Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe

Overview

General Information

Sample name:Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe
Analysis ID:1631472
MD5:22b7cc1cfa88d65291dba5f4cd35f221
SHA1:fe501709534bb94a026a73a021b7cc0bd179e639
SHA256:96415deeb9e8eef066e51a6bdea3ef37719fb2dd5a66f566451c9546a481a0eb
Tags:exeRedLineStealeruser-threatcat_ch
Infos:

Detection

PureLog Stealer, Snake Keylogger
Score:100
Range:0 - 100
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected AntiVM3
Yara detected PureLog Stealer
Yara detected Snake Keylogger
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
Binary is likely a compiled AutoIt script file
Initial sample is a PE file and has a suspicious name
Joe Sandbox ML detected suspicious sample
Maps a DLL or memory area into another process
Sample uses string decryption to hide its real strings
Switches to a custom stack to bypass stack traces
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect the country of the analysis system (by using the IP)
Writes to foreign memory regions
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates processes with suspicious names
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (date check)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
May check the online IP address of the machine
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe (PID: 3480 cmdline: "C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe" MD5: 22B7CC1CFA88D65291DBA5F4CD35F221)
    • RegSvcs.exe (PID: 6464 cmdline: "C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
    • Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe (PID: 6980 cmdline: "C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe" MD5: 22B7CC1CFA88D65291DBA5F4CD35F221)
      • RegSvcs.exe (PID: 2724 cmdline: "C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"Exfil Mode": "Telegram", "Telegram URL": "https://api.telegram.org/bot7200174383:AAGiuIXRkOAbU2n4B0G-2otS20RqwZrRApI/sendMessage?chat_id=7365979371", "Token": "7200174383:AAGiuIXRkOAbU2n4B0G-2otS20RqwZrRApI", "Chat_id": "7365979371", "Version": "5.1"}
SourceRuleDescriptionAuthorStrings
00000004.00000002.3306333552.0000000003194000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000004.00000002.3306333552.0000000003194000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
      00000004.00000002.3306333552.0000000003194000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
        00000004.00000002.3306333552.0000000003194000.00000004.00000020.00020000.00000000.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
        • 0x6617e:$a1: get_encryptedPassword
        • 0x66152:$a2: get_encryptedUsername
        • 0x66216:$a3: get_timePasswordChanged
        • 0x6612e:$a4: get_passwordField
        • 0x66194:$a5: set_encryptedPassword
        • 0x65f61:$a7: get_logins
        • 0x625c4:$a10: KeyLoggerEventArgs
        • 0x62593:$a11: KeyLoggerEventArgsEventHandler
        • 0x66035:$a13: _encryptedPassword
        00000004.00000002.3306333552.0000000003194000.00000004.00000020.00020000.00000000.sdmpMALWARE_Win_SnakeKeyloggerDetects Snake KeyloggerditekSHen
        • 0x693de:$x1: $%SMTPDV$
        • 0x67dc2:$x2: $#TheHashHere%&
        • 0x69386:$x3: %FTPDV$
        • 0x67d62:$x4: $%TelegramDv$
        • 0x62593:$x5: KeyLoggerEventArgs
        • 0x625c4:$x5: KeyLoggerEventArgs
        • 0x693aa:$m2: Clipboard Logs ID
        • 0x695e8:$m2: Screenshot Logs ID
        • 0x696f8:$m2: keystroke Logs ID
        • 0x699d2:$m3: SnakePW
        • 0x695c0:$m4: \SnakeKeylogger\
        Click to see the 28 entries
        SourceRuleDescriptionAuthorStrings
        4.2.RegSvcs.exe.400000.0.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
        • 0x1d0b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
        • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
        • 0x700:$s3: 83 EC 38 53 B0 08 88 44 24 2B 88 44 24 2F B0 29 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
        • 0x1ed8a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
        • 0x1e9d0:$s5: delete[]
        • 0x1de88:$s6: constructor or from DllMain.
        3.2.Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe.ab0000.0.raw.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
        • 0x1d0b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
        • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
        • 0x700:$s3: 83 EC 38 53 B0 08 88 44 24 2B 88 44 24 2F B0 29 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
        • 0x1ed8a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
        • 0x1e9d0:$s5: delete[]
        • 0x1de88:$s6: constructor or from DllMain.
        4.2.RegSvcs.exe.4589790.7.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          4.2.RegSvcs.exe.4589790.7.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
            4.2.RegSvcs.exe.4589790.7.unpackJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
              Click to see the 111 entries
              No Sigma rule has matched
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-03-07T07:25:24.805221+010028032742Potentially Bad Traffic192.168.2.549704132.226.8.16980TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: 00000004.00000002.3306333552.0000000003194000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "Telegram", "Telegram URL": "https://api.telegram.org/bot7200174383:AAGiuIXRkOAbU2n4B0G-2otS20RqwZrRApI/sendMessage?chat_id=7365979371", "Token": "7200174383:AAGiuIXRkOAbU2n4B0G-2otS20RqwZrRApI", "Chat_id": "7365979371", "Version": "5.1"}
              Source: Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeVirustotal: Detection: 54%Perma Link
              Source: Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeReversingLabs: Detection: 55%
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
              Source: 4.2.RegSvcs.exe.4589790.7.raw.unpackString decryptor:
              Source: 4.2.RegSvcs.exe.4589790.7.raw.unpackString decryptor: 7200174383:AAGiuIXRkOAbU2n4B0G-2otS20RqwZrRApI
              Source: 4.2.RegSvcs.exe.4589790.7.raw.unpackString decryptor: 7365979371

              Location Tracking

              barindex
              Source: unknownDNS query: name: reallyfreegeoip.org
              Source: Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
              Source: Binary string: _.pdb source: RegSvcs.exe, 00000004.00000002.3306333552.0000000003194000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3306428942.0000000003350000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3307382649.0000000004555000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: wntdll.pdbUGP source: Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe, 00000000.00000003.2054899838.0000000003FF0000.00000004.00001000.00020000.00000000.sdmp, Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe, 00000000.00000003.2055678386.0000000004190000.00000004.00001000.00020000.00000000.sdmp, Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe, 00000003.00000003.2070860319.00000000035A0000.00000004.00001000.00020000.00000000.sdmp, Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe, 00000003.00000003.2072370432.0000000003740000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: wntdll.pdb source: Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe, 00000000.00000003.2054899838.0000000003FF0000.00000004.00001000.00020000.00000000.sdmp, Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe, 00000000.00000003.2055678386.0000000004190000.00000004.00001000.00020000.00000000.sdmp, Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe, 00000003.00000003.2070860319.00000000035A0000.00000004.00001000.00020000.00000000.sdmp, Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe, 00000003.00000003.2072370432.0000000003740000.00000004.00001000.00020000.00000000.sdmp
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00BC445A GetFileAttributesW,FindFirstFileW,FindClose,0_2_00BC445A
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00BCC6D1 FindFirstFileW,FindClose,0_2_00BCC6D1
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00BCC75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_00BCC75C
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00BCEF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00BCEF95
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00BCF0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00BCF0F2
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00BCF3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00BCF3F3
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00BC37EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00BC37EF
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00BC3B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00BC3B12
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00BCBCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00BCBCBC
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov dword ptr [ebp-20h], 00000000h4_2_02FBE258
              Source: Joe Sandbox ViewIP Address: 132.226.8.169 132.226.8.169
              Source: Joe Sandbox ViewIP Address: 104.21.112.1 104.21.112.1
              Source: Joe Sandbox ViewIP Address: 104.21.112.1 104.21.112.1
              Source: unknownDNS query: name: checkip.dyndns.org
              Source: unknownDNS query: name: reallyfreegeoip.org
              Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49704 -> 132.226.8.169:80
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00BD22EE InternetReadFile,InternetQueryDataAvailable,InternetReadFile,0_2_00BD22EE
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
              Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
              Source: RegSvcs.exe, 00000004.00000002.3306612590.00000000036B0000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3306612590.0000000003683000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
              Source: RegSvcs.exe, 00000004.00000002.3306612590.0000000003673000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3306612590.00000000036B0000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3306612590.0000000003683000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
              Source: RegSvcs.exe, 00000004.00000002.3305850425.00000000015EB000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3306612590.00000000035B9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
              Source: RegSvcs.exe, 00000004.00000002.3306333552.0000000003194000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3306428942.0000000003350000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3307382649.0000000004555000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3306501144.00000000033D0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
              Source: RegSvcs.exe, 00000004.00000002.3306612590.00000000036A3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.org
              Source: RegSvcs.exe, 00000004.00000002.3306612590.00000000035B9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
              Source: RegSvcs.exe, 00000004.00000002.3306612590.00000000036B0000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3306612590.0000000003683000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
              Source: RegSvcs.exe, 00000004.00000002.3306333552.0000000003194000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3306428942.0000000003350000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3306612590.0000000003683000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3307382649.0000000004555000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3306501144.00000000033D0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
              Source: RegSvcs.exe, 00000004.00000002.3306612590.0000000003683000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189
              Source: RegSvcs.exe, 00000004.00000002.3306612590.00000000036B0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189$
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
              Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00BD4164 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00BD4164
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00BD4164 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00BD4164
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00BD3F66 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00BD3F66
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00BC001C GetKeyboardState,SetKeyboardState,GetAsyncKeyState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,0_2_00BC001C
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00BECABC DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_00BECABC

              System Summary

              barindex
              Source: 4.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 3.2.Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe.ab0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 4.2.RegSvcs.exe.4589790.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 4.2.RegSvcs.exe.4589790.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 4.2.RegSvcs.exe.4589790.7.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 4.2.RegSvcs.exe.4589790.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 4.2.RegSvcs.exe.4589790.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 4.2.RegSvcs.exe.4589790.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 4.2.RegSvcs.exe.4556458.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 4.2.RegSvcs.exe.31d4f96.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 4.2.RegSvcs.exe.31d4f96.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 4.2.RegSvcs.exe.31d4f96.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 4.2.RegSvcs.exe.31d4f96.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 4.2.RegSvcs.exe.3350ee8.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 4.2.RegSvcs.exe.33d0000.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 4.2.RegSvcs.exe.33d0000.5.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 4.2.RegSvcs.exe.33d0000.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 4.2.RegSvcs.exe.3350ee8.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 4.2.RegSvcs.exe.4556458.6.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 4.2.RegSvcs.exe.4589790.7.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 4.2.RegSvcs.exe.4556458.6.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 4.2.RegSvcs.exe.4556458.6.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 4.2.RegSvcs.exe.3350ee8.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 4.2.RegSvcs.exe.33d0000.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 4.2.RegSvcs.exe.4589790.7.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 4.2.RegSvcs.exe.33d0000.5.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 4.2.RegSvcs.exe.33d0000.5.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 4.2.RegSvcs.exe.3350ee8.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 4.2.RegSvcs.exe.33d0000.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 4.2.RegSvcs.exe.31d5e7e.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 4.2.RegSvcs.exe.3350ee8.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 4.2.RegSvcs.exe.33d0000.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 4.2.RegSvcs.exe.3350ee8.4.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 4.2.RegSvcs.exe.4555570.8.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 4.2.RegSvcs.exe.3350ee8.4.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 4.2.RegSvcs.exe.3350ee8.4.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 4.2.RegSvcs.exe.4555570.8.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 4.2.RegSvcs.exe.4555570.8.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 4.2.RegSvcs.exe.4555570.8.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 4.2.RegSvcs.exe.31d5e7e.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 4.2.RegSvcs.exe.31d5e7e.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 4.2.RegSvcs.exe.31d5e7e.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 4.2.RegSvcs.exe.4555570.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 4.2.RegSvcs.exe.4555570.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 4.2.RegSvcs.exe.4555570.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 4.2.RegSvcs.exe.4555570.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 0.2.Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe.1fd0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 4.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 4.2.RegSvcs.exe.31d5e7e.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 4.2.RegSvcs.exe.31d5e7e.1.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 4.2.RegSvcs.exe.31d5e7e.1.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 4.2.RegSvcs.exe.31d5e7e.1.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 4.2.RegSvcs.exe.31d4f96.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 4.2.RegSvcs.exe.31d4f96.2.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 4.2.RegSvcs.exe.31d4f96.2.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 4.2.RegSvcs.exe.31d4f96.2.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 4.2.RegSvcs.exe.3350000.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 4.2.RegSvcs.exe.3350000.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 4.2.RegSvcs.exe.3350000.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 4.2.RegSvcs.exe.3350000.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 4.2.RegSvcs.exe.3350000.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 4.2.RegSvcs.exe.3350000.3.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 4.2.RegSvcs.exe.3350000.3.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 4.2.RegSvcs.exe.3350000.3.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 4.2.RegSvcs.exe.4556458.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 4.2.RegSvcs.exe.4556458.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 4.2.RegSvcs.exe.4556458.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 4.2.RegSvcs.exe.4556458.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 00000004.00000002.3306333552.0000000003194000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 00000004.00000002.3306333552.0000000003194000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 00000000.00000002.2058120380.0000000001FD0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 00000004.00000002.3306428942.0000000003350000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 00000004.00000002.3306428942.0000000003350000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 00000004.00000002.3306428942.0000000003350000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 00000004.00000002.3306428942.0000000003350000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 00000004.00000002.3307382649.0000000004555000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 00000004.00000002.3307382649.0000000004555000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 00000004.00000002.3305263132.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 00000003.00000002.2075541650.0000000000AB0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 00000004.00000002.3306501144.00000000033D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 00000004.00000002.3306501144.00000000033D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 00000004.00000002.3306501144.00000000033D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 00000004.00000002.3306501144.00000000033D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: Process Memory Space: RegSvcs.exe PID: 2724, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: Process Memory Space: RegSvcs.exe PID: 2724, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: This is a third-party compiled AutoIt script.0_2_00B63B3A
              Source: Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeString found in binary or memory: This is a third-party compiled AutoIt script.
              Source: Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe, 00000000.00000000.2042589172.0000000000C14000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_d7450aac-8
              Source: Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe, 00000000.00000000.2042589172.0000000000C14000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_f9651a5a-a
              Source: Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe, 00000003.00000002.2075719366.0000000000C14000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_b6e40b36-8
              Source: Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe, 00000003.00000002.2075719366.0000000000C14000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_4dc50547-8
              Source: Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_14f6bb0a-3
              Source: Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_3c2bf7a3-f
              Source: initial sampleStatic PE information: Filename: Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00BCA1EF: GetFullPathNameW,__swprintf,CreateDirectoryW,CreateFileW,_memset,_wcsncpy,DeviceIoControl,CloseHandle,RemoveDirectoryW,CloseHandle,0_2_00BCA1EF
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00BB8310 _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00BB8310
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00BC51BD ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_00BC51BD
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00B6E6A00_2_00B6E6A0
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00B8D9750_2_00B8D975
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00B6FCE00_2_00B6FCE0
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00B821C50_2_00B821C5
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00B962D20_2_00B962D2
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00BE03DA0_2_00BE03DA
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00B9242E0_2_00B9242E
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00B825FA0_2_00B825FA
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00B766E10_2_00B766E1
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00BBE6160_2_00BBE616
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00B9878F0_2_00B9878F
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00BC88890_2_00BC8889
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00B788080_2_00B78808
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00BE08570_2_00BE0857
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00B968440_2_00B96844
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00B8CB210_2_00B8CB21
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00B96DB60_2_00B96DB6
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00B76F9E0_2_00B76F9E
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00B730300_2_00B73030
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00B831870_2_00B83187
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00B8F1D90_2_00B8F1D9
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00B612870_2_00B61287
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00B814840_2_00B81484
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00B755200_2_00B75520
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00B876960_2_00B87696
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00B757600_2_00B75760
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00B819780_2_00B81978
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00B99AB50_2_00B99AB5
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00B8BDA60_2_00B8BDA6
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00B81D900_2_00B81D90
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00BE7DDB0_2_00BE7DDB
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00B73FE00_2_00B73FE0
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00B6DF000_2_00B6DF00
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_017415980_2_01741598
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 3_2_00DBA3A03_2_00DBA3A0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00408C604_2_00408C60
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0040DC114_2_0040DC11
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00407C3F4_2_00407C3F
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00418CCC4_2_00418CCC
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00406CA04_2_00406CA0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004028B04_2_004028B0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0041A4BE4_2_0041A4BE
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004182444_2_00418244
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004016504_2_00401650
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00402F204_2_00402F20
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004193C44_2_004193C4
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004187884_2_00418788
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00402F894_2_00402F89
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00402B904_2_00402B90
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004073A04_2_004073A0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_02FB12C04_2_02FB12C0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_02FB12B04_2_02FB12B0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_02FB15604_2_02FB1560
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_02FB15504_2_02FB1550
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: String function: 0040E1D8 appears 44 times
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: String function: 00B67DE1 appears 35 times
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: String function: 00B80AE3 appears 70 times
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: String function: 00B88900 appears 42 times
              Source: Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe, 00000000.00000003.2055541458.0000000004113000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe
              Source: Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe, 00000000.00000003.2055138398.00000000042BD000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe
              Source: Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe, 00000000.00000002.2058120380.0000000001FD0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe
              Source: Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe, 00000003.00000003.2072761527.00000000036C3000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe
              Source: Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe, 00000003.00000003.2072944831.000000000386D000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe
              Source: Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe, 00000003.00000002.2075541650.0000000000AB0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe
              Source: Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
              Source: 4.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 3.2.Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe.ab0000.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 4.2.RegSvcs.exe.4589790.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 4.2.RegSvcs.exe.4589790.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 4.2.RegSvcs.exe.4589790.7.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 4.2.RegSvcs.exe.4589790.7.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 4.2.RegSvcs.exe.4589790.7.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 4.2.RegSvcs.exe.4589790.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 4.2.RegSvcs.exe.4556458.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 4.2.RegSvcs.exe.31d4f96.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 4.2.RegSvcs.exe.31d4f96.2.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 4.2.RegSvcs.exe.31d4f96.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 4.2.RegSvcs.exe.31d4f96.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 4.2.RegSvcs.exe.3350ee8.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 4.2.RegSvcs.exe.33d0000.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 4.2.RegSvcs.exe.33d0000.5.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 4.2.RegSvcs.exe.33d0000.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 4.2.RegSvcs.exe.3350ee8.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 4.2.RegSvcs.exe.4556458.6.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 4.2.RegSvcs.exe.4589790.7.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 4.2.RegSvcs.exe.4556458.6.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 4.2.RegSvcs.exe.4556458.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 4.2.RegSvcs.exe.3350ee8.4.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 4.2.RegSvcs.exe.33d0000.5.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 4.2.RegSvcs.exe.4589790.7.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 4.2.RegSvcs.exe.33d0000.5.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 4.2.RegSvcs.exe.33d0000.5.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 4.2.RegSvcs.exe.3350ee8.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 4.2.RegSvcs.exe.33d0000.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 4.2.RegSvcs.exe.31d5e7e.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 4.2.RegSvcs.exe.3350ee8.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 4.2.RegSvcs.exe.33d0000.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 4.2.RegSvcs.exe.3350ee8.4.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 4.2.RegSvcs.exe.4555570.8.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 4.2.RegSvcs.exe.3350ee8.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 4.2.RegSvcs.exe.3350ee8.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 4.2.RegSvcs.exe.4555570.8.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 4.2.RegSvcs.exe.4555570.8.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 4.2.RegSvcs.exe.4555570.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 4.2.RegSvcs.exe.31d5e7e.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 4.2.RegSvcs.exe.31d5e7e.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 4.2.RegSvcs.exe.31d5e7e.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 4.2.RegSvcs.exe.4555570.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 4.2.RegSvcs.exe.4555570.8.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 4.2.RegSvcs.exe.4555570.8.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 4.2.RegSvcs.exe.4555570.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 0.2.Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe.1fd0000.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 4.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 4.2.RegSvcs.exe.31d5e7e.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 4.2.RegSvcs.exe.31d5e7e.1.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 4.2.RegSvcs.exe.31d5e7e.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 4.2.RegSvcs.exe.31d5e7e.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 4.2.RegSvcs.exe.31d4f96.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 4.2.RegSvcs.exe.31d4f96.2.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 4.2.RegSvcs.exe.31d4f96.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 4.2.RegSvcs.exe.31d4f96.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 4.2.RegSvcs.exe.3350000.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 4.2.RegSvcs.exe.3350000.3.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 4.2.RegSvcs.exe.3350000.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 4.2.RegSvcs.exe.3350000.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 4.2.RegSvcs.exe.3350000.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 4.2.RegSvcs.exe.3350000.3.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 4.2.RegSvcs.exe.3350000.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 4.2.RegSvcs.exe.3350000.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 4.2.RegSvcs.exe.4556458.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 4.2.RegSvcs.exe.4556458.6.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 4.2.RegSvcs.exe.4556458.6.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 4.2.RegSvcs.exe.4556458.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 00000004.00000002.3306333552.0000000003194000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 00000004.00000002.3306333552.0000000003194000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 00000000.00000002.2058120380.0000000001FD0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 00000004.00000002.3306428942.0000000003350000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 00000004.00000002.3306428942.0000000003350000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 00000004.00000002.3306428942.0000000003350000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 00000004.00000002.3306428942.0000000003350000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 00000004.00000002.3307382649.0000000004555000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 00000004.00000002.3307382649.0000000004555000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 00000004.00000002.3305263132.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 00000003.00000002.2075541650.0000000000AB0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 00000004.00000002.3306501144.00000000033D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 00000004.00000002.3306501144.00000000033D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 00000004.00000002.3306501144.00000000033D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 00000004.00000002.3306501144.00000000033D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: Process Memory Space: RegSvcs.exe PID: 2724, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: Process Memory Space: RegSvcs.exe PID: 2724, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 4.2.RegSvcs.exe.4589790.7.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
              Source: 4.2.RegSvcs.exe.4589790.7.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
              Source: 4.2.RegSvcs.exe.33d0000.5.raw.unpack, --.csCryptographic APIs: 'TransformFinalBlock'
              Source: 4.2.RegSvcs.exe.33d0000.5.raw.unpack, --.csCryptographic APIs: 'TransformFinalBlock'
              Source: 4.2.RegSvcs.exe.33d0000.5.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
              Source: 4.2.RegSvcs.exe.33d0000.5.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
              Source: 4.2.RegSvcs.exe.33d0000.5.raw.unpack, --.csCryptographic APIs: 'TransformFinalBlock'
              Source: 4.2.RegSvcs.exe.33d0000.5.raw.unpack, --.csCryptographic APIs: 'TransformFinalBlock'
              Source: 4.2.RegSvcs.exe.3350ee8.4.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
              Source: 4.2.RegSvcs.exe.3350ee8.4.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
              Source: 4.2.RegSvcs.exe.31d5e7e.1.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
              Source: 4.2.RegSvcs.exe.31d5e7e.1.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
              Source: classification engineClassification label: mal100.troj.evad.winEXE@7/3@2/2
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00BCA06A GetLastError,FormatMessageW,0_2_00BCA06A
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00BB81CB AdjustTokenPrivileges,CloseHandle,0_2_00BB81CB
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00BB87E1 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_00BB87E1
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00BCB3FB SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_00BCB3FB
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00BDEE0D CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_00BDEE0D
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00BD83BB CoInitialize,CoUninitialize,CoCreateInstance,IIDFromString,VariantInit,VariantClear,0_2_00BD83BB
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00B64E89 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_00B64E89
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeFile created: C:\Users\user\AppData\Local\Temp\aut8BB2.tmpJump to behavior
              Source: Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeVirustotal: Detection: 54%
              Source: Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeReversingLabs: Detection: 55%
              Source: unknownProcess created: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe "C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe"
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe"
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeProcess created: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe "C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe"
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe"
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe"Jump to behavior
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeProcess created: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe "C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe"Jump to behavior
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe"Jump to behavior
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeSection loaded: wsock32.dllJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeSection loaded: winmm.dllJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeSection loaded: wsock32.dllJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeSection loaded: winmm.dllJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
              Source: Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeStatic file information: File size 1121280 > 1048576
              Source: Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
              Source: Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
              Source: Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
              Source: Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
              Source: Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
              Source: Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
              Source: Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
              Source: Binary string: _.pdb source: RegSvcs.exe, 00000004.00000002.3306333552.0000000003194000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3306428942.0000000003350000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.3307382649.0000000004555000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: wntdll.pdbUGP source: Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe, 00000000.00000003.2054899838.0000000003FF0000.00000004.00001000.00020000.00000000.sdmp, Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe, 00000000.00000003.2055678386.0000000004190000.00000004.00001000.00020000.00000000.sdmp, Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe, 00000003.00000003.2070860319.00000000035A0000.00000004.00001000.00020000.00000000.sdmp, Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe, 00000003.00000003.2072370432.0000000003740000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: wntdll.pdb source: Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe, 00000000.00000003.2054899838.0000000003FF0000.00000004.00001000.00020000.00000000.sdmp, Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe, 00000000.00000003.2055678386.0000000004190000.00000004.00001000.00020000.00000000.sdmp, Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe, 00000003.00000003.2070860319.00000000035A0000.00000004.00001000.00020000.00000000.sdmp, Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe, 00000003.00000003.2072370432.0000000003740000.00000004.00001000.00020000.00000000.sdmp
              Source: Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
              Source: Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
              Source: Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
              Source: Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
              Source: Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

              Data Obfuscation

              barindex
              Source: 4.2.RegSvcs.exe.4589790.7.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
              Source: 4.2.RegSvcs.exe.33d0000.5.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
              Source: 4.2.RegSvcs.exe.3350ee8.4.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
              Source: 4.2.RegSvcs.exe.31d5e7e.1.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
              Source: 4.2.RegSvcs.exe.4556458.6.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
              Source: 4.2.RegSvcs.exe.4555570.8.raw.unpack, _.cs.Net Code: ___ System.Reflection.Assembly.Load(byte[])
              Source: 4.2.RegSvcs.exe.31d4f96.2.raw.unpack, _.cs.Net Code: ___ System.Reflection.Assembly.Load(byte[])
              Source: 4.2.RegSvcs.exe.3350000.3.raw.unpack, _.cs.Net Code: ___ System.Reflection.Assembly.Load(byte[])
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00B64B37 LoadLibraryA,GetProcAddress,0_2_00B64B37
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00B88945 push ecx; ret 0_2_00B88958
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0041C40C push cs; iretd 4_2_0041C4E2
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00423149 push eax; ret 4_2_00423179
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0041C50E push cs; iretd 4_2_0041C4E2
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004231C8 push eax; ret 4_2_00423179
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0040E21D push ecx; ret 4_2_0040E230
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0041C6BE push ebx; ret 4_2_0041C6BF
              Source: 4.2.RegSvcs.exe.4589790.7.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'mgioI1SGEsEQl', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
              Source: 4.2.RegSvcs.exe.33d0000.5.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'mgioI1SGEsEQl', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
              Source: 4.2.RegSvcs.exe.3350ee8.4.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'mgioI1SGEsEQl', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
              Source: 4.2.RegSvcs.exe.31d5e7e.1.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'mgioI1SGEsEQl', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
              Source: 4.2.RegSvcs.exe.4556458.6.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'mgioI1SGEsEQl', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeFile created: \purchase order # 8mja15 - 20hrs pms twin engine 150hp.exe
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeFile created: \purchase order # 8mja15 - 20hrs pms twin engine 150hp.exe
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeFile created: \purchase order # 8mja15 - 20hrs pms twin engine 150hp.exe
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeFile created: \purchase order # 8mja15 - 20hrs pms twin engine 150hp.exeJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeFile created: \purchase order # 8mja15 - 20hrs pms twin engine 150hp.exeJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeFile created: \purchase order # 8mja15 - 20hrs pms twin engine 150hp.exeJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00B648D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00B648D7
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00BE5376 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_00BE5376
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00B83187 EncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00B83187
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 2724, type: MEMORYSTR
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeAPI/Special instruction interceptor: Address: 17411BC
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeAPI/Special instruction interceptor: Address: DB9FC4
              Source: Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe, 00000003.00000002.2076111456.0000000000DC2000.00000004.00000020.00020000.00000000.sdmp, Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe, 00000003.00000003.2058087803.0000000000DC2000.00000004.00000020.00020000.00000000.sdmp, Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe, 00000003.00000003.2057967862.0000000000DC2000.00000004.00000020.00020000.00000000.sdmp, Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe, 00000003.00000003.2061980938.0000000000DBD000.00000004.00000020.00020000.00000000.sdmp, Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe, 00000003.00000003.2059968932.0000000000DC2000.00000004.00000020.00020000.00000000.sdmp, Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe, 00000003.00000003.2065267172.0000000000DC2000.00000004.00000020.00020000.00000000.sdmp, Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe, 00000003.00000003.2063234060.0000000000DBF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PROCMON.EXE\
              Source: Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe, 00000000.00000003.2047775384.00000000017A3000.00000004.00000020.00020000.00000000.sdmp, Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe, 00000000.00000002.2057772038.00000000017A3000.00000004.00000020.00020000.00000000.sdmp, Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe, 00000000.00000003.2044238504.00000000017A3000.00000004.00000020.00020000.00000000.sdmp, Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe, 00000000.00000003.2049253083.00000000017A3000.00000004.00000020.00020000.00000000.sdmp, Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe, 00000000.00000003.2043758975.00000000017A3000.00000004.00000020.00020000.00000000.sdmp, Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe, 00000000.00000003.2048826648.00000000017A3000.00000004.00000020.00020000.00000000.sdmp, Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe, 00000000.00000003.2043659835.0000000001774000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PROCMON.EXEG
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,CloseHandle,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,4_2_004019F0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 600000Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599875Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599765Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599656Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599547Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599437Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599328Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599218Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599063Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598764Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598656Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598546Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598437Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598328Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598218Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598109Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598000Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597890Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597781Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597672Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597562Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597453Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597344Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597234Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597124Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597015Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596906Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596797Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596687Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596578Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596469Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596358Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596181Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596062Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595953Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595844Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595734Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595625Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595515Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595406Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595297Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595187Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595078Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594968Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594859Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594750Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594640Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594531Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 7526Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 2328Jump to behavior
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-106095
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeAPI coverage: 4.5 %
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00BC445A GetFileAttributesW,FindFirstFileW,FindClose,0_2_00BC445A
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00BCC6D1 FindFirstFileW,FindClose,0_2_00BCC6D1
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00BCC75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_00BCC75C
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00BCEF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00BCEF95
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00BCF0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00BCF0F2
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00BCF3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00BCF3F3
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00BC37EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00BC37EF
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00BC3B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00BC3B12
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00BCBCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00BCBCBC
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00B649A0 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00B649A0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 600000Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599875Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599765Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599656Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599547Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599437Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599328Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599218Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599063Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598764Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598656Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598546Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598437Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598328Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598218Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598109Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598000Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597890Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597781Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597672Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597562Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597453Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597344Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597234Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597124Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597015Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596906Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596797Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596687Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596578Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596469Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596358Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596181Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596062Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595953Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595844Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595734Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595625Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595515Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595406Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595297Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595187Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595078Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594968Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594859Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594750Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594640Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594531Jump to behavior
              Source: RegSvcs.exe, 00000004.00000002.3305850425.00000000015BD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeAPI call chain: ExitProcess graph end nodegraph_0-104580
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00BD3F09 BlockInput,0_2_00BD3F09
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00B63B3A GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00B63B3A
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00B95A7C EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_00B95A7C
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,CloseHandle,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,4_2_004019F0
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00B64B37 LoadLibraryA,GetProcAddress,0_2_00B64B37
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_01741428 mov eax, dword ptr fs:[00000030h]0_2_01741428
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_01741488 mov eax, dword ptr fs:[00000030h]0_2_01741488
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_0173FE38 mov eax, dword ptr fs:[00000030h]0_2_0173FE38
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 3_2_00DB8C40 mov eax, dword ptr fs:[00000030h]3_2_00DB8C40
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 3_2_00DBA290 mov eax, dword ptr fs:[00000030h]3_2_00DBA290
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 3_2_00DBA230 mov eax, dword ptr fs:[00000030h]3_2_00DBA230
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00BB80A9 GetTokenInformation,GetLastError,GetProcessHeap,HeapAlloc,GetTokenInformation,0_2_00BB80A9
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00B8A124 SetUnhandledExceptionFilter,0_2_00B8A124
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00B8A155 SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00B8A155
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0040CE09 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,4_2_0040CE09
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0040E61C _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,4_2_0040E61C
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_00416F6A __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_00416F6A
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_004123F1 SetUnhandledExceptionFilter,4_2_004123F1
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 1150008Jump to behavior
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00BB87B1 LogonUserW,0_2_00BB87B1
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00B63B3A GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00B63B3A
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00B648D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00B648D7
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00BC4C27 mouse_event,0_2_00BC4C27
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe"Jump to behavior
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe"Jump to behavior
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00BB7CAF GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00BB7CAF
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00BB874B AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_00BB874B
              Source: Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
              Source: Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeBinary or memory string: Shell_TrayWnd
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00B8862B cpuid 0_2_00B8862B
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: GetLocaleInfoA,4_2_00417A20
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00B94E87 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00B94E87
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00BA1E06 GetUserNameW,0_2_00BA1E06
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00B93F3A __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_00B93F3A
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00B649A0 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00B649A0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 4.2.RegSvcs.exe.4589790.7.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.4589790.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.4556458.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.3350ee8.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.3350ee8.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.31d4f96.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.33d0000.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.33d0000.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.31d5e7e.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.4555570.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.4555570.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.31d5e7e.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.31d4f96.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.3350000.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.3350000.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.4556458.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000004.00000002.3306333552.0000000003194000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.3306428942.0000000003350000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.3307382649.0000000004555000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.3306501144.00000000033D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 4.2.RegSvcs.exe.4589790.7.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.4589790.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.4556458.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.3350ee8.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.3350ee8.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.31d4f96.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.33d0000.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.33d0000.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.31d5e7e.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.4555570.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.4555570.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.31d5e7e.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.31d4f96.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.3350000.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.3350000.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.4556458.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000004.00000002.3306333552.0000000003194000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.3306428942.0000000003350000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.3307382649.0000000004555000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.3306501144.00000000033D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.3306612590.00000000035B9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 2724, type: MEMORYSTR
              Source: Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeBinary or memory string: WIN_81
              Source: Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeBinary or memory string: WIN_XP
              Source: Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeBinary or memory string: WIN_XPe
              Source: Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeBinary or memory string: WIN_VISTA
              Source: Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeBinary or memory string: WIN_7
              Source: Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeBinary or memory string: WIN_8
              Source: Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 14, 0USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte
              Source: Yara matchFile source: 4.2.RegSvcs.exe.4589790.7.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.4589790.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.4556458.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.3350ee8.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.3350ee8.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.31d4f96.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.33d0000.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.4555570.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.33d0000.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.31d5e7e.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.4555570.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.31d5e7e.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.31d4f96.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.3350000.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.3350000.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.4556458.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000004.00000002.3306333552.0000000003194000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.3306428942.0000000003350000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.3307382649.0000000004555000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.3306501144.00000000033D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 2724, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: 4.2.RegSvcs.exe.4589790.7.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.4589790.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.4556458.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.3350ee8.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.3350ee8.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.31d4f96.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.33d0000.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.33d0000.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.31d5e7e.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.4555570.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.4555570.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.31d5e7e.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.31d4f96.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.3350000.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.3350000.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.4556458.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000004.00000002.3306333552.0000000003194000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.3306428942.0000000003350000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.3307382649.0000000004555000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.3306501144.00000000033D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 4.2.RegSvcs.exe.4589790.7.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.4589790.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.4556458.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.3350ee8.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.3350ee8.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.31d4f96.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.33d0000.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.33d0000.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.31d5e7e.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.4555570.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.4555570.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.31d5e7e.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.31d4f96.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.3350000.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.3350000.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.RegSvcs.exe.4556458.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000004.00000002.3306333552.0000000003194000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.3306428942.0000000003350000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.3307382649.0000000004555000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.3306501144.00000000033D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.3306612590.00000000035B9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 2724, type: MEMORYSTR
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00BD6283 socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,0_2_00BD6283
              Source: C:\Users\user\Desktop\Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exeCode function: 0_2_00BD6747 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00BD6747
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire Infrastructure2
              Valid Accounts
              2
              Native API
              1
              DLL Side-Loading
              1
              Exploitation for Privilege Escalation
              11
              Disable or Modify Tools
              21
              Input Capture
              2
              System Time Discovery
              Remote Services11
              Archive Collected Data
              2
              Ingress Tool Transfer
              Exfiltration Over Other Network Medium1
              System Shutdown/Reboot
              CredentialsDomainsDefault AccountsScheduled Task/Job2
              Valid Accounts
              1
              DLL Side-Loading
              11
              Deobfuscate/Decode Files or Information
              LSASS Memory1
              Account Discovery
              Remote Desktop Protocol21
              Input Capture
              12
              Encrypted Channel
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)2
              Valid Accounts
              3
              Obfuscated Files or Information
              Security Account Manager1
              File and Directory Discovery
              SMB/Windows Admin Shares3
              Clipboard Data
              2
              Non-Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
              Access Token Manipulation
              2
              Software Packing
              NTDS136
              System Information Discovery
              Distributed Component Object ModelInput Capture13
              Application Layer Protocol
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script212
              Process Injection
              1
              DLL Side-Loading
              LSA Secrets241
              Security Software Discovery
              SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
              Valid Accounts
              Cached Domain Credentials11
              Virtualization/Sandbox Evasion
              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items11
              Virtualization/Sandbox Evasion
              DCSync2
              Process Discovery
              Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
              Access Token Manipulation
              Proc Filesystem11
              Application Window Discovery
              Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
              Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt212
              Process Injection
              /etc/passwd and /etc/shadow1
              System Owner/User Discovery
              Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
              IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
              System Network Configuration Discovery
              Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1631472 Sample: Purchase Order # 8MJA15 - 2... Startdate: 07/03/2025 Architecture: WINDOWS Score: 100 23 reallyfreegeoip.org 2->23 25 checkip.dyndns.org 2->25 27 checkip.dyndns.com 2->27 29 Found malware configuration 2->29 31 Malicious sample detected (through community Yara rule) 2->31 33 Multi AV Scanner detection for submitted file 2->33 37 10 other signatures 2->37 8 Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe 2 2->8         started        signatures3 35 Tries to detect the country of the analysis system (by using the IP) 23->35 process4 signatures5 39 Binary is likely a compiled AutoIt script file 8->39 41 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 8->41 11 Purchase Order # 8MJA15 - 20hrs PMS Twin Engine 150HP.exe 1 8->11         started        14 RegSvcs.exe 8->14         started        process6 signatures7 43 Binary is likely a compiled AutoIt script file 11->43 45 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 11->45 47 Writes to foreign memory regions 11->47 49 Maps a DLL or memory area into another process 11->49 16 RegSvcs.exe 15 2 11->16         started        process8 dnsIp9 19 checkip.dyndns.com 132.226.8.169, 49704, 49721, 80 UTMEMUS United States 16->19 21 reallyfreegeoip.org 104.21.112.1, 443, 49705, 49722 CLOUDFLARENETUS United States 16->21

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.