Loading ...

Play interactive tourEdit tour

Analysis Report PO.pdf.exe

Overview

General Information

Sample Name:PO.pdf.exe
Analysis ID:286332
MD5:eb0a8fba6f85d2db1af76f8a844d4327
SHA1:4c853b742784dcd9ee03930c33c9c17d3288969c
SHA256:03150c9b34f3c06083c0af32c4fc038a5c059fdd8b19c927206df5961f40c189
Tags:exe

Most interesting Screenshot:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected unpacking (changes PE section rights)
Detected unpacking (creates a PE file in dynamic memory)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Multi AV Scanner detection for submitted file
Sigma detected: Suspicious Double Extension
Yara detected AgentTesla
.NET source code contains very large array initializations
Contains functionality to detect sleep reduction / modifications
Initial sample is a PE file and has a suspicious name
Machine Learning detection for sample
Maps a DLL or memory area into another process
May check the online IP address of the machine
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file access)
Uses an obfuscated file name to hide its real file extension (double extension)
Antivirus or Machine Learning detection for unpacked file
Checks if the current process is being debugged
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to create guard pages, often used to hinder reverse engineering and debugging
Contains functionality to detect sandboxes (mouse cursor move detection)
Contains functionality to dynamically determine API calls
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to retrieve information about pressed keystrokes
Contains long sleeps (>= 3 min)
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check if the current machine is a sandbox (GetTickCount - Sleep)
May sleep (evasive loops) to hinder dynamic analysis
PE file contains strange resources
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses SMTP (mail sending)
Uses code obfuscation techniques (call, push, ret)
Uses the system / local time for branch decision (may execute only at specific dates)
Yara detected Credential Stealer

Classification

Startup

  • System is w10x64
  • PO.pdf.exe (PID: 2768 cmdline: 'C:\Users\user\Desktop\PO.pdf.exe' MD5: EB0A8FBA6F85D2DB1AF76F8A844D4327)
    • PO.pdf.exe (PID: 2316 cmdline: 'C:\Users\user\Desktop\PO.pdf.exe' MD5: EB0A8FBA6F85D2DB1AF76F8A844D4327)
  • cleanup

Malware Configuration

Threatname: Agenttesla

{"Username: ": "Ga24GR4a2PXGIq", "URL: ": "http://N0WlXWNRu7j7l3.net", "To: ": "chinapeace@yandex.com", "ByHost: ": "smtp.yandex.com:587", "Password: ": "uK7oH3B7Akv", "From: ": "chinapeace@yandex.com"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000001.00000002.630480670.0000000002931000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000001.00000002.630480670.0000000002931000.00000004.00000001.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000000.00000002.366017620.0000000004162000.00000040.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000001.00000002.628534338.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          00000000.00000002.366241545.00000000041A5000.00000040.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 7 entries

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            0.2.PO.pdf.exe.4130000.2.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              1.2.PO.pdf.exe.740000.2.raw.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                1.2.PO.pdf.exe.740000.2.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                  1.2.PO.pdf.exe.2280000.4.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                    0.2.PO.pdf.exe.4160000.3.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                      Click to see the 2 entries

                      Sigma Overview

                      System Summary:

                      barindex
                      Sigma detected: Suspicious Double ExtensionShow sources
                      Source: Process startedAuthor: Florian Roth (rule), @blu3_team (idea): Data: Command: 'C:\Users\user\Desktop\PO.pdf.exe' , CommandLine: 'C:\Users\user\Desktop\PO.pdf.exe' , CommandLine|base64offset|contains: , Image: C:\Users\user\Desktop\PO.pdf.exe, NewProcessName: C:\Users\user\Desktop\PO.pdf.exe, OriginalFileName: C:\Users\user\Desktop\PO.pdf.exe, ParentCommandLine: 'C:\Users\user\Desktop\PO.pdf.exe' , ParentImage: C:\Users\user\Desktop\PO.pdf.exe, ParentProcessId: 2768, ProcessCommandLine: 'C:\Users\user\Desktop\PO.pdf.exe' , ProcessId: 2316

                      Signature Overview

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection:

                      barindex
                      Found malware configurationShow sources
                      Source: PO.pdf.exe.2316.1.memstrMalware Configuration Extractor: Agenttesla {"Username: ": "Ga24GR4a2PXGIq", "URL: ": "http://N0WlXWNRu7j7l3.net", "To: ": "chinapeace@yandex.com", "ByHost: ": "smtp.yandex.com:587", "Password: ": "uK7oH3B7Akv", "From: ": "chinapeace@yandex.com"}
                      Multi AV Scanner detection for submitted fileShow sources
                      Source: PO.pdf.exeVirustotal: Detection: 31%Perma Link
                      Source: PO.pdf.exeReversingLabs: Detection: 33%
                      Machine Learning detection for sampleShow sources
                      Source: PO.pdf.exeJoe Sandbox ML: detected
                      Source: 1.2.PO.pdf.exe.2280000.4.unpackAvira: Label: TR/Spy.Gen8
                      Source: C:\Users\user\Desktop\PO.pdf.exeCode function: 0_2_00405C14 GetModuleHandleA,GetProcAddress,lstrcpyn,lstrcpyn,lstrcpyn,FindFirstFileA,FindClose,lstrlen,lstrcpyn,lstrlen,lstrcpyn,0_2_00405C14

                      Networking:

                      barindex
                      May check the online IP address of the machineShow sources
                      Source: unknownDNS query: name: api.ipify.org
                      Source: unknownDNS query: name: api.ipify.org
                      Source: unknownDNS query: name: api.ipify.org
                      Source: global trafficTCP traffic: 192.168.2.3:49732 -> 77.88.21.158:587
                      Source: Joe Sandbox ViewIP Address: 54.225.195.221 54.225.195.221
                      Source: Joe Sandbox ViewIP Address: 54.225.195.221 54.225.195.221
                      Source: Joe Sandbox ViewIP Address: 77.88.21.158 77.88.21.158
                      Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
                      Source: global trafficTCP traffic: 192.168.2.3:49732 -> 77.88.21.158:587
                      Source: C:\Users\user\Desktop\PO.pdf.exeCode function: 1_2_0237A186 recv,1_2_0237A186
                      Source: unknownDNS traffic detected: queries for: smtp.yandex.com
                      Source: PO.pdf.exe, 00000001.00000002.630480670.0000000002931000.00000004.00000001.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                      Source: PO.pdf.exe, 00000001.00000002.630480670.0000000002931000.00000004.00000001.sdmpString found in binary or memory: http://DynDns.comDynDNS
                      Source: PO.pdf.exe, 00000001.00000002.630480670.0000000002931000.00000004.00000001.sdmp, PO.pdf.exe, 00000001.00000002.630939263.0000000002A05000.00000004.00000001.sdmpString found in binary or memory: http://N0WlXWNRu7j7l3.net
                      Source: PO.pdf.exe, 00000001.00000002.630882741.00000000029ED000.00000004.00000001.sdmpString found in binary or memory: http://crl.certum.pl/ca.crl0h
                      Source: PO.pdf.exe, 00000001.00000002.630882741.00000000029ED000.00000004.00000001.sdmpString found in binary or memory: http://crl.certum.pl/ctnca.crl0k
                      Source: PO.pdf.exe, 00000001.00000002.634474058.0000000005B30000.00000004.00000001.sdmpString found in binary or memory: http://crl.comodoca.com/COMODORSACertificationAuthority.crl0q
                      Source: PO.pdf.exe, 00000001.00000002.634474058.0000000005B30000.00000004.00000001.sdmpString found in binary or memory: http://crl.comodoca.com/COMODORSADomainValidationSecureServerCA.crl0
                      Source: PO.pdf.exe, 00000001.00000002.630882741.00000000029ED000.00000004.00000001.sdmpString found in binary or memory: http://crls.yandex.net/certum/ycasha2.crl0-
                      Source: PO.pdf.exe, 00000001.00000002.630480670.0000000002931000.00000004.00000001.sdmpString found in binary or memory: http://fSyslN.com
                      Source: PO.pdf.exe, 00000001.00000002.634474058.0000000005B30000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.comodoca.com0
                      Source: PO.pdf.exe, 00000001.00000002.630882741.00000000029ED000.00000004.00000001.sdmpString found in binary or memory: http://repository.certum.pl/ca.cer09
                      Source: PO.pdf.exe, 00000001.00000002.630882741.00000000029ED000.00000004.00000001.sdmpString found in binary or memory: http://repository.certum.pl/ctnca.cer09
                      Source: PO.pdf.exe, 00000001.00000002.630882741.00000000029ED000.00000004.00000001.sdmpString found in binary or memory: http://repository.certum.pl/ycasha2.cer0
                      Source: PO.pdf.exe, 00000001.00000002.630882741.00000000029ED000.00000004.00000001.sdmpString found in binary or memory: http://subca.ocsp-certum.com0.
                      Source: PO.pdf.exe, 00000001.00000002.630882741.00000000029ED000.00000004.00000001.sdmpString found in binary or memory: http://subca.ocsp-certum.com01
                      Source: PO.pdf.exe, 00000001.00000002.630882741.00000000029ED000.00000004.00000001.sdmpString found in binary or memory: http://www.certum.pl/CPS0
                      Source: PO.pdf.exe, 00000001.00000002.630882741.00000000029ED000.00000004.00000001.sdmpString found in binary or memory: http://yandex.crl.certum.pl/ycasha2.crl0q
                      Source: PO.pdf.exe, 00000001.00000002.630882741.00000000029ED000.00000004.00000001.sdmpString found in binary or memory: http://yandex.ocsp-responder.com03
                      Source: PO.pdf.exe, 00000001.00000002.630939263.0000000002A05000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.org
                      Source: PO.pdf.exe, 00000001.00000002.630939263.0000000002A05000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.org/
                      Source: PO.pdf.exe, 00000001.00000002.630939263.0000000002A05000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.org/(
                      Source: PO.pdf.exe, 00000001.00000002.630480670.0000000002931000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.orgGETMozilla/5.0
                      Source: PO.pdf.exe, 00000001.00000002.630939263.0000000002A05000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.orgx&
                      Source: PO.pdf.exe, 00000000.00000002.366017620.0000000004162000.00000040.00000001.sdmp, PO.pdf.exe, 00000001.00000002.628534338.0000000000402000.00000040.00000001.sdmpString found in binary or memory: https://api.telegram.org/bot%telegramapi%/
                      Source: PO.pdf.exe, 00000001.00000002.630480670.0000000002931000.00000004.00000001.sdmpString found in binary or memory: https://api.telegram.org/bot%telegramapi%/sendDocumentdocument---------------------------x
                      Source: PO.pdf.exe, 00000001.00000002.634474058.0000000005B30000.00000004.00000001.sdmpString found in binary or memory: https://secure.comodo.com/CPS0
                      Source: PO.pdf.exe, 00000001.00000002.630882741.00000000029ED000.00000004.00000001.sdmpString found in binary or memory: https://www.certum.pl/CPS0
                      Source: PO.pdf.exeString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
                      Source: PO.pdf.exe, 00000001.00000002.630480670.0000000002931000.00000004.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
                      Source: C:\Users\user\Desktop\PO.pdf.exeCode function: 0_2_00430A94 GetKeyboardState,0_2_00430A94
                      Source: PO.pdf.exe, 00000000.00000002.363930105.000000000078A000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
                      Source: C:\Users\user\Desktop\PO.pdf.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior

                      System Summary:

                      barindex
                      .NET source code contains very large array initializationsShow sources
                      Source: 0.2.PO.pdf.exe.4160000.3.unpack, u003cPrivateImplementationDetailsu003eu007b0404E0F5u002d6DF7u002d4430u002d87CAu002dD425EE6B814Eu007d/E5876942u002d6251u002d4523u002d896Cu002dAAD45306D67C.csLarge array initialization: .cctor: array initializer size 11995
                      Source: 1.2.PO.pdf.exe.780000.3.unpack, u003cPrivateImplementationDetailsu003eu007b0404E0F5u002d6DF7u002d4430u002d87CAu002dD425EE6B814Eu007d/E5876942u002d6251u002d4523u002d896Cu002dAAD45306D67C.csLarge array initialization: .cctor: array initializer size 11995
                      Initial sample is a PE file and has a suspicious nameShow sources
                      Source: initial sampleStatic PE information: Filename: PO.pdf.exe
                      Source: C:\Users\user\Desktop\PO.pdf.exeCode function: 0_2_0044E1DC NtdllDefWindowProc_A,0_2_0044E1DC
                      Source: C:\Users\user\Desktop\PO.pdf.exeCode function: 0_2_00433944 NtdllDefWindowProc_A,GetCapture,0_2_00433944
                      Source: C:\Users\user\Desktop\PO.pdf.exeCode function: 0_2_0044E958 IsIconic,SetActiveWindow,IsWindowEnabled,SetWindowPos,NtdllDefWindowProc_A,0_2_0044E958
                      Source: C:\Users\user\Desktop\PO.pdf.exeCode function: 0_2_0044EA08 IsIconic,SetActiveWindow,IsWindowEnabled,NtdllDefWindowProc_A,SetWindowPos,SetFocus,0_2_0044EA08
                      Source: C:\Users\user\Desktop\PO.pdf.exeCode function: 0_2_00442DCC GetSubMenu,SaveDC,RestoreDC,739EB080,SaveDC,RestoreDC,NtdllDefWindowProc_A,0_2_00442DCC
                      Source: C:\Users\user\Desktop\PO.pdf.exeCode function: 0_2_0042906C NtdllDefWindowProc_A,0_2_0042906C
                      Source: C:\Users\user\Desktop\PO.pdf.exeCode function: 1_2_0043E159 NtCreateSection,1_2_0043E159
                      Source: C:\Users\user\Desktop\PO.pdf.exeCode function: 1_2_0237B0BA NtQuerySystemInformation,1_2_0237B0BA
                      Source: C:\Users\user\Desktop\PO.pdf.exeCode function: 1_2_0237B089 NtQuerySystemInformation,1_2_0237B089
                      Source: C:\Users\user\Desktop\PO.pdf.exeCode function: 0_2_004488B00_2_004488B0
                      Source: C:\Users\user\Desktop\PO.pdf.exeCode function: 0_2_00442DCC0_2_00442DCC
                      Source: C:\Users\user\Desktop\PO.pdf.exeCode function: 0_2_0040BF040_2_0040BF04
                      Source: C:\Users\user\Desktop\PO.pdf.exeCode function: 1_2_004379761_2_00437976
                      Source: C:\Users\user\Desktop\PO.pdf.exeCode function: 1_2_0043D13D1_2_0043D13D
                      Source: C:\Users\user\Desktop\PO.pdf.exeCode function: 1_2_04AA6CE41_2_04AA6CE4
                      Source: C:\Users\user\Desktop\PO.pdf.exeCode function: 1_2_04AAB0581_2_04AAB058
                      Source: C:\Users\user\Desktop\PO.pdf.exeCode function: 1_2_04AA85A81_2_04AA85A8
                      Source: C:\Users\user\Desktop\PO.pdf.exeCode function: 1_2_04AAC5601_2_04AAC560
                      Source: C:\Users\user\Desktop\PO.pdf.exeCode function: String function: 00403A80 appears 33 times
                      Source: C:\Users\user\Desktop\PO.pdf.exeCode function: String function: 00406A4C appears 57 times
                      Source: C:\Users\user\Desktop\PO.pdf.exeCode function: String function: 004044A4 appears 78 times
                      Source: PO.pdf.exeStatic PE information: Resource name: RT_BITMAP type: GLS_BINARY_LSB_FIRST
                      Source: PO.pdf.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                      Source: PO.pdf.exe, 00000000.00000002.366017620.0000000004162000.00000040.00000001.sdmpBinary or memory string: OriginalFilenameenCdnAaIuGBsWguPlPCgEsROHMVb.exe4 vs PO.pdf.exe
                      Source: PO.pdf.exe, 00000000.00000002.363981410.0000000002120000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameuser32j% vs PO.pdf.exe
                      Source: PO.pdf.exeBinary or memory string: OriginalFilename vs PO.pdf.exe
                      Source: PO.pdf.exe, 00000001.00000002.633824464.0000000004D10000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameKernelbase.dll.muij% vs PO.pdf.exe
                      Source: PO.pdf.exe, 00000001.00000002.628534338.0000000000402000.00000040.00000001.sdmpBinary or memory string: OriginalFilenameenCdnAaIuGBsWguPlPCgEsROHMVb.exe4 vs PO.pdf.exe
                      Source: PO.pdf.exe, 00000001.00000002.634323641.0000000005700000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamewshom.ocx vs PO.pdf.exe
                      Source: PO.pdf.exe, 00000001.00000002.634106827.00000000051F0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamewshom.ocx.mui vs PO.pdf.exe
                      Source: PO.pdf.exe, 00000001.00000002.629010412.00000000007C7000.00000004.00000020.sdmpBinary or memory string: OriginalFilenamemscorwks.dllT vs PO.pdf.exe
                      Source: 0.2.PO.pdf.exe.4160000.3.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: 0.2.PO.pdf.exe.4160000.3.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: 1.2.PO.pdf.exe.780000.3.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: 1.2.PO.pdf.exe.780000.3.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/0@2/2
                      Source: C:\Users\user\Desktop\PO.pdf.exeCode function: 0_2_00420B00 GetLastError,FormatMessageA,0_2_00420B00
                      Source: C:\Users\user\Desktop\PO.pdf.exeCode function: 1_2_0237AF3E AdjustTokenPrivileges,1_2_0237AF3E
                      Source: C:\Users\user\Desktop\PO.pdf.exeCode function: 1_2_0237AF07 AdjustTokenPrivileges,1_2_0237AF07
                      Source: C:\Users\user\Desktop\PO.pdf.exeCode function: 0_2_00408B94 GetDiskFreeSpaceA,0_2_00408B94
                      Source: C:\Users\user\Desktop\PO.pdf.exeCode function: 0_2_00413F78 FindResourceA,0_2_00413F78
                      Source: C:\Users\user\Desktop\PO.pdf.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
                      Source: C:\Users\user\Desktop\PO.pdf.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlpJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlpJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Users\user\Desktop\PO.pdf.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\Desktop\PO.pdf.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: PO.pdf.exeVirustotal: Detection: 31%
                      Source: PO.pdf.exeReversingLabs: Detection: 33%
                      Source: unknownProcess created: C:\Users\user\Desktop\PO.pdf.exe 'C:\Users\user\Desktop\PO.pdf.exe'
                      Source: unknownProcess created: C:\Users\user\Desktop\PO.pdf.exe 'C:\Users\user\Desktop\PO.pdf.exe'
                      Source: C:\Users\user\Desktop\PO.pdf.exeProcess created: C:\Users\user\Desktop\PO.pdf.exe 'C:\Users\user\Desktop\PO.pdf.exe' Jump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{172BDDF8-CEEA-11D1-8B05-00600806D9B6}\InProcServer32Jump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dllJump to behavior

                      Data Obfuscation:

                      barindex
                      Detected unpacking (changes PE section rights)Show sources
                      Source: C:\Users\user\Desktop\PO.pdf.exeUnpacked PE file: 1.2.PO.pdf.exe.400000.0.unpack CODE:ER;DATA:W;BSS:W;.idata:W;.tls:W;.rdata:R;.reloc:R;.rsrc:R; vs .text:ER;.rsrc:R;.reloc:R;
                      Detected unpacking (creates a PE file in dynamic memory)Show sources
                      Source: C:\Users\user\Desktop\PO.pdf.exeUnpacked PE file: 1.2.PO.pdf.exe.2280000.4.unpack
                      Detected unpacking (overwrites its own PE header)Show sources
                      Source: C:\Users\user\Desktop\PO.pdf.exeUnpacked PE file: 1.2.PO.pdf.exe.400000.0.unpack
                      Source: C:\Users\user\Desktop\PO.pdf.exeCode function: 0_2_00452708 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00452708
                      Source: C:\Users\user\Desktop\PO.pdf.exeCode function: 0_2_0043ACEC push 0043AD79h; ret 0_2_0043AD71
                      Source: C:\Users\user\Desktop\PO.pdf.exeCode function: 0_2_00452168 push 004521D4h; ret 0_2_004521CC
                      Source: C:\Users\user\Desktop\PO.pdf.exeCode function: 0_2_0040C126 pushfd ; iretd 0_2_0040C1C1
                      Source: C:\Users\user\Desktop\PO.pdf.exeCode function: 0_2_0040C1D4 push 0040C350h; ret 0_2_0040C348
                      Source: C:\Users\user\Desktop\PO.pdf.exeCode function: 0_2_0040C352 push 0040C3C3h; ret 0_2_0040C3BB
                      Source: C:\Users\user\Desktop\PO.pdf.exeCode function: 0_2_0040C354 push 0040C3C3h; ret 0_2_0040C3BB
                      Source: C:\Users\user\Desktop\PO.pdf.exeCode function: 0_2_00450328 push 00450382h; ret 0_2_0045037A
                      Source: C:\Users\user\Desktop\PO.pdf.exeCode function: 0_2_00452338 push 00452364h; ret 0_2_0045235C
                      Source: C:\Users\user\Desktop\PO.pdf.exeCode function: 0_2_00410468 push 004104C9h; ret 0_2_004104C1
                      Source: C:\Users\user\Desktop\PO.pdf.exeCode function: 0_2_0040C432 push 0040C460h; ret 0_2_0040C458
                      Source: C:\Users\user\Desktop\PO.pdf.exeCode function: 0_2_0040C434 push 0040C460h; ret 0_2_0040C458
                      Source: C:\Users\user\Desktop\PO.pdf.exeCode function: 0_2_004104CC push 004106CDh; ret 0_2_004106C5
                      Source: C:\Users\user\Desktop\PO.pdf.exeCode function: 0_2_00458640 push 0045866Ch; ret 0_2_00458664
                      Source: C:\Users\user\Desktop\PO.pdf.exeCode function: 0_2_00452668 push 00452694h; ret 0_2_0045268C
                      Source: C:\Users\user\Desktop\PO.pdf.exeCode function: 0_2_0042A6C0 push 0042A72Ah; ret 0_2_0042A722
                      Source: C:\Users\user\Desktop\PO.pdf.exeCode function: 0_2_004066CA push 0040671Dh; ret 0_2_00406715
                      Source: C:\Users\user\Desktop\PO.pdf.exeCode function: 0_2_004066CC push 0040671Dh; ret 0_2_00406715
                      Source: C:\Users\user\Desktop\PO.pdf.exeCode function: 0_2_004106D0 push 0041080Ch; ret 0_2_00410804
                      Source: C:\Users\user\Desktop\PO.pdf.exeCode function: 0_2_004086FC push ecx; mov dword ptr [esp], ecx0_2_00408701
                      Source: C:\Users\user\Desktop\PO.pdf.exeCode function: 0_2_004626A8 push 004626E0h; ret 0_2_004626D8
                      Source: C:\Users\user\Desktop\PO.pdf.exeCode function: 0_2_0045075C push 00450788h; ret 0_2_00450780
                      Source: C:\Users\user\Desktop\PO.pdf.exeCode function: 0_2_0045470C push 00454738h; ret 0_2_00454730
                      Source: C:\Users\user\Desktop\PO.pdf.exeCode function: 0_2_0042A72C push 0042A796h; ret 0_2_0042A78E
                      Source: C:\Users\user\Desktop\PO.pdf.exeCode function: 0_2_004107E0 push 0041080Ch; ret 0_2_00410804
                      Source: C:\Users\user\Desktop\PO.pdf.exeCode function: 0_2_004507AC push 004507EFh; ret 0_2_004507E7
                      Source: C:\Users\user\Desktop\PO.pdf.exeCode function: 0_2_00430834 push ecx; mov dword ptr [esp], ecx0_2_00430838
                      Source: C:\Users\user\Desktop\PO.pdf.exeCode function: 0_2_0040689C push 004068C8h; ret 0_2_004068C0
                      Source: C:\Users\user\Desktop\PO.pdf.exeCode function: 0_2_00406914 push 00406940h; ret 0_2_00406938
                      Source: C:\Users\user\Desktop\PO.pdf.exeCode function: 0_2_0045C930 push 0045C97Ch; ret 0_2_0045C974
                      Source: C:\Users\user\Desktop\PO.pdf.exeCode function: 0_2_00454B08 push 00454B4Bh; ret 0_2_00454B43
                      Source: C:\Users\user\Desktop\PO.pdf.exeCode function: 0_2_00462BC0 push 00462BECh; ret 0_2_00462BE4

                      Hooking and other Techniques for Hiding and Protection:

                      barindex
                      Uses an obfuscated file name to hide its real file extension (double extension)Show sources
                      Source: Possible double extension: pdf.exeStatic PE information: PO.pdf.exe
                      Source: C:\Users\user\Desktop\PO.pdf.exeCode function: 0_2_0044E264 PostMessageA,PostMessageA,SendMessageA,GetProcAddress,GetLastError,IsWindowEnabled,IsWindowVisible,GetFocus,SetFocus,SetFocus,IsIconic,GetFocus,SetFocus,0_2_0044E264
                      Source: C:\Users\user\Desktop\PO.pdf.exeCode function: 0_2_004361A4 IsIconic,GetWindowPlacement,GetWindowRect,GetWindowLongA,GetWindowLongA,ScreenToClient,ScreenToClient,0_2_004361A4
                      Source: C:\Users\user\Desktop\PO.pdf.exeCode function: 0_2_0044E958 IsIconic,SetActiveWindow,IsWindowEnabled,SetWindowPos,NtdllDefWindowProc_A,0_2_0044E958
                      Source: C:\Users\user\Desktop\PO.pdf.exeCode function: 0_2_0044EA08 IsIconic,SetActiveWindow,IsWindowEnabled,NtdllDefWindowProc_A,SetWindowPos,SetFocus,0_2_0044EA08
                      Source: C:\Users\user\Desktop\PO.pdf.exeCode function: 0_2_00435018 IsIconic,GetCapture,0_2_00435018
                      Source: C:\Users\user\Desktop\PO.pdf.exeCode function: 0_2_0044B358 SendMessageA,ShowWindow,ShowWindow,CallWindowProcA,SendMessageA,ShowWindow,SetWindowPos,GetActiveWindow,IsIconic,SetWindowPos,SetActiveWindow,ShowWindow,0_2_0044B358
                      Source: C:\Users\user\Desktop\PO.pdf.exeCode function: 0_2_004257A4 IsIconic,GetWindowPlacement,GetWindowRect,0_2_004257A4
                      Source: C:\Users\user\Desktop\PO.pdf.exeCode function: 0_2_004358C0 IsIconic,SetWindowPos,GetWindowPlacement,SetWindowPlacement,0_2_004358C0
                      Source: C:\Users\user\Desktop\PO.pdf.exeCode function: 0_2_00452708 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00452708
                      Source: C:\Users\user\Desktop\PO.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                      Malware Analysis System Evasion:

                      barindex
                      Contains functionality to detect sleep reduction / modificationsShow sources
                      Source: C:\Users\user\Desktop\PO.pdf.exeCode function: 0_2_0042A60C0_2_0042A60C
                      Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)Show sources
                      Source: C:\Users\user\Desktop\PO.pdf.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                      Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)Show sources
                      Source: C:\Users\user\Desktop\PO.pdf.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                      Source: C:\Users\user\Desktop\PO.pdf.exeCode function: GetCurrentThreadId,GetCursorPos,WaitForSingleObject,0_2_0044D838
                      Source: C:\Users\user\Desktop\PO.pdf.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exeCode function: 0_2_0042A60C0_2_0042A60C
                      Source: C:\Users\user\Desktop\PO.pdf.exe TID: 5876Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exe TID: 5876Thread sleep time: -60000s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exe TID: 5876Thread sleep time: -52500s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exe TID: 5876Thread sleep time: -46000s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exe TID: 5876Thread sleep time: -63750s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exe TID: 5876Thread sleep time: -60750s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exe TID: 5876Thread sleep time: -59812s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exe TID: 5876Thread sleep time: -59500s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exe TID: 5876Thread sleep time: -59312s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exe TID: 5876Thread sleep time: -88641s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exe TID: 5876Thread sleep time: -117376s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exe TID: 5876Thread sleep time: -85032s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exe TID: 5876Thread sleep time: -56406s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exe TID: 5876Thread sleep time: -84282s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exe TID: 5876Thread sleep time: -56000s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exe TID: 5876Thread sleep time: -55812s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exe TID: 5876Thread sleep time: -83391s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exe TID: 5876Thread sleep time: -55312s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exe TID: 5876Thread sleep time: -55094s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exe TID: 5876Thread sleep time: -82032s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exe TID: 5876Thread sleep time: -81000s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exe TID: 5876Thread sleep time: -79032s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exe TID: 5876Thread sleep time: -77391s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exe TID: 5876Thread sleep time: -69891s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exe TID: 5876Thread sleep time: -68250s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exe TID: 5876Thread sleep time: -45312s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exe TID: 5876Thread sleep time: -44406s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exe TID: 5876Thread sleep time: -66282s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exe TID: 5876Thread sleep time: -44000s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exe TID: 5876Thread sleep time: -43312s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exe TID: 5876Thread sleep time: -64641s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exe TID: 5876Thread sleep time: -63000s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exe TID: 5876Thread sleep time: -41812s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exe TID: 5876Thread sleep time: -40906s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exe TID: 5876Thread sleep time: -40688s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exe TID: 5876Thread sleep time: -39812s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exe TID: 5876Thread sleep time: -39188s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exe TID: 5876Thread sleep time: -38312s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exe TID: 5876Thread sleep time: -38094s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exe TID: 5876Thread sleep time: -55782s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exe TID: 5876Thread sleep time: -37000s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exe TID: 5876Thread sleep time: -54141s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exe TID: 5876Thread sleep time: -35688s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exe TID: 5876Thread sleep time: -52500s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exe TID: 5876Thread sleep time: -34782s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exe TID: 5876Thread sleep time: -34594s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exe TID: 5876Thread sleep time: -33906s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exe TID: 5876Thread sleep time: -50532s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exe TID: 5876Thread sleep time: -32812s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exe TID: 5876Thread sleep time: -48891s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exe TID: 5876Thread sleep time: -47250s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exe TID: 5876Thread sleep time: -30406s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exe TID: 5876Thread sleep time: -30188s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exe TID: 5876Thread sleep time: -30000s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exe TID: 5876Thread sleep time: -36282s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exe TID: 5876Thread sleep time: -59594s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exe TID: 5876Thread sleep time: -58906s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exe TID: 5876Thread sleep time: -87282s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exe TID: 5876Thread sleep time: -57094s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exe TID: 5876Thread sleep time: -53594s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exe TID: 5876Thread sleep time: -53188s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exe TID: 5876Thread sleep time: -52094s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exe TID: 5876Thread sleep time: -51000s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exe TID: 5876Thread sleep time: -50500s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exe TID: 5876Thread sleep time: -50094s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exe TID: 5876Thread sleep time: -48500s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exe TID: 5876Thread sleep time: -47000s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exe TID: 5876Thread sleep time: -42188s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exe TID: 5876Thread sleep time: -41094s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exe TID: 5876Thread sleep time: -40000s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exe TID: 5876Thread sleep time: -38688s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exe TID: 5876Thread sleep time: -36500s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exe TID: 5876Thread sleep time: -35188s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exe TID: 5876Thread sleep time: -34094s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exe TID: 5876Thread sleep time: -33000s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exe TID: 5876Thread sleep time: -32094s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exe TID: 5876Thread sleep time: -31688s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exe TID: 5876Thread sleep time: -31000s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exe TID: 5876Thread sleep time: -59782s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exe TID: 5876Thread sleep time: -57782s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Users\user\Desktop\PO.pdf.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\Desktop\PO.pdf.exeLast function: Thread delayed
                      Source: C:\Users\user\Desktop\PO.pdf.exeCode function: 0_2_00462A84 GetSystemTime followed by cmp: cmp word ptr [esp+18h], 07dfh and CTI: jnc 00462AA8h0_2_00462A84
                      Source: C:\Users\user\Desktop\PO.pdf.exeCode function: 0_2_00405C14 GetModuleHandleA,GetProcAddress,lstrcpyn,lstrcpyn,lstrcpyn,FindFirstFileA,FindClose,lstrlen,lstrcpyn,lstrlen,lstrcpyn,0_2_00405C14
                      Source: C:\Users\user\Desktop\PO.pdf.exeCode function: 0_2_00421090 GetSystemInfo,0_2_00421090
                      Source: PO.pdf.exe, 00000001.00000002.633824464.0000000004D10000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
                      Source: PO.pdf.exe, 00000000.00000002.363930105.000000000078A000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                      Source: PO.pdf.exe, 00000001.00000002.633824464.0000000004D10000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
                      Source: PO.pdf.exe, 00000001.00000002.633824464.0000000004D10000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
                      Source: PO.pdf.exe, 00000001.00000002.629097432.0000000000846000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                      Source: PO.pdf.exe, 00000001.00000002.633824464.0000000004D10000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
                      Source: C:\Users\user\Desktop\PO.pdf.exeProcess information queried: ProcessInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exeProcess queried: DebugFlagsJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exeProcess queried: DebugObjectHandleJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exeCode function: 1_2_04AAA490 LdrInitializeThunk,1_2_04AAA490
                      Source: C:\Users\user\Desktop\PO.pdf.exeCode function: 1_2_004396F3 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_004396F3
                      Source: C:\Users\user\Desktop\PO.pdf.exeCode function: 0_2_00462924 VirtualProtect ?,00012397,00000104,?,00000000,00012397,00003000,000000040_2_00462924
                      Source: C:\Users\user\Desktop\PO.pdf.exeCode function: 0_2_00452708 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00452708
                      Source: C:\Users\user\Desktop\PO.pdf.exeCode function: 1_2_0043D412 mov eax, dword ptr fs:[00000030h]1_2_0043D412
                      Source: C:\Users\user\Desktop\PO.pdf.exeCode function: 1_2_0043D4D0 mov eax, dword ptr fs:[00000030h]1_2_0043D4D0
                      Source: C:\Users\user\Desktop\PO.pdf.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exeCode function: 0_2_00462B08 KiUserExceptionDispatcher,LoadMenuW,GetSystemMetrics,GetSystemMetrics,ExitProcess,RtlAddVectoredExceptionHandler,LoadMenuW,0_2_00462B08
                      Source: C:\Users\user\Desktop\PO.pdf.exeCode function: 1_2_00438746 SetUnhandledExceptionFilter,1_2_00438746
                      Source: C:\Users\user\Desktop\PO.pdf.exeCode function: 1_2_004396F3 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_004396F3
                      Source: C:\Users\user\Desktop\PO.pdf.exeCode function: 1_2_0043BD7F __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_0043BD7F
                      Source: C:\Users\user\Desktop\PO.pdf.exeCode function: 1_2_00439BB5 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_00439BB5
                      Source: C:\Users\user\Desktop\PO.pdf.exeMemory protected: page read and write | page guardJump to behavior

                      HIPS / PFW / Operating System Protection Evasion:

                      barindex
                      Maps a DLL or memory area into another processShow sources
                      Source: C:\Users\user\Desktop\PO.pdf.exeSection loaded: unknown target: C:\Users\user\Desktop\PO.pdf.exe protection: execute and read and writeJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exeProcess created: C:\Users\user\Desktop\PO.pdf.exe 'C:\Users\user\Desktop\PO.pdf.exe' Jump to behavior
                      Source: PO.pdf.exe, 00000001.00000002.629280184.0000000000E70000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
                      Source: PO.pdf.exe, 00000001.00000002.629280184.0000000000E70000.00000002.00000001.sdmpBinary or memory string: NProgram Manager
                      Source: PO.pdf.exe, 00000001.00000002.629280184.0000000000E70000.00000002.00000001.sdmpBinary or memory string: Progman
                      Source: PO.pdf.exe, 00000001.00000002.629280184.0000000000E70000.00000002.00000001.sdmpBinary or memory string: Progmanlock
                      Source: C:\Users\user\Desktop\PO.pdf.exeCode function: GetModuleFileNameA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegQueryValueExA,RegQueryValueExA,RegCloseKey,lstrcpyn,GetThreadLocale,GetLocaleInfoA,lstrlen,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,0_2_00405DCC
                      Source: C:\Users\user\Desktop\PO.pdf.exeCode function: GetLocaleInfoA,GetACP,0_2_0040AED4
                      Source: C:\Users\user\Desktop\PO.pdf.exeCode function: GetLocaleInfoA,0_2_00409CF0
                      Source: C:\Users\user\Desktop\PO.pdf.exeCode function: GetLocaleInfoA,0_2_00409CA4
                      Source: C:\Users\user\Desktop\PO.pdf.exeCode function: lstrcpyn,GetThreadLocale,GetLocaleInfoA,lstrlen,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,0_2_00405ED8
                      Source: C:\Users\user\Desktop\PO.pdf.exeCode function: GetLocaleInfoA,1_2_0043CA4A
                      Source: C:\Users\user\Desktop\PO.pdf.exeQueries volume information: C:\Windows\assembly\GAC_32\CustomMarshalers\2.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exeQueries volume information: C:\Windows\assembly\GAC_32\CustomMarshalers\2.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exeCode function: 0_2_00402A62 GetSystemTime,0_2_00402A62
                      Source: C:\Users\user\Desktop\PO.pdf.exeCode function: 0_2_0043ACEC GetVersion,0_2_0043ACEC
                      Source: C:\Users\user\Desktop\PO.pdf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                      Stealing of Sensitive Information:

                      barindex
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 00000001.00000002.630480670.0000000002931000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.366017620.0000000004162000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.628534338.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.366241545.00000000041A5000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.628623470.0000000000445000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.628885625.0000000000740000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.628953938.0000000000782000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.629352704.0000000002282000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: PO.pdf.exe PID: 2316, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: PO.pdf.exe PID: 2768, type: MEMORY
                      Source: Yara matchFile source: 0.2.PO.pdf.exe.4130000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.PO.pdf.exe.740000.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.PO.pdf.exe.740000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.PO.pdf.exe.2280000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.PO.pdf.exe.4160000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.PO.pdf.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.PO.pdf.exe.780000.3.unpack, type: UNPACKEDPE
                      Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)Show sources
                      Source: C:\Users\user\Desktop\PO.pdf.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                      Tries to harvest and steal browser information (history, passwords, etc)Show sources
                      Source: C:\Users\user\Desktop\PO.pdf.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                      Tries to harvest and steal ftp login credentialsShow sources
                      Source: C:\Users\user\Desktop\PO.pdf.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\Jump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xmlJump to behavior
                      Tries to steal Mail credentials (via file access)Show sources
                      Source: C:\Users\user\Desktop\PO.pdf.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                      Source: C:\Users\user\Desktop\PO.pdf.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                      Source: Yara matchFile source: 00000001.00000002.630480670.0000000002931000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: PO.pdf.exe PID: 2316, type: MEMORY

                      Remote Access Functionality: