Loading ...

Play interactive tourEdit tour

Analysis Report Proforma Invoice with Bank Details_pdf.exe

Overview

General Information

Sample Name:Proforma Invoice with Bank Details_pdf.exe
Analysis ID:323892
MD5:8816ae2d440c50e7ec52be21ae6e2b22
SHA1:210289b9df203f83f263fe2530aa28c078b8d6c1
SHA256:d2146d63100b68c87046aa63c8e5b73a8893e171f24c3500070005ccea0eaacd
Tags:AgentTeslaexe

Most interesting Screenshot:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Sigma detected: MSBuild connects to smtp port
Yara detected AgentTesla
.NET source code contains potential unpacker
Initial sample is a PE file and has a suspicious name
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file access)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Antivirus or Machine Learning detection for unpacked file
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found dropped PE file which has not been started or loaded
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses SMTP (mail sending)
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

Startup

  • System is w10x64
  • Proforma Invoice with Bank Details_pdf.exe (PID: 6672 cmdline: 'C:\Users\user\Desktop\Proforma Invoice with Bank Details_pdf.exe' MD5: 8816AE2D440C50E7EC52BE21AE6E2B22)
    • conhost.exe (PID: 6680 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • cmd.exe (PID: 6736 cmdline: cmd /c schtasks /Create /TN name /XML 'C:\Users\user\AppData\Local\Temp\eb880290d3c747809c5fd1c3af592ae7.xml' MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • schtasks.exe (PID: 6756 cmdline: schtasks /Create /TN name /XML 'C:\Users\user\AppData\Local\Temp\eb880290d3c747809c5fd1c3af592ae7.xml' MD5: 15FF7D8324231381BAD48A052F85DF04)
    • MSBuild.exe (PID: 6744 cmdline: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe MD5: 88BBB7610152B48C2B3879473B17857E)
  • cleanup

Malware Configuration

Threatname: Agenttesla

{"Username: ": "umfkxJ05b", "URL: ": "http://AAETsHFcmz5EiUda3E.net", "To: ": "", "ByHost: ": "mail.hybridgroupco.com:587", "Password: ": "IvIoSkuTkG", "From: ": ""}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000003.00000002.473024653.0000000002C01000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000000.00000002.209201167.0000000000C66000.00000004.00020000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000003.00000002.473614554.0000000002CCE000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000003.00000002.469545862.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          00000003.00000002.474100533.0000000002DA4000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 3 entries

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            0.2.Proforma Invoice with Bank Details_pdf.exe.c40000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              3.2.MSBuild.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security

                Sigma Overview

                System Summary:

                barindex
                Sigma detected: MSBuild connects to smtp portShow sources
                Source: Network ConnectionAuthor: Joe Security: Data: DestinationIp: 66.70.204.222, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe, Initiated: true, ProcessId: 6744, Protocol: tcp, SourceIp: 192.168.2.3, SourceIsIpv6: false, SourcePort: 49725

                Signature Overview

                Click to jump to signature section

                Show All Signature Results

                AV Detection:

                barindex
                Found malware configurationShow sources
                Source: MSBuild.exe.6744.3.memstrMalware Configuration Extractor: Agenttesla {"Username: ": "umfkxJ05b", "URL: ": "http://AAETsHFcmz5EiUda3E.net", "To: ": "", "ByHost: ": "mail.hybridgroupco.com:587", "Password: ": "IvIoSkuTkG", "From: ": ""}
                Multi AV Scanner detection for domain / URLShow sources
                Source: mail.hybridgroupco.comVirustotal: Detection: 9%Perma Link
                Multi AV Scanner detection for submitted fileShow sources
                Source: Proforma Invoice with Bank Details_pdf.exeVirustotal: Detection: 30%Perma Link
                Source: Proforma Invoice with Bank Details_pdf.exeReversingLabs: Detection: 27%
                Machine Learning detection for dropped fileShow sources
                Source: C:\Users\user\AppData\Local\Temp\folder\file.exeJoe Sandbox ML: detected
                Machine Learning detection for sampleShow sources
                Source: Proforma Invoice with Bank Details_pdf.exeJoe Sandbox ML: detected
                Source: 3.2.MSBuild.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                Source: global trafficTCP traffic: 192.168.2.3:49725 -> 66.70.204.222:587
                Source: Joe Sandbox ViewIP Address: 66.70.204.222 66.70.204.222
                Source: Joe Sandbox ViewASN Name: OVHFR OVHFR
                Source: global trafficTCP traffic: 192.168.2.3:49725 -> 66.70.204.222:587
                Source: unknownTCP traffic detected without corresponding DNS query: 13.83.66.189
                Source: unknownTCP traffic detected without corresponding DNS query: 13.83.66.189
                Source: unknownTCP traffic detected without corresponding DNS query: 13.83.66.189
                Source: unknownTCP traffic detected without corresponding DNS query: 13.83.66.189
                Source: unknownTCP traffic detected without corresponding DNS query: 13.83.66.189
                Source: unknownTCP traffic detected without corresponding DNS query: 13.83.66.189
                Source: unknownTCP traffic detected without corresponding DNS query: 13.83.66.189
                Source: unknownTCP traffic detected without corresponding DNS query: 13.83.66.189
                Source: unknownTCP traffic detected without corresponding DNS query: 13.83.66.189
                Source: unknownTCP traffic detected without corresponding DNS query: 13.83.66.189
                Source: unknownTCP traffic detected without corresponding DNS query: 13.83.66.189
                Source: unknownTCP traffic detected without corresponding DNS query: 13.83.66.189
                Source: unknownTCP traffic detected without corresponding DNS query: 13.83.66.189
                Source: unknownTCP traffic detected without corresponding DNS query: 13.83.66.189
                Source: unknownTCP traffic detected without corresponding DNS query: 13.83.66.189
                Source: unknownTCP traffic detected without corresponding DNS query: 13.83.66.189
                Source: unknownTCP traffic detected without corresponding DNS query: 13.83.66.189
                Source: unknownTCP traffic detected without corresponding DNS query: 13.83.66.189
                Source: unknownTCP traffic detected without corresponding DNS query: 13.83.66.189
                Source: unknownTCP traffic detected without corresponding DNS query: 13.83.66.189
                Source: unknownTCP traffic detected without corresponding DNS query: 13.83.66.189
                Source: unknownTCP traffic detected without corresponding DNS query: 104.108.38.112
                Source: unknownTCP traffic detected without corresponding DNS query: 104.108.38.112
                Source: unknownTCP traffic detected without corresponding DNS query: 205.185.216.10
                Source: unknownTCP traffic detected without corresponding DNS query: 93.184.220.29
                Source: unknownTCP traffic detected without corresponding DNS query: 93.184.220.29
                Source: unknownTCP traffic detected without corresponding DNS query: 104.108.60.202
                Source: unknownTCP traffic detected without corresponding DNS query: 104.108.60.202
                Source: unknownTCP traffic detected without corresponding DNS query: 104.108.60.202
                Source: unknownTCP traffic detected without corresponding DNS query: 93.184.220.29
                Source: unknownTCP traffic detected without corresponding DNS query: 93.184.220.29
                Source: unknownTCP traffic detected without corresponding DNS query: 104.80.21.45
                Source: unknownTCP traffic detected without corresponding DNS query: 93.184.220.29
                Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
                Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
                Source: unknownTCP traffic detected without corresponding DNS query: 93.184.220.29
                Source: unknownTCP traffic detected without corresponding DNS query: 13.83.66.189
                Source: unknownTCP traffic detected without corresponding DNS query: 93.184.220.29
                Source: unknownTCP traffic detected without corresponding DNS query: 205.185.216.10
                Source: unknownTCP traffic detected without corresponding DNS query: 67.27.233.126
                Source: unknownTCP traffic detected without corresponding DNS query: 93.184.220.29
                Source: unknownTCP traffic detected without corresponding DNS query: 93.184.220.29
                Source: unknownTCP traffic detected without corresponding DNS query: 67.27.233.126
                Source: unknownTCP traffic detected without corresponding DNS query: 205.185.216.10
                Source: unknownTCP traffic detected without corresponding DNS query: 13.83.66.189
                Source: unknownTCP traffic detected without corresponding DNS query: 13.83.66.189
                Source: unknownTCP traffic detected without corresponding DNS query: 13.83.66.189
                Source: unknownTCP traffic detected without corresponding DNS query: 93.184.220.29
                Source: unknownTCP traffic detected without corresponding DNS query: 67.27.233.126
                Source: unknownTCP traffic detected without corresponding DNS query: 93.184.220.29
                Source: unknownDNS traffic detected: queries for: mail.hybridgroupco.com
                Source: Proforma Invoice with Bank Details_pdf.exe, Proforma Invoice with Bank Details_pdf.exe, 00000000.00000002.209201167.0000000000C66000.00000004.00020000.sdmp, MSBuild.exe, 00000003.00000002.469545862.0000000000402000.00000040.00000001.sdmpString found in binary or memory: http://127.0.0.1:
                Source: MSBuild.exe, 00000003.00000002.474100533.0000000002DA4000.00000004.00000001.sdmpString found in binary or memory: http://AAETsHFcmz5EiUda3E.net
                Source: MSBuild.exe, 00000003.00000002.473614554.0000000002CCE000.00000004.00000001.sdmpString found in binary or memory: http://AAETsHFcmz5EiUda3E.net0
                Source: Proforma Invoice with Bank Details_pdf.exe, Proforma Invoice with Bank Details_pdf.exe, 00000000.00000002.209201167.0000000000C66000.00000004.00020000.sdmp, MSBuild.exe, 00000003.00000002.469545862.0000000000402000.00000040.00000001.sdmpString found in binary or memory: https://api.telegram.org/bot%telegramapi%/
                Source: Proforma Invoice with Bank Details_pdf.exeString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/
                Source: Proforma Invoice with Bank Details_pdf.exe, MSBuild.exe, 00000003.00000002.469545862.0000000000402000.00000040.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
                Source: Proforma Invoice with Bank Details_pdf.exe, 00000000.00000002.209201167.0000000000C66000.00000004.00020000.sdmp, MSBuild.exe, 00000003.00000002.469545862.0000000000402000.00000040.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/U
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49678
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49688
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49686
                Source: unknownNetwork traffic detected: HTTP traffic on port 49678 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49679 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49697 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49696 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49693 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49688 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49679

                System Summary:

                barindex
                Initial sample is a PE file and has a suspicious nameShow sources
                Source: initial sampleStatic PE information: Filename: Proforma Invoice with Bank Details_pdf.exe
                Source: initial sampleStatic PE information: Filename: Proforma Invoice with Bank Details_pdf.exe
                Source: C:\Users\user\Desktop\Proforma Invoice with Bank Details_pdf.exeCode function: 0_2_00C550D1
                Source: C:\Users\user\Desktop\Proforma Invoice with Bank Details_pdf.exeCode function: 0_2_00C56845
                Source: C:\Users\user\Desktop\Proforma Invoice with Bank Details_pdf.exeCode function: 0_2_00C5584D
                Source: C:\Users\user\Desktop\Proforma Invoice with Bank Details_pdf.exeCode function: 0_2_00C4A1A4
                Source: C:\Users\user\Desktop\Proforma Invoice with Bank Details_pdf.exeCode function: 0_2_00C48283
                Source: C:\Users\user\Desktop\Proforma Invoice with Bank Details_pdf.exeCode function: 0_2_00C493F9
                Source: C:\Users\user\Desktop\Proforma Invoice with Bank Details_pdf.exeCode function: 0_2_00C48B8F
                Source: C:\Users\user\Desktop\Proforma Invoice with Bank Details_pdf.exeCode function: 0_2_00C4E3B9
                Source: C:\Users\user\Desktop\Proforma Invoice with Bank Details_pdf.exeCode function: 0_2_00C54B61
                Source: C:\Users\user\Desktop\Proforma Invoice with Bank Details_pdf.exeCode function: 0_2_00C545F1
                Source: C:\Users\user\Desktop\Proforma Invoice with Bank Details_pdf.exeCode function: 0_2_00C48FC4
                Source: C:\Users\user\Desktop\Proforma Invoice with Bank Details_pdf.exeCode function: 0_2_00C47F60
                Source: C:\Users\user\Desktop\Proforma Invoice with Bank Details_pdf.exeCode function: 0_2_00C48777
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_04FADCB9
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_04FA7AA0
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_04FA9498
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_04FACC4F
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_04FA821F
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_04FAEC1F
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_04F90006
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_04FA31F8
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_04FA3588
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_04FA1568
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_04FA713E
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_04FA9120
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_04FA1D20
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_04FA3588
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_04FA56E3
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_04FA28C8
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_04FA28BA
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_04FA58BD
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_04FAA4B2
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_04FA2099
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_04FA7A8F
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_04FA564A
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_04FA9E18
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_04FAB7F8
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_04FA49CE
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_04FA85C1
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_04FA7BA8
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_04FA7F88
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_04FA6B82
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_04FACC4F
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_04FA577C
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_04FA1558
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_04FA6D45
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_04FA2136
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_04FA1D10
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_05F307F0
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_05F359C8
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_05F35370
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_05F33740
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_05F30D10
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_05F37710
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_05F31CC0
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_05F38658
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_05F37E08
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_05F37DF8
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_05F307D3
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_05F30DCD
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_05F363CC
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_05F30DBB
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_05F33731
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_05F31115
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_05F30D01
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_05F37700
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_05F308D6
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_05F31CB3
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_05F372BC
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_05F31EA3
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_05F30E93
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_05F37E87
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_05F30E6A
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_05F38648
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_05F30A2A
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_05F32414
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_05F4A148
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_05F4AED0
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_05F4EAD0
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_05F4BE50
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_05F4B250
                Source: C:\Users\user\Desktop\Proforma Invoice with Bank Details_pdf.exeCode function: String function: 00C4AF50 appears 39 times
                Source: Proforma Invoice with Bank Details_pdf.exeBinary or memory string: OriginalFilename vs Proforma Invoice with Bank Details_pdf.exe
                Source: Proforma Invoice with Bank Details_pdf.exe, 00000000.00000003.205412201.00000000030AF000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs Proforma Invoice with Bank Details_pdf.exe
                Source: Proforma Invoice with Bank Details_pdf.exe, 00000000.00000002.209201167.0000000000C66000.00000004.00020000.sdmpBinary or memory string: OriginalFilenameyZFlSsyWYLpOIrYUuUqNGPSmFjhfv.exe4 vs Proforma Invoice with Bank Details_pdf.exe
                Source: 3.2.MSBuild.exe.400000.0.unpack, gtu.csCryptographic APIs: 'TransformFinalBlock'
                Source: 3.2.MSBuild.exe.400000.0.unpack, gtu.csCryptographic APIs: 'CreateDecryptor', 'TransformFinalBlock'
                Source: 3.2.MSBuild.exe.400000.0.unpack, gtu.csCryptographic APIs: 'CreateDecryptor', 'TransformBlock'
                Source: 3.2.MSBuild.exe.400000.0.unpack, DPAPI.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                Source: 3.2.MSBuild.exe.400000.0.unpack, DPAPI.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@8/2@1/1
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6680:120:WilError_01
                Source: C:\Users\user\Desktop\Proforma Invoice with Bank Details_pdf.exeFile created: C:\Users\user\AppData\Local\Temp\folderJump to behavior
                Source: Proforma Invoice with Bank Details_pdf.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\Desktop\Proforma Invoice with Bank Details_pdf.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: Proforma Invoice with Bank Details_pdf.exeVirustotal: Detection: 30%
                Source: Proforma Invoice with Bank Details_pdf.exeReversingLabs: Detection: 27%
                Source: Proforma Invoice with Bank Details_pdf.exeString found in binary or memory: </UserId><LogonType>InteractiveToken</LogonType><RunLevel>LeastPrivilege</RunLevel></Principal></Principals><Settings><MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy><AllowHardTerminate>false</AllowHardTerminate><StartWhenAvailable>true</StartWhenAvailable><RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable><IdleSettings><StopOnIdleEnd>true</StopOnIdleEnd><RestartOnIdle>false</RestartOnIdle></IdleSettings><AllowStartOnDemand>true</AllowStartOnDemand><Enabled>true</Enabled><Hidden>false</Hidden><RunOnlyIfIdle>false</RunOnlyIfIdle><WakeToRun>false</WakeToRun><ExecutionTimeLimit>PT0S</ExecutionTimeLimit><Priority>7</Priority></Settings><Actions Context="Author"><Exec><Command>
                Source: Proforma Invoice with Bank Details_pdf.exeString found in binary or memory: </UserId><LogonType>InteractiveToken</LogonType><RunLevel>LeastPrivilege</RunLevel></Principal></Principals><Settings><MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy><AllowHardTerminate>false</AllowHardTerminate><StartWhenAvailable>true</StartWhenAvailable><RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable><IdleSettings><StopOnIdleEnd>true</StopOnIdleEnd><RestartOnIdle>false</RestartOnIdle></IdleSettings><AllowStartOnDemand>true</AllowStartOnDemand><Enabled>true</Enabled><Hidden>false</Hidden><RunOnlyIfIdle>false</RunOnlyIfIdle><WakeToRun>false</WakeToRun><ExecutionTimeLimit>PT0S</ExecutionTimeLimit><Priority>7</Priority></Settings><Actions Context="Author"><Exec><Command>
                Source: C:\Users\user\Desktop\Proforma Invoice with Bank Details_pdf.exeFile read: C:\Users\user\Desktop\Proforma Invoice with Bank Details_pdf.exeJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\Proforma Invoice with Bank Details_pdf.exe 'C:\Users\user\Desktop\Proforma Invoice with Bank Details_pdf.exe'
                Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: unknownProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c schtasks /Create /TN name /XML 'C:\Users\user\AppData\Local\Temp\eb880290d3c747809c5fd1c3af592ae7.xml'
                Source: unknownProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
                Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /Create /TN name /XML 'C:\Users\user\AppData\Local\Temp\eb880290d3c747809c5fd1c3af592ae7.xml'
                Source: C:\Users\user\Desktop\Proforma Invoice with Bank Details_pdf.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c schtasks /Create /TN name /XML 'C:\Users\user\AppData\Local\Temp\eb880290d3c747809c5fd1c3af592ae7.xml'
                Source: C:\Users\user\Desktop\Proforma Invoice with Bank Details_pdf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /Create /TN name /XML 'C:\Users\user\AppData\Local\Temp\eb880290d3c747809c5fd1c3af592ae7.xml'
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{172BDDF8-CEEA-11D1-8B05-00600806D9B6}\InProcServer32
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dll
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
                Source: Proforma Invoice with Bank Details_pdf.exeStatic PE information: TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                Source: Binary string: wntdll.pdbUGP source: Proforma Invoice with Bank Details_pdf.exe, 00000000.00000003.205988083.0000000002E00000.00000004.00000001.sdmp
                Source: Binary string: wntdll.pdb source: Proforma Invoice with Bank Details_pdf.exe, 00000000.00000003.205988083.0000000002E00000.00000004.00000001.sdmp
                Source: Binary string: mscorrc.pdb source: MSBuild.exe, 00000003.00000002.476016918.0000000005E30000.00000002.00000001.sdmp
                Source: Proforma Invoice with Bank Details_pdf.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                Source: Proforma Invoice with Bank Details_pdf.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                Source: Proforma Invoice with Bank Details_pdf.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                Source: Proforma Invoice with Bank Details_pdf.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                Source: Proforma Invoice with Bank Details_pdf.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

                Data Obfuscation:

                barindex
                .NET source code contains potential unpackerShow sources
                Source: 3.2.MSBuild.exe.400000.0.unpack, gtu.cs.Net Code: ncv System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                Source: C:\Users\user\Desktop\Proforma Invoice with Bank Details_pdf.exeCode function: 0_2_00C5216C EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,
                Source: C:\Users\user\Desktop\Proforma Invoice with Bank Details_pdf.exeCode function: 0_2_00C66924 push ebx; iretd
                Source: C:\Users\user\Desktop\Proforma Invoice with Bank Details_pdf.exeCode function: 0_2_00C662AC pushad ; iretd
                Source: C:\Users\user\Desktop\Proforma Invoice with Bank Details_pdf.exeCode function: 0_2_00C66B0A push ecx; ret
                Source: C:\Users\user\Desktop\Proforma Invoice with Bank Details_pdf.exeCode function: 0_2_00C6A41A push edx; retf
                Source: C:\Users\user\Desktop\Proforma Invoice with Bank Details_pdf.exeCode function: 0_2_00C60554 push eax; ret
                Source: C:\Users\user\Desktop\Proforma Invoice with Bank Details_pdf.exeCode function: 0_2_00C45665 push ecx; ret
                Source: C:\Users\user\Desktop\Proforma Invoice with Bank Details_pdf.exeCode function: 0_2_00C60608 push eax; ret
                Source: C:\Users\user\Desktop\Proforma Invoice with Bank Details_pdf.exeCode function: 0_2_00C4AF95 push ecx; ret
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_05893FB7 push cs; retf
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_05893F43 push cs; retf
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_05893ECF push cs; retf
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_05F341F6 push ebx; iretd
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_05F315E9 push 0000005Dh; ret
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_05F3012A push 69FFFFFFh; ret
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_05F41722 push 08F2E872h; retf
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_05F41712 push 0902E872h; retf
                Source: C:\Users\user\Desktop\Proforma Invoice with Bank Details_pdf.exeFile created: C:\Users\user\AppData\Local\Temp\folder\file.exeJump to dropped file

                Boot Survival:

                barindex
                Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
                Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /Create /TN name /XML 'C:\Users\user\AppData\Local\Temp\eb880290d3c747809c5fd1c3af592ae7.xml'
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX

                Malware Analysis System Evasion:

                barindex
                Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)Show sources
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)Show sources
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\Desktop\Proforma Invoice with Bank Details_pdf.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\folder\file.exeJump to dropped file
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe TID: 7084Thread sleep time: -922337203685477s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe TID: 7084Thread sleep count: 338 > 30
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe TID: 7084Thread sleep time: -10140000s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe TID: 7084Thread sleep time: -149530s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe TID: 7084Thread sleep time: -89673s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe TID: 7084Thread sleep time: -149300s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe TID: 7084Thread sleep time: -179154s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe TID: 7084Thread sleep time: -59780s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe TID: 7084Thread sleep time: -39626s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe TID: 7084Thread sleep time: -39374s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe TID: 7084Thread sleep time: -39250s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe TID: 7084Thread sleep time: -489450s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe TID: 7084Thread sleep count: 32 > 30
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe TID: 7084Thread sleep time: -334016s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe TID: 7084Thread sleep time: -39126s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe TID: 7084Thread sleep time: -487875s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe TID: 7084Thread sleep count: 35 > 30
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe TID: 7084Thread sleep time: -366940s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe TID: 7084Thread sleep count: 33 > 30
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe TID: 7084Thread sleep time: -644028s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe TID: 7084Thread sleep time: -199215s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe TID: 7084Thread sleep time: -271362s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe TID: 7084Thread sleep time: -117192s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe TID: 7084Thread sleep time: -371089s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe TID: 7084Thread sleep time: -58737s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe TID: 7084Thread sleep time: -31500s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe TID: 7084Thread sleep time: -39124s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe TID: 7084Thread sleep time: -39000s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe TID: 7084Thread sleep time: -77812s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe TID: 7084Thread sleep time: -31689s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe TID: 7084Thread sleep time: -96955s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe TID: 7084Thread sleep time: -53045s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe TID: 7084Thread sleep time: -58170s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe TID: 7084Thread sleep time: -58218s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe TID: 7084Thread sleep time: -52810s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe TID: 7084Thread sleep time: -31830s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeLast function: Thread delayed
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeLast function: Thread delayed
                Source: MSBuild.exe, 00000003.00000002.475746937.00000000054B0000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
                Source: MSBuild.exe, 00000003.00000003.315248335.0000000000CCF000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW
                Source: MSBuild.exe, 00000003.00000002.475746937.00000000054B0000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
                Source: MSBuild.exe, 00000003.00000003.315248335.0000000000CCF000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dlll
                Source: MSBuild.exe, 00000003.00000002.475746937.00000000054B0000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
                Source: MSBuild.exe, 00000003.00000002.475746937.00000000054B0000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information queried: ProcessInformation
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_04FA9498 LdrInitializeThunk,
                Source: C:\Users\user\Desktop\Proforma Invoice with Bank Details_pdf.exeCode function: 0_2_00C5216C EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,
                Source: C:\Users\user\Desktop\Proforma Invoice with Bank Details_pdf.exeCode function: 0_2_00C5216C EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,
                Source: C:\Users\user\Desktop\Proforma Invoice with Bank Details_pdf.exeCode function: 0_2_00C5216C EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,
                Source: C:\Users\user\Desktop\Proforma Invoice with Bank Details_pdf.exeCode function: 0_2_00C41970 mov eax, dword ptr fs:[00000030h]
                Source: C:\Users\user\Desktop\Proforma Invoice with Bank Details_pdf.exeCode function: 0_2_00C41970 mov eax, dword ptr fs:[00000030h]
                Source: C:\Users\user\Desktop\Proforma Invoice with Bank Details_pdf.exeCode function: 0_2_00C654C7 mov eax, dword ptr fs:[00000030h]
                Source: C:\Users\user\Desktop\Proforma Invoice with Bank Details_pdf.exeCode function: 0_2_00C61CC2 mov eax, dword ptr fs:[00000030h]
                Source: C:\Users\user\Desktop\Proforma Invoice with Bank Details_pdf.exeCode function: 0_2_00C65567 mov eax, dword ptr fs:[00000030h]
                Source: C:\Users\user\Desktop\Proforma Invoice with Bank Details_pdf.exeCode function: 0_2_00C65504 mov eax, dword ptr fs:[00000030h]
                Source: C:\Users\user\Desktop\Proforma Invoice with Bank Details_pdf.exeCode function: 0_2_00C4A5C8 GetProcessHeap,
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess token adjusted: Debug
                Source: C:\Users\user\Desktop\Proforma Invoice with Bank Details_pdf.exeCode function: 0_2_00C4F48B SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                Source: C:\Users\user\Desktop\Proforma Invoice with Bank Details_pdf.exeCode function: 0_2_00C4F468 SetUnhandledExceptionFilter,
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeMemory allocated: page read and write | page guard

                HIPS / PFW / Operating System Protection Evasion:

                barindex
                Maps a DLL or memory area into another processShow sources
                Source: C:\Users\user\Desktop\Proforma Invoice with Bank Details_pdf.exeSection loaded: unknown target: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe protection: execute and read and write
                Writes to foreign memory regionsShow sources
                Source: C:\Users\user\Desktop\Proforma Invoice with Bank Details_pdf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe base: 748008
                Source: C:\Users\user\Desktop\Proforma Invoice with Bank Details_pdf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /Create /TN name /XML 'C:\Users\user\AppData\Local\Temp\eb880290d3c747809c5fd1c3af592ae7.xml'
                Source: MSBuild.exe, 00000003.00000002.471050219.0000000001310000.00000002.00000001.sdmpBinary or memory string: Program Manager
                Source: MSBuild.exe, 00000003.00000002.471050219.0000000001310000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
                Source: MSBuild.exe, 00000003.00000002.471050219.0000000001310000.00000002.00000001.sdmpBinary or memory string: Progman
                Source: MSBuild.exe, 00000003.00000002.471050219.0000000001310000.00000002.00000001.sdmpBinary or memory string: Progmanlock
                Source: C:\Users\user\Desktop\Proforma Invoice with Bank Details_pdf.exeCode function: 0_2_00C49D71 cpuid
                Source: C:\Users\user\Desktop\Proforma Invoice with Bank Details_pdf.exeCode function: ___getlocaleinfo,__malloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,GetCPInfo,___crtLCMapStringA,___crtLCMapStringA,___crtGetStringTypeW,_memmove,_memmove,_memmove,InterlockedDecrement,_free,_free,_free,_free,_free,_free,_free,_free,_free,InterlockedDecrement,
                Source: C:\Users\user\Desktop\Proforma Invoice with Bank Details_pdf.exeCode function: __calloc_crt,__malloc_crt,_free,__malloc_crt,_free,_free,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_mon,_free,_free,_free,InterlockedDecrement,InterlockedDecrement,_free,_free,
                Source: C:\Users\user\Desktop\Proforma Invoice with Bank Details_pdf.exeCode function: ___crtGetLocaleInfoA,GetLastError,___crtGetLocaleInfoA,__calloc_crt,___crtGetLocaleInfoA,__calloc_crt,_free,_free,__calloc_crt,_free,__invoke_watson,
                Source: C:\Users\user\Desktop\Proforma Invoice with Bank Details_pdf.exeCode function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoA_stat,
                Source: C:\Users\user\Desktop\Proforma Invoice with Bank Details_pdf.exeCode function: ___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,
                Source: C:\Users\user\Desktop\Proforma Invoice with Bank Details_pdf.exeCode function: EnumSystemLocalesEx,
                Source: C:\Users\user\Desktop\Proforma Invoice with Bank Details_pdf.exeCode function: GetLocaleInfoEx,
                Source: C:\Users\user\Desktop\Proforma Invoice with Bank Details_pdf.exeCode function: __calloc_crt,__malloc_crt,_free,__malloc_crt,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_num,_free,_free,InterlockedDecrement,InterlockedDecrement,_free,_free,
                Source: C:\Users\user\Desktop\Proforma Invoice with Bank Details_pdf.exeCode function: GetLocaleInfoEx,__wcsnicmp,_TestDefaultCountry,_TestDefaultCountry,__invoke_watson,__invoke_watson,
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeQueries volume information: C:\Windows\assembly\GAC_32\CustomMarshalers\2.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeQueries volume information: C:\Windows\assembly\GAC_32\CustomMarshalers\2.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                Source: C:\Users\user\Desktop\Proforma Invoice with Bank Details_pdf.exeCode function: 0_2_00C4BDF2 GetSystemTimeAsFileTime,GetCurrentThreadId,GetTickCount64,QueryPerformanceCounter,
                Source: C:\Users\user\Desktop\Proforma Invoice with Bank Details_pdf.exeCode function: 0_2_00C62DC3 GetUserNameA,CreateFileW,WriteFile,FindCloseChangeNotification,VirtualAlloc,CreateProcessW,
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

                Stealing of Sensitive Information:

                barindex
                Yara detected AgentTeslaShow sources
                Source: Yara matchFile source: 00000003.00000002.473024653.0000000002C01000.00000004.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.209201167.0000000000C66000.00000004.00020000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.473614554.0000000002CCE000.00000004.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.469545862.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.474100533.0000000002DA4000.00000004.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 6744, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: Proforma Invoice with Bank Details_pdf.exe PID: 6672, type: MEMORY
                Source: Yara matchFile source: 0.2.Proforma Invoice with Bank Details_pdf.exe.c40000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
                Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)Show sources
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                Tries to harvest and steal browser information (history, passwords, etc)Show sources
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                Tries to harvest and steal ftp login credentialsShow sources
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xml
                Tries to steal Mail credentials (via file access)Show sources
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 6744, type: MEMORY

                Remote Access Functionality:

                barindex
                Yara detected AgentTeslaShow sources
                Source: Yara matchFile source: 00000003.00000002.473024653.0000000002C01000.00000004.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.209201167.0000000000C66000.00000004.00020000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.473614554.0000000002CCE000.00000004.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.469545862.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.474100533.0000000002DA4000.00000004.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 6744, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: Proforma Invoice with Bank Details_pdf.exe PID: 6672, type: MEMORY
                Source: Yara matchFile source: 0.2.Proforma Invoice with Bank Details_pdf.exe.c40000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE

                Mitre Att&ck Matrix

                Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                Valid AccountsWindows Management Instrumentation211Scheduled Task/Job1Process Injection212Disable or Modify Tools1OS Credential Dumping2System Time Discovery1Remote ServicesArchive Collected Data11Exfiltration Over Other Network MediumEncrypted Channel12Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                Default AccountsNative API1Boot or Logon Initialization ScriptsScheduled Task/Job1Deobfuscate/Decode Files or Information11Credentials in Registry1Account Discovery1Remote Desktop ProtocolData from Local System2Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                Domain AccountsCommand and Scripting Interpreter2Logon Script (Windows)Logon Script (Windows)Obfuscated Files or Information2Security Account ManagerSystem Information Discovery135SMB/Windows Admin SharesEmail Collection1Automated ExfiltrationNon-Application Layer Protocol1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                Local AccountsScheduled Task/Job1Logon Script (Mac)Logon Script (Mac)Software Packing11NTDSSecurity Software Discovery141Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol12SIM Card SwapCarrier Billing Fraud
                Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptVirtualization/Sandbox Evasion13LSA SecretsVirtualization/Sandbox Evasion13SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                Replication Through Removable MediaLaunchdRc.commonRc.commonProcess Injection212Cached Domain CredentialsProcess Discovery2VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSyncSystem Owner/User Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc FilesystemRemote System Discovery1Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

                Behavior Graph

                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet

                Screenshots

                Thumbnails

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                windows-stand

                Antivirus, Machine Learning and Genetic Malware Detection

                Initial Sample

                SourceDetectionScannerLabelLink
                Proforma Invoice with Bank Details_pdf.exe31%VirustotalBrowse
                Proforma Invoice with Bank Details_pdf.exe27%ReversingLabs
                Proforma Invoice with Bank Details_pdf.exe100%Joe Sandbox ML

                Dropped Files

                SourceDetectionScannerLabelLink
                C:\Users\user\AppData\Local\Temp\folder\file.exe100%Joe Sandbox ML

                Unpacked PE Files

                SourceDetectionScannerLabelLinkDownload
                3.2.MSBuild.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File

                Domains

                SourceDetectionScannerLabelLink
                hybridgroupco.com0%VirustotalBrowse
                mail.hybridgroupco.com10%VirustotalBrowse

                URLs

                SourceDetectionScannerLabelLink
                http://127.0.0.1:0%VirustotalBrowse
                http://127.0.0.1:0%Avira URL Cloudsafe
                http://AAETsHFcmz5EiUda3E.net0%Avira URL Cloudsafe
                https://www.theonionrouter.com/dist.torproject.org/torbrowser/0%URL Reputationsafe
                https://www.theonionrouter.com/dist.torproject.org/torbrowser/0%URL Reputationsafe
                https://www.theonionrouter.com/dist.torproject.org/torbrowser/0%URL Reputationsafe
                https://www.theonionrouter.com/dist.torproject.org/torbrowser/0%URL Reputationsafe
                https://www.theonionrouter.com/dist.torproject.org/torbrowser/U0%URL Reputationsafe
                https://www.theonionrouter.com/dist.torproject.org/torbrowser/U0%URL Reputationsafe
                https://www.theonionrouter.com/dist.torproject.org/torbrowser/U0%URL Reputationsafe
                https://www.theonionrouter.com/dist.torproject.org/torbrowser/U0%URL Reputationsafe
                http://AAETsHFcmz5EiUda3E.net00%Avira URL Cloudsafe
                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe

                Domains and IPs

                Contacted Domains

                NameIPActiveMaliciousAntivirus DetectionReputation
                hybridgroupco.com
                66.70.204.222
                truetrueunknown
                mail.hybridgroupco.com
                unknown
                unknowntrueunknown

                URLs from Memory and Binaries

                NameSourceMaliciousAntivirus DetectionReputation
                http://127.0.0.1:Proforma Invoice with Bank Details_pdf.exe, Proforma Invoice with Bank Details_pdf.exe, 00000000.00000002.209201167.0000000000C66000.00000004.00020000.sdmp, MSBuild.exe, 00000003.00000002.469545862.0000000000402000.00000040.00000001.sdmpfalse
                • 0%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown
                http://AAETsHFcmz5EiUda3E.netMSBuild.exe, 00000003.00000002.474100533.0000000002DA4000.00000004.00000001.sdmptrue
                • Avira URL Cloud: safe
                unknown
                https://www.theonionrouter.com/dist.torproject.org/torbrowser/Proforma Invoice with Bank Details_pdf.exefalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                https://www.theonionrouter.com/dist.torproject.org/torbrowser/UProforma Invoice with Bank Details_pdf.exe, 00000000.00000002.209201167.0000000000C66000.00000004.00020000.sdmp, MSBuild.exe, 00000003.00000002.469545862.0000000000402000.00000040.00000001.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                http://AAETsHFcmz5EiUda3E.net0MSBuild.exe, 00000003.00000002.473614554.0000000002CCE000.00000004.00000001.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://api.telegram.org/bot%telegramapi%/Proforma Invoice with Bank Details_pdf.exe, Proforma Invoice with Bank Details_pdf.exe, 00000000.00000002.209201167.0000000000C66000.00000004.00020000.sdmp, MSBuild.exe, 00000003.00000002.469545862.0000000000402000.00000040.00000001.sdmpfalse
                  high
                  https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zipProforma Invoice with Bank Details_pdf.exe, MSBuild.exe, 00000003.00000002.469545862.0000000000402000.00000040.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown

                  Contacted IPs

                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs

                  Public

                  IPDomainCountryFlagASNASN NameMalicious
                  66.70.204.222
                  unknownCanada
                  16276OVHFRtrue

                  General Information

                  Joe Sandbox Version:31.0.0 Red Diamond
                  Analysis ID:323892
                  Start date:27.11.2020
                  Start time:18:48:08
                  Joe Sandbox Product:CloudBasic
                  Overall analysis duration:0h 6m 4s
                  Hypervisor based Inspection enabled:false
                  Report type:light
                  Sample file name:Proforma Invoice with Bank Details_pdf.exe
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                  Number of analysed new started processes analysed:25
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • HDC enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Detection:MAL
                  Classification:mal100.troj.spyw.evad.winEXE@8/2@1/1
                  EGA Information:Failed
                  HDC Information:
                  • Successful, ratio: 76.1% (good quality ratio 71.3%)
                  • Quality average: 81.5%
                  • Quality standard deviation: 29.2%
                  HCA Information:
                  • Successful, ratio: 82%
                  • Number of executed functions: 0
                  • Number of non-executed functions: 0
                  Cookbook Comments:
                  • Adjust boot time
                  • Enable AMSI
                  • Found application associated with file extension: .exe
                  Warnings:
                  Show All
                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, UsoClient.exe
                  • TCP Packets have been reduced to 100
                  • Excluded IPs from analysis (whitelisted): 168.61.161.212, 104.42.151.234, 51.104.139.180, 104.80.23.128, 20.54.26.129, 2.20.142.210, 2.20.142.209, 92.122.213.247, 92.122.213.194, 13.88.21.125, 51.104.144.132
                  • Excluded domains from analysis (whitelisted): au.download.windowsupdate.com.edgesuite.net, arc.msn.com.nsatc.net, fs.microsoft.com, ris-prod.trafficmanager.net, skypedataprdcolcus17.cloudapp.net, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, a767.dscg3.akamai.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, ris.api.iris.microsoft.com, blobcollector.events.data.trafficmanager.net, audownload.windowsupdate.nsatc.net, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, skypedataprdcolwus16.cloudapp.net, au-bg-shim.trafficmanager.net, skypedataprdcolwus15.cloudapp.net
                  • Report size getting too big, too many NtOpenKeyEx calls found.
                  • Report size getting too big, too many NtQueryValueKey calls found.

                  Simulations

                  Behavior and APIs

                  TimeTypeDescription
                  18:49:14API Interceptor895x Sleep call for process: MSBuild.exe modified

                  Joe Sandbox View / Context

                  IPs

                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                  66.70.204.222Image001.exeGet hashmaliciousBrowse
                    4nfg3g3nwg.exeGet hashmaliciousBrowse
                      DOC04121993.exeGet hashmaliciousBrowse
                        PI.exeGet hashmaliciousBrowse
                          d9f83622ec1564600202a937d2414af8.exeGet hashmaliciousBrowse
                            Image001.exeGet hashmaliciousBrowse
                              mEPbT6Dbzc.exeGet hashmaliciousBrowse
                                b32sUgpVdT.exeGet hashmaliciousBrowse
                                  ZXeB2BO1Lq.exeGet hashmaliciousBrowse
                                    kiGANMAmR3.exeGet hashmaliciousBrowse
                                      QM34U1x8I6.exeGet hashmaliciousBrowse
                                        Y2UrKCOaJm.exeGet hashmaliciousBrowse
                                          SJAOO8OCe3.exeGet hashmaliciousBrowse
                                            zh7966Pn0I.exeGet hashmaliciousBrowse
                                              o7B4zT1WNb.exeGet hashmaliciousBrowse
                                                emMAbUc8Xg.exeGet hashmaliciousBrowse
                                                  a2onj1GOHs.exeGet hashmaliciousBrowse
                                                    RDp6VoVSfQ.exeGet hashmaliciousBrowse
                                                      DUE_INVOICE.exeGet hashmaliciousBrowse
                                                        2M3ZdRze7b.exeGet hashmaliciousBrowse

                                                          Domains

                                                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext

                                                          ASN

                                                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                          OVHFRDirect Deposit.xlsxGet hashmaliciousBrowse
                                                          • 145.239.131.51
                                                          Direct Deposit.xlsxGet hashmaliciousBrowse
                                                          • 145.239.131.55
                                                          https://mincast.us-south.cf.appdomain.cloud/redirect/?email=prampon@soteb.frGet hashmaliciousBrowse
                                                          • 149.56.20.211
                                                          Image001.exeGet hashmaliciousBrowse
                                                          • 66.70.204.222
                                                          4nfg3g3nwg.exeGet hashmaliciousBrowse
                                                          • 66.70.204.222
                                                          due-invoice.xlsmGet hashmaliciousBrowse
                                                          • 87.98.154.146
                                                          SHIPPING DOCUMENT & PACKING LIST.exeGet hashmaliciousBrowse
                                                          • 51.75.130.83
                                                          anthon.exeGet hashmaliciousBrowse
                                                          • 51.38.230.18
                                                          ORDER-207044.xLs.exeGet hashmaliciousBrowse
                                                          • 54.37.36.116
                                                          Bulk Order - 1017C.exeGet hashmaliciousBrowse
                                                          • 51.75.130.83
                                                          SWIFT Transfer (103) W071323.exeGet hashmaliciousBrowse
                                                          • 51.75.130.83
                                                          http://ancien-site-joomla.fr/build2.exeGet hashmaliciousBrowse
                                                          • 87.98.154.146
                                                          tarifvertrag_igbce_weihnachtsgeld_k#U00fcndigung.jsGet hashmaliciousBrowse
                                                          • 51.77.152.34
                                                          tarifvertrag_igbce_weihnachtsgeld_k#U00fcndigung.jsGet hashmaliciousBrowse
                                                          • 51.77.152.34
                                                          Invoice_Payment Form_948792.xlsmGet hashmaliciousBrowse
                                                          • 213.186.33.40
                                                          0151-83872-976-67-83872.htmGet hashmaliciousBrowse
                                                          • 51.210.112.129
                                                          SR7UzD8vSg.exeGet hashmaliciousBrowse
                                                          • 92.222.121.127
                                                          PAYMENT ADVISE.exeGet hashmaliciousBrowse
                                                          • 51.75.130.83
                                                          https://eti-salat.com/x/Get hashmaliciousBrowse
                                                          • 145.239.6.126
                                                          index.htmlGet hashmaliciousBrowse
                                                          • 139.99.124.57

                                                          JA3 Fingerprints

                                                          No context

                                                          Dropped Files

                                                          No context

                                                          Created / dropped Files

                                                          C:\Users\user\AppData\Local\Temp\eb880290d3c747809c5fd1c3af592ae7.xml
                                                          Process:C:\Users\user\Desktop\Proforma Invoice with Bank Details_pdf.exe
                                                          File Type:XML 1.0 document, ASCII text
                                                          Category:dropped
                                                          Size (bytes):1287
                                                          Entropy (8bit):5.224351566085788
                                                          Encrypted:false
                                                          SSDEEP:24:2do4+S8TcqdqMhrKOgFwvaPIrovlgU3ODOiIQRvh7hwZgvw43aVdyL3Tbn:c+XBqMhGeaPIrovl33ODOiLdKZgfoILv
                                                          MD5:4E45BCEC6ED11BB2765703CA8CA4A469
                                                          SHA1:2D2060D24EAA8352FB02AD6106E782CE62E195D1
                                                          SHA-256:381A73DEBD630FB0411220156217C871B931452D7915FE81EF73091A8B9A5214
                                                          SHA-512:3A9DC709E42584ACAF300EB9D0985EE39CABDF06A8327A8475417A54277DCCF66AF127185374117335A11280C7C5A0281D87F708379582DF03944DB0C3ED4488
                                                          Malicious:true
                                                          Reputation:low
                                                          Preview: <?xml version="1.0" encoding="UTF-16"?>.<Task version = "1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.<RegistrationInfo>.<Date>2015-09-27T14:27:44.8929027</Date > .<Author>142233\user</Author>.</RegistrationInfo>.<Triggers>.<LogonTrigger>.<Enabled>true</Enabled>.<UserId>142233\user</UserId>.</LogonTrigger>.<RegistrationTrigger>.<Enabled>false</Enabled>.</RegistrationTrigger>.</Triggers>.<Principals>.<Principal id="Author">.<UserId>142233\user</UserId>.<LogonType>InteractiveToken</LogonType>.<RunLevel>LeastPrivilege</RunLevel>.</Principal>.</Principals>.<Settings>.<MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.<AllowHardTerminate>false</AllowHardTerminate>.<StartWhenAvailable>true</StartWhenAvailable>.<RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.<IdleSettings>.<StopOnIdleEnd>true</StopOnIdleEnd>.<RestartOnIdle>false</RestartOnIdle>.</IdleSettings>.<AllowStartOnDemand>true</AllowStartOnDemand>.<Enabled>true</Enabled>.<Hidden>fals
                                                          C:\Users\user\AppData\Local\Temp\folder\file.exe
                                                          Process:C:\Users\user\Desktop\Proforma Invoice with Bank Details_pdf.exe
                                                          File Type:PE32 executable (console) Intel 80386, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):626186
                                                          Entropy (8bit):7.525138445631881
                                                          Encrypted:false
                                                          SSDEEP:12288:SrRqJJ1rAfoG1WFn4LJ6zuTlq3v9+s9tlgGKwE:QRq1rAsGEzwq3v9+s9tLi
                                                          MD5:029A3195D923405E8017102F90346E1E
                                                          SHA1:EB670BBD759C268B547E3397A0AED30C515CCF17
                                                          SHA-256:6713DB52BAFE0DE00F0F03ED9A1618ABE5946105DAECF10938323E12CE41FA7F
                                                          SHA-512:4FA94F113D0F75108709F33629B6EB3BCD517762BF14CF164F7D4D0E7A71DA96F7A62F3F44DD6D101BC83E763FA9CA4BEBD9C6066A87FF8CEF30B69D8AE17C5D
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                                          Reputation:low
                                                          Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........Km.Km.Km..>.Rm..<..m..=..m.Km..m..J.Xm.l. .Jm.l.:.Jm.Kmd.Jm.l.?.Jm.RichKm.........................PE..L...G.._.................b...X......?H............@.......................................@.................................h................................p...................................... ...@............................................text...9a.......b.................. ..`.rdata...c.......d...f..............@..@.data............h..................@....rsrc................2..............@..@.reloc.......p......................@..B................................................................................................................................................................................................................................................................................................................

                                                          Static File Info

                                                          General

                                                          File type:PE32 executable (console) Intel 80386, for MS Windows
                                                          Entropy (8bit):7.5252045251493005
                                                          TrID:
                                                          • Win32 Executable (generic) a (10002005/4) 99.96%
                                                          • Generic Win/DOS Executable (2004/3) 0.02%
                                                          • DOS Executable Generic (2002/1) 0.02%
                                                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                          File name:Proforma Invoice with Bank Details_pdf.exe
                                                          File size:626176
                                                          MD5:8816ae2d440c50e7ec52be21ae6e2b22
                                                          SHA1:210289b9df203f83f263fe2530aa28c078b8d6c1
                                                          SHA256:d2146d63100b68c87046aa63c8e5b73a8893e171f24c3500070005ccea0eaacd
                                                          SHA512:3f0f5c577025b60e219fcc64e20d1294ed74d3fd80006130e56d30f2fbacd80e7da112649e52892db6a977d25ae5a4be3f856176e226dc0f891a96deb044cc1a
                                                          SSDEEP:12288:SrRqJJ1rAfoG1WFn4LJ6zuTlq3v9+s9tlgGKwE:QRq1rAsGEzwq3v9+s9tLi
                                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........Km..Km..Km....>.Rm....<..m....=..m..Km...m....J.Xm..l. .Jm..l.:.Jm..Kmd.Jm..l.?.Jm..RichKm..........................PE..L..

                                                          File Icon

                                                          Icon Hash:f0f06094c36ee8c2

                                                          Static PE Info

                                                          General

                                                          Entrypoint:0x40483f
                                                          Entrypoint Section:.text
                                                          Digitally signed:false
                                                          Imagebase:0x400000
                                                          Subsystem:windows cui
                                                          Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                                          DLL Characteristics:TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                                          Time Stamp:0x5FC0D847 [Fri Nov 27 10:43:19 2020 UTC]
                                                          TLS Callbacks:
                                                          CLR (.Net) Version:
                                                          OS Version Major:6
                                                          OS Version Minor:0
                                                          File Version Major:6
                                                          File Version Minor:0
                                                          Subsystem Version Major:6
                                                          Subsystem Version Minor:0
                                                          Import Hash:be74bcf76a56fe7a35a0a7f280acf926

                                                          Entrypoint Preview

                                                          Instruction
                                                          call 00007FD71CEDB463h
                                                          jmp 00007FD71CED3D3Ch
                                                          call 00007FD71CEDA0C7h
                                                          mov edx, eax
                                                          mov eax, dword ptr [edx+6Ch]
                                                          cmp eax, dword ptr [0041FC94h]
                                                          je 00007FD71CED3EC2h
                                                          mov ecx, dword ptr [0041FD54h]
                                                          test dword ptr [edx+70h], ecx
                                                          jne 00007FD71CED3EB7h
                                                          call 00007FD71CED9EACh
                                                          mov eax, dword ptr [eax+04h]
                                                          ret
                                                          call 00007FD71CEDA0A1h
                                                          mov edx, eax
                                                          mov eax, dword ptr [edx+6Ch]
                                                          cmp eax, dword ptr [0041FC94h]
                                                          je 00007FD71CED3EC2h
                                                          mov ecx, dword ptr [0041FD54h]
                                                          test dword ptr [edx+70h], ecx
                                                          jne 00007FD71CED3EB7h
                                                          call 00007FD71CED9E86h
                                                          add eax, 000000A0h
                                                          ret
                                                          push ebp
                                                          mov ebp, esp
                                                          sub esp, 44h
                                                          mov eax, dword ptr [0041F9B8h]
                                                          xor eax, ebp
                                                          mov dword ptr [ebp-04h], eax
                                                          push ebx
                                                          xor ebx, ebx
                                                          push esi
                                                          mov esi, dword ptr [ebp+08h]
                                                          mov dword ptr [ebp-2Ch], ebx
                                                          mov eax, dword ptr [esi+000000A8h]
                                                          mov dword ptr [ebp-20h], ebx
                                                          mov dword ptr [ebp-24h], ebx
                                                          mov dword ptr [ebp-1Ch], ebx
                                                          mov dword ptr [ebp-28h], ebx
                                                          mov dword ptr [ebp-44h], esi
                                                          mov dword ptr [ebp-40h], ebx
                                                          test eax, eax
                                                          je 00007FD71CED41C2h
                                                          push edi
                                                          lea edi, dword ptr [esi+04h]
                                                          cmp dword ptr [edi], ebx
                                                          jne 00007FD71CED3ECEh
                                                          push edi
                                                          push 00001004h
                                                          push eax
                                                          lea eax, dword ptr [ebp-44h]
                                                          push ebx
                                                          push eax
                                                          call 00007FD71CEDA928h
                                                          add esp, 14h
                                                          test eax, eax
                                                          jne 00007FD71CED416Ah
                                                          push 00000004h
                                                          call 00007FD71CED7295h
                                                          push 00000002h
                                                          push 00000180h
                                                          mov dword ptr [ebp-2Ch], eax

                                                          Rich Headers

                                                          Programming Language:
                                                          • [RES] VS2012 build 50727
                                                          • [LNK] VS2012 build 50727

                                                          Data Directories

                                                          NameVirtual AddressVirtual Size Is in Section
                                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x1d8680xc8.rdata
                                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x890000xd4b0.rsrc
                                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x970000x1484.reloc
                                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x1c5200x40.rdata
                                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_IAT0x180000x204.rdata
                                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                          Sections

                                                          NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                          .text0x10000x161390x16200False0.572232521186data6.66933993297IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                          .rdata0x180000x63ba0x6400False0.3630859375data4.86039745717IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                          .data0x1f0000x696840x66800False0.987345179116data7.98736576468IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                                          .rsrc0x890000xd4b00xd600False0.080917786215data3.628789833IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                          .reloc0x970000x85940x8600False0.125670475746data1.56501104284IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                          Resources

                                                          NameRVASizeTypeLanguageCountry
                                                          RT_ICON0x890f00xd228dataEnglishUnited States
                                                          RT_GROUP_ICON0x963180x14dataEnglishUnited States
                                                          RT_MANIFEST0x963300x17dXML 1.0 document textEnglishUnited States

                                                          Imports

                                                          DLLImport
                                                          KERNEL32.dllHeapReAlloc, EnumSystemLocalesEx, IsValidLocaleName, LCMapStringEx, GetUserDefaultLocaleName, GetModuleHandleW, TerminateProcess, GetCurrentProcess, LoadLibraryExW, FlsSetValue, FlsGetValue, FlsAlloc, SetUnhandledExceptionFilter, UnhandledExceptionFilter, SetFilePointerEx, ReadFile, GetConsoleMode, GetConsoleCP, FlushFileBuffers, CloseHandle, GetOEMCP, GetACP, IsValidCodePage, FreeEnvironmentStringsW, OutputDebugStringW, LoadLibraryW, SetStdHandle, WriteConsoleW, ReadConsoleW, CreateFileW, VirtualProtect, FlsFree, GetEnvironmentStringsW, GetTickCount64, GetSystemTimeAsFileTime, QueryPerformanceCounter, GetModuleFileNameA, GetStartupInfoW, InitOnceExecuteOnce, WideCharToMultiByte, InterlockedIncrement, InterlockedDecrement, EncodePointer, DecodePointer, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSectionEx, DeleteCriticalSection, Sleep, GetLocaleInfoEx, MultiByteToWideChar, GetStringTypeW, GetLastError, HeapFree, GetCommandLineA, GetCPInfo, RaiseException, RtlUnwind, HeapAlloc, InitializeCriticalSectionAndSpinCount, IsProcessorFeaturePresent, IsDebuggerPresent, GetProcessHeap, SetLastError, GetCurrentThreadId, ExitProcess, GetModuleHandleExW, GetProcAddress, HeapSize, GetStdHandle, WriteFile, GetModuleFileNameW, GetFileType
                                                          MSWSOCK.dlls_perror, rexec, rcmd, GetNameByTypeW, EnumProtocolsW, dn_expand
                                                          SETUPAPI.dllSetupQueryInfFileInformationW, SetupGetInfFileListA, SetupQueueDeleteA
                                                          MPR.dllMultinetGetConnectionPerformanceA, WNetConnectionDialog1A, WNetGetResourceParentA, MultinetGetConnectionPerformanceW, WNetGetUserW
                                                          WINMM.dlltimeEndPeriod, timeKillEvent, mmioFlush, midiStreamOut, joySetCapture, midiInStart
                                                          pdh.dllPdhVbGetCounterPathElements, PdhRemoveCounter, PdhEnumObjectItemsW, PdhOpenQueryA, PdhVbIsGoodStatus, PdhGetLogFileSize
                                                          msi.dll
                                                          GDI32.dllSetMagicColors, EnumFontFamiliesExW, CreateRectRgn, RemoveFontMemResourceEx, EudcUnloadLinkW, CreateCompatibleBitmap, CreateFontIndirectA, ScaleViewportExtEx, CreatePatternBrush, CreateICW
                                                          MAPI32.dll

                                                          Possible Origin

                                                          Language of compilation systemCountry where language is spokenMap
                                                          EnglishUnited States

                                                          Network Behavior

                                                          Network Port Distribution

                                                          TCP Packets

                                                          TimestampSource PortDest PortSource IPDest IP
                                                          Nov 27, 2020 18:49:16.637509108 CET49679443192.168.2.313.83.66.189
                                                          Nov 27, 2020 18:49:16.637701035 CET49679443192.168.2.313.83.66.189
                                                          Nov 27, 2020 18:49:16.683197975 CET49679443192.168.2.313.83.66.189
                                                          Nov 27, 2020 18:49:16.683275938 CET49679443192.168.2.313.83.66.189
                                                          Nov 27, 2020 18:49:16.808008909 CET4434967913.83.66.189192.168.2.3
                                                          Nov 27, 2020 18:49:16.808058023 CET4434967913.83.66.189192.168.2.3
                                                          Nov 27, 2020 18:49:16.808098078 CET4434967913.83.66.189192.168.2.3
                                                          Nov 27, 2020 18:49:16.808145046 CET4434967913.83.66.189192.168.2.3
                                                          Nov 27, 2020 18:49:16.808186054 CET4434967913.83.66.189192.168.2.3
                                                          Nov 27, 2020 18:49:16.808206081 CET49679443192.168.2.313.83.66.189
                                                          Nov 27, 2020 18:49:16.822509050 CET4434967913.83.66.189192.168.2.3
                                                          Nov 27, 2020 18:49:16.822563887 CET4434967913.83.66.189192.168.2.3
                                                          Nov 27, 2020 18:49:16.822581053 CET49679443192.168.2.313.83.66.189
                                                          Nov 27, 2020 18:49:16.822616100 CET49679443192.168.2.313.83.66.189
                                                          Nov 27, 2020 18:49:16.822652102 CET4434967913.83.66.189192.168.2.3
                                                          Nov 27, 2020 18:49:16.822701931 CET49679443192.168.2.313.83.66.189
                                                          Nov 27, 2020 18:49:16.822729111 CET4434967913.83.66.189192.168.2.3
                                                          Nov 27, 2020 18:49:16.822778940 CET49679443192.168.2.313.83.66.189
                                                          Nov 27, 2020 18:49:16.822802067 CET4434967913.83.66.189192.168.2.3
                                                          Nov 27, 2020 18:49:16.822850943 CET49679443192.168.2.313.83.66.189
                                                          Nov 27, 2020 18:49:16.822865963 CET4434967913.83.66.189192.168.2.3
                                                          Nov 27, 2020 18:49:16.822911024 CET49679443192.168.2.313.83.66.189
                                                          Nov 27, 2020 18:49:16.822930098 CET4434967913.83.66.189192.168.2.3
                                                          Nov 27, 2020 18:49:16.822985888 CET49679443192.168.2.313.83.66.189
                                                          Nov 27, 2020 18:49:16.823029995 CET4434967913.83.66.189192.168.2.3
                                                          Nov 27, 2020 18:49:16.823081017 CET49679443192.168.2.313.83.66.189
                                                          Nov 27, 2020 18:49:16.823107004 CET4434967913.83.66.189192.168.2.3
                                                          Nov 27, 2020 18:49:16.823151112 CET4434967913.83.66.189192.168.2.3
                                                          Nov 27, 2020 18:49:16.823170900 CET49679443192.168.2.313.83.66.189
                                                          Nov 27, 2020 18:49:16.853338003 CET4434967913.83.66.189192.168.2.3
                                                          Nov 27, 2020 18:49:16.853439093 CET4434967913.83.66.189192.168.2.3
                                                          Nov 27, 2020 18:49:16.853486061 CET4434967913.83.66.189192.168.2.3
                                                          Nov 27, 2020 18:49:16.853533983 CET4434967913.83.66.189192.168.2.3
                                                          Nov 27, 2020 18:49:16.853554964 CET49679443192.168.2.313.83.66.189
                                                          Nov 27, 2020 18:49:16.853593111 CET4434967913.83.66.189192.168.2.3
                                                          Nov 27, 2020 18:49:16.853641033 CET49679443192.168.2.313.83.66.189
                                                          Nov 27, 2020 18:49:16.869080067 CET4434967913.83.66.189192.168.2.3
                                                          Nov 27, 2020 18:49:16.869136095 CET4434967913.83.66.189192.168.2.3
                                                          Nov 27, 2020 18:49:16.869203091 CET49679443192.168.2.313.83.66.189
                                                          Nov 27, 2020 18:49:16.869235039 CET4434967913.83.66.189192.168.2.3
                                                          Nov 27, 2020 18:49:16.869323969 CET4434967913.83.66.189192.168.2.3
                                                          Nov 27, 2020 18:49:16.869373083 CET49679443192.168.2.313.83.66.189
                                                          Nov 27, 2020 18:49:16.869437933 CET4434967913.83.66.189192.168.2.3
                                                          Nov 27, 2020 18:49:16.869491100 CET4434967913.83.66.189192.168.2.3
                                                          Nov 27, 2020 18:49:16.869558096 CET49679443192.168.2.313.83.66.189
                                                          Nov 27, 2020 18:49:16.869591951 CET4434967913.83.66.189192.168.2.3
                                                          Nov 27, 2020 18:49:16.869651079 CET4434967913.83.66.189192.168.2.3
                                                          Nov 27, 2020 18:49:16.869699001 CET49679443192.168.2.313.83.66.189
                                                          Nov 27, 2020 18:49:16.869723082 CET4434967913.83.66.189192.168.2.3
                                                          Nov 27, 2020 18:49:16.869796038 CET4434967913.83.66.189192.168.2.3
                                                          Nov 27, 2020 18:49:16.869844913 CET49679443192.168.2.313.83.66.189
                                                          Nov 27, 2020 18:49:35.606722116 CET49725587192.168.2.366.70.204.222
                                                          Nov 27, 2020 18:49:35.712296009 CET5874972566.70.204.222192.168.2.3
                                                          Nov 27, 2020 18:49:35.712419987 CET49725587192.168.2.366.70.204.222
                                                          Nov 27, 2020 18:49:35.944700003 CET5874972566.70.204.222192.168.2.3
                                                          Nov 27, 2020 18:49:35.945132971 CET49725587192.168.2.366.70.204.222
                                                          Nov 27, 2020 18:49:36.050761938 CET5874972566.70.204.222192.168.2.3
                                                          Nov 27, 2020 18:49:36.051378012 CET49725587192.168.2.366.70.204.222
                                                          Nov 27, 2020 18:49:36.110667944 CET49725587192.168.2.366.70.204.222
                                                          Nov 27, 2020 18:49:36.158169031 CET5874972566.70.204.222192.168.2.3
                                                          Nov 27, 2020 18:49:36.159563065 CET49725587192.168.2.366.70.204.222
                                                          Nov 27, 2020 18:49:36.216675043 CET5874972566.70.204.222192.168.2.3
                                                          Nov 27, 2020 18:49:36.216753006 CET49725587192.168.2.366.70.204.222
                                                          Nov 27, 2020 18:49:36.615303993 CET8049689104.108.38.112192.168.2.3
                                                          Nov 27, 2020 18:49:36.617043018 CET4968980192.168.2.3104.108.38.112
                                                          Nov 27, 2020 18:49:36.617099047 CET4968980192.168.2.3104.108.38.112
                                                          Nov 27, 2020 18:49:36.633902073 CET8049689104.108.38.112192.168.2.3
                                                          Nov 27, 2020 18:49:38.803575993 CET8049680205.185.216.10192.168.2.3
                                                          Nov 27, 2020 18:49:38.803857088 CET4968080192.168.2.3205.185.216.10
                                                          Nov 27, 2020 18:49:40.108978033 CET804968393.184.220.29192.168.2.3
                                                          Nov 27, 2020 18:49:40.109314919 CET4968380192.168.2.393.184.220.29
                                                          Nov 27, 2020 18:49:40.319173098 CET804968493.184.220.29192.168.2.3
                                                          Nov 27, 2020 18:49:40.319333076 CET4968480192.168.2.393.184.220.29
                                                          Nov 27, 2020 18:49:40.563829899 CET49688443192.168.2.3104.108.60.202
                                                          Nov 27, 2020 18:49:40.584395885 CET44349688104.108.60.202192.168.2.3
                                                          Nov 27, 2020 18:49:40.584429026 CET44349688104.108.60.202192.168.2.3
                                                          Nov 27, 2020 18:49:40.584531069 CET49688443192.168.2.3104.108.60.202
                                                          Nov 27, 2020 18:49:40.584580898 CET49688443192.168.2.3104.108.60.202
                                                          Nov 27, 2020 18:49:40.735589981 CET804968793.184.220.29192.168.2.3
                                                          Nov 27, 2020 18:49:40.735716105 CET4968780192.168.2.393.184.220.29
                                                          Nov 27, 2020 18:49:41.575989962 CET804968293.184.220.29192.168.2.3
                                                          Nov 27, 2020 18:49:41.576338053 CET4968280192.168.2.393.184.220.29
                                                          Nov 27, 2020 18:49:41.897706985 CET49693443192.168.2.3104.80.21.45
                                                          Nov 27, 2020 18:49:41.898313999 CET4969480192.168.2.393.184.220.29
                                                          Nov 27, 2020 18:49:43.322161913 CET49697443192.168.2.3204.79.197.200
                                                          Nov 27, 2020 18:49:43.322335005 CET49696443192.168.2.3204.79.197.200
                                                          Nov 27, 2020 18:50:29.458873987 CET4968280192.168.2.393.184.220.29
                                                          Nov 27, 2020 18:50:29.459007025 CET49678443192.168.2.313.83.66.189
                                                          Nov 27, 2020 18:50:29.459096909 CET4968380192.168.2.393.184.220.29
                                                          Nov 27, 2020 18:50:29.459163904 CET4968080192.168.2.3205.185.216.10
                                                          Nov 27, 2020 18:50:29.459284067 CET4968180192.168.2.367.27.233.126
                                                          Nov 27, 2020 18:50:29.475214005 CET804968293.184.220.29192.168.2.3
                                                          Nov 27, 2020 18:50:29.475243092 CET804968393.184.220.29192.168.2.3
                                                          Nov 27, 2020 18:50:29.475353956 CET4968280192.168.2.393.184.220.29
                                                          Nov 27, 2020 18:50:29.475466013 CET4968380192.168.2.393.184.220.29
                                                          Nov 27, 2020 18:50:29.480077982 CET804968167.27.233.126192.168.2.3
                                                          Nov 27, 2020 18:50:29.480241060 CET4968180192.168.2.367.27.233.126
                                                          Nov 27, 2020 18:50:29.481194973 CET8049680205.185.216.10192.168.2.3
                                                          Nov 27, 2020 18:50:29.481340885 CET4968080192.168.2.3205.185.216.10
                                                          Nov 27, 2020 18:50:29.520664930 CET49679443192.168.2.313.83.66.189

                                                          UDP Packets

                                                          TimestampSource PortDest PortSource IPDest IP
                                                          Nov 27, 2020 18:48:50.724462986 CET6083153192.168.2.38.8.8.8
                                                          Nov 27, 2020 18:48:50.751859903 CET53608318.8.8.8192.168.2.3
                                                          Nov 27, 2020 18:48:51.523782969 CET6010053192.168.2.38.8.8.8
                                                          Nov 27, 2020 18:48:51.550929070 CET53601008.8.8.8192.168.2.3
                                                          Nov 27, 2020 18:48:52.340898037 CET5319553192.168.2.38.8.8.8
                                                          Nov 27, 2020 18:48:52.368297100 CET53531958.8.8.8192.168.2.3
                                                          Nov 27, 2020 18:48:53.460632086 CET5014153192.168.2.38.8.8.8
                                                          Nov 27, 2020 18:48:53.487828970 CET53501418.8.8.8192.168.2.3
                                                          Nov 27, 2020 18:48:54.683697939 CET5302353192.168.2.38.8.8.8
                                                          Nov 27, 2020 18:48:54.710848093 CET53530238.8.8.8192.168.2.3
                                                          Nov 27, 2020 18:48:55.710408926 CET4956353192.168.2.38.8.8.8
                                                          Nov 27, 2020 18:48:55.737627983 CET53495638.8.8.8192.168.2.3
                                                          Nov 27, 2020 18:48:56.610769987 CET5135253192.168.2.38.8.8.8
                                                          Nov 27, 2020 18:48:56.637826920 CET53513528.8.8.8192.168.2.3
                                                          Nov 27, 2020 18:49:17.352818966 CET5934953192.168.2.38.8.8.8
                                                          Nov 27, 2020 18:49:17.380176067 CET53593498.8.8.8192.168.2.3
                                                          Nov 27, 2020 18:49:25.267473936 CET5708453192.168.2.38.8.8.8
                                                          Nov 27, 2020 18:49:25.304222107 CET53570848.8.8.8192.168.2.3
                                                          Nov 27, 2020 18:49:28.796281099 CET5882353192.168.2.38.8.8.8
                                                          Nov 27, 2020 18:49:28.823597908 CET53588238.8.8.8192.168.2.3
                                                          Nov 27, 2020 18:49:29.572182894 CET5756853192.168.2.38.8.8.8
                                                          Nov 27, 2020 18:49:29.599486113 CET53575688.8.8.8192.168.2.3
                                                          Nov 27, 2020 18:49:30.357292891 CET5054053192.168.2.38.8.8.8
                                                          Nov 27, 2020 18:49:30.384581089 CET53505408.8.8.8192.168.2.3
                                                          Nov 27, 2020 18:49:31.431689978 CET5436653192.168.2.38.8.8.8
                                                          Nov 27, 2020 18:49:31.458792925 CET53543668.8.8.8192.168.2.3
                                                          Nov 27, 2020 18:49:31.604557991 CET5303453192.168.2.38.8.8.8
                                                          Nov 27, 2020 18:49:31.648224115 CET53530348.8.8.8192.168.2.3
                                                          Nov 27, 2020 18:49:35.526433945 CET5776253192.168.2.38.8.8.8
                                                          Nov 27, 2020 18:49:35.572897911 CET53577628.8.8.8192.168.2.3
                                                          Nov 27, 2020 18:49:40.148825884 CET5543553192.168.2.38.8.8.8
                                                          Nov 27, 2020 18:49:40.186539888 CET53554358.8.8.8192.168.2.3
                                                          Nov 27, 2020 18:49:51.248121023 CET5071353192.168.2.38.8.8.8
                                                          Nov 27, 2020 18:49:51.275444031 CET53507138.8.8.8192.168.2.3
                                                          Nov 27, 2020 18:49:54.172245026 CET5613253192.168.2.38.8.8.8
                                                          Nov 27, 2020 18:49:54.209326982 CET53561328.8.8.8192.168.2.3
                                                          Nov 27, 2020 18:50:04.793050051 CET5898753192.168.2.38.8.8.8
                                                          Nov 27, 2020 18:50:04.820249081 CET53589878.8.8.8192.168.2.3
                                                          Nov 27, 2020 18:50:25.860347986 CET5657953192.168.2.38.8.8.8
                                                          Nov 27, 2020 18:50:25.887492895 CET53565798.8.8.8192.168.2.3
                                                          Nov 27, 2020 18:50:27.451786041 CET6063353192.168.2.38.8.8.8
                                                          Nov 27, 2020 18:50:27.487265110 CET53606338.8.8.8192.168.2.3

                                                          DNS Queries

                                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                          Nov 27, 2020 18:49:35.526433945 CET192.168.2.38.8.8.80x1fe7Standard query (0)mail.hybridgroupco.comA (IP address)IN (0x0001)

                                                          DNS Answers

                                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                          Nov 27, 2020 18:49:35.572897911 CET8.8.8.8192.168.2.30x1fe7No error (0)mail.hybridgroupco.comhybridgroupco.comCNAME (Canonical name)IN (0x0001)
                                                          Nov 27, 2020 18:49:35.572897911 CET8.8.8.8192.168.2.30x1fe7No error (0)hybridgroupco.com66.70.204.222A (IP address)IN (0x0001)

                                                          SMTP Packets

                                                          TimestampSource PortDest PortSource IPDest IPCommands
                                                          Nov 27, 2020 18:49:35.944700003 CET5874972566.70.204.222192.168.2.3220-host.theserver.live ESMTP Exim 4.93 #2 Fri, 27 Nov 2020 21:49:35 +0400
                                                          220-We do not authorize the use of this system to transport unsolicited,
                                                          220 and/or bulk e-mail.
                                                          Nov 27, 2020 18:49:35.945132971 CET49725587192.168.2.366.70.204.222EHLO 142233
                                                          Nov 27, 2020 18:49:36.050761938 CET5874972566.70.204.222192.168.2.3250-host.theserver.live Hello 142233 [84.17.52.25]
                                                          250-SIZE 52428800
                                                          250-8BITMIME
                                                          250-PIPELINING
                                                          250-STARTTLS
                                                          250 HELP
                                                          Nov 27, 2020 18:49:36.051378012 CET49725587192.168.2.366.70.204.222STARTTLS
                                                          Nov 27, 2020 18:49:36.158169031 CET5874972566.70.204.222192.168.2.3220 TLS go ahead

                                                          Code Manipulations

                                                          Statistics

                                                          Behavior

                                                          Click to jump to process

                                                          System Behavior

                                                          General

                                                          Start time:18:48:55
                                                          Start date:27/11/2020
                                                          Path:C:\Users\user\Desktop\Proforma Invoice with Bank Details_pdf.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:'C:\Users\user\Desktop\Proforma Invoice with Bank Details_pdf.exe'
                                                          Imagebase:0xc40000
                                                          File size:626176 bytes
                                                          MD5 hash:8816AE2D440C50E7EC52BE21AE6E2B22
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Yara matches:
                                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.209201167.0000000000C66000.00000004.00020000.sdmp, Author: Joe Security
                                                          Reputation:low

                                                          General

                                                          Start time:18:48:56
                                                          Start date:27/11/2020
                                                          Path:C:\Windows\System32\conhost.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                          Imagebase:0x7ff6b2800000
                                                          File size:625664 bytes
                                                          MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high

                                                          General

                                                          Start time:18:48:56
                                                          Start date:27/11/2020
                                                          Path:C:\Windows\SysWOW64\cmd.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:cmd /c schtasks /Create /TN name /XML 'C:\Users\user\AppData\Local\Temp\eb880290d3c747809c5fd1c3af592ae7.xml'
                                                          Imagebase:0xbd0000
                                                          File size:232960 bytes
                                                          MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high

                                                          General

                                                          Start time:18:48:56
                                                          Start date:27/11/2020
                                                          Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
                                                          Imagebase:0x520000
                                                          File size:69632 bytes
                                                          MD5 hash:88BBB7610152B48C2B3879473B17857E
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:.Net C# or VB.NET
                                                          Yara matches:
                                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000002.473024653.0000000002C01000.00000004.00000001.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000002.473614554.0000000002CCE000.00000004.00000001.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000002.469545862.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000002.474100533.0000000002DA4000.00000004.00000001.sdmp, Author: Joe Security
                                                          Reputation:moderate

                                                          General

                                                          Start time:18:48:57
                                                          Start date:27/11/2020
                                                          Path:C:\Windows\SysWOW64\schtasks.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:schtasks /Create /TN name /XML 'C:\Users\user\AppData\Local\Temp\eb880290d3c747809c5fd1c3af592ae7.xml'
                                                          Imagebase:0xae0000
                                                          File size:185856 bytes
                                                          MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high

                                                          Disassembly

                                                          Code Analysis

                                                          Reset < >