Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
J4o8OaYTEF.dll

Overview

General Information

Sample name:J4o8OaYTEF.dll
(renamed file extension from exe to dll, renamed because original name is a hash value)
Original sample name:66a1616bf55914961e9e6512633310dc823a19d601f5ec1daf3a561031f6425c.exe
Analysis ID:1542741
MD5:7e4e55e9929a9ec7dbd924b916c5c549
SHA1:b78ffcba1a36d4262be8b6d9270bb4d42ff3c0a1
SHA256:66a1616bf55914961e9e6512633310dc823a19d601f5ec1daf3a561031f6425c
Tags:20-25-126-96exeuser-JAMESWT_MHT
Infos:

Detection

CobaltStrike, Metasploit
Score:92
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected CobaltStrike
Yara detected Metasploit Payload
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Found direct / indirect Syscall (likely to bypass EDR)
Checks if the current process is being debugged
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
May sleep (evasive loops) to hinder dynamic analysis
PE file contains more sections than normal
PE file contains sections with non-standard names
Program does not show much activity (idle)
Registers a DLL
Sample execution stops while process was sleeping (likely an evasion)
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • loaddll64.exe (PID: 6632 cmdline: loaddll64.exe "C:\Users\user\Desktop\J4o8OaYTEF.dll" MD5: 763455F9DCB24DFEECC2B9D9F8D46D52)
    • conhost.exe (PID: 6488 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 5192 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\J4o8OaYTEF.dll",#1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • rundll32.exe (PID: 4300 cmdline: rundll32.exe "C:\Users\user\Desktop\J4o8OaYTEF.dll",#1 MD5: EF3179D498793BF4234F708D3BE28633)
    • regsvr32.exe (PID: 3032 cmdline: regsvr32.exe /s C:\Users\user\Desktop\J4o8OaYTEF.dll MD5: B0C2FA35D14A9FAD919E99D9D75E1B9E)
    • rundll32.exe (PID: 5904 cmdline: rundll32.exe C:\Users\user\Desktop\J4o8OaYTEF.dll,DllGetClassObject MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 5648 cmdline: rundll32.exe C:\Users\user\Desktop\J4o8OaYTEF.dll,DllMain MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 2252 cmdline: rundll32.exe C:\Users\user\Desktop\J4o8OaYTEF.dll,DllRegisterServer MD5: EF3179D498793BF4234F708D3BE28633)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Cobalt Strike, CobaltStrikeCobalt Strike is a paid penetration testing product that allows an attacker to deploy an agent named 'Beacon' on the victim machine. Beacon includes a wealth of functionality to the attacker, including, but not limited to command execution, key logging, file transfer, SOCKS proxying, privilege escalation, mimikatz, port scanning and lateral movement. Beacon is in-memory/file-less, in that it consists of stageless or multi-stage shellcode that once loaded by exploiting a vulnerability or executing a shellcode loader, will reflectively load itself into the memory of a process without touching the disk. It supports C2 and staging over HTTP, HTTPS, DNS, SMB named pipes as well as forward and reverse TCP; Beacons can be daisy-chained. Cobalt Strike comes with a toolkit for developing shellcode loaders, called Artifact Kit.The Beacon implant has become popular amongst targeted attackers and criminal users as it is well written, stable, and highly customizable.
  • APT 29
  • APT32
  • APT41
  • AQUATIC PANDA
  • Anunak
  • Cobalt
  • Codoso
  • CopyKittens
  • DarkHydrus
  • Earth Baxia
  • FIN6
  • FIN7
  • Leviathan
  • Mustang Panda
  • Shell Crew
  • Stone Panda
  • TianWu
  • UNC1878
  • UNC2452
  • Winnti Umbrella
https://malpedia.caad.fkie.fraunhofer.de/details/win.cobalt_strike
{"C2Server": "http://20.25.126.96:443/whI5", "User Agent": "User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0; BOIE9;ENUS)\r\n"}
{"Headers": "User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0; BOIE9;ENUS)\r\n", "Type": "Metasploit Download", "URL": "http://20.25.126.96/whI5"}
SourceRuleDescriptionAuthorStrings
00000004.00000002.1577384616.000002004A240000.00000020.10000000.00040000.00000000.sdmpJoeSecurity_MetasploitPayload_3Yara detected Metasploit PayloadJoe Security
    00000004.00000002.1577384616.000002004A240000.00000020.10000000.00040000.00000000.sdmpJoeSecurity_CobaltStrike_3Yara detected CobaltStrikeJoe Security
      00000004.00000002.1577384616.000002004A240000.00000020.10000000.00040000.00000000.sdmpWindows_Trojan_Metasploit_7bc0f998Identifies the API address lookup function leverage by metasploit shellcodeunknown
      • 0x11:$a1: 48 31 D2 65 48 8B 52 60 48 8B 52 18 48 8B 52 20 48 8B 72 50 48 0F B7 4A 4A 4D 31 C9 48 31 C0 AC 3C 61
      00000004.00000002.1577384616.000002004A240000.00000020.10000000.00040000.00000000.sdmpWindows_Trojan_Metasploit_c9773203Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families.unknown
      • 0x7d:$a: 48 31 C0 AC 41 C1 C9 0D 41 01 C1 38 E0 75 F1 4C 03 4C 24 08 45 39 D1
      00000007.00000002.1607164972.000001B58F980000.00000020.10000000.00040000.00000000.sdmpJoeSecurity_MetasploitPayload_3Yara detected Metasploit PayloadJoe Security
        Click to see the 15 entries
        No Sigma rule has matched
        No Suricata rule has matched

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: 00000000.00000002.1668627333.000002093EAE0000.00000020.10000000.00040000.00000000.sdmpMalware Configuration Extractor: CobaltStrike {"C2Server": "http://20.25.126.96:443/whI5", "User Agent": "User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0; BOIE9;ENUS)\r\n"}
        Source: 00000000.00000002.1668627333.000002093EAE0000.00000020.10000000.00040000.00000000.sdmpMalware Configuration Extractor: Metasploit {"Headers": "User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0; BOIE9;ENUS)\r\n", "Type": "Metasploit Download", "URL": "http://20.25.126.96/whI5"}
        Source: J4o8OaYTEF.dllReversingLabs: Detection: 55%
        Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.2% probability
        Source: J4o8OaYTEF.dllStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT

        Networking

        barindex
        Source: Malware configuration extractorURLs: http://20.25.126.96:443/whI5
        Source: Malware configuration extractorURLs: http://20.25.126.96/whI5

        System Summary

        barindex
        Source: 00000004.00000002.1577384616.000002004A240000.00000020.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Identifies the API address lookup function leverage by metasploit shellcode Author: unknown
        Source: 00000004.00000002.1577384616.000002004A240000.00000020.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families. Author: unknown
        Source: 00000007.00000002.1607164972.000001B58F980000.00000020.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Identifies the API address lookup function leverage by metasploit shellcode Author: unknown
        Source: 00000007.00000002.1607164972.000001B58F980000.00000020.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families. Author: unknown
        Source: 00000008.00000002.1637233000.000001B9F2520000.00000020.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Identifies the API address lookup function leverage by metasploit shellcode Author: unknown
        Source: 00000008.00000002.1637233000.000001B9F2520000.00000020.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families. Author: unknown
        Source: 00000000.00000002.1668627333.000002093EAE0000.00000020.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Identifies the API address lookup function leverage by metasploit shellcode Author: unknown
        Source: 00000000.00000002.1668627333.000002093EAE0000.00000020.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families. Author: unknown
        Source: 00000005.00000002.1577505421.0000024745F80000.00000020.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Identifies the API address lookup function leverage by metasploit shellcode Author: unknown
        Source: 00000005.00000002.1577505421.0000024745F80000.00000020.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families. Author: unknown
        Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000002093EAE010C0_2_000002093EAE010C
        Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000002004A24010C4_2_000002004A24010C
        Source: C:\Windows\System32\rundll32.exeCode function: 5_2_0000024745F8010C5_2_0000024745F8010C
        Source: C:\Windows\System32\rundll32.exeCode function: 7_2_000001B58F98010C7_2_000001B58F98010C
        Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000001B9F252010C8_2_000001B9F252010C
        Source: J4o8OaYTEF.dllStatic PE information: Number of sections : 11 > 10
        Source: 00000004.00000002.1577384616.000002004A240000.00000020.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_7bc0f998 os = windows, severity = x86, description = Identifies the API address lookup function leverage by metasploit shellcode, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = fdb5c665503f07b2fc1ed7e4e688295e1222a500bfb68418661db60c8e75e835, id = 7bc0f998-7014-4883-8a56-d5ee00c15aed, last_modified = 2021-08-23
        Source: 00000004.00000002.1577384616.000002004A240000.00000020.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_c9773203 os = windows, severity = x86, description = Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., creation_date = 2021-04-07, scan_context = file, memory, reference = https://github.com/rapid7/metasploit-framework/blob/04e8752b9b74cbaad7cb0ea6129c90e3172580a2/external/source/shellcode/windows/x64/src/block/block_api.asm, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = afde93eeb14b4d0c182f475a22430f101394938868741ffa06445e478b6ece36, id = c9773203-6d1e-4246-a1e0-314217e0207a, last_modified = 2021-08-23
        Source: 00000007.00000002.1607164972.000001B58F980000.00000020.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_7bc0f998 os = windows, severity = x86, description = Identifies the API address lookup function leverage by metasploit shellcode, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = fdb5c665503f07b2fc1ed7e4e688295e1222a500bfb68418661db60c8e75e835, id = 7bc0f998-7014-4883-8a56-d5ee00c15aed, last_modified = 2021-08-23
        Source: 00000007.00000002.1607164972.000001B58F980000.00000020.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_c9773203 os = windows, severity = x86, description = Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., creation_date = 2021-04-07, scan_context = file, memory, reference = https://github.com/rapid7/metasploit-framework/blob/04e8752b9b74cbaad7cb0ea6129c90e3172580a2/external/source/shellcode/windows/x64/src/block/block_api.asm, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = afde93eeb14b4d0c182f475a22430f101394938868741ffa06445e478b6ece36, id = c9773203-6d1e-4246-a1e0-314217e0207a, last_modified = 2021-08-23
        Source: 00000008.00000002.1637233000.000001B9F2520000.00000020.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_7bc0f998 os = windows, severity = x86, description = Identifies the API address lookup function leverage by metasploit shellcode, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = fdb5c665503f07b2fc1ed7e4e688295e1222a500bfb68418661db60c8e75e835, id = 7bc0f998-7014-4883-8a56-d5ee00c15aed, last_modified = 2021-08-23
        Source: 00000008.00000002.1637233000.000001B9F2520000.00000020.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_c9773203 os = windows, severity = x86, description = Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., creation_date = 2021-04-07, scan_context = file, memory, reference = https://github.com/rapid7/metasploit-framework/blob/04e8752b9b74cbaad7cb0ea6129c90e3172580a2/external/source/shellcode/windows/x64/src/block/block_api.asm, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = afde93eeb14b4d0c182f475a22430f101394938868741ffa06445e478b6ece36, id = c9773203-6d1e-4246-a1e0-314217e0207a, last_modified = 2021-08-23
        Source: 00000000.00000002.1668627333.000002093EAE0000.00000020.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_7bc0f998 os = windows, severity = x86, description = Identifies the API address lookup function leverage by metasploit shellcode, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = fdb5c665503f07b2fc1ed7e4e688295e1222a500bfb68418661db60c8e75e835, id = 7bc0f998-7014-4883-8a56-d5ee00c15aed, last_modified = 2021-08-23
        Source: 00000000.00000002.1668627333.000002093EAE0000.00000020.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_c9773203 os = windows, severity = x86, description = Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., creation_date = 2021-04-07, scan_context = file, memory, reference = https://github.com/rapid7/metasploit-framework/blob/04e8752b9b74cbaad7cb0ea6129c90e3172580a2/external/source/shellcode/windows/x64/src/block/block_api.asm, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = afde93eeb14b4d0c182f475a22430f101394938868741ffa06445e478b6ece36, id = c9773203-6d1e-4246-a1e0-314217e0207a, last_modified = 2021-08-23
        Source: 00000005.00000002.1577505421.0000024745F80000.00000020.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_7bc0f998 os = windows, severity = x86, description = Identifies the API address lookup function leverage by metasploit shellcode, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = fdb5c665503f07b2fc1ed7e4e688295e1222a500bfb68418661db60c8e75e835, id = 7bc0f998-7014-4883-8a56-d5ee00c15aed, last_modified = 2021-08-23
        Source: 00000005.00000002.1577505421.0000024745F80000.00000020.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_c9773203 os = windows, severity = x86, description = Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., creation_date = 2021-04-07, scan_context = file, memory, reference = https://github.com/rapid7/metasploit-framework/blob/04e8752b9b74cbaad7cb0ea6129c90e3172580a2/external/source/shellcode/windows/x64/src/block/block_api.asm, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = afde93eeb14b4d0c182f475a22430f101394938868741ffa06445e478b6ece36, id = c9773203-6d1e-4246-a1e0-314217e0207a, last_modified = 2021-08-23
        Source: classification engineClassification label: mal92.troj.evad.winDLL@14/0@0/0
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6488:120:WilError_03
        Source: J4o8OaYTEF.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: C:\Windows\System32\loaddll64.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\J4o8OaYTEF.dll",#1
        Source: J4o8OaYTEF.dllReversingLabs: Detection: 55%
        Source: unknownProcess created: C:\Windows\System32\loaddll64.exe loaddll64.exe "C:\Users\user\Desktop\J4o8OaYTEF.dll"
        Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\J4o8OaYTEF.dll",#1
        Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\J4o8OaYTEF.dll
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\J4o8OaYTEF.dll",#1
        Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\J4o8OaYTEF.dll,DllGetClassObject
        Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\J4o8OaYTEF.dll,DllMain
        Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\J4o8OaYTEF.dll,DllRegisterServer
        Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\J4o8OaYTEF.dll",#1Jump to behavior
        Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\J4o8OaYTEF.dllJump to behavior
        Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\J4o8OaYTEF.dll,DllGetClassObjectJump to behavior
        Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\J4o8OaYTEF.dll,DllMainJump to behavior
        Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\J4o8OaYTEF.dll,DllRegisterServerJump to behavior
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\J4o8OaYTEF.dll",#1Jump to behavior
        Source: C:\Windows\System32\loaddll64.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Windows\System32\loaddll64.exeSection loaded: wininet.dllJump to behavior
        Source: C:\Windows\System32\loaddll64.exeSection loaded: iertutil.dllJump to behavior
        Source: C:\Windows\System32\loaddll64.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Windows\System32\loaddll64.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Windows\System32\loaddll64.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Windows\System32\loaddll64.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Windows\System32\loaddll64.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Windows\System32\regsvr32.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Windows\System32\regsvr32.exeSection loaded: aclayers.dllJump to behavior
        Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dllJump to behavior
        Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc_os.dllJump to behavior
        Source: C:\Windows\System32\regsvr32.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Windows\System32\regsvr32.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Windows\System32\loaddll64.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
        Source: J4o8OaYTEF.dllStatic PE information: Image base 0x2fbac0000 > 0x60000000
        Source: J4o8OaYTEF.dllStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
        Source: J4o8OaYTEF.dllStatic PE information: section name: .xdata
        Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\J4o8OaYTEF.dll
        Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000002093EAE012B push eax; ret 0_2_000002093EAE0387
        Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000002093EAE010C push eax; ret 0_2_000002093EAE0387
        Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000002004A24010C push eax; ret 4_2_000002004A240387
        Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000002004A24012B push eax; ret 4_2_000002004A240387
        Source: C:\Windows\System32\rundll32.exeCode function: 5_2_0000024745F8012B push eax; ret 5_2_0000024745F80387
        Source: C:\Windows\System32\rundll32.exeCode function: 5_2_0000024745F8010C push eax; ret 5_2_0000024745F80387
        Source: C:\Windows\System32\rundll32.exeCode function: 7_2_000001B58F98012B push eax; ret 7_2_000001B58F980387
        Source: C:\Windows\System32\rundll32.exeCode function: 7_2_000001B58F98010C push eax; ret 7_2_000001B58F980387
        Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000001B9F252012B push eax; ret 8_2_000001B9F2520387
        Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000001B9F252010C push eax; ret 8_2_000001B9F2520387
        Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\loaddll64.exe TID: 6112Thread sleep time: -120000s >= -30000sJump to behavior
        Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\System32\loaddll64.exeThread delayed: delay time: 120000Jump to behavior
        Source: C:\Windows\System32\regsvr32.exeProcess queried: DebugPortJump to behavior
        Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected

        HIPS / PFW / Operating System Protection Evasion

        barindex
        Source: C:\Windows\System32\loaddll64.exeNtCreateThreadEx: Indirect: 0x7FFBC3131492Jump to behavior
        Source: C:\Windows\System32\loaddll64.exeNtMapViewOfSection: Indirect: 0x7FFBC31319E4Jump to behavior
        Source: C:\Windows\System32\loaddll64.exeNtProtectVirtualMemory: Indirect: 0x7FFBC3131449Jump to behavior
        Source: C:\Windows\System32\loaddll64.exeNtCreateThreadEx: Indirect: 0x7FFBC3132701Jump to behavior
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\J4o8OaYTEF.dll",#1Jump to behavior

        Remote Access Functionality

        barindex
        Source: Yara matchFile source: 00000004.00000002.1577384616.000002004A240000.00000020.10000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.1607164972.000001B58F980000.00000020.10000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000002.1637233000.000001B9F2520000.00000020.10000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.1668627333.000002093EAE0000.00000020.10000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000005.00000002.1577505421.0000024745F80000.00000020.10000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.1577384616.000002004A240000.00000020.10000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.1607164972.000001B58F980000.00000020.10000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000008.00000002.1637233000.000001B9F2520000.00000020.10000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.1668627333.000002093EAE0000.00000020.10000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000005.00000002.1577505421.0000024745F80000.00000020.10000000.00040000.00000000.sdmp, type: MEMORY
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
        DLL Side-Loading
        11
        Process Injection
        1
        Regsvr32
        OS Credential Dumping1
        Security Software Discovery
        Remote Services1
        Archive Collected Data
        1
        Encrypted Channel
        Exfiltration Over Other Network MediumAbuse Accessibility Features
        CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
        Abuse Elevation Control Mechanism
        1
        Rundll32
        LSASS Memory21
        Virtualization/Sandbox Evasion
        Remote Desktop ProtocolData from Removable Media1
        Application Layer Protocol
        Exfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
        DLL Side-Loading
        21
        Virtualization/Sandbox Evasion
        Security Account Manager1
        System Information Discovery
        SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
        Process Injection
        NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
        Abuse Elevation Control Mechanism
        LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
        DLL Side-Loading
        Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
        Obfuscated Files or Information
        DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet
        behaviorgraph top1 signatures2 2 Behavior Graph ID: 1542741 Sample: J4o8OaYTEF.exe Startdate: 26/10/2024 Architecture: WINDOWS Score: 92 20 Found malware configuration 2->20 22 Malicious sample detected (through community Yara rule) 2->22 24 Multi AV Scanner detection for submitted file 2->24 26 4 other signatures 2->26 7 loaddll64.exe 1 2->7         started        process3 signatures4 28 Found direct / indirect Syscall (likely to bypass EDR) 7->28 10 cmd.exe 1 7->10         started        12 conhost.exe 7->12         started        14 regsvr32.exe 7->14         started        16 3 other processes 7->16 process5 process6 18 rundll32.exe 10->18         started       

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        J4o8OaYTEF.dll55%ReversingLabsWin64.Trojan.CobaltStrike
        No Antivirus matches
        No Antivirus matches
        No Antivirus matches
        No Antivirus matches
        No contacted domains info
        NameMaliciousAntivirus DetectionReputation
        http://20.25.126.96:443/whI5true
          unknown
          http://20.25.126.96/whI5true
            unknown
            No contacted IP infos
            Joe Sandbox version:41.0.0 Charoite
            Analysis ID:1542741
            Start date and time:2024-10-26 09:10:08 +02:00
            Joe Sandbox product:CloudBasic
            Overall analysis duration:0h 4m 28s
            Hypervisor based Inspection enabled:false
            Report type:full
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
            Number of analysed new started processes analysed:14
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Sample name:J4o8OaYTEF.dll
            (renamed file extension from exe to dll, renamed because original name is a hash value)
            Original Sample Name:66a1616bf55914961e9e6512633310dc823a19d601f5ec1daf3a561031f6425c.exe
            Detection:MAL
            Classification:mal92.troj.evad.winDLL@14/0@0/0
            EGA Information:Failed
            HCA Information:Failed
            • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
            • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
            • Execution Graph export aborted for target loaddll64.exe, PID 6632 because there are no executed function
            • Execution Graph export aborted for target rundll32.exe, PID 2252 because there are no executed function
            • Execution Graph export aborted for target rundll32.exe, PID 4300 because there are no executed function
            • Execution Graph export aborted for target rundll32.exe, PID 5648 because there are no executed function
            • Execution Graph export aborted for target rundll32.exe, PID 5904 because there are no executed function
            • Not all processes where analyzed, report is missing behavior information
            • VT rate limit hit for: J4o8OaYTEF.dll
            TimeTypeDescription
            03:11:31API Interceptor1x Sleep call for process: loaddll64.exe modified
            No context
            No context
            No context
            No context
            No context
            No created / dropped files found
            File type:PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
            Entropy (8bit):5.419329901604067
            TrID:
            • Win64 Dynamic Link Library (generic) (102004/3) 86.43%
            • Win64 Executable (generic) (12005/4) 10.17%
            • Generic Win/DOS Executable (2004/3) 1.70%
            • DOS Executable Generic (2002/1) 1.70%
            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.01%
            File name:J4o8OaYTEF.dll
            File size:19'968 bytes
            MD5:7e4e55e9929a9ec7dbd924b916c5c549
            SHA1:b78ffcba1a36d4262be8b6d9270bb4d42ff3c0a1
            SHA256:66a1616bf55914961e9e6512633310dc823a19d601f5ec1daf3a561031f6425c
            SHA512:42eea5375256f5c228d74c4df30fe2c6b2a25336a85db97b1bed2da3f75a9cc9dabe38ea4b4e62f64112851b3814281f42c4a5872834b661c58c5d615937bb7e
            SSDEEP:384:CUOYE/qGUvjxu4TQE6Bkuq3eTi05SPS/oUY:C7ZIjw4EESkQTNeXU
            TLSH:4992C81BAB5256DEC65EC03885E61B31FCB2F86101917A1B92F8DF332F205A1672E785
            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d...-..g..........."...+.(...J..."..0.....................................................`... ............................
            Icon Hash:7ae282899bbab082
            Entrypoint:0x2fbac1330
            Entrypoint Section:.text
            Digitally signed:false
            Imagebase:0x2fbac0000
            Subsystem:windows cui
            Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, DEBUG_STRIPPED, DLL
            DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
            Time Stamp:0x6718D22D [Wed Oct 23 10:38:37 2024 UTC]
            TLS Callbacks:0xfbac2840, 0x2, 0xfbac2810, 0x2
            CLR (.Net) Version:
            OS Version Major:4
            OS Version Minor:0
            File Version Major:4
            File Version Minor:0
            Subsystem Version Major:4
            Subsystem Version Minor:0
            Import Hash:9cf851642951f0857c3906e25c9d014e
            Instruction
            dec eax
            mov eax, dword ptr [00003F09h]
            mov dword ptr [eax], 00000000h
            jmp 00007FF9FC853BC3h
            nop word ptr [eax+eax+00000000h]
            nop dword ptr [eax]
            dec eax
            mov edx, ecx
            dec eax
            lea ecx, dword ptr [00006CA6h]
            jmp 00007FF9FC855F36h
            nop
            dec eax
            lea ecx, dword ptr [00000009h]
            jmp 00007FF9FC853D19h
            nop dword ptr [eax+00h]
            ret
            nop
            nop
            nop
            nop
            nop
            nop
            nop
            nop
            nop
            nop
            nop
            nop
            nop
            nop
            nop
            dec eax
            jmp ecx
            dec eax
            arpl word ptr [00002CA6h], ax
            test eax, eax
            jle 00007FF9FC853D58h
            cmp dword ptr [00002C9Fh], 00000000h
            jle 00007FF9FC853D4Fh
            dec eax
            mov edx, dword ptr [0000ADFAh]
            dec eax
            mov dword ptr [ecx+eax], edx
            dec eax
            mov edx, dword ptr [0000ADF7h]
            dec eax
            arpl word ptr [00002C84h], ax
            dec eax
            mov dword ptr [ecx+eax], edx
            ret
            push ebp
            push edi
            push esi
            push ebx
            dec eax
            sub esp, 00000088h
            dec eax
            arpl dx, ax
            dec eax
            mov edi, ecx
            xor ecx, ecx
            dec esp
            mov ebp, eax
            mov edx, eax
            dec eax
            mov dword ptr [esp+68h], ecx
            xor ecx, ecx
            dec eax
            mov ebx, eax
            dec eax
            mov dword ptr [esp+70h], eax
            call 00007FF9FC85427Fh
            dec eax
            mov esi, eax
            dec eax
            mov ecx, eax
            call 00007FF9FC8542C0h
            dec eax
            mov ecx, esi
            dec eax
            mov dword ptr [esp+68h], eax
            call 00007FF9FC854B28h
            NameVirtual AddressVirtual Size Is in Section
            IMAGE_DIRECTORY_ENTRY_EXPORT0xb0000xaa.edata
            IMAGE_DIRECTORY_ENTRY_IMPORT0xc0000x53c.idata
            IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x60000x3f0.pdata
            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
            IMAGE_DIRECTORY_ENTRY_BASERELOC0xf0000x60.reloc
            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
            IMAGE_DIRECTORY_ENTRY_TLS0x50400x28.rdata
            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IAT0xc1700x130.idata
            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
            .text0x10000x27f80x2800c5605f0a82980869d3107f50da9d5687False0.52197265625data6.142409666518344IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            .data0x40000x4b00x600ea52084343af0cf99f504698cdee102cFalse0.6673177083333334dBase III DBT, version number 0, next free block index 1, 1st item "\376\243>{@\310\340\204>\005\321\246\242\373@|\217\267\274V\211\262P\021\316\177oj\005G\335\265\013q\036\336\246jz+1\215\320\013@,J\312\023Q\011HLR\357\253vj\016\027\0362\301\266zh\026L\021J\200\3743,\031BS\017\317\270zf\026H\005_\343\237ZAZ\024\020O\225\354Dm\024IQ\010\335\354]PZ\033\020N\225\354DK-\033"5.973576322127741IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
            .rdata0x50000x5d00x6005b0fe6edfdaaaac2452a5b468120f47dFalse0.220703125data3.892316314815055IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .pdata0x60000x3f00x4000397aa8d04714d2b227f9c360d166a32False0.4931640625data4.083264214480549IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .xdata0x70000x28c0x400f58e7de9ce662e0420b554924b20c6caFalse0.251953125data2.6819281875170105IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .bss0x80000x20900x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
            .edata0xb0000xaa0x20021a7c9af819f1d9ec6e5e3271034b416False0.271484375data1.8735047175023938IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .idata0xc0000x53c0x60008b1bd49f6d3c900f8a5d4bbd21bb6d0False0.3411458333333333data3.5062610946159185IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
            .CRT0xd0000x580x200ac1b9e6966abdac8444c5c8061d6ee9bFalse0.05859375data0.2493249518039166IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
            .tls0xe0000x100x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
            .reloc0xf0000x600x200091317a82d61503c0eb448f317d30082False0.203125data1.0719998208393533IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
            DLLImport
            KERNEL32.dllDeleteCriticalSection, EnterCriticalSection, GetCurrentProcess, GetLastError, GetModuleFileNameA, GetModuleHandleA, GetProcAddress, InitializeCriticalSection, LeaveCriticalSection, Sleep, TlsGetValue, VirtualProtect, VirtualQuery, WaitForSingleObject
            msvcrt.dll__iob_func, _amsg_exit, _initterm, _lock, _unlock, abort, calloc, fclose, fopen, fread, free, fwrite, malloc, mbstowcs, memcmp, rand, realloc, strlen, strncmp, vfprintf, wcsncat, wcsncpy
            NameOrdinalAddress
            DllGetClassObject10x2fbac2711
            DllMain20x2fbac26a7
            DllRegisterServer30x2fbac270b
            DllUnregisterServer40x2fbac270e
            StartW50x2fbac271a
            No network behavior found

            Click to jump to process

            Click to jump to process

            Click to dive into process behavior distribution

            Click to jump to process

            Target ID:0
            Start time:03:11:22
            Start date:26/10/2024
            Path:C:\Windows\System32\loaddll64.exe
            Wow64 process (32bit):false
            Commandline:loaddll64.exe "C:\Users\user\Desktop\J4o8OaYTEF.dll"
            Imagebase:0x7ff67ecc0000
            File size:165'888 bytes
            MD5 hash:763455F9DCB24DFEECC2B9D9F8D46D52
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Yara matches:
            • Rule: JoeSecurity_MetasploitPayload_3, Description: Yara detected Metasploit Payload, Source: 00000000.00000002.1668627333.000002093EAE0000.00000020.10000000.00040000.00000000.sdmp, Author: Joe Security
            • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000000.00000002.1668627333.000002093EAE0000.00000020.10000000.00040000.00000000.sdmp, Author: Joe Security
            • Rule: Windows_Trojan_Metasploit_7bc0f998, Description: Identifies the API address lookup function leverage by metasploit shellcode, Source: 00000000.00000002.1668627333.000002093EAE0000.00000020.10000000.00040000.00000000.sdmp, Author: unknown
            • Rule: Windows_Trojan_Metasploit_c9773203, Description: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., Source: 00000000.00000002.1668627333.000002093EAE0000.00000020.10000000.00040000.00000000.sdmp, Author: unknown
            Reputation:high
            Has exited:true

            Target ID:1
            Start time:03:11:22
            Start date:26/10/2024
            Path:C:\Windows\System32\conhost.exe
            Wow64 process (32bit):false
            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Imagebase:0x7ff6ee680000
            File size:862'208 bytes
            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high
            Has exited:true

            Target ID:2
            Start time:03:11:22
            Start date:26/10/2024
            Path:C:\Windows\System32\cmd.exe
            Wow64 process (32bit):false
            Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\J4o8OaYTEF.dll",#1
            Imagebase:0x7ff7bff30000
            File size:289'792 bytes
            MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high
            Has exited:true

            Target ID:3
            Start time:03:11:22
            Start date:26/10/2024
            Path:C:\Windows\System32\regsvr32.exe
            Wow64 process (32bit):false
            Commandline:regsvr32.exe /s C:\Users\user\Desktop\J4o8OaYTEF.dll
            Imagebase:0x7ff612910000
            File size:25'088 bytes
            MD5 hash:B0C2FA35D14A9FAD919E99D9D75E1B9E
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high
            Has exited:true

            Target ID:4
            Start time:03:11:22
            Start date:26/10/2024
            Path:C:\Windows\System32\rundll32.exe
            Wow64 process (32bit):false
            Commandline:rundll32.exe "C:\Users\user\Desktop\J4o8OaYTEF.dll",#1
            Imagebase:0x7ff7c6410000
            File size:71'680 bytes
            MD5 hash:EF3179D498793BF4234F708D3BE28633
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Yara matches:
            • Rule: JoeSecurity_MetasploitPayload_3, Description: Yara detected Metasploit Payload, Source: 00000004.00000002.1577384616.000002004A240000.00000020.10000000.00040000.00000000.sdmp, Author: Joe Security
            • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000004.00000002.1577384616.000002004A240000.00000020.10000000.00040000.00000000.sdmp, Author: Joe Security
            • Rule: Windows_Trojan_Metasploit_7bc0f998, Description: Identifies the API address lookup function leverage by metasploit shellcode, Source: 00000004.00000002.1577384616.000002004A240000.00000020.10000000.00040000.00000000.sdmp, Author: unknown
            • Rule: Windows_Trojan_Metasploit_c9773203, Description: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., Source: 00000004.00000002.1577384616.000002004A240000.00000020.10000000.00040000.00000000.sdmp, Author: unknown
            Reputation:high
            Has exited:true

            Target ID:5
            Start time:03:11:22
            Start date:26/10/2024
            Path:C:\Windows\System32\rundll32.exe
            Wow64 process (32bit):false
            Commandline:rundll32.exe C:\Users\user\Desktop\J4o8OaYTEF.dll,DllGetClassObject
            Imagebase:0x7ff7c6410000
            File size:71'680 bytes
            MD5 hash:EF3179D498793BF4234F708D3BE28633
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Yara matches:
            • Rule: JoeSecurity_MetasploitPayload_3, Description: Yara detected Metasploit Payload, Source: 00000005.00000002.1577505421.0000024745F80000.00000020.10000000.00040000.00000000.sdmp, Author: Joe Security
            • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000005.00000002.1577505421.0000024745F80000.00000020.10000000.00040000.00000000.sdmp, Author: Joe Security
            • Rule: Windows_Trojan_Metasploit_7bc0f998, Description: Identifies the API address lookup function leverage by metasploit shellcode, Source: 00000005.00000002.1577505421.0000024745F80000.00000020.10000000.00040000.00000000.sdmp, Author: unknown
            • Rule: Windows_Trojan_Metasploit_c9773203, Description: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., Source: 00000005.00000002.1577505421.0000024745F80000.00000020.10000000.00040000.00000000.sdmp, Author: unknown
            Reputation:high
            Has exited:true

            Target ID:7
            Start time:03:11:25
            Start date:26/10/2024
            Path:C:\Windows\System32\rundll32.exe
            Wow64 process (32bit):false
            Commandline:rundll32.exe C:\Users\user\Desktop\J4o8OaYTEF.dll,DllMain
            Imagebase:0x7ff7c6410000
            File size:71'680 bytes
            MD5 hash:EF3179D498793BF4234F708D3BE28633
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Yara matches:
            • Rule: JoeSecurity_MetasploitPayload_3, Description: Yara detected Metasploit Payload, Source: 00000007.00000002.1607164972.000001B58F980000.00000020.10000000.00040000.00000000.sdmp, Author: Joe Security
            • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000007.00000002.1607164972.000001B58F980000.00000020.10000000.00040000.00000000.sdmp, Author: Joe Security
            • Rule: Windows_Trojan_Metasploit_7bc0f998, Description: Identifies the API address lookup function leverage by metasploit shellcode, Source: 00000007.00000002.1607164972.000001B58F980000.00000020.10000000.00040000.00000000.sdmp, Author: unknown
            • Rule: Windows_Trojan_Metasploit_c9773203, Description: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., Source: 00000007.00000002.1607164972.000001B58F980000.00000020.10000000.00040000.00000000.sdmp, Author: unknown
            Reputation:high
            Has exited:true

            Target ID:8
            Start time:03:11:28
            Start date:26/10/2024
            Path:C:\Windows\System32\rundll32.exe
            Wow64 process (32bit):false
            Commandline:rundll32.exe C:\Users\user\Desktop\J4o8OaYTEF.dll,DllRegisterServer
            Imagebase:0x7ff7c6410000
            File size:71'680 bytes
            MD5 hash:EF3179D498793BF4234F708D3BE28633
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Yara matches:
            • Rule: JoeSecurity_MetasploitPayload_3, Description: Yara detected Metasploit Payload, Source: 00000008.00000002.1637233000.000001B9F2520000.00000020.10000000.00040000.00000000.sdmp, Author: Joe Security
            • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000008.00000002.1637233000.000001B9F2520000.00000020.10000000.00040000.00000000.sdmp, Author: Joe Security
            • Rule: Windows_Trojan_Metasploit_7bc0f998, Description: Identifies the API address lookup function leverage by metasploit shellcode, Source: 00000008.00000002.1637233000.000001B9F2520000.00000020.10000000.00040000.00000000.sdmp, Author: unknown
            • Rule: Windows_Trojan_Metasploit_c9773203, Description: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., Source: 00000008.00000002.1637233000.000001B9F2520000.00000020.10000000.00040000.00000000.sdmp, Author: unknown
            Reputation:high
            Has exited:true

            Reset < >
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1668627333.000002093EAE0000.00000020.10000000.00040000.00000000.sdmp, Offset: 000002093EAE0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_2093eae0000_loaddll64.jbxd
              Yara matches
              Similarity
              • API ID:
              • String ID: 27=m$W
              • API String ID: 0-2916630125
              • Opcode ID: f5cb3880ff0792f688ea9f5c770e835238eb481945a26bf560124749925291aa
              • Instruction ID: bfa4332e99a67a2bb5fdbd87ab9fb1b997fb38aab7fdfc2f09841ae0d823a11c
              • Opcode Fuzzy Hash: f5cb3880ff0792f688ea9f5c770e835238eb481945a26bf560124749925291aa
              • Instruction Fuzzy Hash: 88819F202187961BE7298BA898D936A7BD9EBD2314F2841DDF197C71C3C6108C83DB96