Archive com/mxgraph/util/package.html @ cobaltstrike-client.jar

Size 28.6KB
Type ELF 32-bit LSB shared object, Intel 80386, version 1 (SYSV), dynamically linked, BuildID[sha1]=20eb4695b414d7ba3bfbb6917ef8c08c2f0ac837, with debug_info, not stripped
MD5 a2c0fd7a0c92afce496f27b6ec8898b7
SHA1 d9924b892c822dcb4e04fe0fa994a65f873b0ea5
SHA256 50153b97cf9d1c159e6237d036cc4348a9513ac6f569452fa247a8cb1f9e46cd
SHA512
df0ef40a070049e32adb1be1ebeeb26553fac6666030cb0d7e43c836ee6fefa6ac20d89f0d4a5c539b7ac4d7fb8fe3cac63ac81424c505d8c417054cd3b5205d
CRC32 B866823D
ssdeep None
Yara None matched

Score

This archive shows some signs of potential malicious behavior.

The score of this archive is 1.1 out of 10.

Please notice: The scoring system is currently still in development and should be considered an alpha feature.


Feedback

Expecting different results? Send us this analysis and we will inspect it. Click here

Information on Execution

Analysis
Category Started Completed Duration Routing Logs
ARCHIVE Sept. 6, 2025, 3:29 a.m. Sept. 6, 2025, 3:30 a.m. 65 seconds internet Show Analyzer Log
Show Cuckoo Log

Analyzer Log

2025-09-06 03:29:04,015 [analyzer] DEBUG: Starting analyzer from: C:\tmpwwr_kc
2025-09-06 03:29:04,030 [analyzer] DEBUG: Pipe server name: \??\PIPE\tZjQkajzRCQPQSYbgSLDRTvQksXqQ
2025-09-06 03:29:04,030 [analyzer] DEBUG: Log pipe server name: \??\PIPE\BeMCCdoKJKoSOmjqlyhwdAJ
2025-09-06 03:29:04,312 [analyzer] DEBUG: Started auxiliary module Curtain
2025-09-06 03:29:04,312 [analyzer] DEBUG: Started auxiliary module DbgView
2025-09-06 03:29:04,765 [analyzer] DEBUG: Started auxiliary module Disguise
2025-09-06 03:29:04,967 [analyzer] DEBUG: Loaded monitor into process with pid 504
2025-09-06 03:29:04,967 [analyzer] DEBUG: Started auxiliary module DumpTLSMasterSecrets
2025-09-06 03:29:04,967 [analyzer] DEBUG: Started auxiliary module Human
2025-09-06 03:29:04,967 [analyzer] DEBUG: Started auxiliary module InstallCertificate
2025-09-06 03:29:04,967 [analyzer] DEBUG: Started auxiliary module Reboot
2025-09-06 03:29:05,046 [analyzer] DEBUG: Started auxiliary module RecentFiles
2025-09-06 03:29:05,046 [analyzer] DEBUG: Started auxiliary module Screenshots
2025-09-06 03:29:05,062 [analyzer] DEBUG: Started auxiliary module Sysmon
2025-09-06 03:29:05,062 [analyzer] DEBUG: Started auxiliary module LoadZer0m0n
2025-09-06 03:29:05,187 [lib.api.process] INFO: Successfully executed process from path 'C:\\Program Files\\Internet Explorer\\iexplore.exe' with arguments ['C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\com/mxgraph/util/package.html'] and pid 1972
2025-09-06 03:29:05,328 [analyzer] DEBUG: Loaded monitor into process with pid 1972
2025-09-06 03:29:07,015 [analyzer] DEBUG: Following legitimate IE11 process: "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1972 CREDAT:275457 /prefetch:2!
2025-09-06 03:29:07,108 [analyzer] INFO: Injected into process with pid 2220 and name u'iexplore.exe'
2025-09-06 03:29:07,203 [lib.api.process] ERROR: Failed to dump memory of 32-bit process with pid 2220.
2025-09-06 03:29:07,358 [analyzer] INFO: Added new file to list with pid 1972 and path C:\Users\Administrator\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{DFFE98E7-8AC0-11F0-BE61-98A3C40DCB83}.dat
2025-09-06 03:29:07,390 [analyzer] DEBUG: Loaded monitor into process with pid 2220
2025-09-06 03:29:07,405 [analyzer] INFO: Added new file to list with pid 1972 and path C:\Users\Administrator\AppData\Local\Temp\~DFE6AC6BE7CDB85A00.TMP
2025-09-06 03:29:07,640 [analyzer] DEBUG: Error resolving function mshtml!CDocument_write through our custom callback.
2025-09-06 03:29:07,640 [analyzer] DEBUG: Error resolving function mshtml!CElement_put_innerHTML through our custom callback.
2025-09-06 03:29:07,640 [analyzer] DEBUG: Error resolving function mshtml!CHyperlink_SetUrlComponent through our custom callback.
2025-09-06 03:29:07,655 [analyzer] DEBUG: Error resolving function mshtml!CIFrameElement_CreateElement through our custom callback.
2025-09-06 03:29:07,655 [analyzer] DEBUG: Error resolving function mshtml!CImgElement_put_src through our custom callback.
2025-09-06 03:29:07,655 [analyzer] DEBUG: Error resolving function mshtml!CScriptElement_put_src through our custom callback.
2025-09-06 03:29:07,655 [analyzer] DEBUG: Error resolving function mshtml!CWindow_AddTimeoutCode through our custom callback.
2025-09-06 03:29:07,655 [analyzer] DEBUG: Error resolving function mshtml!CDocument_write through our custom callback.
2025-09-06 03:29:07,655 [analyzer] DEBUG: Error resolving function mshtml!CElement_put_innerHTML through our custom callback.
2025-09-06 03:29:07,655 [analyzer] DEBUG: Error resolving function mshtml!CHyperlink_SetUrlComponent through our custom callback.
2025-09-06 03:29:07,655 [analyzer] DEBUG: Error resolving function mshtml!CIFrameElement_CreateElement through our custom callback.
2025-09-06 03:29:07,655 [analyzer] DEBUG: Error resolving function mshtml!CImgElement_put_src through our custom callback.
2025-09-06 03:29:07,655 [analyzer] DEBUG: Error resolving function mshtml!CScriptElement_put_src through our custom callback.
2025-09-06 03:29:07,655 [analyzer] DEBUG: Error resolving function mshtml!CWindow_AddTimeoutCode through our custom callback.
2025-09-06 03:29:07,953 [analyzer] INFO: Added new file to list with pid 1972 and path C:\Users\Administrator\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{DFFE98E9-8AC0-11F0-BE61-98A3C40DCB83}.dat
2025-09-06 03:29:07,967 [analyzer] INFO: Added new file to list with pid 1972 and path C:\Users\Administrator\AppData\Local\Temp\~DF08A236B4E1C99550.TMP
2025-09-06 03:29:08,015 [analyzer] DEBUG: Error resolving function mshtml!CDocument_write through our custom callback.
2025-09-06 03:29:08,015 [analyzer] DEBUG: Error resolving function mshtml!CElement_put_innerHTML through our custom callback.
2025-09-06 03:29:08,015 [analyzer] DEBUG: Error resolving function mshtml!CHyperlink_SetUrlComponent through our custom callback.
2025-09-06 03:29:08,015 [analyzer] DEBUG: Error resolving function mshtml!CIFrameElement_CreateElement through our custom callback.
2025-09-06 03:29:08,015 [analyzer] DEBUG: Error resolving function mshtml!CImgElement_put_src through our custom callback.
2025-09-06 03:29:08,015 [analyzer] DEBUG: Error resolving function mshtml!CScriptElement_put_src through our custom callback.
2025-09-06 03:29:08,015 [analyzer] DEBUG: Error resolving function mshtml!CWindow_AddTimeoutCode through our custom callback.
2025-09-06 02:30:07,188 [analyzer] INFO: Analysis timeout hit, terminating analysis.
2025-09-06 02:30:07,486 [lib.api.process] ERROR: Failed to dump memory of 64-bit process with pid 1972.
2025-09-06 02:30:07,563 [lib.api.process] ERROR: Failed to dump memory of 32-bit process with pid 2220.
2025-09-06 02:30:07,891 [analyzer] INFO: Terminating remaining processes before shutdown.
2025-09-06 02:30:07,891 [lib.api.process] INFO: Successfully terminated process with pid 1972.
2025-09-06 02:30:07,891 [lib.api.process] INFO: Successfully terminated process with pid 2220.
2025-09-06 02:30:07,891 [analyzer] INFO: Error dumping file from path "c:\users\administrator\appdata\local\temp\~dfe6ac6be7cdb85a00.tmp": [Errno 13] Permission denied: u'c:\\users\\administrator\\appdata\\local\\temp\\~dfe6ac6be7cdb85a00.tmp'
2025-09-06 02:30:07,891 [analyzer] INFO: Error dumping file from path "c:\users\administrator\appdata\local\temp\~df08a236b4e1c99550.tmp": [Errno 13] Permission denied: u'c:\\users\\administrator\\appdata\\local\\temp\\~df08a236b4e1c99550.tmp'
2025-09-06 02:30:07,907 [analyzer] INFO: Analysis completed.

Cuckoo Log

2025-09-06 03:29:14,846 [cuckoo.core.scheduler] INFO: Task #6960332: acquired machine win7x645 (label=win7x645)
2025-09-06 03:29:14,847 [cuckoo.core.resultserver] DEBUG: Now tracking machine 192.168.168.205 for task #6960332
2025-09-06 03:29:15,173 [cuckoo.auxiliary.sniffer] INFO: Started sniffer with PID 2561357 (interface=vboxnet0, host=192.168.168.205)
2025-09-06 03:29:15,194 [cuckoo.machinery.virtualbox] DEBUG: Starting vm win7x645
2025-09-06 03:29:15,965 [cuckoo.machinery.virtualbox] DEBUG: Restoring virtual machine win7x645 to vmcloak
2025-09-06 03:29:29,530 [cuckoo.core.guest] INFO: Starting analysis #6960332 on guest (id=win7x645, ip=192.168.168.205)
2025-09-06 03:29:30,535 [cuckoo.core.guest] DEBUG: win7x645: not ready yet
2025-09-06 03:29:35,568 [cuckoo.core.guest] INFO: Guest is running Cuckoo Agent 0.10 (id=win7x645, ip=192.168.168.205)
2025-09-06 03:29:35,681 [cuckoo.core.guest] DEBUG: Uploading analyzer to guest (id=win7x645, ip=192.168.168.205, monitor=latest, size=6660546)
2025-09-06 03:29:36,993 [cuckoo.core.resultserver] DEBUG: Task #6960332: live log analysis.log initialized.
2025-09-06 03:29:37,908 [cuckoo.core.resultserver] DEBUG: Task #6960332 is sending a BSON stream
2025-09-06 03:29:38,267 [cuckoo.core.resultserver] DEBUG: Task #6960332 is sending a BSON stream
2025-09-06 03:29:39,149 [cuckoo.core.resultserver] DEBUG: Task #6960332: File upload for 'shots/0001.jpg'
2025-09-06 03:29:39,179 [cuckoo.core.resultserver] DEBUG: Task #6960332 uploaded file length: 133477
2025-09-06 03:29:40,330 [cuckoo.core.resultserver] DEBUG: Task #6960332 is sending a BSON stream
2025-09-06 03:29:41,294 [cuckoo.core.resultserver] DEBUG: Task #6960332: File upload for 'shots/0002.jpg'
2025-09-06 03:29:41,296 [cuckoo.core.resultserver] DEBUG: Task #6960332 uploaded file length: 24488
2025-09-06 03:29:42,406 [cuckoo.core.resultserver] DEBUG: Task #6960332: File upload for 'shots/0003.jpg'
2025-09-06 03:29:42,411 [cuckoo.core.resultserver] DEBUG: Task #6960332 uploaded file length: 28825
2025-09-06 03:29:51,675 [cuckoo.core.guest] DEBUG: win7x645: analysis #6960332 still processing
2025-09-06 03:30:06,876 [cuckoo.core.guest] DEBUG: win7x645: analysis #6960332 still processing
2025-09-06 03:30:07,731 [cuckoo.core.resultserver] DEBUG: Task #6960332: File upload for 'curtain/1757118607.72.curtain.log'
2025-09-06 03:30:07,733 [cuckoo.core.resultserver] DEBUG: Task #6960332 uploaded file length: 36
2025-09-06 03:30:07,891 [cuckoo.core.resultserver] DEBUG: Task #6960332: File upload for 'sysmon/1757118607.88.sysmon.xml'
2025-09-06 03:30:07,899 [cuckoo.core.resultserver] DEBUG: Task #6960332 uploaded file length: 440214
2025-09-06 03:30:07,903 [cuckoo.core.resultserver] DEBUG: Task #6960332: File upload for 'files/d43ece892b4bd1f6_recoverystore.{dffe98e7-8ac0-11f0-be61-98a3c40dcb83}.dat'
2025-09-06 03:30:07,905 [cuckoo.core.resultserver] DEBUG: Task #6960332 uploaded file length: 5632
2025-09-06 03:30:07,910 [cuckoo.core.resultserver] DEBUG: Task #6960332: File upload for 'files/b20d69b9b9c5554d_{dffe98e9-8ac0-11f0-be61-98a3c40dcb83}.dat'
2025-09-06 03:30:07,913 [cuckoo.core.resultserver] DEBUG: Task #6960332 uploaded file length: 3584
2025-09-06 03:30:08,260 [cuckoo.core.resultserver] DEBUG: Task #6960332: File upload for 'shots/0004.jpg'
2025-09-06 03:30:08,275 [cuckoo.core.resultserver] DEBUG: Task #6960332 uploaded file length: 133681
2025-09-06 03:30:08,292 [cuckoo.core.resultserver] DEBUG: Task #6960332 had connection reset for <Context for LOG>
2025-09-06 03:30:09,889 [cuckoo.core.guest] INFO: win7x645: analysis completed successfully
2025-09-06 03:30:09,899 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Redsocks
2025-09-06 03:30:09,932 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Sniffer
2025-09-06 03:30:10,903 [cuckoo.machinery.virtualbox] INFO: Successfully generated memory dump for virtual machine with label win7x645 to path /srv/cuckoo/cwd/storage/analyses/6960332/memory.dmp
2025-09-06 03:30:10,908 [cuckoo.machinery.virtualbox] DEBUG: Stopping vm win7x645
2025-09-06 03:30:19,332 [cuckoo.core.resultserver] DEBUG: Stopped tracking machine 192.168.168.205 for task #6960332
2025-09-06 03:30:19,752 [cuckoo.core.scheduler] DEBUG: Released database task #6960332
2025-09-06 03:30:19,782 [cuckoo.core.scheduler] INFO: Task #6960332: analysis procedure completed

Signatures

Allocates read-write-execute memory (usually to unpack itself) (50 out of 287 events)
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 1972
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007feff788000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1972
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007feff788000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1972
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007feff788000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1972
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007feff64f000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1972
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007feff626000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1972
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007feff626000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1972
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007feff626000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1972
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fefb40b000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1972
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fef5074000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1972
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fefd044000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1972
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fefa2fc000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1972
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fefa314000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1972
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fefa27b000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1972
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fef3b94000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1972
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fefadca000
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1972
region_size: 65536
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000003660000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1972
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007feff31b000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1972
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007feff31b000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1972
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007feff31b000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1972
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007feff31b000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1972
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fefd5a1000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1972
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fefd272000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1972
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fef24e2000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1972
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fef35ce000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1972
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fefd72f000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1972
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fefd758000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2220
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x01226000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2220
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x75261000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2220
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x75b5c000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2220
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x75b5c000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2220
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x75b5c000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2220
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x75b57000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2220
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x75b57000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2220
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x75b57000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2220
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x74fb1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2220
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x75d20000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2220
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x75d20000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2220
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x75d20000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2220
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x75360000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2220
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x76fd1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2220
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x76041000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2220
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x761f1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2220
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x761f1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2220
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x761f1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2220
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x761f1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2220
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x761f1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2220
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x761f1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2220
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x761f1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2220
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x761f1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2220
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x761f1000
process_handle: 0xffffffff
1 0 0
Changes read-write memory protection to read-execute (probably to avoid detection when setting all RWX flags at the same time) (1 event)
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2220
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 32 (PAGE_EXECUTE_READ)
base_address: 0x7ef70000
process_handle: 0xffffffff
1 0 0
Uses Windows utilities for basic Windows functionality (1 event)
cmdline "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1972 CREDAT:275457 /prefetch:2
Resumed a suspended thread in a remote process potentially indicative of process injection (2 events)
Process injection Process 1972 resumed a thread in remote process 2220
Time & API Arguments Status Return Repeated

NtResumeThread

thread_handle: 0x0000000000000370
suspend_count: 1
process_identifier: 2220
1 0 0
Screenshots
Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action VT Location
No hosts contacted.
Cuckoo

We're processing your submission... This could take a few seconds.