Click to jump to signature section
Source: http://185.196.8.37/Gd85kkjf/index.php# | Avira URL Cloud: Label: malware |
Source: http://185.196.8.37/Gd85kkjf/index.php | Avira URL Cloud: Label: malware |
Source: clip64.dll | Malware Configuration Extractor: Amadey {"C2 url": "185.196.8.37/Gd85kkjf/index.php", "Version": "5.10"} |
Source: clip64.dll | ReversingLabs: Detection: 73% |
Source: clip64.dll | Virustotal: Detection: 77% | Perma Link |
Source: 00000005.00000002.1254392816.000000000067A000.00000004.00000020.00020000.00000000.sdmp | String decryptor: \Mozilla\Firefox\Profiles\ |
Source: 00000005.00000002.1254392816.000000000067A000.00000004.00000020.00020000.00000000.sdmp | String decryptor: _Electrum( |
Source: 00000005.00000002.1254392816.000000000067A000.00000004.00000020.00020000.00000000.sdmp | String decryptor: electrum_data\wallets |
Source: 00000005.00000002.1254392816.000000000067A000.00000004.00000020.00020000.00000000.sdmp | String decryptor: Electrum\wallets |
Source: 00000005.00000002.1254392816.000000000067A000.00000004.00000020.00020000.00000000.sdmp | String decryptor: \logins.json |
Source: 00000005.00000002.1254392816.000000000067A000.00000004.00000020.00020000.00000000.sdmp | String decryptor: Exodus\exodus.wallet\ |
Source: 00000005.00000002.1254392816.000000000067A000.00000004.00000020.00020000.00000000.sdmp | String decryptor: Electrum.exe |
Source: 00000005.00000002.1254392816.000000000067A000.00000004.00000020.00020000.00000000.sdmp | String decryptor: 185.196.8.37 |
Source: 00000005.00000002.1254392816.000000000067A000.00000004.00000020.00020000.00000000.sdmp | String decryptor: /Gd85kkjf/index.php |
Source: 00000005.00000002.1254392816.000000000067A000.00000004.00000020.00020000.00000000.sdmp | String decryptor: Litecoin\wallets |
Source: 00000005.00000002.1254392816.000000000067A000.00000004.00000020.00020000.00000000.sdmp | String decryptor: DashCore\wallets\ |
Source: 00000005.00000002.1254392816.000000000067A000.00000004.00000020.00020000.00000000.sdmp | String decryptor: Telegram.exe |
Source: 00000005.00000002.1254392816.000000000067A000.00000004.00000020.00020000.00000000.sdmp | String decryptor: _Desktop.zip |
Source: 00000005.00000002.1254392816.000000000067A000.00000004.00000020.00020000.00000000.sdmp | String decryptor: atomic\Local Storage\ |
Source: 00000005.00000002.1254392816.000000000067A000.00000004.00000020.00020000.00000000.sdmp | String decryptor: CentBrowser |
Source: 00000005.00000002.1254392816.000000000067A000.00000004.00000020.00020000.00000000.sdmp | String decryptor: key=clear |
Source: 00000005.00000002.1254392816.000000000067A000.00000004.00000020.00020000.00000000.sdmp | String decryptor: tdata\key_datas |
Source: 00000005.00000002.1254392816.000000000067A000.00000004.00000020.00020000.00000000.sdmp | String decryptor: _Telegram( |
Source: 00000005.00000002.1254392816.000000000067A000.00000004.00000020.00020000.00000000.sdmp | String decryptor: \user_data |
Source: 00000005.00000002.1254392816.000000000067A000.00000004.00000020.00020000.00000000.sdmp | String decryptor: \dictionaries |
Source: 00000005.00000002.1254392816.000000000067A000.00000004.00000020.00020000.00000000.sdmp | String decryptor: \CentBrowser\User Data\Local State |
Source: 00000005.00000002.1254392816.000000000067A000.00000004.00000020.00020000.00000000.sdmp | String decryptor: \CentBrowser\User Data\Default\Login Data |
Source: 00000005.00000002.1254392816.000000000067A000.00000004.00000020.00020000.00000000.sdmp | String decryptor: \Chedot\User Data\Default\Login Data |
Source: 00000005.00000002.1254392816.000000000067A000.00000004.00000020.00020000.00000000.sdmp | String decryptor: \Comodo\Dragon\User Data\Local State |
Source: 00000005.00000002.1254392816.000000000067A000.00000004.00000020.00020000.00000000.sdmp | String decryptor: \Google\Chrome\User Data\Default\Login Data |
Source: 00000005.00000002.1254392816.000000000067A000.00000004.00000020.00020000.00000000.sdmp | String decryptor: \CocCoc\Browser\User Data\Local State |
Source: 00000005.00000002.1254392816.000000000067A000.00000004.00000020.00020000.00000000.sdmp | String decryptor: \Microsoft\Edge\User Data\Local State |
Source: 00000005.00000002.1254392816.000000000067A000.00000004.00000020.00020000.00000000.sdmp | String decryptor: \Orbitum\User Data\Default\Login Data |
Source: 00000005.00000002.1254392816.000000000067A000.00000004.00000020.00020000.00000000.sdmp | String decryptor: \Google\Chrome\User Data\Local State |
Source: 00000005.00000002.1254392816.000000000067A000.00000004.00000020.00020000.00000000.sdmp | String decryptor: \Vivaldi\User Data\Default\Login Data |
Source: 00000005.00000002.1254392816.000000000067A000.00000004.00000020.00020000.00000000.sdmp | String decryptor: \Comodo\Dragon\User Data\Default\Login Data |
Source: 00000005.00000002.1254392816.000000000067A000.00000004.00000020.00020000.00000000.sdmp | String decryptor: \CocCoc\Browser\User Data\Default\Login Data |
Source: 00000005.00000002.1254392816.000000000067A000.00000004.00000020.00020000.00000000.sdmp | String decryptor: \SputnikLab\Sputnik\User Data\Local State |
Source: 00000005.00000002.1254392816.000000000067A000.00000004.00000020.00020000.00000000.sdmp | String decryptor: \Opera Software\Opera Stable\Login Data |
Source: 00000005.00000002.1254392816.000000000067A000.00000004.00000020.00020000.00000000.sdmp | String decryptor: \Opera Software\Opera Stable\Local State |
Source: 00000005.00000002.1254392816.000000000067A000.00000004.00000020.00020000.00000000.sdmp | String decryptor: \Microsoft\Edge\User Data\Default\Login Data |
Source: clip64.dll | Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL |
Source: clip64.dll | Static PE information: DYNAMIC_BASE, NX_COMPAT |
Source: Network traffic | Suricata IDS: 2856152 - Severity 1 - ETPRO MALWARE Ameday CnC Response M2 : 185.196.8.37:80 -> 192.168.2.7:49707 |
Source: Network traffic | Suricata IDS: 2856152 - Severity 1 - ETPRO MALWARE Ameday CnC Response M2 : 185.196.8.37:80 -> 192.168.2.7:49700 |
Source: Malware configuration extractor | IPs: 185.196.8.37 |
Source: global traffic | HTTP traffic detected: POST /Gd85kkjf/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.196.8.37Content-Length: 5Cache-Control: no-cacheData Raw: 77 6c 74 3d 31 Data Ascii: wlt=1 |
Source: global traffic | HTTP traffic detected: POST /Gd85kkjf/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.196.8.37Content-Length: 5Cache-Control: no-cacheData Raw: 77 6c 74 3d 31 Data Ascii: wlt=1 |
Source: Joe Sandbox View | ASN Name: SIMPLECARRER2IT SIMPLECARRER2IT |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.196.8.37 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.196.8.37 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.196.8.37 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.196.8.37 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.196.8.37 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.196.8.37 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.196.8.37 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.196.8.37 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.196.8.37 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.196.8.37 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.196.8.37 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.196.8.37 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.196.8.37 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.196.8.37 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.196.8.37 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.196.8.37 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.196.8.37 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.196.8.37 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.196.8.37 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.196.8.37 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.196.8.37 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.196.8.37 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.196.8.37 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.196.8.37 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 14_2_6D501EC0 std::_Xinvalid_argument,InternetOpenW,InternetConnectA,HttpOpenRequestA,HttpSendRequestA,InternetReadFile,InternetReadFile,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle, | 14_2_6D501EC0 |
Source: unknown | HTTP traffic detected: POST /Gd85kkjf/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.196.8.37Content-Length: 5Cache-Control: no-cacheData Raw: 77 6c 74 3d 31 Data Ascii: wlt=1 |
Source: rundll32.exe, 0000000E.00000002.3720488782.0000000003349000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000012.00000002.3721926151.0000000002A80000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.196.8.37/ |
Source: rundll32.exe, 0000000E.00000002.3720488782.0000000003374000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000012.00000002.3721926151.0000000002A80000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000012.00000002.3721926151.0000000002A3A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.196.8.37/Gd85kkjf/index.php |
Source: rundll32.exe, 00000012.00000002.3721926151.0000000002A80000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.196.8.37/Gd85kkjf/index.php# |
Source: rundll32.exe, 00000012.00000002.3721926151.0000000002A80000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.196.8.37/Gd85kkjf/index.php4 |
Source: rundll32.exe, 00000012.00000002.3721926151.0000000002A3A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.196.8.37/Gd85kkjf/index.phpPe4 |
Source: rundll32.exe, 00000012.00000002.3721926151.0000000002A80000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.196.8.37/Gd85kkjf/index.phph |
Source: rundll32.exe, 00000012.00000002.3721926151.0000000002A3A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.196.8.37/Gd85kkjf/index.phpo |
Source: rundll32.exe, 0000000E.00000002.3720488782.000000000333F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.196.8.37/Gd85kkjf/index.phpw |
Source: rundll32.exe, 0000000E.00000002.3720488782.0000000003349000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.196.8.37/t% |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 14_2_6D5031B0 OpenClipboard,GetClipboardData,GlobalLock,WideCharToMultiByte,WideCharToMultiByte,GlobalUnlock,CloseClipboard, | 14_2_6D5031B0 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 14_2_6D5031B0 OpenClipboard,GetClipboardData,GlobalLock,WideCharToMultiByte,WideCharToMultiByte,GlobalUnlock,CloseClipboard, | 14_2_6D5031B0 |
Source: clip64.dll, type: SAMPLE | Matched rule: Finds Amadey\'s clipper plugin based on characteristic strings Author: Sekoia.io |
Source: 18.2.rundll32.exe.6d500000.0.unpack, type: UNPACKEDPE | Matched rule: Finds Amadey\'s clipper plugin based on characteristic strings Author: Sekoia.io |
Source: 14.2.rundll32.exe.6d500000.0.unpack, type: UNPACKEDPE | Matched rule: Finds Amadey\'s clipper plugin based on characteristic strings Author: Sekoia.io |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 14_2_6D5031B0 | 14_2_6D5031B0 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 14_2_6D511AB1 | 14_2_6D511AB1 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: String function: 6D5073B0 appears 34 times | |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: String function: 6D505D90 appears 103 times | |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: String function: 6D506B05 appears 47 times | |
Source: clip64.dll | Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL |
Source: clip64.dll, type: SAMPLE | Matched rule: loader_amadey_clipper_plugin author = Sekoia.io, description = Finds Amadey\'s clipper plugin based on characteristic strings, creation_date = 2023-05-16, classification = TLP:CLEAR, version = 1.0, id = 487b6657-8834-45ee-8fd4-03df9c0dd7be |
Source: 18.2.rundll32.exe.6d500000.0.unpack, type: UNPACKEDPE | Matched rule: loader_amadey_clipper_plugin author = Sekoia.io, description = Finds Amadey\'s clipper plugin based on characteristic strings, creation_date = 2023-05-16, classification = TLP:CLEAR, version = 1.0, id = 487b6657-8834-45ee-8fd4-03df9c0dd7be |
Source: 14.2.rundll32.exe.6d500000.0.unpack, type: UNPACKEDPE | Matched rule: loader_amadey_clipper_plugin author = Sekoia.io, description = Finds Amadey\'s clipper plugin based on characteristic strings, creation_date = 2023-05-16, classification = TLP:CLEAR, version = 1.0, id = 487b6657-8834-45ee-8fd4-03df9c0dd7be |
Source: classification engine | Classification label: mal100.troj.spyw.evad.winDLL@18/0@0/1 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5084:120:WilError_03 |
Source: clip64.dll | Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
Source: C:\Windows\System32\loaddll32.exe | Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\clip64.dll,??4CClipperDLL@@QAEAAV0@$$QAV0@@Z |
Source: clip64.dll | ReversingLabs: Detection: 73% |
Source: clip64.dll | Virustotal: Detection: 77% |
Source: unknown | Process created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\clip64.dll" | |
Source: C:\Windows\System32\loaddll32.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\loaddll32.exe | Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\clip64.dll",#1 | |
Source: C:\Windows\System32\loaddll32.exe | Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\clip64.dll,??4CClipperDLL@@QAEAAV0@$$QAV0@@Z | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\clip64.dll",#1 | |
Source: C:\Windows\System32\loaddll32.exe | Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\clip64.dll,??4CClipperDLL@@QAEAAV0@ABV0@@Z | |
Source: C:\Windows\System32\loaddll32.exe | Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\clip64.dll,Main | |
Source: C:\Windows\System32\loaddll32.exe | Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\clip64.dll",??4CClipperDLL@@QAEAAV0@$$QAV0@@Z | |
Source: C:\Windows\System32\loaddll32.exe | Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\clip64.dll",??4CClipperDLL@@QAEAAV0@ABV0@@Z | |
Source: C:\Windows\System32\loaddll32.exe | Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\clip64.dll",Main | |
Source: C:\Windows\System32\loaddll32.exe | Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\clip64.dll",#1 | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\clip64.dll,??4CClipperDLL@@QAEAAV0@$$QAV0@@Z | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\clip64.dll,??4CClipperDLL@@QAEAAV0@ABV0@@Z | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\clip64.dll,Main | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\clip64.dll",??4CClipperDLL@@QAEAAV0@$$QAV0@@Z | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\clip64.dll",??4CClipperDLL@@QAEAAV0@ABV0@@Z | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\clip64.dll",Main | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\clip64.dll",#1 | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Windows\System32\loaddll32.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32 | Jump to behavior |
Source: clip64.dll | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT |
Source: clip64.dll | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE |
Source: clip64.dll | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC |
Source: clip64.dll | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG |
Source: clip64.dll | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG |
Source: clip64.dll | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT |
Source: clip64.dll | Static PE information: DYNAMIC_BASE, NX_COMPAT |
Source: clip64.dll | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG |
Source: clip64.dll | Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata |
Source: clip64.dll | Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc |
Source: clip64.dll | Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc |
Source: clip64.dll | Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata |
Source: clip64.dll | Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Window / User API: threadDelayed 493 | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Window / User API: threadDelayed 9500 | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Window / User API: threadDelayed 2405 | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Window / User API: threadDelayed 7588 | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe TID: 6012 | Thread sleep count: 493 > 30 | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe TID: 6012 | Thread sleep time: -493000s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe TID: 6012 | Thread sleep count: 9500 > 30 | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe TID: 6012 | Thread sleep time: -9500000s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe TID: 7248 | Thread sleep count: 2405 > 30 | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe TID: 7248 | Thread sleep time: -2405000s >= -30000s | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe TID: 7248 | Thread sleep count: 7588 > 30 | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe TID: 7248 | Thread sleep time: -7588000s >= -30000s | Jump to behavior |
Source: all processes | Thread injection, dropped files, key value created, disk infection and DNS query: no activity detected |
Source: C:\Windows\System32\conhost.exe | Last function: Thread delayed |
Source: C:\Windows\SysWOW64\rundll32.exe | Last function: Thread delayed |
Source: C:\Windows\SysWOW64\rundll32.exe | Last function: Thread delayed |
Source: C:\Windows\SysWOW64\rundll32.exe | Last function: Thread delayed |
Source: C:\Windows\SysWOW64\rundll32.exe | Last function: Thread delayed |
Source: rundll32.exe, 0000000E.00000002.3720488782.000000000338E000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW0 |
Source: rundll32.exe, 0000000E.00000002.3720488782.0000000003349000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000002.3720488782.000000000338E000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000012.00000002.3721926151.0000000002A9D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000012.00000002.3721926151.0000000002A3A000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW |
Source: C:\Windows\SysWOW64\rundll32.exe | Process Stats: CPU usage > 42% for more than 60s |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 14_2_6D509820 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 14_2_6D509820 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 14_2_6D50B881 mov eax, dword ptr fs:[00000030h] | 14_2_6D50B881 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 14_2_6D50A254 mov eax, dword ptr fs:[00000030h] | 14_2_6D50A254 |
Source: all processes | Thread injection, dropped files, key value created, disk infection and DNS query: no activity detected |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 14_2_6D509820 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 14_2_6D509820 |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 14_2_6D506B1A SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, | 14_2_6D506B1A |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 14_2_6D507288 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 14_2_6D507288 |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\clip64.dll",#1 | Jump to behavior |
Source: C:\Windows\SysWOW64\rundll32.exe | Code function: 14_2_6D5073F8 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter, | 14_2_6D5073F8 |
Source: Yara match | File source: clip64.dll, type: SAMPLE |
Source: Yara match | File source: 18.2.rundll32.exe.6d500000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 14.2.rundll32.exe.6d500000.0.unpack, type: UNPACKEDPE |