Loading ...

Play interactive tourEdit tour

Analysis Report PAYMENT.exe

Overview

General Information

Sample Name:PAYMENT.exe
Analysis ID:286315
MD5:ef6b7128c7786f40111e700d38f10b8f
SHA1:14738e7b2c7cc9a6a2ec3c7a850807623225df32
SHA256:24d8632d58bfa7019f691346f9715cef64dc11887fc5140054ecf5b422f1f68d
Tags:exe

Most interesting Screenshot:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
.NET source code contains very large array initializations
Contains functionality to detect sleep reduction / modifications
Initial sample is a PE file and has a suspicious name
Machine Learning detection for sample
Maps a DLL or memory area into another process
May check the online IP address of the machine
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file access)
Antivirus or Machine Learning detection for unpacked file
Checks if the current process is being debugged
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to create guard pages, often used to hinder reverse engineering and debugging
Contains functionality to detect sandboxes (mouse cursor move detection)
Contains functionality to dynamically determine API calls
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to retrieve information about pressed keystrokes
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check if the current machine is a sandbox (GetTickCount - Sleep)
May sleep (evasive loops) to hinder dynamic analysis
PE file contains strange resources
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses SMTP (mail sending)
Uses code obfuscation techniques (call, push, ret)
Uses the system / local time for branch decision (may execute only at specific dates)
Yara detected Credential Stealer

Classification

Startup

  • System is w10x64
  • PAYMENT.exe (PID: 6744 cmdline: 'C:\Users\user\Desktop\PAYMENT.exe' MD5: EF6B7128C7786F40111E700D38F10B8F)
    • PAYMENT.exe (PID: 6776 cmdline: 'C:\Users\user\Desktop\PAYMENT.exe' MD5: EF6B7128C7786F40111E700D38F10B8F)
  • cleanup

Malware Configuration

Threatname: Agenttesla

{"Username: ": "92sGjybPR4Dlb", "URL: ": "https://1ljswNzt02OtWfDi.org", "To: ": "result.package@yandex.ru", "ByHost: ": "smtp.yandex.ru:587", "Password: ": "s7wZkX", "From: ": "result.package@yandex.ru"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000001.00000002.479640942.00000000009D2000.00000040.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000001.00000002.478763690.00000000005F0000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000001.00000002.478433620.000000000044B000.00000040.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000001.00000002.478194286.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          00000001.00000002.482271789.0000000002991000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 7 entries

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            1.2.PAYMENT.exe.9d0000.4.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              1.2.PAYMENT.exe.5f0000.2.raw.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                1.2.PAYMENT.exe.5f0000.2.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                  0.2.PAYMENT.exe.4270000.2.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                    1.2.PAYMENT.exe.960000.3.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                      Click to see the 2 entries

                      Sigma Overview

                      No Sigma rule has matched

                      Signature Overview

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection:

                      barindex
                      Found malware configurationShow sources
                      Source: PAYMENT.exe.6776.1.memstrMalware Configuration Extractor: Agenttesla {"Username: ": "92sGjybPR4Dlb", "URL: ": "https://1ljswNzt02OtWfDi.org", "To: ": "result.package@yandex.ru", "ByHost: ": "smtp.yandex.ru:587", "Password: ": "s7wZkX", "From: ": "result.package@yandex.ru"}
                      Multi AV Scanner detection for submitted fileShow sources
                      Source: PAYMENT.exeVirustotal: Detection: 35%Perma Link
                      Source: PAYMENT.exeMetadefender: Detection: 13%Perma Link
                      Source: PAYMENT.exeReversingLabs: Detection: 27%
                      Machine Learning detection for sampleShow sources
                      Source: PAYMENT.exeJoe Sandbox ML: detected
                      Source: 1.2.PAYMENT.exe.9d0000.4.unpackAvira: Label: TR/Spy.Gen8
                      Source: 0.2.PAYMENT.exe.4270000.2.unpackAvira: Label: TR/Patched.Ren.Gen
                      Source: C:\Users\user\Desktop\PAYMENT.exeCode function: 0_2_00405C14 GetModuleHandleA,GetProcAddress,lstrcpyn,lstrcpyn,lstrcpyn,FindFirstFileA,FindClose,lstrlen,lstrcpyn,lstrlen,lstrcpyn,0_2_00405C14

                      Networking:

                      barindex
                      May check the online IP address of the machineShow sources
                      Source: unknownDNS query: name: api.ipify.org
                      Source: unknownDNS query: name: api.ipify.org
                      Source: unknownDNS query: name: api.ipify.org
                      Source: global trafficTCP traffic: 192.168.2.4:49719 -> 77.88.21.158:587
                      Source: Joe Sandbox ViewIP Address: 77.88.21.158 77.88.21.158
                      Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
                      Source: global trafficTCP traffic: 192.168.2.4:49719 -> 77.88.21.158:587
                      Source: C:\Users\user\Desktop\PAYMENT.exeCode function: 1_2_0226A186 recv,1_2_0226A186
                      Source: unknownDNS traffic detected: queries for: smtp.yandex.ru
                      Source: PAYMENT.exe, 00000001.00000002.482271789.0000000002991000.00000004.00000001.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                      Source: PAYMENT.exe, 00000001.00000002.482271789.0000000002991000.00000004.00000001.sdmpString found in binary or memory: http://DynDns.comDynDNS
                      Source: PAYMENT.exe, 00000001.00000002.482667581.0000000002A1D000.00000004.00000001.sdmpString found in binary or memory: http://crl.certum.pl/ca.crl0h
                      Source: PAYMENT.exe, 00000001.00000002.479138142.00000000007EA000.00000004.00000020.sdmpString found in binary or memory: http://crl.certum.pl/ctnca.crl0k
                      Source: PAYMENT.exe, 00000001.00000002.486046048.0000000005830000.00000004.00000001.sdmpString found in binary or memory: http://crl.comodoca.com/COMODORSACertificationAuthority.crl0q
                      Source: PAYMENT.exe, 00000001.00000002.479138142.00000000007EA000.00000004.00000020.sdmpString found in binary or memory: http://crl.comodoca.com/COMODORSADomainValidationSecureServerCA.crl0
                      Source: PAYMENT.exe, 00000001.00000002.486046048.0000000005830000.00000004.00000001.sdmpString found in binary or memory: http://crls.yandex.net/certum/ycasha2
                      Source: PAYMENT.exe, 00000001.00000002.482667581.0000000002A1D000.00000004.00000001.sdmpString found in binary or memory: http://crls.yandex.net/certum/ycasha2.crl0-
                      Source: PAYMENT.exe, 00000001.00000002.479138142.00000000007EA000.00000004.00000020.sdmp, PAYMENT.exe, 00000001.00000002.486046048.0000000005830000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.comodoca.com0
                      Source: PAYMENT.exe, 00000001.00000002.482667581.0000000002A1D000.00000004.00000001.sdmpString found in binary or memory: http://repository.certum.pl/ca.cer09
                      Source: PAYMENT.exe, 00000001.00000002.479138142.00000000007EA000.00000004.00000020.sdmpString found in binary or memory: http://repository.certum.pl/ctnca.cer09
                      Source: PAYMENT.exe, 00000001.00000002.486046048.0000000005830000.00000004.00000001.sdmpString found in binary or memory: http://repository.certum.pl/ycash
                      Source: PAYMENT.exe, 00000001.00000002.482667581.0000000002A1D000.00000004.00000001.sdmpString found in binary or memory: http://repository.certum.pl/ycasha2.cer0
                      Source: PAYMENT.exe, 00000001.00000002.482667581.0000000002A1D000.00000004.00000001.sdmpString found in binary or memory: http://subca.ocsp-certum.com0.
                      Source: PAYMENT.exe, 00000001.00000002.479138142.00000000007EA000.00000004.00000020.sdmpString found in binary or memory: http://subca.ocsp-certum.com01
                      Source: PAYMENT.exe, 00000001.00000002.479138142.00000000007EA000.00000004.00000020.sdmpString found in binary or memory: http://www.certum.pl/CPS0
                      Source: PAYMENT.exe, 00000001.00000002.482667581.0000000002A1D000.00000004.00000001.sdmpString found in binary or memory: http://yandex.crl.certum.pl/ycasha2.crl0q
                      Source: PAYMENT.exe, 00000001.00000002.482667581.0000000002A1D000.00000004.00000001.sdmpString found in binary or memory: http://yandex.ocsp-responder.com03
                      Source: PAYMENT.exe, 00000001.00000002.482271789.0000000002991000.00000004.00000001.sdmpString found in binary or memory: http://zgvYcz.com
                      Source: PAYMENT.exe, 00000001.00000002.482271789.0000000002991000.00000004.00000001.sdmp, PAYMENT.exe, 00000001.00000002.482894129.0000000002A66000.00000004.00000001.sdmpString found in binary or memory: https://1ljswNzt02OtWfDi.org
                      Source: PAYMENT.exe, 00000001.00000002.478897534.0000000000645000.00000004.00000020.sdmpString found in binary or memory: https://1ljswNzt02OtWfDi.org413111d3B88A00104B2A6676
                      Source: PAYMENT.exe, 00000001.00000002.482894129.0000000002A66000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.org
                      Source: PAYMENT.exe, 00000001.00000002.482894129.0000000002A66000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.org/
                      Source: PAYMENT.exe, 00000001.00000002.482894129.0000000002A66000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.org/(
                      Source: PAYMENT.exe, 00000001.00000002.482271789.0000000002991000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.orgGETMozilla/5.0
                      Source: PAYMENT.exe, 00000001.00000002.482894129.0000000002A66000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.orgx&
                      Source: PAYMENT.exe, 00000000.00000002.218261942.00000000042A2000.00000040.00000001.sdmp, PAYMENT.exe, 00000001.00000002.479640942.00000000009D2000.00000040.00000001.sdmpString found in binary or memory: https://api.telegram.org/bot%telegramapi%/
                      Source: PAYMENT.exe, 00000001.00000002.482271789.0000000002991000.00000004.00000001.sdmpString found in binary or memory: https://api.telegram.org/bot%telegramapi%/sendDocumentdocument---------------------------x
                      Source: PAYMENT.exe, 00000001.00000002.479138142.00000000007EA000.00000004.00000020.sdmpString found in binary or memory: https://secure.comodo.com/CPS0
                      Source: PAYMENT.exe, 00000001.00000002.482667581.0000000002A1D000.00000004.00000001.sdmpString found in binary or memory: https://www.certum.pl/CPS0
                      Source: PAYMENT.exeString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
                      Source: PAYMENT.exe, 00000001.00000002.482271789.0000000002991000.00000004.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
                      Source: C:\Users\user\Desktop\PAYMENT.exeCode function: 0_2_00430A94 GetKeyboardState,0_2_00430A94
                      Source: C:\Users\user\Desktop\PAYMENT.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior

                      System Summary:

                      barindex
                      .NET source code contains very large array initializationsShow sources
                      Source: 0.2.PAYMENT.exe.42a0000.3.unpack, u003cPrivateImplementationDetailsu003eu007bC638EC03u002d76CFu002d4021u002dBAEEu002d0305949F6D58u007d/u0032FDC5184u002dD862u002d415Du002d986Du002d6C2B8B6A58CC.csLarge array initialization: .cctor: array initializer size 11990
                      Initial sample is a PE file and has a suspicious nameShow sources
                      Source: initial sampleStatic PE information: Filename: PAYMENT.exe
                      Source: C:\Users\user\Desktop\PAYMENT.exeCode function: 0_2_0044E1DC NtdllDefWindowProc_A,0_2_0044E1DC
                      Source: C:\Users\user\Desktop\PAYMENT.exeCode function: 0_2_00433944 NtdllDefWindowProc_A,GetCapture,0_2_00433944
                      Source: C:\Users\user\Desktop\PAYMENT.exeCode function: 0_2_0044E958 IsIconic,SetActiveWindow,IsWindowEnabled,SetWindowPos,NtdllDefWindowProc_A,0_2_0044E958
                      Source: C:\Users\user\Desktop\PAYMENT.exeCode function: 0_2_0044EA08 IsIconic,SetActiveWindow,IsWindowEnabled,NtdllDefWindowProc_A,SetWindowPos,SetFocus,0_2_0044EA08
                      Source: C:\Users\user\Desktop\PAYMENT.exeCode function: 0_2_00442DCC GetSubMenu,SaveDC,RestoreDC,731EB080,SaveDC,RestoreDC,NtdllDefWindowProc_A,0_2_00442DCC
                      Source: C:\Users\user\Desktop\PAYMENT.exeCode function: 0_2_0042906C NtdllDefWindowProc_A,0_2_0042906C
                      Source: C:\Users\user\Desktop\PAYMENT.exeCode function: 1_2_00444159 NtCreateSection,1_2_00444159
                      Source: C:\Users\user\Desktop\PAYMENT.exeCode function: 1_2_0226B0BA NtQuerySystemInformation,1_2_0226B0BA
                      Source: C:\Users\user\Desktop\PAYMENT.exeCode function: 1_2_0226B089 NtQuerySystemInformation,1_2_0226B089
                      Source: C:\Users\user\Desktop\PAYMENT.exeCode function: 0_2_004488B00_2_004488B0
                      Source: C:\Users\user\Desktop\PAYMENT.exeCode function: 0_2_00442DCC0_2_00442DCC
                      Source: C:\Users\user\Desktop\PAYMENT.exeCode function: 0_2_0040BF040_2_0040BF04
                      Source: C:\Users\user\Desktop\PAYMENT.exeCode function: 1_2_00402FA41_2_00402FA4
                      Source: C:\Users\user\Desktop\PAYMENT.exeCode function: 1_2_0043D9761_2_0043D976
                      Source: C:\Users\user\Desktop\PAYMENT.exeCode function: 1_2_0044313D1_2_0044313D
                      Source: C:\Users\user\Desktop\PAYMENT.exeCode function: 1_2_0044C2441_2_0044C244
                      Source: C:\Users\user\Desktop\PAYMENT.exeCode function: 1_2_04AB62381_2_04AB6238
                      Source: C:\Users\user\Desktop\PAYMENT.exeCode function: 1_2_04AB98301_2_04AB9830
                      Source: C:\Users\user\Desktop\PAYMENT.exeCode function: 1_2_04ABDBB01_2_04ABDBB0
                      Source: C:\Users\user\Desktop\PAYMENT.exeCode function: 1_2_04ABDB4F1_2_04ABDB4F
                      Source: C:\Users\user\Desktop\PAYMENT.exeCode function: String function: 00403A80 appears 33 times
                      Source: C:\Users\user\Desktop\PAYMENT.exeCode function: String function: 00406A4C appears 57 times
                      Source: C:\Users\user\Desktop\PAYMENT.exeCode function: String function: 004044A4 appears 78 times
                      Source: PAYMENT.exeStatic PE information: Resource name: RT_BITMAP type: GLS_BINARY_LSB_FIRST
                      Source: PAYMENT.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                      Source: PAYMENT.exe, 00000000.00000002.215972732.0000000002260000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameuser32j% vs PAYMENT.exe
                      Source: PAYMENT.exe, 00000000.00000002.218261942.00000000042A2000.00000040.00000001.sdmpBinary or memory string: OriginalFilenameRXImsCqXljBfnWYjpAyadefTLKvGtDu.exe4 vs PAYMENT.exe
                      Source: PAYMENT.exeBinary or memory string: OriginalFilename vs PAYMENT.exe
                      Source: PAYMENT.exe, 00000001.00000002.479640942.00000000009D2000.00000040.00000001.sdmpBinary or memory string: OriginalFilenameRXImsCqXljBfnWYjpAyadefTLKvGtDu.exe4 vs PAYMENT.exe
                      Source: PAYMENT.exe, 00000001.00000002.485143874.0000000004CF0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameKernelbase.dll.muij% vs PAYMENT.exe
                      Source: PAYMENT.exe, 00000001.00000002.485831305.00000000057C0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamewshom.ocx.mui vs PAYMENT.exe
                      Source: PAYMENT.exe, 00000001.00000002.478966848.0000000000767000.00000004.00000020.sdmpBinary or memory string: OriginalFilenamemscorwks.dllT vs PAYMENT.exe
                      Source: 0.2.PAYMENT.exe.42a0000.3.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: 0.2.PAYMENT.exe.42a0000.3.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/0@2/2
                      Source: C:\Users\user\Desktop\PAYMENT.exeCode function: 0_2_00420B00 GetLastError,FormatMessageA,0_2_00420B00
                      Source: C:\Users\user\Desktop\PAYMENT.exeCode function: 1_2_0226AF3E AdjustTokenPrivileges,1_2_0226AF3E
                      Source: C:\Users\user\Desktop\PAYMENT.exeCode function: 1_2_0226AF07 AdjustTokenPrivileges,1_2_0226AF07
                      Source: C:\Users\user\Desktop\PAYMENT.exeCode function: 0_2_00408B94 GetDiskFreeSpaceA,0_2_00408B94
                      Source: C:\Users\user\Desktop\PAYMENT.exeCode function: 0_2_00413F78 FindResourceA,0_2_00413F78
                      Source: C:\Users\user\Desktop\PAYMENT.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
                      Source: C:\Users\user\Desktop\PAYMENT.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dllJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlpJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlpJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Users\user\Desktop\PAYMENT.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\Desktop\PAYMENT.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: PAYMENT.exeVirustotal: Detection: 35%
                      Source: PAYMENT.exeMetadefender: Detection: 13%
                      Source: PAYMENT.exeReversingLabs: Detection: 27%
                      Source: unknownProcess created: C:\Users\user\Desktop\PAYMENT.exe 'C:\Users\user\Desktop\PAYMENT.exe'
                      Source: unknownProcess created: C:\Users\user\Desktop\PAYMENT.exe 'C:\Users\user\Desktop\PAYMENT.exe'
                      Source: C:\Users\user\Desktop\PAYMENT.exeProcess created: C:\Users\user\Desktop\PAYMENT.exe 'C:\Users\user\Desktop\PAYMENT.exe' Jump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{172BDDF8-CEEA-11D1-8B05-00600806D9B6}\InProcServer32Jump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dllJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dllJump to behavior

                      Data Obfuscation:

                      barindex
                      Detected unpacking (changes PE section rights)Show sources
                      Source: C:\Users\user\Desktop\PAYMENT.exeUnpacked PE file: 1.2.PAYMENT.exe.400000.0.unpack CODE:ER;DATA:W;BSS:W;.idata:W;.tls:W;.rdata:R;.reloc:R;.rsrc:R; vs .text:ER;.rsrc:R;.reloc:R;
                      Detected unpacking (overwrites its own PE header)Show sources
                      Source: C:\Users\user\Desktop\PAYMENT.exeUnpacked PE file: 1.2.PAYMENT.exe.400000.0.unpack
                      Source: C:\Users\user\Desktop\PAYMENT.exeCode function: 0_2_00452708 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00452708
                      Source: C:\Users\user\Desktop\PAYMENT.exeCode function: 0_2_0043ACEC push 0043AD79h; ret 0_2_0043AD71
                      Source: C:\Users\user\Desktop\PAYMENT.exeCode function: 0_2_00452168 push 004521D4h; ret 0_2_004521CC
                      Source: C:\Users\user\Desktop\PAYMENT.exeCode function: 0_2_0040C126 pushfd ; iretd 0_2_0040C1C1
                      Source: C:\Users\user\Desktop\PAYMENT.exeCode function: 0_2_0040C1D4 push 0040C350h; ret 0_2_0040C348
                      Source: C:\Users\user\Desktop\PAYMENT.exeCode function: 0_2_0040C352 push 0040C3C3h; ret 0_2_0040C3BB
                      Source: C:\Users\user\Desktop\PAYMENT.exeCode function: 0_2_0040C354 push 0040C3C3h; ret 0_2_0040C3BB
                      Source: C:\Users\user\Desktop\PAYMENT.exeCode function: 0_2_00450328 push 00450382h; ret 0_2_0045037A
                      Source: C:\Users\user\Desktop\PAYMENT.exeCode function: 0_2_00452338 push 00452364h; ret 0_2_0045235C
                      Source: C:\Users\user\Desktop\PAYMENT.exeCode function: 0_2_00410468 push 004104C9h; ret 0_2_004104C1
                      Source: C:\Users\user\Desktop\PAYMENT.exeCode function: 0_2_0040C432 push 0040C460h; ret 0_2_0040C458
                      Source: C:\Users\user\Desktop\PAYMENT.exeCode function: 0_2_0040C434 push 0040C460h; ret 0_2_0040C458
                      Source: C:\Users\user\Desktop\PAYMENT.exeCode function: 0_2_004104CC push 004106CDh; ret 0_2_004106C5
                      Source: C:\Users\user\Desktop\PAYMENT.exeCode function: 0_2_00458640 push 0045866Ch; ret 0_2_00458664
                      Source: C:\Users\user\Desktop\PAYMENT.exeCode function: 0_2_00452668 push 00452694h; ret 0_2_0045268C
                      Source: C:\Users\user\Desktop\PAYMENT.exeCode function: 0_2_0042A6C0 push 0042A72Ah; ret 0_2_0042A722
                      Source: C:\Users\user\Desktop\PAYMENT.exeCode function: 0_2_004066CA push 0040671Dh; ret 0_2_00406715
                      Source: C:\Users\user\Desktop\PAYMENT.exeCode function: 0_2_004066CC push 0040671Dh; ret 0_2_00406715
                      Source: C:\Users\user\Desktop\PAYMENT.exeCode function: 0_2_004106D0 push 0041080Ch; ret 0_2_00410804
                      Source: C:\Users\user\Desktop\PAYMENT.exeCode function: 0_2_004086FC push ecx; mov dword ptr [esp], ecx0_2_00408701
                      Source: C:\Users\user\Desktop\PAYMENT.exeCode function: 0_2_004626A8 push 004626E0h; ret 0_2_004626D8
                      Source: C:\Users\user\Desktop\PAYMENT.exeCode function: 0_2_0045075C push 00450788h; ret 0_2_00450780
                      Source: C:\Users\user\Desktop\PAYMENT.exeCode function: 0_2_0045470C push 00454738h; ret 0_2_00454730
                      Source: C:\Users\user\Desktop\PAYMENT.exeCode function: 0_2_0042A72C push 0042A796h; ret 0_2_0042A78E
                      Source: C:\Users\user\Desktop\PAYMENT.exeCode function: 0_2_004107E0 push 0041080Ch; ret 0_2_00410804
                      Source: C:\Users\user\Desktop\PAYMENT.exeCode function: 0_2_004507AC push 004507EFh; ret 0_2_004507E7
                      Source: C:\Users\user\Desktop\PAYMENT.exeCode function: 0_2_00430834 push ecx; mov dword ptr [esp], ecx0_2_00430838
                      Source: C:\Users\user\Desktop\PAYMENT.exeCode function: 0_2_0040689C push 004068C8h; ret 0_2_004068C0
                      Source: C:\Users\user\Desktop\PAYMENT.exeCode function: 0_2_00406914 push 00406940h; ret 0_2_00406938
                      Source: C:\Users\user\Desktop\PAYMENT.exeCode function: 0_2_0045C930 push 0045C97Ch; ret 0_2_0045C974
                      Source: C:\Users\user\Desktop\PAYMENT.exeCode function: 0_2_00454B08 push 00454B4Bh; ret 0_2_00454B43
                      Source: C:\Users\user\Desktop\PAYMENT.exeCode function: 0_2_00462BC0 push 00462BECh; ret 0_2_00462BE4
                      Source: C:\Users\user\Desktop\PAYMENT.exeCode function: 0_2_0044E264 PostMessageA,PostMessageA,SendMessageA,GetProcAddress,GetLastError,IsWindowEnabled,IsWindowVisible,GetFocus,SetFocus,SetFocus,IsIconic,GetFocus,SetFocus,0_2_0044E264
                      Source: C:\Users\user\Desktop\PAYMENT.exeCode function: 0_2_004361A4 IsIconic,GetWindowPlacement,GetWindowRect,GetWindowLongA,GetWindowLongA,ScreenToClient,ScreenToClient,0_2_004361A4
                      Source: C:\Users\user\Desktop\PAYMENT.exeCode function: 0_2_0044E958 IsIconic,SetActiveWindow,IsWindowEnabled,SetWindowPos,NtdllDefWindowProc_A,0_2_0044E958
                      Source: C:\Users\user\Desktop\PAYMENT.exeCode function: 0_2_0044EA08 IsIconic,SetActiveWindow,IsWindowEnabled,NtdllDefWindowProc_A,SetWindowPos,SetFocus,0_2_0044EA08
                      Source: C:\Users\user\Desktop\PAYMENT.exeCode function: 0_2_00435018 IsIconic,GetCapture,0_2_00435018
                      Source: C:\Users\user\Desktop\PAYMENT.exeCode function: 0_2_0044B358 SendMessageA,ShowWindow,ShowWindow,CallWindowProcA,SendMessageA,ShowWindow,SetWindowPos,GetActiveWindow,IsIconic,SetWindowPos,SetActiveWindow,ShowWindow,0_2_0044B358
                      Source: C:\Users\user\Desktop\PAYMENT.exeCode function: 0_2_004257A4 IsIconic,GetWindowPlacement,GetWindowRect,0_2_004257A4
                      Source: C:\Users\user\Desktop\PAYMENT.exeCode function: 0_2_004358C0 IsIconic,SetWindowPos,GetWindowPlacement,SetWindowPlacement,0_2_004358C0
                      Source: C:\Users\user\Desktop\PAYMENT.exeCode function: 0_2_00452708 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00452708
                      Source: C:\Users\user\Desktop\PAYMENT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                      Malware Analysis System Evasion:

                      barindex
                      Contains functionality to detect sleep reduction / modificationsShow sources
                      Source: C:\Users\user\Desktop\PAYMENT.exeCode function: 0_2_0042A60C0_2_0042A60C
                      Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)Show sources
                      Source: C:\Users\user\Desktop\PAYMENT.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                      Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)Show sources
                      Source: C:\Users\user\Desktop\PAYMENT.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                      Source: C:\Users\user\Desktop\PAYMENT.exeCode function: GetCurrentThreadId,GetCursorPos,WaitForSingleObject,0_2_0044D838
                      Source: C:\Users\user\Desktop\PAYMENT.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exeCode function: 0_2_0042A60C0_2_0042A60C
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -60000s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -59812s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -117812s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -58312s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -144530s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -56500s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -84468s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -55812s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -55406s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -55000s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -54500s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -53812s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -52312s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -51406s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -50406s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -49906s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -49500s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -73218s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -72609s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -72000s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -71250s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -70968s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -93812s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -69609s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -46000s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -91624s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -67968s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -89812s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -66750s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -44000s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -87624s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -43406s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -64359s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -63750s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -84624s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -83624s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -62109s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -41000s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -60750s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -80624s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -39906s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -39406s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -39000s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -38812s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -76624s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -38126s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -37500s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -36406s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -53250s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -35312s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -34812s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -34500s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -33812s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -49968s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -32500s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -31812s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -30500s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -40500s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -88080s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -86391s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -57220s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -85080s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -56094s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -82830s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -81141s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -53906s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -53720s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -53220s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -53000s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -52812s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -52594s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -78141s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -51906s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -51720s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -51500s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -51220s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -76500s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -50812s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -50594s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -49720s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -49094s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -48594s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -47720s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -46720s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -46220s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -45594s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -44720s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -44220s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -43594s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -43376s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -64830s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -64080s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -42094s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -41594s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -61830s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -61080s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -60141s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -58830s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -37720s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -55830s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -37000s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -36594s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -35906s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -34594s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -34406s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -33500s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -33094s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -32906s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -32720s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -32406s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -32220s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -48000s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -31312s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -46641s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -30906s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -30220s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -30000s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -40080s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -39141s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -37830s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -36141s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -34500s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -32859s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -32580s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -31218s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -30891s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -59500s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -88968s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -59094s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -58406s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -87330s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -58000s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -55594s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -54720s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -38720s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -38094s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -36094s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -35220s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -31500s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exe TID: 6840Thread sleep time: -30406s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Users\user\Desktop\PAYMENT.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\Desktop\PAYMENT.exeLast function: Thread delayed
                      Source: C:\Users\user\Desktop\PAYMENT.exeCode function: 0_2_00462A84 GetSystemTime followed by cmp: cmp word ptr [esp+18h], 07dfh and CTI: jnc 00462AA8h0_2_00462A84
                      Source: C:\Users\user\Desktop\PAYMENT.exeCode function: 0_2_00405C14 GetModuleHandleA,GetProcAddress,lstrcpyn,lstrcpyn,lstrcpyn,FindFirstFileA,FindClose,lstrlen,lstrcpyn,lstrlen,lstrcpyn,0_2_00405C14
                      Source: C:\Users\user\Desktop\PAYMENT.exeCode function: 0_2_00421090 GetSystemInfo,0_2_00421090
                      Source: PAYMENT.exe, 00000001.00000002.485143874.0000000004CF0000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
                      Source: PAYMENT.exe, 00000001.00000002.479138142.00000000007EA000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW
                      Source: PAYMENT.exe, 00000001.00000002.485143874.0000000004CF0000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
                      Source: PAYMENT.exe, 00000001.00000002.485143874.0000000004CF0000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
                      Source: PAYMENT.exe, 00000001.00000002.479138142.00000000007EA000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                      Source: PAYMENT.exe, 00000001.00000002.485143874.0000000004CF0000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
                      Source: C:\Users\user\Desktop\PAYMENT.exeProcess information queried: ProcessInformationJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exeProcess queried: DebugFlagsJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exeProcess queried: DebugObjectHandleJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exeCode function: 1_2_04AB2EC0 KiUserExceptionDispatcher,KiUserExceptionDispatcher,LdrInitializeThunk,KiUserExceptionDispatcher,KiUserExceptionDispatcher,1_2_04AB2EC0
                      Source: C:\Users\user\Desktop\PAYMENT.exeCode function: 1_2_0043F6F3 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_0043F6F3
                      Source: C:\Users\user\Desktop\PAYMENT.exeCode function: 0_2_00462924 VirtualProtect ?,00012397,00000104,?,00000000,00012397,00003000,000000040_2_00462924
                      Source: C:\Users\user\Desktop\PAYMENT.exeCode function: 0_2_00452708 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00452708
                      Source: C:\Users\user\Desktop\PAYMENT.exeCode function: 1_2_00443412 mov eax, dword ptr fs:[00000030h]1_2_00443412
                      Source: C:\Users\user\Desktop\PAYMENT.exeCode function: 1_2_004434D0 mov eax, dword ptr fs:[00000030h]1_2_004434D0
                      Source: C:\Users\user\Desktop\PAYMENT.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exeCode function: 0_2_00462B08 KiUserExceptionDispatcher,LoadMenuW,GetSystemMetrics,GetSystemMetrics,ExitProcess,RtlAddVectoredExceptionHandler,LoadMenuW,0_2_00462B08
                      Source: C:\Users\user\Desktop\PAYMENT.exeCode function: 1_2_0043E746 SetUnhandledExceptionFilter,1_2_0043E746
                      Source: C:\Users\user\Desktop\PAYMENT.exeCode function: 1_2_0043F6F3 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_0043F6F3
                      Source: C:\Users\user\Desktop\PAYMENT.exeCode function: 1_2_00441D7F __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_00441D7F
                      Source: C:\Users\user\Desktop\PAYMENT.exeCode function: 1_2_0043FBB5 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_0043FBB5
                      Source: C:\Users\user\Desktop\PAYMENT.exeMemory protected: page read and write | page guardJump to behavior

                      HIPS / PFW / Operating System Protection Evasion:

                      barindex
                      Maps a DLL or memory area into another processShow sources
                      Source: C:\Users\user\Desktop\PAYMENT.exeSection loaded: unknown target: C:\Users\user\Desktop\PAYMENT.exe protection: execute and read and writeJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exeProcess created: C:\Users\user\Desktop\PAYMENT.exe 'C:\Users\user\Desktop\PAYMENT.exe' Jump to behavior
                      Source: PAYMENT.exe, 00000001.00000002.479828683.0000000000DC0000.00000002.00000001.sdmpBinary or memory string: Program Manager
                      Source: PAYMENT.exe, 00000001.00000002.479828683.0000000000DC0000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
                      Source: PAYMENT.exe, 00000001.00000002.479828683.0000000000DC0000.00000002.00000001.sdmpBinary or memory string: Progman
                      Source: PAYMENT.exe, 00000001.00000002.479828683.0000000000DC0000.00000002.00000001.sdmpBinary or memory string: Progmanlock
                      Source: C:\Users\user\Desktop\PAYMENT.exeCode function: GetModuleFileNameA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegQueryValueExA,RegQueryValueExA,RegCloseKey,lstrcpyn,GetThreadLocale,GetLocaleInfoA,lstrlen,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,0_2_00405DCC
                      Source: C:\Users\user\Desktop\PAYMENT.exeCode function: GetLocaleInfoA,GetACP,0_2_0040AED4
                      Source: C:\Users\user\Desktop\PAYMENT.exeCode function: GetLocaleInfoA,0_2_00409CF0
                      Source: C:\Users\user\Desktop\PAYMENT.exeCode function: GetLocaleInfoA,0_2_00409CA4
                      Source: C:\Users\user\Desktop\PAYMENT.exeCode function: lstrcpyn,GetThreadLocale,GetLocaleInfoA,lstrlen,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,0_2_00405ED8
                      Source: C:\Users\user\Desktop\PAYMENT.exeCode function: GetLocaleInfoA,1_2_00442A4A
                      Source: C:\Users\user\Desktop\PAYMENT.exeQueries volume information: C:\Windows\assembly\GAC_32\CustomMarshalers\2.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exeQueries volume information: C:\Windows\assembly\GAC_32\CustomMarshalers\2.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exeCode function: 0_2_00402A62 GetSystemTime,0_2_00402A62
                      Source: C:\Users\user\Desktop\PAYMENT.exeCode function: 0_2_0043ACEC GetVersion,0_2_0043ACEC
                      Source: C:\Users\user\Desktop\PAYMENT.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                      Stealing of Sensitive Information:

                      barindex
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 00000001.00000002.479640942.00000000009D2000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.478763690.00000000005F0000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.478433620.000000000044B000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.478194286.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.482271789.0000000002991000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.479455567.0000000000962000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.218261942.00000000042A2000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.218303519.00000000042EB000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: PAYMENT.exe PID: 6776, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: PAYMENT.exe PID: 6744, type: MEMORY
                      Source: Yara matchFile source: 1.2.PAYMENT.exe.9d0000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.PAYMENT.exe.5f0000.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.PAYMENT.exe.5f0000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.PAYMENT.exe.4270000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.PAYMENT.exe.960000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.PAYMENT.exe.42a0000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.PAYMENT.exe.400000.0.unpack, type: UNPACKEDPE
                      Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)Show sources
                      Source: C:\Users\user\Desktop\PAYMENT.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                      Tries to harvest and steal browser information (history, passwords, etc)Show sources
                      Source: C:\Users\user\Desktop\PAYMENT.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                      Tries to harvest and steal ftp login credentialsShow sources
                      Source: C:\Users\user\Desktop\PAYMENT.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xmlJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\Jump to behavior
                      Tries to steal Mail credentials (via file access)Show sources
                      Source: C:\Users\user\Desktop\PAYMENT.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                      Source: C:\Users\user\Desktop\PAYMENT.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676