Source: RasTls.dll |
ReversingLabs: Detection: 68% |
Source: Submited Sample |
Integrated Neural Analysis Model: Matched 100.0% probability |
Source: RasTls.dll |
Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL |
Source: RasTls.dll |
Static PE information: DYNAMIC_BASE, NX_COMPAT |
Source: C:\Windows\SysWOW64\rundll32.exe |
Network Connect: 65.20.90.139 443 |
Jump to behavior |
Source: Joe Sandbox View |
ASN Name: CP-ASDE CP-ASDE |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: global traffic |
DNS traffic detected: DNS query: swiftandfast.net |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49887 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49986 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49985 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49706 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49779 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49785 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49704 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49989 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49785 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49894 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49986 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49990 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49992 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49778 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49779 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49887 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49778 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49705 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49894 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49993 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49992 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49991 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49990 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49988 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49985 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49987 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49991 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49706 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49993 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49705 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49704 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49989 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49988 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49888 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49888 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49987 |
Source: RasTls.dll |
Static PE information: section name: .X:T |
Source: RasTls.dll |
Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL |
Source: classification engine |
Classification label: mal88.evad.winDLL@10/0@1/1 |
Source: C:\Windows\System32\conhost.exe |
Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5948:120:WilError_03 |
Source: C:\Windows\System32\loaddll32.exe |
Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers |
Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe |
Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\RasTls.dll,GetOfficeDatatal |
Source: RasTls.dll |
ReversingLabs: Detection: 68% |
Source: unknown |
Process created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\RasTls.dll" |
|
Source: C:\Windows\System32\loaddll32.exe |
Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
|
Source: C:\Windows\System32\loaddll32.exe |
Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\RasTls.dll",#1 |
|
Source: C:\Windows\System32\loaddll32.exe |
Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\RasTls.dll,GetOfficeDatatal |
|
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\RasTls.dll",#1 |
|
Source: C:\Windows\System32\loaddll32.exe |
Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\RasTls.dll",GetOfficeDatatal |
|
Source: C:\Windows\System32\loaddll32.exe |
Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\RasTls.dll",#1 |
Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe |
Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\RasTls.dll,GetOfficeDatatal |
Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe |
Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\RasTls.dll",GetOfficeDatatal |
Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\RasTls.dll",#1 |
Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe |
Section loaded: apphelp.dll |
Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe |
Section loaded: netapi32.dll |
Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe |
Section loaded: iphlpapi.dll |
Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe |
Section loaded: samcli.dll |
Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe |
Section loaded: netutils.dll |
Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe |
Section loaded: wldp.dll |
Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe |
Section loaded: msasn1.dll |
Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe |
Section loaded: apphelp.dll |
Jump to behavior |
Source: RasTls.dll |
Static file information: File size 6302208 > 1048576 |
Source: RasTls.dll |
Static PE information: Raw size of .WFm is bigger than: 0x100000 < 0x601800 |
Source: RasTls.dll |
Static PE information: DYNAMIC_BASE, NX_COMPAT |
Source: initial sample |
Static PE information: section where entry point is pointing to: .WFm |
Source: RasTls.dll |
Static PE information: section name: .X:T |
Source: RasTls.dll |
Static PE information: section name: .BXf |
Source: RasTls.dll |
Static PE information: section name: .WFm |
Source: C:\Windows\System32\loaddll32.exe |
Memory written: PID: 6616 base: 1240005 value: E9 8B 2F CB 75 |
Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe |
Memory written: PID: 6616 base: 76EF2F90 value: E9 7A D0 34 8A |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Memory written: PID: 6348 base: 2B80005 value: E9 8B 2F 37 74 |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Memory written: PID: 6348 base: 76EF2F90 value: E9 7A D0 C8 8B |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Memory written: PID: 6548 base: 3220005 value: E9 8B 2F CD 73 |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Memory written: PID: 6548 base: 76EF2F90 value: E9 7A D0 32 8C |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Memory written: PID: 5284 base: 29F0005 value: E9 8B 2F 50 74 |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Memory written: PID: 5284 base: 76EF2F90 value: E9 7A D0 AF 8B |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe |
API/Special instruction interceptor: Address: 6C86454B |
Source: C:\Windows\System32\loaddll32.exe |
API/Special instruction interceptor: Address: 6C865B49 |
Source: C:\Windows\System32\loaddll32.exe |
API/Special instruction interceptor: Address: 6C72132F |
Source: C:\Windows\System32\loaddll32.exe |
API/Special instruction interceptor: Address: 6C6B3714 |
Source: C:\Windows\SysWOW64\rundll32.exe |
RDTSC instruction interceptor: First address: 6C58745C second address: 6C587467 instructions: 0x00000000 rdtsc 0x00000002 pop esi 0x00000003 movsx dx, bh 0x00000007 mov bp, 091Bh 0x0000000b rdtsc |
Source: C:\Windows\System32\loaddll32.exe |
RDTSC instruction interceptor: First address: 6C58745C second address: 6C587467 instructions: 0x00000000 rdtsc 0x00000002 pop esi 0x00000003 movsx dx, bh 0x00000007 mov bp, 091Bh 0x0000000b rdtsc |
Source: C:\Windows\System32\loaddll32.exe |
RDTSC instruction interceptor: First address: 6C5C5B71 second address: 6C5C5B75 instructions: 0x00000000 rdtsc 0x00000002 pop ebx 0x00000003 cdq 0x00000004 rdtsc |
Source: C:\Windows\System32\loaddll32.exe |
RDTSC instruction interceptor: First address: 6C659216 second address: 6C65921A instructions: 0x00000000 rdtsc 0x00000002 pop ebx 0x00000003 cdq 0x00000004 rdtsc |
Source: C:\Windows\SysWOW64\rundll32.exe |
Window / User API: threadDelayed 5454 |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Window / User API: threadDelayed 4535 |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Window / User API: threadDelayed 5470 |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Window / User API: threadDelayed 4519 |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Window / User API: threadDelayed 9989 |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe TID: 6156 |
Thread sleep count: 5454 > 30 |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe TID: 6156 |
Thread sleep time: -5454000s >= -30000s |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe TID: 6156 |
Thread sleep count: 4535 > 30 |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe TID: 6156 |
Thread sleep time: -4535000s >= -30000s |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe TID: 6480 |
Thread sleep count: 5470 > 30 |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe TID: 6480 |
Thread sleep time: -5470000s >= -30000s |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe TID: 6480 |
Thread sleep count: 4519 > 30 |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe TID: 6480 |
Thread sleep time: -4519000s >= -30000s |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe TID: 5672 |
Thread sleep count: 9989 > 30 |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe TID: 5672 |
Thread sleep time: -9989000s >= -30000s |
Jump to behavior |
Source: C:\Windows\System32\conhost.exe |
Last function: Thread delayed |
Source: C:\Windows\System32\loaddll32.exe |
Thread delayed: delay time: 120000 |
Jump to behavior |
Source: rundll32.exe, 00000003.00000002.4512491078.0000000002A8A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4512315310.000000000306A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000002.4512544852.0000000002A1A000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll |
Source: C:\Windows\System32\loaddll32.exe |
Process information queried: ProcessInformation |
Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe |
Network Connect: 65.20.90.139 443 |
Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\RasTls.dll",#1 |
Jump to behavior |