Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SOA - HUAFENG (JAN INVOICE OVERDUE).exe

Overview

General Information

Sample name:SOA - HUAFENG (JAN INVOICE OVERDUE).exe
Analysis ID:1640818
MD5:7641ada9754cd20d4ea00fcff9d14b05
SHA1:8c15e9b5137c69eab85e052abf5c67cc4cc6f9dd
SHA256:6be1f66c2715c6e4e9e535375607880080dd5a110326e80418d224b129aa50e2
Tags:exeuser-threatcat_ch
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Drops script at startup location
Yara detected AgentTesla
Yara detected AntiVM3
.NET source code contains potential unpacker
Drops VBS files to the startup folder
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sigma detected: WScript or CScript Dropper
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Yara detected Costura Assembly Loader
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality to call native functions
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Creates processes with suspicious names
Detected potential crypto function
Drops PE files
Enables debug privileges
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Outbound SMTP Connections
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Stores files to the Windows start menu directory
Uses 32bit PE files
Uses SMTP (mail sending)
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • SOA - HUAFENG (JAN INVOICE OVERDUE).exe (PID: 692 cmdline: "C:\Users\user\Desktop\SOA - HUAFENG (JAN INVOICE OVERDUE).exe" MD5: 7641ADA9754CD20D4EA00FCFF9D14B05)
    • InstallUtil.exe (PID: 7492 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe" MD5: 5D4073B2EB6D217C19F2B22F21BF8D57)
  • wscript.exe (PID: 7844 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ChannelData.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • ChannelData.exe (PID: 7892 cmdline: "C:\Users\user\AppData\Roaming\ChannelData.exe" MD5: 7641ADA9754CD20D4EA00FCFF9D14B05)
      • InstallUtil.exe (PID: 7988 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe" MD5: 5D4073B2EB6D217C19F2B22F21BF8D57)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "SMTP", "Port": "25", "Host": "mail.iaa-airferight.com", "Username": "classic@iaa-airferight.com", "Password": "BIGNAIRA2024"}
SourceRuleDescriptionAuthorStrings
00000007.00000002.1526317646.000000000252C000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    0000000A.00000002.1545536995.0000000003F7D000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      0000000A.00000002.1545536995.0000000003F7D000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        0000000A.00000002.1525149829.0000000002D57000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
          00000007.00000002.1526317646.0000000002501000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            Click to see the 27 entries
            SourceRuleDescriptionAuthorStrings
            0.2.SOA - HUAFENG (JAN INVOICE OVERDUE).exe.5f80000.9.raw.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
              10.2.ChannelData.exe.3ce5570.2.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
                0.2.SOA - HUAFENG (JAN INVOICE OVERDUE).exe.3e75570.4.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                  0.2.SOA - HUAFENG (JAN INVOICE OVERDUE).exe.3e75570.4.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                    0.2.SOA - HUAFENG (JAN INVOICE OVERDUE).exe.3e75570.4.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
                    • 0x316cf:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                    • 0x31741:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
                    • 0x317cb:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
                    • 0x3185d:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                    • 0x318c7:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                    • 0x31939:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                    • 0x319cf:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                    • 0x31a5f:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
                    Click to see the 14 entries

                    System Summary

                    barindex
                    Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ChannelData.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ChannelData.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 3964, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ChannelData.vbs" , ProcessId: 7844, ProcessName: wscript.exe
                    Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 46.175.148.58, DestinationIsIpv6: false, DestinationPort: 25, EventID: 3, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe, Initiated: true, ProcessId: 7492, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49717
                    Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ChannelData.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ChannelData.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 3964, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ChannelData.vbs" , ProcessId: 7844, ProcessName: wscript.exe

                    Data Obfuscation

                    barindex
                    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\SOA - HUAFENG (JAN INVOICE OVERDUE).exe, ProcessId: 692, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ChannelData.vbs
                    No Suricata rule has matched

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: 10.2.ChannelData.exe.3f91f30.6.raw.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Port": "25", "Host": "mail.iaa-airferight.com", "Username": "classic@iaa-airferight.com", "Password": "BIGNAIRA2024"}
                    Source: C:\Users\user\AppData\Roaming\ChannelData.exeReversingLabs: Detection: 66%
                    Source: SOA - HUAFENG (JAN INVOICE OVERDUE).exeVirustotal: Detection: 40%Perma Link
                    Source: SOA - HUAFENG (JAN INVOICE OVERDUE).exeReversingLabs: Detection: 66%
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                    Source: SOA - HUAFENG (JAN INVOICE OVERDUE).exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.4:49716 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.4:49723 version: TLS 1.2
                    Source: SOA - HUAFENG (JAN INVOICE OVERDUE).exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdbSHA256e source: SOA - HUAFENG (JAN INVOICE OVERDUE).exe, 00000000.00000002.1289728685.0000000003F70000.00000004.00000800.00020000.00000000.sdmp, SOA - HUAFENG (JAN INVOICE OVERDUE).exe, 00000000.00000002.1291500523.00000000059C0000.00000004.08000000.00040000.00000000.sdmp, SOA - HUAFENG (JAN INVOICE OVERDUE).exe, 00000000.00000002.1289728685.000000000403D000.00000004.00000800.00020000.00000000.sdmp, ChannelData.exe, 0000000A.00000002.1545536995.0000000003F06000.00000004.00000800.00020000.00000000.sdmp, ChannelData.exe, 0000000A.00000002.1545536995.0000000003E64000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdb source: SOA - HUAFENG (JAN INVOICE OVERDUE).exe, SOA - HUAFENG (JAN INVOICE OVERDUE).exe, 00000000.00000002.1289728685.0000000003F70000.00000004.00000800.00020000.00000000.sdmp, SOA - HUAFENG (JAN INVOICE OVERDUE).exe, 00000000.00000002.1291500523.00000000059C0000.00000004.08000000.00040000.00000000.sdmp, SOA - HUAFENG (JAN INVOICE OVERDUE).exe, 00000000.00000002.1289728685.000000000403D000.00000004.00000800.00020000.00000000.sdmp, ChannelData.exe, 0000000A.00000002.1545536995.0000000003F06000.00000004.00000800.00020000.00000000.sdmp, ChannelData.exe, 0000000A.00000002.1545536995.0000000003E64000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: protobuf-net.pdbSHA256}Lq source: SOA - HUAFENG (JAN INVOICE OVERDUE).exe, 00000000.00000002.1296916544.0000000005FF0000.00000004.08000000.00040000.00000000.sdmp, ChannelData.exe, 0000000A.00000002.1545536995.0000000003CE1000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: protobuf-net.pdb source: SOA - HUAFENG (JAN INVOICE OVERDUE).exe, 00000000.00000002.1296916544.0000000005FF0000.00000004.08000000.00040000.00000000.sdmp, ChannelData.exe, 0000000A.00000002.1545536995.0000000003CE1000.00000004.00000800.00020000.00000000.sdmp
                    Source: C:\Users\user\AppData\Roaming\ChannelData.exeCode function: 4x nop then jmp 05835720h10_2_05835661
                    Source: C:\Users\user\AppData\Roaming\ChannelData.exeCode function: 4x nop then jmp 05835720h10_2_05835668
                    Source: Joe Sandbox ViewIP Address: 46.175.148.58 46.175.148.58
                    Source: Joe Sandbox ViewIP Address: 172.67.74.152 172.67.74.152
                    Source: Joe Sandbox ViewIP Address: 172.67.74.152 172.67.74.152
                    Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                    Source: unknownDNS query: name: api.ipify.org
                    Source: unknownDNS query: name: api.ipify.org
                    Source: global trafficTCP traffic: 192.168.2.4:49717 -> 46.175.148.58:25
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: global trafficDNS traffic detected: DNS query: api.ipify.org
                    Source: global trafficDNS traffic detected: DNS query: mail.iaa-airferight.com
                    Source: SOA - HUAFENG (JAN INVOICE OVERDUE).exe, ChannelData.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
                    Source: SOA - HUAFENG (JAN INVOICE OVERDUE).exe, ChannelData.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
                    Source: SOA - HUAFENG (JAN INVOICE OVERDUE).exe, ChannelData.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
                    Source: SOA - HUAFENG (JAN INVOICE OVERDUE).exe, ChannelData.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
                    Source: InstallUtil.exe, 00000007.00000002.1535545105.0000000004E44000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.me
                    Source: InstallUtil.exe, 00000007.00000002.1535545105.0000000004E44000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.microsoft
                    Source: SOA - HUAFENG (JAN INVOICE OVERDUE).exe, ChannelData.exe.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
                    Source: SOA - HUAFENG (JAN INVOICE OVERDUE).exe, ChannelData.exe.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
                    Source: SOA - HUAFENG (JAN INVOICE OVERDUE).exe, ChannelData.exe.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
                    Source: ChannelData.exe.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
                    Source: SOA - HUAFENG (JAN INVOICE OVERDUE).exe, ChannelData.exe.0.drString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
                    Source: InstallUtil.exe, 00000007.00000002.1526317646.000000000252C000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000B.00000002.2429982790.0000000002DCC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.iaa-airferight.com
                    Source: SOA - HUAFENG (JAN INVOICE OVERDUE).exe, ChannelData.exe.0.drString found in binary or memory: http://ocsp.digicert.com0
                    Source: SOA - HUAFENG (JAN INVOICE OVERDUE).exe, ChannelData.exe.0.drString found in binary or memory: http://ocsp.digicert.com0A
                    Source: SOA - HUAFENG (JAN INVOICE OVERDUE).exe, ChannelData.exe.0.drString found in binary or memory: http://ocsp.digicert.com0C
                    Source: SOA - HUAFENG (JAN INVOICE OVERDUE).exe, ChannelData.exe.0.drString found in binary or memory: http://ocsp.digicert.com0X
                    Source: SOA - HUAFENG (JAN INVOICE OVERDUE).exe, 00000000.00000002.1280301174.0000000002EE7000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000007.00000002.1526317646.00000000024B1000.00000004.00000800.00020000.00000000.sdmp, ChannelData.exe, 0000000A.00000002.1525149829.0000000002D57000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000B.00000002.2429982790.0000000002D5C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: SOA - HUAFENG (JAN INVOICE OVERDUE).exe, ChannelData.exe.0.drString found in binary or memory: http://www.digicert.com/CPS0
                    Source: SOA - HUAFENG (JAN INVOICE OVERDUE).exe, 00000000.00000002.1289728685.0000000003E71000.00000004.00000800.00020000.00000000.sdmp, SOA - HUAFENG (JAN INVOICE OVERDUE).exe, 00000000.00000002.1289728685.0000000003EF0000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000007.00000002.1522791312.0000000000542000.00000040.00000400.00020000.00000000.sdmp, ChannelData.exe, 0000000A.00000002.1545536995.0000000003F7D000.00000004.00000800.00020000.00000000.sdmp, ChannelData.exe, 0000000A.00000002.1545536995.0000000003DF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://account.dyn.com/
                    Source: SOA - HUAFENG (JAN INVOICE OVERDUE).exe, 00000000.00000002.1289728685.0000000003E71000.00000004.00000800.00020000.00000000.sdmp, SOA - HUAFENG (JAN INVOICE OVERDUE).exe, 00000000.00000002.1289728685.0000000003EF0000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000007.00000002.1522791312.0000000000542000.00000040.00000400.00020000.00000000.sdmp, InstallUtil.exe, 00000007.00000002.1526317646.00000000024B1000.00000004.00000800.00020000.00000000.sdmp, ChannelData.exe, 0000000A.00000002.1545536995.0000000003F7D000.00000004.00000800.00020000.00000000.sdmp, ChannelData.exe, 0000000A.00000002.1545536995.0000000003DF2000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000B.00000002.2429982790.0000000002D5C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org
                    Source: InstallUtil.exe, 00000007.00000002.1526317646.00000000024B1000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000B.00000002.2429982790.0000000002D5C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
                    Source: InstallUtil.exe, 00000007.00000002.1526317646.00000000024B1000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000B.00000002.2429982790.0000000002D5C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/t
                    Source: SOA - HUAFENG (JAN INVOICE OVERDUE).exe, 00000000.00000002.1296916544.0000000005FF0000.00000004.08000000.00040000.00000000.sdmp, ChannelData.exe, 0000000A.00000002.1545536995.0000000003CE1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-net
                    Source: SOA - HUAFENG (JAN INVOICE OVERDUE).exe, 00000000.00000002.1296916544.0000000005FF0000.00000004.08000000.00040000.00000000.sdmp, SOA - HUAFENG (JAN INVOICE OVERDUE).exe, 00000000.00000002.1289728685.0000000003EF0000.00000004.00000800.00020000.00000000.sdmp, ChannelData.exe, 0000000A.00000002.1545536995.0000000003DF2000.00000004.00000800.00020000.00000000.sdmp, ChannelData.exe, 0000000A.00000002.1545536995.0000000003CE1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-netJ
                    Source: SOA - HUAFENG (JAN INVOICE OVERDUE).exe, 00000000.00000002.1296916544.0000000005FF0000.00000004.08000000.00040000.00000000.sdmp, ChannelData.exe, 0000000A.00000002.1545536995.0000000003CE1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-neti
                    Source: SOA - HUAFENG (JAN INVOICE OVERDUE).exe, 00000000.00000002.1296916544.0000000005FF0000.00000004.08000000.00040000.00000000.sdmp, ChannelData.exe, 0000000A.00000002.1545536995.0000000003CE1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/11564914/23354;
                    Source: SOA - HUAFENG (JAN INVOICE OVERDUE).exe, 00000000.00000002.1296916544.0000000005FF0000.00000004.08000000.00040000.00000000.sdmp, SOA - HUAFENG (JAN INVOICE OVERDUE).exe, 00000000.00000002.1280301174.0000000002EE7000.00000004.00000800.00020000.00000000.sdmp, ChannelData.exe, 0000000A.00000002.1525149829.0000000002D57000.00000004.00000800.00020000.00000000.sdmp, ChannelData.exe, 0000000A.00000002.1545536995.0000000003CE1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/14436606/23354
                    Source: SOA - HUAFENG (JAN INVOICE OVERDUE).exe, 00000000.00000002.1296916544.0000000005FF0000.00000004.08000000.00040000.00000000.sdmp, ChannelData.exe, 0000000A.00000002.1545536995.0000000003CE1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/2152978/23354
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
                    Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.4:49716 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.4:49723 version: TLS 1.2

                    System Summary

                    barindex
                    Source: 0.2.SOA - HUAFENG (JAN INVOICE OVERDUE).exe.3e75570.4.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 7.2.InstallUtil.exe.540000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 10.2.ChannelData.exe.3f91f30.6.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 10.2.ChannelData.exe.3f91f30.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.SOA - HUAFENG (JAN INVOICE OVERDUE).exe.3e75570.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: initial sampleStatic PE information: Filename: SOA - HUAFENG (JAN INVOICE OVERDUE).exe
                    Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\ChannelData.exeCode function: 10_2_05836F90 NtProtectVirtualMemory,10_2_05836F90
                    Source: C:\Users\user\AppData\Roaming\ChannelData.exeCode function: 10_2_05839FB8 NtResumeThread,10_2_05839FB8
                    Source: C:\Users\user\AppData\Roaming\ChannelData.exeCode function: 10_2_05839FB0 NtResumeThread,10_2_05839FB0
                    Source: C:\Users\user\AppData\Roaming\ChannelData.exeCode function: 10_2_05836F68 NtProtectVirtualMemory,10_2_05836F68
                    Source: C:\Users\user\AppData\Roaming\ChannelData.exeCode function: 10_2_0583A0A7 NtResumeThread,10_2_0583A0A7
                    Source: C:\Users\user\Desktop\SOA - HUAFENG (JAN INVOICE OVERDUE).exeCode function: 0_2_059C6E5B0_2_059C6E5B
                    Source: C:\Users\user\Desktop\SOA - HUAFENG (JAN INVOICE OVERDUE).exeCode function: 0_2_0163E0480_2_0163E048
                    Source: C:\Users\user\Desktop\SOA - HUAFENG (JAN INVOICE OVERDUE).exeCode function: 0_2_0163A1600_2_0163A160
                    Source: C:\Users\user\Desktop\SOA - HUAFENG (JAN INVOICE OVERDUE).exeCode function: 0_2_0163A1510_2_0163A151
                    Source: C:\Users\user\Desktop\SOA - HUAFENG (JAN INVOICE OVERDUE).exeCode function: 0_2_0163A6F00_2_0163A6F0
                    Source: C:\Users\user\Desktop\SOA - HUAFENG (JAN INVOICE OVERDUE).exeCode function: 0_2_068CF8880_2_068CF888
                    Source: C:\Users\user\Desktop\SOA - HUAFENG (JAN INVOICE OVERDUE).exeCode function: 0_2_068CDFC80_2_068CDFC8
                    Source: C:\Users\user\Desktop\SOA - HUAFENG (JAN INVOICE OVERDUE).exeCode function: 0_2_068CE5480_2_068CE548
                    Source: C:\Users\user\Desktop\SOA - HUAFENG (JAN INVOICE OVERDUE).exeCode function: 0_2_068B00060_2_068B0006
                    Source: C:\Users\user\Desktop\SOA - HUAFENG (JAN INVOICE OVERDUE).exeCode function: 0_2_068B00400_2_068B0040
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_0237A4F87_2_0237A4F8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_0237E5E07_2_0237E5E0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_02374A907_2_02374A90
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_0237A9587_2_0237A958
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_0237DE187_2_0237DE18
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_02373E787_2_02373E78
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_023741C07_2_023741C0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_05DC91707_2_05DC9170
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_05DCBB107_2_05DCBB10
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_05DD65D87_2_05DD65D8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_05DD55C07_2_05DD55C0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_05DD7D687_2_05DD7D68
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_05DDC1787_2_05DDC178
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_05DD23607_2_05DD2360
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_05DDB2207_2_05DDB220
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_05DD5CE07_2_05DD5CE0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_05DD76887_2_05DD7688
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_05DD00407_2_05DD0040
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_05DDE3A07_2_05DDE3A0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_05DD00077_2_05DD0007
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_05DD00377_2_05DD0037
                    Source: C:\Users\user\AppData\Roaming\ChannelData.exeCode function: 10_2_0110E04810_2_0110E048
                    Source: C:\Users\user\AppData\Roaming\ChannelData.exeCode function: 10_2_0110A15110_2_0110A151
                    Source: C:\Users\user\AppData\Roaming\ChannelData.exeCode function: 10_2_0110A16010_2_0110A160
                    Source: C:\Users\user\AppData\Roaming\ChannelData.exeCode function: 10_2_0110A6F010_2_0110A6F0
                    Source: C:\Users\user\AppData\Roaming\ChannelData.exeCode function: 10_2_0583833810_2_05838338
                    Source: C:\Users\user\AppData\Roaming\ChannelData.exeCode function: 10_2_05833B6810_2_05833B68
                    Source: C:\Users\user\AppData\Roaming\ChannelData.exeCode function: 10_2_0583882810_2_05838828
                    Source: C:\Users\user\AppData\Roaming\ChannelData.exeCode function: 10_2_0583832810_2_05838328
                    Source: C:\Users\user\AppData\Roaming\ChannelData.exeCode function: 10_2_05833B5810_2_05833B58
                    Source: C:\Users\user\AppData\Roaming\ChannelData.exeCode function: 10_2_0675F88810_2_0675F888
                    Source: C:\Users\user\AppData\Roaming\ChannelData.exeCode function: 10_2_0675DFC810_2_0675DFC8
                    Source: C:\Users\user\AppData\Roaming\ChannelData.exeCode function: 10_2_0674004010_2_06740040
                    Source: C:\Users\user\AppData\Roaming\ChannelData.exeCode function: 10_2_0674000710_2_06740007
                    Source: C:\Users\user\AppData\Roaming\ChannelData.exeCode function: 10_2_0675E54810_2_0675E548
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 11_2_02C34A9811_2_02C34A98
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 11_2_02C3AA1A11_2_02C3AA1A
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 11_2_02C3E80111_2_02C3E801
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 11_2_02C33E8011_2_02C33E80
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 11_2_02C341C811_2_02C341C8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 11_2_067AA39C11_2_067AA39C
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 11_2_067B65D811_2_067B65D8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 11_2_067B55C011_2_067B55C0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 11_2_067BB21311_2_067BB213
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 11_2_067B307811_2_067B3078
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 11_2_067BC17811_2_067BC178
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 11_2_067B7D6811_2_067B7D68
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 11_2_067B768811_2_067B7688
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 11_2_067B235011_2_067B2350
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 11_2_067BE3A011_2_067BE3A0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 11_2_067B004011_2_067B0040
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 11_2_067B5CCB11_2_067B5CCB
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 11_2_067B002511_2_067B0025
                    Source: SOA - HUAFENG (JAN INVOICE OVERDUE).exeStatic PE information: invalid certificate
                    Source: SOA - HUAFENG (JAN INVOICE OVERDUE).exeBinary or memory string: OriginalFilename vs SOA - HUAFENG (JAN INVOICE OVERDUE).exe
                    Source: SOA - HUAFENG (JAN INVOICE OVERDUE).exe, 00000000.00000002.1296916544.0000000005FF0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameprotobuf-net.dllJ vs SOA - HUAFENG (JAN INVOICE OVERDUE).exe
                    Source: SOA - HUAFENG (JAN INVOICE OVERDUE).exe, 00000000.00000002.1280301174.000000000323C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename69f9de06-3db1-4f6f-8eb7-8ce21e91f1c8.exe4 vs SOA - HUAFENG (JAN INVOICE OVERDUE).exe
                    Source: SOA - HUAFENG (JAN INVOICE OVERDUE).exe, 00000000.00000002.1279287295.000000000113E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs SOA - HUAFENG (JAN INVOICE OVERDUE).exe
                    Source: SOA - HUAFENG (JAN INVOICE OVERDUE).exe, 00000000.00000002.1289728685.0000000003F70000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameBlabh.dll" vs SOA - HUAFENG (JAN INVOICE OVERDUE).exe
                    Source: SOA - HUAFENG (JAN INVOICE OVERDUE).exe, 00000000.00000002.1289728685.0000000003F70000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMicrosoft.Win32.TaskScheduler.dll\ vs SOA - HUAFENG (JAN INVOICE OVERDUE).exe
                    Source: SOA - HUAFENG (JAN INVOICE OVERDUE).exe, 00000000.00000002.1291500523.00000000059C0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMicrosoft.Win32.TaskScheduler.dll\ vs SOA - HUAFENG (JAN INVOICE OVERDUE).exe
                    Source: SOA - HUAFENG (JAN INVOICE OVERDUE).exe, 00000000.00000002.1280301174.0000000002E71000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs SOA - HUAFENG (JAN INVOICE OVERDUE).exe
                    Source: SOA - HUAFENG (JAN INVOICE OVERDUE).exe, 00000000.00000000.1160014207.0000000000B44000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameJjgmwy.exeB vs SOA - HUAFENG (JAN INVOICE OVERDUE).exe
                    Source: SOA - HUAFENG (JAN INVOICE OVERDUE).exe, 00000000.00000002.1289728685.000000000403D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMicrosoft.Win32.TaskScheduler.dll\ vs SOA - HUAFENG (JAN INVOICE OVERDUE).exe
                    Source: SOA - HUAFENG (JAN INVOICE OVERDUE).exe, 00000000.00000002.1289728685.000000000403D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameJjgmwy.exeB vs SOA - HUAFENG (JAN INVOICE OVERDUE).exe
                    Source: SOA - HUAFENG (JAN INVOICE OVERDUE).exe, 00000000.00000002.1289728685.0000000003E71000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename69f9de06-3db1-4f6f-8eb7-8ce21e91f1c8.exe4 vs SOA - HUAFENG (JAN INVOICE OVERDUE).exe
                    Source: SOA - HUAFENG (JAN INVOICE OVERDUE).exe, 00000000.00000002.1289728685.0000000003EF0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameprotobuf-net.dllJ vs SOA - HUAFENG (JAN INVOICE OVERDUE).exe
                    Source: SOA - HUAFENG (JAN INVOICE OVERDUE).exe, 00000000.00000002.1291845279.0000000005B60000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameBlabh.dll" vs SOA - HUAFENG (JAN INVOICE OVERDUE).exe
                    Source: SOA - HUAFENG (JAN INVOICE OVERDUE).exeBinary or memory string: OriginalFilenameJjgmwy.exeB vs SOA - HUAFENG (JAN INVOICE OVERDUE).exe
                    Source: SOA - HUAFENG (JAN INVOICE OVERDUE).exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: 0.2.SOA - HUAFENG (JAN INVOICE OVERDUE).exe.3e75570.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 7.2.InstallUtil.exe.540000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 10.2.ChannelData.exe.3f91f30.6.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 10.2.ChannelData.exe.3f91f30.6.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.SOA - HUAFENG (JAN INVOICE OVERDUE).exe.3e75570.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: SOA - HUAFENG (JAN INVOICE OVERDUE).exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: ChannelData.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: SOA - HUAFENG (JAN INVOICE OVERDUE).exe, Yghbckh.csCryptographic APIs: 'CreateDecryptor'
                    Source: ChannelData.exe.0.dr, Yghbckh.csCryptographic APIs: 'CreateDecryptor'
                    Source: 0.2.SOA - HUAFENG (JAN INVOICE OVERDUE).exe.408c170.1.raw.unpack, Yghbckh.csCryptographic APIs: 'CreateDecryptor'
                    Source: 0.2.SOA - HUAFENG (JAN INVOICE OVERDUE).exe.59c0000.6.raw.unpack, ITaskFolder.csTask registration methods: 'RegisterTaskDefinition', 'RegisterTask'
                    Source: 0.2.SOA - HUAFENG (JAN INVOICE OVERDUE).exe.59c0000.6.raw.unpack, TaskFolder.csTask registration methods: 'RegisterTaskDefinition', 'RegisterTask', 'CreateFolder'
                    Source: 0.2.SOA - HUAFENG (JAN INVOICE OVERDUE).exe.59c0000.6.raw.unpack, Task.csTask registration methods: 'RegisterChanges', 'CreateTask'
                    Source: 0.2.SOA - HUAFENG (JAN INVOICE OVERDUE).exe.59c0000.6.raw.unpack, TaskService.csTask registration methods: 'CreateFromToken'
                    Source: 0.2.SOA - HUAFENG (JAN INVOICE OVERDUE).exe.403d950.3.raw.unpack, ITaskFolder.csTask registration methods: 'RegisterTaskDefinition', 'RegisterTask'
                    Source: 0.2.SOA - HUAFENG (JAN INVOICE OVERDUE).exe.403d950.3.raw.unpack, TaskFolder.csTask registration methods: 'RegisterTaskDefinition', 'RegisterTask', 'CreateFolder'
                    Source: 0.2.SOA - HUAFENG (JAN INVOICE OVERDUE).exe.403d950.3.raw.unpack, TaskSecurity.csSecurity API names: Microsoft.Win32.TaskScheduler.TaskSecurity.GetAccessControlSectionsFromChanges()
                    Source: 0.2.SOA - HUAFENG (JAN INVOICE OVERDUE).exe.403d950.3.raw.unpack, TaskSecurity.csSecurity API names: System.Security.AccessControl.CommonObjectSecurity.AddAccessRule(System.Security.AccessControl.AccessRule)
                    Source: 0.2.SOA - HUAFENG (JAN INVOICE OVERDUE).exe.59c0000.6.raw.unpack, TaskPrincipal.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.SOA - HUAFENG (JAN INVOICE OVERDUE).exe.59c0000.6.raw.unpack, User.csSecurity API names: System.Security.Principal.SecurityIdentifier.Translate(System.Type)
                    Source: 0.2.SOA - HUAFENG (JAN INVOICE OVERDUE).exe.59c0000.6.raw.unpack, TaskFolder.csSecurity API names: Microsoft.Win32.TaskScheduler.TaskFolder.GetAccessControl(System.Security.AccessControl.AccessControlSections)
                    Source: 0.2.SOA - HUAFENG (JAN INVOICE OVERDUE).exe.403d950.3.raw.unpack, User.csSecurity API names: System.Security.Principal.SecurityIdentifier.Translate(System.Type)
                    Source: 0.2.SOA - HUAFENG (JAN INVOICE OVERDUE).exe.59c0000.6.raw.unpack, Task.csSecurity API names: Microsoft.Win32.TaskScheduler.Task.GetAccessControl(System.Security.AccessControl.AccessControlSections)
                    Source: 0.2.SOA - HUAFENG (JAN INVOICE OVERDUE).exe.403d950.3.raw.unpack, TaskFolder.csSecurity API names: Microsoft.Win32.TaskScheduler.TaskFolder.GetAccessControl(System.Security.AccessControl.AccessControlSections)
                    Source: 0.2.SOA - HUAFENG (JAN INVOICE OVERDUE).exe.403d950.3.raw.unpack, TaskPrincipal.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.SOA - HUAFENG (JAN INVOICE OVERDUE).exe.403d950.3.raw.unpack, Task.csSecurity API names: Microsoft.Win32.TaskScheduler.Task.GetAccessControl(System.Security.AccessControl.AccessControlSections)
                    Source: 0.2.SOA - HUAFENG (JAN INVOICE OVERDUE).exe.59c0000.6.raw.unpack, TaskSecurity.csSecurity API names: Microsoft.Win32.TaskScheduler.TaskSecurity.GetAccessControlSectionsFromChanges()
                    Source: 0.2.SOA - HUAFENG (JAN INVOICE OVERDUE).exe.59c0000.6.raw.unpack, TaskSecurity.csSecurity API names: System.Security.AccessControl.CommonObjectSecurity.AddAccessRule(System.Security.AccessControl.AccessRule)
                    Source: ChannelData.exe.0.dr, Yghbckh.csSuspicious method names: .Yghbckh.FetchPayloadAsync
                    Source: SOA - HUAFENG (JAN INVOICE OVERDUE).exe, Yghbckh.csSuspicious method names: .Yghbckh.FetchPayloadAsync
                    Source: 0.2.SOA - HUAFENG (JAN INVOICE OVERDUE).exe.408c170.1.raw.unpack, Yghbckh.csSuspicious method names: .Yghbckh.FetchPayloadAsync
                    Source: classification engineClassification label: mal100.troj.spyw.expl.evad.winEXE@8/3@2/2
                    Source: C:\Users\user\Desktop\SOA - HUAFENG (JAN INVOICE OVERDUE).exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ChannelData.vbsJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMutant created: NULL
                    Source: unknownProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ChannelData.vbs"
                    Source: SOA - HUAFENG (JAN INVOICE OVERDUE).exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: SOA - HUAFENG (JAN INVOICE OVERDUE).exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\SOA - HUAFENG (JAN INVOICE OVERDUE).exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: SOA - HUAFENG (JAN INVOICE OVERDUE).exeVirustotal: Detection: 40%
                    Source: SOA - HUAFENG (JAN INVOICE OVERDUE).exeReversingLabs: Detection: 66%
                    Source: C:\Users\user\Desktop\SOA - HUAFENG (JAN INVOICE OVERDUE).exeFile read: C:\Users\user\Desktop\SOA - HUAFENG (JAN INVOICE OVERDUE).exeJump to behavior
                    Source: unknownProcess created: C:\Users\user\Desktop\SOA - HUAFENG (JAN INVOICE OVERDUE).exe "C:\Users\user\Desktop\SOA - HUAFENG (JAN INVOICE OVERDUE).exe"
                    Source: C:\Users\user\Desktop\SOA - HUAFENG (JAN INVOICE OVERDUE).exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                    Source: unknownProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ChannelData.vbs"
                    Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Roaming\ChannelData.exe "C:\Users\user\AppData\Roaming\ChannelData.exe"
                    Source: C:\Users\user\AppData\Roaming\ChannelData.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                    Source: C:\Users\user\Desktop\SOA - HUAFENG (JAN INVOICE OVERDUE).exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"Jump to behavior
                    Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Roaming\ChannelData.exe "C:\Users\user\AppData\Roaming\ChannelData.exe" Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\ChannelData.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\SOA - HUAFENG (JAN INVOICE OVERDUE).exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\Desktop\SOA - HUAFENG (JAN INVOICE OVERDUE).exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\SOA - HUAFENG (JAN INVOICE OVERDUE).exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\SOA - HUAFENG (JAN INVOICE OVERDUE).exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\SOA - HUAFENG (JAN INVOICE OVERDUE).exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\SOA - HUAFENG (JAN INVOICE OVERDUE).exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\SOA - HUAFENG (JAN INVOICE OVERDUE).exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\SOA - HUAFENG (JAN INVOICE OVERDUE).exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\SOA - HUAFENG (JAN INVOICE OVERDUE).exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\SOA - HUAFENG (JAN INVOICE OVERDUE).exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\SOA - HUAFENG (JAN INVOICE OVERDUE).exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\SOA - HUAFENG (JAN INVOICE OVERDUE).exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\SOA - HUAFENG (JAN INVOICE OVERDUE).exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\SOA - HUAFENG (JAN INVOICE OVERDUE).exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\SOA - HUAFENG (JAN INVOICE OVERDUE).exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\SOA - HUAFENG (JAN INVOICE OVERDUE).exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\SOA - HUAFENG (JAN INVOICE OVERDUE).exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\SOA - HUAFENG (JAN INVOICE OVERDUE).exeSection loaded: ntmarta.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: wtsapi32.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: winsta.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: rasapi32.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: rasman.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: rtutils.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: dhcpcsvc6.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: dhcpcsvc.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: schannel.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: mskeyprotect.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: ncryptsslp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: vaultcli.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: vbscript.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: slc.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ChannelData.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ChannelData.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ChannelData.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ChannelData.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ChannelData.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ChannelData.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ChannelData.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ChannelData.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ChannelData.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ChannelData.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ChannelData.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ChannelData.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ChannelData.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ChannelData.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ChannelData.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ChannelData.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ChannelData.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: rasapi32.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: rasman.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: rtutils.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: dhcpcsvc6.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: dhcpcsvc.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: schannel.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: mskeyprotect.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: ncryptsslp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: vaultcli.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\Desktop\SOA - HUAFENG (JAN INVOICE OVERDUE).exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                    Source: C:\Users\user\Desktop\SOA - HUAFENG (JAN INVOICE OVERDUE).exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                    Source: SOA - HUAFENG (JAN INVOICE OVERDUE).exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                    Source: SOA - HUAFENG (JAN INVOICE OVERDUE).exeStatic PE information: Virtual size of .text is bigger than: 0x100000
                    Source: SOA - HUAFENG (JAN INVOICE OVERDUE).exeStatic file information: File size 1204608 > 1048576
                    Source: SOA - HUAFENG (JAN INVOICE OVERDUE).exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x110400
                    Source: SOA - HUAFENG (JAN INVOICE OVERDUE).exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdbSHA256e source: SOA - HUAFENG (JAN INVOICE OVERDUE).exe, 00000000.00000002.1289728685.0000000003F70000.00000004.00000800.00020000.00000000.sdmp, SOA - HUAFENG (JAN INVOICE OVERDUE).exe, 00000000.00000002.1291500523.00000000059C0000.00000004.08000000.00040000.00000000.sdmp, SOA - HUAFENG (JAN INVOICE OVERDUE).exe, 00000000.00000002.1289728685.000000000403D000.00000004.00000800.00020000.00000000.sdmp, ChannelData.exe, 0000000A.00000002.1545536995.0000000003F06000.00000004.00000800.00020000.00000000.sdmp, ChannelData.exe, 0000000A.00000002.1545536995.0000000003E64000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdb source: SOA - HUAFENG (JAN INVOICE OVERDUE).exe, SOA - HUAFENG (JAN INVOICE OVERDUE).exe, 00000000.00000002.1289728685.0000000003F70000.00000004.00000800.00020000.00000000.sdmp, SOA - HUAFENG (JAN INVOICE OVERDUE).exe, 00000000.00000002.1291500523.00000000059C0000.00000004.08000000.00040000.00000000.sdmp, SOA - HUAFENG (JAN INVOICE OVERDUE).exe, 00000000.00000002.1289728685.000000000403D000.00000004.00000800.00020000.00000000.sdmp, ChannelData.exe, 0000000A.00000002.1545536995.0000000003F06000.00000004.00000800.00020000.00000000.sdmp, ChannelData.exe, 0000000A.00000002.1545536995.0000000003E64000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: protobuf-net.pdbSHA256}Lq source: SOA - HUAFENG (JAN INVOICE OVERDUE).exe, 00000000.00000002.1296916544.0000000005FF0000.00000004.08000000.00040000.00000000.sdmp, ChannelData.exe, 0000000A.00000002.1545536995.0000000003CE1000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: protobuf-net.pdb source: SOA - HUAFENG (JAN INVOICE OVERDUE).exe, 00000000.00000002.1296916544.0000000005FF0000.00000004.08000000.00040000.00000000.sdmp, ChannelData.exe, 0000000A.00000002.1545536995.0000000003CE1000.00000004.00000800.00020000.00000000.sdmp

                    Data Obfuscation

                    barindex
                    Source: SOA - HUAFENG (JAN INVOICE OVERDUE).exe, Hkuah.cs.Net Code: Xnrypaqpv System.AppDomain.Load(byte[])
                    Source: ChannelData.exe.0.dr, Hkuah.cs.Net Code: Xnrypaqpv System.AppDomain.Load(byte[])
                    Source: 0.2.SOA - HUAFENG (JAN INVOICE OVERDUE).exe.59c0000.6.raw.unpack, ReflectionHelper.cs.Net Code: InvokeMethod
                    Source: 0.2.SOA - HUAFENG (JAN INVOICE OVERDUE).exe.59c0000.6.raw.unpack, ReflectionHelper.cs.Net Code: InvokeMethod
                    Source: 0.2.SOA - HUAFENG (JAN INVOICE OVERDUE).exe.59c0000.6.raw.unpack, XmlSerializationHelper.cs.Net Code: ReadObjectProperties
                    Source: 0.2.SOA - HUAFENG (JAN INVOICE OVERDUE).exe.408c170.1.raw.unpack, Hkuah.cs.Net Code: Xnrypaqpv System.AppDomain.Load(byte[])
                    Source: 0.2.SOA - HUAFENG (JAN INVOICE OVERDUE).exe.403d950.3.raw.unpack, ReflectionHelper.cs.Net Code: InvokeMethod
                    Source: 0.2.SOA - HUAFENG (JAN INVOICE OVERDUE).exe.403d950.3.raw.unpack, ReflectionHelper.cs.Net Code: InvokeMethod
                    Source: 0.2.SOA - HUAFENG (JAN INVOICE OVERDUE).exe.403d950.3.raw.unpack, XmlSerializationHelper.cs.Net Code: ReadObjectProperties
                    Source: 0.2.SOA - HUAFENG (JAN INVOICE OVERDUE).exe.5ff0000.10.raw.unpack, TypeModel.cs.Net Code: TryDeserializeList
                    Source: 0.2.SOA - HUAFENG (JAN INVOICE OVERDUE).exe.5ff0000.10.raw.unpack, ListDecorator.cs.Net Code: Read
                    Source: 0.2.SOA - HUAFENG (JAN INVOICE OVERDUE).exe.5ff0000.10.raw.unpack, TypeSerializer.cs.Net Code: CreateInstance
                    Source: 0.2.SOA - HUAFENG (JAN INVOICE OVERDUE).exe.5ff0000.10.raw.unpack, TypeSerializer.cs.Net Code: EmitCreateInstance
                    Source: 0.2.SOA - HUAFENG (JAN INVOICE OVERDUE).exe.5ff0000.10.raw.unpack, TypeSerializer.cs.Net Code: EmitCreateIfNull
                    Source: Yara matchFile source: 0.2.SOA - HUAFENG (JAN INVOICE OVERDUE).exe.5f80000.9.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 10.2.ChannelData.exe.3ce5570.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 10.2.ChannelData.exe.3ce5570.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SOA - HUAFENG (JAN INVOICE OVERDUE).exe.5f80000.9.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0000000A.00000002.1525149829.0000000002D57000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1296713688.0000000005F80000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000A.00000002.1545536995.0000000003CE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1280301174.0000000002EE7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: SOA - HUAFENG (JAN INVOICE OVERDUE).exe PID: 692, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: ChannelData.exe PID: 7892, type: MEMORYSTR
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_02370C6D push edi; retf 7_2_02370C7A
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_02370C45 push ebx; retf 7_2_02370C52
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 11_2_02C30C45 push ebx; retf 11_2_02C30C52
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 11_2_02C30C6D push edi; retf 11_2_02C30C7A
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 11_2_067AFB43 push es; ret 11_2_067AFB44
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 11_2_067AFB3F push es; ret 11_2_067AFB40
                    Source: SOA - HUAFENG (JAN INVOICE OVERDUE).exeStatic PE information: section name: .text entropy: 7.99849113902645
                    Source: ChannelData.exe.0.drStatic PE information: section name: .text entropy: 7.99849113902645
                    Source: 0.2.SOA - HUAFENG (JAN INVOICE OVERDUE).exe.5b60000.7.raw.unpack, yfj0wkVv3EasUI0CecT.csHigh entropy of concatenated method names: 'Nb8VHISSTf', 'k5TVEXmnNx', 'xj7VKdKXgn', 'F5cVkwkPna', 'yCAV1okZmn', 'sppVX2B2w9', 'DWeVoFtwxW', 'q5bVAFrc4S', 'RtgVyTNd4V', 'X6tV5y1N5h'
                    Source: C:\Users\user\Desktop\SOA - HUAFENG (JAN INVOICE OVERDUE).exeFile created: \soa - huafeng (jan invoice overdue).exe
                    Source: C:\Users\user\Desktop\SOA - HUAFENG (JAN INVOICE OVERDUE).exeFile created: \soa - huafeng (jan invoice overdue).exeJump to behavior
                    Source: C:\Users\user\Desktop\SOA - HUAFENG (JAN INVOICE OVERDUE).exeFile created: C:\Users\user\AppData\Roaming\ChannelData.exeJump to dropped file

                    Boot Survival

                    barindex
                    Source: C:\Users\user\Desktop\SOA - HUAFENG (JAN INVOICE OVERDUE).exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ChannelData.vbsJump to dropped file
                    Source: C:\Users\user\Desktop\SOA - HUAFENG (JAN INVOICE OVERDUE).exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ChannelData.vbsJump to behavior
                    Source: C:\Users\user\Desktop\SOA - HUAFENG (JAN INVOICE OVERDUE).exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ChannelData.vbsJump to behavior
                    Source: C:\Users\user\Desktop\SOA - HUAFENG (JAN INVOICE OVERDUE).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA - HUAFENG (JAN INVOICE OVERDUE).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA - HUAFENG (JAN INVOICE OVERDUE).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA - HUAFENG (JAN INVOICE OVERDUE).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA - HUAFENG (JAN INVOICE OVERDUE).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA - HUAFENG (JAN INVOICE OVERDUE).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA - HUAFENG (JAN INVOICE OVERDUE).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA - HUAFENG (JAN INVOICE OVERDUE).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA - HUAFENG (JAN INVOICE OVERDUE).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA - HUAFENG (JAN INVOICE OVERDUE).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA - HUAFENG (JAN INVOICE OVERDUE).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA - HUAFENG (JAN INVOICE OVERDUE).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA - HUAFENG (JAN INVOICE OVERDUE).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA - HUAFENG (JAN INVOICE OVERDUE).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA - HUAFENG (JAN INVOICE OVERDUE).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA - HUAFENG (JAN INVOICE OVERDUE).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA - HUAFENG (JAN INVOICE OVERDUE).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA - HUAFENG (JAN INVOICE OVERDUE).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA - HUAFENG (JAN INVOICE OVERDUE).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA - HUAFENG (JAN INVOICE OVERDUE).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA - HUAFENG (JAN INVOICE OVERDUE).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA - HUAFENG (JAN INVOICE OVERDUE).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA - HUAFENG (JAN INVOICE OVERDUE).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA - HUAFENG (JAN INVOICE OVERDUE).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA - HUAFENG (JAN INVOICE OVERDUE).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA - HUAFENG (JAN INVOICE OVERDUE).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA - HUAFENG (JAN INVOICE OVERDUE).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA - HUAFENG (JAN INVOICE OVERDUE).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA - HUAFENG (JAN INVOICE OVERDUE).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA - HUAFENG (JAN INVOICE OVERDUE).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA - HUAFENG (JAN INVOICE OVERDUE).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA - HUAFENG (JAN INVOICE OVERDUE).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA - HUAFENG (JAN INVOICE OVERDUE).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA - HUAFENG (JAN INVOICE OVERDUE).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA - HUAFENG (JAN INVOICE OVERDUE).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA - HUAFENG (JAN INVOICE OVERDUE).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA - HUAFENG (JAN INVOICE OVERDUE).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA - HUAFENG (JAN INVOICE OVERDUE).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA - HUAFENG (JAN INVOICE OVERDUE).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ChannelData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ChannelData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ChannelData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ChannelData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ChannelData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ChannelData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ChannelData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ChannelData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ChannelData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ChannelData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ChannelData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ChannelData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ChannelData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ChannelData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ChannelData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ChannelData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ChannelData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ChannelData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ChannelData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ChannelData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ChannelData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ChannelData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ChannelData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ChannelData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ChannelData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ChannelData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ChannelData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ChannelData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ChannelData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ChannelData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ChannelData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ChannelData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ChannelData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ChannelData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ChannelData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ChannelData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ChannelData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ChannelData.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: Yara matchFile source: Process Memory Space: SOA - HUAFENG (JAN INVOICE OVERDUE).exe PID: 692, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: ChannelData.exe PID: 7892, type: MEMORYSTR
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: SOA - HUAFENG (JAN INVOICE OVERDUE).exe, 00000000.00000002.1280301174.0000000002EE7000.00000004.00000800.00020000.00000000.sdmp, ChannelData.exe, 0000000A.00000002.1525149829.0000000002D57000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                    Source: C:\Users\user\Desktop\SOA - HUAFENG (JAN INVOICE OVERDUE).exeMemory allocated: 1630000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\SOA - HUAFENG (JAN INVOICE OVERDUE).exeMemory allocated: 2E70000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\SOA - HUAFENG (JAN INVOICE OVERDUE).exeMemory allocated: 4E70000 memory reserve | memory write watchJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMemory allocated: 22D0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMemory allocated: 24B0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMemory allocated: 22D0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ChannelData.exeMemory allocated: 1100000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ChannelData.exeMemory allocated: 2CE0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ChannelData.exeMemory allocated: 4CE0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMemory allocated: 2B70000 memory reserve | memory write watchJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMemory allocated: 2D50000 memory reserve | memory write watchJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMemory allocated: 2B70000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\SOA - HUAFENG (JAN INVOICE OVERDUE).exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\ChannelData.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWindow / User API: threadDelayed 2246Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWindow / User API: threadDelayed 7591Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWindow / User API: threadDelayed 8448Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWindow / User API: threadDelayed 1399Jump to behavior
                    Source: C:\Users\user\Desktop\SOA - HUAFENG (JAN INVOICE OVERDUE).exe TID: 3580Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SOA - HUAFENG (JAN INVOICE OVERDUE).exe TID: 1340Thread sleep count: 46 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\SOA - HUAFENG (JAN INVOICE OVERDUE).exe TID: 1340Thread sleep count: 154 > 30Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7652Thread sleep count: 42 > 30Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7652Thread sleep time: -38738162554790034s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7652Thread sleep time: -100000s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7656Thread sleep count: 2246 > 30Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7652Thread sleep time: -99873s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7656Thread sleep count: 7591 > 30Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7652Thread sleep time: -99757s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7652Thread sleep time: -99654s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7652Thread sleep time: -99536s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7652Thread sleep time: -99354s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7652Thread sleep time: -99236s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7652Thread sleep time: -99115s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7652Thread sleep time: -99000s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7652Thread sleep time: -98891s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7652Thread sleep time: -98781s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7652Thread sleep time: -98660s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7652Thread sleep time: -98544s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7652Thread sleep time: -98438s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7652Thread sleep time: -98313s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7652Thread sleep time: -98203s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7652Thread sleep time: -98094s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7652Thread sleep time: -97969s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7652Thread sleep time: -97859s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7652Thread sleep time: -97750s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7652Thread sleep time: -97641s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7652Thread sleep time: -97531s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7652Thread sleep time: -97422s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7652Thread sleep time: -97313s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7652Thread sleep time: -97188s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7652Thread sleep time: -97078s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7652Thread sleep time: -96968s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7652Thread sleep time: -96857s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7652Thread sleep time: -96750s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7652Thread sleep time: -96640s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7652Thread sleep time: -96463s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7652Thread sleep time: -96297s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7652Thread sleep time: -96172s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7652Thread sleep time: -96062s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7652Thread sleep time: -95953s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7652Thread sleep time: -95844s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7652Thread sleep time: -95704s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7652Thread sleep time: -95578s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7652Thread sleep time: -95469s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7652Thread sleep time: -95359s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7652Thread sleep time: -95250s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7652Thread sleep time: -95141s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7652Thread sleep time: -95031s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7652Thread sleep time: -94922s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7652Thread sleep time: -94813s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7652Thread sleep time: -94688s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7652Thread sleep time: -94578s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7652Thread sleep time: -94469s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7652Thread sleep time: -94313s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7652Thread sleep time: -94187s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 7652Thread sleep time: -94078s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ChannelData.exe TID: 7928Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ChannelData.exe TID: 7936Thread sleep count: 172 > 30Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 8092Thread sleep time: -23980767295822402s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 8092Thread sleep time: -100000s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 8092Thread sleep time: -99875s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 8096Thread sleep count: 8448 > 30Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 8096Thread sleep count: 1399 > 30Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 8092Thread sleep time: -99766s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 8092Thread sleep time: -99656s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 8092Thread sleep time: -99547s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 8092Thread sleep time: -99438s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 8092Thread sleep time: -99313s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 8092Thread sleep time: -99188s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 8092Thread sleep time: -99078s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 8092Thread sleep time: -98969s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 8092Thread sleep time: -98844s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 8092Thread sleep time: -98734s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 8092Thread sleep time: -98625s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 8092Thread sleep time: -98516s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 8092Thread sleep time: -98406s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 8092Thread sleep time: -98297s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 8092Thread sleep time: -98188s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 8092Thread sleep time: -98064s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 8092Thread sleep time: -97938s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 8092Thread sleep time: -97828s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 8092Thread sleep time: -97719s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 8092Thread sleep time: -97609s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 8092Thread sleep time: -97500s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 8092Thread sleep time: -97391s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 8092Thread sleep time: -97281s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 8092Thread sleep time: -97172s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 8092Thread sleep time: -97063s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 8092Thread sleep time: -96938s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 8092Thread sleep time: -96813s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 8092Thread sleep time: -96688s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 8092Thread sleep time: -96578s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 8092Thread sleep time: -96469s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 8092Thread sleep time: -96344s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 8092Thread sleep time: -96234s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 8092Thread sleep time: -96125s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 8092Thread sleep time: -96016s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 8092Thread sleep time: -95906s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 8092Thread sleep time: -95797s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 8092Thread sleep time: -95688s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 8092Thread sleep time: -95563s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 8092Thread sleep time: -95453s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 8092Thread sleep time: -95344s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 8092Thread sleep time: -95219s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 8092Thread sleep time: -95110s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 8092Thread sleep time: -94985s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 8092Thread sleep time: -94860s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 8092Thread sleep time: -94735s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 8092Thread sleep time: -94610s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 8092Thread sleep time: -94485s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 8092Thread sleep time: -94360s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\SOA - HUAFENG (JAN INVOICE OVERDUE).exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 100000Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 99873Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 99757Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 99654Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 99536Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 99354Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 99236Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 99115Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 99000Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 98891Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 98781Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 98660Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 98544Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 98438Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 98313Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 98203Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 98094Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 97969Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 97859Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 97750Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 97641Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 97531Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 97422Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 97313Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 97188Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 97078Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 96968Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 96857Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 96750Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 96640Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 96463Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 96297Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 96172Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 96062Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 95953Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 95844Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 95704Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 95578Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 95469Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 95359Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 95250Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 95141Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 95031Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 94922Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 94813Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 94688Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 94578Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 94469Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 94313Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 94187Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 94078Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\ChannelData.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 100000Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 99875Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 99766Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 99656Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 99547Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 99438Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 99313Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 99188Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 99078Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 98969Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 98844Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 98734Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 98625Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 98516Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 98406Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 98297Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 98188Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 98064Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 97938Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 97828Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 97719Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 97609Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 97500Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 97391Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 97281Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 97172Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 97063Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 96938Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 96813Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 96688Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 96578Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 96469Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 96344Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 96234Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 96125Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 96016Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 95906Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 95797Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 95688Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 95563Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 95453Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 95344Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 95219Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 95110Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 94985Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 94860Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 94735Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 94610Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 94485Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 94360Jump to behavior
                    Source: InstallUtil.exe, 0000000B.00000002.2438010645.0000000006168000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll{
                    Source: ChannelData.exe, 0000000A.00000002.1525149829.0000000002D57000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware|VIRTUAL|A M I|Xen
                    Source: InstallUtil.exe, 00000007.00000002.1535545105.0000000004E44000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll&
                    Source: ChannelData.exe, 0000000A.00000002.1525149829.0000000002D57000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Microsoft|VMWare|Virtual
                    Source: C:\Users\user\Desktop\SOA - HUAFENG (JAN INVOICE OVERDUE).exeProcess information queried: ProcessInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA - HUAFENG (JAN INVOICE OVERDUE).exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\SOA - HUAFENG (JAN INVOICE OVERDUE).exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\SOA - HUAFENG (JAN INVOICE OVERDUE).exeMemory allocated: page read and write | page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Users\user\Desktop\SOA - HUAFENG (JAN INVOICE OVERDUE).exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 540000 value starts with: 4D5AJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ChannelData.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: C:\Users\user\Desktop\SOA - HUAFENG (JAN INVOICE OVERDUE).exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 540000Jump to behavior
                    Source: C:\Users\user\Desktop\SOA - HUAFENG (JAN INVOICE OVERDUE).exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 542000Jump to behavior
                    Source: C:\Users\user\Desktop\SOA - HUAFENG (JAN INVOICE OVERDUE).exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 57C000Jump to behavior
                    Source: C:\Users\user\Desktop\SOA - HUAFENG (JAN INVOICE OVERDUE).exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 57E000Jump to behavior
                    Source: C:\Users\user\Desktop\SOA - HUAFENG (JAN INVOICE OVERDUE).exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 3CA008Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\ChannelData.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 400000Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\ChannelData.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 402000Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\ChannelData.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 43C000Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\ChannelData.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 43E000Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\ChannelData.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: CBE008Jump to behavior
                    Source: C:\Users\user\Desktop\SOA - HUAFENG (JAN INVOICE OVERDUE).exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"Jump to behavior
                    Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Roaming\ChannelData.exe "C:\Users\user\AppData\Roaming\ChannelData.exe" Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\ChannelData.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\SOA - HUAFENG (JAN INVOICE OVERDUE).exeQueries volume information: C:\Users\user\Desktop\SOA - HUAFENG (JAN INVOICE OVERDUE).exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA - HUAFENG (JAN INVOICE OVERDUE).exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA - HUAFENG (JAN INVOICE OVERDUE).exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ChannelData.exeQueries volume information: C:\Users\user\AppData\Roaming\ChannelData.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ChannelData.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ChannelData.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA - HUAFENG (JAN INVOICE OVERDUE).exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 0.2.SOA - HUAFENG (JAN INVOICE OVERDUE).exe.3e75570.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 7.2.InstallUtil.exe.540000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 10.2.ChannelData.exe.3f91f30.6.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 10.2.ChannelData.exe.3f91f30.6.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SOA - HUAFENG (JAN INVOICE OVERDUE).exe.3e75570.4.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000007.00000002.1526317646.000000000252C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000A.00000002.1545536995.0000000003F7D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000002.1526317646.0000000002501000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000002.1522791312.0000000000542000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000A.00000002.1545536995.0000000003DF2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1289728685.0000000003E71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000B.00000002.2429982790.0000000002DCC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000B.00000002.2429982790.0000000002DA1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1289728685.0000000003EF0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: SOA - HUAFENG (JAN INVOICE OVERDUE).exe PID: 692, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 7492, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: ChannelData.exe PID: 7892, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 7988, type: MEMORYSTR
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                    Source: Yara matchFile source: 0.2.SOA - HUAFENG (JAN INVOICE OVERDUE).exe.3e75570.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 7.2.InstallUtil.exe.540000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 10.2.ChannelData.exe.3f91f30.6.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 10.2.ChannelData.exe.3f91f30.6.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SOA - HUAFENG (JAN INVOICE OVERDUE).exe.3e75570.4.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0000000A.00000002.1545536995.0000000003F7D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000002.1526317646.0000000002501000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000002.1522791312.0000000000542000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000A.00000002.1545536995.0000000003DF2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1289728685.0000000003E71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000B.00000002.2429982790.0000000002DA1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1289728685.0000000003EF0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: SOA - HUAFENG (JAN INVOICE OVERDUE).exe PID: 692, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 7492, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: ChannelData.exe PID: 7892, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 7988, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 0.2.SOA - HUAFENG (JAN INVOICE OVERDUE).exe.3e75570.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 7.2.InstallUtil.exe.540000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 10.2.ChannelData.exe.3f91f30.6.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 10.2.ChannelData.exe.3f91f30.6.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SOA - HUAFENG (JAN INVOICE OVERDUE).exe.3e75570.4.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000007.00000002.1526317646.000000000252C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000A.00000002.1545536995.0000000003F7D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000002.1526317646.0000000002501000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000002.1522791312.0000000000542000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000A.00000002.1545536995.0000000003DF2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1289728685.0000000003E71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000B.00000002.2429982790.0000000002DCC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000B.00000002.2429982790.0000000002DA1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1289728685.0000000003EF0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: SOA - HUAFENG (JAN INVOICE OVERDUE).exe PID: 692, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 7492, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: ChannelData.exe PID: 7892, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 7988, type: MEMORYSTR
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity Information111
                    Scripting
                    Valid Accounts121
                    Windows Management Instrumentation
                    111
                    Scripting
                    1
                    DLL Side-Loading
                    1
                    Disable or Modify Tools
                    2
                    OS Credential Dumping
                    1
                    File and Directory Discovery
                    Remote Services11
                    Archive Collected Data
                    1
                    Ingress Tool Transfer
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault Accounts1
                    Scheduled Task/Job
                    1
                    DLL Side-Loading
                    211
                    Process Injection
                    1
                    Deobfuscate/Decode Files or Information
                    1
                    Credentials in Registry
                    24
                    System Information Discovery
                    Remote Desktop Protocol2
                    Data from Local System
                    11
                    Encrypted Channel
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAt1
                    Scheduled Task/Job
                    1
                    Scheduled Task/Job
                    3
                    Obfuscated Files or Information
                    Security Account Manager311
                    Security Software Discovery
                    SMB/Windows Admin Shares1
                    Email Collection
                    2
                    Non-Application Layer Protocol
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCron2
                    Registry Run Keys / Startup Folder
                    2
                    Registry Run Keys / Startup Folder
                    12
                    Software Packing
                    NTDS1
                    Process Discovery
                    Distributed Component Object ModelInput Capture23
                    Application Layer Protocol
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                    DLL Side-Loading
                    LSA Secrets141
                    Virtualization/Sandbox Evasion
                    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                    Masquerading
                    Cached Domain Credentials1
                    Application Window Discovery
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items141
                    Virtualization/Sandbox Evasion
                    DCSync1
                    System Network Configuration Discovery
                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job211
                    Process Injection
                    Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet
                    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1640818 Sample: SOA - HUAFENG (JAN INVOICE ... Startdate: 17/03/2025 Architecture: WINDOWS Score: 100 29 mail.iaa-airferight.com 2->29 31 api.ipify.org 2->31 37 Found malware configuration 2->37 39 Malicious sample detected (through community Yara rule) 2->39 41 Multi AV Scanner detection for submitted file 2->41 43 9 other signatures 2->43 8 SOA - HUAFENG (JAN INVOICE OVERDUE).exe 5 2->8         started        12 wscript.exe 1 2->12         started        signatures3 process4 file5 23 C:\Users\user\AppData\...\ChannelData.exe, PE32 8->23 dropped 25 C:\Users\user\AppData\...\ChannelData.vbs, ASCII 8->25 dropped 27 C:\Users\...\ChannelData.exe:Zone.Identifier, ASCII 8->27 dropped 53 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 8->53 55 Writes to foreign memory regions 8->55 57 Injects a PE file into a foreign processes 8->57 14 InstallUtil.exe 15 2 8->14         started        59 Windows Scripting host queries suspicious COM object (likely to drop second stage) 12->59 18 ChannelData.exe 2 12->18         started        signatures6 process7 dnsIp8 33 api.ipify.org 172.67.74.152, 443, 49716, 49723 CLOUDFLARENETUS United States 14->33 35 mail.iaa-airferight.com 46.175.148.58, 25 ASLAGIDKOM-NETUA Ukraine 14->35 61 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 14->61 63 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 14->63 65 Tries to steal Mail credentials (via file / registry access) 14->65 67 Multi AV Scanner detection for dropped file 18->67 69 Writes to foreign memory regions 18->69 71 Injects a PE file into a foreign processes 18->71 20 InstallUtil.exe 2 18->20         started        signatures9 process10 signatures11 45 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 20->45 47 Tries to steal Mail credentials (via file / registry access) 20->47 49 Tries to harvest and steal ftp login credentials 20->49 51 Tries to harvest and steal browser information (history, passwords, etc) 20->51

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    SOA - HUAFENG (JAN INVOICE OVERDUE).exe41%VirustotalBrowse
                    SOA - HUAFENG (JAN INVOICE OVERDUE).exe67%ReversingLabsWin32.Packed.Generic
                    SourceDetectionScannerLabelLink
                    C:\Users\user\AppData\Roaming\ChannelData.exe67%ReversingLabsWin32.Trojan.Generic
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    http://crl.me0%Avira URL Cloudsafe
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    mail.iaa-airferight.com
                    46.175.148.58
                    truefalse
                      high
                      api.ipify.org
                      172.67.74.152
                      truefalse
                        high
                        NameMaliciousAntivirus DetectionReputation
                        https://api.ipify.org/false
                          high
                          NameSourceMaliciousAntivirus DetectionReputation
                          https://api.ipify.orgSOA - HUAFENG (JAN INVOICE OVERDUE).exe, 00000000.00000002.1289728685.0000000003E71000.00000004.00000800.00020000.00000000.sdmp, SOA - HUAFENG (JAN INVOICE OVERDUE).exe, 00000000.00000002.1289728685.0000000003EF0000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000007.00000002.1522791312.0000000000542000.00000040.00000400.00020000.00000000.sdmp, InstallUtil.exe, 00000007.00000002.1526317646.00000000024B1000.00000004.00000800.00020000.00000000.sdmp, ChannelData.exe, 0000000A.00000002.1545536995.0000000003F7D000.00000004.00000800.00020000.00000000.sdmp, ChannelData.exe, 0000000A.00000002.1545536995.0000000003DF2000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000B.00000002.2429982790.0000000002D5C000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            https://github.com/mgravell/protobuf-netiSOA - HUAFENG (JAN INVOICE OVERDUE).exe, 00000000.00000002.1296916544.0000000005FF0000.00000004.08000000.00040000.00000000.sdmp, ChannelData.exe, 0000000A.00000002.1545536995.0000000003CE1000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              https://stackoverflow.com/q/14436606/23354SOA - HUAFENG (JAN INVOICE OVERDUE).exe, 00000000.00000002.1296916544.0000000005FF0000.00000004.08000000.00040000.00000000.sdmp, SOA - HUAFENG (JAN INVOICE OVERDUE).exe, 00000000.00000002.1280301174.0000000002EE7000.00000004.00000800.00020000.00000000.sdmp, ChannelData.exe, 0000000A.00000002.1525149829.0000000002D57000.00000004.00000800.00020000.00000000.sdmp, ChannelData.exe, 0000000A.00000002.1545536995.0000000003CE1000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                https://account.dyn.com/SOA - HUAFENG (JAN INVOICE OVERDUE).exe, 00000000.00000002.1289728685.0000000003E71000.00000004.00000800.00020000.00000000.sdmp, SOA - HUAFENG (JAN INVOICE OVERDUE).exe, 00000000.00000002.1289728685.0000000003EF0000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000007.00000002.1522791312.0000000000542000.00000040.00000400.00020000.00000000.sdmp, ChannelData.exe, 0000000A.00000002.1545536995.0000000003F7D000.00000004.00000800.00020000.00000000.sdmp, ChannelData.exe, 0000000A.00000002.1545536995.0000000003DF2000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://github.com/mgravell/protobuf-netJSOA - HUAFENG (JAN INVOICE OVERDUE).exe, 00000000.00000002.1296916544.0000000005FF0000.00000004.08000000.00040000.00000000.sdmp, SOA - HUAFENG (JAN INVOICE OVERDUE).exe, 00000000.00000002.1289728685.0000000003EF0000.00000004.00000800.00020000.00000000.sdmp, ChannelData.exe, 0000000A.00000002.1545536995.0000000003DF2000.00000004.00000800.00020000.00000000.sdmp, ChannelData.exe, 0000000A.00000002.1545536995.0000000003CE1000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://crl.microsoftInstallUtil.exe, 00000007.00000002.1535545105.0000000004E44000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      https://stackoverflow.com/q/11564914/23354;SOA - HUAFENG (JAN INVOICE OVERDUE).exe, 00000000.00000002.1296916544.0000000005FF0000.00000004.08000000.00040000.00000000.sdmp, ChannelData.exe, 0000000A.00000002.1545536995.0000000003CE1000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        https://stackoverflow.com/q/2152978/23354SOA - HUAFENG (JAN INVOICE OVERDUE).exe, 00000000.00000002.1296916544.0000000005FF0000.00000004.08000000.00040000.00000000.sdmp, ChannelData.exe, 0000000A.00000002.1545536995.0000000003CE1000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://mail.iaa-airferight.comInstallUtil.exe, 00000007.00000002.1526317646.000000000252C000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000B.00000002.2429982790.0000000002DCC000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            https://github.com/mgravell/protobuf-netSOA - HUAFENG (JAN INVOICE OVERDUE).exe, 00000000.00000002.1296916544.0000000005FF0000.00000004.08000000.00040000.00000000.sdmp, ChannelData.exe, 0000000A.00000002.1545536995.0000000003CE1000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              https://api.ipify.org/tInstallUtil.exe, 00000007.00000002.1526317646.00000000024B1000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000B.00000002.2429982790.0000000002D5C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameSOA - HUAFENG (JAN INVOICE OVERDUE).exe, 00000000.00000002.1280301174.0000000002EE7000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000007.00000002.1526317646.00000000024B1000.00000004.00000800.00020000.00000000.sdmp, ChannelData.exe, 0000000A.00000002.1525149829.0000000002D57000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000B.00000002.2429982790.0000000002D5C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  http://crl.meInstallUtil.exe, 00000007.00000002.1535545105.0000000004E44000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  • No. of IPs < 25%
                                                  • 25% < No. of IPs < 50%
                                                  • 50% < No. of IPs < 75%
                                                  • 75% < No. of IPs
                                                  IPDomainCountryFlagASNASN NameMalicious
                                                  46.175.148.58
                                                  mail.iaa-airferight.comUkraine
                                                  56394ASLAGIDKOM-NETUAfalse
                                                  172.67.74.152
                                                  api.ipify.orgUnited States
                                                  13335CLOUDFLARENETUSfalse
                                                  Joe Sandbox version:42.0.0 Malachite
                                                  Analysis ID:1640818
                                                  Start date and time:2025-03-17 18:57:12 +01:00
                                                  Joe Sandbox product:CloudBasic
                                                  Overall analysis duration:0h 7m 12s
                                                  Hypervisor based Inspection enabled:false
                                                  Report type:full
                                                  Cookbook file name:default.jbs
                                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                  Number of analysed new started processes analysed:14
                                                  Number of new started drivers analysed:0
                                                  Number of existing processes analysed:0
                                                  Number of existing drivers analysed:0
                                                  Number of injected processes analysed:0
                                                  Technologies:
                                                  • HCA enabled
                                                  • EGA enabled
                                                  • AMSI enabled
                                                  Analysis Mode:default
                                                  Analysis stop reason:Timeout
                                                  Sample name:SOA - HUAFENG (JAN INVOICE OVERDUE).exe
                                                  Detection:MAL
                                                  Classification:mal100.troj.spyw.expl.evad.winEXE@8/3@2/2
                                                  EGA Information:
                                                  • Successful, ratio: 75%
                                                  HCA Information:
                                                  • Successful, ratio: 93%
                                                  • Number of executed functions: 247
                                                  • Number of non-executed functions: 22
                                                  Cookbook Comments:
                                                  • Found application associated with file extension: .exe
                                                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                                                  • Excluded IPs from analysis (whitelisted): 23.199.214.10, 52.149.20.212, 20.12.23.50
                                                  • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, c.pki.goog, fe3cr.delivery.mp.microsoft.com
                                                  • Execution Graph export aborted for target SOA - HUAFENG (JAN INVOICE OVERDUE).exe, PID 692 because it is empty
                                                  • Not all processes where analyzed, report is missing behavior information
                                                  • Report size exceeded maximum capacity and may have missing behavior information.
                                                  • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                  • Report size getting too big, too many NtOpenKeyEx calls found.
                                                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                  • Report size getting too big, too many NtQueryValueKey calls found.
                                                  TimeTypeDescription
                                                  13:58:22API Interceptor352x Sleep call for process: InstallUtil.exe modified
                                                  17:58:23AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ChannelData.vbs
                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                  46.175.148.58New requirement Orders.exeGet hashmaliciousAgentTeslaBrowse
                                                    SecuriteInfo.com.Win32.PWSX-gen.11592.10317.exeGet hashmaliciousAgentTeslaBrowse
                                                      SecuriteInfo.com.Win32.PWSX-gen.22728.13847.exeGet hashmaliciousAgentTeslaBrowse
                                                        SOA - HUAFENG (JAN INVOICE OVERDUE).exeGet hashmaliciousAgentTeslaBrowse
                                                          payment confirmation.exeGet hashmaliciousAgentTeslaBrowse
                                                            purchase order T&B19-20PO128.exeGet hashmaliciousAgentTeslaBrowse
                                                              SecuriteInfo.com.Win32.CrypterX-gen.25378.7586.exeGet hashmaliciousAgentTeslaBrowse
                                                                T&S-WAN FUNG GMT FTY LTD (CW0007)-Statement as at 28 Feb 2025.exeGet hashmaliciousAgentTeslaBrowse
                                                                  Global e-Banking Payment Advice 000000164.exeGet hashmaliciousAgentTeslaBrowse
                                                                    Wire Remittance Detail.exeGet hashmaliciousAgentTeslaBrowse
                                                                      172.67.74.152ue8Q3DCbNG.exeGet hashmaliciousUnknownBrowse
                                                                      • api.ipify.org/
                                                                      eR2hECroRD.exeGet hashmaliciousUnknownBrowse
                                                                      • api.ipify.org/
                                                                      eR2hECroRD.exeGet hashmaliciousUnknownBrowse
                                                                      • api.ipify.org/
                                                                      Service.exeGet hashmaliciousUnknownBrowse
                                                                      • api.ipify.org/
                                                                      NightFixed 1.0.exeGet hashmaliciousUnknownBrowse
                                                                      • api.ipify.org/
                                                                      VibeCall.exeGet hashmaliciousRHADAMANTHYSBrowse
                                                                      • api.ipify.org/
                                                                      VibeCall.exeGet hashmaliciousRHADAMANTHYSBrowse
                                                                      • api.ipify.org/
                                                                      VibeCall.exeGet hashmaliciousRHADAMANTHYSBrowse
                                                                      • api.ipify.org/
                                                                      Editing.exeGet hashmaliciousUnknownBrowse
                                                                      • api.ipify.org/
                                                                      Terms_of_reference_06_01_2025_samsung.scr.exeGet hashmaliciousUnknownBrowse
                                                                      • api.ipify.org/
                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                      mail.iaa-airferight.comNew requirement Orders.exeGet hashmaliciousAgentTeslaBrowse
                                                                      • 46.175.148.58
                                                                      SecuriteInfo.com.Win32.PWSX-gen.11592.10317.exeGet hashmaliciousAgentTeslaBrowse
                                                                      • 46.175.148.58
                                                                      SecuriteInfo.com.Win32.PWSX-gen.22728.13847.exeGet hashmaliciousAgentTeslaBrowse
                                                                      • 46.175.148.58
                                                                      SOA - HUAFENG (JAN INVOICE OVERDUE).exeGet hashmaliciousAgentTeslaBrowse
                                                                      • 46.175.148.58
                                                                      payment confirmation.exeGet hashmaliciousAgentTeslaBrowse
                                                                      • 46.175.148.58
                                                                      purchase order T&B19-20PO128.exeGet hashmaliciousAgentTeslaBrowse
                                                                      • 46.175.148.58
                                                                      SecuriteInfo.com.Win32.CrypterX-gen.25378.7586.exeGet hashmaliciousAgentTeslaBrowse
                                                                      • 46.175.148.58
                                                                      T&S-WAN FUNG GMT FTY LTD (CW0007)-Statement as at 28 Feb 2025.exeGet hashmaliciousAgentTeslaBrowse
                                                                      • 46.175.148.58
                                                                      Global e-Banking Payment Advice 000000164.exeGet hashmaliciousAgentTeslaBrowse
                                                                      • 46.175.148.58
                                                                      Wire Remittance Detail.exeGet hashmaliciousAgentTeslaBrowse
                                                                      • 46.175.148.58
                                                                      api.ipify.orgNew requirement Orders.exeGet hashmaliciousAgentTeslaBrowse
                                                                      • 104.26.12.205
                                                                      ue8Q3DCbNG.exeGet hashmaliciousUnknownBrowse
                                                                      • 172.67.74.152
                                                                      eR2hECroRD.exeGet hashmaliciousUnknownBrowse
                                                                      • 172.67.74.152
                                                                      K9PwdfoVnG.exeGet hashmaliciousAgentTeslaBrowse
                                                                      • 104.26.13.205
                                                                      ue8Q3DCbNG.exeGet hashmaliciousUnknownBrowse
                                                                      • 104.26.12.205
                                                                      eR2hECroRD.exeGet hashmaliciousUnknownBrowse
                                                                      • 172.67.74.152
                                                                      nn1jUU3YSs.msiGet hashmaliciousUnknownBrowse
                                                                      • 104.26.13.205
                                                                      sample.zip.zipGet hashmaliciousGlobeimposterBrowse
                                                                      • 172.67.74.152
                                                                      Acodihicozaja.exeGet hashmaliciousAgentTeslaBrowse
                                                                      • 104.26.13.205
                                                                      24sBT3Cffz.exeGet hashmaliciousAgentTeslaBrowse
                                                                      • 104.26.13.205
                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                      ASLAGIDKOM-NETUANew requirement Orders.exeGet hashmaliciousAgentTeslaBrowse
                                                                      • 46.175.148.58
                                                                      SecuriteInfo.com.Win32.PWSX-gen.11592.10317.exeGet hashmaliciousAgentTeslaBrowse
                                                                      • 46.175.148.58
                                                                      SecuriteInfo.com.Win32.PWSX-gen.22728.13847.exeGet hashmaliciousAgentTeslaBrowse
                                                                      • 46.175.148.58
                                                                      SOA - HUAFENG (JAN INVOICE OVERDUE).exeGet hashmaliciousAgentTeslaBrowse
                                                                      • 46.175.148.58
                                                                      payment confirmation.exeGet hashmaliciousAgentTeslaBrowse
                                                                      • 46.175.148.58
                                                                      purchase order T&B19-20PO128.exeGet hashmaliciousAgentTeslaBrowse
                                                                      • 46.175.148.58
                                                                      SecuriteInfo.com.Win32.CrypterX-gen.25378.7586.exeGet hashmaliciousAgentTeslaBrowse
                                                                      • 46.175.148.58
                                                                      T&S-WAN FUNG GMT FTY LTD (CW0007)-Statement as at 28 Feb 2025.exeGet hashmaliciousAgentTeslaBrowse
                                                                      • 46.175.148.58
                                                                      Global e-Banking Payment Advice 000000164.exeGet hashmaliciousAgentTeslaBrowse
                                                                      • 46.175.148.58
                                                                      Wire Remittance Detail.exeGet hashmaliciousAgentTeslaBrowse
                                                                      • 46.175.148.58
                                                                      CLOUDFLARENETUS1099-NEC.pdfGet hashmaliciousRHADAMANTHYSBrowse
                                                                      • 104.17.25.14
                                                                      http://email.shop2.wonderpark.my/c/eJwUyk1uhSAQAODTwJIM8wPzFiy68R4KYzX1iRHTprdvuv9aiRbTDN5KzIyIokp-K7YirKlWzVWAeRFKVVflF5OpSvJ7QUABijkKKVBgihmqGWBeYGnsGMbWLww__Wx2X_P9Fd6__ijb81zD0YfDyeFk80tZKK9iUJtASjaTNA2LnWO_eqj97XDyd7EWtv45n6OfjqHeNp5jP23rjx3jn_nvgn8BAAD__y9yPWoGet hashmaliciousHTMLPhisher, Invisible JS, Tycoon2FABrowse
                                                                      • 172.67.214.184
                                                                      2450856955_.svgGet hashmaliciousHTMLPhisher, Invisible JS, Tycoon2FABrowse
                                                                      • 104.17.25.14
                                                                      1099-NEC.pdfGet hashmaliciousUnknownBrowse
                                                                      • 172.64.41.3
                                                                      REQUIRED-ORDER-REFERENCE-WITH-COMPANY-DETAILS.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                      • 104.21.48.1
                                                                      https://www.languagesim.com/interpretationterms/Get hashmaliciousUnknownBrowse
                                                                      • 104.16.117.116
                                                                      https://u17065553.ct.sendgrid.net/ls/click?upn=u001.Rw-2FXpvWBRDxNoiEvv-2B0VhGNZUddqwhjRz7Y3aH-2F1iEXujVcSjMM7CY7q30axNIjPtSPwVANtpwkARse71YbTG6hv5YyKcZ3EG9czO3tuqWXIHvFV-2FdtzTRYY9DFBEvbC0MnWDkjPffSjdhbZvMXBG-2Fbl-2F1JQalpy10ZBTpuDmJw8qtDG1RR-2FO-2Bzqy6Ryg-2BIXW6P-2FRmEE7JdIRaCncCouVLTVsWciZPEjkoHD7BDf7qzUctKE-2Fuov9RtCNiCQmJmwXCDa5dDgefQoLRKRDmR4vQ-3D-3DKnfO_4-2BCeSnTfNElQaOz0iIYXcY63TczA