Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Purchase Order No.1364.exe

Overview

General Information

Sample name:Purchase Order No.1364.exe
Analysis ID:1638114
MD5:590a49e6af7de46b3d72e7d322b7ec5d
SHA1:02df153059b46739488d83b5bb165f748a140dce
SHA256:d2de2cdacd6417cc261b2c1f95026b47e14af21e097efd1d4ab15a5fab6d72c4
Tags:exeuser-lowmal3
Infos:

Detection

Snake Keylogger
Score:100
Range:0 - 100
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected AntiVM3
Yara detected Snake Keylogger
.NET source code contains potential unpacker
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Sample uses string decryption to hide its real strings
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Allocates memory with a write watch (potentially for evading sandboxes)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
IP address seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • Purchase Order No.1364.exe (PID: 6352 cmdline: "C:\Users\user\Desktop\Purchase Order No.1364.exe" MD5: 590A49E6AF7DE46B3D72E7D322B7EC5D)
    • Purchase Order No.1364.exe (PID: 6516 cmdline: "C:\Users\user\Desktop\Purchase Order No.1364.exe" MD5: 590A49E6AF7DE46B3D72E7D322B7EC5D)
    • Purchase Order No.1364.exe (PID: 6456 cmdline: "C:\Users\user\Desktop\Purchase Order No.1364.exe" MD5: 590A49E6AF7DE46B3D72E7D322B7EC5D)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"Exfil Mode": "Telegram", "Telegram URL": "https://api.telegram.org/bot7922655426:AAFVRqVw9pB4VZ3uipJRDfn5kD08nswJtAk/sendMessage?chat_id=7854955274", "Token": "7922655426:AAFVRqVw9pB4VZ3uipJRDfn5kD08nswJtAk", "Chat_id": "7854955274", "Version": "5.1"}
SourceRuleDescriptionAuthorStrings
00000002.00000002.3318503770.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000002.00000002.3318503770.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
      00000002.00000002.3318503770.0000000000402000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
      • 0x148ce:$a1: get_encryptedPassword
      • 0x14bba:$a2: get_encryptedUsername
      • 0x146da:$a3: get_timePasswordChanged
      • 0x147d5:$a4: get_passwordField
      • 0x148e4:$a5: set_encryptedPassword
      • 0x15f8b:$a7: get_logins
      • 0x15eee:$a10: KeyLoggerEventArgs
      • 0x15b59:$a11: KeyLoggerEventArgsEventHandler
      00000002.00000002.3318503770.0000000000402000.00000040.00000400.00020000.00000000.sdmpMALWARE_Win_SnakeKeyloggerDetects Snake KeyloggerditekSHen
      • 0x198a4:$x1: $%SMTPDV$
      • 0x18288:$x2: $#TheHashHere%&
      • 0x1984c:$x3: %FTPDV$
      • 0x18228:$x4: $%TelegramDv$
      • 0x15b59:$x5: KeyLoggerEventArgs
      • 0x15eee:$x5: KeyLoggerEventArgs
      • 0x19870:$m2: Clipboard Logs ID
      • 0x19aae:$m2: Screenshot Logs ID
      • 0x19bbe:$m2: keystroke Logs ID
      • 0x19e98:$m3: SnakePW
      • 0x19a86:$m4: \SnakeKeylogger\
      00000002.00000002.3320826906.0000000002D98000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
        Click to see the 14 entries
        SourceRuleDescriptionAuthorStrings
        0.2.Purchase Order No.1364.exe.4908340.7.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          0.2.Purchase Order No.1364.exe.4908340.7.unpackJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
            0.2.Purchase Order No.1364.exe.4908340.7.unpackWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
            • 0x12cce:$a1: get_encryptedPassword
            • 0x12fba:$a2: get_encryptedUsername
            • 0x12ada:$a3: get_timePasswordChanged
            • 0x12bd5:$a4: get_passwordField
            • 0x12ce4:$a5: set_encryptedPassword
            • 0x1438b:$a7: get_logins
            • 0x142ee:$a10: KeyLoggerEventArgs
            • 0x13f59:$a11: KeyLoggerEventArgsEventHandler
            0.2.Purchase Order No.1364.exe.4908340.7.unpackMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
            • 0x1a65a:$a2: \Comodo\Dragon\User Data\Default\Login Data
            • 0x1988c:$a3: \Google\Chrome\User Data\Default\Login Data
            • 0x19cbf:$a4: \Orbitum\User Data\Default\Login Data
            • 0x1acfe:$a5: \Kometa\User Data\Default\Login Data
            0.2.Purchase Order No.1364.exe.4908340.7.unpackINDICATOR_SUSPICIOUS_EXE_DotNetProcHookDetects executables with potential process hoockingditekSHen
            • 0x138c7:$s1: UnHook
            • 0x138ce:$s2: SetHook
            • 0x138d6:$s3: CallNextHook
            • 0x138e3:$s4: _hook
            Click to see the 24 entries
            No Sigma rule has matched
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-03-14T08:21:13.734002+010028032742Potentially Bad Traffic192.168.2.749681158.101.44.24280TCP
            2025-03-14T08:21:16.380137+010028032742Potentially Bad Traffic192.168.2.749681158.101.44.24280TCP
            2025-03-14T08:21:16.599032+010028032742Potentially Bad Traffic192.168.2.749681158.101.44.24280TCP
            2025-03-14T08:21:16.832939+010028032742Potentially Bad Traffic192.168.2.749681158.101.44.24280TCP
            2025-03-14T08:21:19.671493+010028032742Potentially Bad Traffic192.168.2.749690158.101.44.24280TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: Purchase Order No.1364.exeAvira: detected
            Source: 00000000.00000002.856320142.0000000004699000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "Telegram", "Telegram URL": "https://api.telegram.org/bot7922655426:AAFVRqVw9pB4VZ3uipJRDfn5kD08nswJtAk/sendMessage?chat_id=7854955274", "Token": "7922655426:AAFVRqVw9pB4VZ3uipJRDfn5kD08nswJtAk", "Chat_id": "7854955274", "Version": "5.1"}
            Source: Purchase Order No.1364.exeVirustotal: Detection: 49%Perma Link
            Source: Purchase Order No.1364.exeReversingLabs: Detection: 50%
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: 0.2.Purchase Order No.1364.exe.483e700.5.raw.unpackString decryptor:
            Source: 0.2.Purchase Order No.1364.exe.483e700.5.raw.unpackString decryptor: 7922655426:AAFVRqVw9pB4VZ3uipJRDfn5kD08nswJtAk
            Source: 0.2.Purchase Order No.1364.exe.483e700.5.raw.unpackString decryptor: 7854955274
            Source: 0.2.Purchase Order No.1364.exe.483e700.5.raw.unpackString decryptor:
            Source: 0.2.Purchase Order No.1364.exe.483e700.5.raw.unpackString decryptor: 7922655426:AAFVRqVw9pB4VZ3uipJRDfn5kD08nswJtAk
            Source: 0.2.Purchase Order No.1364.exe.483e700.5.raw.unpackString decryptor: 7854955274
            Source: 0.2.Purchase Order No.1364.exe.483e700.5.raw.unpackString decryptor:
            Source: 0.2.Purchase Order No.1364.exe.483e700.5.raw.unpackString decryptor: 7922655426:AAFVRqVw9pB4VZ3uipJRDfn5kD08nswJtAk
            Source: 0.2.Purchase Order No.1364.exe.483e700.5.raw.unpackString decryptor: 7854955274

            Location Tracking

            barindex
            Source: unknownDNS query: name: reallyfreegeoip.org
            Source: Purchase Order No.1364.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: Purchase Order No.1364.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 4x nop then jmp 012FFE21h2_2_012FFB60
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 4x nop then jmp 012FF12Dh2_2_012FEF42
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 4x nop then jmp 012FFAB7h2_2_012FEF42
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h2_2_012FE460
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h2_2_012FEA93
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h2_2_012FEC73
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 4x nop then jmp 068084E5h2_2_068081A8
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 4x nop then jmp 06806169h2_2_06805EC0
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 4x nop then jmp 068058B9h2_2_06805610
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]2_2_06802F48
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]2_2_06802F58
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 4x nop then jmp 06806A19h2_2_06806770
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 4x nop then jmp 06800741h2_2_06800498
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 4x nop then jmp 06807749h2_2_068074A0
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 4x nop then jmp 06804FE1h2_2_06804D38
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 4x nop then jmp 06807FF9h2_2_06807D50
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 4x nop then jmp 06805D11h2_2_06805A68
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]2_2_0680326E
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 4x nop then jmp 06806E9Ah2_2_06806BF0
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 4x nop then jmp 068065C1h2_2_06806318
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 4x nop then jmp 06800B99h2_2_068008F0
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 4x nop then jmp 06807BA1h2_2_068078F8
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 4x nop then jmp 068002E9h2_2_06800040
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 4x nop then jmp 068072F1h2_2_06807048
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 4x nop then jmp 06805461h2_2_068051B8
            Source: Joe Sandbox ViewIP Address: 104.21.112.1 104.21.112.1
            Source: Joe Sandbox ViewIP Address: 104.21.112.1 104.21.112.1
            Source: Joe Sandbox ViewIP Address: 158.101.44.242 158.101.44.242
            Source: unknownDNS query: name: checkip.dyndns.org
            Source: unknownDNS query: name: reallyfreegeoip.org
            Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.7:49690 -> 158.101.44.242:80
            Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.7:49681 -> 158.101.44.242:80
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
            Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
            Source: Purchase Order No.1364.exe, 00000002.00000002.3320826906.0000000002D80000.00000004.00000800.00020000.00000000.sdmp, Purchase Order No.1364.exe, 00000002.00000002.3320826906.0000000002D27000.00000004.00000800.00020000.00000000.sdmp, Purchase Order No.1364.exe, 00000002.00000002.3320826906.0000000002D98000.00000004.00000800.00020000.00000000.sdmp, Purchase Order No.1364.exe, 00000002.00000002.3320826906.0000000002D06000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
            Source: Purchase Order No.1364.exe, 00000002.00000002.3320826906.0000000002D80000.00000004.00000800.00020000.00000000.sdmp, Purchase Order No.1364.exe, 00000002.00000002.3320826906.0000000002D27000.00000004.00000800.00020000.00000000.sdmp, Purchase Order No.1364.exe, 00000002.00000002.3320826906.0000000002CF9000.00000004.00000800.00020000.00000000.sdmp, Purchase Order No.1364.exe, 00000002.00000002.3320826906.0000000002D98000.00000004.00000800.00020000.00000000.sdmp, Purchase Order No.1364.exe, 00000002.00000002.3320826906.0000000002D06000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
            Source: Purchase Order No.1364.exe, 00000002.00000002.3320826906.0000000002C41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
            Source: Purchase Order No.1364.exe, 00000000.00000002.856320142.0000000004699000.00000004.00000800.00020000.00000000.sdmp, Purchase Order No.1364.exe, 00000002.00000002.3318503770.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
            Source: Purchase Order No.1364.exe, 00000002.00000002.3320826906.0000000002D80000.00000004.00000800.00020000.00000000.sdmp, Purchase Order No.1364.exe, 00000002.00000002.3320826906.0000000002D27000.00000004.00000800.00020000.00000000.sdmp, Purchase Order No.1364.exe, 00000002.00000002.3320826906.0000000002D98000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.org
            Source: Purchase Order No.1364.exe, 00000002.00000002.3320826906.0000000002C41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: Purchase Order No.1364.exe, 00000002.00000002.3320826906.0000000002D80000.00000004.00000800.00020000.00000000.sdmp, Purchase Order No.1364.exe, 00000002.00000002.3320826906.0000000002D27000.00000004.00000800.00020000.00000000.sdmp, Purchase Order No.1364.exe, 00000002.00000002.3320826906.0000000002D98000.00000004.00000800.00020000.00000000.sdmp, Purchase Order No.1364.exe, 00000002.00000002.3320826906.0000000002D06000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
            Source: Purchase Order No.1364.exe, 00000000.00000002.856320142.0000000004699000.00000004.00000800.00020000.00000000.sdmp, Purchase Order No.1364.exe, 00000002.00000002.3318503770.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Purchase Order No.1364.exe, 00000002.00000002.3320826906.0000000002D06000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
            Source: Purchase Order No.1364.exe, 00000002.00000002.3320826906.0000000002D06000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189
            Source: Purchase Order No.1364.exe, 00000002.00000002.3320826906.0000000002D80000.00000004.00000800.00020000.00000000.sdmp, Purchase Order No.1364.exe, 00000002.00000002.3320826906.0000000002D27000.00000004.00000800.00020000.00000000.sdmp, Purchase Order No.1364.exe, 00000002.00000002.3320826906.0000000002D98000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189$
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49689
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49700
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49688
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49687
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49686
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49685
            Source: unknownNetwork traffic detected: HTTP traffic on port 49695 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49684
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49683
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49682
            Source: unknownNetwork traffic detected: HTTP traffic on port 49697 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49691 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49686 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49684 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49701 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49688 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49682 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49698 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49698
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49697
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49695
            Source: unknownNetwork traffic detected: HTTP traffic on port 49694 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49694
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49692
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49691
            Source: unknownNetwork traffic detected: HTTP traffic on port 49692 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49685 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49683 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49689 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49700 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49687 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49701

            System Summary

            barindex
            Source: 0.2.Purchase Order No.1364.exe.4908340.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 0.2.Purchase Order No.1364.exe.4908340.7.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 0.2.Purchase Order No.1364.exe.4908340.7.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 0.2.Purchase Order No.1364.exe.4908340.7.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 2.2.Purchase Order No.1364.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 2.2.Purchase Order No.1364.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 2.2.Purchase Order No.1364.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 2.2.Purchase Order No.1364.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 0.2.Purchase Order No.1364.exe.4908340.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 0.2.Purchase Order No.1364.exe.4908340.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 0.2.Purchase Order No.1364.exe.4908340.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 0.2.Purchase Order No.1364.exe.4908340.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 0.2.Purchase Order No.1364.exe.48a3520.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 0.2.Purchase Order No.1364.exe.48a3520.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 0.2.Purchase Order No.1364.exe.48a3520.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 0.2.Purchase Order No.1364.exe.48a3520.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 0.2.Purchase Order No.1364.exe.483e700.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 0.2.Purchase Order No.1364.exe.483e700.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 0.2.Purchase Order No.1364.exe.483e700.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 00000002.00000002.3318503770.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 00000002.00000002.3318503770.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 00000000.00000002.856320142.0000000004699000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 00000000.00000002.856320142.0000000004699000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: Process Memory Space: Purchase Order No.1364.exe PID: 6352, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: Process Memory Space: Purchase Order No.1364.exe PID: 6352, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: Process Memory Space: Purchase Order No.1364.exe PID: 6456, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: Process Memory Space: Purchase Order No.1364.exe PID: 6456, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: initial sampleStatic PE information: Filename: Purchase Order No.1364.exe
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 0_2_011026B00_2_011026B0
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 0_2_011008720_2_01100872
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 0_2_011014380_2_01101438
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 0_2_01101C990_2_01101C99
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 0_2_011020F90_2_011020F9
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 0_2_011013AB0_2_011013AB
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 0_2_011052E80_2_011052E8
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 0_2_011034900_2_01103490
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 0_2_011056D80_2_011056D8
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 0_2_011056E80_2_011056E8
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 0_2_011058580_2_01105858
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 0_2_011058490_2_01105849
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 0_2_01105AB80_2_01105AB8
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 0_2_01105AA80_2_01105AA8
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 0_2_02E587140_2_02E58714
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 0_2_02E59BF10_2_02E59BF1
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 0_2_02E57C480_2_02E57C48
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 0_2_02E57C580_2_02E57C58
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 0_2_02E55D0C0_2_02E55D0C
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 0_2_096E39B80_2_096E39B8
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 0_2_096E45A00_2_096E45A0
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 0_2_096E04C80_2_096E04C8
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 2_2_012F61082_2_012F6108
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 2_2_012FC0062_2_012FC006
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 2_2_012FC2E02_2_012FC2E0
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 2_2_012FC5C02_2_012FC5C0
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 2_2_012F98582_2_012F9858
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 2_2_012FC8A02_2_012FC8A0
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 2_2_012F68802_2_012F6880
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 2_2_012FFB602_2_012FFB60
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 2_2_012FCB822_2_012FCB82
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 2_2_012FBA402_2_012FBA40
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 2_2_012F4AD92_2_012F4AD9
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 2_2_012FBD262_2_012FBD26
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 2_2_012FEF422_2_012FEF42
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 2_2_012F35722_2_012F3572
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 2_2_012FE4602_2_012FE460
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 2_2_012FE4512_2_012FE451
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 2_2_06809FA82_2_06809FA8
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 2_2_068087F12_2_068087F1
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 2_2_0680BF282_2_0680BF28
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 2_2_0680AC402_2_0680AC40
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 2_2_0680A5F82_2_0680A5F8
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 2_2_06800D482_2_06800D48
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 2_2_0680C5782_2_0680C578
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 2_2_0680B2882_2_0680B288
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 2_2_0680D2102_2_0680D210
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 2_2_0680CBC82_2_0680CBC8
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 2_2_0680B8D82_2_0680B8D8
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 2_2_068081A82_2_068081A8
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 2_2_06805EB02_2_06805EB0
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 2_2_06805EC02_2_06805EC0
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 2_2_068056002_2_06805600
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 2_2_068056102_2_06805610
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 2_2_06809F982_2_06809F98
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 2_2_06803FD02_2_06803FD0
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 2_2_0680BF182_2_0680BF18
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 2_2_06802F482_2_06802F48
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 2_2_06802F582_2_06802F58
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 2_2_068067612_2_06806761
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 2_2_068067702_2_06806770
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 2_2_068004882_2_06800488
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 2_2_068074902_2_06807490
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 2_2_068004982_2_06800498
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 2_2_068074A02_2_068074A0
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 2_2_0680AC302_2_0680AC30
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 2_2_0680A5E82_2_0680A5E8
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 2_2_06804D2B2_2_06804D2B
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 2_2_06804D382_2_06804D38
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 2_2_06807D402_2_06807D40
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 2_2_06807D502_2_06807D50
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 2_2_0680C5682_2_0680C568
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 2_2_068032C02_2_068032C0
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 2_2_068032D02_2_068032D0
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 2_2_0680D2002_2_0680D200
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 2_2_06805A582_2_06805A58
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 2_2_06805A682_2_06805A68
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 2_2_0680B2772_2_0680B277
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 2_2_068023A72_2_068023A7
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 2_2_068023B82_2_068023B8
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 2_2_0680CBB82_2_0680CBB8
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 2_2_06806BEB2_2_06806BEB
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 2_2_06806BF02_2_06806BF0
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 2_2_0680630B2_2_0680630B
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 2_2_068063182_2_06806318
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 2_2_0680B8C92_2_0680B8C9
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 2_2_0680B8CF2_2_0680B8CF
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 2_2_068008E12_2_068008E1
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 2_2_068078E82_2_068078E8
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 2_2_068008F02_2_068008F0
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 2_2_068078F82_2_068078F8
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 2_2_068000072_2_06800007
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 2_2_068070372_2_06807037
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 2_2_068000402_2_06800040
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 2_2_068070482_2_06807048
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 2_2_068081982_2_06808198
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 2_2_068051A92_2_068051A9
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 2_2_068051B82_2_068051B8
            Source: Purchase Order No.1364.exe, 00000000.00000002.854150348.0000000002ED6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTL.dll" vs Purchase Order No.1364.exe
            Source: Purchase Order No.1364.exe, 00000000.00000002.854150348.0000000003289000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTL.dll" vs Purchase Order No.1364.exe
            Source: Purchase Order No.1364.exe, 00000000.00000002.859055213.0000000009660000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs Purchase Order No.1364.exe
            Source: Purchase Order No.1364.exe, 00000000.00000002.859428539.000000000AB7C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamempclient.dllj% vs Purchase Order No.1364.exe
            Source: Purchase Order No.1364.exe, 00000000.00000002.854150348.0000000002E91000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTL.dll" vs Purchase Order No.1364.exe
            Source: Purchase Order No.1364.exe, 00000000.00000002.854150348.00000000030BF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTL.dll" vs Purchase Order No.1364.exe
            Source: Purchase Order No.1364.exe, 00000000.00000002.856320142.0000000004699000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs Purchase Order No.1364.exe
            Source: Purchase Order No.1364.exe, 00000000.00000002.856320142.0000000004699000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs Purchase Order No.1364.exe
            Source: Purchase Order No.1364.exe, 00000000.00000000.842578580.0000000000A5A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamekZdV.exe8 vs Purchase Order No.1364.exe
            Source: Purchase Order No.1364.exe, 00000000.00000002.858764582.0000000007D30000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameTL.dll" vs Purchase Order No.1364.exe
            Source: Purchase Order No.1364.exe, 00000000.00000002.854150348.00000000030AD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs Purchase Order No.1364.exe
            Source: Purchase Order No.1364.exe, 00000000.00000002.853390137.000000000112E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs Purchase Order No.1364.exe
            Source: Purchase Order No.1364.exe, 00000002.00000002.3318503770.0000000000402000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs Purchase Order No.1364.exe
            Source: Purchase Order No.1364.exe, 00000002.00000002.3318759775.0000000000CF7000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs Purchase Order No.1364.exe
            Source: Purchase Order No.1364.exeBinary or memory string: OriginalFilenamekZdV.exe8 vs Purchase Order No.1364.exe
            Source: Purchase Order No.1364.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: 0.2.Purchase Order No.1364.exe.4908340.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 0.2.Purchase Order No.1364.exe.4908340.7.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 0.2.Purchase Order No.1364.exe.4908340.7.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 0.2.Purchase Order No.1364.exe.4908340.7.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 2.2.Purchase Order No.1364.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 2.2.Purchase Order No.1364.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 2.2.Purchase Order No.1364.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 2.2.Purchase Order No.1364.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 0.2.Purchase Order No.1364.exe.4908340.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 0.2.Purchase Order No.1364.exe.4908340.7.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 0.2.Purchase Order No.1364.exe.4908340.7.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 0.2.Purchase Order No.1364.exe.4908340.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 0.2.Purchase Order No.1364.exe.48a3520.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 0.2.Purchase Order No.1364.exe.48a3520.6.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 0.2.Purchase Order No.1364.exe.48a3520.6.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 0.2.Purchase Order No.1364.exe.48a3520.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 0.2.Purchase Order No.1364.exe.483e700.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 0.2.Purchase Order No.1364.exe.483e700.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 0.2.Purchase Order No.1364.exe.483e700.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 00000002.00000002.3318503770.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 00000002.00000002.3318503770.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 00000000.00000002.856320142.0000000004699000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 00000000.00000002.856320142.0000000004699000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: Process Memory Space: Purchase Order No.1364.exe PID: 6352, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: Process Memory Space: Purchase Order No.1364.exe PID: 6352, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: Process Memory Space: Purchase Order No.1364.exe PID: 6456, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: Process Memory Space: Purchase Order No.1364.exe PID: 6456, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: Purchase Order No.1364.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: 0.2.Purchase Order No.1364.exe.4908340.7.raw.unpack, ---.csCryptographic APIs: 'TransformFinalBlock'
            Source: 0.2.Purchase Order No.1364.exe.4908340.7.raw.unpack, ---.csCryptographic APIs: 'TransformFinalBlock'
            Source: 0.2.Purchase Order No.1364.exe.4908340.7.raw.unpack, z2.csCryptographic APIs: 'TransformFinalBlock'
            Source: 0.2.Purchase Order No.1364.exe.4908340.7.raw.unpack, z2.csCryptographic APIs: 'TransformFinalBlock'
            Source: 0.2.Purchase Order No.1364.exe.4908340.7.raw.unpack, ---.csBase64 encoded string: 'JzeJw/b9xm+6S2XbSxm04VLxDXW0s8jprFo3QVj1S6zHgpFf8L4EKsa9LKLu5QP6'
            Source: 0.2.Purchase Order No.1364.exe.483e700.5.raw.unpack, kSbR3MbnvLHU7pf16o.csSecurity API names: System.IO.DirectoryInfo.SetAccessControl(System.Security.AccessControl.DirectorySecurity)
            Source: 0.2.Purchase Order No.1364.exe.483e700.5.raw.unpack, kSbR3MbnvLHU7pf16o.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
            Source: 0.2.Purchase Order No.1364.exe.483e700.5.raw.unpack, kSbR3MbnvLHU7pf16o.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
            Source: 0.2.Purchase Order No.1364.exe.9660000.9.raw.unpack, kSbR3MbnvLHU7pf16o.csSecurity API names: System.IO.DirectoryInfo.SetAccessControl(System.Security.AccessControl.DirectorySecurity)
            Source: 0.2.Purchase Order No.1364.exe.9660000.9.raw.unpack, kSbR3MbnvLHU7pf16o.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
            Source: 0.2.Purchase Order No.1364.exe.9660000.9.raw.unpack, kSbR3MbnvLHU7pf16o.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
            Source: 0.2.Purchase Order No.1364.exe.48a3520.6.raw.unpack, Kyed7DoqqvNolcj07i.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
            Source: 0.2.Purchase Order No.1364.exe.48a3520.6.raw.unpack, Kyed7DoqqvNolcj07i.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
            Source: 0.2.Purchase Order No.1364.exe.483e700.5.raw.unpack, Kyed7DoqqvNolcj07i.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
            Source: 0.2.Purchase Order No.1364.exe.483e700.5.raw.unpack, Kyed7DoqqvNolcj07i.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
            Source: 0.2.Purchase Order No.1364.exe.9660000.9.raw.unpack, Kyed7DoqqvNolcj07i.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
            Source: 0.2.Purchase Order No.1364.exe.9660000.9.raw.unpack, Kyed7DoqqvNolcj07i.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
            Source: 0.2.Purchase Order No.1364.exe.48a3520.6.raw.unpack, kSbR3MbnvLHU7pf16o.csSecurity API names: System.IO.DirectoryInfo.SetAccessControl(System.Security.AccessControl.DirectorySecurity)
            Source: 0.2.Purchase Order No.1364.exe.48a3520.6.raw.unpack, kSbR3MbnvLHU7pf16o.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
            Source: 0.2.Purchase Order No.1364.exe.48a3520.6.raw.unpack, kSbR3MbnvLHU7pf16o.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@5/1@2/2
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Purchase Order No.1364.exe.logJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeMutant created: NULL
            Source: Purchase Order No.1364.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: Purchase Order No.1364.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: Purchase Order No.1364.exe, 00000002.00000002.3321982479.0000000003CCD000.00000004.00000800.00020000.00000000.sdmp, Purchase Order No.1364.exe, 00000002.00000002.3320826906.0000000002E63000.00000004.00000800.00020000.00000000.sdmp, Purchase Order No.1364.exe, 00000002.00000002.3320826906.0000000002E57000.00000004.00000800.00020000.00000000.sdmp, Purchase Order No.1364.exe, 00000002.00000002.3320826906.0000000002E20000.00000004.00000800.00020000.00000000.sdmp, Purchase Order No.1364.exe, 00000002.00000002.3320826906.0000000002E10000.00000004.00000800.00020000.00000000.sdmp, Purchase Order No.1364.exe, 00000002.00000002.3320826906.0000000002E2F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
            Source: Purchase Order No.1364.exeVirustotal: Detection: 49%
            Source: Purchase Order No.1364.exeReversingLabs: Detection: 50%
            Source: unknownProcess created: C:\Users\user\Desktop\Purchase Order No.1364.exe "C:\Users\user\Desktop\Purchase Order No.1364.exe"
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeProcess created: C:\Users\user\Desktop\Purchase Order No.1364.exe "C:\Users\user\Desktop\Purchase Order No.1364.exe"
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeProcess created: C:\Users\user\Desktop\Purchase Order No.1364.exe "C:\Users\user\Desktop\Purchase Order No.1364.exe"
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeProcess created: C:\Users\user\Desktop\Purchase Order No.1364.exe "C:\Users\user\Desktop\Purchase Order No.1364.exe"Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeProcess created: C:\Users\user\Desktop\Purchase Order No.1364.exe "C:\Users\user\Desktop\Purchase Order No.1364.exe"Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeSection loaded: dwrite.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeSection loaded: textshaping.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeSection loaded: windowscodecs.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeSection loaded: iconcodecservice.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeSection loaded: rasapi32.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeSection loaded: rasman.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeSection loaded: rtutils.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeSection loaded: schannel.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
            Source: Purchase Order No.1364.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
            Source: Purchase Order No.1364.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

            Data Obfuscation

            barindex
            Source: 0.2.Purchase Order No.1364.exe.483e700.5.raw.unpack, kSbR3MbnvLHU7pf16o.cs.Net Code: asx9Y78YfE System.Reflection.Assembly.Load(byte[])
            Source: 0.2.Purchase Order No.1364.exe.9660000.9.raw.unpack, kSbR3MbnvLHU7pf16o.cs.Net Code: asx9Y78YfE System.Reflection.Assembly.Load(byte[])
            Source: 0.2.Purchase Order No.1364.exe.48a3520.6.raw.unpack, kSbR3MbnvLHU7pf16o.cs.Net Code: asx9Y78YfE System.Reflection.Assembly.Load(byte[])
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 0_2_02E5E812 push dword ptr [ebx]; retn 4589h0_2_02E5E823
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeCode function: 0_2_02E50B98 pushad ; iretd 0_2_02E50B99
            Source: Purchase Order No.1364.exeStatic PE information: section name: .text entropy: 7.748402459366208
            Source: 0.2.Purchase Order No.1364.exe.483e700.5.raw.unpack, kSbR3MbnvLHU7pf16o.csHigh entropy of concatenated method names: 'YIc1EItqGg', 'MAo1FayDW9', 'EUR1iPi2Wy', 'g491VGAQkL', 'cFi1TGJJql', 'b9R1A2vqw7', 'v1R1Rlvc4J', 'TUK1bxYu1D', 'W561HGCCv2', 'KZN1xXjD9t'
            Source: 0.2.Purchase Order No.1364.exe.483e700.5.raw.unpack, IhUEsmuNkAFV6vR6VR.csHigh entropy of concatenated method names: 'qixro8hNjA', 'Iprr5P6Wm8', 'rDRrWkEBZh', 'orFr2Tyyu0', 'dqprBLwcr2', 'Bg6r0H9xyg', 'kopr6QkTyJ', 'sFRrINXLqJ', 'ParrnUR0wU', 'PHUrQgZjfS'
            Source: 0.2.Purchase Order No.1364.exe.483e700.5.raw.unpack, NInpWRfg5M8vTsUypBC.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'bGy4QQ0IvT', 'Qef4pLbW6b', 'MTk4ujRy5E', 'S554trNJFb', 'fTY4UrOZv1', 'TxD4LPYaqX', 'gsC43f49uG'
            Source: 0.2.Purchase Order No.1364.exe.483e700.5.raw.unpack, xCbD6bygqhgNo5k5xR.csHigh entropy of concatenated method names: 'b5aYiIjfh', 'pH3Zkx1ak', 'K1nv53rEo', 'cUdsYVWVl', 'qpU5JRdvC', 'Gj175mj8P', 'XR2BHcuGlRZQjHWX89', 'yAxyLyNCgZ9sVSF1mP', 'GMygtB37m1bqX52G1m', 'Nr7DHABfc'
            Source: 0.2.Purchase Order No.1364.exe.483e700.5.raw.unpack, hPWrTo3ULRNFvf9MFt.csHigh entropy of concatenated method names: 'vfNmxOvEFP', 'hQYmdJuicb', 'ToString', 'mOumFIr0Co', 'CgwmiJdkta', 'FY5mVfP8if', 'DIGmTKOiLq', 'HynmAr4ZHq', 'Ev9mR0n6LS', 'aIhmbTb1XN'
            Source: 0.2.Purchase Order No.1364.exe.483e700.5.raw.unpack, k3vSlof98ZLU2JNif8h.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'C4ZSK1joGe', 'm3sS4KHZNn', 'BZKScoOAXS', 'X5PSSh3GiT', 'GpUS8F9E2O', 'rI0SeMFcZb', 'kOrSlaWqXs'
            Source: 0.2.Purchase Order No.1364.exe.483e700.5.raw.unpack, TkKxTK6AQwDkwwAmTY.csHigh entropy of concatenated method names: 'yC3RFEoG98', 'XwiRVCmo9r', 'JuyRAiXCCE', 'xCZAOrRbl2', 'Oq3AzcuYQX', 'ooTRg8nEg7', 'X1TRf9FlME', 'rv0Ry8SYNc', 'vbwR1uhgQA', 'AnKR9neLGT'
            Source: 0.2.Purchase Order No.1364.exe.483e700.5.raw.unpack, HMFUYfOrH1G83SjoRN.csHigh entropy of concatenated method names: 'TcM4VECtDC', 'RHh4Tlk6P2', 'wgw4Ao5j30', 'hPf4Rvosrx', 'e2d4KNYyZv', 'WVF4b9FJ5m', 'Next', 'Next', 'Next', 'NextBytes'
            Source: 0.2.Purchase Order No.1364.exe.483e700.5.raw.unpack, Kyed7DoqqvNolcj07i.csHigh entropy of concatenated method names: 'CUxit8rpgi', 'huNiUqAeSL', 'asBiLtiyGd', 'vcGi35QFSS', 'nJxiJ27OiJ', 'HfJiGTwMie', 'yuUihnhtM5', 'AKSiaoV6IV', 'NyyiPJFhsk', 'nh2iORbcQZ'
            Source: 0.2.Purchase Order No.1364.exe.483e700.5.raw.unpack, jEjEDHttksL23FmDP3.csHigh entropy of concatenated method names: 'EaEqnrJn6j', 'BrVqp1g5Od', 'aa4qtbVybo', 'wThqU3L0KH', 'RV4q2YEYT1', 'XQuqMDgU0D', 'UCFqBhQbxU', 'VWqq0sBsMe', 'vAyqXDPtNr', 'GUyq68kaCw'
            Source: 0.2.Purchase Order No.1364.exe.483e700.5.raw.unpack, xSmolt9AJ1W0N2Cn75.csHigh entropy of concatenated method names: 'q16fRyed7D', 'oqvfbNolcj', 'NX2fxPSI0g', 'yMFfdkLKG5', 'IAlfqRwDep', 'TX8fkT01v2', 'JqKSVwJOFxAWqHnYTe', 'ESMeqj7gdLW3ZaU0fm', 'iYuffDPNXM', 'hj7f1IgvFv'
            Source: 0.2.Purchase Order No.1364.exe.483e700.5.raw.unpack, E3fkXdffvN1acllX84W.csHigh entropy of concatenated method names: 'TPO4OYUkRa', 'OsM4zErasL', 'Hy3cg3wyRl', 'Retcfa1ZRF', 'qsFcyhltJY', 'D4ic1FEDGq', 'J6Pc94qwGH', 'EaYcEQLspU', 'lqFcFYDGjS', 'EWMci14r1V'
            Source: 0.2.Purchase Order No.1364.exe.483e700.5.raw.unpack, rpmcEwCxWbVX4JIWiX.csHigh entropy of concatenated method names: 'cwRRNHy7hJ', 'o0iRjvIYER', 'uCZRYW0CuT', 'pH2RZcwI9p', 'mDIRwP6mD8', 'TjjRviDWj9', 'LlZRsnGG6e', 'Q2MRoJARvX', 'RjRR5Om8Pp', 'R8uR71YxYe'
            Source: 0.2.Purchase Order No.1364.exe.483e700.5.raw.unpack, W4tI5Tz0HXTMYRA1Q9.csHigh entropy of concatenated method names: 'Qvy4vYgA9G', 'CxA4oyNRVQ', 'D0l45vkGtk', 'ubm4Wklqqq', 'FB942Xdb2O', 'rZU4B5QGo5', 'V0U40oVDYw', 'jth4lRntkc', 'raP4Na5Pgx', 'Jvw4jRyhVO'
            Source: 0.2.Purchase Order No.1364.exe.483e700.5.raw.unpack, repLX8WT01v2xdtGLH.csHigh entropy of concatenated method names: 'UeGAEcOvZ1', 'iUSAiyVFLO', 'Mg6ATEjl6d', 'm1IARkYI4b', 'K9nAb5Zvr7', 'KQKTJ3lUm2', 'GY5TG9eYUU', 'wNKThWjI7o', 'xxXTacB0wQ', 'v3rTPHVUUQ'
            Source: 0.2.Purchase Order No.1364.exe.483e700.5.raw.unpack, bvZV2YPEGgRO425Eqc.csHigh entropy of concatenated method names: 'fM2KWo95OD', 'VvmK2JwdpP', 'KlDKM4iIb6', 'PgLKBwbPqJ', 'sUjK0I5Evr', 'yUHKXLGZwN', 'ar3K67mNOU', 'lmbKI5jY5O', 'Et8KCbYEx6', 'DVoKnaGaEk'
            Source: 0.2.Purchase Order No.1364.exe.483e700.5.raw.unpack, YsCc9n5X2PSI0gjMFk.csHigh entropy of concatenated method names: 'xtaVZ4wIso', 'A9xVvSuSVw', 'uXUVoYJ6gT', 'zN3V52solO', 'pVTVqW6Ugk', 'TkAVkBqi1E', 'owgVm87LL7', 'bJlVDu8ej0', 'z1XVKw5dkX', 'AUSV4fHjl4'
            Source: 0.2.Purchase Order No.1364.exe.483e700.5.raw.unpack, O14kL9G5MC2SIaUteQ.csHigh entropy of concatenated method names: 'BmymaMkvpx', 'qvVmOoU9Q4', 'IEMDguSFnK', 'HL7DfbkeDq', 'ScKmQWuCq1', 'mXHmpb2o1I', 'u1WmuZXOq1', 'hYemtj6vTb', 'aZumUGuSRK', 'f1jmLdbioS'
            Source: 0.2.Purchase Order No.1364.exe.483e700.5.raw.unpack, TKG54h7NedSSJBAlRw.csHigh entropy of concatenated method names: 'sttTwr3ZTu', 'ObgTsoLkia', 'wakVMWUo60', 'dqHVB7rx3l', 'eoKV0ZLMUM', 'I6qVXCHaRH', 'HvZV6ZwQ4h', 'IcLVInSwDn', 'mMTVCtmoM5', 'pfCVnNAVAC'
            Source: 0.2.Purchase Order No.1364.exe.483e700.5.raw.unpack, DuqytXibbovTAlIZCY.csHigh entropy of concatenated method names: 'Dispose', 'k7tfPQug5T', 'HBky2ZJJiC', 'qFMxCWBeQH', 'N66fOQmeT1', 'uDHfz8Ero8', 'ProcessDialogKey', 'uIfygvZV2Y', 'eGgyfRO425', 'eqcyy2MFUY'
            Source: 0.2.Purchase Order No.1364.exe.483e700.5.raw.unpack, YaLiMlhCkb7tQug5TC.csHigh entropy of concatenated method names: 'NpXKqslXoC', 'rNhKmtTtg7', 'uqUKKRg6hH', 'FxIKcT0FVU', 'IH7K8WVRRe', 'gZIKlDwTwW', 'Dispose', 'SJjDFF3AhI', 'hdcDiw7Vr4', 'iFiDVGeJ2W'
            Source: 0.2.Purchase Order No.1364.exe.9660000.9.raw.unpack, kSbR3MbnvLHU7pf16o.csHigh entropy of concatenated method names: 'YIc1EItqGg', 'MAo1FayDW9', 'EUR1iPi2Wy', 'g491VGAQkL', 'cFi1TGJJql', 'b9R1A2vqw7', 'v1R1Rlvc4J', 'TUK1bxYu1D', 'W561HGCCv2', 'KZN1xXjD9t'
            Source: 0.2.Purchase Order No.1364.exe.9660000.9.raw.unpack, IhUEsmuNkAFV6vR6VR.csHigh entropy of concatenated method names: 'qixro8hNjA', 'Iprr5P6Wm8', 'rDRrWkEBZh', 'orFr2Tyyu0', 'dqprBLwcr2', 'Bg6r0H9xyg', 'kopr6QkTyJ', 'sFRrINXLqJ', 'ParrnUR0wU', 'PHUrQgZjfS'
            Source: 0.2.Purchase Order No.1364.exe.9660000.9.raw.unpack, NInpWRfg5M8vTsUypBC.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'bGy4QQ0IvT', 'Qef4pLbW6b', 'MTk4ujRy5E', 'S554trNJFb', 'fTY4UrOZv1', 'TxD4LPYaqX', 'gsC43f49uG'
            Source: 0.2.Purchase Order No.1364.exe.9660000.9.raw.unpack, xCbD6bygqhgNo5k5xR.csHigh entropy of concatenated method names: 'b5aYiIjfh', 'pH3Zkx1ak', 'K1nv53rEo', 'cUdsYVWVl', 'qpU5JRdvC', 'Gj175mj8P', 'XR2BHcuGlRZQjHWX89', 'yAxyLyNCgZ9sVSF1mP', 'GMygtB37m1bqX52G1m', 'Nr7DHABfc'
            Source: 0.2.Purchase Order No.1364.exe.9660000.9.raw.unpack, hPWrTo3ULRNFvf9MFt.csHigh entropy of concatenated method names: 'vfNmxOvEFP', 'hQYmdJuicb', 'ToString', 'mOumFIr0Co', 'CgwmiJdkta', 'FY5mVfP8if', 'DIGmTKOiLq', 'HynmAr4ZHq', 'Ev9mR0n6LS', 'aIhmbTb1XN'
            Source: 0.2.Purchase Order No.1364.exe.9660000.9.raw.unpack, k3vSlof98ZLU2JNif8h.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'C4ZSK1joGe', 'm3sS4KHZNn', 'BZKScoOAXS', 'X5PSSh3GiT', 'GpUS8F9E2O', 'rI0SeMFcZb', 'kOrSlaWqXs'
            Source: 0.2.Purchase Order No.1364.exe.9660000.9.raw.unpack, TkKxTK6AQwDkwwAmTY.csHigh entropy of concatenated method names: 'yC3RFEoG98', 'XwiRVCmo9r', 'JuyRAiXCCE', 'xCZAOrRbl2', 'Oq3AzcuYQX', 'ooTRg8nEg7', 'X1TRf9FlME', 'rv0Ry8SYNc', 'vbwR1uhgQA', 'AnKR9neLGT'
            Source: 0.2.Purchase Order No.1364.exe.9660000.9.raw.unpack, HMFUYfOrH1G83SjoRN.csHigh entropy of concatenated method names: 'TcM4VECtDC', 'RHh4Tlk6P2', 'wgw4Ao5j30', 'hPf4Rvosrx', 'e2d4KNYyZv', 'WVF4b9FJ5m', 'Next', 'Next', 'Next', 'NextBytes'
            Source: 0.2.Purchase Order No.1364.exe.9660000.9.raw.unpack, Kyed7DoqqvNolcj07i.csHigh entropy of concatenated method names: 'CUxit8rpgi', 'huNiUqAeSL', 'asBiLtiyGd', 'vcGi35QFSS', 'nJxiJ27OiJ', 'HfJiGTwMie', 'yuUihnhtM5', 'AKSiaoV6IV', 'NyyiPJFhsk', 'nh2iORbcQZ'
            Source: 0.2.Purchase Order No.1364.exe.9660000.9.raw.unpack, jEjEDHttksL23FmDP3.csHigh entropy of concatenated method names: 'EaEqnrJn6j', 'BrVqp1g5Od', 'aa4qtbVybo', 'wThqU3L0KH', 'RV4q2YEYT1', 'XQuqMDgU0D', 'UCFqBhQbxU', 'VWqq0sBsMe', 'vAyqXDPtNr', 'GUyq68kaCw'
            Source: 0.2.Purchase Order No.1364.exe.9660000.9.raw.unpack, xSmolt9AJ1W0N2Cn75.csHigh entropy of concatenated method names: 'q16fRyed7D', 'oqvfbNolcj', 'NX2fxPSI0g', 'yMFfdkLKG5', 'IAlfqRwDep', 'TX8fkT01v2', 'JqKSVwJOFxAWqHnYTe', 'ESMeqj7gdLW3ZaU0fm', 'iYuffDPNXM', 'hj7f1IgvFv'
            Source: 0.2.Purchase Order No.1364.exe.9660000.9.raw.unpack, E3fkXdffvN1acllX84W.csHigh entropy of concatenated method names: 'TPO4OYUkRa', 'OsM4zErasL', 'Hy3cg3wyRl', 'Retcfa1ZRF', 'qsFcyhltJY', 'D4ic1FEDGq', 'J6Pc94qwGH', 'EaYcEQLspU', 'lqFcFYDGjS', 'EWMci14r1V'
            Source: 0.2.Purchase Order No.1364.exe.9660000.9.raw.unpack, rpmcEwCxWbVX4JIWiX.csHigh entropy of concatenated method names: 'cwRRNHy7hJ', 'o0iRjvIYER', 'uCZRYW0CuT', 'pH2RZcwI9p', 'mDIRwP6mD8', 'TjjRviDWj9', 'LlZRsnGG6e', 'Q2MRoJARvX', 'RjRR5Om8Pp', 'R8uR71YxYe'
            Source: 0.2.Purchase Order No.1364.exe.9660000.9.raw.unpack, W4tI5Tz0HXTMYRA1Q9.csHigh entropy of concatenated method names: 'Qvy4vYgA9G', 'CxA4oyNRVQ', 'D0l45vkGtk', 'ubm4Wklqqq', 'FB942Xdb2O', 'rZU4B5QGo5', 'V0U40oVDYw', 'jth4lRntkc', 'raP4Na5Pgx', 'Jvw4jRyhVO'
            Source: 0.2.Purchase Order No.1364.exe.9660000.9.raw.unpack, repLX8WT01v2xdtGLH.csHigh entropy of concatenated method names: 'UeGAEcOvZ1', 'iUSAiyVFLO', 'Mg6ATEjl6d', 'm1IARkYI4b', 'K9nAb5Zvr7', 'KQKTJ3lUm2', 'GY5TG9eYUU', 'wNKThWjI7o', 'xxXTacB0wQ', 'v3rTPHVUUQ'
            Source: 0.2.Purchase Order No.1364.exe.9660000.9.raw.unpack, bvZV2YPEGgRO425Eqc.csHigh entropy of concatenated method names: 'fM2KWo95OD', 'VvmK2JwdpP', 'KlDKM4iIb6', 'PgLKBwbPqJ', 'sUjK0I5Evr', 'yUHKXLGZwN', 'ar3K67mNOU', 'lmbKI5jY5O', 'Et8KCbYEx6', 'DVoKnaGaEk'
            Source: 0.2.Purchase Order No.1364.exe.9660000.9.raw.unpack, YsCc9n5X2PSI0gjMFk.csHigh entropy of concatenated method names: 'xtaVZ4wIso', 'A9xVvSuSVw', 'uXUVoYJ6gT', 'zN3V52solO', 'pVTVqW6Ugk', 'TkAVkBqi1E', 'owgVm87LL7', 'bJlVDu8ej0', 'z1XVKw5dkX', 'AUSV4fHjl4'
            Source: 0.2.Purchase Order No.1364.exe.9660000.9.raw.unpack, O14kL9G5MC2SIaUteQ.csHigh entropy of concatenated method names: 'BmymaMkvpx', 'qvVmOoU9Q4', 'IEMDguSFnK', 'HL7DfbkeDq', 'ScKmQWuCq1', 'mXHmpb2o1I', 'u1WmuZXOq1', 'hYemtj6vTb', 'aZumUGuSRK', 'f1jmLdbioS'
            Source: 0.2.Purchase Order No.1364.exe.9660000.9.raw.unpack, TKG54h7NedSSJBAlRw.csHigh entropy of concatenated method names: 'sttTwr3ZTu', 'ObgTsoLkia', 'wakVMWUo60', 'dqHVB7rx3l', 'eoKV0ZLMUM', 'I6qVXCHaRH', 'HvZV6ZwQ4h', 'IcLVInSwDn', 'mMTVCtmoM5', 'pfCVnNAVAC'
            Source: 0.2.Purchase Order No.1364.exe.9660000.9.raw.unpack, DuqytXibbovTAlIZCY.csHigh entropy of concatenated method names: 'Dispose', 'k7tfPQug5T', 'HBky2ZJJiC', 'qFMxCWBeQH', 'N66fOQmeT1', 'uDHfz8Ero8', 'ProcessDialogKey', 'uIfygvZV2Y', 'eGgyfRO425', 'eqcyy2MFUY'
            Source: 0.2.Purchase Order No.1364.exe.9660000.9.raw.unpack, YaLiMlhCkb7tQug5TC.csHigh entropy of concatenated method names: 'NpXKqslXoC', 'rNhKmtTtg7', 'uqUKKRg6hH', 'FxIKcT0FVU', 'IH7K8WVRRe', 'gZIKlDwTwW', 'Dispose', 'SJjDFF3AhI', 'hdcDiw7Vr4', 'iFiDVGeJ2W'
            Source: 0.2.Purchase Order No.1364.exe.48a3520.6.raw.unpack, kSbR3MbnvLHU7pf16o.csHigh entropy of concatenated method names: 'YIc1EItqGg', 'MAo1FayDW9', 'EUR1iPi2Wy', 'g491VGAQkL', 'cFi1TGJJql', 'b9R1A2vqw7', 'v1R1Rlvc4J', 'TUK1bxYu1D', 'W561HGCCv2', 'KZN1xXjD9t'
            Source: 0.2.Purchase Order No.1364.exe.48a3520.6.raw.unpack, IhUEsmuNkAFV6vR6VR.csHigh entropy of concatenated method names: 'qixro8hNjA', 'Iprr5P6Wm8', 'rDRrWkEBZh', 'orFr2Tyyu0', 'dqprBLwcr2', 'Bg6r0H9xyg', 'kopr6QkTyJ', 'sFRrINXLqJ', 'ParrnUR0wU', 'PHUrQgZjfS'
            Source: 0.2.Purchase Order No.1364.exe.48a3520.6.raw.unpack, NInpWRfg5M8vTsUypBC.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'bGy4QQ0IvT', 'Qef4pLbW6b', 'MTk4ujRy5E', 'S554trNJFb', 'fTY4UrOZv1', 'TxD4LPYaqX', 'gsC43f49uG'
            Source: 0.2.Purchase Order No.1364.exe.48a3520.6.raw.unpack, xCbD6bygqhgNo5k5xR.csHigh entropy of concatenated method names: 'b5aYiIjfh', 'pH3Zkx1ak', 'K1nv53rEo', 'cUdsYVWVl', 'qpU5JRdvC', 'Gj175mj8P', 'XR2BHcuGlRZQjHWX89', 'yAxyLyNCgZ9sVSF1mP', 'GMygtB37m1bqX52G1m', 'Nr7DHABfc'
            Source: 0.2.Purchase Order No.1364.exe.48a3520.6.raw.unpack, hPWrTo3ULRNFvf9MFt.csHigh entropy of concatenated method names: 'vfNmxOvEFP', 'hQYmdJuicb', 'ToString', 'mOumFIr0Co', 'CgwmiJdkta', 'FY5mVfP8if', 'DIGmTKOiLq', 'HynmAr4ZHq', 'Ev9mR0n6LS', 'aIhmbTb1XN'
            Source: 0.2.Purchase Order No.1364.exe.48a3520.6.raw.unpack, k3vSlof98ZLU2JNif8h.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'C4ZSK1joGe', 'm3sS4KHZNn', 'BZKScoOAXS', 'X5PSSh3GiT', 'GpUS8F9E2O', 'rI0SeMFcZb', 'kOrSlaWqXs'
            Source: 0.2.Purchase Order No.1364.exe.48a3520.6.raw.unpack, TkKxTK6AQwDkwwAmTY.csHigh entropy of concatenated method names: 'yC3RFEoG98', 'XwiRVCmo9r', 'JuyRAiXCCE', 'xCZAOrRbl2', 'Oq3AzcuYQX', 'ooTRg8nEg7', 'X1TRf9FlME', 'rv0Ry8SYNc', 'vbwR1uhgQA', 'AnKR9neLGT'
            Source: 0.2.Purchase Order No.1364.exe.48a3520.6.raw.unpack, HMFUYfOrH1G83SjoRN.csHigh entropy of concatenated method names: 'TcM4VECtDC', 'RHh4Tlk6P2', 'wgw4Ao5j30', 'hPf4Rvosrx', 'e2d4KNYyZv', 'WVF4b9FJ5m', 'Next', 'Next', 'Next', 'NextBytes'
            Source: 0.2.Purchase Order No.1364.exe.48a3520.6.raw.unpack, Kyed7DoqqvNolcj07i.csHigh entropy of concatenated method names: 'CUxit8rpgi', 'huNiUqAeSL', 'asBiLtiyGd', 'vcGi35QFSS', 'nJxiJ27OiJ', 'HfJiGTwMie', 'yuUihnhtM5', 'AKSiaoV6IV', 'NyyiPJFhsk', 'nh2iORbcQZ'
            Source: 0.2.Purchase Order No.1364.exe.48a3520.6.raw.unpack, jEjEDHttksL23FmDP3.csHigh entropy of concatenated method names: 'EaEqnrJn6j', 'BrVqp1g5Od', 'aa4qtbVybo', 'wThqU3L0KH', 'RV4q2YEYT1', 'XQuqMDgU0D', 'UCFqBhQbxU', 'VWqq0sBsMe', 'vAyqXDPtNr', 'GUyq68kaCw'
            Source: 0.2.Purchase Order No.1364.exe.48a3520.6.raw.unpack, xSmolt9AJ1W0N2Cn75.csHigh entropy of concatenated method names: 'q16fRyed7D', 'oqvfbNolcj', 'NX2fxPSI0g', 'yMFfdkLKG5', 'IAlfqRwDep', 'TX8fkT01v2', 'JqKSVwJOFxAWqHnYTe', 'ESMeqj7gdLW3ZaU0fm', 'iYuffDPNXM', 'hj7f1IgvFv'
            Source: 0.2.Purchase Order No.1364.exe.48a3520.6.raw.unpack, E3fkXdffvN1acllX84W.csHigh entropy of concatenated method names: 'TPO4OYUkRa', 'OsM4zErasL', 'Hy3cg3wyRl', 'Retcfa1ZRF', 'qsFcyhltJY', 'D4ic1FEDGq', 'J6Pc94qwGH', 'EaYcEQLspU', 'lqFcFYDGjS', 'EWMci14r1V'
            Source: 0.2.Purchase Order No.1364.exe.48a3520.6.raw.unpack, rpmcEwCxWbVX4JIWiX.csHigh entropy of concatenated method names: 'cwRRNHy7hJ', 'o0iRjvIYER', 'uCZRYW0CuT', 'pH2RZcwI9p', 'mDIRwP6mD8', 'TjjRviDWj9', 'LlZRsnGG6e', 'Q2MRoJARvX', 'RjRR5Om8Pp', 'R8uR71YxYe'
            Source: 0.2.Purchase Order No.1364.exe.48a3520.6.raw.unpack, W4tI5Tz0HXTMYRA1Q9.csHigh entropy of concatenated method names: 'Qvy4vYgA9G', 'CxA4oyNRVQ', 'D0l45vkGtk', 'ubm4Wklqqq', 'FB942Xdb2O', 'rZU4B5QGo5', 'V0U40oVDYw', 'jth4lRntkc', 'raP4Na5Pgx', 'Jvw4jRyhVO'
            Source: 0.2.Purchase Order No.1364.exe.48a3520.6.raw.unpack, repLX8WT01v2xdtGLH.csHigh entropy of concatenated method names: 'UeGAEcOvZ1', 'iUSAiyVFLO', 'Mg6ATEjl6d', 'm1IARkYI4b', 'K9nAb5Zvr7', 'KQKTJ3lUm2', 'GY5TG9eYUU', 'wNKThWjI7o', 'xxXTacB0wQ', 'v3rTPHVUUQ'
            Source: 0.2.Purchase Order No.1364.exe.48a3520.6.raw.unpack, bvZV2YPEGgRO425Eqc.csHigh entropy of concatenated method names: 'fM2KWo95OD', 'VvmK2JwdpP', 'KlDKM4iIb6', 'PgLKBwbPqJ', 'sUjK0I5Evr', 'yUHKXLGZwN', 'ar3K67mNOU', 'lmbKI5jY5O', 'Et8KCbYEx6', 'DVoKnaGaEk'
            Source: 0.2.Purchase Order No.1364.exe.48a3520.6.raw.unpack, YsCc9n5X2PSI0gjMFk.csHigh entropy of concatenated method names: 'xtaVZ4wIso', 'A9xVvSuSVw', 'uXUVoYJ6gT', 'zN3V52solO', 'pVTVqW6Ugk', 'TkAVkBqi1E', 'owgVm87LL7', 'bJlVDu8ej0', 'z1XVKw5dkX', 'AUSV4fHjl4'
            Source: 0.2.Purchase Order No.1364.exe.48a3520.6.raw.unpack, O14kL9G5MC2SIaUteQ.csHigh entropy of concatenated method names: 'BmymaMkvpx', 'qvVmOoU9Q4', 'IEMDguSFnK', 'HL7DfbkeDq', 'ScKmQWuCq1', 'mXHmpb2o1I', 'u1WmuZXOq1', 'hYemtj6vTb', 'aZumUGuSRK', 'f1jmLdbioS'
            Source: 0.2.Purchase Order No.1364.exe.48a3520.6.raw.unpack, TKG54h7NedSSJBAlRw.csHigh entropy of concatenated method names: 'sttTwr3ZTu', 'ObgTsoLkia', 'wakVMWUo60', 'dqHVB7rx3l', 'eoKV0ZLMUM', 'I6qVXCHaRH', 'HvZV6ZwQ4h', 'IcLVInSwDn', 'mMTVCtmoM5', 'pfCVnNAVAC'
            Source: 0.2.Purchase Order No.1364.exe.48a3520.6.raw.unpack, DuqytXibbovTAlIZCY.csHigh entropy of concatenated method names: 'Dispose', 'k7tfPQug5T', 'HBky2ZJJiC', 'qFMxCWBeQH', 'N66fOQmeT1', 'uDHfz8Ero8', 'ProcessDialogKey', 'uIfygvZV2Y', 'eGgyfRO425', 'eqcyy2MFUY'
            Source: 0.2.Purchase Order No.1364.exe.48a3520.6.raw.unpack, YaLiMlhCkb7tQug5TC.csHigh entropy of concatenated method names: 'NpXKqslXoC', 'rNhKmtTtg7', 'uqUKKRg6hH', 'FxIKcT0FVU', 'IH7K8WVRRe', 'gZIKlDwTwW', 'Dispose', 'SJjDFF3AhI', 'hdcDiw7Vr4', 'iFiDVGeJ2W'
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: Yara matchFile source: Process Memory Space: Purchase Order No.1364.exe PID: 6352, type: MEMORYSTR
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeMemory allocated: 10C0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeMemory allocated: 2E90000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeMemory allocated: 2BC0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeMemory allocated: 5410000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeMemory allocated: 6410000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeMemory allocated: 6540000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeMemory allocated: 7540000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeMemory allocated: AF00000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeMemory allocated: BF00000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeMemory allocated: C390000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeMemory allocated: D390000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeMemory allocated: 12B0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeMemory allocated: 2C40000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeMemory allocated: 4C40000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeThread delayed: delay time: 600000Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeThread delayed: delay time: 599891Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeThread delayed: delay time: 599766Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeThread delayed: delay time: 599641Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeThread delayed: delay time: 599531Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeThread delayed: delay time: 599422Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeThread delayed: delay time: 599313Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeThread delayed: delay time: 599188Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeThread delayed: delay time: 599063Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeThread delayed: delay time: 598953Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeThread delayed: delay time: 598844Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeThread delayed: delay time: 598719Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeThread delayed: delay time: 598610Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeThread delayed: delay time: 598485Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeThread delayed: delay time: 598360Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeThread delayed: delay time: 598219Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeThread delayed: delay time: 598073Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeThread delayed: delay time: 597959Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeThread delayed: delay time: 597798Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeThread delayed: delay time: 597649Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeThread delayed: delay time: 597515Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeThread delayed: delay time: 597406Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeThread delayed: delay time: 597297Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeThread delayed: delay time: 597177Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeThread delayed: delay time: 597047Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeThread delayed: delay time: 596938Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeThread delayed: delay time: 596813Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeThread delayed: delay time: 596688Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeThread delayed: delay time: 596563Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeThread delayed: delay time: 596438Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeThread delayed: delay time: 596328Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeThread delayed: delay time: 596219Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeThread delayed: delay time: 596094Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeThread delayed: delay time: 595985Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeThread delayed: delay time: 595860Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeThread delayed: delay time: 595735Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeThread delayed: delay time: 595610Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeThread delayed: delay time: 595487Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeThread delayed: delay time: 595360Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeThread delayed: delay time: 595235Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeThread delayed: delay time: 595110Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeThread delayed: delay time: 594985Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeThread delayed: delay time: 594860Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeThread delayed: delay time: 594738Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeThread delayed: delay time: 594610Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeThread delayed: delay time: 594485Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeThread delayed: delay time: 594360Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeThread delayed: delay time: 594235Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeThread delayed: delay time: 594110Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeThread delayed: delay time: 593985Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeThread delayed: delay time: 593860Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeWindow / User API: threadDelayed 1519Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeWindow / User API: threadDelayed 8297Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exe TID: 6368Thread sleep time: -30000s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exe TID: 6428Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exe TID: 5156Thread sleep count: 32 > 30Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exe TID: 5156Thread sleep time: -29514790517935264s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exe TID: 5156Thread sleep time: -600000s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exe TID: 5200Thread sleep count: 1519 > 30Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exe TID: 5156Thread sleep time: -599891s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exe TID: 5200Thread sleep count: 8297 > 30Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exe TID: 5156Thread sleep time: -599766s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exe TID: 5156Thread sleep time: -599641s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exe TID: 5156Thread sleep time: -599531s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exe TID: 5156Thread sleep time: -599422s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exe TID: 5156Thread sleep time: -599313s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exe TID: 5156Thread sleep time: -599188s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exe TID: 5156Thread sleep time: -599063s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exe TID: 5156Thread sleep time: -598953s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exe TID: 5156Thread sleep time: -598844s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exe TID: 5156Thread sleep time: -598719s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exe TID: 5156Thread sleep time: -598610s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exe TID: 5156Thread sleep time: -598485s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exe TID: 5156Thread sleep time: -598360s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exe TID: 5156Thread sleep time: -598219s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exe TID: 5156Thread sleep time: -598073s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exe TID: 5156Thread sleep time: -597959s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exe TID: 5156Thread sleep time: -597798s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exe TID: 5156Thread sleep time: -597649s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exe TID: 5156Thread sleep time: -597515s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exe TID: 5156Thread sleep time: -597406s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exe TID: 5156Thread sleep time: -597297s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exe TID: 5156Thread sleep time: -597177s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exe TID: 5156Thread sleep time: -597047s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exe TID: 5156Thread sleep time: -596938s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exe TID: 5156Thread sleep time: -596813s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exe TID: 5156Thread sleep time: -596688s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exe TID: 5156Thread sleep time: -596563s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exe TID: 5156Thread sleep time: -596438s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exe TID: 5156Thread sleep time: -596328s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exe TID: 5156Thread sleep time: -596219s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exe TID: 5156Thread sleep time: -596094s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exe TID: 5156Thread sleep time: -595985s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exe TID: 5156Thread sleep time: -595860s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exe TID: 5156Thread sleep time: -595735s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exe TID: 5156Thread sleep time: -595610s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exe TID: 5156Thread sleep time: -595487s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exe TID: 5156Thread sleep time: -595360s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exe TID: 5156Thread sleep time: -595235s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exe TID: 5156Thread sleep time: -595110s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exe TID: 5156Thread sleep time: -594985s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exe TID: 5156Thread sleep time: -594860s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exe TID: 5156Thread sleep time: -594738s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exe TID: 5156Thread sleep time: -594610s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exe TID: 5156Thread sleep time: -594485s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exe TID: 5156Thread sleep time: -594360s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exe TID: 5156Thread sleep time: -594235s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exe TID: 5156Thread sleep time: -594110s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exe TID: 5156Thread sleep time: -593985s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exe TID: 5156Thread sleep time: -593860s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeThread delayed: delay time: 30000Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeThread delayed: delay time: 600000Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeThread delayed: delay time: 599891Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeThread delayed: delay time: 599766Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeThread delayed: delay time: 599641Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeThread delayed: delay time: 599531Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeThread delayed: delay time: 599422Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeThread delayed: delay time: 599313Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeThread delayed: delay time: 599188Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeThread delayed: delay time: 599063Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeThread delayed: delay time: 598953Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeThread delayed: delay time: 598844Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeThread delayed: delay time: 598719Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeThread delayed: delay time: 598610Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeThread delayed: delay time: 598485Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeThread delayed: delay time: 598360Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeThread delayed: delay time: 598219Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeThread delayed: delay time: 598073Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeThread delayed: delay time: 597959Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeThread delayed: delay time: 597798Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeThread delayed: delay time: 597649Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeThread delayed: delay time: 597515Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeThread delayed: delay time: 597406Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeThread delayed: delay time: 597297Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeThread delayed: delay time: 597177Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeThread delayed: delay time: 597047Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeThread delayed: delay time: 596938Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeThread delayed: delay time: 596813Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeThread delayed: delay time: 596688Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeThread delayed: delay time: 596563Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeThread delayed: delay time: 596438Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeThread delayed: delay time: 596328Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeThread delayed: delay time: 596219Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeThread delayed: delay time: 596094Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeThread delayed: delay time: 595985Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeThread delayed: delay time: 595860Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeThread delayed: delay time: 595735Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeThread delayed: delay time: 595610Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeThread delayed: delay time: 595487Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeThread delayed: delay time: 595360Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeThread delayed: delay time: 595235Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeThread delayed: delay time: 595110Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeThread delayed: delay time: 594985Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeThread delayed: delay time: 594860Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeThread delayed: delay time: 594738Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeThread delayed: delay time: 594610Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeThread delayed: delay time: 594485Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeThread delayed: delay time: 594360Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeThread delayed: delay time: 594235Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeThread delayed: delay time: 594110Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeThread delayed: delay time: 593985Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeThread delayed: delay time: 593860Jump to behavior
            Source: Purchase Order No.1364.exe, 00000002.00000002.3319723719.0000000000F96000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeProcess information queried: ProcessInformationJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeMemory allocated: page read and write | page guardJump to behavior

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeMemory written: C:\Users\user\Desktop\Purchase Order No.1364.exe base: 400000 value starts with: 4D5AJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeProcess created: C:\Users\user\Desktop\Purchase Order No.1364.exe "C:\Users\user\Desktop\Purchase Order No.1364.exe"Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeProcess created: C:\Users\user\Desktop\Purchase Order No.1364.exe "C:\Users\user\Desktop\Purchase Order No.1364.exe"Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeQueries volume information: C:\Users\user\Desktop\Purchase Order No.1364.exe VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeQueries volume information: C:\Users\user\Desktop\Purchase Order No.1364.exe VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 0.2.Purchase Order No.1364.exe.4908340.7.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.Purchase Order No.1364.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.Purchase Order No.1364.exe.4908340.7.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.Purchase Order No.1364.exe.48a3520.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.Purchase Order No.1364.exe.483e700.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000002.00000002.3318503770.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.3320826906.0000000002D98000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.3320826906.0000000002C41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.856320142.0000000004699000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Purchase Order No.1364.exe PID: 6352, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: Purchase Order No.1364.exe PID: 6456, type: MEMORYSTR
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order No.1364.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
            Source: Yara matchFile source: 0.2.Purchase Order No.1364.exe.4908340.7.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.Purchase Order No.1364.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.Purchase Order No.1364.exe.4908340.7.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.Purchase Order No.1364.exe.48a3520.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.Purchase Order No.1364.exe.483e700.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000002.00000002.3318503770.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.856320142.0000000004699000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Purchase Order No.1364.exe PID: 6352, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: Purchase Order No.1364.exe PID: 6456, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 0.2.Purchase Order No.1364.exe.4908340.7.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.Purchase Order No.1364.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.Purchase Order No.1364.exe.4908340.7.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.Purchase Order No.1364.exe.48a3520.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.Purchase Order No.1364.exe.483e700.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000002.00000002.3318503770.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.3320826906.0000000002D98000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.3320826906.0000000002C41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.856320142.0000000004699000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Purchase Order No.1364.exe PID: 6352, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: Purchase Order No.1364.exe PID: 6456, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
            DLL Side-Loading
            111
            Process Injection
            1
            Masquerading
            1
            OS Credential Dumping
            1
            Security Software Discovery
            Remote Services1
            Email Collection
            12
            Encrypted Channel
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
            DLL Side-Loading
            1
            Disable or Modify Tools
            LSASS Memory1
            Process Discovery
            Remote Desktop Protocol11
            Archive Collected Data
            1
            Ingress Tool Transfer
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)31
            Virtualization/Sandbox Evasion
            Security Account Manager31
            Virtualization/Sandbox Evasion
            SMB/Windows Admin Shares1
            Data from Local System
            2
            Non-Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook111
            Process Injection
            NTDS1
            Application Window Discovery
            Distributed Component Object ModelInput Capture13
            Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
            Deobfuscate/Decode Files or Information
            LSA Secrets1
            System Network Configuration Discovery
            SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts31
            Obfuscated Files or Information
            Cached Domain Credentials13
            System Information Discovery
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items12
            Software Packing
            DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
            DLL Side-Loading
            Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.