Malware Analysis Report

2025-08-05 22:22

Sample ID 240611-fdmyfavcpd
Target 981937eb90959c86e2b12957dcf4b606ff503ef098d20fff0a0cc286f9b07425
SHA256 981937eb90959c86e2b12957dcf4b606ff503ef098d20fff0a0cc286f9b07425
Tags
execution
score
3/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral7

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral18

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral13

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral4

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral5

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral6

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral14

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral16

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral17

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral19

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral20

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral21

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral22

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral23

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral24

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral11

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral12

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral8

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral9

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral10

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral15

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
3/10

SHA256

981937eb90959c86e2b12957dcf4b606ff503ef098d20fff0a0cc286f9b07425

Threat Level: Likely benign

The file 981937eb90959c86e2b12957dcf4b606ff503ef098d20fff0a0cc286f9b07425 was found to be: Likely benign.

Malicious Activity Summary

execution

Command and Scripting Interpreter: JavaScript

Unsigned PE

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-06-11 04:45

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Analysis: behavioral3

Detonation Overview

Submitted

2024-06-11 04:45

Reported

2024-06-11 04:48

Platform

win7-20240419-en

Max time kernel

118s

Max time network

119s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\ApiBreakpoint-main\ApiBreakPoint\output\ApiBreakPoint.dll,#1

Signatures

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1936 wrote to memory of 1764 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 1936 wrote to memory of 1764 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 1936 wrote to memory of 1764 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 1936 wrote to memory of 1764 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 1936 wrote to memory of 1764 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 1936 wrote to memory of 1764 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 1936 wrote to memory of 1764 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\ApiBreakpoint-main\ApiBreakPoint\output\ApiBreakPoint.dll,#1

C:\Windows\SysWOW64\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\ApiBreakpoint-main\ApiBreakPoint\output\ApiBreakPoint.dll,#1

Network

N/A

Files

memory/1764-0-0x0000000074E20000-0x0000000074F7A000-memory.dmp

Analysis: behavioral7

Detonation Overview

Submitted

2024-06-11 04:45

Reported

2024-06-11 04:48

Platform

win7-20240508-en

Max time kernel

117s

Max time network

122s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\ApiBreakpoint-main\ApiBreakPoint\output\ApiBreakPoint_CN.dll,#1

Signatures

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1712 wrote to memory of 2392 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 1712 wrote to memory of 2392 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 1712 wrote to memory of 2392 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 1712 wrote to memory of 2392 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 1712 wrote to memory of 2392 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 1712 wrote to memory of 2392 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 1712 wrote to memory of 2392 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\ApiBreakpoint-main\ApiBreakPoint\output\ApiBreakPoint_CN.dll,#1

C:\Windows\SysWOW64\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\ApiBreakpoint-main\ApiBreakPoint\output\ApiBreakPoint_CN.dll,#1

Network

N/A

Files

memory/2392-0-0x0000000074BE0000-0x0000000074D36000-memory.dmp

Analysis: behavioral18

Detonation Overview

Submitted

2024-06-11 04:45

Reported

2024-06-11 04:48

Platform

win10v2004-20240508-en

Max time kernel

51s

Max time network

53s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\ApiBreakPoint_CN.dll,#1

Signatures

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3216 wrote to memory of 4936 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 3216 wrote to memory of 4936 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 3216 wrote to memory of 4936 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\ApiBreakPoint_CN.dll,#1

C:\Windows\SysWOW64\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\ApiBreakPoint_CN.dll,#1

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp

Files

memory/4936-0-0x0000000074BC0000-0x0000000074D16000-memory.dmp

Analysis: behavioral13

Detonation Overview

Submitted

2024-06-11 04:45

Reported

2024-06-11 04:48

Platform

win7-20240220-en

Max time kernel

120s

Max time network

121s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\ApiBreakpoint-main\ApiBreakPoint\output\ApiBreakPoint_EN.dll,#1

Signatures

N/A

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\ApiBreakpoint-main\ApiBreakPoint\output\ApiBreakPoint_EN.dll,#1

Network

N/A

Files

memory/3036-1-0x000007FEF5CE0000-0x000007FEF5EAC000-memory.dmp

memory/3036-0-0x000007FEF5EB0000-0x000007FEF607C000-memory.dmp

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-11 04:45

Reported

2024-06-11 04:48

Platform

win7-20240221-en

Max time kernel

122s

Max time network

126s

Command Line

wscript.exe C:\Users\Admin\AppData\Local\Temp\ApiBreakpoint-main\ApiBreakPoint\ApiBreakPoint\pluginmain.js

Signatures

Command and Scripting Interpreter: JavaScript

execution

Processes

C:\Windows\system32\wscript.exe

wscript.exe C:\Users\Admin\AppData\Local\Temp\ApiBreakpoint-main\ApiBreakPoint\ApiBreakPoint\pluginmain.js

Network

N/A

Files

N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-11 04:45

Reported

2024-06-11 04:48

Platform

win10v2004-20240426-en

Max time kernel

149s

Max time network

151s

Command Line

wscript.exe C:\Users\Admin\AppData\Local\Temp\ApiBreakpoint-main\ApiBreakPoint\ApiBreakPoint\pluginmain.js

Signatures

Command and Scripting Interpreter: JavaScript

execution

Processes

C:\Windows\system32\wscript.exe

wscript.exe C:\Users\Admin\AppData\Local\Temp\ApiBreakpoint-main\ApiBreakPoint\ApiBreakPoint\pluginmain.js

Network

Country Destination Domain Proto
US 8.8.8.8:53 196.249.167.52.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 241.150.49.20.in-addr.arpa udp
US 8.8.8.8:53 183.59.114.20.in-addr.arpa udp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 14.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 udp

Files

N/A

Analysis: behavioral4

Detonation Overview

Submitted

2024-06-11 04:45

Reported

2024-06-11 04:48

Platform

win10v2004-20240508-en

Max time kernel

146s

Max time network

154s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\ApiBreakpoint-main\ApiBreakPoint\output\ApiBreakPoint.dll,#1

Signatures

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1868 wrote to memory of 3060 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 1868 wrote to memory of 3060 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 1868 wrote to memory of 3060 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\ApiBreakpoint-main\ApiBreakPoint\output\ApiBreakPoint.dll,#1

C:\Windows\SysWOW64\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\ApiBreakpoint-main\ApiBreakPoint\output\ApiBreakPoint.dll,#1

Network

Files

memory/3060-0-0x00000000751B0000-0x000000007530A000-memory.dmp

Analysis: behavioral5

Detonation Overview

Submitted

2024-06-11 04:45

Reported

2024-06-11 04:48

Platform

win7-20240419-en

Max time kernel

119s

Max time network

120s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\ApiBreakpoint-main\ApiBreakPoint\output\ApiBreakPoint.dll,#1

Signatures

N/A

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\ApiBreakpoint-main\ApiBreakPoint\output\ApiBreakPoint.dll,#1

Network

N/A

Files

memory/1632-0-0x000007FEF59C0000-0x000007FEF5B97000-memory.dmp

Analysis: behavioral6

Detonation Overview

Submitted

2024-06-11 04:45

Reported

2024-06-11 04:48

Platform

win10v2004-20240426-en

Max time kernel

134s

Max time network

139s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\ApiBreakpoint-main\ApiBreakPoint\output\ApiBreakPoint.dll,#1

Signatures

N/A

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\ApiBreakpoint-main\ApiBreakPoint\output\ApiBreakPoint.dll,#1

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 58.55.71.13.in-addr.arpa udp
US 8.8.8.8:53 10.160.77.104.in-addr.arpa udp
US 8.8.8.8:53 68.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 196.249.167.52.in-addr.arpa udp
US 8.8.8.8:53 183.59.114.20.in-addr.arpa udp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 31.243.111.52.in-addr.arpa udp
US 8.8.8.8:53 213.143.182.52.in-addr.arpa udp

Files

memory/4848-0-0x00007FFA59570000-0x00007FFA59747000-memory.dmp

Analysis: behavioral14

Detonation Overview

Submitted

2024-06-11 04:45

Reported

2024-06-11 04:48

Platform

win10v2004-20240508-en

Max time kernel

147s

Max time network

150s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\ApiBreakpoint-main\ApiBreakPoint\output\ApiBreakPoint_EN.dll,#1

Signatures

N/A

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\ApiBreakpoint-main\ApiBreakPoint\output\ApiBreakPoint_EN.dll,#1

Network

Country Destination Domain Proto
US 23.53.113.159:80 tcp

Files

memory/4352-0-0x00007FFF676E0000-0x00007FFF678AC000-memory.dmp

Analysis: behavioral16

Detonation Overview

Submitted

2024-06-11 04:45

Reported

2024-06-11 04:48

Platform

win10v2004-20240226-en

Max time kernel

141s

Max time network

159s

Command Line

C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ApiBreakpoint-main\ApiBreakPoint\output\copy.bat"

Signatures

N/A

Processes

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ApiBreakpoint-main\ApiBreakPoint\output\copy.bat"

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4092 --field-trial-handle=2256,i,6670388345726423024,18382795228658886258,262144 --variations-seed-version /prefetch:8

Network

Country Destination Domain Proto
US 8.8.8.8:53 217.106.137.52.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 20.231.121.79:80 tcp
US 8.8.8.8:53 2.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 183.142.211.20.in-addr.arpa udp
US 8.8.8.8:53 183.59.114.20.in-addr.arpa udp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 232.168.11.51.in-addr.arpa udp
US 8.8.8.8:53 10.160.77.104.in-addr.arpa udp
US 8.8.8.8:53 chromewebstore.googleapis.com udp
US 8.8.8.8:53 chromewebstore.googleapis.com udp
GB 172.217.169.74:443 chromewebstore.googleapis.com tcp
US 8.8.8.8:53 74.169.217.172.in-addr.arpa udp
US 8.8.8.8:53 14.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 24.173.189.20.in-addr.arpa udp

Files

N/A

Analysis: behavioral17

Detonation Overview

Submitted

2024-06-11 04:45

Reported

2024-06-11 04:48

Platform

win7-20240508-en

Max time kernel

119s

Max time network

124s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\ApiBreakPoint_CN.dll,#1

Signatures

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2024 wrote to memory of 1508 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 2024 wrote to memory of 1508 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 2024 wrote to memory of 1508 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 2024 wrote to memory of 1508 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 2024 wrote to memory of 1508 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 2024 wrote to memory of 1508 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 2024 wrote to memory of 1508 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\ApiBreakPoint_CN.dll,#1

C:\Windows\SysWOW64\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\ApiBreakPoint_CN.dll,#1

Network

N/A

Files

memory/1508-0-0x0000000074D20000-0x0000000074E76000-memory.dmp

memory/1508-1-0x0000000074D20000-0x0000000074E76000-memory.dmp

Analysis: behavioral19

Detonation Overview

Submitted

2024-06-11 04:45

Reported

2024-06-11 04:48

Platform

win7-20240419-en

Max time kernel

119s

Max time network

119s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\ApiBreakPoint_CN.dll,#1

Signatures

N/A

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\ApiBreakPoint_CN.dll,#1

Network

N/A

Files

memory/2432-0-0x000007FEF65F0000-0x000007FEF67BD000-memory.dmp

Analysis: behavioral20

Detonation Overview

Submitted

2024-06-11 04:45

Reported

2024-06-11 04:48

Platform

win10v2004-20240426-en

Max time kernel

149s

Max time network

151s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\ApiBreakPoint_CN.dll,#1

Signatures

N/A

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\ApiBreakPoint_CN.dll,#1

Network

Country Destination Domain Proto
US 8.8.8.8:53 217.106.137.52.in-addr.arpa udp
US 8.8.8.8:53 2.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 58.55.71.13.in-addr.arpa udp
US 8.8.8.8:53 196.249.167.52.in-addr.arpa udp
US 8.8.8.8:53 183.59.114.20.in-addr.arpa udp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 14.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 24.173.189.20.in-addr.arpa udp

Files

memory/1584-0-0x00007FFBBB000000-0x00007FFBBB1CD000-memory.dmp

Analysis: behavioral21

Detonation Overview

Submitted

2024-06-11 04:45

Reported

2024-06-11 04:48

Platform

win7-20231129-en

Max time kernel

120s

Max time network

122s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\ApiBreakPoint_EN.dll,#1

Signatures

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2200 wrote to memory of 1036 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 2200 wrote to memory of 1036 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 2200 wrote to memory of 1036 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 2200 wrote to memory of 1036 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 2200 wrote to memory of 1036 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 2200 wrote to memory of 1036 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 2200 wrote to memory of 1036 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\ApiBreakPoint_EN.dll,#1

C:\Windows\SysWOW64\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\ApiBreakPoint_EN.dll,#1

Network

N/A

Files

memory/1036-1-0x0000000074C50000-0x0000000074DA5000-memory.dmp

memory/1036-0-0x0000000074DB0000-0x0000000074F05000-memory.dmp

Analysis: behavioral22

Detonation Overview

Submitted

2024-06-11 04:45

Reported

2024-06-11 04:48

Platform

win10v2004-20240426-en

Max time kernel

134s

Max time network

143s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\ApiBreakPoint_EN.dll,#1

Signatures

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3528 wrote to memory of 3716 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 3528 wrote to memory of 3716 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 3528 wrote to memory of 3716 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\ApiBreakPoint_EN.dll,#1

C:\Windows\SysWOW64\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\ApiBreakPoint_EN.dll,#1

Network

Country Destination Domain Proto
US 8.8.8.8:53 58.55.71.13.in-addr.arpa udp
US 8.8.8.8:53 10.160.77.104.in-addr.arpa udp
US 8.8.8.8:53 68.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 183.142.211.20.in-addr.arpa udp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 86.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 30.243.111.52.in-addr.arpa udp
US 8.8.8.8:53 175.117.168.52.in-addr.arpa udp

Files

memory/3716-0-0x0000000074D50000-0x0000000074EA5000-memory.dmp

Analysis: behavioral23

Detonation Overview

Submitted

2024-06-11 04:45

Reported

2024-06-11 04:48

Platform

win7-20240221-en

Max time kernel

121s

Max time network

125s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\ApiBreakPoint_EN.dll,#1

Signatures

N/A

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\ApiBreakPoint_EN.dll,#1

Network

N/A

Files

memory/1116-1-0x000007FEF6270000-0x000007FEF643C000-memory.dmp

memory/1116-0-0x000007FEF6440000-0x000007FEF660C000-memory.dmp

Analysis: behavioral24

Detonation Overview

Submitted

2024-06-11 04:45

Reported

2024-06-11 04:48

Platform

win10v2004-20240508-en

Max time kernel

51s

Max time network

53s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\ApiBreakPoint_EN.dll,#1

Signatures

N/A

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\ApiBreakPoint_EN.dll,#1

Network

Files

memory/2200-0-0x00007FFEF8AC0000-0x00007FFEF8C8C000-memory.dmp

Analysis: behavioral11

Detonation Overview

Submitted

2024-06-11 04:45

Reported

2024-06-11 04:48

Platform

win7-20231129-en

Max time kernel

118s

Max time network

119s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\ApiBreakpoint-main\ApiBreakPoint\output\ApiBreakPoint_EN.dll,#1

Signatures

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2528 wrote to memory of 2384 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 2528 wrote to memory of 2384 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 2528 wrote to memory of 2384 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 2528 wrote to memory of 2384 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 2528 wrote to memory of 2384 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 2528 wrote to memory of 2384 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 2528 wrote to memory of 2384 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\ApiBreakpoint-main\ApiBreakPoint\output\ApiBreakPoint_EN.dll,#1

C:\Windows\SysWOW64\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\ApiBreakpoint-main\ApiBreakPoint\output\ApiBreakPoint_EN.dll,#1

Network

N/A

Files

memory/2384-0-0x00000000745F0000-0x0000000074745000-memory.dmp

memory/2384-1-0x0000000074890000-0x00000000749E5000-memory.dmp

Analysis: behavioral12

Detonation Overview

Submitted

2024-06-11 04:45

Reported

2024-06-11 04:48

Platform

win10v2004-20240508-en

Max time kernel

51s

Max time network

55s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\ApiBreakpoint-main\ApiBreakPoint\output\ApiBreakPoint_EN.dll,#1

Signatures

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 224 wrote to memory of 116 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 224 wrote to memory of 116 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 224 wrote to memory of 116 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\ApiBreakpoint-main\ApiBreakPoint\output\ApiBreakPoint_EN.dll,#1

C:\Windows\SysWOW64\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\ApiBreakpoint-main\ApiBreakPoint\output\ApiBreakPoint_EN.dll,#1

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp

Files

memory/116-0-0x0000000075260000-0x00000000753B5000-memory.dmp

Analysis: behavioral8

Detonation Overview

Submitted

2024-06-11 04:45

Reported

2024-06-11 04:48

Platform

win10v2004-20240426-en

Max time kernel

93s

Max time network

144s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\ApiBreakpoint-main\ApiBreakPoint\output\ApiBreakPoint_CN.dll,#1

Signatures

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4552 wrote to memory of 1576 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 4552 wrote to memory of 1576 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 4552 wrote to memory of 1576 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\ApiBreakpoint-main\ApiBreakPoint\output\ApiBreakPoint_CN.dll,#1

C:\Windows\SysWOW64\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\ApiBreakpoint-main\ApiBreakPoint\output\ApiBreakPoint_CN.dll,#1

Network

Country Destination Domain Proto
US 8.8.8.8:53 241.150.49.20.in-addr.arpa udp
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 2.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 58.55.71.13.in-addr.arpa udp
US 8.8.8.8:53 86.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 10.160.77.104.in-addr.arpa udp
US 8.8.8.8:53 13.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 6.160.77.104.in-addr.arpa udp

Files

memory/1576-0-0x0000000074F60000-0x00000000750B6000-memory.dmp

Analysis: behavioral9

Detonation Overview

Submitted

2024-06-11 04:45

Reported

2024-06-11 04:48

Platform

win7-20240221-en

Max time kernel

117s

Max time network

120s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\ApiBreakpoint-main\ApiBreakPoint\output\ApiBreakPoint_CN.dll,#1

Signatures

N/A

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\ApiBreakpoint-main\ApiBreakPoint\output\ApiBreakPoint_CN.dll,#1

Network

N/A

Files

memory/2076-0-0x000007FEF59C0000-0x000007FEF5B8D000-memory.dmp

Analysis: behavioral10

Detonation Overview

Submitted

2024-06-11 04:45

Reported

2024-06-11 04:48

Platform

win10v2004-20240426-en

Max time kernel

92s

Max time network

103s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\ApiBreakpoint-main\ApiBreakPoint\output\ApiBreakPoint_CN.dll,#1

Signatures

N/A

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\ApiBreakpoint-main\ApiBreakPoint\output\ApiBreakPoint_CN.dll,#1

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 241.150.49.20.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 68.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 196.249.167.52.in-addr.arpa udp
US 8.8.8.8:53 217.106.137.52.in-addr.arpa udp
US 8.8.8.8:53 58.55.71.13.in-addr.arpa udp
US 8.8.8.8:53 183.59.114.20.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp

Files

memory/5076-0-0x00007FF84B190000-0x00007FF84B35D000-memory.dmp

Analysis: behavioral15

Detonation Overview

Submitted

2024-06-11 04:45

Reported

2024-06-11 04:48

Platform

win7-20240221-en

Max time kernel

122s

Max time network

130s

Command Line

cmd /c "C:\Users\Admin\AppData\Local\Temp\ApiBreakpoint-main\ApiBreakPoint\output\copy.bat"

Signatures

N/A

Processes

C:\Windows\system32\cmd.exe

cmd /c "C:\Users\Admin\AppData\Local\Temp\ApiBreakpoint-main\ApiBreakPoint\output\copy.bat"

Network

N/A

Files

N/A