Analysis Overview
SHA256
981937eb90959c86e2b12957dcf4b606ff503ef098d20fff0a0cc286f9b07425
Threat Level: Likely benign
The file 981937eb90959c86e2b12957dcf4b606ff503ef098d20fff0a0cc286f9b07425 was found to be: Likely benign.
Malicious Activity Summary
Command and Scripting Interpreter: JavaScript
Unsigned PE
Suspicious use of WriteProcessMemory
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-06-11 04:45
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Analysis: behavioral3
Detonation Overview
Submitted
2024-06-11 04:45
Reported
2024-06-11 04:48
Platform
win7-20240419-en
Max time kernel
118s
Max time network
119s
Command Line
Signatures
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 1936 wrote to memory of 1764 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 1936 wrote to memory of 1764 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 1936 wrote to memory of 1764 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 1936 wrote to memory of 1764 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 1936 wrote to memory of 1764 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 1936 wrote to memory of 1764 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 1936 wrote to memory of 1764 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\ApiBreakpoint-main\ApiBreakPoint\output\ApiBreakPoint.dll,#1
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\ApiBreakpoint-main\ApiBreakPoint\output\ApiBreakPoint.dll,#1
Network
Files
memory/1764-0-0x0000000074E20000-0x0000000074F7A000-memory.dmp
Analysis: behavioral7
Detonation Overview
Submitted
2024-06-11 04:45
Reported
2024-06-11 04:48
Platform
win7-20240508-en
Max time kernel
117s
Max time network
122s
Command Line
Signatures
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 1712 wrote to memory of 2392 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 1712 wrote to memory of 2392 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 1712 wrote to memory of 2392 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 1712 wrote to memory of 2392 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 1712 wrote to memory of 2392 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 1712 wrote to memory of 2392 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 1712 wrote to memory of 2392 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\ApiBreakpoint-main\ApiBreakPoint\output\ApiBreakPoint_CN.dll,#1
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\ApiBreakpoint-main\ApiBreakPoint\output\ApiBreakPoint_CN.dll,#1
Network
Files
memory/2392-0-0x0000000074BE0000-0x0000000074D36000-memory.dmp
Analysis: behavioral18
Detonation Overview
Submitted
2024-06-11 04:45
Reported
2024-06-11 04:48
Platform
win10v2004-20240508-en
Max time kernel
51s
Max time network
53s
Command Line
Signatures
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 3216 wrote to memory of 4936 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 3216 wrote to memory of 4936 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 3216 wrote to memory of 4936 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\ApiBreakPoint_CN.dll,#1
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\ApiBreakPoint_CN.dll,#1
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
Files
memory/4936-0-0x0000000074BC0000-0x0000000074D16000-memory.dmp
Analysis: behavioral13
Detonation Overview
Submitted
2024-06-11 04:45
Reported
2024-06-11 04:48
Platform
win7-20240220-en
Max time kernel
120s
Max time network
121s
Command Line
Signatures
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\ApiBreakpoint-main\ApiBreakPoint\output\ApiBreakPoint_EN.dll,#1
Network
Files
memory/3036-1-0x000007FEF5CE0000-0x000007FEF5EAC000-memory.dmp
memory/3036-0-0x000007FEF5EB0000-0x000007FEF607C000-memory.dmp
Analysis: behavioral1
Detonation Overview
Submitted
2024-06-11 04:45
Reported
2024-06-11 04:48
Platform
win7-20240221-en
Max time kernel
122s
Max time network
126s
Command Line
Signatures
Command and Scripting Interpreter: JavaScript
Processes
C:\Windows\system32\wscript.exe
wscript.exe C:\Users\Admin\AppData\Local\Temp\ApiBreakpoint-main\ApiBreakPoint\ApiBreakPoint\pluginmain.js
Network
Files
Analysis: behavioral2
Detonation Overview
Submitted
2024-06-11 04:45
Reported
2024-06-11 04:48
Platform
win10v2004-20240426-en
Max time kernel
149s
Max time network
151s
Command Line
Signatures
Command and Scripting Interpreter: JavaScript
Processes
C:\Windows\system32\wscript.exe
wscript.exe C:\Users\Admin\AppData\Local\Temp\ApiBreakpoint-main\ApiBreakPoint\ApiBreakPoint\pluginmain.js
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 196.249.167.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 241.150.49.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 183.59.114.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 206.23.85.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 14.227.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | udp |
Files
Analysis: behavioral4
Detonation Overview
Submitted
2024-06-11 04:45
Reported
2024-06-11 04:48
Platform
win10v2004-20240508-en
Max time kernel
146s
Max time network
154s
Command Line
Signatures
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 1868 wrote to memory of 3060 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 1868 wrote to memory of 3060 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 1868 wrote to memory of 3060 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\ApiBreakpoint-main\ApiBreakPoint\output\ApiBreakPoint.dll,#1
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\ApiBreakpoint-main\ApiBreakPoint\output\ApiBreakPoint.dll,#1
Network
Files
memory/3060-0-0x00000000751B0000-0x000000007530A000-memory.dmp
Analysis: behavioral5
Detonation Overview
Submitted
2024-06-11 04:45
Reported
2024-06-11 04:48
Platform
win7-20240419-en
Max time kernel
119s
Max time network
120s
Command Line
Signatures
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\ApiBreakpoint-main\ApiBreakPoint\output\ApiBreakPoint.dll,#1
Network
Files
memory/1632-0-0x000007FEF59C0000-0x000007FEF5B97000-memory.dmp
Analysis: behavioral6
Detonation Overview
Submitted
2024-06-11 04:45
Reported
2024-06-11 04:48
Platform
win10v2004-20240426-en
Max time kernel
134s
Max time network
139s
Command Line
Signatures
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\ApiBreakpoint-main\ApiBreakPoint\output\ApiBreakPoint.dll,#1
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 58.55.71.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 10.160.77.104.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 68.32.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 196.249.167.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 183.59.114.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 206.23.85.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 31.243.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 213.143.182.52.in-addr.arpa | udp |
Files
memory/4848-0-0x00007FFA59570000-0x00007FFA59747000-memory.dmp
Analysis: behavioral14
Detonation Overview
Submitted
2024-06-11 04:45
Reported
2024-06-11 04:48
Platform
win10v2004-20240508-en
Max time kernel
147s
Max time network
150s
Command Line
Signatures
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\ApiBreakpoint-main\ApiBreakPoint\output\ApiBreakPoint_EN.dll,#1
Network
| Country | Destination | Domain | Proto |
| US | 23.53.113.159:80 | tcp |
Files
memory/4352-0-0x00007FFF676E0000-0x00007FFF678AC000-memory.dmp
Analysis: behavioral16
Detonation Overview
Submitted
2024-06-11 04:45
Reported
2024-06-11 04:48
Platform
win10v2004-20240226-en
Max time kernel
141s
Max time network
159s
Command Line
Signatures
Processes
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ApiBreakpoint-main\ApiBreakPoint\output\copy.bat"
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4092 --field-trial-handle=2256,i,6670388345726423024,18382795228658886258,262144 --variations-seed-version /prefetch:8
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 217.106.137.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| US | 20.231.121.79:80 | tcp | |
| US | 8.8.8.8:53 | 2.159.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 183.142.211.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 183.59.114.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 206.23.85.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 232.168.11.51.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 10.160.77.104.in-addr.arpa | udp |
| US | 8.8.8.8:53 | chromewebstore.googleapis.com | udp |
| US | 8.8.8.8:53 | chromewebstore.googleapis.com | udp |
| GB | 172.217.169.74:443 | chromewebstore.googleapis.com | tcp |
| US | 8.8.8.8:53 | 74.169.217.172.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 14.227.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 24.173.189.20.in-addr.arpa | udp |
Files
Analysis: behavioral17
Detonation Overview
Submitted
2024-06-11 04:45
Reported
2024-06-11 04:48
Platform
win7-20240508-en
Max time kernel
119s
Max time network
124s
Command Line
Signatures
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 2024 wrote to memory of 1508 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 2024 wrote to memory of 1508 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 2024 wrote to memory of 1508 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 2024 wrote to memory of 1508 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 2024 wrote to memory of 1508 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 2024 wrote to memory of 1508 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 2024 wrote to memory of 1508 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\ApiBreakPoint_CN.dll,#1
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\ApiBreakPoint_CN.dll,#1
Network
Files
memory/1508-0-0x0000000074D20000-0x0000000074E76000-memory.dmp
memory/1508-1-0x0000000074D20000-0x0000000074E76000-memory.dmp
Analysis: behavioral19
Detonation Overview
Submitted
2024-06-11 04:45
Reported
2024-06-11 04:48
Platform
win7-20240419-en
Max time kernel
119s
Max time network
119s
Command Line
Signatures
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\ApiBreakPoint_CN.dll,#1
Network
Files
memory/2432-0-0x000007FEF65F0000-0x000007FEF67BD000-memory.dmp
Analysis: behavioral20
Detonation Overview
Submitted
2024-06-11 04:45
Reported
2024-06-11 04:48
Platform
win10v2004-20240426-en
Max time kernel
149s
Max time network
151s
Command Line
Signatures
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\ApiBreakPoint_CN.dll,#1
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 217.106.137.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 2.159.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 58.55.71.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 196.249.167.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 183.59.114.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 206.23.85.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 14.227.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 24.173.189.20.in-addr.arpa | udp |
Files
memory/1584-0-0x00007FFBBB000000-0x00007FFBBB1CD000-memory.dmp
Analysis: behavioral21
Detonation Overview
Submitted
2024-06-11 04:45
Reported
2024-06-11 04:48
Platform
win7-20231129-en
Max time kernel
120s
Max time network
122s
Command Line
Signatures
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 2200 wrote to memory of 1036 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 2200 wrote to memory of 1036 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 2200 wrote to memory of 1036 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 2200 wrote to memory of 1036 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 2200 wrote to memory of 1036 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 2200 wrote to memory of 1036 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 2200 wrote to memory of 1036 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\ApiBreakPoint_EN.dll,#1
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\ApiBreakPoint_EN.dll,#1
Network
Files
memory/1036-1-0x0000000074C50000-0x0000000074DA5000-memory.dmp
memory/1036-0-0x0000000074DB0000-0x0000000074F05000-memory.dmp
Analysis: behavioral22
Detonation Overview
Submitted
2024-06-11 04:45
Reported
2024-06-11 04:48
Platform
win10v2004-20240426-en
Max time kernel
134s
Max time network
143s
Command Line
Signatures
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 3528 wrote to memory of 3716 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 3528 wrote to memory of 3716 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 3528 wrote to memory of 3716 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\ApiBreakPoint_EN.dll,#1
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\ApiBreakPoint_EN.dll,#1
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 58.55.71.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 10.160.77.104.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 68.32.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 183.142.211.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 206.23.85.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 86.23.85.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 30.243.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 175.117.168.52.in-addr.arpa | udp |
Files
memory/3716-0-0x0000000074D50000-0x0000000074EA5000-memory.dmp
Analysis: behavioral23
Detonation Overview
Submitted
2024-06-11 04:45
Reported
2024-06-11 04:48
Platform
win7-20240221-en
Max time kernel
121s
Max time network
125s
Command Line
Signatures
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\ApiBreakPoint_EN.dll,#1
Network
Files
memory/1116-1-0x000007FEF6270000-0x000007FEF643C000-memory.dmp
memory/1116-0-0x000007FEF6440000-0x000007FEF660C000-memory.dmp
Analysis: behavioral24
Detonation Overview
Submitted
2024-06-11 04:45
Reported
2024-06-11 04:48
Platform
win10v2004-20240508-en
Max time kernel
51s
Max time network
53s
Command Line
Signatures
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\ApiBreakPoint_EN.dll,#1
Network
Files
memory/2200-0-0x00007FFEF8AC0000-0x00007FFEF8C8C000-memory.dmp
Analysis: behavioral11
Detonation Overview
Submitted
2024-06-11 04:45
Reported
2024-06-11 04:48
Platform
win7-20231129-en
Max time kernel
118s
Max time network
119s
Command Line
Signatures
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 2528 wrote to memory of 2384 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 2528 wrote to memory of 2384 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 2528 wrote to memory of 2384 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 2528 wrote to memory of 2384 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 2528 wrote to memory of 2384 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 2528 wrote to memory of 2384 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 2528 wrote to memory of 2384 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\ApiBreakpoint-main\ApiBreakPoint\output\ApiBreakPoint_EN.dll,#1
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\ApiBreakpoint-main\ApiBreakPoint\output\ApiBreakPoint_EN.dll,#1
Network
Files
memory/2384-0-0x00000000745F0000-0x0000000074745000-memory.dmp
memory/2384-1-0x0000000074890000-0x00000000749E5000-memory.dmp
Analysis: behavioral12
Detonation Overview
Submitted
2024-06-11 04:45
Reported
2024-06-11 04:48
Platform
win10v2004-20240508-en
Max time kernel
51s
Max time network
55s
Command Line
Signatures
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 224 wrote to memory of 116 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 224 wrote to memory of 116 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 224 wrote to memory of 116 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\ApiBreakpoint-main\ApiBreakPoint\output\ApiBreakPoint_EN.dll,#1
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\ApiBreakpoint-main\ApiBreakPoint\output\ApiBreakPoint_EN.dll,#1
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
Files
memory/116-0-0x0000000075260000-0x00000000753B5000-memory.dmp
Analysis: behavioral8
Detonation Overview
Submitted
2024-06-11 04:45
Reported
2024-06-11 04:48
Platform
win10v2004-20240426-en
Max time kernel
93s
Max time network
144s
Command Line
Signatures
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 4552 wrote to memory of 1576 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 4552 wrote to memory of 1576 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 4552 wrote to memory of 1576 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\ApiBreakpoint-main\ApiBreakPoint\output\ApiBreakPoint_CN.dll,#1
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\ApiBreakpoint-main\ApiBreakPoint\output\ApiBreakPoint_CN.dll,#1
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 241.150.49.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 2.159.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 58.55.71.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 86.23.85.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 171.39.242.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 10.160.77.104.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 13.227.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 6.160.77.104.in-addr.arpa | udp |
Files
memory/1576-0-0x0000000074F60000-0x00000000750B6000-memory.dmp
Analysis: behavioral9
Detonation Overview
Submitted
2024-06-11 04:45
Reported
2024-06-11 04:48
Platform
win7-20240221-en
Max time kernel
117s
Max time network
120s
Command Line
Signatures
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\ApiBreakpoint-main\ApiBreakPoint\output\ApiBreakPoint_CN.dll,#1
Network
Files
memory/2076-0-0x000007FEF59C0000-0x000007FEF5B8D000-memory.dmp
Analysis: behavioral10
Detonation Overview
Submitted
2024-06-11 04:45
Reported
2024-06-11 04:48
Platform
win10v2004-20240426-en
Max time kernel
92s
Max time network
103s
Command Line
Signatures
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\ApiBreakpoint-main\ApiBreakPoint\output\ApiBreakPoint_CN.dll,#1
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 241.150.49.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 68.32.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 196.249.167.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 217.106.137.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 58.55.71.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 183.59.114.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 171.39.242.20.in-addr.arpa | udp |
Files
memory/5076-0-0x00007FF84B190000-0x00007FF84B35D000-memory.dmp
Analysis: behavioral15
Detonation Overview
Submitted
2024-06-11 04:45
Reported
2024-06-11 04:48
Platform
win7-20240221-en
Max time kernel
122s
Max time network
130s
Command Line
Signatures
Processes
C:\Windows\system32\cmd.exe
cmd /c "C:\Users\Admin\AppData\Local\Temp\ApiBreakpoint-main\ApiBreakPoint\output\copy.bat"