Click to jump to signature section
Source: 00000000.00000002.1668627333.000002093EAE0000.00000020.10000000.00040000.00000000.sdmp | Malware Configuration Extractor: CobaltStrike {"C2Server": "http://20.25.126.96:443/whI5", "User Agent": "User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0; BOIE9;ENUS)\r\n"} |
Source: 00000000.00000002.1668627333.000002093EAE0000.00000020.10000000.00040000.00000000.sdmp | Malware Configuration Extractor: Metasploit {"Headers": "User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0; BOIE9;ENUS)\r\n", "Type": "Metasploit Download", "URL": "http://20.25.126.96/whI5"} |
Source: J4o8OaYTEF.dll | ReversingLabs: Detection: 55% |
Source: Submited Sample | Integrated Neural Analysis Model: Matched 99.2% probability |
Source: J4o8OaYTEF.dll | Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT |
Source: Malware configuration extractor | URLs: http://20.25.126.96:443/whI5 |
Source: Malware configuration extractor | URLs: http://20.25.126.96/whI5 |
Source: 00000004.00000002.1577384616.000002004A240000.00000020.10000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Identifies the API address lookup function leverage by metasploit shellcode Author: unknown |
Source: 00000004.00000002.1577384616.000002004A240000.00000020.10000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families. Author: unknown |
Source: 00000007.00000002.1607164972.000001B58F980000.00000020.10000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Identifies the API address lookup function leverage by metasploit shellcode Author: unknown |
Source: 00000007.00000002.1607164972.000001B58F980000.00000020.10000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families. Author: unknown |
Source: 00000008.00000002.1637233000.000001B9F2520000.00000020.10000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Identifies the API address lookup function leverage by metasploit shellcode Author: unknown |
Source: 00000008.00000002.1637233000.000001B9F2520000.00000020.10000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families. Author: unknown |
Source: 00000000.00000002.1668627333.000002093EAE0000.00000020.10000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Identifies the API address lookup function leverage by metasploit shellcode Author: unknown |
Source: 00000000.00000002.1668627333.000002093EAE0000.00000020.10000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families. Author: unknown |
Source: 00000005.00000002.1577505421.0000024745F80000.00000020.10000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Identifies the API address lookup function leverage by metasploit shellcode Author: unknown |
Source: 00000005.00000002.1577505421.0000024745F80000.00000020.10000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families. Author: unknown |
Source: C:\Windows\System32\loaddll64.exe | Code function: 0_2_000002093EAE010C | 0_2_000002093EAE010C |
Source: C:\Windows\System32\rundll32.exe | Code function: 4_2_000002004A24010C | 4_2_000002004A24010C |
Source: C:\Windows\System32\rundll32.exe | Code function: 5_2_0000024745F8010C | 5_2_0000024745F8010C |
Source: C:\Windows\System32\rundll32.exe | Code function: 7_2_000001B58F98010C | 7_2_000001B58F98010C |
Source: C:\Windows\System32\rundll32.exe | Code function: 8_2_000001B9F252010C | 8_2_000001B9F252010C |
Source: J4o8OaYTEF.dll | Static PE information: Number of sections : 11 > 10 |
Source: 00000004.00000002.1577384616.000002004A240000.00000020.10000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Metasploit_7bc0f998 os = windows, severity = x86, description = Identifies the API address lookup function leverage by metasploit shellcode, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = fdb5c665503f07b2fc1ed7e4e688295e1222a500bfb68418661db60c8e75e835, id = 7bc0f998-7014-4883-8a56-d5ee00c15aed, last_modified = 2021-08-23 |
Source: 00000004.00000002.1577384616.000002004A240000.00000020.10000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Metasploit_c9773203 os = windows, severity = x86, description = Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., creation_date = 2021-04-07, scan_context = file, memory, reference = https://github.com/rapid7/metasploit-framework/blob/04e8752b9b74cbaad7cb0ea6129c90e3172580a2/external/source/shellcode/windows/x64/src/block/block_api.asm, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = afde93eeb14b4d0c182f475a22430f101394938868741ffa06445e478b6ece36, id = c9773203-6d1e-4246-a1e0-314217e0207a, last_modified = 2021-08-23 |
Source: 00000007.00000002.1607164972.000001B58F980000.00000020.10000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Metasploit_7bc0f998 os = windows, severity = x86, description = Identifies the API address lookup function leverage by metasploit shellcode, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = fdb5c665503f07b2fc1ed7e4e688295e1222a500bfb68418661db60c8e75e835, id = 7bc0f998-7014-4883-8a56-d5ee00c15aed, last_modified = 2021-08-23 |
Source: 00000007.00000002.1607164972.000001B58F980000.00000020.10000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Metasploit_c9773203 os = windows, severity = x86, description = Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., creation_date = 2021-04-07, scan_context = file, memory, reference = https://github.com/rapid7/metasploit-framework/blob/04e8752b9b74cbaad7cb0ea6129c90e3172580a2/external/source/shellcode/windows/x64/src/block/block_api.asm, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = afde93eeb14b4d0c182f475a22430f101394938868741ffa06445e478b6ece36, id = c9773203-6d1e-4246-a1e0-314217e0207a, last_modified = 2021-08-23 |
Source: 00000008.00000002.1637233000.000001B9F2520000.00000020.10000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Metasploit_7bc0f998 os = windows, severity = x86, description = Identifies the API address lookup function leverage by metasploit shellcode, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = fdb5c665503f07b2fc1ed7e4e688295e1222a500bfb68418661db60c8e75e835, id = 7bc0f998-7014-4883-8a56-d5ee00c15aed, last_modified = 2021-08-23 |
Source: 00000008.00000002.1637233000.000001B9F2520000.00000020.10000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Metasploit_c9773203 os = windows, severity = x86, description = Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., creation_date = 2021-04-07, scan_context = file, memory, reference = https://github.com/rapid7/metasploit-framework/blob/04e8752b9b74cbaad7cb0ea6129c90e3172580a2/external/source/shellcode/windows/x64/src/block/block_api.asm, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = afde93eeb14b4d0c182f475a22430f101394938868741ffa06445e478b6ece36, id = c9773203-6d1e-4246-a1e0-314217e0207a, last_modified = 2021-08-23 |
Source: 00000000.00000002.1668627333.000002093EAE0000.00000020.10000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Metasploit_7bc0f998 os = windows, severity = x86, description = Identifies the API address lookup function leverage by metasploit shellcode, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = fdb5c665503f07b2fc1ed7e4e688295e1222a500bfb68418661db60c8e75e835, id = 7bc0f998-7014-4883-8a56-d5ee00c15aed, last_modified = 2021-08-23 |
Source: 00000000.00000002.1668627333.000002093EAE0000.00000020.10000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Metasploit_c9773203 os = windows, severity = x86, description = Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., creation_date = 2021-04-07, scan_context = file, memory, reference = https://github.com/rapid7/metasploit-framework/blob/04e8752b9b74cbaad7cb0ea6129c90e3172580a2/external/source/shellcode/windows/x64/src/block/block_api.asm, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = afde93eeb14b4d0c182f475a22430f101394938868741ffa06445e478b6ece36, id = c9773203-6d1e-4246-a1e0-314217e0207a, last_modified = 2021-08-23 |
Source: 00000005.00000002.1577505421.0000024745F80000.00000020.10000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Metasploit_7bc0f998 os = windows, severity = x86, description = Identifies the API address lookup function leverage by metasploit shellcode, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = fdb5c665503f07b2fc1ed7e4e688295e1222a500bfb68418661db60c8e75e835, id = 7bc0f998-7014-4883-8a56-d5ee00c15aed, last_modified = 2021-08-23 |
Source: 00000005.00000002.1577505421.0000024745F80000.00000020.10000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Metasploit_c9773203 os = windows, severity = x86, description = Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., creation_date = 2021-04-07, scan_context = file, memory, reference = https://github.com/rapid7/metasploit-framework/blob/04e8752b9b74cbaad7cb0ea6129c90e3172580a2/external/source/shellcode/windows/x64/src/block/block_api.asm, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = afde93eeb14b4d0c182f475a22430f101394938868741ffa06445e478b6ece36, id = c9773203-6d1e-4246-a1e0-314217e0207a, last_modified = 2021-08-23 |
Source: classification engine | Classification label: mal92.troj.evad.winDLL@14/0@0/0 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6488:120:WilError_03 |
Source: J4o8OaYTEF.dll | Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
Source: C:\Windows\System32\loaddll64.exe | Key opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\J4o8OaYTEF.dll",#1 |
Source: J4o8OaYTEF.dll | ReversingLabs: Detection: 55% |
Source: unknown | Process created: C:\Windows\System32\loaddll64.exe loaddll64.exe "C:\Users\user\Desktop\J4o8OaYTEF.dll" | |
Source: C:\Windows\System32\loaddll64.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\loaddll64.exe | Process created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\J4o8OaYTEF.dll",#1 | |
Source: C:\Windows\System32\loaddll64.exe | Process created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\J4o8OaYTEF.dll | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\J4o8OaYTEF.dll",#1 | |
Source: C:\Windows\System32\loaddll64.exe | Process created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\J4o8OaYTEF.dll,DllGetClassObject | |
Source: C:\Windows\System32\loaddll64.exe | Process created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\J4o8OaYTEF.dll,DllMain | |
Source: C:\Windows\System32\loaddll64.exe | Process created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\J4o8OaYTEF.dll,DllRegisterServer | |
Source: C:\Windows\System32\loaddll64.exe | Process created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\J4o8OaYTEF.dll",#1 | Jump to behavior |
Source: C:\Windows\System32\loaddll64.exe | Process created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\J4o8OaYTEF.dll | Jump to behavior |
Source: C:\Windows\System32\loaddll64.exe | Process created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\J4o8OaYTEF.dll,DllGetClassObject | Jump to behavior |
Source: C:\Windows\System32\loaddll64.exe | Process created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\J4o8OaYTEF.dll,DllMain | Jump to behavior |
Source: C:\Windows\System32\loaddll64.exe | Process created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\J4o8OaYTEF.dll,DllRegisterServer | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\J4o8OaYTEF.dll",#1 | Jump to behavior |
Source: C:\Windows\System32\loaddll64.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Windows\System32\loaddll64.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Windows\System32\loaddll64.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Windows\System32\loaddll64.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\System32\loaddll64.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Windows\System32\loaddll64.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\System32\loaddll64.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\System32\loaddll64.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\regsvr32.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Windows\System32\regsvr32.exe | Section loaded: aclayers.dll | Jump to behavior |
Source: C:\Windows\System32\regsvr32.exe | Section loaded: sfc.dll | Jump to behavior |
Source: C:\Windows\System32\regsvr32.exe | Section loaded: sfc_os.dll | Jump to behavior |
Source: C:\Windows\System32\regsvr32.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\regsvr32.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Windows\System32\loaddll64.exe | Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32 | Jump to behavior |
Source: J4o8OaYTEF.dll | Static PE information: Image base 0x2fbac0000 > 0x60000000 |
Source: J4o8OaYTEF.dll | Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT |
Source: J4o8OaYTEF.dll | Static PE information: section name: .xdata |
Source: C:\Windows\System32\loaddll64.exe | Process created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\J4o8OaYTEF.dll |
Source: C:\Windows\System32\loaddll64.exe | Code function: 0_2_000002093EAE012B push eax; ret | 0_2_000002093EAE0387 |
Source: C:\Windows\System32\loaddll64.exe | Code function: 0_2_000002093EAE010C push eax; ret | 0_2_000002093EAE0387 |
Source: C:\Windows\System32\rundll32.exe | Code function: 4_2_000002004A24010C push eax; ret | 4_2_000002004A240387 |
Source: C:\Windows\System32\rundll32.exe | Code function: 4_2_000002004A24012B push eax; ret | 4_2_000002004A240387 |
Source: C:\Windows\System32\rundll32.exe | Code function: 5_2_0000024745F8012B push eax; ret | 5_2_0000024745F80387 |
Source: C:\Windows\System32\rundll32.exe | Code function: 5_2_0000024745F8010C push eax; ret | 5_2_0000024745F80387 |
Source: C:\Windows\System32\rundll32.exe | Code function: 7_2_000001B58F98012B push eax; ret | 7_2_000001B58F980387 |
Source: C:\Windows\System32\rundll32.exe | Code function: 7_2_000001B58F98010C push eax; ret | 7_2_000001B58F980387 |
Source: C:\Windows\System32\rundll32.exe | Code function: 8_2_000001B9F252012B push eax; ret | 8_2_000001B9F2520387 |
Source: C:\Windows\System32\rundll32.exe | Code function: 8_2_000001B9F252010C push eax; ret | 8_2_000001B9F2520387 |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: all processes | Thread injection, dropped files, key value created, disk infection and DNS query: no activity detected |
Source: C:\Windows\System32\conhost.exe | Last function: Thread delayed |
Source: all processes | Thread injection, dropped files, key value created, disk infection and DNS query: no activity detected |
Source: C:\Windows\System32\loaddll64.exe | NtCreateThreadEx: Indirect: 0x7FFBC3131492 | Jump to behavior |
Source: C:\Windows\System32\loaddll64.exe | NtMapViewOfSection: Indirect: 0x7FFBC31319E4 | Jump to behavior |
Source: C:\Windows\System32\loaddll64.exe | NtProtectVirtualMemory: Indirect: 0x7FFBC3131449 | Jump to behavior |
Source: C:\Windows\System32\loaddll64.exe | NtCreateThreadEx: Indirect: 0x7FFBC3132701 | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\J4o8OaYTEF.dll",#1 | Jump to behavior |
Source: Yara match | File source: 00000004.00000002.1577384616.000002004A240000.00000020.10000000.00040000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000007.00000002.1607164972.000001B58F980000.00000020.10000000.00040000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000008.00000002.1637233000.000001B9F2520000.00000020.10000000.00040000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000002.1668627333.000002093EAE0000.00000020.10000000.00040000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000005.00000002.1577505421.0000024745F80000.00000020.10000000.00040000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000004.00000002.1577384616.000002004A240000.00000020.10000000.00040000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000007.00000002.1607164972.000001B58F980000.00000020.10000000.00040000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000008.00000002.1637233000.000001B9F2520000.00000020.10000000.00040000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000002.1668627333.000002093EAE0000.00000020.10000000.00040000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000005.00000002.1577505421.0000024745F80000.00000020.10000000.00040000.00000000.sdmp, type: MEMORY |