873 delay: -5 | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | File opened / queried: C:\Users\user\AppData\Local\Microsoft\WindowsApps\VBoxHook.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | File opened / queried: C:\Program Files (x86)\Common Files\Oracle\Java\javapath\VBoxHook.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | File opened / queried: C:\Windows\SysWOW64\Wbem\VBoxHook.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | File opened / queried: C:\Users\user\Desktop\VBoxHook.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | File opened / queried: C:\Windows\system\VBoxHook.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | File opened / queried: C:\Windows\VBoxHook.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | File opened / queried: C:\Windows\SysWOW64\OpenSSH\VBoxHook.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | File opened / queried: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\VBoxHook.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | File opened / queried: C:\Windows\SysWOW64\VBoxHook.dll | Jump to behavior |
Source: C:\Windows\System32\conhost.exe | Last function: Thread delayed |
Source: all processes | Thread injection, dropped files, key value created, disk infection and DNS query: no activity detected |
Source: C:\Windows\System32\loaddll32.exe | Process information queried: ProcessInformation | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | System information queried: ModuleInformation | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Thread delayed: delay time: 120000 | Jump to behavior |
Source: loaddll32.exe, 00000000.00000002.582549578.000000000125B000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: C:\Windows\system32\VBoxHook.dll |
Source: rundll32.exe, 00000004.00000002.330899425.0000000000E0C000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.323164236.0000000000E0C000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.330132238.0000000000E0C000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAWP2 |
Source: rundll32.exe, 00000005.00000002.358181684.00000000010C0000.00000040.00001000.00020000.00000000.sdmp | Binary or memory string: VMwareGuestDnDDataMutex |
Source: rundll32.exe, 00000005.00000002.358181684.00000000010C0000.00000040.00001000.00020000.00000000.sdmp | Binary or memory string: KERNEL32.dllUSER32.dllGDI32.dllole32.dllOLE32.dllPELockKERNEL32.dllUSER32.dllADVAPI32.dllCOMCTL32.dllSHELL32.dllUXTHEME.dllVMwareDnDManagerEventVMwareGuestDnDDataMutexLocal\VMToolsHookQueueLockVBoxHook.dllVBoxOGL.dllCannot load "%s" library (missing file). |
Source: rundll32.exe, 00000005.00000002.358181684.00000000010C0000.00000040.00001000.00020000.00000000.sdmp | Binary or memory string: Local\VMToolsHookQueueLock |
Source: loaddll32.exe, 00000000.00000002.582549578.000000000125B000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: C:\Windows\system32\VBoxHook.dllll |
Source: rundll32.exe, 00000004.00000002.330899425.0000000000DDA000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: VBoxHook.dllT |
Source: loaddll32.exe, 00000000.00000002.582549578.000000000125B000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: C:\Windows\VBoxHook.dll |
Source: rundll32.exe, 00000004.00000002.330899425.0000000000E40000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.330132238.0000000000E40000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.323164236.0000000000E40000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW |
Source: loaddll32.exe, 00000000.00000002.582589061.0000000002C30000.00000040.00001000.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.328138419.0000000004750000.00000040.00001000.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.331283389.0000000004750000.00000040.00001000.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.358181684.00000000010C0000.00000040.00001000.00020000.00000000.sdmp | Binary or memory string: VBoxHook.dll |
Source: rundll32.exe, 00000005.00000002.358181684.00000000010C0000.00000040.00001000.00020000.00000000.sdmp | Binary or memory string: VMwareDnDManagerEvent |
Source: loaddll32.exe, 00000000.00000002.582549578.000000000125B000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: VBoxHook.dll86)-s |
Source: C:\Windows\System32\loaddll32.exe | Process queried: DebugPort | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Process queried: DebugPort | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Process queried: DebugPort | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process queried: DebugPort | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process queried: DebugPort | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process queried: DebugPort | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process queried: DebugPort | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process queried: DebugPort | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process queried: DebugPort | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process queried: DebugPort | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process queried: DebugPort | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process queried: DebugPort | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | File opened: SIWDEBUG |
Source: C:\Windows\SysWOW64\rundll32.exe | File opened: SIWVIDSTART |
Source: C:\Windows\SysWOW64\rundll32.exe | File opened: NTICE |
Source: C:\Windows\SysWOW64\rundll32.exe | File opened: SICE |
Source: C:\Windows\SysWOW64\rundll32.exe | File opened: SIWVID |
Source: all processes | Thread injection, dropped files, key value created, disk infection and DNS query: no activity detected |
Source: C:\Windows\SysWOW64\rundll32.exe | Network Connect: 185.229.65.197 80 | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Network Connect: 85.192.63.204 80 | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dll",#1 | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid | Jump to behavior |
Source: Yara match | File source: dump.pcap, type: PCAP |
Source: Yara match | File source: 00000003.00000003.327728754.0000000000CEF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000005.00000003.357649094.0000000000A8D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000004.00000003.330132238.0000000000E0C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000003.00000003.327774570.0000000000CEF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000005.00000002.357921992.0000000000A8D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000005.00000003.357557134.0000000000A8D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: rundll32.exe PID: 1092, type: MEMORYSTR |
Source: Yara match | File source: dump.pcap, type: PCAP |
Source: Yara match | File source: 00000003.00000003.327728754.0000000000CEF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000005.00000003.357649094.0000000000A8D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000004.00000003.330132238.0000000000E0C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000003.00000003.327774570.0000000000CEF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000005.00000002.357921992.0000000000A8D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000005.00000003.357557134.0000000000A8D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: rundll32.exe PID: 1092, type: MEMORYSTR |