Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
8082-x64.dll.dll

Overview

General Information

Sample Name:8082-x64.dll.dll
Analysis ID:780203
MD5:43616639411a590f022505998a6f567e
SHA1:416932059dc3488000b171beeac258fc792d4c71
SHA256:6a289f491c8d5d789e31e89c73ba06ef6fc075458a1106b7213b29da798f6c03
Tags:45139105143exeopendir
Infos:

Detection

CobaltStrike
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Yara detected CobaltStrike
C2 URLs / IPs found in malware configuration
Uses known network protocols on non-standard ports
Machine Learning detection for sample
Yara signature match
Tries to load missing DLLs
Uses a known web browser user agent for HTTP communication
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected TCP or UDP traffic on non-standard ports
PE file contains sections with non-standard names
Internet Provider seen in connection with other malware
Registers a DLL
Sample execution stops while process was sleeping (likely an evasion)
PE file contains more sections than normal
Program does not show much activity (idle)
Creates a process in suspended mode (likely to inject code)
IP address seen in connection with other malware

Classification

  • System is w10x64
  • loaddll64.exe (PID: 3648 cmdline: loaddll64.exe "C:\Users\user\Desktop\8082-x64.dll.dll" MD5: C676FC0263EDD17D4CE7D644B8F3FCD6)
    • conhost.exe (PID: 2884 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • cmd.exe (PID: 6104 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\8082-x64.dll.dll",#1 MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
      • rundll32.exe (PID: 4848 cmdline: rundll32.exe "C:\Users\user\Desktop\8082-x64.dll.dll",#1 MD5: 73C519F050C20580F8A62C849D49215A)
    • regsvr32.exe (PID: 3480 cmdline: regsvr32.exe /s C:\Users\user\Desktop\8082-x64.dll.dll MD5: D78B75FC68247E8A63ACBA846182740E)
    • rundll32.exe (PID: 1304 cmdline: rundll32.exe C:\Users\user\Desktop\8082-x64.dll.dll,DllGetClassObject MD5: 73C519F050C20580F8A62C849D49215A)
    • rundll32.exe (PID: 1004 cmdline: rundll32.exe C:\Users\user\Desktop\8082-x64.dll.dll,DllMain MD5: 73C519F050C20580F8A62C849D49215A)
    • rundll32.exe (PID: 4532 cmdline: rundll32.exe C:\Users\user\Desktop\8082-x64.dll.dll,DllRegisterServer MD5: 73C519F050C20580F8A62C849D49215A)
  • cleanup
{"BeaconType": ["HTTP"], "Port": 8082, "SleepTime": 38500, "MaxGetSize": 1399607, "Jitter": 27, "C2Server": "20.104.209.69,/broadcast", "HttpPostUri": "/1/events/com.amazon.csm.csa.prod", "Malleable_C2_Instructions": ["Remove 1308 bytes from the end", "Remove 1 bytes from the end", "Remove 194 bytes from the beginning", "Base64 decode"], "SpawnTo": "16nKFaB/gr/TtjAg2jiqFg==", "HttpGet_Verb": "GET", "HttpPost_Verb": "POST", "HttpPostChunk": 0, "Spawnto_x86": "%windir%\\syswow64\\gpupdate.exe", "Spawnto_x64": "%windir%\\sysnative\\gpupdate.exe", "CryptoScheme": 0, "Proxy_Behavior": "Use IE settings", "Watermark": 1670873463, "bStageCleanup": "True", "bCFGCaution": "True", "KillDate": 0, "bProcInject_StartRWX": "True", "bProcInject_UseRWX": "False", "bProcInject_MinAllocSize": 16700, "ProcInject_PrependAppend_x86": ["kJCQ", "Empty"], "ProcInject_PrependAppend_x64": ["kJCQ", "Empty"], "ProcInject_Execute": ["ntdll.dll:RtlUserThreadStart", "SetThreadContext", "NtQueueApcThread-s", "kernel32.dll:LoadLibraryA", "CreateRemoteThread", "RtlCreateUserThread"], "ProcInject_AllocationMethod": "NtMapViewOfSection", "bUsesCookies": "False", "HostHeader": ""}
SourceRuleDescriptionAuthorStrings
8082-x64.dll.dllCobaltStrike_Resources_Artifact64_v3_14_to_v4_xCobalt Strike\'s resources/artifact64{.exe,.dll,svc.exe,svcbig.exe,big.exe,big.dll,.x64.dll,big.x64.dll} and resource/artifactuac(alt)64.exe signature for versions v3.14 through v4.xgssincla@google.com
  • 0xa25:$fmtBuilder: 41 B8 5C 00 00 00 C7 44 24 50 5C 00 00 00 C7 44 24 48 65 00 00 00 C7 44 24 40 70 00 00 00 C7 44 24 38 69 00 00 00 C7 44 24 30 70 00 00 00 C7 44 24 28 5C 00 00 00 C7 44 24 20 2E 00 00 00 89 54 ...
  • 0x44a00:$fmtString: %c%c%c%c%c%c%c%c%cMSSE-%d-server
8082-x64.dll.dllJoeSecurity_CobaltStrike_4Yara detected CobaltStrikeJoe Security
    SourceRuleDescriptionAuthorStrings
    00000000.00000002.579279943.00000267603C6000.00000004.00000001.00020000.00000000.sdmpSUSP_PS1_FromBase64String_Content_IndicatorDetects suspicious base64 encoded PowerShell expressionsFlorian Roth
    • 0x7498:$: ::FromBase64String("H4s
    • 0x7498:$: ::FromBase64String("H4sIA
    00000000.00000002.579279943.00000267603C6000.00000004.00000001.00020000.00000000.sdmpCobaltStrike_Resources_Command_Ps1_v2_5_to_v3_7_and_Resources_Compress_Ps1_v3_8_to_v4_xCobalt Strike\'s resources/command.ps1 for versions 2.5 to v3.7 and resources/compress.ps1 from v3.8 to v4.xgssincla@google.com
    • 0x7470:$ps1: $s=New-Object IO.MemoryStream(,[Convert]::FromBase64String(
    • 0x30379:$ps2: ));IEX (New-Object IO.StreamReader(New-Object IO.Compression.GzipStream($s,[IO.Compression.CompressionMode]::Decompress))).ReadToEnd();
    00000000.00000003.323615011.0000026760590000.00000020.00001000.00020000.00000000.sdmpCobaltStrike_Sleeve_BeaconLoader_VA_x64_o_v4_3_v4_4_v4_5_and_v4_6Cobalt Strike\'s sleeve/BeaconLoader.VA.x64.o (VirtualAlloc) Versions 4.3 through at least 4.6gssincla@google.com
    • 0x16ce5:$core_sig: C6 44 24 48 56 C6 44 24 49 69 C6 44 24 4A 72 C6 44 24 4B 74 C6 44 24 4C 75 C6 44 24 4D 61 C6 44 24 4E 6C C6 44 24 4F 41 C6 44 24 50 6C C6 44 24 51 6C C6 44 24 52 6F C6 44 24 53 63 C6 44 24 54 ...
    • 0x16755:$deobfuscator: 8B 04 24 FF C0 89 04 24 8B 44 24 28 39 04 24 73 20 8B 04 24 0F B6 4C 24 30 48 8B 54 24 20 0F BE 04 02 33 C1 8B 0C 24 48 8B 54 24 20 88 04 0A
    00000000.00000003.323615011.0000026760590000.00000020.00001000.00020000.00000000.sdmpCobaltbaltstrike_Beacon_x64Detects CobaltStrike payloadsAvast Threat Intel Team
    • 0x3:$h01: 4D 5A 41 52 55 48 89 E5 48 81 EC 20 00 00 00 48 8D 1D EA FF FF FF 48 89
    • 0x3b633:$h13: 2E 2F 2E 2F 2E 2C 2E 2E 2E 2C 2E 2F 2E 2C 31 BC 2E
    00000000.00000003.323615011.0000026760590000.00000020.00001000.00020000.00000000.sdmpCobaltStrike_C2_Encoded_XOR_Config_IndicatorDetects CobaltStrike C2 encoded profile configurationyara@s3c.za.net
    • 0x3b633:$s046: 2E 2F 2E 2F 2E 2C 2E 2E 2E 2C 2E 2F 2E 2C 31 BC 2E 2D 2E 2C 2E 2A 2E 2E B8 4A 2E 2A 2E 2C 2E 2A 2E 3B 75 19 2E 2B 2E 2F 2E 2C 2E 35
    Click to see the 10 entries
    No Sigma rule has matched
    No Snort rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: 8082-x64.dll.dllAvira: detected
    Source: 8082-x64.dll.dllReversingLabs: Detection: 78%
    Source: 8082-x64.dll.dllVirustotal: Detection: 63%Perma Link
    Source: 8082-x64.dll.dllJoe Sandbox ML: detected
    Source: 00000000.00000003.323615011.0000026760590000.00000020.00001000.00020000.00000000.sdmpMalware Configuration Extractor: CobaltStrike {"BeaconType": ["HTTP"], "Port": 8082, "SleepTime": 38500, "MaxGetSize": 1399607, "Jitter": 27, "C2Server": "20.104.209.69,/broadcast", "HttpPostUri": "/1/events/com.amazon.csm.csa.prod", "Malleable_C2_Instructions": ["Remove 1308 bytes from the end", "Remove 1 bytes from the end", "Remove 194 bytes from the beginning", "Base64 decode"], "SpawnTo": "16nKFaB/gr/TtjAg2jiqFg==", "HttpGet_Verb": "GET", "HttpPost_Verb": "POST", "HttpPostChunk": 0, "Spawnto_x86": "%windir%\\syswow64\\gpupdate.exe", "Spawnto_x64": "%windir%\\sysnative\\gpupdate.exe", "CryptoScheme": 0, "Proxy_Behavior": "Use IE settings", "Watermark": 1670873463, "bStageCleanup": "True", "bCFGCaution": "True", "KillDate": 0, "bProcInject_StartRWX": "True", "bProcInject_UseRWX": "False", "bProcInject_MinAllocSize": 16700, "ProcInject_PrependAppend_x86": ["kJCQ", "Empty"], "ProcInject_PrependAppend_x64": ["kJCQ", "Empty"], "ProcInject_Execute": ["ntdll.dll:RtlUserThreadStart", "SetThreadContext", "NtQueueApcThread-s", "kernel32.dll:LoadLibraryA", "CreateRemoteThread", "RtlCreateUserThread"], "ProcInject_AllocationMethod": "NtMapViewOfSection", "bUsesCookies": "False", "HostHeader": ""}

    Networking

    barindex
    Source: Malware configuration extractorURLs: 20.104.209.69
    Source: unknownNetwork traffic detected: HTTP traffic on port 49699 -> 8082
    Source: unknownNetwork traffic detected: HTTP traffic on port 8082 -> 49699
    Source: unknownNetwork traffic detected: HTTP traffic on port 49700 -> 8082
    Source: unknownNetwork traffic detected: HTTP traffic on port 8082 -> 49700
    Source: unknownNetwork traffic detected: HTTP traffic on port 49701 -> 8082
    Source: unknownNetwork traffic detected: HTTP traffic on port 8082 -> 49701
    Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 8082
    Source: unknownNetwork traffic detected: HTTP traffic on port 8082 -> 49707
    Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 8082
    Source: unknownNetwork traffic detected: HTTP traffic on port 8082 -> 49709
    Source: global trafficHTTP traffic detected: GET /broadcast HTTP/1.1Accept: application/json, text/plain, */*Accept-Language: en-US,en;q=0.5Origin: https://www.amazon.comReferer: https://www.amazon.comSec-Fetch-Dest: emptySec-Fetch-Mode: corsSec-Fetch-Site: cross-siteTe: trailersx-amzn-RequestId: FHpLzZRFDaJcV3Y7qyufQOISTIObeVemP+NmdAYcRRIE3FV/EUpEubshH3rkXVtRwA0H5UqybBKz1PDmJULg1XGljnjPbkoWruec57yIzOL214VyxG9n4/paEbjVA0xB3WsFwgdNY86xsizSKv8fcjdoFgmVx/FrmUZeOA6bHh4=User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36Host: 20.104.209.69:8082Connection: Keep-AliveCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /broadcast HTTP/1.1Accept: application/json, text/plain, */*Accept-Language: en-US,en;q=0.5Origin: https://www.amazon.comReferer: https://www.amazon.comSec-Fetch-Dest: emptySec-Fetch-Mode: corsSec-Fetch-Site: cross-siteTe: trailersx-amzn-RequestId: FHpLzZRFDaJcV3Y7qyufQOISTIObeVemP+NmdAYcRRIE3FV/EUpEubshH3rkXVtRwA0H5UqybBKz1PDmJULg1XGljnjPbkoWruec57yIzOL214VyxG9n4/paEbjVA0xB3WsFwgdNY86xsizSKv8fcjdoFgmVx/FrmUZeOA6bHh4=User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36Host: 20.104.209.69:8082Connection: Keep-AliveCache-Control: no-cache
    Source: global trafficHTTP traffic detected: POST /1/events/com.amazon.csm.csa.prod HTTP/1.1Accept: */*Origin: https://www.amazon.comx-amz-rid: MzM0ODIwMjEyUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36Host: 20.104.209.69:8082Content-Length: 14587Connection: Keep-AliveCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /broadcast HTTP/1.1Accept: application/json, text/plain, */*Accept-Language: en-US,en;q=0.5Origin: https://www.amazon.comReferer: https://www.amazon.comSec-Fetch-Dest: emptySec-Fetch-Mode: corsSec-Fetch-Site: cross-siteTe: trailersx-amzn-RequestId: FHpLzZRFDaJcV3Y7qyufQOISTIObeVemP+NmdAYcRRIE3FV/EUpEubshH3rkXVtRwA0H5UqybBKz1PDmJULg1XGljnjPbkoWruec57yIzOL214VyxG9n4/paEbjVA0xB3WsFwgdNY86xsizSKv8fcjdoFgmVx/FrmUZeOA6bHh4=User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36Host: 20.104.209.69:8082Connection: Keep-AliveCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /broadcast HTTP/1.1Accept: application/json, text/plain, */*Accept-Language: en-US,en;q=0.5Origin: https://www.amazon.comReferer: https://www.amazon.comSec-Fetch-Dest: emptySec-Fetch-Mode: corsSec-Fetch-Site: cross-siteTe: trailersx-amzn-RequestId: FHpLzZRFDaJcV3Y7qyufQOISTIObeVemP+NmdAYcRRIE3FV/EUpEubshH3rkXVtRwA0H5UqybBKz1PDmJULg1XGljnjPbkoWruec57yIzOL214VyxG9n4/paEbjVA0xB3WsFwgdNY86xsizSKv8fcjdoFgmVx/FrmUZeOA6bHh4=User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36Host: 20.104.209.69:8082Connection: Keep-AliveCache-Control: no-cache
    Source: global trafficTCP traffic: 192.168.2.5:49699 -> 20.104.209.69:8082
    Source: Joe Sandbox ViewASN Name: MICROSOFT-CORP-MSN-AS-BLOCKUS MICROSOFT-CORP-MSN-AS-BLOCKUS
    Source: Joe Sandbox ViewIP Address: 20.104.209.69 20.104.209.69
    Source: unknownTCP traffic detected without corresponding DNS query: 20.104.209.69
    Source: unknownTCP traffic detected without corresponding DNS query: 20.104.209.69
    Source: unknownTCP traffic detected without corresponding DNS query: 20.104.209.69
    Source: unknownTCP traffic detected without corresponding DNS query: 20.104.209.69
    Source: unknownTCP traffic detected without corresponding DNS query: 20.104.209.69
    Source: unknownTCP traffic detected without corresponding DNS query: 20.104.209.69
    Source: unknownTCP traffic detected without corresponding DNS query: 20.104.209.69
    Source: unknownTCP traffic detected without corresponding DNS query: 20.104.209.69
    Source: unknownTCP traffic detected without corresponding DNS query: 20.104.209.69
    Source: unknownTCP traffic detected without corresponding DNS query: 20.104.209.69
    Source: unknownTCP traffic detected without corresponding DNS query: 20.104.209.69
    Source: unknownTCP traffic detected without corresponding DNS query: 20.104.209.69
    Source: unknownTCP traffic detected without corresponding DNS query: 20.104.209.69
    Source: unknownTCP traffic detected without corresponding DNS query: 20.104.209.69
    Source: unknownTCP traffic detected without corresponding DNS query: 20.104.209.69
    Source: unknownTCP traffic detected without corresponding DNS query: 20.104.209.69
    Source: unknownTCP traffic detected without corresponding DNS query: 20.104.209.69
    Source: unknownTCP traffic detected without corresponding DNS query: 20.104.209.69
    Source: unknownTCP traffic detected without corresponding DNS query: 20.104.209.69
    Source: unknownTCP traffic detected without corresponding DNS query: 20.104.209.69
    Source: unknownTCP traffic detected without corresponding DNS query: 20.104.209.69
    Source: unknownTCP traffic detected without corresponding DNS query: 20.104.209.69
    Source: unknownTCP traffic detected without corresponding DNS query: 20.104.209.69
    Source: unknownTCP traffic detected without corresponding DNS query: 20.104.209.69
    Source: unknownTCP traffic detected without corresponding DNS query: 20.104.209.69
    Source: unknownTCP traffic detected without corresponding DNS query: 20.104.209.69
    Source: unknownTCP traffic detected without corresponding DNS query: 20.104.209.69
    Source: unknownTCP traffic detected without corresponding DNS query: 20.104.209.69
    Source: unknownTCP traffic detected without corresponding DNS query: 20.104.209.69
    Source: unknownTCP traffic detected without corresponding DNS query: 20.104.209.69
    Source: unknownTCP traffic detected without corresponding DNS query: 20.104.209.69
    Source: unknownTCP traffic detected without corresponding DNS query: 20.104.209.69
    Source: unknownTCP traffic detected without corresponding DNS query: 20.104.209.69
    Source: unknownTCP traffic detected without corresponding DNS query: 20.104.209.69
    Source: unknownTCP traffic detected without corresponding DNS query: 20.104.209.69
    Source: unknownTCP traffic detected without corresponding DNS query: 20.104.209.69
    Source: unknownTCP traffic detected without corresponding DNS query: 20.104.209.69
    Source: unknownTCP traffic detected without corresponding DNS query: 20.104.209.69
    Source: unknownTCP traffic detected without corresponding DNS query: 20.104.209.69
    Source: unknownTCP traffic detected without corresponding DNS query: 20.104.209.69
    Source: unknownTCP traffic detected without corresponding DNS query: 20.104.209.69
    Source: unknownTCP traffic detected without corresponding DNS query: 20.104.209.69
    Source: unknownTCP traffic detected without corresponding DNS query: 20.104.209.69
    Source: unknownTCP traffic detected without corresponding DNS query: 20.104.209.69
    Source: unknownTCP traffic detected without corresponding DNS query: 20.104.209.69
    Source: unknownTCP traffic detected without corresponding DNS query: 20.104.209.69
    Source: unknownTCP traffic detected without corresponding DNS query: 20.104.209.69
    Source: unknownTCP traffic detected without corresponding DNS query: 20.104.209.69
    Source: unknownTCP traffic detected without corresponding DNS query: 20.104.209.69
    Source: unknownTCP traffic detected without corresponding DNS query: 20.104.209.69
    Source: loaddll64.exe, 00000000.00000002.579185009.0000026760353000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://20.104.209.69:8082/1/events/com.amazon.csm.csa.prod
    Source: loaddll64.exe, 00000000.00000002.579245580.00000267603A5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://20.104.209.69:8082/broadcast
    Source: loaddll64.exe, 00000000.00000003.395924452.00000267603A7000.00000004.00001000.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000002.579245580.00000267603A5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://20.104.209.69:8082/broadcast((
    Source: loaddll64.exe, 00000000.00000003.395924452.00000267603A7000.00000004.00001000.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000002.579245580.00000267603A5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://20.104.209.69:8082/broadcast2
    Source: loaddll64.exe, 00000000.00000003.395924452.00000267603A7000.00000004.00001000.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000002.579245580.00000267603A5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://20.104.209.69:8082/broadcast?
    Source: loaddll64.exe, 00000000.00000002.579185009.0000026760353000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://20.104.209.69:8082/broadcastp
    Source: loaddll64.exe, 00000000.00000002.579668975.0000026760402000.00000004.00000001.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000002.579895773.00000267605C1000.00000004.00001000.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000002.579889103.0000026760597000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://d22u79neyj432a.cloudfront.net/bfc50dfa-8e10-44b5-ae59-ac26bfc71489/54857e6d-c060-4b3c-914a-8
    Source: loaddll64.exe, 00000000.00000002.579185009.0000026760353000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.com
    Source: unknownHTTP traffic detected: POST /1/events/com.amazon.csm.csa.prod HTTP/1.1Accept: */*Origin: https://www.amazon.comx-amz-rid: MzM0ODIwMjEyUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36Host: 20.104.209.69:8082Content-Length: 14587Connection: Keep-AliveCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /broadcast HTTP/1.1Accept: application/json, text/plain, */*Accept-Language: en-US,en;q=0.5Origin: https://www.amazon.comReferer: https://www.amazon.comSec-Fetch-Dest: emptySec-Fetch-Mode: corsSec-Fetch-Site: cross-siteTe: trailersx-amzn-RequestId: FHpLzZRFDaJcV3Y7qyufQOISTIObeVemP+NmdAYcRRIE3FV/EUpEubshH3rkXVtRwA0H5UqybBKz1PDmJULg1XGljnjPbkoWruec57yIzOL214VyxG9n4/paEbjVA0xB3WsFwgdNY86xsizSKv8fcjdoFgmVx/FrmUZeOA6bHh4=User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36Host: 20.104.209.69:8082Connection: Keep-AliveCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /broadcast HTTP/1.1Accept: application/json, text/plain, */*Accept-Language: en-US,en;q=0.5Origin: https://www.amazon.comReferer: https://www.amazon.comSec-Fetch-Dest: emptySec-Fetch-Mode: corsSec-Fetch-Site: cross-siteTe: trailersx-amzn-RequestId: FHpLzZRFDaJcV3Y7qyufQOISTIObeVemP+NmdAYcRRIE3FV/EUpEubshH3rkXVtRwA0H5UqybBKz1PDmJULg1XGljnjPbkoWruec57yIzOL214VyxG9n4/paEbjVA0xB3WsFwgdNY86xsizSKv8fcjdoFgmVx/FrmUZeOA6bHh4=User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36Host: 20.104.209.69:8082Connection: Keep-AliveCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /broadcast HTTP/1.1Accept: application/json, text/plain, */*Accept-Language: en-US,en;q=0.5Origin: https://www.amazon.comReferer: https://www.amazon.comSec-Fetch-Dest: emptySec-Fetch-Mode: corsSec-Fetch-Site: cross-siteTe: trailersx-amzn-RequestId: FHpLzZRFDaJcV3Y7qyufQOISTIObeVemP+NmdAYcRRIE3FV/EUpEubshH3rkXVtRwA0H5UqybBKz1PDmJULg1XGljnjPbkoWruec57yIzOL214VyxG9n4/paEbjVA0xB3WsFwgdNY86xsizSKv8fcjdoFgmVx/FrmUZeOA6bHh4=User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36Host: 20.104.209.69:8082Connection: Keep-AliveCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /broadcast HTTP/1.1Accept: application/json, text/plain, */*Accept-Language: en-US,en;q=0.5Origin: https://www.amazon.comReferer: https://www.amazon.comSec-Fetch-Dest: emptySec-Fetch-Mode: corsSec-Fetch-Site: cross-siteTe: trailersx-amzn-RequestId: FHpLzZRFDaJcV3Y7qyufQOISTIObeVemP+NmdAYcRRIE3FV/EUpEubshH3rkXVtRwA0H5UqybBKz1PDmJULg1XGljnjPbkoWruec57yIzOL214VyxG9n4/paEbjVA0xB3WsFwgdNY86xsizSKv8fcjdoFgmVx/FrmUZeOA6bHh4=User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36Host: 20.104.209.69:8082Connection: Keep-AliveCache-Control: no-cache

    System Summary

    barindex
    Source: 00000000.00000003.323615011.0000026760590000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon reflective loader Author: unknown
    Source: 8082-x64.dll.dll, type: SAMPLEMatched rule: CobaltStrike_Resources_Artifact64_v3_14_to_v4_x date = 2022-11-18, author = gssincla@google.com, description = Cobalt Strike\'s resources/artifact64{.exe,.dll,svc.exe,svcbig.exe,big.exe,big.dll,.x64.dll,big.x64.dll} and resource/artifactuac(alt)64.exe signature for versions v3.14 through v4.x, reference = https://cloud.google.com/blog/products/identity-security/making-cobalt-strike-harder-for-threat-actors-to-abuse, hash = decfcca0018f2cec4a200ea057c804bb357300a67c6393b097d52881527b1c44
    Source: 00000000.00000002.579279943.00000267603C6000.00000004.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: SUSP_PS1_FromBase64String_Content_Indicator date = 2020-01-25, author = Florian Roth, description = Detects suspicious base64 encoded PowerShell expressions, type = file, reference = https://gist.github.com/Neo23x0/6af876ee72b51676c82a2db8d2cd3639
    Source: 00000000.00000002.579279943.00000267603C6000.00000004.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: CobaltStrike_Resources_Command_Ps1_v2_5_to_v3_7_and_Resources_Compress_Ps1_v3_8_to_v4_x date = 2022-11-18, author = gssincla@google.com, description = Cobalt Strike\'s resources/command.ps1 for versions 2.5 to v3.7 and resources/compress.ps1 from v3.8 to v4.x, reference = https://cloud.google.com/blog/products/identity-security/making-cobalt-strike-harder-for-threat-actors-to-abuse, hash = 932dec24b3863584b43caf9bb5d0cfbd7ed1969767d3061a7abdc05d3239ed62
    Source: 00000000.00000003.323615011.0000026760590000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: CobaltStrike_Sleeve_BeaconLoader_VA_x64_o_v4_3_v4_4_v4_5_and_v4_6 date = 2022-11-18, author = gssincla@google.com, description = Cobalt Strike\'s sleeve/BeaconLoader.VA.x64.o (VirtualAlloc) Versions 4.3 through at least 4.6, reference = https://cloud.google.com/blog/products/identity-security/making-cobalt-strike-harder-for-threat-actors-to-abuse, hash = ac090a0707aa5ccd2c645b523bd23a25999990cf6895fce3bfa3b025e3e8a1c9
    Source: 00000000.00000003.323615011.0000026760590000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Beacon_x64 author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
    Source: 00000000.00000003.323615011.0000026760590000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: CobaltStrike_C2_Encoded_XOR_Config_Indicator date = 2021-07-08, author = yara@s3c.za.net, description = Detects CobaltStrike C2 encoded profile configuration
    Source: 00000000.00000003.323615011.0000026760590000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: CobaltStrike_MZ_Launcher date = 2021-07-08, author = yara@s3c.za.net, description = Detects CobaltStrike MZ header ReflectiveLoader launcher
    Source: 00000000.00000003.323615011.0000026760590000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: SUSP_XORed_Mozilla date = 2019-10-28, author = Florian Roth, description = Detects suspicious single byte XORed keyword \'Mozilla/5.0\' - it uses yara\'s XOR modifier and therefore cannot print the XOR key. You can use the CyberChef recipe linked in the reference field to brute force the used key., score = , reference = https://gchq.github.io/CyberChef/#recipe=XOR_Brute_Force(), modified = 2022-05-13
    Source: 00000000.00000003.323615011.0000026760590000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_f0b627fc reference_sample = b362951abd9d96d5ec15d281682fa1c8fe8f8e4e2f264ca86f6b061af607f79b, os = windows, severity = x86, description = Rule for beacon reflective loader, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = fbc94bedd50b5b943553dd438a183a1e763c098a385ac3a4fc9ff24ee30f91e1, id = f0b627fc-97cd-42cb-9eae-1efb0672762d, last_modified = 2022-01-13
    Source: Process Memory Space: loaddll64.exe PID: 3648, type: MEMORYSTRMatched rule: SUSP_PS1_FromBase64String_Content_Indicator date = 2020-01-25, author = Florian Roth, description = Detects suspicious base64 encoded PowerShell expressions, type = file, reference = https://gist.github.com/Neo23x0/6af876ee72b51676c82a2db8d2cd3639
    Source: Process Memory Space: loaddll64.exe PID: 3648, type: MEMORYSTRMatched rule: CobaltStrike_Resources_Command_Ps1_v2_5_to_v3_7_and_Resources_Compress_Ps1_v3_8_to_v4_x date = 2022-11-18, author = gssincla@google.com, description = Cobalt Strike\'s resources/command.ps1 for versions 2.5 to v3.7 and resources/compress.ps1 from v3.8 to v4.x, reference = https://cloud.google.com/blog/products/identity-security/making-cobalt-strike-harder-for-threat-actors-to-abuse, hash = 932dec24b3863584b43caf9bb5d0cfbd7ed1969767d3061a7abdc05d3239ed62
    Source: Process Memory Space: loaddll64.exe PID: 3648, type: MEMORYSTRMatched rule: CobaltStrike_C2_Encoded_XOR_Config_Indicator date = 2021-07-08, author = yara@s3c.za.net, description = Detects CobaltStrike C2 encoded profile configuration
    Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dll
    Source: 8082-x64.dll.dllStatic PE information: Number of sections : 11 > 10
    Source: 8082-x64.dll.dllReversingLabs: Detection: 78%
    Source: 8082-x64.dll.dllVirustotal: Detection: 63%
    Source: 8082-x64.dll.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: C:\Windows\System32\loaddll64.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\8082-x64.dll.dll",#1
    Source: unknownProcess created: C:\Windows\System32\loaddll64.exe loaddll64.exe "C:\Users\user\Desktop\8082-x64.dll.dll"
    Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\8082-x64.dll.dll",#1
    Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\8082-x64.dll.dll
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\8082-x64.dll.dll",#1
    Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\8082-x64.dll.dll,DllGetClassObject
    Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\8082-x64.dll.dll,DllMain
    Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\8082-x64.dll.dll,DllRegisterServer
    Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\8082-x64.dll.dll",#1
    Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\8082-x64.dll.dll
    Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\8082-x64.dll.dll,DllGetClassObject
    Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\8082-x64.dll.dll,DllMain
    Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\8082-x64.dll.dll,DllRegisterServer
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\8082-x64.dll.dll",#1
    Source: C:\Windows\System32\loaddll64.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2884:120:WilError_01
    Source: classification engineClassification label: mal100.troj.winDLL@14/0@0/1
    Source: 8082-x64.dll.dllStatic PE information: Image base 0x6bac0000 > 0x60000000
    Source: C:\Windows\System32\loaddll64.exeCode function: 0_3_0000026760595E1A push ecx; ret
    Source: C:\Windows\System32\loaddll64.exeCode function: 0_3_0000026760596786 push ebx; ret
    Source: C:\Windows\System32\loaddll64.exeCode function: 0_3_0000026760596726 push ebx; ret
    Source: C:\Windows\System32\loaddll64.exeCode function: 0_3_0000026760595795 push eax; ret
    Source: C:\Windows\System32\loaddll64.exeCode function: 0_3_00000267605957C3 push eax; ret
    Source: C:\Windows\System32\loaddll64.exeCode function: 0_3_00000267605978FA push ecx; ret
    Source: C:\Windows\System32\loaddll64.exeCode function: 0_3_0000026760594167 push esi; ret
    Source: C:\Windows\System32\loaddll64.exeCode function: 0_3_000002676059625F push ebp; ret
    Source: C:\Windows\System32\loaddll64.exeCode function: 0_3_00000267605972C8 push ebx; ret
    Source: C:\Windows\System32\loaddll64.exeCode function: 0_3_0000026760594AC9 push esp; ret
    Source: C:\Windows\System32\loaddll64.exeCode function: 0_3_0000026760595AEF push edx; ret
    Source: C:\Windows\System32\loaddll64.exeCode function: 0_3_00000267605972EB push esp; ret
    Source: C:\Windows\System32\loaddll64.exeCode function: 0_3_0000026760594C00 push esi; ret
    Source: C:\Windows\System32\loaddll64.exeCode function: 0_3_0000026760594480 push edx; ret
    Source: C:\Windows\System32\loaddll64.exeCode function: 0_3_0000026760598469 push es; ret
    Source: C:\Windows\System32\loaddll64.exeCode function: 0_3_0000026760598498 push ebp; ret
    Source: 8082-x64.dll.dllStatic PE information: section name: .xdata
    Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\8082-x64.dll.dll

    Hooking and other Techniques for Hiding and Protection

    barindex
    Source: unknownNetwork traffic detected: HTTP traffic on port 49699 -> 8082
    Source: unknownNetwork traffic detected: HTTP traffic on port 8082 -> 49699
    Source: unknownNetwork traffic detected: HTTP traffic on port 49700 -> 8082
    Source: unknownNetwork traffic detected: HTTP traffic on port 8082 -> 49700
    Source: unknownNetwork traffic detected: HTTP traffic on port 49701 -> 8082
    Source: unknownNetwork traffic detected: HTTP traffic on port 8082 -> 49701
    Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 8082
    Source: unknownNetwork traffic detected: HTTP traffic on port 8082 -> 49707
    Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 8082
    Source: unknownNetwork traffic detected: HTTP traffic on port 8082 -> 49709
    Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\loaddll64.exe TID: 3724Thread sleep time: -120000s >= -30000s
    Source: C:\Windows\System32\loaddll64.exe TID: 5220Thread sleep time: -32461s >= -30000s
    Source: C:\Windows\System32\loaddll64.exe TID: 5220Thread sleep time: -37737s >= -30000s
    Source: C:\Windows\System32\loaddll64.exe TID: 5220Thread sleep time: -34501s >= -30000s
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
    Source: C:\Windows\System32\loaddll64.exeProcess information queried: ProcessInformation
    Source: C:\Windows\System32\loaddll64.exeThread delayed: delay time: 120000
    Source: loaddll64.exe, 00000000.00000002.579279943.00000267603C6000.00000004.00000001.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000003.395951899.00000267603C6000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWDO=:
    Source: loaddll64.exe, 00000000.00000002.579279943.00000267603C6000.00000004.00000001.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000002.579185009.0000026760353000.00000004.00000001.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000003.395951899.00000267603C6000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
    Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\8082-x64.dll.dll",#1
    Source: C:\Windows\System32\loaddll64.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: 00000000.00000003.323615011.0000026760590000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: loaddll64.exe PID: 3648, type: MEMORYSTR
    Source: Yara matchFile source: 8082-x64.dll.dll, type: SAMPLE
    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid AccountsWindows Management Instrumentation1
    DLL Side-Loading
    11
    Process Injection
    11
    Virtualization/Sandbox Evasion
    OS Credential Dumping1
    Security Software Discovery
    Remote ServicesData from Local SystemExfiltration Over Other Network Medium11
    Non-Standard Port
    Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
    Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
    DLL Side-Loading
    11
    Process Injection
    LSASS Memory1
    Process Discovery
    Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
    Ingress Tool Transfer
    Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
    Obfuscated Files or Information
    Security Account Manager11
    Virtualization/Sandbox Evasion
    SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration2
    Non-Application Layer Protocol
    Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
    Regsvr32
    NTDS2
    System Information Discovery
    Distributed Component Object ModelInput CaptureScheduled Transfer112
    Application Layer Protocol
    SIM Card SwapCarrier Billing Fraud
    Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
    Rundll32
    LSA SecretsRemote System DiscoverySSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
    Replication Through Removable MediaLaunchdRc.commonRc.common1
    DLL Side-Loading
    Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet
    behaviorgraph top1 signatures2 2 Behavior Graph ID: 780203 Sample: 8082-x64.dll.dll Startdate: 08/01/2023 Architecture: WINDOWS Score: 100 22 Malicious sample detected (through community Yara rule) 2->22 24 Antivirus / Scanner detection for submitted sample 2->24 26 Multi AV Scanner detection for submitted file 2->26 28 4 other signatures 2->28 7 loaddll64.exe 11 2->7         started        process3 dnsIp4 20 20.104.209.69, 49699, 49700, 49701 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 7->20 10 cmd.exe 1 7->10         started        12 regsvr32.exe 7->12         started        14 conhost.exe 7->14         started        16 3 other processes 7->16 process5 process6 18 rundll32.exe 10->18         started       

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    8082-x64.dll.dll78%ReversingLabsWin64.Backdoor.CobaltStrike
    8082-x64.dll.dll63%VirustotalBrowse
    8082-x64.dll.dll100%AviraHEUR/AGEN.1235510
    8082-x64.dll.dll100%Joe Sandbox ML
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    http://20.104.209.69:8082/broadcast((0%Avira URL Cloudsafe
    http://20.104.209.69:8082/broadcastp0%Avira URL Cloudsafe
    http://20.104.209.69:8082/broadcast?0%Avira URL Cloudsafe
    http://20.104.209.69:8082/broadcast0%VirustotalBrowse
    http://20.104.209.69:8082/broadcast0%Avira URL Cloudsafe
    20.104.209.690%Avira URL Cloudsafe
    http://20.104.209.69:8082/broadcast20%Avira URL Cloudsafe
    http://20.104.209.69:8082/1/events/com.amazon.csm.csa.prod0%Avira URL Cloudsafe
    No contacted domains info
    NameMaliciousAntivirus DetectionReputation
    http://20.104.209.69:8082/broadcasttrue
    • 0%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    20.104.209.69true
    • Avira URL Cloud: safe
    unknown
    http://20.104.209.69:8082/1/events/com.amazon.csm.csa.prodtrue
    • Avira URL Cloud: safe
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://20.104.209.69:8082/broadcast?loaddll64.exe, 00000000.00000003.395924452.00000267603A7000.00000004.00001000.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000002.579245580.00000267603A5000.00000004.00000001.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://20.104.209.69:8082/broadcastploaddll64.exe, 00000000.00000002.579185009.0000026760353000.00000004.00000001.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://20.104.209.69:8082/broadcast((loaddll64.exe, 00000000.00000003.395924452.00000267603A7000.00000004.00001000.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000002.579245580.00000267603A5000.00000004.00000001.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://www.amazon.comloaddll64.exe, 00000000.00000002.579185009.0000026760353000.00000004.00000001.00020000.00000000.sdmpfalse
      high
      http://20.104.209.69:8082/broadcast2loaddll64.exe, 00000000.00000003.395924452.00000267603A7000.00000004.00001000.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000002.579245580.00000267603A5000.00000004.00000001.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://d22u79neyj432a.cloudfront.net/bfc50dfa-8e10-44b5-ae59-ac26bfc71489/54857e6d-c060-4b3c-914a-8loaddll64.exe, 00000000.00000002.579668975.0000026760402000.00000004.00000001.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000002.579895773.00000267605C1000.00000004.00001000.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000002.579889103.0000026760597000.00000004.00001000.00020000.00000000.sdmpfalse
        high
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        20.104.209.69
        unknownUnited States
        8075MICROSOFT-CORP-MSN-AS-BLOCKUStrue
        Joe Sandbox Version:36.0.0 Rainbow Opal
        Analysis ID:780203
        Start date and time:2023-01-08 16:08:56 +01:00
        Joe Sandbox Product:CloudBasic
        Overall analysis duration:0h 6m 28s
        Hypervisor based Inspection enabled:false
        Report type:light
        Sample file name:8082-x64.dll.dll
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
        Run name:Run with higher sleep bypass
        Number of analysed new started processes analysed:11
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • HDC enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Detection:MAL
        Classification:mal100.troj.winDLL@14/0@0/1
        EGA Information:Failed
        HDC Information:Failed
        HCA Information:Failed
        Cookbook Comments:
        • Found application associated with file extension: .dll
        • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
        • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, conhost.exe
        • TCP Packets have been reduced to 100
        • Excluded domains from analysis (whitelisted): client.wns.windows.com, ctldl.windowsupdate.com
        • Execution Graph export aborted for target loaddll64.exe, PID 3648 because there are no executed function
        • Not all processes where analyzed, report is missing behavior information
        No simulations
        No context
        No context
        No context
        No context
        No context
        No created / dropped files found
        File type:PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
        Entropy (8bit):7.250454733634642
        TrID:
        • Win64 Dynamic Link Library (generic) (102004/3) 86.41%
        • Win64 Executable (generic) (12005/4) 10.17%
        • Generic Win/DOS Executable (2004/3) 1.70%
        • DOS Executable Generic (2002/1) 1.70%
        • VXD Driver (31/22) 0.03%
        File name:8082-x64.dll.dll
        File size:287744
        MD5:43616639411a590f022505998a6f567e
        SHA1:416932059dc3488000b171beeac258fc792d4c71
        SHA256:6a289f491c8d5d789e31e89c73ba06ef6fc075458a1106b7213b29da798f6c03
        SHA512:9989fc8ee3a07db0a9f9a98395e75178507f20e9189f15c9b9dc51f55efe23c324388edc0032ded78db392f69ae9560505a979e165661a0fe46ca7c73c41139a
        SSDEEP:6144:49TczeYIVeH21LD3rMPwjEMSUEufxTUhYohcnxK7xERM5jy45yrjz:weAP3QPKEeEuShYohcnx+xEsUT
        TLSH:9954ADC0D6EEE60CEA36C5B72B9762679030F344FAD62BB124660B0696D647DD0D027F
        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d......^..........."..... ...`.................k.............................................. ............................
        Icon Hash:74f0e4ecccdce0e4
        Entrypoint:0x6bac13f0
        Entrypoint Section:.text
        Digitally signed:false
        Imagebase:0x6bac0000
        Subsystem:windows cui
        Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, DEBUG_STRIPPED, DLL
        DLL Characteristics:
        Time Stamp:0x5EDED517 [Tue Jun 9 00:17:27 2020 UTC]
        TLS Callbacks:0x6bac1910
        CLR (.Net) Version:
        OS Version Major:4
        OS Version Minor:0
        File Version Major:4
        File Version Minor:0
        Subsystem Version Major:4
        Subsystem Version Minor:0
        Import Hash:f73cb1b8999c7e79c50459b8e1f144f0
        Instruction
        dec eax
        sub esp, 48h
        mov dword ptr [00047C22h], 00000000h
        cmp edx, 01h
        je 00007FE0409C534Fh
        dec eax
        add esp, 48h
        jmp 00007FE0409C51C9h
        nop dword ptr [eax+00h]
        mov dword ptr [esp+30h], edx
        dec eax
        mov dword ptr [esp+38h], ecx
        dec esp
        mov dword ptr [esp+28h], eax
        call 00007FE0409C5F62h
        call 00007FE0409C62CDh
        dec esp
        mov eax, dword ptr [esp+28h]
        dec eax
        mov ecx, dword ptr [esp+38h]
        mov edx, dword ptr [esp+30h]
        dec eax
        add esp, 48h
        jmp 00007FE0409C5196h
        nop
        push ebp
        push edi
        push esi
        push ebx
        dec eax
        sub esp, 58h
        inc ebp
        xor eax, eax
        inc ecx
        mov ecx, 00000001h
        dec eax
        mov edi, ecx
        mov esi, edx
        mov dword ptr [esp+4Ch], 00000000h
        dec eax
        mov dword ptr [esp+38h], 00000000h
        mov dword ptr [esp+30h], 00000000h
        mov edx, 00000002h
        mov dword ptr [esp+28h], 00000000h
        mov dword ptr [esp+20h], 00000000h
        dec eax
        lea ecx, dword ptr [00048475h]
        call dword ptr [00049D6Bh]
        dec eax
        mov ebx, eax
        dec eax
        lea eax, dword ptr [eax-01h]
        dec eax
        cmp eax, FFFFFFFDh
        jnbe 00007FE0409C5390h
        xor edx, edx
        dec eax
        mov ecx, ebx
        call dword ptr [00049D43h]
        test eax, eax
        dec eax
        mov ebp, dword ptr [00049E32h]
        jne 00007FE0409C536Ch
        jmp 00007FE0409C5378h
        dec eax
        NameVirtual AddressVirtual Size Is in Section
        IMAGE_DIRECTORY_ENTRY_EXPORT0x4a0000xb0.edata
        IMAGE_DIRECTORY_ENTRY_IMPORT0x4b0000x7bc.idata
        IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x470000x27c.pdata
        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
        IMAGE_DIRECTORY_ENTRY_BASERELOC0x4e0000x2c4.reloc
        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
        IMAGE_DIRECTORY_ENTRY_TLS0x4d0000x28.tls
        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IAT0x4b1e40x1a8.idata
        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
        NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
        .text0x10000x1f100x2000False0.5732421875data6.021842385150596IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        .data0x30000x424700x42600False0.5997381120527306data7.257802920028994IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        .rdata0x460000x1700x200False0.416015625data3.5502048501802737IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ
        .pdata0x470000x27c0x400False0.3515625data2.9537206983747IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ
        .xdata0x480000x2000x200False0.380859375locale data table3.772885986330123IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ
        .bss0x490000x9900x0False0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        .edata0x4a0000xb00x200False0.271484375data1.9824304709536775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ
        .idata0x4b0000x7bc0x800False0.357421875data4.239308826637131IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        .CRT0x4c0000x580x200False0.0546875data0.20153937813451883IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        .tls0x4d0000x480x200False0.0546875data0.29046607431271465IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        .reloc0x4e0000x2c40x400False0.626953125GLS_BINARY_LSB_FIRST4.699885638394994IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
        DLLImport
        KERNEL32.dllCloseHandle, ConnectNamedPipe, CreateFileA, CreateNamedPipeA, CreateThread, DeleteCriticalSection, EnterCriticalSection, GetCurrentProcess, GetCurrentProcessId, GetCurrentThreadId, GetLastError, GetModuleHandleA, GetProcAddress, GetSystemTimeAsFileTime, GetTickCount, InitializeCriticalSection, LeaveCriticalSection, LoadLibraryW, QueryPerformanceCounter, ReadFile, RtlAddFunctionTable, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, SetUnhandledExceptionFilter, Sleep, TerminateProcess, TlsGetValue, UnhandledExceptionFilter, VirtualAlloc, VirtualProtect, VirtualQuery, WriteFile
        msvcrt.dll__dllonexit, __iob_func, _amsg_exit, _initterm, _lock, _onexit, _unlock, abort, calloc, free, fwrite, malloc, memcpy, signal, sprintf, strlen, strncmp, vfprintf
        NameOrdinalAddress
        DllGetClassObject10x6bac170b
        DllMain20x6bac16c7
        DllRegisterServer30x6bac1705
        DllUnregisterServer40x6bac1708
        StartW50x6bac1714
        TimestampSource PortDest PortSource IPDest IP
        Jan 8, 2023 16:10:04.046937943 CET496998082192.168.2.520.104.209.69
        Jan 8, 2023 16:10:04.161695004 CET80824969920.104.209.69192.168.2.5
        Jan 8, 2023 16:10:04.162079096 CET496998082192.168.2.520.104.209.69
        Jan 8, 2023 16:10:04.162940025 CET496998082192.168.2.520.104.209.69
        Jan 8, 2023 16:10:04.276777983 CET80824969920.104.209.69192.168.2.5
        Jan 8, 2023 16:10:04.281196117 CET80824969920.104.209.69192.168.2.5
        Jan 8, 2023 16:10:04.281222105 CET80824969920.104.209.69192.168.2.5
        Jan 8, 2023 16:10:04.281239986 CET80824969920.104.209.69192.168.2.5
        Jan 8, 2023 16:10:04.281378031 CET496998082192.168.2.520.104.209.69
        Jan 8, 2023 16:10:04.292589903 CET496998082192.168.2.520.104.209.69
        Jan 8, 2023 16:10:04.406682968 CET80824969920.104.209.69192.168.2.5
        Jan 8, 2023 16:10:36.778028965 CET497008082192.168.2.520.104.209.69
        Jan 8, 2023 16:10:36.892846107 CET80824970020.104.209.69192.168.2.5
        Jan 8, 2023 16:10:36.893060923 CET497008082192.168.2.520.104.209.69
        Jan 8, 2023 16:10:36.902221918 CET497008082192.168.2.520.104.209.69
        Jan 8, 2023 16:10:37.016406059 CET80824970020.104.209.69192.168.2.5
        Jan 8, 2023 16:10:37.028742075 CET80824970020.104.209.69192.168.2.5
        Jan 8, 2023 16:10:37.028786898 CET80824970020.104.209.69192.168.2.5
        Jan 8, 2023 16:10:37.028812885 CET80824970020.104.209.69192.168.2.5
        Jan 8, 2023 16:10:37.028836012 CET80824970020.104.209.69192.168.2.5
        Jan 8, 2023 16:10:37.028846979 CET497008082192.168.2.520.104.209.69
        Jan 8, 2023 16:10:37.028861046 CET80824970020.104.209.69192.168.2.5
        Jan 8, 2023 16:10:37.028884888 CET497008082192.168.2.520.104.209.69
        Jan 8, 2023 16:10:37.028887033 CET80824970020.104.209.69192.168.2.5
        Jan 8, 2023 16:10:37.028913021 CET80824970020.104.209.69192.168.2.5
        Jan 8, 2023 16:10:37.028928995 CET497008082192.168.2.520.104.209.69
        Jan 8, 2023 16:10:37.028937101 CET80824970020.104.209.69192.168.2.5
        Jan 8, 2023 16:10:37.028956890 CET80824970020.104.209.69192.168.2.5
        Jan 8, 2023 16:10:37.028974056 CET80824970020.104.209.69192.168.2.5
        Jan 8, 2023 16:10:37.029061079 CET497008082192.168.2.520.104.209.69
        Jan 8, 2023 16:10:37.143208981 CET80824970020.104.209.69192.168.2.5
        Jan 8, 2023 16:10:37.143250942 CET80824970020.104.209.69192.168.2.5
        Jan 8, 2023 16:10:37.143270016 CET80824970020.104.209.69192.168.2.5
        Jan 8, 2023 16:10:37.143287897 CET80824970020.104.209.69192.168.2.5
        Jan 8, 2023 16:10:37.143311977 CET80824970020.104.209.69192.168.2.5
        Jan 8, 2023 16:10:37.143332958 CET80824970020.104.209.69192.168.2.5
        Jan 8, 2023 16:10:37.143352032 CET80824970020.104.209.69192.168.2.5
        Jan 8, 2023 16:10:37.143369913 CET80824970020.104.209.69192.168.2.5
        Jan 8, 2023 16:10:37.143368959 CET497008082192.168.2.520.104.209.69
        Jan 8, 2023 16:10:37.143389940 CET80824970020.104.209.69192.168.2.5
        Jan 8, 2023 16:10:37.143409967 CET80824970020.104.209.69192.168.2.5
        Jan 8, 2023 16:10:37.143428087 CET80824970020.104.209.69192.168.2.5
        Jan 8, 2023 16:10:37.143429041 CET497008082192.168.2.520.104.209.69
        Jan 8, 2023 16:10:37.143450975 CET80824970020.104.209.69192.168.2.5
        Jan 8, 2023 16:10:37.143457890 CET497008082192.168.2.520.104.209.69
        Jan 8, 2023 16:10:37.143475056 CET80824970020.104.209.69192.168.2.5
        Jan 8, 2023 16:10:37.143486023 CET497008082192.168.2.520.104.209.69
        Jan 8, 2023 16:10:37.143493891 CET80824970020.104.209.69192.168.2.5
        Jan 8, 2023 16:10:37.143513918 CET80824970020.104.209.69192.168.2.5
        Jan 8, 2023 16:10:37.143521070 CET497008082192.168.2.520.104.209.69
        Jan 8, 2023 16:10:37.143532991 CET80824970020.104.209.69192.168.2.5
        Jan 8, 2023 16:10:37.143560886 CET497008082192.168.2.520.104.209.69
        Jan 8, 2023 16:10:37.143603086 CET497008082192.168.2.520.104.209.69
        Jan 8, 2023 16:10:37.143801928 CET80824970020.104.209.69192.168.2.5
        Jan 8, 2023 16:10:37.143826008 CET80824970020.104.209.69192.168.2.5
        Jan 8, 2023 16:10:37.143846035 CET80824970020.104.209.69192.168.2.5
        Jan 8, 2023 16:10:37.143852949 CET497008082192.168.2.520.104.209.69
        Jan 8, 2023 16:10:37.143867970 CET80824970020.104.209.69192.168.2.5
        Jan 8, 2023 16:10:37.143888950 CET497008082192.168.2.520.104.209.69
        Jan 8, 2023 16:10:37.143919945 CET497008082192.168.2.520.104.209.69
        Jan 8, 2023 16:10:37.257618904 CET80824970020.104.209.69192.168.2.5
        Jan 8, 2023 16:10:37.257693052 CET80824970020.104.209.69192.168.2.5
        Jan 8, 2023 16:10:37.257721901 CET80824970020.104.209.69192.168.2.5
        Jan 8, 2023 16:10:37.257751942 CET80824970020.104.209.69192.168.2.5
        Jan 8, 2023 16:10:37.257778883 CET80824970020.104.209.69192.168.2.5
        Jan 8, 2023 16:10:37.257806063 CET80824970020.104.209.69192.168.2.5
        Jan 8, 2023 16:10:37.257811069 CET497008082192.168.2.520.104.209.69
        Jan 8, 2023 16:10:37.257833958 CET80824970020.104.209.69192.168.2.5
        Jan 8, 2023 16:10:37.257854939 CET497008082192.168.2.520.104.209.69
        Jan 8, 2023 16:10:37.257863045 CET80824970020.104.209.69192.168.2.5
        Jan 8, 2023 16:10:37.257879972 CET497008082192.168.2.520.104.209.69
        Jan 8, 2023 16:10:37.257893085 CET80824970020.104.209.69192.168.2.5
        Jan 8, 2023 16:10:37.257903099 CET497008082192.168.2.520.104.209.69
        Jan 8, 2023 16:10:37.257914066 CET497008082192.168.2.520.104.209.69
        Jan 8, 2023 16:10:37.257924080 CET80824970020.104.209.69192.168.2.5
        Jan 8, 2023 16:10:37.257937908 CET497008082192.168.2.520.104.209.69
        Jan 8, 2023 16:10:37.257952929 CET80824970020.104.209.69192.168.2.5
        Jan 8, 2023 16:10:37.257982016 CET497008082192.168.2.520.104.209.69
        Jan 8, 2023 16:10:37.257982016 CET80824970020.104.209.69192.168.2.5
        Jan 8, 2023 16:10:37.258012056 CET80824970020.104.209.69192.168.2.5
        Jan 8, 2023 16:10:37.258012056 CET497008082192.168.2.520.104.209.69
        Jan 8, 2023 16:10:37.258038044 CET497008082192.168.2.520.104.209.69
        Jan 8, 2023 16:10:37.258038998 CET80824970020.104.209.69192.168.2.5
        Jan 8, 2023 16:10:37.258059978 CET497008082192.168.2.520.104.209.69
        Jan 8, 2023 16:10:37.258065939 CET80824970020.104.209.69192.168.2.5
        Jan 8, 2023 16:10:37.258094072 CET497008082192.168.2.520.104.209.69
        Jan 8, 2023 16:10:37.258094072 CET80824970020.104.209.69192.168.2.5
        Jan 8, 2023 16:10:37.258122921 CET80824970020.104.209.69192.168.2.5
        Jan 8, 2023 16:10:37.258126974 CET497008082192.168.2.520.104.209.69
        Jan 8, 2023 16:10:37.258152008 CET80824970020.104.209.69192.168.2.5
        Jan 8, 2023 16:10:37.258162975 CET497008082192.168.2.520.104.209.69
        Jan 8, 2023 16:10:37.258178949 CET80824970020.104.209.69192.168.2.5
        Jan 8, 2023 16:10:37.258200884 CET497008082192.168.2.520.104.209.69
        Jan 8, 2023 16:10:37.258204937 CET80824970020.104.209.69192.168.2.5
        Jan 8, 2023 16:10:37.258210897 CET497008082192.168.2.520.104.209.69
        Jan 8, 2023 16:10:37.258219957 CET497008082192.168.2.520.104.209.69
        Jan 8, 2023 16:10:37.258234024 CET80824970020.104.209.69192.168.2.5
        Jan 8, 2023 16:10:37.258249998 CET497008082192.168.2.520.104.209.69
        Jan 8, 2023 16:10:37.258263111 CET80824970020.104.209.69192.168.2.5
        Jan 8, 2023 16:10:37.258279085 CET497008082192.168.2.520.104.209.69
        • https:
          • 20.104.209.69:8082

        Click to jump to process

        Target ID:0
        Start time:16:09:52
        Start date:08/01/2023
        Path:C:\Windows\System32\loaddll64.exe
        Wow64 process (32bit):false
        Commandline:loaddll64.exe "C:\Users\user\Desktop\8082-x64.dll.dll"
        Imagebase:0x7ff6c0910000
        File size:139776 bytes
        MD5 hash:C676FC0263EDD17D4CE7D644B8F3FCD6
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Yara matches:
        • Rule: SUSP_PS1_FromBase64String_Content_Indicator, Description: Detects suspicious base64 encoded PowerShell expressions, Source: 00000000.00000002.579279943.00000267603C6000.00000004.00000001.00020000.00000000.sdmp, Author: Florian Roth
        • Rule: CobaltStrike_Resources_Command_Ps1_v2_5_to_v3_7_and_Resources_Compress_Ps1_v3_8_to_v4_x, Description: Cobalt Strike\'s resources/command.ps1 for versions 2.5 to v3.7 and resources/compress.ps1 from v3.8 to v4.x, Source: 00000000.00000002.579279943.00000267603C6000.00000004.00000001.00020000.00000000.sdmp, Author: gssincla@google.com
        • Rule: CobaltStrike_Sleeve_BeaconLoader_VA_x64_o_v4_3_v4_4_v4_5_and_v4_6, Description: Cobalt Strike\'s sleeve/BeaconLoader.VA.x64.o (VirtualAlloc) Versions 4.3 through at least 4.6, Source: 00000000.00000003.323615011.0000026760590000.00000020.00001000.00020000.00000000.sdmp, Author: gssincla@google.com
        • Rule: Cobaltbaltstrike_Beacon_x64, Description: Detects CobaltStrike payloads, Source: 00000000.00000003.323615011.0000026760590000.00000020.00001000.00020000.00000000.sdmp, Author: Avast Threat Intel Team
        • Rule: CobaltStrike_C2_Encoded_XOR_Config_Indicator, Description: Detects CobaltStrike C2 encoded profile configuration, Source: 00000000.00000003.323615011.0000026760590000.00000020.00001000.00020000.00000000.sdmp, Author: yara@s3c.za.net
        • Rule: CobaltStrike_MZ_Launcher, Description: Detects CobaltStrike MZ header ReflectiveLoader launcher, Source: 00000000.00000003.323615011.0000026760590000.00000020.00001000.00020000.00000000.sdmp, Author: yara@s3c.za.net
        • Rule: SUSP_XORed_Mozilla, Description: Detects suspicious single byte XORed keyword \'Mozilla/5.0\' - it uses yara\'s XOR modifier and therefore cannot print the XOR key. You can use the CyberChef recipe linked in the reference field to brute force the used key., Source: 00000000.00000003.323615011.0000026760590000.00000020.00001000.00020000.00000000.sdmp, Author: Florian Roth
        • Rule: JoeSecurity_CobaltStrike_2, Description: Yara detected CobaltStrike, Source: 00000000.00000003.323615011.0000026760590000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
        • Rule: JoeSecurity_CobaltStrike_4, Description: Yara detected CobaltStrike, Source: 00000000.00000003.323615011.0000026760590000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
        • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000000.00000003.323615011.0000026760590000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
        • Rule: Windows_Trojan_CobaltStrike_f0b627fc, Description: Rule for beacon reflective loader, Source: 00000000.00000003.323615011.0000026760590000.00000020.00001000.00020000.00000000.sdmp, Author: unknown
        Reputation:high

        Target ID:1
        Start time:16:09:52
        Start date:08/01/2023
        Path:C:\Windows\System32\conhost.exe
        Wow64 process (32bit):false
        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Imagebase:0x7ff7fcd70000
        File size:625664 bytes
        MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high

        Target ID:2
        Start time:16:09:53
        Start date:08/01/2023
        Path:C:\Windows\System32\cmd.exe
        Wow64 process (32bit):false
        Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\8082-x64.dll.dll",#1
        Imagebase:0x7ff627730000
        File size:273920 bytes
        MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high

        Target ID:3
        Start time:16:09:53
        Start date:08/01/2023
        Path:C:\Windows\System32\regsvr32.exe
        Wow64 process (32bit):false
        Commandline:regsvr32.exe /s C:\Users\user\Desktop\8082-x64.dll.dll
        Imagebase:0x7ff7ffce0000
        File size:24064 bytes
        MD5 hash:D78B75FC68247E8A63ACBA846182740E
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high

        Target ID:4
        Start time:16:09:53
        Start date:08/01/2023
        Path:C:\Windows\System32\rundll32.exe
        Wow64 process (32bit):false
        Commandline:rundll32.exe "C:\Users\user\Desktop\8082-x64.dll.dll",#1
        Imagebase:0x7ff7a6a20000
        File size:69632 bytes
        MD5 hash:73C519F050C20580F8A62C849D49215A
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high

        Target ID:5
        Start time:16:09:53
        Start date:08/01/2023
        Path:C:\Windows\System32\rundll32.exe
        Wow64 process (32bit):false
        Commandline:rundll32.exe C:\Users\user\Desktop\8082-x64.dll.dll,DllGetClassObject
        Imagebase:0x7ff7a6a20000
        File size:69632 bytes
        MD5 hash:73C519F050C20580F8A62C849D49215A
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high

        Target ID:6
        Start time:16:09:56
        Start date:08/01/2023
        Path:C:\Windows\System32\rundll32.exe
        Wow64 process (32bit):false
        Commandline:rundll32.exe C:\Users\user\Desktop\8082-x64.dll.dll,DllMain
        Imagebase:0x7ff7a6a20000
        File size:69632 bytes
        MD5 hash:73C519F050C20580F8A62C849D49215A
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high

        Target ID:7
        Start time:16:09:59
        Start date:08/01/2023
        Path:C:\Windows\System32\rundll32.exe
        Wow64 process (32bit):false
        Commandline:rundll32.exe C:\Users\user\Desktop\8082-x64.dll.dll,DllRegisterServer
        Imagebase:0x7ff7a6a20000
        File size:69632 bytes
        MD5 hash:73C519F050C20580F8A62C849D49215A
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language

        No disassembly