Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe

Overview

General Information

Sample name:Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe
Analysis ID:1630678
MD5:7fd34270073081844d4bf5111ffe18d8
SHA1:5df627bc738a71e366370d4b42c8f1028fec564a
SHA256:423c168cc254b333bb536c0ef06eb55ed79b1d21fdbd7779301222a08c3f51b7
Tags:exeuser-threatcat_ch
Infos:

Detection

Snake Keylogger
Score:100
Range:0 - 100
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Snake Keylogger
Binary is likely a compiled AutoIt script file
Initial sample is a PE file and has a suspicious name
Joe Sandbox ML detected suspicious sample
Maps a DLL or memory area into another process
Sample uses string decryption to hide its real strings
Switches to a custom stack to bypass stack traces
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates processes with suspicious names
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (date check)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe (PID: 7988 cmdline: "C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe" MD5: 7FD34270073081844D4BF5111FFE18D8)
    • RegSvcs.exe (PID: 8052 cmdline: "C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"Exfil Mode": "Telegram", "Telegram URL": "https://api.telegram.org/bot7200174383:AAGiuIXRkOAbU2n4B0G-2otS20RqwZrRApI/sendMessage?chat_id=7365979371", "Token": "7200174383:AAGiuIXRkOAbU2n4B0G-2otS20RqwZrRApI", "Chat_id": "7365979371", "Version": "5.1"}
SourceRuleDescriptionAuthorStrings
00000002.00000002.3820969235.0000000003102000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
    00000000.00000002.1384703527.0000000001840000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000000.00000002.1384703527.0000000001840000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
        00000000.00000002.1384703527.0000000001840000.00000004.00001000.00020000.00000000.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
        • 0x14aad:$a1: get_encryptedPassword
        • 0x14d99:$a2: get_encryptedUsername
        • 0x148b9:$a3: get_timePasswordChanged
        • 0x149b4:$a4: get_passwordField
        • 0x14ac3:$a5: set_encryptedPassword
        • 0x16122:$a7: get_logins
        • 0x16085:$a10: KeyLoggerEventArgs
        • 0x15cf0:$a11: KeyLoggerEventArgsEventHandler
        00000000.00000002.1384703527.0000000001840000.00000004.00001000.00020000.00000000.sdmpMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
        • 0x1c472:$a2: \Comodo\Dragon\User Data\Default\Login Data
        • 0x1b6a4:$a3: \Google\Chrome\User Data\Default\Login Data
        • 0x1bad7:$a4: \Orbitum\User Data\Default\Login Data
        • 0x1cb16:$a5: \Kometa\User Data\Default\Login Data
        Click to see the 15 entries
        SourceRuleDescriptionAuthorStrings
        0.2.Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe.1840000.1.raw.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          0.2.Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe.1840000.1.raw.unpackJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
            0.2.Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe.1840000.1.raw.unpackWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
            • 0x14aad:$a1: get_encryptedPassword
            • 0x14d99:$a2: get_encryptedUsername
            • 0x148b9:$a3: get_timePasswordChanged
            • 0x149b4:$a4: get_passwordField
            • 0x14ac3:$a5: set_encryptedPassword
            • 0x16122:$a7: get_logins
            • 0x16085:$a10: KeyLoggerEventArgs
            • 0x15cf0:$a11: KeyLoggerEventArgsEventHandler
            0.2.Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe.1840000.1.raw.unpackMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
            • 0x1c472:$a2: \Comodo\Dragon\User Data\Default\Login Data
            • 0x1b6a4:$a3: \Google\Chrome\User Data\Default\Login Data
            • 0x1bad7:$a4: \Orbitum\User Data\Default\Login Data
            • 0x1cb16:$a5: \Kometa\User Data\Default\Login Data
            0.2.Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe.1840000.1.raw.unpackINDICATOR_SUSPICIOUS_EXE_DotNetProcHookDetects executables with potential process hoockingditekSHen
            • 0x1567b:$s1: UnHook
            • 0x15682:$s2: SetHook
            • 0x1568a:$s3: CallNextHook
            • 0x15697:$s4: _hook
            Click to see the 13 entries
            No Sigma rule has matched
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-03-06T06:54:15.611468+010028033053Unknown Traffic192.168.2.849708104.21.48.1443TCP
            2025-03-06T06:54:18.849794+010028033053Unknown Traffic192.168.2.849710104.21.48.1443TCP
            2025-03-06T06:54:25.132598+010028033053Unknown Traffic192.168.2.849714104.21.48.1443TCP
            2025-03-06T06:54:28.252265+010028033053Unknown Traffic192.168.2.849718104.21.48.1443TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-03-06T06:54:10.380954+010028032742Potentially Bad Traffic192.168.2.849706158.101.44.24280TCP
            2025-03-06T06:54:13.427870+010028032742Potentially Bad Traffic192.168.2.849706158.101.44.24280TCP
            2025-03-06T06:54:16.302952+010028032742Potentially Bad Traffic192.168.2.849709158.101.44.24280TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: 00000000.00000002.1384703527.0000000001840000.00000004.00001000.00020000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "Telegram", "Telegram URL": "https://api.telegram.org/bot7200174383:AAGiuIXRkOAbU2n4B0G-2otS20RqwZrRApI/sendMessage?chat_id=7365979371", "Token": "7200174383:AAGiuIXRkOAbU2n4B0G-2otS20RqwZrRApI", "Chat_id": "7365979371", "Version": "5.1"}
            Source: Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeVirustotal: Detection: 33%Perma Link
            Source: Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeReversingLabs: Detection: 36%
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: 2.2.RegSvcs.exe.400000.0.unpackString decryptor:
            Source: 2.2.RegSvcs.exe.400000.0.unpackString decryptor: 7200174383:AAGiuIXRkOAbU2n4B0G-2otS20RqwZrRApI
            Source: 2.2.RegSvcs.exe.400000.0.unpackString decryptor: 7365979371

            Location Tracking

            barindex
            Source: unknownDNS query: name: reallyfreegeoip.org
            Source: Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
            Source: unknownHTTPS traffic detected: 104.21.48.1:443 -> 192.168.2.8:49707 version: TLS 1.0
            Source: Binary string: wntdll.pdbUGP source: Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe, 00000000.00000003.1375871226.00000000036A0000.00000004.00001000.00020000.00000000.sdmp, Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe, 00000000.00000003.1377468792.0000000003500000.00000004.00001000.00020000.00000000.sdmp
            Source: Binary string: wntdll.pdb source: Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe, 00000000.00000003.1375871226.00000000036A0000.00000004.00001000.00020000.00000000.sdmp, Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe, 00000000.00000003.1377468792.0000000003500000.00000004.00001000.00020000.00000000.sdmp
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_0019445A GetFileAttributesW,FindFirstFileW,FindClose,0_2_0019445A
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_0019C6D1 FindFirstFileW,FindClose,0_2_0019C6D1
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_0019C75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_0019C75C
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_0019EF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0019EF95
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_0019F0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0019F0F2
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_0019F3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0019F3F3
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_001937EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_001937EF
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00193B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00193B12
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_0019BCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0019BCBC
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 010EF1F6h2_2_010EF007
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 010EFB80h2_2_010E21E3
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h2_2_010EE528
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h2_2_010EEB5B
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h2_2_010EED3C
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 02E11A38h2_2_02E11620
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 02E102F1h2_2_02E10040
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 02E11471h2_2_02E111C0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 02E1D1A1h2_2_02E1CEF8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 02E1CD49h2_2_02E1CAA0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 02E1FD11h2_2_02E1FA68
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 02E1C8F1h2_2_02E1C648
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 02E1F8B9h2_2_02E1F610
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 02E1DA51h2_2_02E1D7A8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 02E1D5F9h2_2_02E1D350
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 02E1B791h2_2_02E1B4E8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 02E10751h2_2_02E104A0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 02E1E759h2_2_02E1E4B0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 02E1E301h2_2_02E1E058
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 02E1DEA9h2_2_02E1DC00
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 02E1C499h2_2_02E1C1F0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 02E1F461h2_2_02E1F1B8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 02E1C041h2_2_02E1BD98
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 02E11011h2_2_02E10D60
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 02E1F009h2_2_02E1ED60
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 02E11A38h2_2_02E11966
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 02E1BBE9h2_2_02E1B940
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 02E10BB1h2_2_02E10900
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 02E1EBB1h2_2_02E1E908
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: Joe Sandbox ViewIP Address: 104.21.48.1 104.21.48.1
            Source: Joe Sandbox ViewIP Address: 104.21.48.1 104.21.48.1
            Source: Joe Sandbox ViewIP Address: 158.101.44.242 158.101.44.242
            Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
            Source: unknownDNS query: name: checkip.dyndns.org
            Source: unknownDNS query: name: reallyfreegeoip.org
            Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.8:49709 -> 158.101.44.242:80
            Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.8:49706 -> 158.101.44.242:80
            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.8:49710 -> 104.21.48.1:443
            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.8:49708 -> 104.21.48.1:443
            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.8:49714 -> 104.21.48.1:443
            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.8:49718 -> 104.21.48.1:443
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: unknownHTTPS traffic detected: 104.21.48.1:443 -> 192.168.2.8:49707 version: TLS 1.0
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_001A22EE InternetReadFile,InternetQueryDataAvailable,InternetReadFile,0_2_001A22EE
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
            Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
            Source: RegSvcs.exe, 00000002.00000002.3820969235.00000000030AA000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3820969235.0000000002FFC000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3820969235.00000000030B8000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3820969235.000000000309C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3820969235.000000000308F000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3820969235.00000000030F4000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3820969235.00000000030E5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
            Source: RegSvcs.exe, 00000002.00000002.3820969235.00000000030C6000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3820969235.00000000030AA000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3820969235.0000000002FFC000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3820969235.00000000030B8000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3820969235.000000000309C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3820969235.000000000308F000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3820969235.000000000303F000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3820969235.00000000030F4000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3820969235.0000000002FED000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3820969235.00000000030E5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
            Source: RegSvcs.exe, 00000002.00000002.3820969235.0000000002F31000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
            Source: Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe, 00000000.00000002.1384703527.0000000001840000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3819962621.0000000000402000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
            Source: RegSvcs.exe, 00000002.00000002.3820969235.00000000030AA000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3820969235.00000000030B8000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3820969235.000000000309C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3820969235.000000000308F000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3820969235.00000000030F4000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3820969235.0000000003014000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3820969235.00000000030E5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.org
            Source: RegSvcs.exe, 00000002.00000002.3820969235.0000000002F31000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: RegSvcs.exe, 00000002.00000002.3820969235.00000000030AA000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3820969235.0000000002FFC000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3820969235.00000000030B8000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3820969235.000000000309C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3820969235.000000000308F000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3820969235.000000000303F000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3820969235.00000000030F4000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3820969235.00000000030E5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
            Source: Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe, 00000000.00000002.1384703527.0000000001840000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3819962621.0000000000402000.00000040.80000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3820969235.0000000002FFC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
            Source: RegSvcs.exe, 00000002.00000002.3820969235.00000000030E5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189
            Source: RegSvcs.exe, 00000002.00000002.3820969235.00000000030AA000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3820969235.00000000030B8000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3820969235.000000000309C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3820969235.000000000308F000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3820969235.000000000303F000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3820969235.00000000030F4000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3820969235.00000000030E5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189$
            Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
            Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
            Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
            Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
            Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_001A4164 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_001A4164
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_001A4164 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_001A4164
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_001A3F66 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_001A3F66
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_0019001C GetKeyboardState,SetKeyboardState,GetAsyncKeyState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,0_2_0019001C
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_001BCABC DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_001BCABC

            System Summary

            barindex
            Source: 0.2.Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe.1840000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 0.2.Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe.1840000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 0.2.Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe.1840000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 0.2.Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe.1840000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 0.2.Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe.1840000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 0.2.Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe.1840000.1.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 0.2.Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe.1840000.1.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 0.2.Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe.1840000.1.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 00000000.00000002.1384703527.0000000001840000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 00000000.00000002.1384703527.0000000001840000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 00000000.00000002.1384703527.0000000001840000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 00000000.00000002.1384703527.0000000001840000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 00000002.00000002.3819962621.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 00000002.00000002.3819962621.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: Process Memory Space: Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe PID: 7988, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: Process Memory Space: Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe PID: 7988, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: Process Memory Space: RegSvcs.exe PID: 8052, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: Process Memory Space: RegSvcs.exe PID: 8052, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: This is a third-party compiled AutoIt script.0_2_00133B3A
            Source: Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeString found in binary or memory: This is a third-party compiled AutoIt script.
            Source: Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe, 00000000.00000002.1383727422.00000000001E4000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_b4393011-4
            Source: Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe, 00000000.00000002.1383727422.00000000001E4000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_1b1f322f-5
            Source: Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_f33bdad7-4
            Source: Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_bc71b740-2
            Source: initial sampleStatic PE information: Filename: Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_0019A1EF: GetFullPathNameW,__swprintf,CreateDirectoryW,CreateFileW,_memset,_wcsncpy,DeviceIoControl,CloseHandle,RemoveDirectoryW,CloseHandle,0_2_0019A1EF
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00188310 _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00188310
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_001951BD ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_001951BD
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_0013E6A00_2_0013E6A0
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_0015D9750_2_0015D975
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_0013FCE00_2_0013FCE0
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_001521C50_2_001521C5
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_001662D20_2_001662D2
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_001B03DA0_2_001B03DA
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_0016242E0_2_0016242E
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_001525FA0_2_001525FA
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_0018E6160_2_0018E616
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_001466E10_2_001466E1
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_0016878F0_2_0016878F
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_001488080_2_00148808
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_001B08570_2_001B0857
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_001668440_2_00166844
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_001988890_2_00198889
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_0015CB210_2_0015CB21
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00166DB60_2_00166DB6
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00146F9E0_2_00146F9E
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_001430300_2_00143030
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_001531870_2_00153187
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_0015F1D90_2_0015F1D9
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_001312870_2_00131287
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_001514840_2_00151484
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_001455200_2_00145520
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_001576960_2_00157696
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_001457600_2_00145760
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_001519780_2_00151978
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00169AB50_2_00169AB5
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00151D900_2_00151D90
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_0015BDA60_2_0015BDA6
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_001B7DDB0_2_001B7DDB
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_0013DF000_2_0013DF00
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00143FE00_2_00143FE0
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00B9D9F00_2_00B9D9F0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_010E61082_2_010E6108
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_010EC1902_2_010EC190
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_010EF0072_2_010EF007
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_010EB3282_2_010EB328
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_010EC4732_2_010EC473
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_010E67302_2_010E6730
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_010EC7512_2_010EC751
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_010E98582_2_010E9858
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_010EBBD32_2_010EBBD3
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_010ECA312_2_010ECA31
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_010E4AD92_2_010E4AD9
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_010EBEB02_2_010EBEB0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_010E21E32_2_010E21E3
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_010EE5172_2_010EE517
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_010EE5282_2_010EE528
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_010E35702_2_010E3570
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_010EB4F32_2_010EB4F3
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02E184602_2_02E18460
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02E138702_2_02E13870
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02E100402_2_02E10040
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02E111C02_2_02E111C0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02E17D902_2_02E17D90
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02E1CEEA2_2_02E1CEEA
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02E1CEF82_2_02E1CEF8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02E1CAA02_2_02E1CAA0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02E1FA682_2_02E1FA68
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02E1C6482_2_02E1C648
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02E1FA592_2_02E1FA59
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02E1C6382_2_02E1C638
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02E1F6002_2_02E1F600
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02E1F6102_2_02E1F610
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02E173E82_2_02E173E8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02E1DBF12_2_02E1DBF1
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02E1D7A82_2_02E1D7A8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02E1D7982_2_02E1D798
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02E1D3402_2_02E1D340
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02E1D3502_2_02E1D350
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02E1B4E82_2_02E1B4E8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02E108F02_2_02E108F0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02E1E8F82_2_02E1E8F8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02E1B4D72_2_02E1B4D7
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02E104A02_2_02E104A0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02E1E4A02_2_02E1E4A0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02E1E4B02_2_02E1E4B0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02E104902_2_02E10490
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02E138602_2_02E13860
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02E1E0492_2_02E1E049
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02E1E0582_2_02E1E058
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02E1DC002_2_02E1DC00
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02E100072_2_02E10007
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02E1C1E02_2_02E1C1E0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02E1C1F02_2_02E1C1F0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02E1F1A92_2_02E1F1A9
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02E111B02_2_02E111B0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02E1F1B82_2_02E1F1B8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02E1BD882_2_02E1BD88
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02E1BD982_2_02E1BD98
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02E10D602_2_02E10D60
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02E1ED602_2_02E1ED60
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02E1B9402_2_02E1B940
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02E10D512_2_02E10D51
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02E1ED502_2_02E1ED50
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02E1B9302_2_02E1B930
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02E109002_2_02E10900
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02E1E9082_2_02E1E908
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: String function: 00150AE3 appears 70 times
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: String function: 00137DE1 appears 35 times
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: String function: 00158900 appears 42 times
            Source: Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe, 00000000.00000002.1384703527.0000000001840000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe
            Source: Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe, 00000000.00000003.1375619298.0000000003623000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe
            Source: Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe, 00000000.00000003.1375226464.00000000037CD000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe
            Source: Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
            Source: 0.2.Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe.1840000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 0.2.Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe.1840000.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 0.2.Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe.1840000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 0.2.Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe.1840000.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 0.2.Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe.1840000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 0.2.Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe.1840000.1.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 0.2.Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe.1840000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 0.2.Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe.1840000.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 00000000.00000002.1384703527.0000000001840000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 00000000.00000002.1384703527.0000000001840000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 00000000.00000002.1384703527.0000000001840000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 00000000.00000002.1384703527.0000000001840000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 00000002.00000002.3819962621.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 00000002.00000002.3819962621.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: Process Memory Space: Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe PID: 7988, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: Process Memory Space: Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe PID: 7988, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: Process Memory Space: RegSvcs.exe PID: 8052, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: Process Memory Space: RegSvcs.exe PID: 8052, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 0.2.Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe.1840000.1.raw.unpack, --.csCryptographic APIs: 'TransformFinalBlock'
            Source: 0.2.Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe.1840000.1.raw.unpack, --.csCryptographic APIs: 'TransformFinalBlock'
            Source: 0.2.Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe.1840000.1.raw.unpack, --.csCryptographic APIs: 'TransformFinalBlock'
            Source: 0.2.Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe.1840000.1.raw.unpack, --.csCryptographic APIs: 'TransformFinalBlock'
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/2@2/2
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_0019A06A GetLastError,FormatMessageW,0_2_0019A06A
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_001881CB AdjustTokenPrivileges,CloseHandle,0_2_001881CB
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_001887E1 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_001887E1
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_0019B333 SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_0019B333
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_001AEE0D CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_001AEE0D
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_0019C397 CoInitialize,CoCreateInstance,CoUninitialize,0_2_0019C397
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00134E89 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_00134E89
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeFile created: C:\Users\user\AppData\Local\Temp\aut765A.tmpJump to behavior
            Source: Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: RegSvcs.exe, 00000002.00000002.3821771723.0000000003FC0000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3820969235.000000000317F000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3820969235.000000000318D000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3820969235.00000000031C1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3820969235.000000000316F000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3820969235.00000000031B4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
            Source: Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeVirustotal: Detection: 33%
            Source: Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeReversingLabs: Detection: 36%
            Source: unknownProcess created: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe "C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe"
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe"
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe"Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeSection loaded: wsock32.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
            Source: Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
            Source: Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
            Source: Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
            Source: Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
            Source: Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
            Source: Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
            Source: Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
            Source: Binary string: wntdll.pdbUGP source: Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe, 00000000.00000003.1375871226.00000000036A0000.00000004.00001000.00020000.00000000.sdmp, Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe, 00000000.00000003.1377468792.0000000003500000.00000004.00001000.00020000.00000000.sdmp
            Source: Binary string: wntdll.pdb source: Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe, 00000000.00000003.1375871226.00000000036A0000.00000004.00001000.00020000.00000000.sdmp, Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe, 00000000.00000003.1377468792.0000000003500000.00000004.00001000.00020000.00000000.sdmp
            Source: Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
            Source: Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
            Source: Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
            Source: Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
            Source: Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00134B37 LoadLibraryA,GetProcAddress,0_2_00134B37
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00158945 push ecx; ret 0_2_00158958
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_010EB0A5 pushfd ; iretd 2_2_010EB0AA
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02E12E78 push esp; iretd 2_2_02E12E79
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeFile created: \purchase order # 8mja15 - 20hrs pms twin engine 150hp.exe
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeFile created: \purchase order # 8mja15 - 20hrs pms twin engine 150hp.exeJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_001348D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_001348D7
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_001B5376 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_001B5376
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00153187 EncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00153187
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeAPI/Special instruction interceptor: Address: B9D614
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 600000Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599889Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599781Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599672Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599547Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599438Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599313Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599203Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599094Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598969Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598859Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598750Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598641Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598531Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598422Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598313Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598188Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598078Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597969Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597844Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597734Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597625Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597516Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597406Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597297Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597187Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597078Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596969Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596844Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596734Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596625Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596513Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596406Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596297Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596187Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596078Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595968Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595859Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595749Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595641Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595516Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595393Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595266Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595156Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595047Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594937Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594828Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594718Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594609Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594500Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 2089Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 7766Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-102296
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeAPI coverage: 5.7 %
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_0019445A GetFileAttributesW,FindFirstFileW,FindClose,0_2_0019445A
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_0019C6D1 FindFirstFileW,FindClose,0_2_0019C6D1
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_0019C75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_0019C75C
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_0019EF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0019EF95
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_0019F0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0019F0F2
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_0019F3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0019F3F3
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_001937EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_001937EF
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00193B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00193B12
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_0019BCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0019BCBC
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_001349A0 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_001349A0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 600000Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599889Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599781Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599672Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599547Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599438Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599313Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599203Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599094Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598969Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598859Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598750Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598641Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598531Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598422Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598313Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598188Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598078Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597969Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597844Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597734Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597625Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597516Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597406Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597297Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597187Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597078Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596969Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596844Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596734Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596625Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596513Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596406Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596297Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596187Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596078Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595968Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595859Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595749Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595641Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595516Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595393Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595266Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595156Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595047Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594937Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594828Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594718Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594609Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594500Jump to behavior
            Source: RegSvcs.exe, 00000002.00000002.3820376852.0000000001126000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeAPI call chain: ExitProcess graph end nodegraph_0-101155
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02E17D90 LdrInitializeThunk,2_2_02E17D90
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_001A3F09 BlockInput,0_2_001A3F09
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00133B3A GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00133B3A
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00165A7C EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_00165A7C
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00134B37 LoadLibraryA,GetProcAddress,0_2_00134B37
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00B9C220 mov eax, dword ptr fs:[00000030h]0_2_00B9C220
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00B9D880 mov eax, dword ptr fs:[00000030h]0_2_00B9D880
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00B9D8E0 mov eax, dword ptr fs:[00000030h]0_2_00B9D8E0
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_001880A9 GetTokenInformation,GetLastError,GetProcessHeap,HeapAlloc,GetTokenInformation,0_2_001880A9
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_0015A124 SetUnhandledExceptionFilter,0_2_0015A124
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_0015A155 SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0015A155
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: D9D008Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_001887B1 LogonUserW,0_2_001887B1
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00133B3A GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00133B3A
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_001348D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_001348D7
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00194C27 mouse_event,0_2_00194C27
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe"Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00187CAF GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00187CAF
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_0018874B AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_0018874B
            Source: Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
            Source: Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeBinary or memory string: Shell_TrayWnd
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_0015862B cpuid 0_2_0015862B
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00164E87 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00164E87
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00171E06 GetUserNameW,0_2_00171E06
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00163F3A __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_00163F3A
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_001349A0 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_001349A0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 0.2.Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe.1840000.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe.1840000.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000002.00000002.3820969235.0000000003102000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.1384703527.0000000001840000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.3819962621.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.3820969235.0000000002F31000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe PID: 7988, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 8052, type: MEMORYSTR
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
            Source: Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeBinary or memory string: WIN_81
            Source: Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeBinary or memory string: WIN_XP
            Source: Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeBinary or memory string: WIN_XPe
            Source: Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeBinary or memory string: WIN_VISTA
            Source: Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeBinary or memory string: WIN_7
            Source: Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeBinary or memory string: WIN_8
            Source: Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 14, 0USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte
            Source: Yara matchFile source: 0.2.Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe.1840000.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe.1840000.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000002.1384703527.0000000001840000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.3819962621.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe PID: 7988, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 8052, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 0.2.Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe.1840000.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe.1840000.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000002.00000002.3820969235.0000000003102000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.1384703527.0000000001840000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.3819962621.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.3820969235.0000000002F31000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe PID: 7988, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 8052, type: MEMORYSTR
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_001A6283 socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,0_2_001A6283
            Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_001A6747 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_001A6747
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire Infrastructure2
            Valid Accounts
            2
            Native API
            1
            DLL Side-Loading
            1
            Exploitation for Privilege Escalation
            11
            Disable or Modify Tools
            1
            OS Credential Dumping
            2
            System Time Discovery
            Remote Services11
            Archive Collected Data
            2
            Ingress Tool Transfer
            Exfiltration Over Other Network Medium1
            System Shutdown/Reboot
            CredentialsDomainsDefault AccountsScheduled Task/Job2
            Valid Accounts
            1
            DLL Side-Loading
            11
            Deobfuscate/Decode Files or Information
            21
            Input Capture
            1
            Account Discovery
            Remote Desktop Protocol1
            Data from Local System
            11
            Encrypted Channel
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)2
            Valid Accounts
            3
            Obfuscated Files or Information
            Security Account Manager1
            File and Directory Discovery
            SMB/Windows Admin Shares1
            Email Collection
            2
            Non-Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
            Access Token Manipulation
            1
            DLL Side-Loading
            NTDS127
            System Information Discovery
            Distributed Component Object Model21
            Input Capture
            13
            Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script212
            Process Injection
            2
            Valid Accounts
            LSA Secrets131
            Security Software Discovery
            SSH3
            Clipboard Data
            Fallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts11
            Virtualization/Sandbox Evasion
            Cached Domain Credentials11
            Virtualization/Sandbox Evasion
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items21
            Access Token Manipulation
            DCSync2
            Process Discovery
            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job212
            Process Injection
            Proc Filesystem11
            Application Window Discovery
            Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
            System Owner/User Discovery
            Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
            IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
            System Network Configuration Discovery
            Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.