Windows
Analysis Report
rPurchaseOrder300610-PDF.exe
Overview
General Information
Detection
AgentTesla
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Contains functionality to log keystrokes (.Net Source)
Initial sample is a PE file and has a suspicious name
Machine Learning detection for sample
Maps a DLL or memory area into another process
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Switches to a custom stack to bypass stack traces
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Outbound SMTP Connections
Uses 32bit PE files
Uses SMTP (mail sending)
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match
Classification
- System is w10x64
rPurchaseOrder300610-PDF.exe (PID: 7268 cmdline:
"C:\Users\ user\Deskt op\rPurcha seOrder300 610-PDF.ex e" MD5: E76975D634D228179ADC45CAD8F2000D) RegSvcs.exe (PID: 7284 cmdline:
"C:\Users\ user\Deskt op\rPurcha seOrder300 610-PDF.ex e" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Agent Tesla, AgentTesla | A .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel. |
{"Exfil Mode": "SMTP", "Port": "587", "Host": "srv.masternic.net", "Username": "technical2@petropardis.ir", "Password": "-H{2Szxi!%qb"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | ||
INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen |
| |
JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
Click to see the 8 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | ||
INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen |
| |
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | ||
Click to see the 4 entries |
System Summary |
---|
Source: | Author: frack113: |
⊘No Snort rule has matched
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Malware Configuration Extractor: |
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Code function: | 0_2_00844696 | |
Source: | Code function: | 0_2_0084C9C7 | |
Source: | Code function: | 0_2_0084C93C | |
Source: | Code function: | 0_2_0084F200 | |
Source: | Code function: | 0_2_0084F35D | |
Source: | Code function: | 0_2_0084F65E | |
Source: | Code function: | 0_2_00843A2B | |
Source: | Code function: | 0_2_00843D4E | |
Source: | Code function: | 0_2_0084BF27 |
Source: | TCP traffic: |
Source: | ASN Name: |
Source: | TCP traffic: |
Source: | UDP traffic detected without corresponding DNS query: |
Source: | Code function: | 0_2_008525E2 |
Source: | DNS traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Key, Mouse, Clipboard, Microphone and Screen Capturing |
---|
Source: | .Net Code: |
Source: | Code function: | 0_2_0085425A |
Source: | Code function: | 0_2_00854458 |
Source: | Code function: | 0_2_0085425A |
Source: | Code function: | 0_2_00840219 |
Source: | Code function: | 0_2_0086CDAC |
System Summary |
---|
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Code function: | 0_2_007E3B4C | |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | memstr_e938e5fb-4 | |
Source: | String found in binary or memory: | memstr_b7ae6bf8-b | |
Source: | String found in binary or memory: | memstr_cc7687cc-5 | |
Source: | String found in binary or memory: | memstr_1badaef4-3 |
Source: | Static PE information: |
Source: | Code function: | 0_2_008440B1 |
Source: | Code function: | 0_2_00838858 |
Source: | Code function: | 0_2_0084545F |
Source: | Code function: | 0_2_007EE800 | |
Source: | Code function: | 0_2_0080DBB5 | |
Source: | Code function: | 0_2_007EE060 | |
Source: | Code function: | 0_2_0086804A | |
Source: | Code function: | 0_2_007F4140 | |
Source: | Code function: | 0_2_00802405 | |
Source: | Code function: | 0_2_00816522 | |
Source: | Code function: | 0_2_00860665 | |
Source: | Code function: | 0_2_0081267E | |
Source: | Code function: | 0_2_007F6843 | |
Source: | Code function: | 0_2_0080283A | |
Source: | Code function: | 0_2_008189DF | |
Source: | Code function: | 0_2_00816A94 | |
Source: | Code function: | 0_2_00860AE2 | |
Source: | Code function: | 0_2_007F8A0E | |
Source: | Code function: | 0_2_0083EB07 | |
Source: | Code function: | 0_2_00848B13 | |
Source: | Code function: | 0_2_0080CD61 | |
Source: | Code function: | 0_2_00817006 | |
Source: | Code function: | 0_2_007F710E | |
Source: | Code function: | 0_2_007F3190 | |
Source: | Code function: | 0_2_007E1287 | |
Source: | Code function: | 0_2_008033C7 | |
Source: | Code function: | 0_2_0080F419 | |
Source: | Code function: | 0_2_008016C4 | |
Source: | Code function: | 0_2_007F5680 | |
Source: | Code function: | 0_2_008078D3 | |
Source: | Code function: | 0_2_007F58C0 | |
Source: | Code function: | 0_2_00801BB8 | |
Source: | Code function: | 0_2_00819D05 | |
Source: | Code function: | 0_2_007EFE40 | |
Source: | Code function: | 0_2_00801FD0 | |
Source: | Code function: | 0_2_0080BFE6 | |
Source: | Code function: | 0_2_03623600 | |
Source: | Code function: | 1_2_02F59378 | |
Source: | Code function: | 1_2_02F54A98 | |
Source: | Code function: | 1_2_02F59B38 | |
Source: | Code function: | 1_2_02F53E80 | |
Source: | Code function: | 1_2_02F5CFF0 | |
Source: | Code function: | 1_2_02F541C8 | |
Source: | Code function: | 1_2_064F56D0 | |
Source: | Code function: | 1_2_064F3F40 | |
Source: | Code function: | 1_2_064FBCE0 | |
Source: | Code function: | 1_2_064FDCF8 | |
Source: | Code function: | 1_2_064F9AD0 | |
Source: | Code function: | 1_2_064F2AF0 | |
Source: | Code function: | 1_2_064F8B88 | |
Source: | Code function: | 1_2_064F0040 | |
Source: | Code function: | 1_2_064F4FF0 | |
Source: | Code function: | 1_2_064F3240 |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: |
Source: | Classification label: |
Source: | Code function: | 0_2_0084A2D5 |
Source: | Code function: | 0_2_00838713 | |
Source: | Code function: | 0_2_00838CC3 |
Source: | Code function: | 0_2_0084B59E |
Source: | Code function: | 0_2_0085F121 |
Source: | Code function: | 0_2_008586D0 |
Source: | Code function: | 0_2_007E4FE9 |
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | WMI Queries: | ||
Source: | WMI Queries: |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | ReversingLabs: |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | Static file information: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Code function: | 0_2_0085C304 |
Source: | Code function: | 0_2_007EC599 | |
Source: | Code function: | 0_2_0084871B | |
Source: | Code function: | 0_2_0080E951 | |
Source: | Code function: | 0_2_0080EA6A | |
Source: | Code function: | 0_2_00808B98 | |
Source: | Code function: | 0_2_0080EC45 | |
Source: | Code function: | 0_2_0080ED2E |
Source: | Code function: | 0_2_007E4A35 | |
Source: | Code function: | 0_2_008655FD |
Source: | Code function: | 0_2_008033C7 |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | WMI Queries: |
Source: | API/Special instruction interceptor: |
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior |
Source: | Window / User API: | Jump to behavior |
Source: | Evasive API call chain: | graph_0-99302 |
Source: | API coverage: |
Source: | WMI Queries: |
Source: | WMI Queries: | ||
Source: | WMI Queries: |
Source: | Code function: | 0_2_00844696 | |
Source: | Code function: | 0_2_0084C9C7 | |
Source: | Code function: | 0_2_0084C93C | |
Source: | Code function: | 0_2_0084F200 | |
Source: | Code function: | 0_2_0084F35D | |
Source: | Code function: | 0_2_0084F65E | |
Source: | Code function: | 0_2_00843A2B | |
Source: | Code function: | 0_2_00843D4E | |
Source: | Code function: | 0_2_0084BF27 |
Source: | Code function: | 0_2_007E4AFE |
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior |
Source: | Binary or memory string: |
Source: | API call chain: | graph_0-98122 |
Source: | Code function: | 0_2_008541FD |
Source: | Code function: | 0_2_007E3B4C |
Source: | Code function: | 0_2_00815CCC |
Source: | Code function: | 0_2_0085C304 |
Source: | Code function: | 0_2_036234F0 | |
Source: | Code function: | 0_2_03623490 | |
Source: | Code function: | 0_2_03621E70 |
Source: | Code function: | 0_2_008381F7 |
Source: | Code function: | 0_2_0080A395 | |
Source: | Code function: | 0_2_0080A364 |
Source: | Memory allocated: | Jump to behavior |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Section loaded: | Jump to behavior |
Source: | Memory written: | Jump to behavior |
Source: | Code function: | 0_2_00838C93 |
Source: | Code function: | 0_2_007E3B4C |
Source: | Code function: | 0_2_007E4A35 |
Source: | Code function: | 0_2_00844EC9 |
Source: | Process created: | Jump to behavior |
Source: | Code function: | 0_2_008381F7 |
Source: | Code function: | 0_2_00844C03 |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Code function: | 0_2_0080886B |
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior |
Source: | Code function: | 0_2_008150D7 |
Source: | Code function: | 0_2_00822230 |
Source: | Code function: | 0_2_0081418A |
Source: | Code function: | 0_2_007E4AFE |
Source: | Key value queried: | Jump to behavior |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | Key opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | Code function: | 0_2_00856596 | |
Source: | Code function: | 0_2_00856A5A |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | 2 Valid Accounts | 121 Windows Management Instrumentation | 1 DLL Side-Loading | 1 Exploitation for Privilege Escalation | 11 Disable or Modify Tools | 2 OS Credential Dumping | 2 System Time Discovery | Remote Services | 11 Archive Collected Data | 1 Ingress Tool Transfer | Exfiltration Over Other Network Medium | 1 System Shutdown/Reboot |
Credentials | Domains | Default Accounts | 2 Native API | 2 Valid Accounts | 1 DLL Side-Loading | 11 Deobfuscate/Decode Files or Information | 121 Input Capture | 1 Account Discovery | Remote Desktop Protocol | 2 Data from Local System | 1 Encrypted Channel | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | 2 Valid Accounts | 2 Obfuscated Files or Information | 1 Credentials in Registry | 2 File and Directory Discovery | SMB/Windows Admin Shares | 1 Email Collection | 1 Non-Standard Port | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | 21 Access Token Manipulation | 1 DLL Side-Loading | NTDS | 138 System Information Discovery | Distributed Component Object Model | 121 Input Capture | 1 Non-Application Layer Protocol | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | 212 Process Injection | 2 Valid Accounts | LSA Secrets | 241 Security Software Discovery | SSH | 3 Clipboard Data | 11 Application Layer Protocol | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 121 Virtualization/Sandbox Evasion | Cached Domain Credentials | 121 Virtualization/Sandbox Evasion | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
DNS | Web Services | External Remote Services | Systemd Timers | Startup Items | Startup Items | 21 Access Token Manipulation | DCSync | 2 Process Discovery | Windows Remote Management | Web Portal Capture | Commonly Used Port | Exfiltration Over C2 Channel | Inhibit System Recovery |
Network Trust Dependencies | Serverless | Drive-by Compromise | Container Orchestration Job | Scheduled Task/Job | Scheduled Task/Job | 212 Process Injection | Proc Filesystem | 11 Application Window Discovery | Cloud Services | Credential API Hooking | Application Layer Protocol | Exfiltration Over Alternative Protocol | Defacement |
Network Topology | Malvertising | Exploit Public-Facing Application | Command and Scripting Interpreter | At | At | HTML Smuggling | /etc/passwd and /etc/shadow | 1 System Owner/User Discovery | Direct Cloud VM Connections | Data Staged | Web Protocols | Exfiltration Over Symmetric Encrypted Non-C2 Protocol | Internal Defacement |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
39% | ReversingLabs | Win32.Trojan.AgentTesla | ||
100% | Joe Sandbox ML |
⊘No Antivirus matches
⊘No Antivirus matches
⊘No Antivirus matches
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
srv.masternic.net | 174.141.234.138 | true | true | unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
174.141.234.138 | srv.masternic.net | United States | 32181 | ASN-GIGENETUS | true |
Joe Sandbox version: | 40.0.0 Tourmaline |
Analysis ID: | 1455405 |
Start date and time: | 2024-06-11 19:46:09 +02:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 6m 0s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 6 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | rPurchaseOrder300610-PDF.exe |
Detection: | MAL |
Classification: | mal100.troj.spyw.evad.winEXE@3/4@1/1 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
- Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
- Not all processes where analyzed, report is missing behavior information
- Report size exceeded maximum capacity and may have missing disassembly code.
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- VT rate limit hit for: rPurchaseOrder300610-PDF.exe
Time | Type | Description |
---|---|---|
13:47:07 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
174.141.234.138 | Get hash | malicious | AgentTesla | Browse | ||
Get hash | malicious | AgentTesla | Browse |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
srv.masternic.net | Get hash | malicious | AgentTesla | Browse |
| |
Get hash | malicious | AgentTesla | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
ASN-GIGENETUS | Get hash | malicious | Mirai | Browse |
| |
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
|
⊘No context
⊘No context
Process: | C:\Users\user\Desktop\rPurchaseOrder300610-PDF.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 240128 |
Entropy (8bit): | 6.597966061213347 |
Encrypted: | false |
SSDEEP: | 6144:tHCFxwPf3DviuqmZOK9hAhHxWWh4XMlcC:tHY2vDvitAOK9hkHxtacD |
MD5: | E0C36B9F8F4768B9EE3394E91C307493 |
SHA1: | 34C05B03D479062EDCEE71A69F226F9C1E6988D0 |
SHA-256: | F2A58FFEA81C06856CF1AAD6BFBB83A6C217548B2F672589D62BD1090841756A |
SHA-512: | CE122DA5C81994123183066CF1CBCB8D10F1A858BC78E5893746801C7124E3FC5BFB7DEA4930F1784F83A05F080077D5D42EBA207590201A1B18609EF7CB8D43 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\rPurchaseOrder300610-PDF.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 142714 |
Entropy (8bit): | 7.931021827072133 |
Encrypted: | false |
SSDEEP: | 3072:png2JxubVV8xbi1Hgf9mC/773Iyvd1XzQEHF+a0IDH9j64MVCan:pGJVoiGR/773Bd1Xz5HAa0IpjEVb |
MD5: | EC21EFB1CC5EE45BCEA491BBDB69D070 |
SHA1: | FF22430DFA285CE7D8C7129F8F1ADCD21A8C019B |
SHA-256: | 133832B10F9540F0A16570ED19003EC5A1E0F7C57AC32DD8D4DE5A14431ABC66 |
SHA-512: | CBE8A59B71FAC5C2DC5226836470658EE2DA04E6F651B21A5A26783485E68C854422B93A1D9E1309BCAFE1896B39192FAD7E3C671AAB7D883CC3C9C7CAF268BC |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\rPurchaseOrder300610-PDF.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 9816 |
Entropy (8bit): | 7.608158950706453 |
Encrypted: | false |
SSDEEP: | 192:na0ZsqLUGeKtxWQa8atpLMknw1R9hFg1a6fYHWMMaC3t3fpIEICMOe8uq10ZOJOT:azqLFLtx3a88wknwdh6jYyaC3pRIENMr |
MD5: | 42CF15BA79D0F28AC2200CB13B961A98 |
SHA1: | 04325141EC2B99F5BC998FB3897A0E830C45AFD9 |
SHA-256: | 6B900D06E95F88562626E0AD072B795AAD835622883BE6C6CDA584A8E1A31062 |
SHA-512: | 73B33D2788FEE9CD9149C914B7BEFD238F2B52A199703845EB90DCB35F56B403AFA174D407ABC6D4268FBD63DD8D30F9B1DC75823B94A321B87B847913B1EAA4 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\rPurchaseOrder300610-PDF.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 28740 |
Entropy (8bit): | 3.5871394699332475 |
Encrypted: | false |
SSDEEP: | 768:WiTZ+2QoioGRk6ZklputwjpjBkCiw2RuJ3nXKUrvzjsNbA+IL26cz24vfF3if6gc:WiTZ+2QoioGRk6ZklputwjpjBkCiw2RJ |
MD5: | FEDF5187FBFDE806DB839E324F115298 |
SHA1: | 6697A650BDFC2C29823B998B6FDA25FCC98AFF77 |
SHA-256: | DBE6EE56A9C35A8CF29E9A366365E91B3C976075619A05191754BB002348FCCD |
SHA-512: | E4B6351C6A76111FB343DB843DC6992068F1B769861AAEB1DA82B2A40C51F0EC8D1323063A2916CE04DAD142F99C18F9822885C64A80F3EBA84247E671A9C19D |
Malicious: | false |
Reputation: | low |
Preview: |
File type: | |
Entropy (8bit): | 7.051729711184832 |
TrID: |
|
File name: | rPurchaseOrder300610-PDF.exe |
File size: | 1'116'160 bytes |
MD5: | e76975d634d228179adc45cad8f2000d |
SHA1: | 9e5d85b6a9ce9c4ca3793c7f140e57e9ed024db3 |
SHA256: | 308004785363cf352a7c339d778f301bd25686dc8463190a41f3a5f65eb6c1dc |
SHA512: | f11c57d1c92d3ab7542bdc135982533cba6213835a2f0fa38bd3f589b5ce03239de37b1ca42c001dfb9d747e1aca587e14c0366d4467859dd53bec6d407c0d6d |
SSDEEP: | 24576:cAHnh+eWsN3skA4RV1Hom2KXMmHadZz5CA9RiAPRx5:7h+ZkldoPK8YadZz5CA9rPh |
TLSH: | 5635AD0273D1C036FFABA2739B6AB64156BC79254133852F13981DB9BC701B2267E763 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........s..R...R...R....C..P.....;.S..._@#.a..._@......_@..g...[j..[...[jo.w...R...r.............#.S..._@'.S...R.k.S.....".S...RichR.. |
Icon Hash: | aaf3e3e3938382a0 |
Entrypoint: | 0x42800a |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE |
DLL Characteristics: | DYNAMIC_BASE, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x66678AA2 [Mon Jun 10 23:22:10 2024 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 5 |
OS Version Minor: | 1 |
File Version Major: | 5 |
File Version Minor: | 1 |
Subsystem Version Major: | 5 |
Subsystem Version Minor: | 1 |
Import Hash: | afcdf79be1557326c854b6e20cb900a7 |
Instruction |
---|
call 00007F0EDCC07DCDh |
jmp 00007F0EDCBFAB84h |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
push edi |
push esi |
mov esi, dword ptr [esp+10h] |
mov ecx, dword ptr [esp+14h] |
mov edi, dword ptr [esp+0Ch] |
mov eax, ecx |
mov edx, ecx |
add eax, esi |
cmp edi, esi |
jbe 00007F0EDCBFAD0Ah |
cmp edi, eax |
jc 00007F0EDCBFB06Eh |
bt dword ptr [004C41FCh], 01h |
jnc 00007F0EDCBFAD09h |
rep movsb |
jmp 00007F0EDCBFB01Ch |
cmp ecx, 00000080h |
jc 00007F0EDCBFAED4h |
mov eax, edi |
xor eax, esi |
test eax, 0000000Fh |
jne 00007F0EDCBFAD10h |
bt dword ptr [004BF324h], 01h |
jc 00007F0EDCBFB1E0h |
bt dword ptr [004C41FCh], 00000000h |
jnc 00007F0EDCBFAEADh |
test edi, 00000003h |
jne 00007F0EDCBFAEBEh |
test esi, 00000003h |
jne 00007F0EDCBFAE9Dh |
bt edi, 02h |
jnc 00007F0EDCBFAD0Fh |
mov eax, dword ptr [esi] |
sub ecx, 04h |
lea esi, dword ptr [esi+04h] |
mov dword ptr [edi], eax |
lea edi, dword ptr [edi+04h] |
bt edi, 03h |
jnc 00007F0EDCBFAD13h |
movq xmm1, qword ptr [esi] |
sub ecx, 08h |
lea esi, dword ptr [esi+08h] |
movq qword ptr [edi], xmm1 |
lea edi, dword ptr [edi+08h] |
test esi, 00000007h |
je 00007F0EDCBFAD65h |
bt esi, 03h |
Programming Language: |
|
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0xbc0cc | 0x17c | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0xc8000 | 0x461b4 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x10f000 | 0x7134 | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x92bc0 | 0x1c | .rdata |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0xa4b50 | 0x40 | .rdata |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x8f000 | 0x884 | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x8dfdd | 0x8e000 | 310e36668512d53489c005622bb1b4a9 | False | 0.5735602580325704 | data | 6.675248351711057 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x8f000 | 0x2fd8e | 0x2fe00 | 748cf1ab2605ce1fd72d53d912abb68f | False | 0.32828818537859006 | data | 5.763244005758284 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0xbf000 | 0x8f74 | 0x5200 | aae9601d920f07080bdfadf43dfeff12 | False | 0.1017530487804878 | data | 1.1963819235530628 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rsrc | 0xc8000 | 0x461b4 | 0x46200 | fdb05e31f667109b973be9eb66a0d7eb | False | 0.9067130403297683 | data | 7.84390952909338 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x10f000 | 0x7134 | 0x7200 | f04128ad0f87f42830e4a6cdbc38c719 | False | 0.7617530153508771 | data | 6.783955557128661 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_ICON | 0xc85a8 | 0x128 | Device independent bitmap graphic, 16 x 32 x 4, image size 192 | English | Great Britain | 0.7466216216216216 |
RT_ICON | 0xc86d0 | 0x128 | Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colors | English | Great Britain | 0.3277027027027027 |
RT_ICON | 0xc87f8 | 0x128 | Device independent bitmap graphic, 16 x 32 x 4, image size 192 | English | Great Britain | 0.3885135135135135 |
RT_ICON | 0xc8920 | 0x2e8 | Device independent bitmap graphic, 32 x 64 x 4, image size 0 | English | Great Britain | 0.3333333333333333 |
RT_ICON | 0xc8c08 | 0x128 | Device independent bitmap graphic, 16 x 32 x 4, image size 0 | English | Great Britain | 0.5 |
RT_ICON | 0xc8d30 | 0xea8 | Device independent bitmap graphic, 48 x 96 x 8, image size 0 | English | Great Britain | 0.2835820895522388 |
RT_ICON | 0xc9bd8 | 0x8a8 | Device independent bitmap graphic, 32 x 64 x 8, image size 0 | English | Great Britain | 0.37906137184115524 |
RT_ICON | 0xca480 | 0x568 | Device independent bitmap graphic, 16 x 32 x 8, image size 0 | English | Great Britain | 0.23699421965317918 |
RT_ICON | 0xca9e8 | 0x25a8 | Device independent bitmap graphic, 48 x 96 x 32, image size 0 | English | Great Britain | 0.13858921161825727 |
RT_ICON | 0xccf90 | 0x10a8 | Device independent bitmap graphic, 32 x 64 x 32, image size 0 | English | Great Britain | 0.25070356472795496 |
RT_ICON | 0xce038 | 0x468 | Device independent bitmap graphic, 16 x 32 x 32, image size 0 | English | Great Britain | 0.3173758865248227 |
RT_MENU | 0xce4a0 | 0x50 | data | English | Great Britain | 0.9 |
RT_STRING | 0xce4f0 | 0x594 | data | English | Great Britain | 0.3333333333333333 |
RT_STRING | 0xcea84 | 0x68a | data | English | Great Britain | 0.2747909199522103 |
RT_STRING | 0xcf110 | 0x490 | data | English | Great Britain | 0.3715753424657534 |
RT_STRING | 0xcf5a0 | 0x5fc | data | English | Great Britain | 0.3087467362924282 |
RT_STRING | 0xcfb9c | 0x65c | data | English | Great Britain | 0.34336609336609336 |
RT_STRING | 0xd01f8 | 0x466 | data | English | Great Britain | 0.3605683836589698 |
RT_STRING | 0xd0660 | 0x158 | Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0 | English | Great Britain | 0.502906976744186 |
RT_RCDATA | 0xd07b8 | 0x3d44a | data | 1.0003426922862357 | ||
RT_GROUP_ICON | 0x10dc04 | 0x76 | data | English | Great Britain | 0.6610169491525424 |
RT_GROUP_ICON | 0x10dc7c | 0x14 | data | English | Great Britain | 1.25 |
RT_GROUP_ICON | 0x10dc90 | 0x14 | data | English | Great Britain | 1.15 |
RT_GROUP_ICON | 0x10dca4 | 0x14 | data | English | Great Britain | 1.25 |
RT_VERSION | 0x10dcb8 | 0x10c | data | English | Great Britain | 0.5932835820895522 |
RT_MANIFEST | 0x10ddc4 | 0x3ef | ASCII text, with CRLF line terminators | English | Great Britain | 0.5074478649453823 |
DLL | Import |
---|---|
WSOCK32.dll | WSACleanup, socket, inet_ntoa, setsockopt, ntohs, recvfrom, ioctlsocket, htons, WSAStartup, __WSAFDIsSet, select, accept, listen, bind, closesocket, WSAGetLastError, recv, sendto, send, inet_addr, gethostbyname, gethostname, connect |
VERSION.dll | GetFileVersionInfoW, GetFileVersionInfoSizeW, VerQueryValueW |
WINMM.dll | timeGetTime, waveOutSetVolume, mciSendStringW |
COMCTL32.dll | ImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create |
MPR.dll | WNetUseConnectionW, WNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W |
WININET.dll | InternetQueryDataAvailable, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetConnectW |
PSAPI.DLL | GetProcessMemoryInfo |
IPHLPAPI.DLL | IcmpCreateFile, IcmpCloseHandle, IcmpSendEcho |
USERENV.dll | DestroyEnvironmentBlock, UnloadUserProfile, CreateEnvironmentBlock, LoadUserProfileW |
UxTheme.dll | IsThemeActive |
KERNEL32.dll | DuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, SetCurrentDirectoryW, GetLongPathNameW, GetShortPathNameW, DeleteFileW, FindNextFileW, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, GetLocalTime, CompareStringW, GetCurrentProcess, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, LoadLibraryW, VirtualAlloc, IsDebuggerPresent, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, GetCurrentThread, CloseHandle, GetFullPathNameW, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetCommandLineW, IsProcessorFeaturePresent, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetStartupInfoW, GetStringTypeW, SetStdHandle, GetFileType, GetConsoleCP, GetConsoleMode, RtlUnwind, ReadConsoleW, GetTimeZoneInformation, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetEnvironmentStringsW, FreeEnvironmentStringsW, WriteConsoleW, FindClose, SetEnvironmentVariableA |
USER32.dll | AdjustWindowRectEx, CopyImage, SetWindowPos, GetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, SetRect, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, MonitorFromRect, keybd_event, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, DispatchMessageW, TranslateMessage, PeekMessageW, UnregisterHotKey, CheckMenuRadioItem, CharLowerBuffW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, SystemParametersInfoW, LoadImageW, GetClassNameW |
GDI32.dll | StrokePath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, GetDeviceCaps, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, LineTo, AngleArc, MoveToEx, Ellipse, DeleteDC, GetPixel, CreateDCW, GetStockObject, GetTextFaceW, CreateFontW, SetTextColor, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, StrokeAndFillPath |
COMDLG32.dll | GetOpenFileNameW, GetSaveFileNameW |
ADVAPI32.dll | GetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, RegCreateKeyExW, FreeSid, GetTokenInformation, GetSecurityDescriptorDacl, GetAclInformation, AddAce, SetSecurityDescriptorDacl, GetUserNameW, InitiateSystemShutdownExW |
SHELL32.dll | DragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish |
ole32.dll | CoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoSetProxyBlanket, CoCreateInstanceEx, CoInitializeSecurity |
OLEAUT32.dll | LoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, RegisterTypeLib, CreateStdDispatch, DispCallFunc, VariantChangeType, SysStringLen, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, VariantCopy, VariantClear, OleLoadPicture, QueryPathOfRegTypeLib, RegisterTypeLibForUser, UnRegisterTypeLibForUser, UnRegisterTypeLib, CreateDispTypeInfo, SysAllocString, VariantInit |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | Great Britain |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jun 11, 2024 19:47:09.343044043 CEST | 49731 | 587 | 192.168.2.4 | 174.141.234.138 |
Jun 11, 2024 19:47:09.347832918 CEST | 587 | 49731 | 174.141.234.138 | 192.168.2.4 |
Jun 11, 2024 19:47:09.347975016 CEST | 49731 | 587 | 192.168.2.4 | 174.141.234.138 |
Jun 11, 2024 19:47:09.993120909 CEST | 587 | 49731 | 174.141.234.138 | 192.168.2.4 |
Jun 11, 2024 19:47:09.993395090 CEST | 49731 | 587 | 192.168.2.4 | 174.141.234.138 |
Jun 11, 2024 19:47:09.998842001 CEST | 587 | 49731 | 174.141.234.138 | 192.168.2.4 |
Jun 11, 2024 19:47:10.140547037 CEST | 587 | 49731 | 174.141.234.138 | 192.168.2.4 |
Jun 11, 2024 19:47:10.140768051 CEST | 49731 | 587 | 192.168.2.4 | 174.141.234.138 |
Jun 11, 2024 19:47:10.145677090 CEST | 587 | 49731 | 174.141.234.138 | 192.168.2.4 |
Jun 11, 2024 19:47:10.289242983 CEST | 587 | 49731 | 174.141.234.138 | 192.168.2.4 |
Jun 11, 2024 19:47:10.294877052 CEST | 49731 | 587 | 192.168.2.4 | 174.141.234.138 |
Jun 11, 2024 19:47:10.299652100 CEST | 587 | 49731 | 174.141.234.138 | 192.168.2.4 |
Jun 11, 2024 19:47:10.586867094 CEST | 587 | 49731 | 174.141.234.138 | 192.168.2.4 |
Jun 11, 2024 19:47:10.586929083 CEST | 587 | 49731 | 174.141.234.138 | 192.168.2.4 |
Jun 11, 2024 19:47:10.586966038 CEST | 587 | 49731 | 174.141.234.138 | 192.168.2.4 |
Jun 11, 2024 19:47:10.587003946 CEST | 587 | 49731 | 174.141.234.138 | 192.168.2.4 |
Jun 11, 2024 19:47:10.587033033 CEST | 49731 | 587 | 192.168.2.4 | 174.141.234.138 |
Jun 11, 2024 19:47:10.587034941 CEST | 587 | 49731 | 174.141.234.138 | 192.168.2.4 |
Jun 11, 2024 19:47:10.587070942 CEST | 49731 | 587 | 192.168.2.4 | 174.141.234.138 |
Jun 11, 2024 19:47:10.587169886 CEST | 587 | 49731 | 174.141.234.138 | 192.168.2.4 |
Jun 11, 2024 19:47:10.587230921 CEST | 49731 | 587 | 192.168.2.4 | 174.141.234.138 |
Jun 11, 2024 19:47:10.615997076 CEST | 49731 | 587 | 192.168.2.4 | 174.141.234.138 |
Jun 11, 2024 19:47:10.621223927 CEST | 587 | 49731 | 174.141.234.138 | 192.168.2.4 |
Jun 11, 2024 19:47:10.761893988 CEST | 587 | 49731 | 174.141.234.138 | 192.168.2.4 |
Jun 11, 2024 19:47:10.773132086 CEST | 49731 | 587 | 192.168.2.4 | 174.141.234.138 |
Jun 11, 2024 19:47:10.778145075 CEST | 587 | 49731 | 174.141.234.138 | 192.168.2.4 |
Jun 11, 2024 19:47:10.918577909 CEST | 587 | 49731 | 174.141.234.138 | 192.168.2.4 |
Jun 11, 2024 19:47:10.919946909 CEST | 49731 | 587 | 192.168.2.4 | 174.141.234.138 |
Jun 11, 2024 19:47:10.924848080 CEST | 587 | 49731 | 174.141.234.138 | 192.168.2.4 |
Jun 11, 2024 19:47:11.066915035 CEST | 587 | 49731 | 174.141.234.138 | 192.168.2.4 |
Jun 11, 2024 19:47:11.067266941 CEST | 49731 | 587 | 192.168.2.4 | 174.141.234.138 |
Jun 11, 2024 19:47:11.072158098 CEST | 587 | 49731 | 174.141.234.138 | 192.168.2.4 |
Jun 11, 2024 19:47:11.381289005 CEST | 587 | 49731 | 174.141.234.138 | 192.168.2.4 |
Jun 11, 2024 19:47:11.381786108 CEST | 49731 | 587 | 192.168.2.4 | 174.141.234.138 |
Jun 11, 2024 19:47:11.387473106 CEST | 587 | 49731 | 174.141.234.138 | 192.168.2.4 |
Jun 11, 2024 19:47:11.528099060 CEST | 587 | 49731 | 174.141.234.138 | 192.168.2.4 |
Jun 11, 2024 19:47:11.528470039 CEST | 49731 | 587 | 192.168.2.4 | 174.141.234.138 |
Jun 11, 2024 19:47:11.533431053 CEST | 587 | 49731 | 174.141.234.138 | 192.168.2.4 |
Jun 11, 2024 19:47:11.756761074 CEST | 587 | 49731 | 174.141.234.138 | 192.168.2.4 |
Jun 11, 2024 19:47:11.757164001 CEST | 49731 | 587 | 192.168.2.4 | 174.141.234.138 |
Jun 11, 2024 19:47:11.762200117 CEST | 587 | 49731 | 174.141.234.138 | 192.168.2.4 |
Jun 11, 2024 19:47:11.902322054 CEST | 587 | 49731 | 174.141.234.138 | 192.168.2.4 |
Jun 11, 2024 19:47:11.903738976 CEST | 49731 | 587 | 192.168.2.4 | 174.141.234.138 |
Jun 11, 2024 19:47:11.903774977 CEST | 49731 | 587 | 192.168.2.4 | 174.141.234.138 |
Jun 11, 2024 19:47:11.903827906 CEST | 49731 | 587 | 192.168.2.4 | 174.141.234.138 |
Jun 11, 2024 19:47:11.903827906 CEST | 49731 | 587 | 192.168.2.4 | 174.141.234.138 |
Jun 11, 2024 19:47:11.909957886 CEST | 587 | 49731 | 174.141.234.138 | 192.168.2.4 |
Jun 11, 2024 19:47:11.910007954 CEST | 587 | 49731 | 174.141.234.138 | 192.168.2.4 |
Jun 11, 2024 19:47:11.910032034 CEST | 587 | 49731 | 174.141.234.138 | 192.168.2.4 |
Jun 11, 2024 19:47:11.910054922 CEST | 587 | 49731 | 174.141.234.138 | 192.168.2.4 |
Jun 11, 2024 19:47:12.062854052 CEST | 587 | 49731 | 174.141.234.138 | 192.168.2.4 |
Jun 11, 2024 19:47:12.117336988 CEST | 49731 | 587 | 192.168.2.4 | 174.141.234.138 |
Jun 11, 2024 19:48:49.252794027 CEST | 49731 | 587 | 192.168.2.4 | 174.141.234.138 |
Jun 11, 2024 19:48:49.257730007 CEST | 587 | 49731 | 174.141.234.138 | 192.168.2.4 |
Jun 11, 2024 19:48:49.399524927 CEST | 587 | 49731 | 174.141.234.138 | 192.168.2.4 |
Jun 11, 2024 19:48:49.405812025 CEST | 49731 | 587 | 192.168.2.4 | 174.141.234.138 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jun 11, 2024 19:47:09.225862026 CEST | 63845 | 53 | 192.168.2.4 | 1.1.1.1 |
Jun 11, 2024 19:47:09.336755991 CEST | 53 | 63845 | 1.1.1.1 | 192.168.2.4 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Jun 11, 2024 19:47:09.225862026 CEST | 192.168.2.4 | 1.1.1.1 | 0xad96 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Jun 11, 2024 19:47:09.336755991 CEST | 1.1.1.1 | 192.168.2.4 | 0xad96 | No error (0) | 174.141.234.138 | A (IP address) | IN (0x0001) | false |
Timestamp | Source Port | Dest Port | Source IP | Dest IP | Commands |
---|---|---|---|---|---|
Jun 11, 2024 19:47:09.993120909 CEST | 587 | 49731 | 174.141.234.138 | 192.168.2.4 | 220-srv.masternic.net ESMTP Exim 4.96.2 #2 Tue, 11 Jun 2024 21:17:09 +0330 220-We do not authorize the use of this system to transport unsolicited, 220 and/or bulk e-mail. |
Jun 11, 2024 19:47:09.993395090 CEST | 49731 | 587 | 192.168.2.4 | 174.141.234.138 | EHLO 936905 |
Jun 11, 2024 19:47:10.140547037 CEST | 587 | 49731 | 174.141.234.138 | 192.168.2.4 | 250-srv.masternic.net Hello 936905 [173.254.250.91] 250-SIZE 52428800 250-8BITMIME 250-PIPELINING 250-PIPECONNECT 250-STARTTLS 250 HELP |
Jun 11, 2024 19:47:10.140768051 CEST | 49731 | 587 | 192.168.2.4 | 174.141.234.138 | STARTTLS |
Jun 11, 2024 19:47:10.289242983 CEST | 587 | 49731 | 174.141.234.138 | 192.168.2.4 | 220 TLS go ahead |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 13:47:05 |
Start date: | 11/06/2024 |
Path: | C:\Users\user\Desktop\rPurchaseOrder300610-PDF.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x7e0000 |
File size: | 1'116'160 bytes |
MD5 hash: | E76975D634D228179ADC45CAD8F2000D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | true |
Target ID: | 1 |
Start time: | 13:47:06 |
Start date: | 11/06/2024 |
Path: | C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xe30000 |
File size: | 45'984 bytes |
MD5 hash: | 9D352BC46709F0CB5EC974633A0C3C94 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | high |
Has exited: | false |